AWS Certified Developer - Associate Demo
AWS Certified Developer - Associate Demo
1. Introduction….
a. Contact AWS Support to report an issue with the Auto Scaling Groups
(ASG) service.
b. Add a force parameter when calling CloudFormation with the role-arn of
ASGInstanceRolel2345678.
c. Add a DependsOn attribute to the ASGInstanceRole12345678 resource in
the CloudFormation template. Then delete the stack.
d. Modify the CloudFormation template to retain the
ASGInstanceRolel2345678 resource. Then manually delete the
resource after deployment.
3. A company is using Amazon RDS as the backend database for its application.
After a recent marketing campaign, a surge of read requests to the database
increased the latency of data retrieval from the database. The company has
decided to implement a caching layer in front of the database. The cached
content must be encrypted and must be highly available.
Which solution will meet these requirements?
a. Amazon CloudFront
b. Amazon DynamoDB Accelerator (DAX)
c. Amazon ElastiCache for Redis in cluster mode
d. Amazon ElastiCache for Memcached
4. A company has an online order website that uses Amazon DynamoDB to store
item inventory. A sample of the inventory object is as follows:
A developer needs to reduce all inventory prices by 100 as long as the resulting
price would not be less than 500.
What should the developer do to make this change with the LEAST number of
calls to DynamoDB?
a. Perform a DynamoDB Query operation with the Id. If the price is >= 600,
perform an UpdateItem operation to update the price.
b. Perform a DynamoDB UpdateItem operation with a condition
expression of "Price >= 600".
c. Perform a DynamoDB UpdateItem operation with a condition expression
of "ProductCategory IN ({"S": "Sporting Goods"}) and Price 600".
d. Perform a DynamoDB UpdateItem operation with a condition expression
of "MIN Price = 500".
a. Provide a different access key and secret access key in the application
code for registered users and guest users to provide read access to the
objects.
b. Use the AWS IAM service and let the application assume the different
roles using the AWS Security Token Service (AWS STS) AssumeRole
action depending on the type of user and provide read access to
Amazon S3 using the assumed role.
c. Use S3 bucket policies to restrict read access to specific IAM users.
d. Use Amazon Cognito to provide access using authenticated and
unauthenticated roles.
e. Create a new IAM user for each user and grant read access.
7. Which project management methodology is the best fit for Ojin use to
complete the hierarchical DMVPN and EVPN circuit implementation?
a. Agile
b. Scrum
c. Lean
d. Waterfall
10. A developer is using Amazon S3 as the event source that invokes a Lambda
function when new objects are created in the bucket. The event source
mapping information is stored in the bucket notification configuration. The
developer is working with different versions of the Lambda function, and has a
constant need to update notification configuration so that Amazon S3 invokes
the correct version.
What is the MOST efficient and effective way to achieve mapping between
the S3 event and Lambda?
a. Use a different Lambda trigger.
b. Use a Lambda alias.
c. Use Lambda environment variables.
d. Use Lambda tags.
11. Which routing protocol change sufficiently limits the resource requirements
on…