Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEAWS DVA-C01 :: Practice Exam19

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
AWS DVA-C01 :: Practice Exam19

Descripción:
aws certifications

Autor:
AVATAR

Fecha de Creación:
18/10/2022

Categoría:
Informática

Número preguntas: 15
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
The development team at a company wants to encrypt a 111 GB object using AWS KMS. Which of the following represents the best solution? Make a GenerateDataKey API call that returns a plaintext key and an encrypted copy of a data key. Use a plaintext key to encrypt the data Make a GenerateDataKeyWithPlaintext API call that returns an encrypted copy of a data key. Use a plaintext key to encrypt the data Make an Encrypt API call to encrypt the plaintext data as ciphertext using a customer master key (CMK) with imported key material Make a GenerateDataKeyWithoutPlaintext API call that returns an encrypted copy of a data key. Use an encrypted key to encrypt the data.
The development team at a social media company is considering using Amazon ElastiCache to boost the performance of their existing databases. As a Developer Associate, which of the following use-cases would you recommend as the BEST fit for ElastiCache? (Select two) Use ElastiCache to improve latency and throughput for read-heavy application workloads Use ElastiCache to improve performance of compute-intensive workloads Use ElastiCache to improve latency and throughput for write-heavy application workloads Use ElastiCache to improve performance of Extract-Transform-Load (ETL) workloads Use ElastiCache to run highly complex JOIN queries.
You have deployed a traditional 3-tier web application architecture with a Classic Load Balancer, an Auto Scaling group, and an Amazon Relational Database Service (RDS) database. Users are reporting that they have to re-authenticate into the website often. Which of the following represents a scalable solution to make the application tier stateless and outsource the session information? Add an ElastiCache Cluster Use Elastic IP Enable RDS read replicas Enable Load Balancer stickiness.
An intern at an IT company is getting started with AWS Cloud and wants to understand the following Amazon S3 bucket access policy: { "Version": "2012-10-17", "Statement": [ { "Sid": "ListAllS3Buckets", "Effect": "Allow", "Action": ["s3:ListAllMyBuckets"], "Resource": "arn:aws:s3:::*" }, { "Sid": "AllowBucketLevelActions", "Effect": "Allow", "Action": [ "s3:ListBucket", "s3:GetBucketLocation" ], "Resource": "arn:aws:s3:::*" }, { "Sid": "AllowBucketObjectActions", "Effect": "Allow", "Action": [ "s3:PutObject", "s3:PutObjectAcl", "s3:GetObject", "s3:GetObjectAcl", "s3:DeleteObject" ], "Resource": "arn:aws:s3:::*/*" }, { "Sid": "RequireMFAForProductionBucket", "Effect": "Deny", "Action": "s3:*", "Resource": [ "arn:aws:s3:::Production/*", "arn:aws:s3:::Production" ], "Condition": { "NumericGreaterThanIfExists": {"aws:MultiFactorAuthAge": "1800"} } } ] } As a Developer Associate, can you help him identify what the policy is for? Allows full S3 access, but explicitly denies access to the Production bucket if the user has not signed in using MFA within the last thirty minutes Allows a user to manage a single Amazon S3 bucket and denies every other AWS action and resource if the user is not signed in using MFA within last thirty minutes.
A company has a workload that requires 14,000 consistent IOPS for data that must be durable and secure. The compliance standards of the company state that the data should be secure at every stage of its lifecycle on all of the EBS volumes they use. Which of the following statements are true regarding data security on EBS? EBS volumes support both in-flight encryption and encryption at rest using KMS EBS volumes support in-flight encryption but do not support encryption at rest EBS volumes do not support in-flight encryption but do support encryption at rest using KMS EBS volumes don't support any encryption.
An IT company has migrated to a serverless application stack on the AWS Cloud with the compute layer being implemented via Lambda functions. The engineering managers would like to actively troubleshoot any failures in the Lambda functions. As a Developer Associate, which of the following solutions would you suggest for this use-case? The developers should insert logging statements in the Lambda function code which are then available via CloudWatch logs Use CloudWatch Events to identify and notify any failures in the Lambda code Use CodeCommit to identify and notify any failures in the Lambda code Use CodeDeploy to identify and notify any failures in the Lambda code.
Your team lead has requested code review of your code for Lambda functions. Your code is written in Python and makes use of the Amazon Simple Storage Service (S3) to upload logs to an S3 bucket. After the review, your team lead has recommended reuse of execution context to improve the Lambda performance. Which of the following actions will help you implement the recommendation? Move the Amazon S3 client initialization, out of your function handler Use environment variables to pass operational parameters Assign more RAM to the function Enable X-Ray integration.
You have been asked by your Team Lead to enable detailed monitoring of the Amazon EC2 instances your team uses. As a Developer working on AWS CLI, which of the below command will you run? aws ec2 monitor-instances --instance-ids i-1234567890abcdef0 aws ec2 run-instances --image-id ami-09092360 --monitoring Enabled=true aws ec2 run-instances --image-id ami-09092360 --monitoring State=enabled aws ec2 monitor-instances --instance-id i-1234567890abcdef0.
Your company is planning to move away from reserving EC2 instances and would like to adopt a more agile form of serverless architecture. Which of the folloiwng is the simplest and the least effort way of deploying the Docker containers on this serverless architecture? Amazon Elastic Container Service (Amazon ECS) on Fargate Amazon Elastic Container Service (Amazon ECS) on EC2 Amazon Elastic Kubernetes Service (Amazon EKS) on Fargate AWS Elastic Beanstalk.
You are a developer working with the AWS CLI to create Lambda functions that contain environment variables. Your functions will require over 50 environment variables consisting of sensitive information of database table names. What is the total set size/number of environment variables you can create for AWS Lambda? The total size of all environment variables shouldn't exceed 4 KB. There is no limit on the number of variables The total size of all environment variables shouldn't exceed 8 KB. The maximum number of variables that can be created is 50 The total size of all environment variables shouldn't exceed 8 KB. There is no limit on the number of variables The total size of all environment variables shouldn't exceed 4 KB. The maximum number of variables that can be created is 35.
A digital marketing company has its website hosted on an Amazon S3 bucket A. The development team notices that the web fonts that are hosted on another S3 bucket B are not loading on the website. Which of the following solutions can be used to address this issue? Configure CORS on the bucket B that is hosting the web fonts to allow Bucket A origin to make the requests Enable versioning on both the buckets to facilitate the correct functioning of the website Update bucket policies on both bucket A and bucket B to allow successful loading of the web fonts on the website Configure CORS on the bucket A that is hosting the website to allow any origin to respond to requests.
A high-frequency stock trading firm is migrating their messaging queues from self-managed message-oriented middleware systems to Amazon SQS. The development team at the company wants to minimize the costs of using SQS. As a Developer Associate, which of the following options would you recommend to address the given use-case? Use SQS long polling to retrieve messages from your Amazon SQS queues Use SQS short polling to retrieve messages from your Amazon SQS queues Use SQS visibility timeout to retrieve messages from your Amazon SQS queues Use SQS message timer to retrieve messages from your Amazon SQS queues.
A development team uses shared Amazon S3 buckets to upload files. Due to this shared access, objects in S3 buckets have different owners making it difficult to manage the objects. As a developer associate, which of the following would you suggest to automatically make the S3 bucket owner, also the owner of all objects in the bucket, irrespective of the AWS account used for uploading the objects? Use S3 Object Ownership to default bucket owner to be the owner of all objects in the bucket Use S3 CORS to make the S3 bucket owner, the owner of all objects in the bucket Use S3 Access Analyzer to identify the owners of all objects and change the ownership to the bucket owner Use Bucket Access Control Lists (ACLs) to control access on S3 bucket and then define its owner.
Recently, you started an online learning platform using AWS Lambda and AWS Gateway API. Your first version was successful, and you began developing new features for the second version. You would like to gradually introduce the second version by routing only 10% of the incoming traffic to the new Lambda version. Which solution should you opt for? Use AWS Lambda aliases Use Tags to distinguish the different versions Use environment variables Deploy your Lambda in a VPC.
As part of their on-boarding, the employees at an IT company need to upload their profile photos in a private S3 bucket. The company wants to build an in-house web application hosted on an EC2 instance that should display the profile photos in a secure way when the employees mark their attendance. As a Developer Associate, which of the following solutions would you suggest to address this use-case? Save the S3 key for each user's profile photo in a DynamoDB table and use a lambda function to dynamically generate a pre-signed URL. Reference this URL for display via the web application Make the S3 bucket public so that the application can reference the image URL for display Keep each user's profile image encoded in base64 format in a DynamoDB table and reference it from the application for display Keep each user's profile image encoded in base64 format in an RDS table and reference it from the application for display.
Denunciar test Consentimiento Condiciones de uso