AWS Dev Cert Q&A Flashcards
(54 cards)
Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table?
Assume that no security Keys are allowed to be stored on the EC2 instance. (Choose two)
Launch an EC2 Instance with the IAM Role included in the launch configuration.
Create an IAM Role that allows write access to the DynamoDB table.
What is the maximum number of S3 Buckets available per AWS account?
100 per account
You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that it has been successfully stored. You then immediately make another API call and attempt to read this object. S3 tells you that the object does not exist.
What could explain this behavior?
US-STANDARD uses eventual consistency and it can take time for an object to be readable in a bucket
After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a public subnet you modify your route tables to have the NAT device be the target of internet bound traffic of your private subnet. When you try and make an outbound connection to the Internet from an instance in the private subnet, you are not successful.
Which of the following steps could resolve the issue?
Disabling the Source/Destination Check attribute on the NAT instance
What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?
BatchGetItem
When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to encrypt object data when saved on the server side?
x-amz-server-side-encryption
Which of the following services are key/value stores? (Choose three)
Amazon ElastiCache
DynamoDB
Simple Storage Service
If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other users by default?
30 seconds
You have an environment that consists of a public subnet using Amazon VPC and 3 instances that are running in this subnet. These three instances can successfully communicate with other hosts on the Internet. You launch a fourth instance in the same subnet, using the same AMI and security group configuration you used for the others, but find that this instance cannot be accessed from the Internet. What should you do to enable internet access?
Assign an Elastic IP address to the fourth instance.
Which of the following are correct statements with policy evaluation logic in AWS Identity and Access Management? (Choose two)
By default, all requests are denied
An explicit allow overrides default deny.
What happens, by default, when one of the resources in a CloudFormation stack cannot be created?
Previously-created resources are deleted and the stack creation terminates.
Which features can be used to restrict access to data in S3? (Choose two)
Set an S3 Bucket policy.
Set an S3 ACL on the bucket or the object.
Which code snippet below returns the URL of a load balanced web site created in CloudFormation with an AWS::ElasticLoadBalancing::LoadBalancer resource name “ElasticLoad Balancer”?
“Fn::Join” : [“”. [ “http://”, {“Fn::GetAtr” : [ “ElasticLoadBalancer”,”DNSName”]}]]
Which of the following platforms are supported by Elastic Beanstalk? (Choose two)
Apache Tomcat
.NET
Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser.
What should Company D do to prevent the web fonts from being blocked by the browser?
Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration
When using a large Scan operation in DynamoDB, what technique can be used to minimize the impact of a scan on a table’s provisioned throughput?
Set a smaller page size for the scan
In AWS, which security aspects are the customer’s responsibility? (Choose four)
Life-cycle management of IAM credentials
Security Group and ACL (Access Control List) settings
Encryption of EBS (Elastic Block Storage) volumes
Patch management on the EC2 instance’s operating system
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
DescribeImages
EC2 instances are launched from Amazon Machine images (AMIs). A given public AMI can:
only be used to launch EC2 instances in the same AWS region as the AMI is stored.
How can software determine the public and private IP addresses of the Amazon EC2 instance that it is running on?
Query the local instance metadata.
Which of the following are valid arguments for an SNS Publish request? (Choose three)
TopicArn
Subject
Message
How is provisioned throughput affected by the chosen consistency model when reading data from a DynamoDB table?
Strongly consistent reads use more throughput than eventually consistent reads
Which of the following are valid SNS delivery transports? (Choose two)
HTTP
SMS
A startups photo-sharing site is deployed in a VPC. An ELB distributes web traffic across two subnets. ELB session stickiness is configured to use the AWS-generated session cookie, with a session TTL of 5 minutes. The webserver Auto Scaling Group is configured as: min-size=4, max-size=4.
The startups preparing for a public launch, by running load-testing software installed on a single EC2 instance running in us-west-2 After 60 minutes of load-testing, the webserver logs show:
webserver #1 (subnet in us-west-2a) : | 19210 | 434
webserver #2 (subnet in us-west-2a) : | 21790 | 490
webserver #3 (subnet in us-west-2b) : | 0 | 410
webserver #4 (subnet in us-west-2b) : | 0 | 428
Which recommendations can help ensure load-testing HTTP requests are evenly distributed across the four webservers? (Choose two)
Re-configure the load-testing software to re-resolve DNS for each web request.
Use a 3rd-party load-testing service which offers globally-distributed test clients.