Module 10 - Examen Test B
Module 10 - Examen Test B
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2
Question B.1
A company needs to distribute firmware updates to its customers around the world.
Which service will allow easy and secure control of the access to the downloads at the lowest cost?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 3
Question B.2
A company is running an application built on AWS Lambda functions. One Lambda function has
performance issues when it has to download a 50MB file from the Internet in every execution. This
function is called multiple times a second.
What solution would give the BEST performance increase?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 4
Question B.2
A company is running an application built on AWS Lambda functions. One Lambda function has
performance issues when it has to download a 50MB file from the Internet in every execution. This
function is called multiple times a second.
What solution would give the BEST performance increase?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 5
Question B.3
An application writes items to an Amazon DynamoDB table. As the application scales to thousands of
instances, calls to the DynamoDB API generate occasional ThrottlingException errors. The application is
coded in a language incompatible with the AWS SDK.
How should the error be handled?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 6
Question B.3
An application writes items to an Amazon DynamoDB table. As the application scales to thousands of
instances, calls to the DynamoDB API generate occasional ThrottlingException errors. The application is
coded in a language incompatible with the AWS SDK.
How should the error be handled?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 7
Question B.4
An application deployed on AWS Elastic Beanstalk experiences increased error rates during deployments
of new application versions, resulting in service degradation for users. The Development team believes
that this is because of the reduction in capacity during the deployment steps. The team would like to
change the deployment policy configuration of the environment to an option that maintains full capacity
during deployment while using the existing instances.
Which deployment policy will meet these requirements while using the existing instances?
A. All at once
B. Rolling
C. Rolling with additional batch
D. Immutable
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 8
Question B.4
An application deployed on AWS Elastic Beanstalk experiences increased error rates during deployments
of new application versions, resulting in service degradation for users. The Development team believes
that this is because of the reduction in capacity during the deployment steps. The team would like to
change the deployment policy configuration of the environment to an option that maintains full capacity
during deployment while using the existing instances.
Which deployment policy will meet these requirements while using the existing instances?
A. All at once
B. Rolling
C. Rolling with additional batch
D. Immutable
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 9
Question B.5
A Developer is working on an application that handles 10MB documents that contain highly-sensitive
data. The application will use AWS KMS to perform client- side encryption.
What steps must be followed?
A. Invoke the Encrypt API passing the plaintext data that must be encrypted, then
reference the customer managed key ARN in the KeyId parameter
B. Invoke the GenerateRandom API to get a data encryption key, then use the data
encryption key to encrypt the data
C. Invoke the GenerateDataKey API to retrieve the encrypted version of the data
encryption key to encrypt the data
D. Invoke the GenerateDataKey API to retrieve the plaintext version of the data
encryption key to encrypt the data
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 10
Question B.5
A Developer is working on an application that handles 10MB documents that contain highly-sensitive
data. The application will use AWS KMS to perform client- side encryption.
What steps must be followed?
A. Invoke the Encrypt API passing the plaintext data that must be encrypted, then
reference the customer managed key ARN in the KeyId parameter
B. Invoke the GenerateRandom API to get a data encryption key, then use the data
encryption key to encrypt the data
C. Invoke the GenerateDataKey API to retrieve the encrypted version of the data
encryption key to encrypt the data
D. Invoke the GenerateDataKey API to retrieve the plaintext version of the data
encryption key to encrypt the data
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 11
Question B.6
A Developer is building a web application that uses Amazon API Gateway to expose an AWS Lambda
function to process requests from clients. During testing, the Developer notices that the API Gateway
times out even though the Lambda function finishes under the set time limit.
Which of the following API Gateway metrics in Amazon CloudWatch can help the Developer
troubleshoot the issue? (Choose TWO.)
A. CacheHitCount
B. IntegrationLatency
C. CacheMissCount
D. Latency
E. Count AD
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 12
Question B.6
A Developer is building a web application that uses Amazon API Gateway to expose an AWS Lambda
function to process requests from clients. During testing, the Developer notices that the API Gateway
times out even though the Lambda function finishes under the set time limit.
Which of the following API Gateway metrics in Amazon CloudWatch can help the Developer
troubleshoot the issue? (Choose TWO.)
A. CacheHitCount
B. IntegrationLatency
C. CacheMissCount
D. Latency
E. Count AD
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 13
Question B.7
An AWS Lambda function must access an external site by using a regularly rotated user name and
password. These items must be kept securely and cannot be stored in the function code.
What combination of AWS services can be used to accomplish this? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 14
Question B.7
An AWS Lambda function must access an external site by using a regularly rotated user name and
password. These items must be kept securely and cannot be stored in the function code.
What combination of AWS services can be used to accomplish this? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 15
Question B.8
A Developer is trying to deploy a serverless application using AWS CodeDeploy. The application was
updated and needs to be redeployed.
What file does the Developer need to update to push that change through CodeDeploy?
A. dockerrun.aws.json
B. buildspec.yml
C. appspec.yml
D. ebextensions.config
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 16
Question B.8
A Developer is trying to deploy a serverless application using AWS CodeDeploy. The application was
updated and needs to be redeployed.
What file does the Developer need to update to push that change through CodeDeploy?
A. dockerrun.aws.json
B. buildspec.yml
C. appspec.yml
D. ebextensions.config
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 17
Question B.9
A Developer wants to upload data to Amazon S3 and must encrypt the data in transit.
Which of the following solutions will accomplish this task? (Choose TWO.)
A. Set up hardware VPN tunnels to a VPC and access S3 through a VPC endpoint
B. Set up Client-Side Encryption with an AWS KMS-Managed Customer Master Key
C. Set up Server-Side Encryption with AWS KMS-Managed Keys
D. Transfer the data over an SSL connection
E. Set up Server-Side Encryption with S3-Managed Keys
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 18
Question B.9
A Developer wants to upload data to Amazon S3 and must encrypt the data in transit.
Which of the following solutions will accomplish this task? (Choose TWO.)
A. Set up hardware VPN tunnels to a VPC and access S3 through a VPC endpoint
B. Set up Client-Side Encryption with an AWS KMS-Managed Customer Master Key
C. Set up Server-Side Encryption with AWS KMS-Managed Keys
D. Transfer the data over an SSL connection
E. Set up Server-Side Encryption with S3-Managed Keys
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 19
Question B.10
A company is running a Docker application on Amazon ECS. The application must scale based on user
load in the last 15 seconds.
How should a Developer instrument the code so that the requirement can be met?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 20
Question B.10
A company is running a Docker application on Amazon ECS. The application must scale based on user
load in the last 15 seconds.
How should a Developer instrument the code so that the requirement can be met?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 21
Question B.11
A company needs to ingest terabytes of data each hour from thousands of sources that are delivered
almost continually throughout the day. The volume of messages generated varies over the course of the
day. Messages must be delivered in real time for fraud detection and live operational dashboards.
Which approach will meet these requirements?
A. Send the messages to an Amazon SQS queue, then process the messages by
using a fleet of Amazon EC2 instances
B. Use the Amazon S3 API to write messages to an S3 bucket, then process the
messages by using Amazon Redshift
C. Use AWS Data Pipeline to automate the movement and transformation of data
D. Use Amazon Kinesis Data Streams with Kinesis Client Library to ingest and deliver
messages
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 22
Question B.11
A company needs to ingest terabytes of data each hour from thousands of sources that are delivered
almost continually throughout the day. The volume of messages generated varies over the course of the
day. Messages must be delivered in real time for fraud detection and live operational dashboards.
Which approach will meet these requirements?
A. Send the messages to an Amazon SQS queue, then process the messages by
using a fleet of Amazon EC2 instances
B. Use the Amazon S3 API to write messages to an S3 bucket, then process the
messages by using Amazon Redshift
C. Use AWS Data Pipeline to automate the movement and transformation of data
D. Use Amazon Kinesis Data Streams with Kinesis Client Library to ingest and deliver
messages
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 23
Question B.12
A Developer accesses AWS CodeCommit over SSH. The SSH keys
configured to access AWS CodeCommit are tied to a user with the
following permissions. The Developer needs to create/delete branches.
Which specific IAM permissions need to be added, based on the
principle of least privilege?
A. "codecommit:CreateBranch" "codecommit:DeleteBranch"
B. "codecommit:Put*"
C. "codecommit:Update*"
D. "codecommit:*"
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 24
Question B.12
A Developer accesses AWS CodeCommit over SSH. The SSH keys
configured to access AWS CodeCommit are tied to a user with the
following permissions. The Developer needs to create/delete branches.
Which specific IAM permissions need to be added, based on the
principle of least privilege?
A. "codecommit:CreateBranch" "codecommit:DeleteBranch"
B. "codecommit:Put*"
C. "codecommit:Update*"
D. "codecommit:*"
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 25
Question B.13
A Developer has been asked to create an AWS Lambda function that is triggered any time updates are
made to items in an Amazon DynamoDB table. The function has been created, and appropriate
permissions have been added to the Lambda execution role. Amazon DynamoDB streams have been
enabled for the table, but the function is still not being triggered.
Which option would enable DynamoDB table updates to trigger the Lambda function?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 26
Question B.13
A Developer has been asked to create an AWS Lambda function that is triggered any time updates are
made to items in an Amazon DynamoDB table. The function has been created, and appropriate
permissions have been added to the Lambda execution role. Amazon DynamoDB streams have been
enabled for the table, but the function is still not being triggered.
Which option would enable DynamoDB table updates to trigger the Lambda function?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 27
Question B.14
An application is being developed to audit several AWS accounts. The application will run in Account A
and must access AWS services in Accounts B and C.
What is the MOST secure way to allow the application to call AWS services in each audited account?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 28
Question B.14
An application is being developed to audit several AWS accounts. The application will run in Account A
and must access AWS services in Accounts B and C.
What is the MOST secure way to allow the application to call AWS services in each audited account?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 29
Question B.15
A Developer is building a three-tier web application that should be able to handle a minimum of 5000
requests per minute. Requirements state that the web tier should be completely stateless while the
application maintains session state for the users.
How can session data be externalized, keeping latency at the LOWEST possible value?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 32
Question B.16
An Amazon DynamoDB table uses a Global Secondary Index (GSI) to support read queries. The primary
table is write-heavy, whereas the GSI is used for read operations. Looking at Amazon CloudWatch
metrics, the Developer notices that write operations to the primary table are throttled frequently under
heavy write activity. However, write capacity units to the primary table are available and not fully
consumed.
Why is the table being throttled?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 33
Question B.17
A company runs an e-commerce website that uses Amazon DynamoDB where pricing for items is
dynamically updated in real time. At any given time, multiple updates may occur simultaneously for
pricing information on a particular product. This is causing the original editor's changes to be overwritten
without a proper review process.
Which DynamoDB write option should be selected to prevent this overwriting?
A. Concurrent writes
B. Conditional writes
C. Atomic writes
D. Batch writes
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 34
Question B.17
A company runs an e-commerce website that uses Amazon DynamoDB where pricing for items is
dynamically updated in real time. At any given time, multiple updates may occur simultaneously for
pricing information on a particular product. This is causing the original editor's changes to be overwritten
without a proper review process.
Which DynamoDB write option should be selected to prevent this overwriting?
A. Concurrent writes
B. Conditional writes
C. Atomic writes
D. Batch writes
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 35
Question B.18
A company needs a version control system for collaborative software development. Features of the
system must include the following:
✑ Support for batches of changes across multiple files
✑ Parallel branching
✑ Version tracking
Which AWS service will meet these requirements?
A. AWS CodePipeline
B. Amazon S3
C. AWS Code Build
D. AWS CodeCommit
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 36
Question B.18
A company needs a version control system for collaborative software development. Features of the
system must include the following:
✑ Support for batches of changes across multiple files
✑ Parallel branching
✑ Version tracking
Which AWS service will meet these requirements?
A. AWS CodePipeline
B. Amazon S3
C. AWS Code Build
D. AWS CodeCommit
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 37
Question B.19
A company is using continuous integration and continuous delivery systems. A Developer now needs to
automate a software package deployment to both Amazon EC2 instances and virtual servers running on-
premises.
Which AWS service should be used to accomplish this?
A. AWS CodePipeline
B. AWS CodeBuild
C. AWS Elastic Beanstalk
D. AWS CodeDeploy
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 38
Question B.19
A company is using continuous integration and continuous delivery systems. A Developer now needs to
automate a software package deployment to both Amazon EC2 instances and virtual servers running on-
premises.
Which AWS service should be used to accomplish this?
A. AWS CodePipeline
B. AWS CodeBuild
C. AWS Elastic Beanstalk
D. AWS CodeDeploy
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 39
Question B.20
A Developer created a new AWS account and must create a scalable AWS Lambda function that meets
the following requirements for concurrent execution:
✑ Average execution time of 100 seconds
✑ 50 requests per second
Which step must be taken prior to deployment to prevent errors?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 40
Question B.20
A Developer created a new AWS account and must create a scalable AWS Lambda function that meets
the following requirements for concurrent execution:
✑ Average execution time of 100 seconds
✑ 50 requests per second
Which step must be taken prior to deployment to prevent errors?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 41
Question B.21
A Development team wants to instrument their code to provide more detailed information to AWS X-Ray
than simple outgoing and incoming requests. This will generate large amounts of data, so the
Development team wants to implement indexing so they can filter the data.
What should the Development team do to achieve this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 42
Question B.21
A Development team wants to instrument their code to provide more detailed information to AWS X-Ray
than simple outgoing and incoming requests. This will generate large amounts of data, so the
Development team wants to implement indexing so they can filter the data.
What should the Development team do to achieve this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 43
Question B.22
A team of Developers must migrate an application running inside an AWS Elastic Beanstalk environment
from a Classic Load Balancer to an Application Load Balancer.
Which steps should be taken to accomplish the task using the AWS Management Console?
A. 1. Update the application code in the existing deployment. 2. Select a new load balancer
type before running the deployment. 3. Deploy the new version of the application code to
the environment.
B. 1. Create a new environment with the same configurations except for the load balancer
type. 2. Deploy the same application version as used in the original environment. 3. Run
the swap-environment-cnames action.
C. 1. Clone the existing environment, changing the associated load balancer type. 2. Deploy
the same application version as used in the original environment. 3. Run the swap-
environment-cnames action.
D. 1. Edit the environment definitions in the existing deployment. 2. Change the associated
load balancer type according to the requirements. 3. Rebuild the environment with the
new load balancer type.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 44
Question B.22
A team of Developers must migrate an application running inside an AWS Elastic Beanstalk environment
from a Classic Load Balancer to an Application Load Balancer.
Which steps should be taken to accomplish the task using the AWS Management Console?
A. 1. Update the application code in the existing deployment. 2. Select a new load balancer
type before running the deployment. 3. Deploy the new version of the application code to
the environment.
B. 1. Create a new environment with the same configurations except for the load balancer
type. 2. Deploy the same application version as used in the original environment. 3. Run
the swap-environment-cnames action.
C. 1. Clone the existing environment, changing the associated load balancer type. 2. Deploy
the same application version as used in the original environment. 3. Run the swap-
environment-cnames action.
D. 1. Edit the environment definitions in the existing deployment. 2. Change the associated
load balancer type according to the requirements. 3. Rebuild the environment with the
new load balancer type.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 45
Question B.23
A Developer must encrypt a 100-GB object using AWS KMS.
What is the BEST approach?
A. Make an Encrypt API call to encrypt the plaintext data as ciphertext using a
customer master key (CMK)
B. Make an Encrypt API call to encrypt the plaintext data as ciphertext using a
customer master key (CMK) with imported key material
C. Make an GenerateDataKey API call that returns a plaintext key and an encrypted
copy of a data key. Use a plaintext key to encrypt the data
D. Make an GenerateDataKeyWithoutPlaintext API call that returns an encrypted
copy of a data key. Use an encrypted key to encrypt the data
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 46
Question B.23
A Developer must encrypt a 100-GB object using AWS KMS.
What is the BEST approach?
A. Make an Encrypt API call to encrypt the plaintext data as ciphertext using a
customer master key (CMK)
B. Make an Encrypt API call to encrypt the plaintext data as ciphertext using a
customer master key (CMK) with imported key material
C. Make an GenerateDataKey API call that returns a plaintext key and an encrypted
copy of a data key. Use a plaintext key to encrypt the data
D. Make an GenerateDataKeyWithoutPlaintext API call that returns an encrypted
copy of a data key. Use an encrypted key to encrypt the data
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 47
Question B.24
A Development team would like to migrate their existing application code from a GitHub repository to
AWS CodeCommit.
What needs to be created before they can migrate a cloned repository to CodeCommit over HTTPS?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 48
Question B.24
A Development team would like to migrate their existing application code from a GitHub repository to
AWS CodeCommit.
What needs to be created before they can migrate a cloned repository to CodeCommit over HTTPS?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 49
Question B.25
A Developer is writing a REST service that will add items to a shopping list. The service is built on
Amazon API Gateway with AWS Lambda integrations. The shopping list items are send as query string
parameters in the method request.
How should the Developer convert the query string parameters to arguments for the Lambda function?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 50
Question B.25
A Developer is writing a REST service that will add items to a shopping list. The service is built on
Amazon API Gateway with AWS Lambda integrations. The shopping list items are send as query string
parameters in the method request.
How should the Developer convert the query string parameters to arguments for the Lambda function?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 51
Question B.26
When developing an AWS Lambda function that processes Amazon Kinesis Data Streams,
Administrators within the company must receive a notice that includes the processed data.
How should the Developer write the function to send processed data to the Administrators?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 52
Question B.26
When developing an AWS Lambda function that processes Amazon Kinesis Data Streams,
Administrators within the company must receive a notice that includes the processed data.
How should the Developer write the function to send processed data to the Administrators?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 53
Question B.27
A Developer is storing documents in Amazon S3 that will require encryption at rest. The encryption keys
must be rotated annually, at least.
What is the easiest way to achieve this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 54
Question B.27
A Developer is storing documents in Amazon S3 that will require encryption at rest. The encryption keys
must be rotated annually, at least.
What is the easiest way to achieve this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 55
Question B.28
A company is creating a REST service using an Amazon API Gateway with AWS Lambda integration.
The service run different versions for testing purposes.
What would be the BEST way to accomplish this?
A. Use an x-Version header to denote which version is being called and pass that
header to the Lambda function(s)
B. Create an API Gateway Lambda authorizer to route API clients to the correct API
version
C. Create an API Gateway resource policy to isolate versions and provide context to
the Lambda function(s)
D. Deploy the API versions as unique stages with unique endpoints and use stage
variables to provide further context
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 56
Question B.28
A company is creating a REST service using an Amazon API Gateway with AWS Lambda integration.
The service run different versions for testing purposes.
What would be the BEST way to accomplish this?
A. Use an x-Version header to denote which version is being called and pass that
header to the Lambda function(s)
B. Create an API Gateway Lambda authorizer to route API clients to the correct API
version
C. Create an API Gateway resource policy to isolate versions and provide context to
the Lambda function(s)
D. Deploy the API versions as unique stages with unique endpoints and use stage
variables to provide further context
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 57
Question B.29
A company wants to implement authentication for its new REST service using Amazon API Gateway. To
authenticate the calls, each request must include HTTP headers with a client ID and user ID. These
credentials must be compared to authentication data in an Amazon DynamoDB table.
What MUST the company do to implement this authentication in API Gateway?
A. Make sure Amazon RDS is Multi-AZ so it can better absorb increased traffic.
B. Create an RDS Read Replica and direct all read traffic to the replica.
C. Implement Amazon ElastiCache in front of Amazon RDS to buffer the write
traffic.
D. Use Amazon DynamoDB instead of Amazon RDS to buffer the read traffic.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 60
Question B.30
An Amazon RDS database instance is used by many applications to look up historical data. The query
rate is relatively constant. When the historical data is updated each day, the resulting write traffic slows
the read query performance and affects all application users.
What can be done to eliminate the performance impact on application users?
A. Make sure Amazon RDS is Multi-AZ so it can better absorb increased traffic.
B. Create an RDS Read Replica and direct all read traffic to the replica.
C. Implement Amazon ElastiCache in front of Amazon RDS to buffer the write
traffic.
D. Use Amazon DynamoDB instead of Amazon RDS to buffer the read traffic.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 61
Question B.31
Company C is currently hosting their corporate site in an Amazon S3 bucket with Static Website Hosting
enabled. Currently, when visitors go to http:// www.companyc.com the index.html page is returned.
Company C now would like a new page welcome.html to be returned when a visitor enters http://
www.companyc.com in the browser.
Which of the following steps will allow Company C to meet this requirement? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 62
Question B.31
Company C is currently hosting their corporate site in an Amazon S3 bucket with Static Website Hosting
enabled. Currently, when visitors go to http:// www.companyc.com the index.html page is returned.
Company C now would like a new page welcome.html to be returned when a visitor enters http://
www.companyc.com in the browser.
Which of the following steps will allow Company C to meet this requirement? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 63
Question B.32
What type of block cipher does Amazon S3 offer for server-side encryption?
A. Triple DES
B. Advanced Encryption Standard
C. Blowfish
D. RC5
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 64
Question B.32
What type of block cipher does Amazon S3 offer for server-side encryption?
A. Triple DES
B. Advanced Encryption Standard
C. Blowfish
D. RC5
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 65
Question B.33
If an application is storing hourly log files from thousands of instances from a high traffic web site,
which naming scheme would give optimal performance on S3?
A. Sequential
B. instanceID_log-HH-DD-MM-YYYY
C. instanceID_log-YYYY-MM-DD-HH
D. HH-DD-MM-YYYY-log_instanceID
E. YYYY-MM-DD-HH-log_instanceID
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 66
Question B.33
If an application is storing hourly log files from thousands of instances from a high traffic web site,
which naming scheme would give optimal performance on S3?
A. Sequential
B. instanceID_log-HH-DD-MM-YYYY
C. instanceID_log-YYYY-MM-DD-HH
D. HH-DD-MM-YYYY-log_instanceID
E. YYYY-MM-DD-HH-log_instanceID
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 67
Question B.34
Which of the following statements about SQS is true?
A. Messages will be delivered exactly once and messages will be delivered in First in,
First out order
B. Messages will be delivered exactly once and message delivery order is
indeterminate
C. Messages will be delivered one or more times and messages will be delivered in
First in, First out order
D. Messages will be delivered one or more times and message delivery order is
indeterminate
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 68
Question B.34
Which of the following statements about SQS is true?
A. Messages will be delivered exactly once and messages will be delivered in First in,
First out order
B. Messages will be delivered exactly once and message delivery order is
indeterminate
C. Messages will be delivered one or more times and messages will be delivered in
First in, First out order
D. Messages will be delivered one or more times and message delivery order is
indeterminate
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 69
Question B.35
A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via
IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in
users can only access an S3 keyspace specific to the user.
Which two approaches can satisfy the objectives? (Choose TWO.)
A. The application authenticates against LDAP. The application then calls the IAM Security Service to
login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to
access the appropriate S3 bucket.
B. The application authenticates against LDAP, and retrieves the name of an IAM role associated with the
user. The application then calls the IAM Security Token Service to assume that IAM Role. The
application can use the temporary credentials to access the appropriate S3 bucket.
C. The application authenticates against IAM Security Token Service using the LDAP credentials. The
application uses those temporary AWS security credentials to access the appropriate S3 bucket.
D. Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token
Service to get IAM federated user credentials. The application calls the identity broker to get IAM
federated user credentials with access to the appropriate S3 bucket.
E. Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM
Role to get temporary AWS security credentials. The application calls the identity broker to get AWS
temporary security credentials with access to the appropriate S3 bucket.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 70
Question B.35
A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via
IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in
users can only access an S3 keyspace specific to the user.
Which two approaches can satisfy the objectives? (Choose TWO.)
A. The application authenticates against LDAP. The application then calls the IAM Security Service to
login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to
access the appropriate S3 bucket.
B. The application authenticates against LDAP, and retrieves the name of an IAM role associated with the
user. The application then calls the IAM Security Token Service to assume that IAM Role. The
application can use the temporary credentials to access the appropriate S3 bucket.
C. The application authenticates against IAM Security Token Service using the LDAP credentials. The
application uses those temporary AWS security credentials to access the appropriate S3 bucket.
D. Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token
Service to get IAM federated user credentials. The application calls the identity broker to get IAM
federated user credentials with access to the appropriate S3 bucket.
E. Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM
Role to get temporary AWS security credentials. The application calls the identity broker to get AWS
temporary security credentials with access to the appropriate S3 bucket.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 71
Question B.36
Company B provides an online image recognition service and utilizes SQS to decouple system
components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-
to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is
burning CPU cycles and increasing costs with empty responses.
How can Company B reduce the number of empty responses?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 72
Question B.36
Company B provides an online image recognition service and utilizes SQS to decouple system
components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-
to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is
burning CPU cycles and increasing costs with empty responses.
How can Company B reduce the number of empty responses?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 73
Question B.37
An Amazon S3 bucket, "myawsbucket" is configured with website hosting in Tokyo region, what is the
region-specific website endpoint?
A. www.myawsbucket.ap-northeast-1.amazonaws.com
B. myawsbucket.s3-website-ap-northeast-1.amazonawscom
C. myawsbucket.amazonaws.com
D. myawsbucket.tokyo.amazonaws.com
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 74
Question B.37
An Amazon S3 bucket, "myawsbucket" is configured with website hosting in Tokyo region, what is the
region-specific website endpoint?
A. www.myawsbucket.ap-northeast-1.amazonaws.com
B. myawsbucket.s3-website-ap-northeast-1.amazonawscom
C. myawsbucket.amazonaws.com
D. myawsbucket.tokyo.amazonaws.com
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 75
Question B.38
You are inserting 1000 new items every second in a DynamoDB table. Once an hour these items are
analyzed and then are no longer needed. You need to minimize provisioned throughput, storage, and API
calls.
Given these requirements, what is the most efficient way to manage these Items after the analysis?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 76
Question B.38
You are inserting 1000 new items every second in a DynamoDB table. Once an hour these items are
analyzed and then are no longer needed. You need to minimize provisioned throughput, storage, and API
calls.
Given these requirements, what is the most efficient way to manage these Items after the analysis?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 77
Question B.39
You have written an application that uses the Elastic Load Balancing service to spread traffic to several
web servers. Your users complain that they are sometimes forced to login again in the middle of using
your application, after they have already logged in. This is not behavior you have designed.
What is a possible solution to prevent this happening?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 78
Question B.39
You have written an application that uses the Elastic Load Balancing service to spread traffic to several
web servers. Your users complain that they are sometimes forced to login again in the middle of using
your application, after they have already logged in. This is not behavior you have designed.
What is a possible solution to prevent this happening?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 79
Question B.40
You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some
point you find out that other sites have been linking to the photos on your site, causing loss to your
business.
What is an effective method to mitigate this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 80
Question B.40
You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some
point you find out that other sites have been linking to the photos on your site, causing loss to your
business.
What is an effective method to mitigate this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 81
Question B.41
Which statements about DynamoDB are true? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 82
Question B.41
Which statements about DynamoDB are true? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 83
Question B.42
You are providing AWS consulting services for a company developing a new mobile application that will
be leveraging Amazon SNS Mobile Push for push notifications. In order to send direct notification
messages to individual devices each device registration identifier or token needs to be registered with
SNS; however the developers are not sure of the best way to do this.
You advise them to:
A. Bulk upload the device tokens contained in a CSV file via the AWS Management
Console.
B. Let the push notification service (e.g. Amazon Device Messaging) handle the
registration.
C. Implement a token vending service to handle the registration.
D. Call the CreatePlatformEndPoint API function to register multiple device tokens.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 84
Question B.42
You are providing AWS consulting services for a company developing a new mobile application that will
be leveraging Amazon SNS Mobile Push for push notifications. In order to send direct notification
messages to individual devices each device registration identifier or token needs to be registered with
SNS; however the developers are not sure of the best way to do this.
You advise them to:
A. Bulk upload the device tokens contained in a CSV file via the AWS Management
Console.
B. Let the push notification service (e.g. Amazon Device Messaging) handle the
registration.
C. Implement a token vending service to handle the registration.
D. Call the CreatePlatformEndPoint API function to register multiple device tokens.
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 85
Question B.43
You are writing to a DynamoDB table and receive the following exception:"
ProvisionedThroughputExceededException". though according to your CloudWatch metrics for the table,
you are not exceeding your provisioned throughput.
What could be an explanation for this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 86
Question B.43
You are writing to a DynamoDB table and receive the following exception:"
ProvisionedThroughputExceededException". though according to your CloudWatch metrics for the table,
you are not exceeding your provisioned throughput.
What could be an explanation for this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 87
Question B.44
Which of the following services are included at no additional cost with the use of the AWS platform?
(Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 88
Question B.44
Which of the following services are included at no additional cost with the use of the AWS platform?
(Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 89
Question B.45
Your application is trying to upload a 6 GB file to Simple Storage Service and receive a "Your proposed
upload exceeds the maximum allowed object size." error message.
What is a possible solution for this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 90
Question B.45
Your application is trying to upload a 6 GB file to Simple Storage Service and receive a "Your proposed
upload exceeds the maximum allowed object size." error message.
What is a possible solution for this?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 91
Question B.46
What AWS products and features can be deployed by Elastic Beanstalk? (Choose THREE.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 92
Question B.46
What AWS products and features can be deployed by Elastic Beanstalk? (Choose THREE.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 93
Question B.47
Games-R-Us is launching a new game app for mobile devices. Users will log into the game using their
existing Facebook account and the game will record player data and scoring information directly to a
DynamoDB table.
What is the most secure approach for signing requests to the DynamoDB API?
A. Create an IAM user with access credentials that are distributed with the mobile
app to sign the requests
B. Distribute the AWS root account access credentials with the mobile app to sign
the requests
C. Request temporary security credentials using web identity federation to sign the
requests
D. Establish cross account access between the mobile app and the DynamoDB table
to sign the requests
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 94
Question B.47
Games-R-Us is launching a new game app for mobile devices. Users will log into the game using their
existing Facebook account and the game will record player data and scoring information directly to a
DynamoDB table.
What is the most secure approach for signing requests to the DynamoDB API?
A. Create an IAM user with access credentials that are distributed with the mobile
app to sign the requests
B. Distribute the AWS root account access credentials with the mobile app to sign
the requests
C. Request temporary security credentials using web identity federation to sign the
requests
D. Establish cross account access between the mobile app and the DynamoDB table
to sign the requests
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 95
Question B.48
Which of the following programming languages have an officially supported AWS SDK? (Choose
TWO.)
A. Perl
B. PHP
C. Pascal
D. Java
E. SQL
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 96
Question B.48
Which of the following programming languages have an officially supported AWS SDK? (Choose
TWO.)
A. Perl
B. PHP
C. Pascal
D. Java
E. SQL
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 97
Question B.49
A meteorological system monitors 600 temperature gauges, obtaining temperature samples every minute
and saving each sample to a DynamoDB table. Each sample involves writing 1K of data and the writes
are evenly distributed over time.
How much write throughput is required for the target table?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 98
Question B.49
A meteorological system monitors 600 temperature gauges, obtaining temperature samples every minute
and saving each sample to a DynamoDB table. Each sample involves writing 1K of data and the writes
are evenly distributed over time.
How much write throughput is required for the target table?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 99
Question B.50
In DynamoDB, what type of HTTP response codes indicate that a problem was found with the client
request sent to the service?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 100
Question B.50
In DynamoDB, what type of HTTP response codes indicate that a problem was found with the client
request sent to the service?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 101
Question B.51
Company C has recently launched an online commerce site for bicycles on AWS. They have a "Product"
DynamoDB table that stores details for each bicycle, such as, manufacturer, color, price, quantity and size
to display in the online store. Due to customer demand, they want to include an image for each bicycle
along with the existing details.
Which approach below provides the least impact to provisioned throughput on the "Product" table?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 104
Question B.52
Which DynamoDB limits can be raised by contacting AWS support? (Choose TWO.)
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 105
Question B.53
When a Simple Queue Service message triggers a task that takes 5 minutes to complete, which process
below will result in successful processing of the message and remove it from the queue while minimizing
the chances of duplicate processing?
A. Retrieve the message with an increased visibility timeout, process the message,
delete the message from the queue
B. Retrieve the message with an increased visibility timeout, delete the message
from the queue, process the message
C. Retrieve the message with increased DelaySeconds, process the message, delete
the message from the queue
D. Retrieve the message with increased DelaySeconds, delete the message from the
queue, process the message
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 106
Question B.53
When a Simple Queue Service message triggers a task that takes 5 minutes to complete, which process
below will result in successful processing of the message and remove it from the queue while minimizing
the chances of duplicate processing?
A. Retrieve the message with an increased visibility timeout, process the message,
delete the message from the queue
B. Retrieve the message with an increased visibility timeout, delete the message
from the queue, process the message
C. Retrieve the message with increased DelaySeconds, process the message, delete
the message from the queue
D. Retrieve the message with increased DelaySeconds, delete the message from the
queue, process the message
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 107
Question B.54
Company A has an S3 bucket containing premier content that they intend to make available to only paid
subscribers of their website. The S3 bucket currently has default permissions of all objects being private
to prevent inadvertent exposure of the premier content to non-paying website visitors.
How can Company A provide only paid subscribers the ability to download a premier content file in the
S3 bucket?
A. Apply a bucket policy that grants anonymous users to download the content from
the S3 bucket
B. Generate a pre-signed object URL for the premier content file when a paid
subscriber requests a download
C. Add a bucket policy that requires Multi-Factor Authentication for requests to
access the S3 bucket objects
D. Enable server-side encryption on the S3 bucket for data protection against the
non-paying website visitors
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 108
Question B.54
Company A has an S3 bucket containing premier content that they intend to make available to only paid
subscribers of their website. The S3 bucket currently has default permissions of all objects being private
to prevent inadvertent exposure of the premier content to non-paying website visitors.
How can Company A provide only paid subscribers the ability to download a premier content file in the
S3 bucket?
A. Apply a bucket policy that grants anonymous users to download the content from
the S3 bucket
B. Generate a pre-signed object URL for the premier content file when a paid
subscriber requests a download
C. Add a bucket policy that requires Multi-Factor Authentication for requests to
access the S3 bucket objects
D. Enable server-side encryption on the S3 bucket for data protection against the
non-paying website visitors
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 109
Question B.55
Which of the following is an example of a good DynamoDB hash key schema for provisioned throughput
efficiency?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 110
Question B.55
Which of the following is an example of a good DynamoDB hash key schema for provisioned throughput
efficiency?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 111
Question B.56
An application stores payroll information nightly in DynamoDB for a large number of employees across
hundreds of offices. Item attributes consist of individual name, office identifier, and cumulative daily
hours. Managers run reports for ranges of names working in their office. One query is. "Return all Items
in this office for names starting with A through E".
Which table configuration will result in the lowest impact on provisioned throughput for this query?
A. Configure the table to have a hash index on the name attribute, and a range
index on the office identifier
B. Configure the table to have a range index on the name attribute, and a hash
index on the office identifier
C. Configure a hash index on the name attribute and no range index
D. Configure a hash index on the office Identifier attribute and no range index
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 112
Question B.56
An application stores payroll information nightly in DynamoDB for a large number of employees across
hundreds of offices. Item attributes consist of individual name, office identifier, and cumulative daily
hours. Managers run reports for ranges of names working in their office. One query is. "Return all Items
in this office for names starting with A through E".
Which table configuration will result in the lowest impact on provisioned throughput for this query?
A. Configure the table to have a hash index on the name attribute, and a range
index on the office identifier
B. Configure the table to have a range index on the name attribute, and a hash
index on the office identifier
C. Configure a hash index on the name attribute and no range index
D. Configure a hash index on the office Identifier attribute and no range index
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 113
Question B.57
What is one key difference between an Amazon EBS-backed and an instance-store backed instance?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 114
Question B.57
What is one key difference between an Amazon EBS-backed and an instance-store backed instance?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 115
Question B.58
How can you secure data at rest on an EBS volume?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 116
Question B.58
How can you secure data at rest on an EBS volume?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 117
Question B.59
Which of the following is chosen as the default region when making an API call with an AWS SDK?
A. ap-northeast-1
B. us-west-2
C. us-east-1
D. eu-west-1
E. us-central-1
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 118
Question B.59
Which of the following is chosen as the default region when making an API call with an AWS SDK?
A. ap-northeast-1
B. us-west-2
C. us-east-1
D. eu-west-1
E. us-central-1
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 119
Question B.60
Which of the following are valid SNS delivery transports? (Choose TWO.)
A. HTTP
B. UDP
C. SMS
D. DynamoDB
E. Named Pipes
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 120
Question B.60
Which of the following are valid SNS delivery transports? (Choose TWO.)
A. HTTP
B. UDP
C. SMS
D. DynamoDB
E. Named Pipes
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 121
Question B.61
How is provisioned throughput affected by the chosen consistency model when reading data from a
DynamoDB table?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 122
Question B.61
How is provisioned throughput affected by the chosen consistency model when reading data from a
DynamoDB table?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 123
Question B.62
Which of the following are valid arguments for an SNS Publish request? (Choose THREE.)
A. TopicAm
B. Subject
C. Destination
D. Format
E. Message
F. Language
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 124
Question B.62
Which of the following are valid arguments for an SNS Publish request? (Choose THREE.)
A. TopicAm
B. Subject
C. Destination
D. Format
E. Message
F. Language
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 125
Question B.63
How can software determine the public and private IP addresses of the Amazon EC2 instance that it is
running on?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 126
Question B.63
How can software determine the public and private IP addresses of the Amazon EC2 instance that it is
running on?
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 127
Question B.64
EC2 instances are launched from Amazon Machine images (AMIs). A given public AMI can:
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 128
Question B.64
EC2 instances are launched from Amazon Machine images (AMIs). A given public AMI can:
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 129
Question B.65
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
A. DescribeInstances
B. DescribeAMls
C. DescribeImages
D. GetAMls
E. You cannot retrieve a list of AMIs as there are over 10,000 AMIs
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 130
Question B.65
Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?
A. DescribeInstances
B. DescribeAMls
C. DescribeImages
D. GetAMls
E. You cannot retrieve a list of AMIs as there are over 10,000 AMIs
© 2021 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 131
Thank you!
© 2019 Amazon Web Services, Inc. or its Affiliates. All rights reserved. 132