Pass the Amazon Web Services AWS Certified Associate DVA-C02 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

A company's application has an AWS Lambda function that processes messages from loT devices. The company wants to monitor the Lambda function to ensure that the Lambda function is meeting its required service level agreement (SLA).

A developer must implement a solution to determine the application's throughput in near real time. The throughput must be based on the number of messages that the Lambda function receives and processesin a given time period. The Lambda function performs initialization and post-processing steps that must not factor into the throughput measurement.

What should the developer do to meet these requirements?

Options:

A.

Use the Lambda function's ConcurrentExecutions metric in Amazon CloudWatch to measure the throughput.


B.

Modify the application to log the calculated throughput to Amazon CloudWatch Logs. Use Amazon EventBridge to invoke a separate Lambda function to process the logs on a schedule.


C.

Modify the application to publish custom Amazon CloudWatch metrics when the Lambda function receives and processes each message. Use the metrics to calculate the throughput.


D.

Use the Lambda function's Invocations metric and Duration metric to calculate the throughput in Amazon CloudWatch.


Expert Solution
Questions # 82:

A company runs a web application on Amazon EC2 instances behind an Application Load Balancer. The application uses Amazon DynamoDB as its database. The company wants to ensure high performance for reads and writes.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.

Configure auto-scaling for the DynamoDB table with a target utilization of 70%. Set the minimum and maximum capacity units based on the expected workload.


B.

Use DynamoDB on-demand capacity mode for the table. Specify a maximum throughput higher than the expected peak read and write capacity units.


C.

Use DynamoDB provisioned throughput mode for the table. Create an Amazon CloudWatch alarm on the ThrottledRequests metric. Invoke an AWS Lambda function to increase provisioned capacity.


D.

Create an Amazon DynamoDB Accelerator (DAX) cluster. Configure the application to use the DAX endpoint.


Expert Solution
Questions # 83:

A company has an application that runs as a series of AWS Lambda functions. Each Lambda function receives data from an Amazon Simple Notification Service (Amazon SNS) topic and writes the data to an Amazon Aurora DB instance.

To comply with an information security policy, the company must ensure that the Lambda functions all use a single securely encrypted database connection string to access Aurora.

Which solution will meet these requirements'?

Options:

A.

Use IAM database authentication for Aurora to enable secure database connections for ail the Lambda functions.


B.

Store the credentials and read the credentials from an encrypted Amazon RDS DB instance.


C.

Store the credentials in AWS Systems Manager Parameter Store as a secure string parameter.


D.

Use Lambda environment variables with a shared AWS Key Management Service (AWS KMS) key for encryption.


Expert Solution
Questions # 84:

A developer is migrating a containerized application from an on-premises environment to the AWS Cloud. The developer is using the AWS CDK to provision a container in Amazon ECS on AWS Fargate. The container is behind an Application Load Balancer (ALB).

When the developer deploys the stack, the deployment fails because the ALB fails health checks. The developer needs to resolve the failed health checks.

Which solutions will meet this requirement? (Select TWO.)

Options:

A.

Confirm that the capacity providers for the container have been provisioned and are properly sized.


B.

Confirm that the target group port matches the port mappings in the ECS task definition.


C.

Confirm that a hosted zone associated with the ALB matches a hosted zone that is referenced in the ECS task definition.


D.

Confirm that the ALB listener on the mapped port has a default action that redirects to the application's health check path endpoint.


E.

Confirm that the ALB listener on the mapped port has a default action that forwards to the correct target group.


Expert Solution
Questions # 85:

A developer is working on an ecommerce application that stores data in an Amazon RDS for MySQL cluster The developer needs to implement a caching layer for the application to retrieve information about the most viewed products.

Which solution will meet these requirements?

Options:

A.

Edit the RDS for MySQL cluster by adding a cache node. Configure the cache endpoint instead of the duster endpoint in the application.


B.

Create an Amazon ElastiCache (Redis OSS) cluster. Update the application code to use the ElastiCache (Redis OSS) cluster endpoint.


C.

Create an Amazon DynamoDB Accelerator (DAX) cluster in front of the RDS for MySQL cluster. Configure the application to connect to the DAX endpoint instead of the RDS endpoint.


D.

Configure the RDS for MySQL cluster to add a standby instance in a different Availability Zone. Configure the application to read the data from the standby instance.


Expert Solution
Questions # 86:

A developer uses AWS IAM Identity Center to interact with the AWS CLI and AWS SDKs on a local workstation. API calls to AWS services were working when the SSO access was first configured. However, the developer is now receiving Access Denied errors. The developer has not changed any configuration files or scripts that were previously working on the workstation.

What is the MOST likely cause of the developer's access issue?

Options:

A.

The access permissions to the developer's AWS CLI binary file have changed.


B.

The permission set that is assumed by IAM Identity Center does not have the necessary permissions to complete the API call.


C.

The credentials from the IAM Identity Center federated role have expired.


D.

The developer is attempting to make API calls to the incorrect AWS account.


Expert Solution
Questions # 87:

A company has an online web application that includes a product catalog. The catalog is stored in an Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET. The application must be able to list the objects in the S3 bucket and must be able to download objects through an 1AM policy.

Which policy allows MINIMUM access to meet these requirements?

Question # 87

Question # 87

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 88:

An application that runs on AWS receives messages from an Amazon Simple Queue Service (Amazon SQS) queue and processes the messages in batches. The

application sends the data to another SQS queue to be consumed by another legacy application. The legacy system can take up to 5 minutes to process some transaction data.

A developer wants to ensure that there are no out-of-order updates in the legacy system. The developer cannot alter the behavior of the legacy system.

Which solution will meet these requirements?

Options:

A.

Use an SQS FIFO queue. Configure the visibility timeout value.


B.

Use an SQS standard queue with a SendMessageBatchRequestEntry data type. Configure the DelaySeconds values.


C.

Use an SQS standard queue with a SendMessageBatchRequestEntry data type. Configure the visibility timeout value.


D.

Use an SQS FIFO queue. Configure the DelaySeconds value.


Expert Solution
Questions # 89:

A company is preparing to migrate an application to the company's first AWS environment Before this migration, a developer is creating a proof-of-concept application to validate a model for building and deploying container-based applications on AWS.

Which combination of steps should the developer take to deploy the containerized proof-of-concept application with the LEAST operational effort? (Select TWO.)

Options:

A.

Package the application into a zip file by using a command line tool Upload the package to Amazon S3


B.

Package the application into a container image by using the Docker CLI. Upload the image to Amazon Elastic Container Registry (Amazon ECR)


C.

Deploy the application to an Amazon EC2 instance by using AWS CodeDeploy.


D.

Deploy the application to Amazon Elastic Kubernetes Service (Amazon EKS) on AWS Fargate


E.

Deploy the application to Amazon Elastic Container Service (Amazon ECS) on AWS Fargate


Expert Solution
Questions # 90:

A developer at a company needs to create a small application that makes the same API call once each day at a designated time. The company does not have infrastructure in the AWS Cloud yet, but the company wants to implement this functionality on AWS.

Which solution meets these requirements in the MOST operationally efficient manner?

Options:

A.

Use a Kubernetes cron job that runs on Amazon Elastic Kubernetes Service (Amazon EKS).


B.

Use an Amazon Linux crontab scheduled job that runs on Amazon EC2.


C.

Use an AWS Lambda function that is invoked by an Amazon EventBridge scheduled event.


D.

Use an AWS Batch job that is submitted to an AWS Batch job queue.


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions