0% found this document useful (0 votes)
108 views

AWS Certified Developer - Associate Demo

Uploaded by

Wahid Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views

AWS Certified Developer - Associate Demo

Uploaded by

Wahid Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

AWS Certified Developer - Associate [ DVA-C02]

AWS Certified Developer – Associate


(DVA-C02) Exam Demo

1. Introduction….

2. A developer received the following error message during an AWS


CloudFormation deployment: DELETE_FAILED (The following resource(s)
failed to delete: [ASGInstanceRolel2345678].)
Which action should the developer take to resolve this error?

a. Contact AWS Support to report an issue with the Auto Scaling Groups
(ASG) service.
b. Add a force parameter when calling CloudFormation with the role-arn of
ASGInstanceRolel2345678.
c. Add a DependsOn attribute to the ASGInstanceRole12345678 resource in
the CloudFormation template. Then delete the stack.
d. Modify the CloudFormation template to retain the
ASGInstanceRolel2345678 resource. Then manually delete the
resource after deployment.

https://thinkmo.uno/ | [email protected] | Page No: 1


AWS Certified Developer - Associate [ DVA-C02]

3. A company is using Amazon RDS as the backend database for its application.
After a recent marketing campaign, a surge of read requests to the database
increased the latency of data retrieval from the database. The company has
decided to implement a caching layer in front of the database. The cached
content must be encrypted and must be highly available.
Which solution will meet these requirements?
a. Amazon CloudFront
b. Amazon DynamoDB Accelerator (DAX)
c. Amazon ElastiCache for Redis in cluster mode
d. Amazon ElastiCache for Memcached

4. A company has an online order website that uses Amazon DynamoDB to store
item inventory. A sample of the inventory object is as follows:

A developer needs to reduce all inventory prices by 100 as long as the resulting
price would not be less than 500.
What should the developer do to make this change with the LEAST number of
calls to DynamoDB?

a. Perform a DynamoDB Query operation with the Id. If the price is >= 600,
perform an UpdateItem operation to update the price.
b. Perform a DynamoDB UpdateItem operation with a condition
expression of "Price >= 600".
c. Perform a DynamoDB UpdateItem operation with a condition expression
of "ProductCategory IN ({"S": "Sporting Goods"}) and Price 600".
d. Perform a DynamoDB UpdateItem operation with a condition expression
of "MIN Price = 500".

https://thinkmo.uno/ | [email protected] | Page No: 2


AWS Certified Developer - Associate [ DVA-C02]

5. While performing a cost analysis of the SD-WAN solution, which statement is


accurate?
a. SD-WAN will lower overall circuit costs because there is no redundancy
requirement for remote sites due to higher reliability of an SD-WAN
solution and the self-healing nature.
b. SD-WAN will lower Ojin’s capital expenditure over the next five years as
fewer routers will be required in the next lifecycle refresh.
c. SD-WAN will lower initial labor costs by reducing the time-to-deploy of
Tyr’s new WAN environment.
d. SD-WAN will lower operating costs over the next five years through the
standardization and automation capabilities of the SD-WAN platform.

6. A company has an application where reading objects from Amazon S3 is


based on the type of user. The user types are registered user and guest user.
The company has 25,000 users and is growing. Information is pulled from an
S3 bucket depending on the user type.
Which approaches are recommended to provide access to both user types?
(Choose two.)

a. Provide a different access key and secret access key in the application
code for registered users and guest users to provide read access to the
objects.
b. Use the AWS IAM service and let the application assume the different
roles using the AWS Security Token Service (AWS STS) AssumeRole
action depending on the type of user and provide read access to
Amazon S3 using the assumed role.
c. Use S3 bucket policies to restrict read access to specific IAM users.
d. Use Amazon Cognito to provide access using authenticated and
unauthenticated roles.
e. Create a new IAM user for each user and grant read access.

https://thinkmo.uno/ | [email protected] | Page No: 3


AWS Certified Developer - Associate [ DVA-C02]

7. Which project management methodology is the best fit for Ojin use to
complete the hierarchical DMVPN and EVPN circuit implementation?
a. Agile
b. Scrum
c. Lean
d. Waterfall

8. A developer must extend an existing application that is based on the AWS


Serverless Application Model (AWS SAM). The developer has used the AWS SAM
CLI to create the project. The project contains different AWS Lambda functions.
Which combination of commands must the developer use to redeploy the
AWS SAM application? (Choose two.)
a. sam build
b. sam deploy
c. sam publish
d. sam init
e. sam validate

9. A developer is storing JSON files in an Amazon S3 bucket. The developer wants


to securely share an object with a specific group of people.
How can the developer securely provide temporary access to the objects
that are stored in the S3 bucket?
a. Set object retention on the files. Use the AWS software development kit
(SDK) to restore the object before subsequent requests. Provide the
bucket's S3 URL.
b. Set a bucket policy that restricts access after a period of time. Provide
the bucket's S3 URL.
c. Configure static web hosting on the S3 bucket. Provide the bucket's web
URL.
d. Use the AWS software development kit (SDK) to generate a presigned
URL. Provide the presigned URL.

https://thinkmo.uno/ | [email protected] | Page No: 4


AWS Certified Developer - Associate [ DVA-C02]

10. A developer is using Amazon S3 as the event source that invokes a Lambda
function when new objects are created in the bucket. The event source
mapping information is stored in the bucket notification configuration. The
developer is working with different versions of the Lambda function, and has a
constant need to update notification configuration so that Amazon S3 invokes
the correct version.
What is the MOST efficient and effective way to achieve mapping between
the S3 event and Lambda?
a. Use a different Lambda trigger.
b. Use a Lambda alias.
c. Use Lambda environment variables.
d. Use Lambda tags.

11. Which routing protocol change sufficiently limits the resource requirements
on…

THANK YOU FOR TRYING OUR PRODUCT

https://thinkmo.uno/ | [email protected] | Page No: 5

You might also like