0% found this document useful (0 votes)
2 views7 pages

File Viewer

The document contains a series of practice questions and answers for the AWS Certified Developer - Associate (DVA-C02) exam, focusing on various AWS services and best practices. It includes scenarios related to Amazon EC2, S3, DynamoDB, and API Gateway, among others, with correct answers provided for each question. Additionally, it promotes Clearcat.Net as a resource for certification exam dumps and interview Q&A PDFs.

Uploaded by

2w47gb26nb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views7 pages

File Viewer

The document contains a series of practice questions and answers for the AWS Certified Developer - Associate (DVA-C02) exam, focusing on various AWS services and best practices. It includes scenarios related to Amazon EC2, S3, DynamoDB, and API Gateway, among others, with correct answers provided for each question. Additionally, it promotes Clearcat.Net as a resource for certification exam dumps and interview Q&A PDFs.

Uploaded by

2w47gb26nb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Amazon

Clearcat.Net | FIRST ATTEMPT PASS | WWW.CLEARCATNET.COM


(DVA-C02)
AWS Certified Developer - Associate DVA-C02

✅Follow us on: Facebook | Instagram | LinkedIn | reddit | Twitter | Quora | YouTube


Send us your request/inquiry at clearcat.net@gmail.com or connect us for Live Support any time for any certification exam dumps
pdf Or for most asked Interview Q&A PDFs to ensure your success in first try!!

YouTube.com t.Me
/CLEARCATNET /CLEARCATNET

Get any exam latest real exam questions PDF Now-


✅Visit us - www.CLEARCATNET.com
✅Mail us- clearcat.net@gmail.com
✅Live Support- https://t.me/CLEARCATNET
Question:1 DVA-C02: Actual Exam Q&A | CLEARCATNET
A company is implementing an application on Amazon EC2 instances. The application needs to process incoming
transactions. When the application detects a transaction that is not valid, the application must send a chat message
to the company's support team. To send the message, the application needs to retrieve the access token to
authenticate by using the chat API.
A developer needs to implement a solution to store the access token. The access token must be encrypted at rest
and in transit. The access token must also be accessible from other AWS accounts.
Which solution will meet these requirements with the LEAST management overhead?
• A. Use an AWS Systems Manager Parameter Store SecureString parameter that uses an AWS Key
Management Service (AWS KMS) AWS managed key to store the access token. Add a resource-based policy
to the parameter to allow access from other accounts. Update the IAM role of the EC2 instances with
permissions to access Parameter Store. Retrieve the token from Parameter Store with the decrypt flag
enabled. Use the decrypted access token to send the message to the chat.
• B. Encrypt the access token by using an AWS Key Management Service (AWS KMS) customer managed key.
Store the access token in an Amazon DynamoDB table. Update the IAM role of the EC2 instances with
permissions to access DynamoDB and AWS KMS. Retrieve the token from DynamoDDecrypt the token by
using AWS KMS on the EC2 instances. Use the decrypted access token to send the message to the chat.
• C. Use AWS Secrets Manager with an AWS Key Management Service (AWS KMS) customer managed key to
store the access token. Add a resource-based policy to the secret to allow access from other accounts.
Update the IAM role of the EC2 instances with permissions to access Secrets Manager. Retrieve the token
from Secrets Manager. Use the decrypted access token to send the message to the chat.
• D. Encrypt the access token by using an AWS Key Management Service (AWS KMS) AWS managed key. Store
the access token in an Amazon S3 bucket. Add a bucket policy to the S3 bucket to allow access from other
accounts. Update the IAM role of the EC2 instances with permissions to access Amazon S3 and AWS KMS.
Retrieve the token from the S3 bucket. Decrypt the token by using AWS KMS on the EC2 instances. Use the
decrypted access token to send the massage to the chat.

Correct Answer: C

Question:2 DVA-C02: Actual Exam Q&A | CLEARCATNET


A company is running Amazon EC2 instances in multiple AWS accounts. A developer needs to implement an
application that collects all the lifecycle events of the EC2 instances. The application needs to store the lifecycle
events in a single Amazon Simple Queue Service (Amazon SQS) queue in the company's main AWS account for
further processing.
Which solution will meet these requirements?
• A. Configure Amazon EC2 to deliver the EC2 instance lifecycle events from all accounts to the Amazon
EventBridge event bus of the main account. Add an EventBridge rule to the event bus of the main account
that matches all EC2 instance lifecycle events. Add the SQS queue as a target of the rule.
• B. Use the resource policies of the SQS queue in the main account to give each account permissions to write
to that SQS queue. Add to the Amazon EventBridge event bus of each account an EventBridge rule that
matches all EC2 instance lifecycle events. Add the SQS queue in the main account as a target of the rule.
• C. Write an AWS Lambda function that scans through all EC2 instances in the company accounts to detect
EC2 instance lifecycle changes. Configure the Lambda function to write a notification message to the SQS
queue in the main account if the function detects an EC2 instance lifecycle change. Add an Amazon
EventBridge scheduled rule that invokes the Lambda function every minute.
• D. Configure the permissions on the main account event bus to receive events from all accounts. Create an
Amazon EventBridge rule in each account to send all the EC2 instance lifecycle events to the main account
event bus. Add an EventBridge rule to the main account event bus that matches all EC2 instance lifecycle
events. Set the SQS queue as a target for the rule.

Correct Answer: D

Question:3 DVA-C02: Actual Exam Q&A | CLEARCATNET


An application is using Amazon Cognito user pools and identity pools for secure access. A developer wants to
integrate the user-specific file upload and download features in the application with Amazon S3. The developer must
ensure that the files are saved and retrieved in a secure manner and that users can access only their own files. The
file sizes range from 3 KB to 300 MB.
Which option will meet these requirements with the HIGHEST level of security?
• A. Use S3 Event Notifications to validate the file upload and download requests and update the user
interface (UI).
• B. Save the details of the uploaded files in a separate Amazon DynamoDB table. Filter the list of files in the
user interface (UI) by comparing the current user ID with the user ID associated with the file in the table.
• C. Use Amazon API Gateway and an AWS Lambda function to upload and download files. Validate each
request in the Lambda function before performing the requested operation.
• D. Use an IAM policy within the Amazon Cognito identity prefix to restrict users to use their own folders in
Amazon S3.

Correct Answer: D

Question:4 DVA-C02: Actual Exam Q&A | CLEARCATNET


A company is building a scalable data management solution by using AWS services to improve the speed and agility
of development. The solution will ingest large volumes of data from various sources and will process this data
through multiple business rules and transformations.
The solution requires business rules to run in sequence and to handle reprocessing of data if errors occur when the
business rules run. The company needs the solution to be scalable and to require the least possible maintenance.
Which AWS service should the company use to manage and automate the orchestration of the data flows to meet
these requirements?
• A. AWS Batch
• B. AWS Step Functions
• C. AWS Glue
• D. AWS Lambda

Correct Answer: B

Question:5 DVA-C02: Actual Exam Q&A | CLEARCATNET


A developer has created an AWS Lambda function that is written in Python. The Lambda function reads data from
objects in Amazon S3 and writes data to an Amazon DynamoDB table. The function is successfully invoked from an
S3 event notification when an object is created. However, the function fails when it attempts to write to the
DynamoDB table.
What is the MOST likely cause of this issue?
• A. The Lambda function's concurrency limit has been exceeded.
• B. DynamoDB table requires a global secondary index (GSI) to support writes.
• C. The Lambda function does not have IAM permissions to write to DynamoDB.
• D. The DynamoDB table is not running in the same Availability Zone as the Lambda function.

Correct Answer: C

Question:6 DVA-C02: Actual Exam Q&A | CLEARCATNET


A developer is creating an AWS CloudFormation template to deploy Amazon EC2 instances across multiple AWS
accounts. The developer must choose the EC2 instances from a list of approved instance types.
How can the developer incorporate the list of approved instance types in the CloudFormation template?
• A. Create a separate CloudFormation template for each EC2 instance type in the list.
• B. In the Resources section of the CloudFormation template, create resources for each EC2 instance type in
the list.
• C. In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.
• D. In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues.

Correct Answer: D

Question:7 DVA-C02: Actual Exam Q&A | CLEARCATNET


A developer has an application that makes batch requests directly to Amazon DynamoDB by using the BatchGetItem
low-level API operation. The responses frequently return values in the UnprocessedKeys element.
Which actions should the developer take to increase the resiliency of the application when the batch response
includes values in UnprocessedKeys? (Choose two.)
• A. Retry the batch operation immediately.
• B. Retry the batch operation with exponential backoff and randomized delay.
• C. Update the application to use an AWS software development kit (AWS SDK) to make the requests.
• D. Increase the provisioned read capacity of the DynamoDB tables that the operation accesses.
• E. Increase the provisioned write capacity of the DynamoDB tables that the operation accesses.

Correct Answer: BD

Question:8 DVA-C02: Actual Exam Q&A | CLEARCATNET


A company is running a custom application on a set of on-premises Linux servers that are accessed using Amazon API
Gateway. AWS X-Ray tracing has been enabled on the API test stage.
How can a developer enable X-Ray tracing on the on-premises servers with the LEAST amount of configuration?
• A. Install and run the X-Ray SDK on the on-premises servers to capture and relay the data to the X-Ray
service.
• B. Install and run the X-Ray daemon on the on-premises servers to capture and relay the data to the X-Ray
service.
• C. Capture incoming requests on-premises and configure an AWS Lambda function to pull, process, and relay
relevant data to X-Ray using the PutTraceSegments API call.
• D. Capture incoming requests on-premises and configure an AWS Lambda function to pull, process, and relay
relevant data to X-Ray using the PutTelemetryRecords API call.

Correct Answer: B

Question:9 DVA-C02: Actual Exam Q&A | CLEARCATNET


A company wants to share information with a third party. The third party has an HTTP API endpoint that the
company can use to share the information. The company has the required API key to access the HTTP API.
The company needs a way to manage the API key by using code. The integration of the API key with the application
code cannot affect application performance.
Which solution will meet these requirements MOST securely?
• A. Store the API credentials in AWS Secrets Manager. Retrieve the API credentials at runtime by using the
AWS SDK. Use the credentials to make the API call.
• B. Store the API credentials in a local code variable. Push the code to a secure Git repository. Use the local
code variable at runtime to make the API call.
• C. Store the API credentials as an object in a private Amazon S3 bucket. Restrict access to the S3 object by
using IAM policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to
make the API call.
• D. Store the API credentials in an Amazon DynamoDB table. Restrict access to the table by using resource-
based policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make
the API call.

Correct Answer: A

Question:10 DVA-C02: Actual Exam Q&A | CLEARCATNET


A developer is deploying a new application to Amazon Elastic Container Service (Amazon ECS). The developer needs
to securely store and retrieve different types of variables. These variables include authentication information for a
remote API, the URL for the API, and credentials. The authentication information and API URL must be available to all
current and future deployed versions of the application across development, testing, and production environments.
How should the developer retrieve the variables with the FEWEST application changes?
• A. Update the application to retrieve the variables from AWS Systems Manager Parameter Store. Use unique
paths in Parameter Store for each variable in each environment. Store the credentials in AWS Secrets
Manager in each environment.
• B. Update the application to retrieve the variables from AWS Key Management Service (AWS KMS). Store the
API URL and credentials as unique keys for each environment.
• C. Update the application to retrieve the variables from an encrypted file that is stored with the application.
Store the API URL and credentials in unique files for each environment.
• D. Update the application to retrieve the variables from each of the deployed environments. Define the
authentication information and API URL in the ECS task definition as unique names during the deployment
process.

Correct Answer: A

Question:11 DVA-C02: Actual Exam Q&A | CLEARCATNET


A company is migrating legacy internal applications to AWS. Leadership wants to rewrite the internal employee
directory to use native AWS services. A developer needs to create a solution for storing employee contact details
and high-resolution photos for use with the new application.
Which solution will enable the search and retrieval of each employee's individual details and high-resolution photos
using AWS APIs?
• A. Encode each employee's contact information and photos using Base64. Store the information in an
Amazon DynamoDB table using a sort key.
• B. Store each employee's contact information in an Amazon DynamoDB table along with the object keys for
the photos stored in Amazon S3.
• C. Use Amazon Cognito user pools to implement the employee directory in a fully managed software-as-a-
service (SaaS) method.
• D. Store employee contact information in an Amazon RDS DB instance with the photos stored in Amazon
Elastic File System (Amazon EFS).

Correct Answer: B

Question:12 DVA-C02: Actual Exam Q&A | CLEARCATNET


A developer is creating an application that will give users the ability to store photos from their cellphones in the
cloud. The application needs to support tens of thousands of users. The application uses an Amazon API Gateway
REST API that is integrated with AWS Lambda functions to process the photos. The application stores details about
the photos in Amazon DynamoDB.
Users need to create an account to access the application. In the application, users must be able to upload photos
and retrieve previously uploaded photos. The photos will range in size from 300 KB to 5 MB.
Which solution will meet these requirements with the LEAST operational overhead?
• A. Use Amazon Cognito user pools to manage user accounts. Create an Amazon Cognito user pool authorizer
in API Gateway to control access to the API. Use the Lambda function to store the photos and details in the
DynamoDB table. Retrieve previously uploaded photos directly from the DynamoDB table.
• B. Use Amazon Cognito user pools to manage user accounts. Create an Amazon Cognito user pool authorizer
in API Gateway to control access to the API. Use the Lambda function to store the photos in Amazon S3.
Store the object's S3 key as part of the photo details in the DynamoDB table. Retrieve previously uploaded
photos by querying DynamoDB for the S3 key.
• C. Create an IAM user for each user of the application during the sign-up process. Use IAM authentication to
access the API Gateway API. Use the Lambda function to store the photos in Amazon S3. Store the object's
S3 key as part of the photo details in the DynamoDB table. Retrieve previously uploaded photos by querying
DynamoDB for the S3 key.
• D. Create a users table in DynamoDB. Use the table to manage user accounts. Create a Lambda authorizer
that validates user credentials against the users table. Integrate the Lambda authorizer with API Gateway to
control access to the API. Use the Lambda function to store the photos in Amazon S3. Store the object's S3
key as par of the photo details in the DynamoDB table. Retrieve previously uploaded photos by querying
DynamoDB for the S3 key.

Correct Answer: B

Question:13 DVA-C02: Actual Exam Q&A | CLEARCATNET


A company receives food orders from multiple partners. The company has a microservices application that uses
Amazon API Gateway APIs with AWS Lambda integration. Each partner sends orders by calling a customized API that
is exposed through API Gateway. The API call invokes a shared Lambda function to process the orders.
Partners need to be notified after the Lambda function processes the orders. Each partner must receive updates for
only the partner's own orders. The company wants to add new partners in the future with the fewest code changes
possible.
Which solution will meet these requirements in the MOST scalable way?
• A. Create a different Amazon Simple Notification Service (Amazon SNS) topic for each partner. Configure the
Thank you for Trying our Free
Sample Questions
But We Recommend try our Premium Exam Material (Full Premium
PDF) dumps in PDF Format to certain your Guaranteed success in First
Attempt Only.
VISIT US NOW TO DOWNLOAD FULL PDF INSTANTLY 👇

https://www.clearcatnet.com/Papers

Send us your request/inquiry at clearcat.net@gmail.com or connect us for Live Support any time for any certification exam dumps
pdf Or for most asked Interview Q&A PDFs to ensure your success in first try!!

Get any exam latest real exam questions PDF Now- YouTube.com

/CLEARCATNET
✅Visit us - www.clearcatnet.com
t.Me
✅Mail us- clearcat.net@gmail.com
/CLEARCATNET
✅Live Support- https://t.me/clearcatnet

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy