AWS Developer
Which AWS service helps monitor the logs for AWS Lambda function? AWS CloudFormation AWS Config AWS CloudWatch AWS SWF
AWS CloudWatch
An open-source framework designed to streamline the building and deployment of serverless applications on AWS
AWS Serverless Application Model (AWS SAM)
Which AWS service provides a publish and subscribe (pub/sub) messaging model for asynchronous message processing? AWS Simple Workflow Service (SWF) AWS Simple Queue Service (SQS) AWS Simple Notification Service (SNS) AWS Kinesis
AWS Simple Notification Service (SNS)
A company has a WebSocket messaging system that needs to be migrated to the cloud at a minimal cost. Which service should be used? Amazon Elastic Compute Cloud (EC2) Amazon Simple Queue Service (SQS) Amazon Short Message Service (SMS) Amazon managed message broker
Amazon managed message broker
A WebSockets chat service is deployed in a set of Elastic Compute Cloud (EC2) instances. Which load balancer type should be used to distribute the requests among the instances? Classic Application Network Gateway
Application
Which AWS service integrates with Key Management Service (KMS) to log the use of the KMS keys? CloudTrail CloudWatch Identity and Access Management Software development kit
CloudTrail
Provides intelligent recommendations to improve code quality and identify an application's most expensive lines of code.
Code Guru
A fully managed continuous delivery service that helps you automate your release pipelines for fast and reliable application and infrastructure updates.
Code Pipeline
Enables you to quickly develop, build, and deploy applications on AWS. Provides a unified user interface, enabling you to easily manage your software development activities in one place.
Code Star
A company is preparing to migrate an existing Java application development stack and its associated tooling to Amazon. Which AWS service provides a fully managed dependency repository? CodeGuru CodeDeploy CodeArtifact CodeStar
CodeArtifact
A software industry wants to implement the systems development lifecycle (SDLC) framework for designing, developing, and delivering high-quality software. At which phase of the SDLC is the new system developed and new components obtained and installed? Develop phase Deploy phase Plan phase Design phase
Develop phase
Which application log-in solution uses a custom process? IAM OpenID Connect-provided identity pools Amazon Cognito user pools Developer-authenticated identity pools
Developer-authenticated identity pools
Which feature allows you to monitor the total CPU time of a serverless application? Enable Lambda Insights using CLI Configure a CloudWatch agent to collect cluster metrics Configure X-Ray and call GetService Graph using AWS CLIEnable flow logs using AWS VPC
Enable Lambda Insights using CLI
When calling a service using a REST API, a developer receives ThrottlingException errors. Which technique will solve this problem? Time-out Retry Exponential backoff Sliding window
Exponential backoff
A developer needs to be given access to multiple S3 buckets without assigning direct access to each bucket. Which feature should be used? AWS Certificate Manager (ACM) certificate Resource-based policy Instance profile IAM role
IAM role
The debugging results of a REST API test using API Gateway show the same data in the input and output. Which component of the API is missing? Schema Mapping Resource Model
Mapping
An application has the following requirements for a cache engine: avoidance of needless cache updates easy scaling with Auto Discovery Which caching engine and strategy must be used to fulfill these requirements? Redis with lazy loading Memcached with write-through Memcached with lazy loading Redis with write-through
Memcached with lazy loading
Key / value pairs, not indexed and not used for searching. Information about the data.
Metadata
A developer would like to process an image whenever a new image is uploaded to an S3 bucket. On which event should the Lambda function be triggered to process the image? DELETE GET POST Object Create (All) event
Object Create (All) event
How can you increase the CPU power of an AWS Lambda function? Update deployment configuration with required CPU details for a Lambda function. Update the CPU setting required in AWS console. CPU power cannot be increased; it is automatically managed by AWS. Update the memory setting as required in AWS console.
Update the memory setting as required in AWS console.
A cloud engineer wants to retrieve the first 8 MB of a file hosted on Amazon S3 using a CLI. What is the best way to retrieve a specified portion from an S3 file? Use the aws s3 cp command. Use S3 Select. Use the get-object command. Use the Range HTTP header in a GET Object request
Use the Range HTTP header in a GET Object request
A developer needs to add her AWS keys to her locally installed AWS CLI before using it. Which command should be used to do this? aws configure aws appconfig aws support aws transfer
aws configure
Which CLI command is used to perform multifactor authentication (MFA)? aws iam get-login-profile aws iam get-access-key-last-used aws sts get-access-key-info aws sts get-session-token
aws sts get-session-token
A company needs to ensure that Amazon Cognito Sync has sufficient capacity to deal with the company's large data sets. What is the maximum data set size allowed? 1 MB 10 MB 25 MB 100 MB
1 MB
What is the minimum Transport Layer Security (TLS) level required for client-side encryption to access Amazon S3 via AWS-published API? 1.0 1.1 1.2 1.3
1.0
A game developer is using DynamoDB as a serverless backend for a mobile game. The developer wants the application to write 180 items per minute to the DynamoDB table and the items are 4 KB in size. How many write capacity units (WCUs) must the developer provision? 12 4 24 45
12
In AWS SQS SendMessage operation, what is the maximum size of the message body string? 256 KB 512 MB 256 MB 512 KB
256 KB
A developer needs to store data into a DynamoDB item. What is the maximum amount of data that can be stored? 4 KB 400 KB 4 MB 400 MB
400 KB
A developer is writing code that will check the HTTP response code and retry in case of a server-side error. Which HTTP series error code designates that a retry should be attempted? 200 300 400 500
500
Which cryptography scheme is supported by Amazon RDS for encrypting data at rest for databases? SHA-256 AES-256 RSA DES
AES-256
A web-based application selling toys has become popular and the developer wants to allow third-party sellers to list items from its site by exposing APIs. Which AWS service can help the developer develop, publish, automate, and easily manage access to APIs? AWS EventBridge AWS Lambda AWS API Gateway AWS Fargate
AWS API Gateway
Which AWS service is a content delivery network (CDN) that securely delivers data, videos, applications, and APIs to customers globally with low latency and at high transfer speeds? AWS Data Pipeline AWS CloudFront AWS S3 AWS API Gateway
AWS CloudFront
Which AWS service enables you to quickly develop, build, and deploy applications on AWS? AWS CodeStar AWS CodeDeploy AWS CodeCommit AWS CodeBuild
AWS CodeStar
A security monitoring company wants to process clickstream data from the security camera feeds from thousands of customers. Which AWS service can be used for this use case? AWS Lambda AWS Simple Storage Service (S3) AWS DynamoDB AWS Kinesis
AWS Kinesis
A service that enables you to share AWS resources easily and securely with any AWS account or within your AWS Organization.
AWS Resource Access Manager (RAM)
What are the key values that AWS STS returns when a new token is being requested by the user that is making the API call? AWS STS returns a session token to the identity broker. AWS STS returns an access key, a secret access key, a session token, and a duration (i.e., the token's lifetime) to the identity broker. AWS STS returns an access key and a secret access key to the identity broker. AWS STS returns a session token and a duration (that is, the token's lifetime) to the identity broker.
AWS STS returns an access key, a secret access key, a session token, and a duration (i.e., the token's lifetime) to the identity broker.
Which AWS service provides serverless orchestration that you can use to combine Lambda functions and other AWS services to build critical applications? AWS API Gateway AWS Simple Queue Service (SQS) AWS Step functions AWS Lambda
AWS Step functions
A developer wants to build APIs for a web-based chat application for users to interact with their support team in real time. What should the developer choose for this use case? AWS Lambda AWS RESTful APIs AWS Software Development Kit (SDK) AWS WebSocket APIs
AWS WebSocket APIs
Which service is used to analyze and debug distributed applications? CloudTrail CloudWatch AWS X-Ray VPC Flow Logs
AWS X-Ray
A company using Docker containers to run their application on-prem wants to reduce the need to operate their own containers. The lead DevOps engineer has been tasked with migrating the company's Docker containers to AWS. Which service can the DevOps engineer use to store, manage, and deploy Docker images on AWS? Amazon Simple Queue Service (SQS) Amazon EKS Amazon ECS Amazon ECR
Amazon ECR
Where does CloudBuild cache large assets that are created during the build and rarely change? User-defined storage AWS EFS Microsoft GitHub Amazon S3 bucket
Amazon S3 bucket
A developer is writing code that will use AWS Software Development Kit (SDK) for Java to handle the HTTP 404—Not Found status code generated when attempting to access a nonexistent S3 bucket. Which exception should this code handle? AmazonServiceException AmazonClientException Amazon.Runtime.AmazonServiceException Amazon.Runtime.AmazonClientException
AmazonServiceException
A company develops a serverless solution that must process image files for display across multiple platforms. When an image is uploaded, it must be scaled in parallel for mobile, web, and virtual reality (VR). Which service should be used? An SQS endpoint connected to a single Lambda function An SQS endpoint connected to multiple Lambda functions An SNS topic connected to multiple Lambda functions An SNS topic with an EC2 instance subscriber
An SQS endpoint connected to multiple Lambda functions
Which AWS Security Token Service (STS) API operation returns a set of temporary security credentials for federated users who are authenticated by an organization's existing identity system? GetSessionToken AssumeRoleWithWebIdentity AssumeRole AssumeRoleWithSAML
AssumeRoleWithSAML
Which statement is true when using CloudFront field-level encryption? Symmetric encryption is used, and encryption is done at the edge. Symmetric encryption is used, and encryption is done at the region. Asymmetric encryption is used, and encryption is done at the region. Asymmetric encryption is used, and encryption is done at the edge.
Asymmetric encryption is used, and encryption is done at the edge.
A serverless application using Lambda requires retries to be done by the cloud provider, in the event of the throttling of requests. Which invocation pattern must be used for the Lambda function? Asynchronous Synchronous Poll-based Stream
Asynchronous
A student develops a code module that needs to be migrated to a serverless solution. When an application calls the module, all other actions should not be blocked while waiting for a return. Which solution should be used? Synchronous Lambda function Asynchronous Lambda function Elastic Compute Cloud Simple Storage Service (S3)
Asynchronous Lambda function
A company needs to be notified as soon as a weekly transaction is posted to DynamoDB. Which Lambda feature meets this requirement? Event source mapping Synchronous notification Asynchronous notification Reserved concurrency
Asynchronous notification
An application is tracking the number of logged-in users by creating a custom metric using the PutMetricData API. How long will it take for data to start becoming available for view on calls to ListMetrics? Between 0 and 15 minutes Between 30 and 60 minutes Between 12 and 24 hours Between 24 and 48 hours
Between 0 and 15 minutes
A cloud-based integrated development environment (IDE) that lets you write, run, and debug your code with just a browser.
Cloud9
A software development company is migrating their operations to AWS. The developers want to be able to collaborate with one another in the development environment and need a browser-based integrated development environment (IDE) that will enable them to see each other type in real time and instantly chat with one another from witterm-2hin the IDE. Which AWS service meets this requirement? AWS Command Line Interface (CLI) AWS Software Development Kit (SDK) AWS Serverless Application Model (AWS SAM) Local Cloud9
Cloud9
Which service is used to monitor the duration for builds on CodeBuild? CloudTrail CloudWatch X-Ray VPC Flow
CloudWatch
A fully managed artifact repository service. Can be configured to automatically fetch software packages and dependencies from public artifact repositories.
Code Artifact
A fully managed continuous integration (CI) service that compiles source code, runs tests, and produces software packages that are ready to deploy.
Code Build
A fully managed source control service that hosts secure Git-based repositories. Centralized repository for all of your code, binaries, images, and libraries. Tracks and manages code changes. Maintains version history. Manages updates from multiple sources. Enables collaboration.
Code Commit
A deployment service that automates application deployments to Amazon EC2 instances, on-premises instances, serverless Lambda functions, or Amazon ECS services.
Code Deploy
An application fetches open-source packages from a public package repository. When migrating the application to AWS, these requirements are in place for dependency management: use a fully managed solution have a curated repository as a dependency source Which solution should be used? CodePipeline CodeGuru CodeBuild CodeArtifact
CodeArtifact
Which build providers are natively supported by CodePipeline? CodeBuild and Azure DevOps CodeBuild and CodeDeploy CodeBuild and Jenkins CodeBuild and GitHub
CodeBuild and Jenkins
Which AWS service is used to store code repositories? CodeBuild CodeCommit CodePipeline CodeStar
CodeCommit
A developer wants to have insights on all the data changes occurring as part of Cognito Sync. The solution needs to allow real-time analysis of the changes. Which services should be used? Cognito Streams and Kinesis Cognito Events and API Gateway Cognito user pools and API Gateway Cognito identity pools and Kinesis
Cognito Streams and Kinesis
A web application is accessed by thousands of untrusted users and stores data in S3 buckets. Which solution provides the necessary temporary credentials? Cognito user pools Cognito identity pools IAM users IAM groups
Cognito identity pools
A mobile application requires a user log-in. Which solution provides a token after successful authentication? Cognito user pools Cognito identity pools Identity and Access Management Single sign-on management
Cognito user pools
In a CloudFormation template, which section is used to control whether certain resources are created or whether certain resource properties are assigned a value during stack creation or update? Resources Parameters Conditions Mappings
Conditions
Which strategy allows Elastic Beanstalk to simultaneously run different versions of the same application? Create multiple versions of the application for one configuration Configure one compute instance to run different versions of one application Create multiple configurations for one version of the application Configure different versions of one application to run on multiple compute instances
Configure different versions of one application to run on multiple compute instances
A data analyst is working with a music table with the following attributes: Artist (partition key), SongTitle (sort key), AlbumTitle, Price, Genre, and CriticRating. How can the analyst query the data by artist and genre? Use a composite primary key. Use a Scan operation on the base table. Create a local secondary index (LSI) from the base music table. Create a global secondary index (GSI) from the base table.
Create a local secondary index (LSI) from the base music table
A company wants to use AWS Auto Scaling for its application using EC2 instances and a DynamoDB table. How can the developer manage access to DynamoDB when new instances are created when auto scaling kicks off? Create an IAM role with the right access permissions and configure the role in the launch template of the Auto Scaling group Create an IAM role with the right access permissions and configure the role to the instances launched in the Auto Scaling group Hard code the IAM access keys in the application Add IAM access keys to the environment variables of the EC2 instance
Create an IAM role with the right access permissions and configure the role in the launch template of the Auto Scaling group
Which AWS Elastic Beanstalk strategy will deploy two versions of an application for side-by-side A/B testing? Deploy the two versions of the app to separate compute instances simultaneously Deploy the two versions to the same compute instance after a period of time Issue the eb create command between the deployment of each version Issue the eb init command between the deployment of each version
Deploy the two versions of the app to separate compute instances simultaneously
Developers are building a serverless AWS Lambda function and would like to make a call to the database. Database string and credentials should be kept secure. What can the developer do to store it securely? Developers can store the database string and credentials in an S3 bucket and reference it from the Lambda function. Developers can store the database string and credentials in the Lambda function configuration file. Developers can store the database string and credentials in the AWS Systems Manager parameter store and have Lambda function reference the AWS Systems Manager parameter store for the database credentials. Developers can hard code the database string and credentials in the Lambda function code.
Developers can store the database string and credentials in the AWS Systems Manager parameter store and have Lambda function reference the AWS Systems Manager parameter store for the database credentials.
A company develops an application that connects to DynamoDB at start-up to load content. Application load times need to be improved by changing to an eventual consistency model. Which solution should be used? Athena CloudFront Lambda ElastiCache
ElastiCache
A company requires a fully managed database caching solution that supports replication and multiple availability zones for its SQL database instances. Which solution should the developer deploy to meet these requirements? ElastiCache for Redis CloudFront cache Elasticache for Memcached DynamoDB Accelerator
ElastiCache for Redis
A company has a production environment on AWS built with Elastic Beanstalk. Which action or feature in Elastic Beanstalk should the company employ to rapidly build a test environment based on this production environment? Elastic Beanstalk clone Elastic Beanstalk migration Elastic Beanstalk update Elastic Beanstalk worker
Elastic Beanstalk clone
In the given AWS step function, which state gets executed? { "StartAt": "LookupCustomerInfo", "States": { "LookupCustomerInfo": { "Type": "Parallel", "End": true, "Branches": [ { "StartAt": "LookupAddress", "States": { "LookupAddress": { "Type": "Task", "Resource": "arn:aws:lambda:us-east-1:123456789012:function:AddressFinder", "End": true } } }, { "StartAt": "LookupAddress", "States": { "LookupAddress": { "Type": "Task", "Resource": "arn:aws:lambda:us-east-1:123456789012:function:PhoneFinder", "End": true } } } ] } } } Execute state LookupAddress and LookupPhone. Execute state LookupAddress. Execute state LookupPhone. Execution fails as End:true.
Execute state LookupAddress and LookupPhone.
When creating a Lambda function, what must be specified to provide the entry point for Lambda calls? Deployment package Event object Context object Function handler
Function handler
A user requested a resource on the server using the HTTP GET API. Which HTTP response code indicates that the request was successfully handled? HTTP response code 200 HTTP response code 404 HTTP response code 201 HTTP response code 400
HTTP response code 200
Which policy is used to give an application global read-and-write access to all services in AWS? Resource policy Identity policy Password policy Session policy
Identity policy
You are a developer for an e-commerce startup using Amazon RDS to store their transaction details. The startup wants to improve the application performance and reduce database costs. Which cache strategy will work best if it will be costly to regenerate the cache material if the data is lost? Migrate the database to Amazon Redshift. Implement Amazon ElastiCache Memcached. Install Redis on an Amazon EC2 instance. Implement Amazon ElastiCache Redis in Cluster Mode.
Implement Amazon ElastiCache Redis in Cluster Mode.
A healthcare company wants to migrate critical patient data to AWS. Top management wants the data to be encrypted before it is sent to Amazon S3 for storage. They also agree that the company's security team should maintain and manage the encryption keys. Which encryption method can be used in this scenario to protect the client data at rest? Implement server-side encryption using customer-provided encryption keys Implement client-side encryption using an AWS Key Management Service (KMS) managed customer master key (CMK) Implement client-side encryption using Amazon S3 managed keys Implement server-side encryption by using a client-side master key
Implement client-side encryption using an AWS Key Management Service (KMS) managed customer master key (CMK)
What permissions does the identity-based policy specify? { "Version": "2012-10-17", "Statement": [ { "Sid": "ListObjectsInBucket", "Effect": "Allow", "Action": ["s3:ListBucket"], "Resource": ["arn:aws:s3:::bucket-name"], }, { "Sid": "AllObjectActions", "Effect": "Allow", "Action": "s3:*Object", "Resource": ["arn:aws:s3:::bucket-name/*"] } ] { It allows read and write access to objects in a specific S3 bucket. It allows only to write objects to a specific bucket. It allows only read objects in a specific S3 bucket. It restricts Delete objects in a specific S3 bucket.
It allows read and write access to objects in a specific S3 bucket
What is the role of an Application Load Balancer in an Elastic Container Service (ECS)? It is used to create a static host. It is used to organize container configurations. It is used to create an elastic internet protocol address. It is used to facilitate dynamic port forwarding.
It is used to facilitate dynamic port forwarding.
A company develops an application that requires an eventual consistency model and scheduled function execution. Which solution should be used? ElastiCache CloudFront Lambda Athena
Lambda
Which logging mechanism provides a collection of logs in CloudWatch that share the same source? Log subscription Log group Log filter Log stream
Log stream
REST APIs enable you to develop all kinds of web applications that have all possible CRUD (create, retrieve, update, delete) operations. Which HTTP method is used for creating a new resource? GET PUT PATCH POST
POST
An application streams real-time data to Simple Queue Service (SQS). Critical events must be detected to trigger notifications. The developer needs to ensure that the processing does not affect other Lambda functions. Which Lambda feature meets this requirement? Provisioned concurrency Synchronous notification Asynchronous notification Reserved concurrency
Reserved concurrency
A company has deployed CloudWatch for its logging requirements in AWS. It is now attempting to associate a Key Management Service (KMS) key with the log groups to provide encryption at rest. When running the associate-kms-key CLI, an AccessDeniedException error is returned. The developers know the key exists in KMS, so they need to provide permissions to access the key. Which policy should be changed to add permissions to this key? Session policy Identity-based policy Resource policy Service control policy
Resource policy
Which item should be configured to grant an EC2 instance access to an S3 bucket without the use of a password? Root user Federated user Role User
Role
A company is using AWS Serverless Application Model (SAM) to manage an application. Each time a deployment is run, it wants to be able to back up the packages created by that deployment. Where are the packages created by the SAM templates stored? CodeDeploy EFS S3 CloudFront
S3
What is CodePipeline's default location to store artifacts? EC2 GitHub CodeCommit S3
S3
A company with remote offices in different countries uses a centralized S3 bucket for data backup. Each branch does multiple uploads to the S3 bucket daily. Recently, the rate of uploads has slowed. Which service can the company use to speed up data exchange between the remote offices and the central S3 bucket? Amazon ElastiCache for Memcached Amazon CloudFront S3 Transfer Acceleration Amazon ElastiCache for Redis
S3 Transfer Acceleration
What is the effect of this resource-based policy? { "Version": "2012-10-17", "Id": "default", "Statement": [ { "Sid": "lambda-allow-s3-my-function", "Effect": "Allow", "Principal": { "Service": "s3.amazonaws.com" }, "Action": "lambda:InvokeFunction", "Resource": "arn:aws:lambda:us-east-2:123456789012:function:my-function:*", "Condition": { "StringEquals": { "AWS:SourceAccount": "123456789012" }, "ArnLike": { "AWS:SourceArn": "arn:aws:s3:::my-bucket" } } } S3 can invoke the Lambda function my-function for a bucket named my-bucket. The Lambda function can access all the S3 buckets that belong to AWS account: 123456789012. The Lambda function can only access the bucket my-bucket. S3 can invoke the Lambda function my-function for all buckets that belong to the AWS account:123456789012.
S3 can invoke the Lambda function my-function for a bucket named my-bucket.
To provide a performant and cost-effective experience, X-Ray does not collect data for every request that is sent to an application. Instead, it collects data for a statistically significant number of requests. This is called a _____________.
Sampling
What is required to run X-Ray with Elastic Beanstalk? Install the X-Ray daemon on the instances Set XRayEnabled to true in a config file inside the .ebextensions folder Set XRayEnabled to true in a config file in the root folder of the app Use the X-Ray API calls on the code
Set XRayEnabled to true in a config file inside the .ebextensions folder
A Lambda function requires access to a Simple Storage Service (S3) bucket to write its output. How should Lambda be configured? Set a role with the required permissions, passing it to the Lambda function Set the S3 bucket as the destination for the Lambda function Set a role with the required permissions as the Lambda function execution role Set the S3 bucket as the trigger for the Lambda function
Set a role with the required permissions as the Lambda function execution role
An application needs a middleware solution with the following requirements: adapts to sudden spikes of traffic operates asynchronously persists data for up to one year requires no capacity provisioning Which solution meets these requirements? Simple Queue Service (SQS) Simple Notification Service (SNS) Kinesis Data Streams Kinesis Firehose
Simple Queue Service (SQS)
A developer has X-Ray for code running in an EC2 instance, and no data about the application is seen in the X-Ray console. What can be causing this problem? The EC2 instance has no public IP address. The EC2 instance is not memory optimized. The developer does not have permissions to write to X-Ray. The X-Ray daemon is not running on the instance.
The X-Ray daemon is not running on the instance.
A developer makes an API request to the Amazon S3 service in the process of testing an application. The S3 service performs the request and returns a response that includes an HTTP 404 error code. Where should the developer handle the error? The Amazon S3 console The developer's application The AWS internal server The proxy server
The developer's application
A company plans to deploy AWS CodeBuild and needs to securely pass a password into the build process.How should this be done? Through an Amazon S3 bucket Through the AWS Secrets Manager In a GitHub repository Through the SSM Parameter Store
Through the AWS Secrets Manager
An X-Ray ______ is a set of data points that share the same ID.
Trace
An AWS SAM template follows the CloudFormation template format. Which declaration specifies that template is an AWS SAM template? Properties Transform Resources Policies
Transform
What is a required field in an AWS Step Functions state? OutputPath Type Comment InputPath
Type
An IT security team has noticed a sudden spike in traffic and has determined that their VPC subnet is experiencing a DDoS attack from three specific IPs. What is the fastest way of stopping this unwanted traffic to prevent any further damage? Update the inbound network access control list (ACL) to deny access to connections originating from the identified IPs. Update the outbound security group of the EC2 instance to deny access from the identified IPs. Update the outbound network access control list (ACL) to deny access to connections originating from the identified IPs. Update the inbound security group of the EC2 instance to deny access from the identified IPs.
Update the inbound network access control list (ACL) to deny access to connections originating from the identified IPs.
A social media application that manages millions of user profiles is experiencing a page load delay. As more users visit the system at the same time, each web page viewed also loads the user profile from the database. Which caching strategy can be used to cache user profiles to reduce the database load? Install RDS database on an Amazon EC2 Instance to cache user profile data. Use a write-through caching strategy. Use Amazon ElastiCache cluster to cache user profile data. Use lazy loading caching strategy. Install RDS database on an Amazon EC2 Instance to cache user profile data. Use a write-through caching strategy. Use Amazon ElastiCache cluster to cache user profile data. Use a write-through caching strategy.
Use Amazon ElastiCache cluster to cache user profile data. Use lazy loading caching strategy.
A company is using DynamoDB to manage a large customer base spread across three regions. The company has three separate CustomerProfiles tables to allow customers in each region to update their profile information. Changes to data in one table are currently not reflected in other tables and customers in one region could lose their data if that region becomes unavailable. Which solution can the company use to keep the DynamoDB tables in sync? Create a local secondary index (LSI) from the base music table. Use a global table. Use global secondary index (GSI). Write code to replicate data changes among these tables.
Use a global table.
A bank is using DynamoDB to manage their transaction records. The database has grown to tens of millions of records and querying the table is resulting in increased latency and cost. How can the bank optimize the database to reduce latency and costs, and still be able to query the entire table across all partitions with attributes other than the primary key? Use a composite primary key. Use local secondary index (LSI). Use the Scan operation. Use global secondary index (GSI).
Use global secondary index (GSI)
An organization is looking to reduce costs associated with GET requests to a Simple Storage Service (S3) bucket. Which technique can the developers use to reduce the size of the request query? Use a unique key identifier Use prefixes and delimiters Use suffixes and delimiters Use prefixes and suffixes
Use prefixes and delimiters
A developer tries to upload a 17 GB object to Amazon S3. The upload failed and the developer received an error message that said, "Your proposed upload exceeds the maximum allowed size." How should the developer upload the object? Use Amazon Redshift instead Retry the upload with a single PUT operation Use the multipart upload API Upload the object over an AWS Direct Connect connection
Use the multipart upload API
A company is planning to migrate an existing Python application to AWS as a collection of Lambda functions. It needs to redevelop its package tooling to prepare the application and manage the deployment of dependencies. Which technology should be used to isolate Python dependencies in the Lambda package when packaging the application? Composer Virtualenv Docker Conda
Virtualenv
Helps developers analyze and debug production, distributed applications, such as those built using a microservices architecture.
X-Ray
An X-Ray ________ is system-defined, or user-defined data associated with a segment.
annotation
A developer needs to ensure encryption in transit is active for operations on an S3 bucket. Which condition must be present in the bucket policy? aws:PrincipalServiceName aws:MultiFactorAuthPresent aws:SecureTransport aws:FederatedProvider
aws:SecureTransport
A developer needs to force the use of SSL for data in transit with the S3 buckets. Which condition should be used in the bucket policy to force the use of SSL? aws:VersionId s3:x-amz-server-side-encryption aws:SecureTransport s3:x-amz-storage-class
aws:SecureTransport
A developer is running Docker command line interface (CLI) commands from a bash terminal to manage Docker images and containers. Which CLI command can the developer use to launch a container from a Docker image? docker push docker build docker ps docker run
docker run
Which permission should a developer use to allow an entity to assign additional permissions? sts:GetSessionToken iam:PassRole iam:AttachRolePolicy sts:GetCallerIdentity
iam:PassRole
A company just deployed a containerized guest book application onto Kubernetes clusters. They are using Amazon EKS to manage and scale the containerized application. Which command line tool can the developers use to interact with the Kubernetes infrastructure and view the Kubernetes resources? Boto3 eksctl AWS CLI kubectl
kubectl
A developer is working on deploying a new Node application with Elastic Beanstalk. He needs to make sure all dependencies are deployed alongside the main application source code. Which file name should this developer use to describe the dependencies that need to be deployed? requirements.txt package.json manifest.mf build.gradle
package.json
Which command is used to upload a SAM template to AWS S3? sam build sam package sam deploy sam init
sam package
An X-Ray ________ encapsulates all the data points for a single component (for example, authorization service) of the distributed application.
segment
X-Ray _____________ provide more granular timing information and details about downstream calls that your application made to fulfill the original request.
sub-segments