DECK 1 Flashcards

1
Q

A Developer created a dashboard for an application using Amazon API Gateway, Amazon S3, AWS Lambda, and Amazon RDS. The Developer needs an authentication mechanism allowing a user to sign in and view the dashboard. It must be accessible from mobile applications, desktops, and tablets, and must remember user preferences across platforms.

Which AWS service should the Developer use to support this authentication scenario?

A. AWS KMS
B. Amazon Cognito
C. AWS Directory Service
D. Amazon IAM

A

B. Amazon Cognito

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Developer has created an S3 bucket s3://mycoolapp and has enabled server across logging that points to the folder s3://mycoolapp/logs. The Developer moved 100 KB of Cascading Style Sheets (CSS) documents to the folder s3://mycoolapp/css, and then stopped work. When the developer came back a few days later, the bucket was 50 GB.

What is the MOST likely cause of this situation?

A. The CSS files were not compressed and S3 versioning was enabled.

B. S3 replication was enabled on the bucket.

C. Logging into the same bucket caused exponential log growth.

D. An S3 lifecycle policy has moved the entire CSS file to S3 Infrequent Access.

A

C. Logging into the same bucket caused exponential growth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Developer is creating an Auto Scaling group whose instances need to publish a custom metric to Amazon CloudWatch.

Which method would be the MOST secure way to authenticate a CloudWatch PUT request?

A. Create an IAM user with PutMetricData permission and put the user credentials in a private repository; have applications pull the credentials as needed.

B. Create an IAM user with PutMetricData permission, and modify the Auto Scaling launch configuration to inject the user credentials into the instance user data.

C. Modify the CloudWatch metric policies to allow the PutMetricData permission to instances from the Auto Scaling group.

D. Create an IAM role with PutMetricData permission and modify the Auto Scaling launching configuration to launch instances using that role.

A

D. Create an IAM role with PutMetricData permission and modify the Auto Scaling launching configuration to launch instances using that role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Developer is working on an application that tracks hundreds of millions of product reviews in an Amazon DynamoDB table. The records include the data elements shown in the table:

Which field, when used as the partition key, would result in the MOST consistent performance using DynamoDB?

A. starRating
B. reviewID
C. comment
D. productID

A

B. reviewID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Developer has written a serverless application using multiple AWS services. The business logic is written as a Lambda function which has dependencies on third-party libraries. The Lambda function endpoints will be exposed using Amazon API Gateway. The Lambda function will write the information to Amazon DynamoDB. The Developer is ready to deploy the application but must have the ability to rollback.
How can this deployment be automated, based on these requirements?

A. Deploy using Amazon Lambda API operations to create the Lambda function by providing a deployment package.

B. Use an AWS CloudFormation template and use CloudFormation syntax to define the Lambda function resource in the template.

C. Use syntax conforming to the Serverless Application Model in the AWS CloudFormation template to define the Lambda function resource.

D. Create a bash script which uses AWS CLI to package and deploy the application.

A

C. Use syntax conforming to the Serverless Application Model in the AWS CloudFormation template to define the Lambda function resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the steps to using the AWS CLI to launch a templatized serverless application?

A. Use AWS CloudFormation get-template then CloudFormation execute-change-set.

B. Use AWS CloudFormation validate-template then CloudFormation create-change-set.

C. Use AWS CloudFormation package then CloudFormation deploy.

D. Use AWS CloudFormation create-stack then CloudFormation update-stack.

A

C. Use AWS CloudFormation package then CloudFormation deploy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Developer is creating a web application that requires authentication, but also needs to support guest access to provide users limited access without having to authenticate. What service can provide support for the application to allow guest access?

A. IAM temporary credentials using AWS STS.
B. Amazon Directory Service
C. Amazon Cognito with unauthenticated access enabled
D. IAM with SAML integration

A

C. Amazon Cognito with unauthenticated access enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An application takes 40 seconds to process instructions received in an Amazon SQS message.
Assuming the SQS queue is configured with the default VisibilityTimeout value, what is the BEST way, upon receiving a message, to ensure that no other instances can retrieve a message that has already been processed or is currently being processed?

A. Use the ChangeMessageVisibility API to increase the VisibilityTimeout, then use the DeleteMessage API to delete the message.

B. Use the DeleteMessage API call to delete the message from the queue, then call DeleteQueue API to remove the queue.

C. Use the ChangeMessageVisibility API to decrease the timeout value, then use the DeleteMessage API to delete the message.

D. Use the DeleteMessageVisibility API to cancel the VisibilityTimeout, then use the DeleteMessage API to delete the message.

A

A. Use the ChangeMessageVisibility API to increase the VisibilityTimeout, then use the DeleteMessage API to delete the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Developer has implemented a Lambda function that needs to add new customers to an RDS database that is expected to run hundreds of times per hour. The Lambda function is configured to use 512MB of RAM and is based on the following pseudo code:

After testing the Lambda function, the Developer notices that the Lambda execution time is much longer than expected. What should the Developer do to improve performance?

A. Increase the amount of RAM allocated to the Lambda function, which will increase the number of threads the Lambda can use.

B. Increase the size of the RDS database to allow for an increased number of database connections each hour.

C. Move the database connection and close statement out of the handler. Place the connection in the global space.

D. Replace RDS wit Amazon DynamoDB to implement control over the number of writes per second.

A

C. Move the database connection and close statement out of the handler. Place the connection in the global space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A current architecture uses many Lambda functions invoking one another as a large state machine. The coordination of this state machine is legacy custom code that breaks easily.
Which AWS Service can help refactor and manage the state machine?

A. AWS Data Pipeline
B. AWS SNS with AWS SQS
C. Amazon Elastic MapReduce
D. AWS Step Functions

A

D. AWS Step Functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A large e-commerce site is being designed to deliver static objects from Amazon S3. The Amazon S3 bucket will serve more than 300 GET requests per second.
What should be done to optimize performance? (Choose two.)

A. Integrate Amazon CloudFront with Amazon S3.
B. Enable Amazon S3 cross-region replication.
C. Delete expired Amazon S3 server log files.
D. Configure Amazon S3 lifecycle rules.
E. Randomize Amazon S3 key name prefixes.

A

A. Integrate Amazon CloudFront with Amazon S3.

E. Randomize Amazon S3 key name prefixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company is building a stock trading application that requires sub-millisecond latency in processing trading requests. Amazon DynamoDB is used to store all the trading data that is used to process each request. After load testing the application, the development team found that due to data retrieval times, the latency requirement is not satisfied. Because of sudden high spikes in the number of requests, DynamoDB read capacity has to be significantly over-provisioned to avoid throttling.

What steps should be taken to meet latency requirements and reduce the cost of running the application?

A. Add Global Secondary Indexes for trading data.
B. Store trading data in Amazon S3 and use Transfer Acceleration.
C. Add retries with exponential back-off for DynamoDB queries
D. Use DynamoDB Accelerator to cache trading data.

A

D. Use DynamoDB Accelerator to cache trading data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Developer needs temporary access to resources in a second account.
What is the MOST secure way to achieve this?

A. Use the Amazon Cognito user pools to get short-lived credentials for the second account.

B. Create a dedicated IAM access key for the second account, and send it by mail.

C. Create a cross-account access role, and use sts:AssumeRole API to get short-lived credentials.

D. Establish trust, and add an SSH key for the second account to the IAM user.

A

C. Create a cross-account access role, and use sts:AssumeRole API to get short-lived credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An application reads data from an Amazon DynamoDB table. Several times a day, for a period of 15 seconds, the application receives multiple ProvisionedThroughputExceeded errors.
How should this exception be handled?

A. Create a new global secondary index for the table to help with the additional requests.

B. Retry the failed read requests with exponential backoff.

C. Immediately retry the failed read requests.

D. Use the DynamoDB UpdateItem API to increase the provisioned throughput capacity of the table.

A

B. Retry the failed read requests with exponential backoff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Developer has created a large Lambda function, and deployment is failing with the following error:
ClientError: An error occurred (InvalidParameterValueException) when calling the CreateFunction operation: Unzipped size must be smaller than XXXXXXXXX bytesג€™, where XXXXXXXXX is the current Lambda limit

What can the Developer do to fix this problem?

A. Submit a limit increase request to AWS Support to increase the function to the size needed.

B. Use a compression algorithm that is more efficient than ZIP.

C. Break the function into multiple smaller Lambda functions.

D. ZIP the ZIP file twice to compress it further.

A

C. Break the function into multiple smaller Lambda functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Given the source code for an AWS Lambda function in the local store.py containing a handler function called get_store and the following AWS CloudFormation template:

What should be done to prepare the template so that it can be deployed using the AWS CLI command aws cloudformation deploy?

A. Use aws cloudformation compile to base64 encode and embed the source file into a modified CloudFormation template.

B. Use aws cloudformation package to upload the source code to an Amazon S3 bucket and produce a modified CloudFormation template.

C. Use aws lambda zip to package the source file together with the CloudFormation template and deploy the resulting zip archive.

D. Use aws serverless create-package to embed the source file directly into the existing CloudFormation template.

A

B. Use aws cloudformation package to upload the source code to an Amazon S3 bucket and produce a modified CloudFormation template.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An application stores images in an S3 bucket. Amazon S3 event notifications are used to trigger a Lambda function that resizes the images. Processing each image takes less than a second.
How will AWS Lambda handle the additional traffic?

A. Lambda will scale out to execute the requests concurrently.

B. Lambda will handle the requests sequentially in the order received.

C. Lambda will process multiple images in a single execution.

D. Lambda will add more compute to each execution to reduce processing time.

A

A. Lambda will scale out to execute the requests concurrently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company wants to implement a continuous integration for its workloads on AWS. The company wants to trigger unit test in its pipeline for commits-on its code repository, and wants to be notified of failure events in the pipeline.
How can these requirements be met?

A. Store the source code in AWS CodeCommit. Create a CodePipeline to automate unit testing. Use Amazon SNS to trigger notifications of failure events.

B. Store the source code in GitHub. Create a CodePipeline to automate unit testing. Use Amazon SES to trigger notifications of failure events.

C. Store the source code on GitHub. Create a CodePipeline to automate unit testing. Use Amazon CloudWatch to trigger notifications of failure events.

D. Store the source code in AWS CodeCommit. Create a CodePipeline to automate unit testing. Use Amazon CloudWatch to trigger notification of failure events.

A

A. Store the source code in AWS CodeCommit. Create a CodePipeline to automate unit testing. Use Amazon SNS to trigger notifications of failure events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A serverless application uses an API Gateway and AWS Lambda.
Where should the Lambda function store its session information across function calls?

A. In an Amazon DynamoDB table
B. In an Amazon SQS queue
C. In the local filesystem
D. In an SQLite session table using DSQLITE_ENABLE_SESSION

A

A. In an Amazon DynamoDB table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Developer has created a software package to be deployed on multiple EC2 instances using IAM roles.
What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams? (Choose two.)

A. Use the AWS CLI to retrieve the IAM group.

B. Query Amazon EC2 metadata for in-line IAM policies.

C. Request a token from AWS STS, and perform a describe action.

D. Perform a get action using the -dry-run argument.

E. Validate the IAM role policy with the IAM policy simulator.

A

D. Perform a get action using the -dry-run argument.

E. Validate the IAM role policy with the IAM policy simulator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When writing a Lambda function, what is the benefit of instantiating AWS clients outside the scope of the handler?

A. Legibility and stylistic convention
B. Taking advantage of connection re-use
C. Better error handling
D. Creating a new instance per invocation

A

B. Taking advantage of connection re-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An application on AWS is using third-party APIs. The Developer needs to monitor API errors in the code, and wants to receive notifications if failures go above a set threshold value.
How can the Developer achieve these requirements?

A. Publish a custom metric on Amazon CloudWatch and use Amazon SES for notification.

B. Use an Amazon CloudWatch API-error metric and use Amazon SNS for notification.

C. Use an Amazon CloudWatch API-error metric and use Amazon SES for notification.

D. Publish a custom metric on Amazon CloudWatch and use Amazon SNS for notification.

A

D. Publish a custom metric on Amazon CloudWatch and use Amazon SNS for notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Developer has an application that can upload tens of thousands of objects per second to Amazon S3 in parallel within a single AWS account. As part of new requirements, data stored in S3 must use server side encryption with AWS KMS (SSE-KMS). After creating this change, performance of the application is slower.

Which of the following is MOST likely the cause of the application latency?

A. Amazon S3 throttles the rate at which uploaded objects can be encrypted using Customer Master Keys.

B. The AWS KMS API calls limit is less than needed to achieve the desired performance.

C. The client encryption of the objects is using a poor algorithm.

D. KMS requires that an alias be used to create an independent display name that can be mapped to a CMK.

A

B. The AWS KMS API calls limit is less than needed to achieve the desired performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A company wants to migrate its web application to AWS and leverage Auto Scaling to handle pear workloads. The Solutions Architect determined that the best metric for an Auto Scaling event is the number of concurrent users.
Based on this information, what should the Developer use to autoscale based on concurrent users?

A. An Amazon SNS topic to be triggered when a concurrent user threshold is met

B. An Amazon Cloudwatch Networkin metric

C. Amazon CloudFront to leverage AWS Edge Locations

D. A Custom Amazon CloudWatch metric for concurrent users.

A

D. A Custom Amazon CloudWatch metric for concurrent users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A company is migrating its on-premises database to Amazon RDS for MySQL. The company has read-heavy workloads, and wants to make sure it re-factors its code to achieve optimum read performance for its queries.
How can this objective be met?

A. Add database retries to effectively use RDS with vertical scaling
B. Use RDS with multi-AZ deployment
C. Add a connection string to use an RDS read replica for read queries
D. Add a connection string to use a read replica on an EC2 instance.

A

C. Add a connection string to use an RDS read replica for read queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A Developer is receiving HTTP 400: ThrottlingException errors intermittently when calling the Amazon CloudWatch API. When a call fails, no data is retrieved.
What best practice should first be applied to address this issue?

A. Contact AWS Support for a limit increase.
B. Use the AWS CLI to get the metrics
C. Analyze the applications and remove the API call
D. Retry the call with exponential backoff

A

D. Retry the call with exponential backoff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A Developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB. In the local development environment, the application has used IAM access keys. The application is now ready for deployment onto an ECS cluster.

How should the application authenticate with AWS services in production?

A. Configure an ECS task IAM role for the application to use

B. Refactor the application to call AWS STS AssumeRole based on an instance role

C. Configure AWS access key/secret access key environment variables with new credentials

D. Configure the credentials file with a new access key/secret access key

A

A. Configure an ECS task IAM role for the application to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A Developer created a Lambda function for a web application backend. When testing the Lambda function from the AWS Lambda console, the Developer can see that the function is being executed, but there is no log data being generated in Amazon CloudWatch Logs, even after several minutes.

What could cause this situation?

A. The Lambda function does not have any explicit log statements for the log data to send it to CloudWatch Logs.

B. The Lambda function is missing CloudWatch Logs as a source trigger to send log data.

C. The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs.

D. The Lambda function is missing a target CloudWatch Log group.

A

C. The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An application has hundreds of users. Each user may use multiple devices to access the application. The Developer wants to assign unique identifiers to these users regardless of the device they use.

Which of the following methods should be used to obtain unique identifiers?

A. Create a user table in Amazon DynamoDB as key-value pairs of users and their devices. Use these keys as unique identifiers.

B. Use IAM-generated access key IDs for the users as the unique identifier, but do not store secret keys.

C. Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.

D. Assign IAM users and roles to the users. Use the unique IAM resource ID as the unique identifier.

A

C. Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An application is designed to use Amazon SQS to manage messages from many independent senders. Each sender’s messages must be processed in the order they are received.

Which SQS feature should be implemented by the Developer?

A. Configure each sender with a unique MessageGroupId

B. Enable MessageDeduplicationIds on the SQS queue

C. Con figure each message with unique MessageGroupIds.

D. Enable ContentBasedDeduplication on the SQS queue

A

A. Configure each sender with a unique MessageGroupId

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A deployment package uses the AWS CLI to copy files into any S3 bucket in the account, using access keys stored in environment variables. The package is running on EC2 instances, and the instances have been modified to run with an assumed IAM role and a more restrictive policy that allows access to only one bucket. After the change, the Developer logs into the host and still has the ability to write into all of the S3 buckets in that account.

What is the MOST likely cause of this situation?

A. An IAM inline policy is being used on the IAM role

B. An IAM managed policy is being used on the IAM role

C. The AWS CLI is corrupt and needs to be reinstalled

D. The AWS credential provider looks for instance profile credentials last

A

D. The AWS credential provider looks for instance profile credentials last

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A Developer is writing transactions into a DynamoDB table called SystemUpdates that has 5 write capacity units.
Which option has the highest read throughput?

A. Eventually consistent reads of 5 read capacity units reading items that are 4 KB in size

B. Strongly consistent reads of 5 read capacity units reading items that are 4 KB in size

C. Eventually consistent reads of 15 read capacity units reading items that are 1 KB in size

D. Strongly consistent reads of 15 read capacity units reading items that are 1 KB in size

A

A. Eventually consistent reads of 5 read capacity units reading items that are 4 KB in size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Where should an Elastic Beanstalk configuration file named healthcheckur1.config be placed in the application source bundle?

A. In the root of the application
B. In the bin folder
C. In healthcheckur1.config.ebextension under root
D. In the .ebextensions folder

A

D. In the .ebextensions folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

During non-peak hours, a Developer wants to minimize the execution time of a full Amazon DynamoDB table scan without affecting normal workloads. The workloads average half of the strongly consistent read capacity units during non-peak hours.
How would the Developer optimize this scan?

A. Use parallel scans while limiting the rate

B. Use sequential scans

C. Increase read capacity units during the scan operation

D. Change consistency to eventually consistent during the scan operation

A

A. Use parallel scans while limiting the rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A Developer is creating a Lambda function and will be using external libraries that are not included in the standard Lambda libraries.
What action would minimize the Lambda compute time consumed?

A. Install the dependencies and external libraries at the beginning of the Lambda function.

B. Create a Lambda deployment package that includes the external libraries.

C. Copy the external libraries to Amazon S3, and reference the external libraries to the S3 location.

D. Install the external libraries in Lambda to be available to all Lambda functions.

A

B. Create a Lambda deployment package that includes the external libraries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A Developer is writing a Linux-based application to run on AWS Elastic Beanstalk. Application requirements state that the application must maintain full capacity during updates while minimizing cost.

Which type of Elastic Beanstalk deployment policy should the Developer specify for the environment?

A. Immutable
B. Rolling
C. All at Once
D. Rolling with additional batch

A

D. Rolling with additional batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An application under development is required to store hundreds of video files. The data must be encrypted within the application prior to storage, with a unique key for each video file.
How should the Developer code the application?

A. Use the KMS Encrypt API to encrypt the data. Store the encrypted data key and data.

B. Use a cryptography library to generate an encryption key for the application. Use the encryption key to encrypt the data. Store the encrypted data.

C. Use the KMS GenerateDataKey API to get a data key. Encrypt the data with the data key. Store the encrypted data key and data.

D. Upload the data to an S3 bucket using server side-encryption with an AWS KMS key.

A

C. Use the KMS GenerateDataKey API to get a data key. Encrypt the data with the data key. Store the encrypted data key and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A Developer is asked to implement a caching layer in front of Amazon RDS. Cached content is expensive to regenerate in case of service failure. Which implementation below would work while maintaining maximum uptime?

A. Implement Amazon ElastiCache Redis in Cluster Mode

B. Install Redis on an Amazon EC2 instance.

C. Implement Amazon ElastiCache Memcached.

D. Migrate the database to Amazon Redshift.

A

A. Implement Amazon ElastiCache Redis in Cluster Mode

39
Q

A Developer is creating an application that needs to locate the public IPv4 address of the Amazon EC2 instance on which it runs. How can the application locate this information?

A. Get the instance metadata by retrieving http://169.254.169.254/latest/metadata/.

B. Get the instance user data by retrieving http://169.254.169.254/latest/userdata/.

C. Get the application to run IFCONFIG to get the public IP address.

D. Get the application to run IPCONFIG to get the public IP address.

A

A. Get the instance metadata by retrieving http://169.254.169.254/latest/metadata/.

40
Q

The Lambda function below is being called through an API using Amazon API Gateway. The average execution time for the Lambda function is about 1 second.

What two actions can be taken to improve the performance of this Lambda function without increasing the cost of the solution? (Choose two.)

A. Package only the modules the Lambda function requires

B. Use Amazon DynamoDB instead of Amazon RDS

C. Move the initialization of the variable Amazon RDS connection outside of the handler function

D. Implement custom database connection pooling with the Lambda function

E. Implement local caching of Amazon RDS data so Lambda can re-use the cache

A

A. Package only the modules the Lambda function requires

C. Move the initialization of the variable Amazon RDS connection outside of the handler function

41
Q

An application will ingest data at a very high throughput from many sources and must store the data in an Amazon S3 bucket. Which service would BEST accomplish this task?

A. Amazon Kinesis Firehose
B. Amazon S3 Acceleration Transfer
C. Amazon SQS
D. Amazon SNS

A

A. Amazon Kinesis Firehose

42
Q

A Developer has setup an Amazon Kinesis Stream with 4 shards to ingest a maximum of 2500 records per second. A Lambda function has been configured to process these records.
In which order will these records be processed?

A. Lambda will receive each record in the reverse order it was placed into the stream following a LIFO (last-in, rst-out) method

B. Lambda will receive each record in the exact order it was placed into the stream following a FIFO ( first-in, first-out) method.

C. Lambda will receive each record in the exact order it was placed into the shard following a FIFO ( first-in, first-out) method. There is no guarantee of order across shards.

D. The Developer can select FIFO, ( first-in, first-out), LIFO (last-in, last-out), random, or request speci c record using the getRecords API.

A

C. Lambda will receive each record in the exact order it was placed into the shard following a FIFO ( first-in, first-out) method. There is no guarantee of order across shards.

43
Q

A static website is hosted in an Amazon S3 bucket. Several HTML pages on the site use JavaScript to download images from another Amazon S3 bucket. These images are not displayed when users browse the site.
What is the possible cause for the issue?

A. The referenced Amazon S3 bucket is in another region.

B. The images must be stored in the same Amazon S3 bucket.

C. Port 80 must be opened on the security group in which the Amazon S3 bucket is located.

D. Cross Origin Resource Sharing must be enabled on the Amazon S3 bucket.

A

D. Cross Origin Resource Sharing must be enabled on the Amazon S3 bucket.

44
Q

Amazon S3 has the following structure: S3://BUCKET/FOLDERNAME/FILENAME.zip
Which S3 best practice would optimize performance with thousands of PUT request each second to a single bucket?

A. Prefix folder names with user id; for example, s3://BUCKET/2013-FOLDERNAME/FILENAME.zip

B. Prefix file names with timestamps; for example, s3://BUCKET/FOLDERNAME/2013-26-05-15-00-00-FILENAME.zip

C. Prefix file names with random hex hashes; for example, s3://BUCKET/FOLDERNAME/23a6-FILENAME.zip

D. Prefix folder names with random hex hashes; for example, s3://BUCKET/23a6-FOLDERNAME/FILENAME.zip

A

D. Prefix folder names with random hex hashes; for example, s3://BUCKET/23a6-FOLDERNAME/FILENAME.zip

45
Q

For a deployment using AWS CodeDeploy, what is the run order of the hooks for in-place deployments?

A. Before Install -> Application Stop -> Application Start -> After Install

B. Application Stop -> Before Install -> After Install -> Application Start

C. Before Install -> Application Stop -> Validate Service -> Application Start

D. Application Stop -> Before Install -> Validate Service -> Application Start

A

B. Application Stop -> Before Install -> After Install -> Application Start

46
Q

A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol.
What services can the Developer use to meet these requirements?

A. Amazon DynamoDB to store MFA session data, and Amazon SNS to send MFA codes

B. Amazon Cognito with MFA

C. AWS Directory Service

D. AWS IAM with MFA enabled

A

B. Amazon Cognito with MFA

47
Q

A game stores user game data in an Amazon DynamoDB table. Individual users should not have access to other users’ game data. How can this be accomplished?

A. Encrypt the game data with individual user keys.

B. Restrict access to specific items based on certain primary key values.

C. Stage data in SQS queues to inject metadata before accessing DynamoDB.

D. Read records from DynamoDB and discard irrelevant data client-side.

A

B. Restrict access to specific items based on certain primary key values.

48
Q

A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as Amazon or Facebook. The APIs should allow access based on a custom authorization model.

Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs?

A. Use Amazon Cognito user pools and a custom authorizer to authenticate and authorize users based on JSON Web Tokens.

B. Build a OpenID token broker with Amazon and Facebook. Users will authenticate with these identify providers and pass the JSON Web Token to the API to authenticate each API call.

C. Store user credentials in Amazon DynamoDB and have the application retrieve temporary credentials from AWS STS. Make API calls by passing user credentials to the APIs for authentication and authorization.

D. Use Amazon RDS to store user credentials and pass them to the APIs for authentications and authorization.

A

A. Use Amazon Cognito user pools and a custom authorizer to authenticate and authorize users based on JSON Web Tokens.

49
Q

A supplier is writing a new RESTful API for customers to query the status of orders. The customers requested the following API endpoint. http://www.supplierdomain.com/status/customerID

Which of the following application designs meet the requirements? (Choose two.)

A. Amazon SQS; Amazon SNS
B. Elastic Load Balancing; Amazon EC2
C. Amazon ElastiCache; Amazon Elacticsearch Service
D. Amazon API Gateway; AWS Lambda
E. Amazon S3; Amazon CloudFront

A

B. Elastic Load Balancing; Amazon EC2

D. Amazon API Gateway; AWS Lambda

50
Q

A development team consists of 10 team members. Similar to a home directory for each team member, the manager wants to grant access to user-specific folders in an Amazon S3 bucket. For the team member with the username TeamMemberX, the snippet of the IAM policy looks like this:

https://www.examtopics.com/assets/media/exam-media/03756/0002600001.png

Instead of creating distinct policies for each team member, what approach can be used to make this policy snippet generic for all team members?

A. Use IAM policy condition
B. Use IAM policy principal
C. Use IAM policy variables
D. Use IAM policy resource

A

C. Use IAM policy variables

51
Q

A legacy service has an XML-based SOAP interface. The Developer wants to expose the functionality of the service to external clients with the Amazon API
Gateway
. Which technique will accomplish this?

A. Create a RESTful API with the API Gateway; transform the incoming JSON into a valid XML message for the SOAP interface using mapping templates.

B. Create a RESTful API with the API Gateway; pass the incoming JSON to the SOAP interface through an Application Load Balancer.

C. Create a SOAP API with the API Gateway; pass the incoming XML to the SOAP interface through an Application Load Balancer.

D. Create a SOAP API with the API Gateway; transform the incoming XML into a valid message for the SOAP interface using mapping templates.

A

A. Create a RESTful API with the API Gateway; transform the incoming JSON into a valid XML message for the SOAP interface using mapping templates.

52
Q

A company is using AWS CodeBuild to compile a website from source code stored in AWS CodeCommit. A recent change to the source code has resulted in the
CodeBuild project being unable to successfully compile the website.
How should the Developer identify the cause of the failures?

A. Modify the buildspec.yml file to include steps to send the output of build commands to Amazon CloudWatch.

B. Use a custom Docker image that includes the AWS X-Ray agent in the AWS CodeBuild project configuration.

C. Check the build logs of the failed phase in the last build attempt in the AWS CodeBuild project build history.

D. Manually re-run the build process on a local machine so that the output can be visualized.

A

C. Check the build logs of the failed phase in the last build attempt in the AWS CodeBuild project build history.

53
Q

A web application is using Amazon Kinesis Streams for clickstream data that may not be consumed for up to 12 hours.
How can the Developer implement encryption at rest for data within the Kinesis Streams?

A. Enable SSL connections to Kinesis

B. Use Amazon Kinesis Consumer Library

C. Encrypt the data once it is at rest with a Lambda function

D. Enable server-side encryption in Kinesis Streams

A

D. Enable server-side encryption in Kinesis Streams

54
Q

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughout the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available.

Which of the following could create this situation? (Choose two.)

A. The traces are reaching X-Ray, but the Developer does not have access to view the records.

B. The X-Ray daemon is not installed on the EC2 instance.

C. The X-Ray endpoint specified in the application configuration is incorrect.

D. The instance role does not have xray:BatchGetTraces and xray:GetTraceGraph permissions.

E. The instance role does not have xray:PutTraceSegments and xray:PutTelemetryRecords permissions.

A

B. The X-Ray daemon is not installed on the EC2 instance.

E. The instance role does not have xray:PutTraceSegments and xray:PutTelemetryRecords permissions.

55
Q

A Developer executed a AWS CLI command and received the error shown below:

https://www.examtopics.com/assets/media/exam-media/03756/0002800001.png

What action should the Developer perform to make this error human-readable?

A. Make a call to AWS KMS to decode the message.

B. Use the AWS STS decode-authorization-message API to decode the message.

C. Use an open source decoding library to decode the message.

D. Use the AWS IAM decode-authorization-message API to decode this message.

A

B. Use the AWS STS decode-authorization-message API to decode the message.

56
Q

A company is using Amazon API Gateway to manage access to a set of microservices implemented as AWS Lambda functions. Following a bug report, the company makes a minor breaking change to one of the APIs.
In order to avoid impacting existing clients when the new API is deployed, the company wants to allow clients six months to migrate from v1 to v2.

Which approach should the Developer use to handle this change?

A. Update the underlying Lambda function and provide clients with the new Lambda invocation URL.

B. Use API Gateway to automatically propagate the change to clients, specifying 180 days in the phased deployment parameter.

C. Use API Gateway to deploy a new stage named v2 to the API and provide users with its URL.

D. Update the underlying Lambda function, create an Amazon CloudFront distribution with the updated Lambda function as its origin.

A

C. Use API Gateway to deploy a new stage named v2 to the API and provide users with its URL.

57
Q

A company has written a Java AWS Lambda function to be triggered whenever a user uploads an image to an Amazon S3 bucket. The function converts the original image to several different formats and then copies the resulting images to another Amazon S3 bucket.
The Developers find that no images are being copied to the second Amazon S3 bucket. They have tested the code on an Amazon EC2 instance with 1GB of
RAM, and it takes an average of 500 seconds to complete.

What is the MOST likely cause of the problem?

A. The Lambda function has insu fficient memory and needs to be increased to 1 GB to match the Amazon EC2 instance

B. Files need to be copied to the same Amazon S3 bucket for processing, so the second bucket needs to be deleted.

C. Lambda functions have a maximum execution limit of 300 seconds, therefore the function is not completing.

D. There is a problem with the Java runtime for Lambda, and the function needs to be converted to node.js.

A

C. Lambda functions have a maximum execution limit of 300 seconds, therefore the function is not completing.

58
Q

An application stops working with the following error: The specified bucket does not exist. Where is the BEST place to start the root cause analysis?

A. Check the Elastic Load Balancer logs for DeleteBucket requests.

B. Check the application logs in Amazon CloudWatch Logs for Amazon S3 DeleteBucket errors.

C. Check AWS X-Ray for Amazon S3 DeleteBucket alarms.

D. Check AWS CloudTrail for a DeleteBucket event.

A

D. Check AWS CloudTrail for a DeleteBucket event.

59
Q

An organization must store thousands of sensitive audio and video files in an Amazon S3 bucket. Organizational security policies require that all data written to this bucket be encrypted.
How can compliance with this policy be ensured?

A. Use AWS Lambda to send notifications to the security team if unencrypted objects are pun in the bucket.

B. Configure an Amazon S3 bucket policy to prevent the upload of objects that do not contain the x-amz-server-side-encryption header.

C. Create an Amazon CloudWatch event rule to verify that all objects stored in the Amazon S3 bucket are encrypted.

D. Configure an Amazon S3 bucket policy to prevent the upload of objects that contain the x-amz-server-side-encryption header.

A

B. Configure an Amazon S3 bucket policy to prevent the upload of objects that do not contain the x-amz-server-side-encryption header.

60
Q

An application overwrites an object in Amazon S3, and then immediately reads the same object. Why would the application sometimes retrieve the old version of the object?

A. S3 overwrite PUTS are eventually consistent, so the application may read the old object.

B. The application needs to add extra metadata to label the latest version when uploading to Amazon S3.

C. All S3 PUTS are eventually consistent, so the application may read the old object.

D. The application needs to explicitly specify latest version when retrieving the object.

A

A. S3 overwrite PUTS are eventually consistent, so the application may read the old object.

61
Q

The release process workflow of an application requires a manual approval before the code is deployed into the production environment.
What is the BEST way to achieve this using AWS CodePipeline?

A. Use multiple pipelines to allow approval
B. Use an approval action in a stage
C. Disable the stage transition to allow manual approval
D. Disable a stage just prior the deployment stage

A

B. Use an approval action in a stage

62
Q

Where should the appspec.yml file be placed in order for AWS CodeDeploy to work?

A. In the root of the application source code directory structure

B. In the bin folder along with all the complied code

C. In an S3 bucket

D. In the same folder as the application configuration files

A

A. In the root of the application source code directory structure

63
Q

An existing serverless application processes uploaded image files. The process currently uses a single Lambda function that takes an image file, performs the processing, and stores the file in Amazon S3. Users of the application now require thumbnail generation of the images. Users want to avoid any impact to the time it takes to perform the image uploads.

How can thumbnail generation be added to the application, meeting user requirements while minimizing changes to existing code?

A. Change the existing Lambda function handling the uploads to create thumbnails at the time of upload. Have the function store both the image and thumbnail in Amazon S3.

B. Create a second Lambda function that handles thumbnail generation and storage. Change the existing Lambda function to invoke it asynchronously.

C. Create an S3 event notification with a Lambda function destination. Create a new Lambda function to generate and store thumbnails.

D. Create an S3 event notification to an SQS Queue. Create a scheduled Lambda function that processes the queue, and generates and stores thumbnails.

A

C. Create an S3 event notification with a Lambda function destination. Create a new Lambda function to generate and store thumbnails.

64
Q

A Developer must re-implement the business logic for an order fulfillment system. The business logic has to make requests to multiple vendors to decide where to purchase an item. The whole process can take up to a week to complete.
What is the MOST efficient and SIMPLEST way to implement a system that meets these requirements?

A. Use AWS Step Functions to execute parallel Lambda functions, and join the results.

B. Create an AWS SQS for each vendor, poll the queue from a worker instance, and joint the results.

C. Use AWS Lambda to asynchronously call a Lambda function for each vendor, and join the results.

D. Use Amazon CloudWatch Events to orchestrate the Lambda functions.

A

A. Use AWS Step Functions to execute parallel Lambda functions, and join the results.

65
Q

A customer wants to deploy its source code on an AWS Elastic Beanstalk environment. The customer needs to perform deployment with minimal outage and should only use existing instances to retain application access log.
What deployment policy would satisfy these requirements?

A. Rolling
B. All at once
C. Rolling with an additional batch
D. Immutable

A

A. Rolling

66
Q

A Developer has been asked to build a real-time dashboard web application to visualize the key prefixes and storage size of objects in Amazon S3 buckets.
Amazon DynamoDB will be used to store the Amazon S3 metadata.

What is the optimal and MOST cost-effective design to ensure that the real-time dashboard is kept up to date with the state of the objects in the Amazon S3 buckets?

A. Use an Amazon CloudWatch event backed by an AWS Lambda function. Issue an Amazon S3 API call to get a list of all Amazon S3 objects and persist the metadata within DynamoDB. Have the web application poll the DynamoDB table to reflect this change.

B. Use Amazon S3 Event Notification backed by a Lambda function to persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.

C. Run a cron job within an Amazon EC2 instance to list all objects within Amazon S3 and persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.

D. Create a new Amazon EMR cluster to get all the metadata about Amazon S3 objects; persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.

A

B. Use Amazon S3 Event Notification backed by a Lambda function to persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.

67
Q

A Developer must repeatedly and consistently deploy a serverless RESTful API on AWS.
Which techniques will work? (Choose two.)

A. Define a Swagger file. Use AWS Elastic Beanstalk to deploy the Swagger file.

B. Define a Swagger file. Use AWS CodeDeploy to deploy the Swagger file.

C. Deploy a SAM template with an inline Swagger definition.

D. Define a Swagger file. Deploy a SAM template that references the Swagger file.

E. Define an inline Swagger definition in a Lambda function. Invoke the Lambda function.

A

C. Deploy a SAM template with an inline Swagger definition.

D. Define a Swagger file. Deploy a SAM template that references the Swagger file.

68
Q

A set of APIs are exposed to customers using the Amazon API Gateway. These APIs have caching enabled on the API Gateway. Customers have asked for an option to invalidate this cache for each of the APIs.

What action can be taken to allow API customers to invalidate the API Cache?

A. Ask customers to use AWS credentials to call the InvalidateCache API.

B. Ask customers to invoke an AWS API endpoint which invalidates the cache.

C. Ask customers to pass an HTTP header called Cache-Control:max-age=0.

D. Ask customers to add a query string parameter called INVALIDATE_CACHE when making an API call.

A

C. Ask customers to pass an HTTP header called Cache-Control:max-age=0.

69
Q

A Developer uses AWS CodeDeploy to automate application deployment that connects to an external MySQL database. The Developer wants to securely access the encrypted secrets, such as API keys and database passwords.

Which of the following solutions would involve the LEAST administrative effort?

A. Save the secrets in Amazon S3 with AWS KMS server-side encryption, and use a signed URL to access them by using the IAM role from Amazon EC2 instances.

B. Use the instance metadata to store the secrets and to programmatically access the secrets from EC2 instances.

C. Use the Amazon DynamoDB client-side encryption library to save the secrets in DynamoDB and to programmatically access the secrets from EC2 instances.

D. Use AWS SSM Parameter Store to store the secrets and to programmatically access them by using the IAM role from EC2 instances.

A

D. Use AWS SSM Parameter Store to store the secrets and to programmatically access them by using the IAM role from EC2 instances.

70
Q

An application running on EC2 instances is storing data in an S3 bucket. Security policy mandates that all data must be encrypted in transit.
How can the Developer ensure that all traffic to the S3 bucket is encrypted?

A. Install certificates on the EC2 instances.

B. Create a bucket policy that allows traffic where SecureTransport is true.

C. Create an HTTPS redirect on the EC2 instances.

D. Create a bucket policy that denies traffic where SecureTransport is false.

A

D. Create a bucket policy that denies traffic where SecureTransport is false.

71
Q

A company is developing a new online game that will run on top of Amazon ECS. Four distinct Amazon ECS services will be part of the architecture, each requiring specific permissions to various AWS services. The company wants to optimize the use of the underlying Amazon EC2 instances by bin packing the containers based on memory reservation.

Which configuration would allow the Development team to meet these requirements MOST securely?

A. Create a new Identity and Access Management (IAM) instance profile containing the required permissions for the various ECS services, then associate that instance role with the underlying EC2 instances.

B. Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS service to reference the associated IAM role.

C. Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then, create an IAM group and configure the ECS cluster to reference that group.

D. Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS task definition to referenׁce the associated IAM role.

A

D. Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS task definition to referenׁce the associated IAM role.

72
Q

A company needs to encrypt data at rest, but it wants to leverage an AWS managed service using its own master key.
Which of the following AWS service can be used to meet these requirements?

A. SSE with Amazon S3
B. SSE with AWS KMS
C. Client-side encryption
D. AWS IAM roles and policies

A

B. SSE with AWS KMS

73
Q

When a Developer tries to run an AWS CodeBuild project, it raises an error because the length of all environment variables exceeds the limit for the combined maximum of characters.
What is the recommended solution?

A. Add the export LC_ALL=ג€en_US.utf8ג€ command to the pre_build section to ensure POSIX localization.

B. Use Amazon Cognito to store key-value pairs for large numbers of environment variables.

C. Update the settings for the build project to use an Amazon S3 bucket for large numbers of environment variables.

D. Use AWS Systems Manager Parameter Store to store large numbers of environment variables.

A

D. Use AWS Systems Manager Parameter Store to store large numbers of environment variables.

74
Q

A Lambda function is packaged for deployment to multiple environments, including development, test, production, etc. Each environment has unique set of resources such as databases, etc.
How can the Lambda function use the resources for the current environment?

A. Apply tags to the Lambda functions.

B. Hardcore resources in the source code.

C. Use environment variables for the Lambda functions.

D. Use separate function for development and production.

A

C. Use environment variables for the Lambda functions.

75
Q

The Developer for a retail company must integrate a fraud detection solution into the order processing solution. The fraud detection solution takes between ten and thirty minutes to verify an order. At peak, the web site can receive one hundred orders per minute.

What is the most scalable method to add the fraud detection solution to the order processing pipeline?

A. Add all new orders to an Amazon SQS queue. Configure a fleet of 10 EC2 instances spanning multiple AZs with the fraud detection solution installed on them to pull orders from this queue. Update the order with a pass or fails status.

B. Add all new orders to an SQS queue. Configure an Auto Scaling group that uses the queue depth metric as its unit of scale to launch a dynamically-sized fleet of EC2 instances spanning multiple AZs with the fraud detection solution installed on them to pull orders from this queue. Update the order with a pass or fails status.

C. Add all new orders to an Amazon Kinesis Stream. Subscribe a Lambda function to automatically read batches of records from the Kinesis Stream. The Lambda function includes the fraud detection software and will update the order with a pass or fail status.

D. Write all new orders to Amazon DynamoDB. Configure DynamoDB Streams to include all new orders. Subscribe a Lambda function to automatically read batches of records from the Kinesis Stream. The Lambda function includes the fraud detection software and will update the order with a pass or fail status.

A

B. Add all new orders to an SQS queue. Configure an Auto Scaling group that uses the queue depth metric as its unit of scale to launch a dynamically-sized fleet of EC2 instances spanning multiple AZs with the fraud detection solution installed on them to pull orders from this queue. Update the order with a pass or fails status.

76
Q

A Developer is creating a mobile application with a limited budget. The solution requires a scalable service that will enable customers to sign up and authenticate into the mobile application while using the organization’s current SAML 2.0 identity provider.
Which AWS service should be used to meet these requirements?

A. AWS Lambda
B. Amazon Cognito
C. AWS IAM
D. Amazon EC2

A

B. Amazon Cognito

77
Q

An application is real-time processing millions of events that are received through an API.
What service could be used to allow multiple consumers to process the data concurrently and MOST cost-effectively?

A. Amazon SNS with fanout to an SQS queue for each application

B. Amazon SNS with fanout to an SQS FIFO (first-in, first-out) queue for each application

C. Amazon Kinesis Firehouse

D. Amazon Kinesis Streams

A

D. Amazon Kinesis Streams

78
Q

A Developer needs to use AWS X-Ray to monitor an application that is deployed on EC2 instances.
What steps have to be executed to perform the monitoring?

A. Deploy the X-Ray SDK with the application and use X-Ray annotation.

B. Install the X-Ray daemon and instrument the application code.

C. Install the X-Ray daemon and configure it to forward data to Amazon CloudWatch Events.

D. Deploy the X-Ray SDK with the application and instrument the application code.

A

B. Install the X-Ray daemon and instrument the application code.

79
Q

A Developer will be using the AWS CLI on a local development server to manage AWS services.
What can be done to ensure that the CLI uses the Developer’s IAM permissions when making commands?

A. Specify the Developer’s IAM access key ID and secret access key as parameters for each CLI command.

B. Run the aws configure CLI command, and provide the Developer’s IAM access key ID and secret access key.

C. Specify the Developer’s IAM user name and password as parameters for each CLI command.

D. Use the Developer’s IAM role when making the CLI command.

A

B. Run the aws configure CLI command, and provide the Developer’s IAM access key ID and secret access key.

80
Q

After installing the AWS CLI, a Developer tries to run the command aws configure but receives the following error:

Error: aws: command not found -

What is the most likely cause of this error?

A. The aws executable is not in the PATH environment variable.

B. Access to the aws executable has been denied to the installer.

C. Incorrect AWS credentials were provided.

D. The aws script does not have an executable file mode.

A

A. The aws executable is not in the PATH environment variable.

81
Q

An on-premises legacy application is caching data files locally and writing shared images to local disks.
What is necessary to allow for horizontal scaling when migrating the application to AWS?

A. Modify the application to have both shared images and caching data written to Amazon EBS.

B. Modify the application to read and write cache data on Amazon S3, and also store shared images on S3.

C. Modify the application to use Amazon S3 for serving shared images; cache data can then be written to local disks.

D. Modify the application to read and write cache data on Amazon S3, while continuing to write shared images to local disks.

A

B. Modify the application to read and write cache data on Amazon S3, and also store shared images on S3.

82
Q

A Developer must trigger an AWS Lambda function based on the item lifecycle activity in an Amazon DynamoDB table.
How can the Developer create the solution?

A. Enable a DynamoDB stream that publishes an Amazon SNS message. Trigger the Lambda function synchronously from the SNS message.

B. Enable a DynamoDB stream that publishes an SNS message. Trigger the Lambda function asynchronously from the SNS message.

C. Enable a DynamoDB stream, and trigger the Lambda function synchronously from the stream.

D. Enable a DynamoDB stream, and trigger the Lambda function asynchronously from the stream.

A

C. Enable a DynamoDB stream, and trigger the Lambda function synchronously from the stream.

83
Q

A gaming company is developing a mobile game application for iOSֲ® and Androidֲ® platforms. This mobile game securely stores user data locally on the device.
The company wants to allow users to use multiple devices for the game, which requires user data synchronization across devices.

Which service should be used to synchronize user data across devices without the need to create a backend application?

A. AWS Lambda
B. Amazon S3
C. Amazon DynamoDB
D. Amazon Cognito

A

D. Amazon Cognito

84
Q

An on-premises application is implemented using a Linux, Apache, MySQL and PHP (LAMP) stack. The Developer wants to run this application in AWS.
Which of the following sets of AWS services can be used to run this stack?

A. Amazon API Gateway, Amazon S3
B. AWS Lambda, Amazon DynamoDB
C. Amazon EC2, Amazon Aurora
D. Amazon Cognito, Amazon RDS
E. Amazon ECS, Amazon EBS

A

C. Amazon EC2, Amazon Aurora

85
Q

An application displays a status dashboard. The status is updated by 1 KB messages from an SQS queue. Although the status changes infrequently, the Developer must minimize the time between the message arrival in the queue and the dashboard update.

What technique provides the shortest delay in updating the dashboard?

A. Retrieve the messages from the queue using long polling every 20 seconds.

B. Reduce the size of the messages by compressing them before sending.

C. Retrieve the messages from the queue using short polling every 10 seconds.

D. Reduce the size of each message payload by sending it in two parts.

A

A. Retrieve the messages from the queue using long polling every 20 seconds.

86
Q

A company is using AWS CodePipeline to deliver one of its applications. The delivery pipeline is triggered by changes to the master branch of an AWS CodeCommit repository and uses AWS CodeBuild to implement the test and build stages of the process and AWS CodeDeploy to deploy the application.
The pipeline has been operating successfully for several months and there have been no modifications. Following a recent change to the application’s source code, AWS CodeDeploy has not deployed the updates application as expected.

What are the possible causes? (Choose two.)

A. The change was not made in the master branch of the AWS CodeCommit repository.

B. One of the earlier stages in the pipeline failed and the pipeline has terminated.

C. One of the Amazon EC2 instances in the company’s AWS CodePipeline cluster is inactive.

D. The AWS CodePipeline is incorrectly configured and is not executing AWS CodeDeploy.

E. AWS CodePipeline does not have permissions to access AWS CodeCommit.

A

A. The change was not made in the master branch of the AWS CodeCommit repository.

B. One of the earlier stages in the pipeline failed and the pipeline has terminated.

87
Q

A social media company is using Amazon Cognito in order to synchronize profiles across different mobile devices, to enable end users to have a seamless experience.

Which of the following configurations can be used to silently notify users whenever an update is available on all other devices?

A. Modify the user pool to include all the devices which keep them in sync.

B. Use the SyncCallback interface to receive notifications on the application.

C. Use an Amazon Cognito stream to analyze the data and push the notifications.

D. Use the push synchronization feature with the appropriate IAM role.

A

D. Use the push synchronization feature with the appropriate IAM role.

88
Q

A website’s page load times are gradually increasing as more users access the system at the same time. Analysis indicates that a user profile is being loaded from a database in all the web pages being visited by each user and this is increasing the database load and the page load latency. To address this issue the Developer decides to cache the user profile data.

Which caching strategy will address this situation MOST efficiently?

A. Create a new Amazon EC2 Instance and run a NoSQL database on it. Cache the profile data within this database using the write-through caching strategy.

B. Create an Amazon ElastiCache cluster to cache the user profile data. Use a cache-aside caching strategy.

C. Use a dedicated Amazon RDS instance for caching profile data. Use a write-through caching strategy.

D. Create an ElastiCache cluster to cache the user profile data. Use a write-through caching strategy.

A

B. Create an Amazon ElastiCache cluster to cache the user profile data. Use a cache-aside caching strategy.

89
Q

An application needs to use the IP address of the client in its processing. The application has been moved into AWS and has been placed behind an Application Load Balancer (ALB). However, all the client IP addresses now appear to be the same. The application must maintain the ability to scale horizontally.

Based on this scenario, what is the MOST cost-effective solution to this problem?

A. Remove the application from the ALB. Delete the ALB and change Amazon Route 53 to direct traffic to the instance running the application.

B. Remove the application from the ALB. Create a Classic Load Balancer in its place. Direct traffic to the application using the HTTP protocol.

C. Alter the application code to inspect the X-Forwarded-For header. Ensure that the code can work properly if a list of IP addresses is passed in the header.

D. Alter the application code to inspect a custom header. Alter the client code to pass the IP address in the custom header.

A

C. Alter the application code to inspect the X-Forwarded-For header. Ensure that the code can work properly if a list of IP addresses is passed in the header.

90
Q

A development team is using AWS Elastic Beanstalk to deploy a two-tier application that consists of a load-balanced web tier and an Amazon RDS database tier in production. The team would like to separate the RDS instance from the Elastic Beanstalk.

How can this be accomplished?

A. Use the Elastic Beanstalk CLI to disassociate the database.

B. Use the AWS CLI to disassociate the database.

C. Change the deployment policy to disassociate the database.

D. Recreate a new Elastic Beanstalk environment without Amazon RDS.

A

D. Recreate a new Elastic Beanstalk environment without Amazon RDS.

91
Q

According to best practice, how should access keys be managed in AWS? (Choose two.)

A. Use the same access key in all applications for consistency.

B. Delete all access keys for the account root user.

C. Leave unused access keys in the account for tracking purposes.

D. Embed and encrypt access keys in code for continuous deployment.

E. Use Amazon IAM roles instead of access keys where possible.

A

B. Delete all access keys for the account root user.

E. Use Amazon IAM roles instead of access keys where possible.

92
Q

The development team is working on an API that will be served from Amazon API gateway. The API will be served from three environments: development, test, and production. The API Gateway is configured to use 237 GB of cache in all three stages.

Which is the MOST cost-efficient deployment strategy?

A. Create a single API Gateway with all three stages.

B. Create three API Gateways, one for each stage in a single AWS account.

C. Create an API Gateway in three separate AWS accounts.

D. Enable the cache for development and test environments only when needed.

A

D. Enable the cache for development and test environments only when needed.

93
Q

An application running on an Amazon Linux EC2 instance needs to manage the AWS infrastructure.
How can the EC2 instance be configured to make AWS API calls securely?

A. Sign the AWS CLI command using the signature version 4 process.

B. Run the aws configure AWS CLI command and specify the access key id and secret access key.

C. Specify a role for the EC2 instance with the necessary privileges.

D. Pass the access key id and secret access key as parameters for each AWS CLI command.

A

C. Specify a role for the EC2 instance with the necessary privileges.