Filters
Question type

Study Flashcards

A company is creating an application that will require users to access AWS services and allow them to reset their own passwords. Which of the following would allow the company to manage users and authorization while allowing users to reset their own passwords?


A) Amazon Cognito identify pools and AWS STS
B) Amazon Cognito identity pools and AWS IAM
C) Amazon Cognito user pools and AWS KMS
D) Amazon Cognito user pools and identity pools

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A developer wants to send multi-value headers to an AWS Lambda function that is registered as a target with an Application Load Balancer (ALB) . What should the developer do to achieve this?


A) Place the Lambda function and target group in the same account.
B) Send the request body to the Lambda function with a size less than 1 MB.
C) Include the Base64 encoding status, status code, status description, and headers in the Lambda function.
D) Enable the multi-value headers on the ALB.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A video-hosting website has two types of members: those who pay a fee, and those who do not. Each video upload places a message in Amazon SQS. A fleet of Amazon EC2 instances polls Amazon SQS and processes each video. The developer needs to ensure that the videos uploaded by the paying members are processed first. How can the developer meet this requirement?


A) Create two SQS queues; one for paying members, and one for non-paying members. Poll the paying member queue first and then poll the non-paying member queue.
B) Use SQS to set priorities on individual items within a single queue; give the paying members' videos the highest priority.
C) Use SQS to set priorities on individual items within a single queue and use Amazon SNS to encode the videos.
D) Create two Amazon SNS topics: one for paying members and one for non-paying members. Use SNS topic subscription priorities to differentiate between the two types of members.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

An application ingests a large number of small messages and stores them in a database. The application uses AWS Lambda. A Development team is making change to the application's processing logic. In testing, it is taking more than 15 minutes to process each message. The team is concerned the current backend may time out. Which changes should be made to the backend system to ensure each message is processed in the MOST scalable way?


A) Add the messages to an Amazon SQS queue. Set up and Amazon EC2 instance to poll the queue and process messages as they arrive.
B) Add the messages to an Amazon SQS queue. Set up Amazon EC2 instances in an Auto Scaling group to poll the queue and process the messages as they arrive.
C) Create a support ticket to increase the Lambda timeout to 60 minutes to allow for increased processing time.
D) Change the application to directly insert the body of the message into an Amazon RDS database.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available. Which of the following could create this situation? (Select two.)


A) The traces are reaching X-Ray, but the Developer does not have access to view the records.
B) The X-Ray daemon is not installed on the EC2 instance.
C) The X-Ray endpoint specified in the application configuration is incorrect.
D) The instance role does not have "xray:BatchGetTraces" and "xray:GetTraceGraph" permissions.
E) The instance role does not have "xray:PutTraceSegments" and "xray:PutTelemetryRecords" permissions.

F) C) and D)
G) A) and D)

Correct Answer

verifed

verified

A developer is testing an application that invokes an AWS Lambda function asynchronously. During the testing phase, the Lambda function fails to process after two retries. How can the developer troubleshoot the failure?


A) Configure AWS CloudTrail logging to investigate the invocation failures
B) Configure Dead Letter Queues by sending events to Amazon SQS for investigation
C) Configure Amazon Simple Workflow Service to process any direct unprocessed events
D) Configure AWS Config to process any direct unprocessed events

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A developer is building an application using an Amazon API Gateway REST API backend by an AWS Lambda function that interacts with an Amazon DynamoDB table. During testing, the developer observes high latency when making requests to the API. How can the developer evaluate the end-to-end latency and identify performance bottlenecks?


A) Enable AWS CloudTrail logging and use the logs to map each latency and bottleneck.
B) Enable and configure AWS X-Ray tracing on API Gateway and the Lambda function. Use X-Ray to trace and analyze user requests.
C) Enable Amazon CloudWatch Logs for the Lambda function. Enable execution logs for API Gateway to view and analyze user request logs.
D) Enable VPC Flow Logs to capture and analyze network traffic within the VPC.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

A developer is using Amazon DynamoDB to store application data. The developer wants to further improve application performance by reducing response times for read and write operations. Which DynamoDB feature should be used to meet these requirements?


A) Amazon DynamoDB Streams
B) Amazon DynamoDB Accelerator
C) Amazon DynamoDB global tables
D) Amazon DynamoDB transactions

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

EC2 instances are launched from Amazon Machine images (AMIs) . A given public AMI can:


A) be used to launch EC2 Instances in any AWS region.
B) only be used to launch EC2 instances in the same country as the AMI is stored.
C) only be used to launch EC2 instances in the same AWS region as the AMI is stored.
D) only be used to launch EC2 instances in the same AWS availability zone as the AMI is stored

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

A developer is writing a web application that must share secure documents with end users. The documents are stored in a private Amazon S3 bucket. The application must allow only authenticated users to download specific documents when requested, and only for a duration of 15 minutes. How can the developer meet these requirements?


A) Copy the documents to a separate S3 bucket that has a lifecycle policy for deletion after 15 minutes.
B) Create a presigned S3 URL using the AWS SDK with an expiration time of 15 minutes.
C) Use server-side encryption with AWS KMS managed keys (SSE-KMS) and download the documents using HTTPS.
D) Modify the S3 bucket policy to only allow specific users to download the documents. Revert the change after 15 minutes.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A development team is creating a new application designed to run on AWS. While the test and production environments will run on Amazon EC2 instances, developers will each run their own environment on their laptops. Which of the following is the simplest and MOST secure way to access AWS services from the local development machines?


A) Use an IAM role to assume a role and execute API calls using the role.
B) Create an IAM user to be shared with the entire development team; provide the development team with the access key.
C) Create an IAM user for each developer on the team; provide each developer with a unique access key.
D) Set up a federation through an Amazon Cognito user pool.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A developer is refactoring a monolithic application. The application takes a POST request and performs several operations. Some of the operations are in parallel while others run sequentially. These operations have been refactored into individual AWS Lambda functions. The POST request will be processed by Amazon API Gateway. How should the developer invoke the Lambda functions in the same sequence using API Gateway?


A) Use Amazon SQS to invoke the Lambda functions
B) Use an AWS Step Functions activity to run the Lambda functions
C) Use Amazon SNS to trigger the Lambda functions
D) Use an AWS Step Functions state machine to orchestrate the Lambda functions

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A Developer wants to build an application that will allow new users to register and create new user accounts. The application must also allow users with social media accounts to log in using their social media credentials. Which AWS service or feature can be used to meet these requirements?


A) AWS IAM
B) Amazon Cognito identity pools
C) Amazon Cognito user pools
D) AWS Directory Service

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A Developer is writing an application in AWS Lambda. To simplify testing and deployments, the Developer needs the database connection string to be easily changed without modifying the Lambda code. How can this requirement be met?


A) Store the connection string as a secret in AWS Secrets Manager.
B) Store the connection string in an IAM user account.
C) Store the connection string in AWS KMS.
D) Store the connection string as a Lambda layer.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A Development team is working on a case management solution that allows medical claims to be processed and reviewed. Users log in to provide information related to their medical and financial situations. As part of the application, sensitive documents such as medical records, medical imaging, bank statements, and receipts are uploaded to Amazon S3. All documents must be securely transmitted and stored. All access to the documents must be recorded for auditing. What is the MOST secure approach?


A) Use S3 default encryption using Advanced Encryption Standard-256 (AES-256) on the destination bucket.
B) Use Amazon Cognito for authorization and authentication to ensure the security of the application and documents.
C) Use AWS Lambda to encrypt and decrypt objects as they are placed into the S3 bucket.
D) Use client-side encryption/decryption with Amazon S3 and AWS KMS.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

An existing serverless application processes uploaded image files. The process currently uses a single Lambda function that takes an image file, performs the processing, and stores the file in Amazon S3. Users of the application now require thumbnail generation of the images. Users want to avoid any impact to the time it takes to perform the image uploads. How can thumbnail generation be added to the application, meeting user requirements while minimizing changes to existing code?


A) Change the existing Lambda function handling the uploads to create thumbnails at the time of upload. Have the function store both the image and thumbnail in Amazon S3.
B) Create a second Lambda function that handles thumbnail generation and storage. Change the existing Lambda function to invoke it asynchronously.
C) Create an S3 event notification with a Lambda function destination. Create a new Lambda function to generate and store thumbnails.
D) Create an S3 event notification to an SQS Queue. Create a scheduled Lambda function that processes the queue, and generates and stores thumbnails.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following programming languages have an officially supported AWS SDK? (Choose two.)


A) Perl
B) PHP
C) Pascal
D) Java
E) SQL

F) A) and B)
G) C) and E)

Correct Answer

verifed

verified

A Developer has created a software package to be deployed on multiple EC2 instances using IAM roles. What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams? (Choose two.)


A) Use the AWS CLI to retrieve the IAM group.
B) Query Amazon EC2 metadata for in-line IAM policies.
C) Request a token from AWS STS, and perform a describe action.
D) Perform a get action using the --dry-run argument. Perform a get action using the --dry-run argument.
E) Validate the IAM role policy with the IAM policy simulator.

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

A Developer wants to enable AWS X-Ray for a secure application that runs in an Amazon ECS environment. What combination of steps will enable X-Ray? (Choose three.)


A) Create a Docker image that runs the X-Ray daemon.
B) Add instrumentation to the application code for X-Ray.
C) Install the X-Ray daemon on the underlying EC2 instance.
D) Configure and use an IAM EC2 instance role.
E) Register the application with X-Ray.
F) Configure and use an IAM role for tasks.

G) E) and F)
H) D) and F)

Correct Answer

verifed

verified

A Developer is building a serverless application using AWS Lambda and must create a REST API using an HTTP GET method. What needs to be defined to meet this requirement? (Choose two.)


A) A Lambda@Edge function
B) An Amazon API Gateway with a Lambda function
C) An exposed GET method in an Amazon API Gateway
D) An exposed GET method in the Lambda function
E) An exposed GET method in Amazon Route 53

F) A) and E)
G) A) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 470

Related Exams

Show Answer