Module 11 - Examen Test C
Module 11 - Examen Test C
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2
Question C.1
In AWS, which security aspects are the customer's responsibility? (Choose FOUR.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 3
Question C.2
When using a large Scan operation in DynamoDB, what technique can be used to minimize the impact of
a scan on a table's provisioned throughput?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 4
Question C.2
When using a large Scan operation in DynamoDB, what technique can be used to minimize the impact of
a scan on a table's provisioned throughput?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 5
Question C.3
Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com.
Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint
https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized
the web fonts are being blocked by the browser.
What should Company D do to prevent the web fonts from being blocked by the browser?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 6
Question C.3
Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com.
Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint
https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized
the web fonts are being blocked by the browser.
What should Company D do to prevent the web fonts from being blocked by the browser?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 7
Question C.4
Which of the following platforms are supported by Elastic Beanstalk? (Choose TWO.)
A. Apache Tomcat
B. .NET
C. IBM WebSphere
D. Oracle JBoss
E. Jetty
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 8
Question C.4
Which of the following platforms are supported by Elastic Beanstalk? (Choose TWO.)
A. Apache Tomcat
B. .NET
C. IBM WebSphere
D. Oracle JBoss
E. Jetty
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 9
Question C.5
Which code snippet below returns the URL of a load balanced web site created in CloudFormation with
an AWS::ElasticLoadBalancing::LoadBalancer resource name "ElasticLoad Balancer"?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 10
Question C.5
Which code snippet below returns the URL of a load balanced web site created in CloudFormation with
an AWS::ElasticLoadBalancing::LoadBalancer resource name "ElasticLoad Balancer"?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 11
Question C.6
Which features can be used to restrict access to data in S3? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 12
Question C.6
Which features can be used to restrict access to data in S3? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 13
Question C.7
What happens, by default, when one of the resources in a CloudFormation stack cannot be created?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 14
Question C.7
What happens, by default, when one of the resources in a CloudFormation stack cannot be created?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 15
Question C.8
Which of the following are correct statements with policy evaluation logic in AWS Identity and Access
Management? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 16
Question C.8
Which of the following are correct statements with policy evaluation logic in AWS Identity and Access
Management? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 17
Question C.9
You have an environment that consists of a public subnet using Amazon VPC and 3 instances that are
running in this subnet. These three instances can successfully communicate with other hosts on the
Internet. You launch a fourth instance in the same subnet, using the same AMI and security group
configuration you used for the others, but find that this instance cannot be accessed from the Internet.
What should you do to enable internet access?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 18
Question C.9
You have an environment that consists of a public subnet using Amazon VPC and 3 instances that are
running in this subnet. These three instances can successfully communicate with other hosts on the
Internet. You launch a fourth instance in the same subnet, using the same AMI and security group
configuration you used for the others, but find that this instance cannot be accessed from the Internet.
What should you do to enable internet access?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 19
Question C.10
If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other
users by default?
A. 0 seconds
B. 1 hour
C. 1 day
D. forever
E. 30 seconds
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 20
Question C.10
If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other
users by default?
A. 0 seconds
B. 1 hour
C. 1 day
D. forever
E. 30 seconds
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 21
Question C.11
What is the format of structured notification messages sent by Amazon SNS?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 22
Question C.11
What is the format of structured notification messages sent by Amazon SNS?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 23
Question C.12
Which of the following services are key/value stores? (Choose THREE.)
A. Amazon ElastiCache
B. Simple Notification Service
C. DynamoDB
D. Simple Workflow Service
E. Simple Storage Service
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 24
Question C.12
Which of the following services are key/value stores? (Choose THREE.)
A. Amazon ElastiCache
B. Simple Notification Service
C. DynamoDB
D. Simple Workflow Service
E. Simple Storage Service
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 25
Question C.13
When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to
encrypt object data when saved on the server side?
A. x-amz-storage-class
B. Content-MD5
C. x-amz-security-token
D. x-amz-server-side-encryption
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 26
Question C.13
When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to
encrypt object data when saved on the server side?
A. x-amz-storage-class
B. Content-MD5
C. x-amz-security-token
D. x-amz-server-side-encryption
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 27
Question C.14
What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?
A. GetItem
B. BatchGetItem
C. GetMultipleItems
D. GetItemRange
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 28
Question C.14
What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?
A. GetItem
B. BatchGetItem
C. GetMultipleItems
D. GetItemRange
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 29
Question C.15
After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a
public subnet you modify your route tables to have the
NAT device be the target of internet bound traffic of your private subnet. When you try and make an
outbound connection to the Internet from an instance in the private subnet, you are not successful.
Which of the following steps could resolve the issue?
A. Attaching a second Elastic Network interface (ENI) to the NAT instance, and
placing it in the private subnet
B. Attaching a second Elastic Network Interface (ENI) to the instance in the private
subnet, and placing it in the public subnet
C. Disabling the Source/Destination Check attribute on the NAT instance
D. Attaching an Elastic IP address to the instance in the private subnet
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 30
Question C.15
After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a
public subnet you modify your route tables to have the
NAT device be the target of internet bound traffic of your private subnet. When you try and make an
outbound connection to the Internet from an instance in the private subnet, you are not successful.
Which of the following steps could resolve the issue?
A. Attaching a second Elastic Network interface (ENI) to the NAT instance, and
placing it in the private subnet
B. Attaching a second Elastic Network Interface (ENI) to the instance in the private
subnet, and placing it in the public subnet
C. Disabling the Source/Destination Check attribute on the NAT instance
D. Attaching an Elastic IP address to the instance in the private subnet
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 31
Question C.16
You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation
that it has been successfully stored. You then immediately make another API call and attempt to read this
object. S3 tells you that the object does not exist.
What could explain this behavior?
A. US-STANDARD uses eventual consistency and it can take time for an object to be
readable in a bucket
B. Objects in Amazon S3 do not become visible until they are replicated to a second
region.
C. US-STANDARD imposes a 1 second delay before new objects are readable.
D. You exceeded the bucket object limit, and once this limit is raised the object will
be visible.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 32
Question C.16
You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation
that it has been successfully stored. You then immediately make another API call and attempt to read this
object. S3 tells you that the object does not exist.
What could explain this behavior?
A. US-STANDARD uses eventual consistency and it can take time for an object to be
readable in a bucket
B. Objects in Amazon S3 do not become visible until they are replicated to a second
region.
C. US-STANDARD imposes a 1 second delay before new objects are readable.
D. You exceeded the bucket object limit, and once this limit is raised the object will
be visible.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 33
Question C.17
What is the maximum number of S3 Buckets available per AWS account?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 34
Question C.17
What is the maximum number of S3 Buckets available per AWS account?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 35
Question C.18
Which of the following items are required to allow an application deployed on an EC2 instance to write
data to a DynamoDB table?
Assume that no security Keys are allowed to be stored on the EC2 instance. (Choose TWO.)
A. Create an IAM User that allows write access to the DynamoDB table.
B. Add an IAM Role to a running EC2 instance.
C. Add an IAM User to a running EC2 Instance.
D. Launch an EC2 Instance with the IAM Role included in the launch configuration.
E. Create an IAM Role that allows write access to the DynamoDB table.
F. Launch an EC2 Instance with the IAM User included in the launch configuration.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 36
Question C.18
Which of the following items are required to allow an application deployed on an EC2 instance to write
data to a DynamoDB table?
Assume that no security Keys are allowed to be stored on the EC2 instance. (Choose TWO.)
A. Create an IAM User that allows write access to the DynamoDB table.
B. Add an IAM Role to a running EC2 instance.
C. Add an IAM User to a running EC2 Instance.
D. Launch an EC2 Instance with the IAM Role included in the launch configuration.
E. Create an IAM Role that allows write access to the DynamoDB table.
F. Launch an EC2 Instance with the IAM User included in the launch configuration.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 37
Question C.19
A Developer is trying to make API calls using SDK. The IAM user credentials used by the application
require multi-factor authentication for all API calls.
Which method the Developer use to access the multi-factor authentication protected API?
A. GetFederationToken
B. GetCallerIdentity
C. GetSessionToken
D. DecodeAuthorizationMessage
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 38
Question C.19
A Developer is trying to make API calls using SDK. The IAM user credentials used by the application
require multi-factor authentication for all API calls.
Which method the Developer use to access the multi-factor authentication protected API?
A. GetFederationToken
B. GetCallerIdentity
C. GetSessionToken
D. DecodeAuthorizationMessage
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 39
Question C.20
A Developer has an e-commerce API hosted on Amazon ECS. Variable and spiking demand on the
application is causing order processing to take too long. The application processes Amazon SQS queues.
The ApproximateNumberOfMessagesVisible metric spikes at very high values throughout the day, which
cause Amazon CloudWatch alarm breaches. Other ECS metrics for the API containers are well within
limits.
What can the Developer implement to improve performance while keeping costs low?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 40
Question C.20
A Developer has an e-commerce API hosted on Amazon ECS. Variable and spiking demand on the
application is causing order processing to take too long. The application processes Amazon SQS queues.
The ApproximateNumberOfMessagesVisible metric spikes at very high values throughout the day, which
cause Amazon CloudWatch alarm breaches. Other ECS metrics for the API containers are well within
limits.
What can the Developer implement to improve performance while keeping costs low?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 41
Question C.21
A Developer wants to build an application that will allow new users to register and create new user
accounts. The application must also allow users with social media accounts to log in using their social
media credentials.
Which AWS service or feature can be used to meet these requirements?
A. AWS IAM
B. Amazon Cognito identity pools
C. Amazon Cognito user pools
D. AWS Directory Service
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 42
Question C.21
A Developer wants to build an application that will allow new users to register and create new user
accounts. The application must also allow users with social media accounts to log in using their social
media credentials.
Which AWS service or feature can be used to meet these requirements?
A. AWS IAM
B. Amazon Cognito identity pools
C. Amazon Cognito user pools
D. AWS Directory Service
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 43
Question C.22
A company is developing a web application that allows its employees to upload a profile picture to a
private Amazon S3 bucket. There is no size limit for the profile pictures, which should be displayed every
time an employee logs in. For security reasons, the pictures cannot be publicly accessible.
What is a viable long-term solution for this scenario?
A Developer is going to deploy an AWS Lambda function that requires significant CPU utilization.
Which approach will MINIMIZE the average runtime of the function?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 46
Question C.23
A Developer is going to deploy an AWS Lambda function that requires significant CPU utilization.
Which approach will MINIMIZE the average runtime of the function?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 47
Question C.24
A company has a legacy application that was migrated to a fleet of Amazon EC2 instances. The
application stores data in a MySQL database that is currently installed on a single EC2 instance. The
company has decided to migrate the database from the EC2 instance to MySQL on Amazon EDS.
What should the Developer do to update the application to support data storage in Amazon RDS?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 50
Question C.25
A Developer is working on an AWS Lambda function that accesses Amazon DynamoDB. The Lambda
function must retrieve an item and update some of its attributes, or create the item if it does not exist. The
Lambda function has access to the primary key.
Which IAM permissions should the Developer request for the Lambda function to achieve this
functionality?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 51
Question C.26
A Developer is storing sensitive data generated by an application in Amazon S3. The Developer wants to
encrypt the data at rest. A company policy requires an audit trail of when the master key was used and by
whom.
Which encryption option will meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 52
Question C.26
A Developer is storing sensitive data generated by an application in Amazon S3. The Developer wants to
encrypt the data at rest. A company policy requires an audit trail of when the master key was used and by
whom.
Which encryption option will meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 53
Question C.27
A company's website runs on an Amazon EC2 instance and uses Auto Scaling to scale the environment
during peak times. Website users across the world are experiencing high latency due to static content on
the EC2 instance, even during non-peak hours.
Which combination of steps will resolve the latency issue? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 54
Question C.27
A company's website runs on an Amazon EC2 instance and uses Auto Scaling to scale the environment
during peak times. Website users across the world are experiencing high latency due to static content on
the EC2 instance, even during non-peak hours.
Which combination of steps will resolve the latency issue? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 55
Question C.28
A Developer is leveraging a Border Gateway Protocol (BGP)-based AWS VPN connection to connect
from on-premises to Amazon EC2 instances in the Developer's account. The Developer is able to access
an EC2 instance in subnet A, but is unable to access an EC2 instance in subnet B in the same VPC.
Which logs can the Developer use to verify whether the traffic is reaching subnet B?
A. VPN logs
B. BGP logs
C. VPC Flow Logs
D. AWS CloudTrail logs
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 56
Question C.28
A Developer is leveraging a Border Gateway Protocol (BGP)-based AWS VPN connection to connect
from on-premises to Amazon EC2 instances in the Developer's account. The Developer is able to access
an EC2 instance in subnet A, but is unable to access an EC2 instance in subnet B in the same VPC.
Which logs can the Developer use to verify whether the traffic is reaching subnet B?
A. VPN logs
B. BGP logs
C. VPC Flow Logs
D. AWS CloudTrail logs
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 57
Question C.29
A Developer has created a new AWS IAM user that has s3 putObject permission to write to a specific
Amazon S3 bucket. This S3 bucket uses server-side encryption with AWS KMS managed (SSE-KMS) as
the default encryption. Using the access key and secret key of the IAM user, the application received an
access denied error when calling the PutObject API.
How can this issue be resolved?
A. Update the policy of the IAM user to allow the s3 Encrypt action.
B. Update the bucket policy of the S3 bucket to allow the IAM user to upload
objects.
C. Update the policy of the IAM user to allow the kms:GenerateDataKey action.
D. Update the ACL of the S3 bucket to allow the IAM user to upload objects.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 58
Question C.29
A Developer has created a new AWS IAM user that has s3 putObject permission to write to a specific
Amazon S3 bucket. This S3 bucket uses server-side encryption with AWS KMS managed (SSE-KMS) as
the default encryption. Using the access key and secret key of the IAM user, the application received an
access denied error when calling the PutObject API.
How can this issue be resolved?
A. Update the policy of the IAM user to allow the s3 Encrypt action.
B. Update the bucket policy of the S3 bucket to allow the IAM user to upload
objects.
C. Update the policy of the IAM user to allow the kms:GenerateDataKey action.
D. Update the ACL of the S3 bucket to allow the IAM user to upload objects.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 59
Question C.30
A company has a web application that uses an Amazon Cognito user pool for authentication. The
company wants to create a login page with the company logo.
What should a Developer do to meet these requirements?
A. Create a hosted user interface in Amazon Cognito and customize it with the
company logo.
B. Create a login page with the company logo and upload it to Amazon Cognito.
C. Create a login page in Amazon API Gateway with the logo and save the link in
Amazon Cognito.
D. Upload the logo to the Amazon Cognito app settings and point to the logo on a
custom login page.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 60
Question C.30
A company has a web application that uses an Amazon Cognito user pool for authentication. The
company wants to create a login page with the company logo.
What should a Developer do to meet these requirements?
A. Create a hosted user interface in Amazon Cognito and customize it with the
company logo.
B. Create a login page with the company logo and upload it to Amazon Cognito.
C. Create a login page in Amazon API Gateway with the logo and save the link in
Amazon Cognito.
D. Upload the logo to the Amazon Cognito app settings and point to the logo on a
custom login page.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 61
Question C.31
A Developer wants the ability to roll back to a previous version of an AWS Lambda function in the event
of errors caused by a new deployment.
How can the Developer achieve this with MINIMAL impact on users?
A. Change the application to use an alias that points to the current version. Deploy the new version
of the code. Update the alias to use the newly deployed version. If too many errors are
encountered, point the alias back to the previous version.
B. Change the application to use an alias that points to the current version. Deploy the new version
of the code. Update the alias to direct 10% of users to the newly deployed version. If too many
errors are encountered, send 100% of traffic to the previous version.
C. Do not make any changes to the application. Deploy the new version of the code. If too many
errors are encountered, point the application back to the previous version using the version
number in the Amazon Resource Name (ARN).
D. Create three aliases: new, existing, and router. Point the existing alias to the current version.
Have the router alias direct 100% of users to the existing alias. Update the application to use
the router alias. Deploy the new version of the code. Point the new alias to this version. Update
the router alias to direct 10% of users to the new alias. If too many errors are encountered, send
100% of traffic to the existing alias.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 62
Question C.31
A Developer wants the ability to roll back to a previous version of an AWS Lambda function in the event
of errors caused by a new deployment.
How can the Developer achieve this with MINIMAL impact on users?
A. Change the application to use an alias that points to the current version. Deploy the new version
of the code. Update the alias to use the newly deployed version. If too many errors are
encountered, point the alias back to the previous version.
B. Change the application to use an alias that points to the current version. Deploy the new
version of the code. Update the alias to direct 10% of users to the newly deployed version. If
too many errors are encountered, send 100% of traffic to the previous version.
C. Do not make any changes to the application. Deploy the new version of the code. If too many
errors are encountered, point the application back to the previous version using the version
number in the Amazon Resource Name (ARN).
D. Create three aliases: new, existing, and router. Point the existing alias to the current version.
Have the router alias direct 100% of users to the existing alias. Update the application to use
the router alias. Deploy the new version of the code. Point the new alias to this version. Update
the router alias to direct 10% of users to the new alias. If too many errors are encountered, send
100% of traffic to the existing alias.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 63
Question C.32
A company is developing an application that will be accessed through the Amazon API Gateway REST
API. Registered users should be the only ones who can access certain resources of this API. The token
being used should expire automatically and needs to be refreshed periodically.
How can a Developer meet these requirements?
A. Create an Amazon Cognito identity pool, configure the Amazon Cognito Authorizer in API
Gateway, and use the temporary credentials generated by the identity pool.
B. Create and maintain a database record for each user with a corresponding token and use
an AWS Lambda authorizer in API Gateway.
C. Create an Amazon Cognito user pool, configure the Cognito Authorizer in API Gateway,
and use the identity or access token.
D. Create an IAM user for each API user, attach an invoke permissions policy to the API, and
use an IAM authorizer in API Gateway.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 64
Question C.32
A company is developing an application that will be accessed through the Amazon API Gateway REST
API. Registered users should be the only ones who can access certain resources of this API. The token
being used should expire automatically and needs to be refreshed periodically.
How can a Developer meet these requirements?
A. Create an Amazon Cognito identity pool, configure the Amazon Cognito Authorizer in API
Gateway, and use the temporary credentials generated by the identity pool.
B. Create and maintain a database record for each user with a corresponding token and use
an AWS Lambda authorizer in API Gateway.
C. Create an Amazon Cognito user pool, configure the Cognito Authorizer in API Gateway,
and use the identity or access token.
D. Create an IAM user for each API user, attach an invoke permissions policy to the API, and
use an IAM authorizer in API Gateway.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 65
Question C.33
A Developer is working on a serverless project based in Java. Initial testing shows a cold start takes about
8 seconds on average for AWS Lambda functions.
What should the Developer do to reduce the cold start time? (Choose TWO.)
A. Add the Spring Framework to the project and enable dependency injection.
B. Reduce the deployment package by including only needed modules from the
AWS SDK for Java.
C. Increase the memory allocation setting for the Lambda function.
D. Increase the timeout setting for the Lambda function.
E. Change the Lambda invocation mode from synchronous to asynchronous.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 66
Question C.33
A Developer is working on a serverless project based in Java. Initial testing shows a cold start takes about
8 seconds on average for AWS Lambda functions.
What should the Developer do to reduce the cold start time? (Choose TWO.)
A. Add the Spring Framework to the project and enable dependency injection.
B. Reduce the deployment package by including only needed modules from the
AWS SDK for Java.
C. Increase the memory allocation setting for the Lambda function.
D. Increase the timeout setting for the Lambda function.
E. Change the Lambda invocation mode from synchronous to asynchronous.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 67
Question C.34
A company's ecommerce website is experiencing massive traffic spikes, which are causing performance
problems in the company database. Users are reporting that accessing the website takes a long time.
A Developer wants to implement a caching layer using Amazon ElastiCache. The website is required to
be responsive no matter which product a user views, and the updates to product information and prices
must be strongly consistent.
Which cache writing policy will satisfy these requirements?
A. Write to the cache directly and sync the backend at a later time
B. Write to the backend first and wait for the cache to expire
C. Write to the cache and the backend at the same time
D. Write to the backend first and invalidate the cache
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 68
Question C.34
A company's ecommerce website is experiencing massive traffic spikes, which are causing performance
problems in the company database. Users are reporting that accessing the website takes a long time.
A Developer wants to implement a caching layer using Amazon ElastiCache. The website is required to
be responsive no matter which product a user views, and the updates to product information and prices
must be strongly consistent.
Which cache writing policy will satisfy these requirements?
A. Write to the cache directly and sync the backend at a later time
B. Write to the backend first and wait for the cache to expire
C. Write to the cache and the backend at the same time
D. Write to the backend first and invalidate the cache
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 69
Question C.35
An online retail company has deployed a serverless application with AWS Lambda, Amazon API
Gateway, Amazon S3, and Amazon DynamoDB using AWS CloudFormation. The company rolled out a
new release with major upgrades to the Lambda function and deployed the release to production.
Subsequently, the application stopped working.
Which solution should bring the application back up as quickly as possible?
A. Redeploy the application on Amazon EC2 so the Lambda function can resolve
dependencies
B. Migrate DynamoDB to Amazon RDS and redeploy the Lambda function
C. Roll back the Lambda function to the previous version
D. Deploy the latest Lambda function in a different Region
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 70
Question C.35
An online retail company has deployed a serverless application with AWS Lambda, Amazon API
Gateway, Amazon S3, and Amazon DynamoDB using AWS CloudFormation. The company rolled out a
new release with major upgrades to the Lambda function and deployed the release to production.
Subsequently, the application stopped working.
Which solution should bring the application back up as quickly as possible?
A. Redeploy the application on Amazon EC2 so the Lambda function can resolve
dependencies
B. Migrate DynamoDB to Amazon RDS and redeploy the Lambda function
C. Roll back the Lambda function to the previous version
D. Deploy the latest Lambda function in a different Region
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 71
Question C.36
A Developer is writing an application that will run on Amazon EC2 instances in an Auto Scaling group.
The Developer wants to externalize session state to support the application.
Which services will meet these needs? (Choose TWO.)
A. Amazon DynamoDB
B. Amazon Cognito
C. Amazon ElastiCache
D. Amazon EBS
E. Amazon SQS
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 72
Question C.36
A Developer is writing an application that will run on Amazon EC2 instances in an Auto Scaling group.
The Developer wants to externalize session state to support the application.
Which services will meet these needs? (Choose TWO.)
A. Amazon DynamoDB
B. Amazon Cognito
C. Amazon ElastiCache
D. Amazon EBS
E. Amazon SQS
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 73
Question C.37
A Developer has a legacy application that is hosted on-premises. Other applications hosted on AWS
depend on the on-premises application for proper functioning.
In case of any application errors, the Developer wants to be able to use Amazon CloudWatch to monitor
and troubleshoot all applications from one place.
How can the Developer accomplish this?
A. Install an AWS SDK on the on-premises server to automatically send logs to
CloudWatch.
B. Download the CloudWatch agent to the on-premises server. Configure the agent
to use IAM user credentials with permissions for CloudWatch.
C. Upload log files from the on-premises server to Amazon S3 and have CloudWatch
read the files.
D. Upload log files from the on-premises server to an Amazon EC2 instance and
have the instance forward the logs to CloudWatch.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 74
Question C.37
A Developer has a legacy application that is hosted on-premises. Other applications hosted on AWS
depend on the on-premises application for proper functioning.
In case of any application errors, the Developer wants to be able to use Amazon CloudWatch to monitor
and troubleshoot all applications from one place.
How can the Developer accomplish this?
A. Install an AWS SDK on the on-premises server to automatically send logs to
CloudWatch.
B. Download the CloudWatch agent to the on-premises server. Configure the agent
to use IAM user credentials with permissions for CloudWatch.
C. Upload log files from the on-premises server to Amazon S3 and have CloudWatch
read the files.
D. Upload log files from the on-premises server to an Amazon EC2 instance and
have the instance forward the logs to CloudWatch.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 75
Question C.38
An application ingests a large number of small messages and stores them in a database. The application
uses AWS Lambda. A Development team is making change to the application's processing logic. In
testing, it is taking more than 15 minutes to process each message. The team is concerned the current
backend may time out.
Which changes should be made to the backend system to ensure each message is processed in the MOST
scalable way?
A. Add the messages to an Amazon SQS queue. Set up and Amazon EC2 instance to poll the
queue and process messages as they arrive.
B. Add the messages to an Amazon SQS queue. Set up Amazon EC2 instances in an Auto
Scaling group to poll the queue and process the messages as they arrive.
C. Create a support ticket to increase the Lambda timeout to 60 minutes to allow for
increased processing time.
D. Change the application to directly insert the body of the message into an Amazon RDS
database.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 76
Question C.38
An application ingests a large number of small messages and stores them in a database. The application
uses AWS Lambda. A Development team is making change to the application's processing logic. In
testing, it is taking more than 15 minutes to process each message. The team is concerned the current
backend may time out.
Which changes should be made to the backend system to ensure each message is processed in the MOST
scalable way?
A. Add the messages to an Amazon SQS queue. Set up and Amazon EC2 instance to poll the
queue and process messages as they arrive.
B. Add the messages to an Amazon SQS queue. Set up Amazon EC2 instances in an Auto
Scaling group to poll the queue and process the messages as they arrive.
C. Create a support ticket to increase the Lambda timeout to 60 minutes to allow for
increased processing time.
D. Change the application to directly insert the body of the message into an Amazon RDS
database.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 77
Question C.39
An advertising company has a dynamic website with heavy traffic. The company wants to migrate the
website infrastructure to AWS to handle everything except website development.
Which solution BEST meets these requirements?
A. Use AWS VM Import to migrate a web server image to AWS. Launch the image on
a compute-optimized Amazon EC2 instance.
B. Launch multiple Amazon Lightsail instances behind a load balancer. Set up the
website on those instances.
C. Deploy the website code in an AWS Elastic Beanstalk environment. Use Auto
Scaling to scale the numbers of instances.
D. Use Amazon S3 to host the website. Use Amazon CloudFront to deliver the
content at scale.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 78
Question C.39
An advertising company has a dynamic website with heavy traffic. The company wants to migrate the
website infrastructure to AWS to handle everything except website development.
Which solution BEST meets these requirements?
A. Use AWS VM Import to migrate a web server image to AWS. Launch the image on
a compute-optimized Amazon EC2 instance.
B. Launch multiple Amazon Lightsail instances behind a load balancer. Set up the
website on those instances.
C. Deploy the website code in an AWS Elastic Beanstalk environment. Use Auto
Scaling to scale the numbers of instances.
D. Use Amazon S3 to host the website. Use Amazon CloudFront to deliver the
content at scale.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 79
Question C.40
A Software Engineer developed an AWS Lambda function in Node.js to do some CPU-intensive data
processing. With the default settings, the Lambda function takes about 5 minutes to complete.
Which approach should a Developer take to increase the speed of completion?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 80
Question C.40
A Software Engineer developed an AWS Lambda function in Node.js to do some CPU-intensive data
processing. With the default settings, the Lambda function takes about 5 minutes to complete.
Which approach should a Developer take to increase the speed of completion?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 81
Question C.41
A company has implemented AWS CodePipeline to automate its release pipelines. The Development
team is writing an AWS Lambda function what will send notifications for state changes of each of the
actions in the stages.
Which steps must be taken to associate the Lambda function with the event source?
A. Create a trigger that invokes the Lambda function from the Lambda console by
selecting CodePipeline as the event source.
B. Create an event trigger and specify the Lambda function from the CodePipeline
console.
C. Create an Amazon CloudWatch alarm that monitors status changes in Code
Pipeline and triggers the Lambda function.
D. Create an Amazon CloudWatch Events rule that uses CodePipeline as an event
source.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 82
Question C.41
A company has implemented AWS CodePipeline to automate its release pipelines. The Development
team is writing an AWS Lambda function what will send notifications for state changes of each of the
actions in the stages.
Which steps must be taken to associate the Lambda function with the event source?
A. Create a trigger that invokes the Lambda function from the Lambda console by
selecting CodePipeline as the event source.
B. Create an event trigger and specify the Lambda function from the CodePipeline
console.
C. Create an Amazon CloudWatch alarm that monitors status changes in Code
Pipeline and triggers the Lambda function.
D. Create an Amazon CloudWatch Events rule that uses CodePipeline as an event
source.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 83
Question C.42
A Developer has built an application running on AWS Lambda using AWS Serverless Application Model
(AWS SAM).
What is the correct order of execution to successfully deploy the application?
A. 1. Build the SAM template in Amazon EC2. 2. Package the SAM template to
Amazon EBS storage. 3. Deploy the SAM template from Amazon EBS.
B. 1. Build the SAM template locally. 2. Package the SAM template onto Amazon S3.
3. Deploy the SAM template from Amazon S3.
C. 1. Build the SAM template locally. 2. Deploy the SAM template from Amazon S3.
3. Package the SAM template for use.
D. 1. Build the SAM template locally. 2. Package the SAM template from AWS
CodeCommit. 3. Deploy the SAM template to CodeCommit.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 84
Question C.42
A Developer has built an application running on AWS Lambda using AWS Serverless Application Model
(AWS SAM).
What is the correct order of execution to successfully deploy the application?
A. 1. Build the SAM template in Amazon EC2. 2. Package the SAM template to
Amazon EBS storage. 3. Deploy the SAM template from Amazon EBS.
B. 1. Build the SAM template locally. 2. Package the SAM template onto Amazon S3.
3. Deploy the SAM template from Amazon S3.
C. 1. Build the SAM template locally. 2. Deploy the SAM template from Amazon S3.
3. Package the SAM template for use.
D. 1. Build the SAM template locally. 2. Package the SAM template from AWS
CodeCommit. 3. Deploy the SAM template to CodeCommit.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 85
Question C.43
A company wants to migrate an imaging service to Amazon EC2 while following security best practices.
The images are sourced and read from a non-public
Amazon S3 bucket.
What should a Developer do to meet these requirements?
A. Create an IAM user with read-only permissions for the S3 bucket. Temporarily
store the user credentials in the Amazon EBS volume of the EC2 instance.
B. Create an IAM user with read-only permissions for the S3 bucket. Temporarily
store the user credentials in the user data of the EC2 instance.
C. Create an EC2 service role with read-only permissions for the S3 bucket. Attach
the role to the EC2 instance.
D. Create an S3 service role with read-only permissions for the S3 bucket. Attach the
role to the EC2 instance.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 86
Question C.43
A company wants to migrate an imaging service to Amazon EC2 while following security best practices.
The images are sourced and read from a non-public
Amazon S3 bucket.
What should a Developer do to meet these requirements?
A. Create an IAM user with read-only permissions for the S3 bucket. Temporarily
store the user credentials in the Amazon EBS volume of the EC2 instance.
B. Create an IAM user with read-only permissions for the S3 bucket. Temporarily
store the user credentials in the user data of the EC2 instance.
C. Create an EC2 service role with read-only permissions for the S3 bucket. Attach
the role to the EC2 instance.
D. Create an S3 service role with read-only permissions for the S3 bucket. Attach the
role to the EC2 instance.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 87
Question C.44
A Development team wants to immediately build and deploy an application whenever there is a change to
the source code.
Which approaches could be used to trigger the deployment? (Choose TWO.)
A. Store the source code in an Amazon S3 bucket. Configure AWS CodePipeline to
start whenever a file in the bucket changes.
B. Store the source code in an encrypted Amazon EBS volume. Configure AWS
CodePipeline to start whenever a file in the volume changes.
C. Store the source code in an AWS CodeCommit repository. Configure AWS
CodePipeline to start whenever a change is committed to the repository.
D. Store the source code in an Amazon S3 bucket. Configure AWS CodePipeline to
start every 15 minutes.
E. Store the source code in an Amazon EC2 instance's ephemeral storage. Configure
the instance to start AWS CodePipeline whenever there are changes to the source
code.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 88
Question C.44
A Development team wants to immediately build and deploy an application whenever there is a change to
the source code.
Which approaches could be used to trigger the deployment? (Choose TWO.)
A. Store the source code in an Amazon S3 bucket. Configure AWS CodePipeline to
start whenever a file in the bucket changes.
B. Store the source code in an encrypted Amazon EBS volume. Configure AWS
CodePipeline to start whenever a file in the volume changes.
C. Store the source code in an AWS CodeCommit repository. Configure AWS
CodePipeline to start whenever a change is committed to the repository.
D. Store the source code in an Amazon S3 bucket. Configure AWS CodePipeline to
start every 15 minutes.
E. Store the source code in an Amazon EC2 instance's ephemeral storage. Configure
the instance to start AWS CodePipeline whenever there are changes to the source
code.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 89
Question C.45
A company has implemented AWS CodeDeploy as part of its cloud native CI/CD stack. The company
enables automatic rollbacks while deploying a new version of a popular web application from in-place to
Amazon EC2.
What occurs if the deployment of the new version fails due to code regression?
A. The last known good deployment is automatically restored using the snapshot
stored in Amazon S3.
B. CodeDeploy switches the Amazon Route 53 alias records back to the known good
green deployment and terminates the failed blue deployment.
C. A new deployment of the last known version of the application is deployed with a
new deployment ID.
D. AWS CodePipeline promotes the most recent deployment with a SUCCEEDED
status to production.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 90
Question C.45
A company has implemented AWS CodeDeploy as part of its cloud native CI/CD stack. The company
enables automatic rollbacks while deploying a new version of a popular web application from in-place to
Amazon EC2.
What occurs if the deployment of the new version fails due to code regression?
A. The last known good deployment is automatically restored using the snapshot
stored in Amazon S3.
B. CodeDeploy switches the Amazon Route 53 alias records back to the known good
green deployment and terminates the failed blue deployment.
C. A new deployment of the last known version of the application is deployed with a
new deployment ID.
D. AWS CodePipeline promotes the most recent deployment with a SUCCEEDED
status to production.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 91
Question C.46
A software company needs to make sure user-uploaded documents are securely stored in Amazon S3. The
documents must be encrypted at rest in Amazon S3.
The company does not want to manage the security infrastructure in-house, but the company still needs
extra protection to ensure it has control over its encryption keys due to industry regulations.
Which encryption strategy should a Developer use to meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 92
Question C.46
A software company needs to make sure user-uploaded documents are securely stored in Amazon S3. The
documents must be encrypted at rest in Amazon S3.
The company does not want to manage the security infrastructure in-house, but the company still needs
extra protection to ensure it has control over its encryption keys due to industry regulations.
Which encryption strategy should a Developer use to meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 93
Question C.47
A Developer uses Amazon S3 buckets for static website hosting. The Developer creates one S3 bucket for
the code and another S3 bucket for the assets, such as image and video files. Access is denied when a user
attempts to access the assets bucket from the code bucket, with the website application showing a 403
error.
How should the Developer solve this issue?
A. Create an IAM role and apply it to the assets bucket for the code bucket to be
granted access.
B. Edit the bucket policy of the assets bucket to open access to all principals.
C. Edit the cross-origin resource sharing (CORS) configuration of the assets bucket
to allow any origin to access the assets.
D. Change the code bucket to use AWS Lambda functions instead of static website
hosting.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 94
Question C.47
A Developer uses Amazon S3 buckets for static website hosting. The Developer creates one S3 bucket for
the code and another S3 bucket for the assets, such as image and video files. Access is denied when a user
attempts to access the assets bucket from the code bucket, with the website application showing a 403
error.
How should the Developer solve this issue?
A. Create an IAM role and apply it to the assets bucket for the code bucket to be
granted access.
B. Edit the bucket policy of the assets bucket to open access to all principals.
C. Edit the cross-origin resource sharing (CORS) configuration of the assets bucket
to allow any origin to access the assets.
D. Change the code bucket to use AWS Lambda functions instead of static website
hosting.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 95
Question C.48
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 96
Question C.48
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 97
Question C.49
A Developer wants to insert a record into an Amazon DynamoDB table as soon as a new file is added to
an Amazon S3 bucket.
Which set of steps would be necessary to achieve this?
A. Create an event with Amazon CloudWatch Events that will monitor the S3 bucket
and then insert the records into DynamoDB.
B. Configure an S3 event to invoke a Lambda function that inserts records into
DynamoDB.
C. Create a Lambda function that will poll the S3 bucket and then insert the records
into DynamoDB.
D. Create a cron job that will run at a scheduled time and insert the records into
DynamoDB.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 98
Question C.49
A Developer wants to insert a record into an Amazon DynamoDB table as soon as a new file is added to
an Amazon S3 bucket.
Which set of steps would be necessary to achieve this?
A. Create an event with Amazon CloudWatch Events that will monitor the S3 bucket
and then insert the records into DynamoDB.
B. Configure an S3 event to invoke a Lambda function that inserts records into
DynamoDB.
C. Create a Lambda function that will poll the S3 bucket and then insert the records
into DynamoDB.
D. Create a cron job that will run at a scheduled time and insert the records into
DynamoDB.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 99
Question C.50
A Developer is building an application that needs to store data in Amazon S3. Management requires that
the data be encrypted before it is sent to Amazon S3 for storage. The encryption keys need to be managed
by the Security team.
Which approach should the Developer take to meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 100
Question C.50
A Developer is building an application that needs to store data in Amazon S3. Management requires that
the data be encrypted before it is sent to Amazon S3 for storage. The encryption keys need to be managed
by the Security team.
Which approach should the Developer take to meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 101
Question C.51
A Developer has written an Amazon Kinesis Data Streams application. As usage grows and traffic
increases over time, the application is regularly receiving ProvisionedThroughputExceededException
error messages.
Which steps should the Developer take to resolve the error? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 102
Question C.51
A Developer has written an Amazon Kinesis Data Streams application. As usage grows and traffic
increases over time, the application is regularly receiving ProvisionedThroughputExceededException
error messages.
Which steps should the Developer take to resolve the error? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 103
Question C.52
A Developer is publishing critical log data to a log group in Amazon CloudWatch Logs, which was
created 2 months ago. The Developer must encrypt the log data using an AWS KMS customer master key
(CMK) so future data can be encrypted to comply with the company's security policy.
How can the Developer meet this requirement?
A. Use the CloudWatch Logs console and enable the encrypt feature on the log
group
B. Use the AWS CLI create-log-group command and specify the key Amazon
Resource Name (ARN)
C. Use the KMS console and associate the CMK with the log group
D. Use the AWS CLI associate-kms-key command and specify the key Amazon
Resource Name (ARN)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 104
Question C.52
A Developer is publishing critical log data to a log group in Amazon CloudWatch Logs, which was
created 2 months ago. The Developer must encrypt the log data using an AWS KMS customer master key
(CMK) so future data can be encrypted to comply with the company's security policy.
How can the Developer meet this requirement?
A. Use the CloudWatch Logs console and enable the encrypt feature on the log
group
B. Use the AWS CLI create-log-group command and specify the key Amazon
Resource Name (ARN)
C. Use the KMS console and associate the CMK with the log group
D. Use the AWS CLI associate-kms-key command and specify the key Amazon
Resource Name (ARN)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 105
Question C.53
A Developer has code running on Amazon EC2 instances that needs read-only access to an Amazon
DynamoDB table.
What is the MOST secure approach the Developer should take to accomplish this task?
A. Create a user access key for each EC2 instance with read-only access to
DynamoDB. Place the keys in the code. Redeploy the code as keys rotate.
B. Use an IAM role with an AmazonDynamoDBReadOnlyAccess policy applied to the
EC2 instances.
C. Run all code with only AWS account root user access keys to ensure maximum
access to services.
D. Use an IAM role with Administrator access applied to the EC2 instance.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 106
Question C.53
A Developer has code running on Amazon EC2 instances that needs read-only access to an Amazon
DynamoDB table.
What is the MOST secure approach the Developer should take to accomplish this task?
A. Create a user access key for each EC2 instance with read-only access to
DynamoDB. Place the keys in the code. Redeploy the code as keys rotate.
B. Use an IAM role with an AmazonDynamoDBReadOnlyAccess policy applied to the
EC2 instances.
C. Run all code with only AWS account root user access keys to ensure maximum
access to services.
D. Use an IAM role with Administrator access applied to the EC2 instance.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 107
Question C.54
A Developer decides to store highly secure data in Amazon S3 and wants to implement server-side
encryption (SSE) with granular control of who can access the master key. Company policy requires that
the master key be created, rotated, and disabled easily when needed, all for security reasons.
Which solution should be used to meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 108
Question C.54
A Developer decides to store highly secure data in Amazon S3 and wants to implement server-side
encryption (SSE) with granular control of who can access the master key. Company policy requires that
the master key be created, rotated, and disabled easily when needed, all for security reasons.
Which solution should be used to meet these requirements?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 109
Question C.55
A Developer is migrating an on-premises application to AWS. The application currently takes user
uploads and saves them to a local directory on the server. All uploads must be saved and made
immediately available to all instances in an Auto Scaling group.
Which approach will meet these requirements?
A. Use Amazon EBS and configure the application AMI to use a snapshot of the same
EBS instance on boot.
B. Use Amazon S3 and rearchitect the application so all uploads are placed in S3.
C. Use instance storage and share it between instances launched from the same
Amazon Machine Image (AMI).
D. Use Amazon EBS and file synchronization software to achieve eventual
consistency among the Auto Scaling group.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 110
Question C.55
A Developer is migrating an on-premises application to AWS. The application currently takes user
uploads and saves them to a local directory on the server. All uploads must be saved and made
immediately available to all instances in an Auto Scaling group.
Which approach will meet these requirements?
A. Use Amazon EBS and configure the application AMI to use a snapshot of the same
EBS instance on boot.
B. Use Amazon S3 and rearchitect the application so all uploads are placed in S3.
C. Use instance storage and share it between instances launched from the same
Amazon Machine Image (AMI).
D. Use Amazon EBS and file synchronization software to achieve eventual
consistency among the Auto Scaling group.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 111
Question C.56
A Developer implemented a static website hosted in Amazon S3 that makes web service requests hosted
in Amazon API Gateway and AWS Lambda. The site is showing an error that reads: "No "˜Access-
Control-Allow-Origin' header is present on the requested resource. Origin "˜null' is therefore not allowed
access."
What should the Developer do to resolve this issue?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 112
Question C.56
A Developer implemented a static website hosted in Amazon S3 that makes web service requests hosted
in Amazon API Gateway and AWS Lambda. The site is showing an error that reads: "No "˜Access-
Control-Allow-Origin' header is present on the requested resource. Origin "˜null' is therefore not allowed
access."
What should the Developer do to resolve this issue?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 113
Question C.57
A Developer is writing an application in AWS Lambda. To simplify testing and deployments, the
Developer needs the database connections string to be easily changed without modifying the Lambda
code.
How can this requirement be met?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 114
Question C.57
A Developer is writing an application in AWS Lambda. To simplify testing and deployments, the
Developer needs the database connections string to be easily changed without modifying the Lambda
code.
How can this requirement be met?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 115
Question C.58
A company is launching an ecommerce website and will host the static data in Amazon S3. The company
expects approximately 1,000 transactions per second (TPS) for GET and PUT requests in total. Logging
must be enabled to track all requests and must be retained for auditing purposes.
What is the MOST cost-effective solution?
A. Enable AWS CloudTrail logging for the S3 bucket-level action and create a
lifecycle policy to move the data from the log bucket to Amazon S3 Glacier in 90
days.
B. Enable S3 server access logging and create a lifecycle policy to expire the data in
90 days.
C. Enable AWS CloudTrail logging for the S3 bucket-level action and create a
lifecycle policy to expire the data in 90 days.
D. Enable S3 server access logging and create a lifecycle policy to move the data to
Amazon S3 Glacier in 90 days.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 116
Question C.58
A company is launching an ecommerce website and will host the static data in Amazon S3. The company
expects approximately 1,000 transactions per second (TPS) for GET and PUT requests in total. Logging
must be enabled to track all requests and must be retained for auditing purposes.
What is the MOST cost-effective solution?
A. Enable AWS CloudTrail logging for the S3 bucket-level action and create a
lifecycle policy to move the data from the log bucket to Amazon S3 Glacier in 90
days.
B. Enable S3 server access logging and create a lifecycle policy to expire the data in
90 days.
C. Enable AWS CloudTrail logging for the S3 bucket-level action and create a
lifecycle policy to expire the data in 90 days.
D. Enable S3 server access logging and create a lifecycle policy to move the data to
Amazon S3 Glacier in 90 days.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 117
Question C.59
A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances.
The application uses attached Amazon EBS disks for storing data. The application will process sensitive
information and all the data must be encrypted.
What should a Developer do to ensure the data is encrypted on disk without impacting performance?
A. Configure the Amazon EC2 instance fleet to use encrypted EBS volumes for
storing data.
B. Add logic to write all data to an encrypted Amazon S3 bucket.
C. Add a custom encryption algorithm to the application that will encrypt and
decrypt all data.
D. Create a new Amazon Machine Image (AMI) with an encrypted root volume and
store the data to ephemeral disks.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 118
Question C.59
A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances.
The application uses attached Amazon EBS disks for storing data. The application will process sensitive
information and all the data must be encrypted.
What should a Developer do to ensure the data is encrypted on disk without impacting performance?
A. Configure the Amazon EC2 instance fleet to use encrypted EBS volumes for
storing data.
B. Add logic to write all data to an encrypted Amazon S3 bucket.
C. Add a custom encryption algorithm to the application that will encrypt and
decrypt all data.
D. Create a new Amazon Machine Image (AMI) with an encrypted root volume and
store the data to ephemeral disks.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 119
Question C.60
A Developer has written an application that runs on Amazon EC2 instances and generates a value every
minute. The Developer wants to monitor and graph the values generated over time without logging in to
the instance each time.
Which approach should the Developer use to achieve this goal?
A. Use the Amazon CloudWatch metrics reported by default for all EC2 instances.
View each value from the CloudWatch console.
B. Develop the application to store each value in a file on Amazon S3 every minute
with the timestamp as the name.
C. Publish each generated value as a custom metric to Amazon CloudWatch using
available AWS SDKs.
D. Store each value as a variable and add the variable to the list of EC2 metrics that
should be reported to the Amazon CloudWatch console.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 120
Question C.60
A Developer has written an application that runs on Amazon EC2 instances and generates a value every
minute. The Developer wants to monitor and graph the values generated over time without logging in to
the instance each time.
Which approach should the Developer use to achieve this goal?
A. Use the Amazon CloudWatch metrics reported by default for all EC2 instances.
View each value from the CloudWatch console.
B. Develop the application to store each value in a file on Amazon S3 every minute
with the timestamp as the name.
C. Publish each generated value as a custom metric to Amazon CloudWatch using
available AWS SDKs.
D. Store each value as a variable and add the variable to the list of EC2 metrics that
should be reported to the Amazon CloudWatch console.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 121
Question C.61
A Development team decides to adopt a continuous integration/continuous delivery (CI/CD) process
using AWS CodePipeline and AWS CodeCommit for a new application. However, management wants a
person to review and approve the code before it is deployed to production.
How can the Development team add a manual approver to the CI/CD pipeline?
A. Use AWS SES to send an email to approvers when their action is required. Develop a
simple application that allows approvers to accept or reject a build. Invoke an AWS
Lambda function to advance the pipeline when a build is accepted.
B. If approved, add an approved tag when pushing changes to the CodeCommit repository.
CodePipeline will proceed to build and deploy approved commits without interruption.
C. Add an approval step to CodeCommit. Commits will not be saved until approved.
D. Add an approval action to the pipeline. Configure the approval action to publish to an
Amazon SNS topic when approval is required. The pipeline execution will stop and wait for
an approval.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 122
Question C.61
A Development team decides to adopt a continuous integration/continuous delivery (CI/CD) process
using AWS CodePipeline and AWS CodeCommit for a new application. However, management wants a
person to review and approve the code before it is deployed to production.
How can the Development team add a manual approver to the CI/CD pipeline?
A. Use AWS SES to send an email to approvers when their action is required. Develop a
simple application that allows approvers to accept or reject a build. Invoke an AWS
Lambda function to advance the pipeline when a build is accepted.
B. If approved, add an approved tag when pushing changes to the CodeCommit repository.
CodePipeline will proceed to build and deploy approved commits without interruption.
C. Add an approval step to CodeCommit. Commits will not be saved until approved.
D. Add an approval action to the pipeline. Configure the approval action to publish to an
Amazon SNS topic when approval is required. The pipeline execution will stop and wait for
an approval.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 123
Question C.62
A Developer is building a serverless application using AWS Lambda and must create a REST API using
an HTTP GET method.
What needs to be defined to meet this requirement? (Choose TWO.)
A. A Lambda@Edge function
B. An Amazon API Gateway with a Lambda function
C. An exposed GET method in an Amazon API Gateway
D. An exposed GET method in the Lambda function
E. An exposed GET method in Amazon Route 53
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 124
Question C.62
A Developer is building a serverless application using AWS Lambda and must create a REST API using
an HTTP GET method.
What needs to be defined to meet this requirement? (Choose TWO.)
A. A Lambda@Edge function
B. An Amazon API Gateway with a Lambda function
C. An exposed GET method in an Amazon API Gateway
D. An exposed GET method in the Lambda function
E. An exposed GET method in Amazon Route 53
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 125
Question C.63
A Developer needs to create an application that supports Security Assertion Markup Language (SAML)
and Facebook authentication. It must also allow access to AWS services, such as Amazon DynamoDB.
Which AWS service or feature will meet these requirements with the LEAST amount of additional
coding?
A. AWS AppSync
B. Amazon Cognito identity pools
C. Amazon Cognito user pools
D. Amazon Lambda@Edge
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 126
Question C.63
A Developer needs to create an application that supports Security Assertion Markup Language (SAML)
and Facebook authentication. It must also allow access to AWS services, such as Amazon DynamoDB.
Which AWS service or feature will meet these requirements with the LEAST amount of additional
coding?
A. AWS AppSync
B. Amazon Cognito identity pools
C. Amazon Cognito user pools
D. Amazon Lambda@Edge
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 127
Question C.64
A Developer is trying to monitor an application's status by running a cron job that returns 1 if the service
is up and 0 if the service is down. The Developer created code that uses an AWS CLI put-metric-alarm
command to publish the custom metrics to Amazon CloudWatch and create an alarm. However, the
Developer is unable to create an alarm as the custom metrics do not appear in the CloudWatch console.
What is causing this issue?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 128
Question C.64
A Developer is trying to monitor an application's status by running a cron job that returns 1 if the service
is up and 0 if the service is down. The Developer created code that uses an AWS CLI put-metric-alarm
command to publish the custom metrics to Amazon CloudWatch and create an alarm. However, the
Developer is unable to create an alarm as the custom metrics do not appear in the CloudWatch console.
What is causing this issue?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 129
Question C.65
A Developer registered an AWS Lambda function as a target for an Application Load Balancer (ALB)
using a CLI command. However, the Lambda function is not being invoked when the client sends
requests through the ALB.
Why is the Lambda function not being invoked?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 130
Question C.65
A Developer registered an AWS Lambda function as a target for an Application Load Balancer (ALB)
using a CLI command. However, the Lambda function is not being invoked when the client sends
requests through the ALB.
Why is the Lambda function not being invoked?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 131
Thank you!
© 2019 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 132