Exams > Amazon > AWS Certified Developer Associate
AWS Certified Developer Associate
Page 6 out of 39 pages Questions 51-60 out of 390 questions
Question#51

A company stores documents in Amazon S3 with default settings. A new regulation requires the company to encrypt the documents at rest, rotate the encryption keys annually, and keep a record of when the encryption keys were rotated. The company does not want to manage the encryption keys outside of AWS.
Which solution will meet these requirements?

  • A. Use server-side encryption with Amazon S3 managed encryption keys (SSE-S3).
  • B. Use server-side encryption with AWS KMS managed encryption keys (SSE-KMS).
  • C. Use server-side encryption with customer-provided encryption keys (SSE-C).
  • D. Use client-side encryption before sending the data to Amazon S3.
Discover Answer Hide Answer

C

Question#52

A developer has discovered that an application responsible for processing messages in an Amazon SQS queue is routinely falling behind. The application is capable of processing multiple messages in one invocation, but is only receiving one message at a time.
What should the developer do to increase the number of messages the application receives?

  • A. Call the ChangeMessageVisibility API for the queue and set MaxNumberOfMessages to a value greater than the default of 1.
  • B. Call the AddPermission API to set MaxNumberOfMessages for the ReceiveMessage action to a value greater than the default of 1.
  • C. Call the ReceiveMessage API to set MaxNumberOfMessages to a value greater than the default of 1.
  • D. Call the SetQueueAttributes API for the queue and set MaxNumberOfMessages to a value greater than the default of 1.
Discover Answer Hide Answer

C

Question#53

A developer is using an Amazon Kinesis Data Firehose delivery stream to store data in Amazon S3. Before storing the data in Amazon S3, the developer wants to enrich the data by combining the data with data from an Amazon DynamoDB table.
How can the developer implement the data enrichment?

  • A. Create a Kinesis Data Firehose data transformation by using an Amazon EC2 instance.
  • B. Configure the Kinesis Data Firehose delivery stream to send data to a Kinesis data stream. Enrich the data by using an AWS Lambda function.
  • C. Configure the Kinesis Data Firehose delivery stream to store data in the DynamoDB table. Export the table to Amazon S3.
  • D. Create a Kinesis Data Firehose data transformation by using an AWS Lambda function.
Discover Answer Hide Answer

B

Question#54

A company created an application to consume and process data. The application uses Amazon Simple Queue Service (Amazon SQS) and AWS Lambda functions. The application is currently working as expected, but it occasionally receives several messages that it cannot process properly. The company needs to clear these messages to prevent the queue from becoming blocked.
A developer must implement a solution that makes queue processing always operational. The solution must give the company the ability to defer the messages with errors and save these messages for further analysis.
What is the MOST operationally efficient solution that meets these requirements?

  • A. Configure Amazon CloudWatch Logs to save the error messages to a separate log stream.
  • B. Create a new SQS queue. Set the new queue as a dead-letter queue for the application queue. Configure the Maximum Receives setting.
  • C. Change the SQS queue to a FIFO queue. Configure the message retention period to 0 seconds.
  • D. Configure an Amazon CloudWatch alarm for Lambda function errors. Publish messages to an Amazon Simple Notification Service (Amazon SNS) topic to notify administrator users.
Discover Answer Hide Answer

C

Question#55

A company has a website that is developed in PHP and is launched using AWS Elastic Beanstalk. There is a new version of the website that needs to be deployed in the Elastic Beanstalk environment. The company cannot tolerate having the website offline if an update fails. Deployments must have minimal impact and rollback as soon as possible.
What deployment method should be used?

  • A. All at once
  • B. Rolling
  • C. Snapshots
  • D. Immutable
Discover Answer Hide Answer

D

Question#56

An application running on multiple Amazon EC2 instances pulls messages from a standard Amazon SQS queue. A requirement for the application is that all messages must be encrypted at rest.
Developers are instructed to use methods that allow for centralized key management and minimize possible support requirements whenever possible.
Which of the following solutions supports these requirements?

  • A. Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue.
  • B. Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client.
  • C. Create an SQS queue, and encrypt the queue by using server-side encryption with AWS KMS.
  • D. Create an SQS queue, and encrypt the queue by using client-side encryption.
Discover Answer Hide Answer

B

Question#57

A company is running a web application that is using Amazon Cognito for authentication. The company does not want to use multi-factor authentication (MFA) for all the visitors every time, but the company's security team has concerns about compromised credentials. The development team needs to configure mandatory
MFA only when suspicious sign-in attempts are detected.
Which Amazon Cognito feature will meet these requirements?

  • A. Short message service (SMS) text message MFA
  • B. Advanced security metrics
  • C. Time-based one-time password (TOTP) software token MFA
  • D. Adaptive authentication
Discover Answer Hide Answer

D

Question#58

A company has a two-tier application running on an Amazon EC2 server that handles all of its AWS based e-commerce activity. During peak times, the backend servers that process orders are overloaded with requests. This results in some orders failing to process. A developer needs to create a solution that will re-factor the application.
Which steps will allow for more flexibility during peak times, while still remaining cost-effective? (Choose two.)

  • A. Increase the backend T2 EC2 instance sizes to x1 to handle the largest possible load throughout the year.
  • B. Implement an Amazon SQS queue to decouple the front-end and backend servers.
  • C. Use an Amazon SNS queue to decouple the front-end and backend servers.
  • D. Migrate the backend servers to on-premises and pull from an Amazon SNS queue.
  • E. Modify the backend servers to pull from an Amazon SQS queue.
Discover Answer Hide Answer

AD

Question#59

A developer is creating an AWS Lambda function that generates a new file each time it runs. Each new file must be checked into an AWS CodeCommit repository hosted in the same AWS account.
How should the developer accomplish this?

  • A. When the Lambda function starts, use the Git CLI to clone the repository. Check the new file into the cloned repository and push the change.
  • B. After the new file is created in Lambda, use cURL to invoke the CodeCommit API. Send the file to the repository.
  • C. Use an AWS SDK to instantiate a CodeCommit client. Invoke the putjile method to add the file to the repository.
  • D. Upload the new file to an Amazon S3 bucket. Create an AWS Step Function to accept S3 events. In the Step Function, add the new file to the repository.
Discover Answer Hide Answer

B

Question#60

A developer is designing an Amazon DynamoDB table for an application. The application will store user information that includes a unique identifier and an email address for each user. The application must be able to query the table by using either the unique identifier or the email address.
How should the developer design the DynamoDB table to meet these requirements?

  • A. For the primary key of the table, specify the unique identifier as the partition key and specify the email address as the sort key.
  • B. For the primary key of the table, specify the unique identifier as the partition key. Create a local secondary index (LSI) based on the email address.
  • C. For the primary key of the table, specify the email address as the partition key and specify the unique identifier as the sort key.
  • D. For the primary key of the table, specify the unique identifier as the partition key. Create a global secondary index (GSI) based on the email address.
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right