AWS Developer

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which AWS service helps monitor the logs for AWS Lambda function? AWS CloudFormation AWS Config AWS CloudWatch AWS SWF

AWS CloudWatch

An open-source framework designed to streamline the building and deployment of serverless applications on AWS

AWS Serverless Application Model (AWS SAM)

Which AWS service provides a publish and subscribe (pub/sub) messaging model for asynchronous message processing? AWS Simple Workflow Service (SWF) AWS Simple Queue Service (SQS) AWS Simple Notification Service (SNS) AWS Kinesis

AWS Simple Notification Service (SNS)

A company has a WebSocket messaging system that needs to be migrated to the cloud at a minimal cost. Which service should be used? Amazon Elastic Compute Cloud (EC2) Amazon Simple Queue Service (SQS) Amazon Short Message Service (SMS) Amazon managed message broker

Amazon managed message broker

A WebSockets chat service is deployed in a set of Elastic Compute Cloud (EC2) instances. Which load balancer type should be used to distribute the requests among the instances? Classic Application Network Gateway

Application

Which AWS service integrates with Key Management Service (KMS) to log the use of the KMS keys? CloudTrail CloudWatch Identity and Access Management Software development kit

CloudTrail

Provides intelligent recommendations to improve code quality and identify an application's most expensive lines of code.

Code Guru

A fully managed continuous delivery service that helps you automate your release pipelines for fast and reliable application and infrastructure updates.

Code Pipeline

Enables you to quickly develop, build, and deploy applications on AWS. Provides a unified user interface, enabling you to easily manage your software development activities in one place.

Code Star

A company is preparing to migrate an existing Java application development stack and its associated tooling to Amazon. Which AWS service provides a fully managed dependency repository? CodeGuru CodeDeploy CodeArtifact CodeStar

CodeArtifact

A software industry wants to implement the systems development lifecycle (SDLC) framework for designing, developing, and delivering high-quality software. At which phase of the SDLC is the new system developed and new components obtained and installed? Develop phase Deploy phase Plan phase Design phase

Develop phase

Which application log-in solution uses a custom process? IAM OpenID Connect-provided identity pools Amazon Cognito user pools Developer-authenticated identity pools

Developer-authenticated identity pools

Which feature allows you to monitor the total CPU time of a serverless application? Enable Lambda Insights using CLI Configure a CloudWatch agent to collect cluster metrics Configure X-Ray and call GetService Graph using AWS CLIEnable flow logs using AWS VPC

Enable Lambda Insights using CLI

When calling a service using a REST API, a developer receives ThrottlingException errors. Which technique will solve this problem? Time-out Retry Exponential backoff Sliding window

Exponential backoff

A developer needs to be given access to multiple S3 buckets without assigning direct access to each bucket. Which feature should be used? AWS Certificate Manager (ACM) certificate Resource-based policy Instance profile IAM role

IAM role

The debugging results of a REST API test using API Gateway show the same data in the input and output. Which component of the API is missing? Schema Mapping Resource Model

Mapping

An application has the following requirements for a cache engine: avoidance of needless cache updates easy scaling with Auto Discovery Which caching engine and strategy must be used to fulfill these requirements? Redis with lazy loading Memcached with write-through Memcached with lazy loading Redis with write-through

Memcached with lazy loading

Key / value pairs, not indexed and not used for searching. Information about the data.

Metadata

A developer would like to process an image whenever a new image is uploaded to an S3 bucket. On which event should the Lambda function be triggered to process the image? DELETE GET POST Object Create (All) event

Object Create (All) event

How can you increase the CPU power of an AWS Lambda function? Update deployment configuration with required CPU details for a Lambda function. Update the CPU setting required in AWS console. CPU power cannot be increased; it is automatically managed by AWS. Update the memory setting as required in AWS console.

Update the memory setting as required in AWS console.

A cloud engineer wants to retrieve the first 8 MB of a file hosted on Amazon S3 using a CLI. What is the best way to retrieve a specified portion from an S3 file? Use the aws s3 cp command. Use S3 Select. Use the get-object command. Use the Range HTTP header in a GET Object request

Use the Range HTTP header in a GET Object request

A developer needs to add her AWS keys to her locally installed AWS CLI before using it. Which command should be used to do this? aws configure aws appconfig aws support aws transfer

aws configure

Which CLI command is used to perform multifactor authentication (MFA)? aws iam get-login-profile aws iam get-access-key-last-used aws sts get-access-key-info aws sts get-session-token

aws sts get-session-token

A company needs to ensure that Amazon Cognito Sync has sufficient capacity to deal with the company's large data sets. What is the maximum data set size allowed? 1 MB 10 MB 25 MB 100 MB

1 MB

What is the minimum Transport Layer Security (TLS) level required for client-side encryption to access Amazon S3 via AWS-published API? 1.0 1.1 1.2 1.3

1.0

A game developer is using DynamoDB as a serverless backend for a mobile game. The developer wants the application to write 180 items per minute to the DynamoDB table and the items are 4 KB in size. How many write capacity units (WCUs) must the developer provision? 12 4 24 45

12

In AWS SQS SendMessage operation, what is the maximum size of the message body string? 256 KB 512 MB 256 MB 512 KB

256 KB

A developer needs to store data into a DynamoDB item. What is the maximum amount of data that can be stored? 4 KB 400 KB 4 MB 400 MB

400 KB

A developer is writing code that will check the HTTP response code and retry in case of a server-side error. Which HTTP series error code designates that a retry should be attempted? 200 300 400 500

500

Which cryptography scheme is supported by Amazon RDS for encrypting data at rest for databases? SHA-256 AES-256 RSA DES

AES-256

A web-based application selling toys has become popular and the developer wants to allow third-party sellers to list items from its site by exposing APIs. Which AWS service can help the developer develop, publish, automate, and easily manage access to APIs? AWS EventBridge AWS Lambda AWS API Gateway AWS Fargate

AWS API Gateway

Which AWS service is a content delivery network (CDN) that securely delivers data, videos, applications, and APIs to customers globally with low latency and at high transfer speeds? AWS Data Pipeline AWS CloudFront AWS S3 AWS API Gateway

AWS CloudFront

Which AWS service enables you to quickly develop, build, and deploy applications on AWS? AWS CodeStar AWS CodeDeploy AWS CodeCommit AWS CodeBuild

AWS CodeStar

A security monitoring company wants to process clickstream data from the security camera feeds from thousands of customers. Which AWS service can be used for this use case? AWS Lambda AWS Simple Storage Service (S3) AWS DynamoDB AWS Kinesis

AWS Kinesis

A service that enables you to share AWS resources easily and securely with any AWS account or within your AWS Organization.

AWS Resource Access Manager (RAM)

What are the key values that AWS STS returns when a new token is being requested by the user that is making the API call? AWS STS returns a session token to the identity broker. AWS STS returns an access key, a secret access key, a session token, and a duration (i.e., the token's lifetime) to the identity broker. AWS STS returns an access key and a secret access key to the identity broker. AWS STS returns a session token and a duration (that is, the token's lifetime) to the identity broker.

AWS STS returns an access key, a secret access key, a session token, and a duration (i.e., the token's lifetime) to the identity broker.

Which AWS service provides serverless orchestration that you can use to combine Lambda functions and other AWS services to build critical applications? AWS API Gateway AWS Simple Queue Service (SQS) AWS Step functions AWS Lambda

AWS Step functions

A developer wants to build APIs for a web-based chat application for users to interact with their support team in real time. What should the developer choose for this use case? AWS Lambda AWS RESTful APIs AWS Software Development Kit (SDK) AWS WebSocket APIs

AWS WebSocket APIs

Which service is used to analyze and debug distributed applications? CloudTrail CloudWatch AWS X-Ray VPC Flow Logs

AWS X-Ray

A company using Docker containers to run their application on-prem wants to reduce the need to operate their own containers. The lead DevOps engineer has been tasked with migrating the company's Docker containers to AWS. Which service can the DevOps engineer use to store, manage, and deploy Docker images on AWS? Amazon Simple Queue Service (SQS) Amazon EKS Amazon ECS Amazon ECR

Amazon ECR

Where does CloudBuild cache large assets that are created during the build and rarely change? User-defined storage AWS EFS Microsoft GitHub Amazon S3 bucket

Amazon S3 bucket

A developer is writing code that will use AWS Software Development Kit (SDK) for Java to handle the HTTP 404—Not Found status code generated when attempting to access a nonexistent S3 bucket. Which exception should this code handle? AmazonServiceException AmazonClientException Amazon.Runtime.AmazonServiceException Amazon.Runtime.AmazonClientException

AmazonServiceException

A company develops a serverless solution that must process image files for display across multiple platforms. When an image is uploaded, it must be scaled in parallel for mobile, web, and virtual reality (VR). Which service should be used? An SQS endpoint connected to a single Lambda function An SQS endpoint connected to multiple Lambda functions An SNS topic connected to multiple Lambda functions An SNS topic with an EC2 instance subscriber

An SQS endpoint connected to multiple Lambda functions

Which AWS Security Token Service (STS) API operation returns a set of temporary security credentials for federated users who are authenticated by an organization's existing identity system? GetSessionToken AssumeRoleWithWebIdentity AssumeRole AssumeRoleWithSAML

AssumeRoleWithSAML

Which statement is true when using CloudFront field-level encryption? Symmetric encryption is used, and encryption is done at the edge. Symmetric encryption is used, and encryption is done at the region. Asymmetric encryption is used, and encryption is done at the region. Asymmetric encryption is used, and encryption is done at the edge.

Asymmetric encryption is used, and encryption is done at the edge.

A serverless application using Lambda requires retries to be done by the cloud provider, in the event of the throttling of requests. Which invocation pattern must be used for the Lambda function? Asynchronous Synchronous Poll-based Stream

Asynchronous

A student develops a code module that needs to be migrated to a serverless solution. When an application calls the module, all other actions should not be blocked while waiting for a return. Which solution should be used? Synchronous Lambda function Asynchronous Lambda function Elastic Compute Cloud Simple Storage Service (S3)

Asynchronous Lambda function

A company needs to be notified as soon as a weekly transaction is posted to DynamoDB. Which Lambda feature meets this requirement? Event source mapping Synchronous notification Asynchronous notification Reserved concurrency

Asynchronous notification

An application is tracking the number of logged-in users by creating a custom metric using the PutMetricData API. How long will it take for data to start becoming available for view on calls to ListMetrics? Between 0 and 15 minutes Between 30 and 60 minutes Between 12 and 24 hours Between 24 and 48 hours

Between 0 and 15 minutes

A cloud-based integrated development environment (IDE) that lets you write, run, and debug your code with just a browser.

Cloud9

A software development company is migrating their operations to AWS. The developers want to be able to collaborate with one another in the development environment and need a browser-based integrated development environment (IDE) that will enable them to see each other type in real time and instantly chat with one another from witterm-2hin the IDE. Which AWS service meets this requirement? AWS Command Line Interface (CLI) AWS Software Development Kit (SDK) AWS Serverless Application Model (AWS SAM) Local Cloud9

Cloud9

Which service is used to monitor the duration for builds on CodeBuild? CloudTrail CloudWatch X-Ray VPC Flow

CloudWatch

A fully managed artifact repository service. Can be configured to automatically fetch software packages and dependencies from public artifact repositories.

Code Artifact

A fully managed continuous integration (CI) service that compiles source code, runs tests, and produces software packages that are ready to deploy.

Code Build

A fully managed source control service that hosts secure Git-based repositories. Centralized repository for all of your code, binaries, images, and libraries. Tracks and manages code changes. Maintains version history. Manages updates from multiple sources. Enables collaboration.

Code Commit

A deployment service that automates application deployments to Amazon EC2 instances, on-premises instances, serverless Lambda functions, or Amazon ECS services.

Code Deploy

An application fetches open-source packages from a public package repository. When migrating the application to AWS, these requirements are in place for dependency management: use a fully managed solution have a curated repository as a dependency source Which solution should be used? CodePipeline CodeGuru CodeBuild CodeArtifact

CodeArtifact

Which build providers are natively supported by CodePipeline? CodeBuild and Azure DevOps CodeBuild and CodeDeploy CodeBuild and Jenkins CodeBuild and GitHub

CodeBuild and Jenkins

Which AWS service is used to store code repositories? CodeBuild CodeCommit CodePipeline CodeStar

CodeCommit

A developer wants to have insights on all the data changes occurring as part of Cognito Sync. The solution needs to allow real-time analysis of the changes. Which services should be used? Cognito Streams and Kinesis Cognito Events and API Gateway Cognito user pools and API Gateway Cognito identity pools and Kinesis

Cognito Streams and Kinesis

A web application is accessed by thousands of untrusted users and stores data in S3 buckets. Which solution provides the necessary temporary credentials? Cognito user pools Cognito identity pools IAM users IAM groups

Cognito identity pools

A mobile application requires a user log-in. Which solution provides a token after successful authentication? Cognito user pools Cognito identity pools Identity and Access Management Single sign-on management

Cognito user pools

In a CloudFormation template, which section is used to control whether certain resources are created or whether certain resource properties are assigned a value during stack creation or update? Resources Parameters Conditions Mappings

Conditions

Which strategy allows Elastic Beanstalk to simultaneously run different versions of the same application? Create multiple versions of the application for one configuration Configure one compute instance to run different versions of one application Create multiple configurations for one version of the application Configure different versions of one application to run on multiple compute instances

Configure different versions of one application to run on multiple compute instances

A data analyst is working with a music table with the following attributes: Artist (partition key), SongTitle (sort key), AlbumTitle, Price, Genre, and CriticRating. How can the analyst query the data by artist and genre? Use a composite primary key. Use a Scan operation on the base table. Create a local secondary index (LSI) from the base music table. Create a global secondary index (GSI) from the base table.

Create a local secondary index (LSI) from the base music table

A company wants to use AWS Auto Scaling for its application using EC2 instances and a DynamoDB table. How can the developer manage access to DynamoDB when new instances are created when auto scaling kicks off? Create an IAM role with the right access permissions and configure the role in the launch template of the Auto Scaling group Create an IAM role with the right access permissions and configure the role to the instances launched in the Auto Scaling group Hard code the IAM access keys in the application Add IAM access keys to the environment variables of the EC2 instance

Create an IAM role with the right access permissions and configure the role in the launch template of the Auto Scaling group

Which AWS Elastic Beanstalk strategy will deploy two versions of an application for side-by-side A/B testing? Deploy the two versions of the app to separate compute instances simultaneously Deploy the two versions to the same compute instance after a period of time Issue the eb create command between the deployment of each version Issue the eb init command between the deployment of each version

Deploy the two versions of the app to separate compute instances simultaneously

Developers are building a serverless AWS Lambda function and would like to make a call to the database. Database string and credentials should be kept secure. What can the developer do to store it securely? Developers can store the database string and credentials in an S3 bucket and reference it from the Lambda function. Developers can store the database string and credentials in the Lambda function configuration file. Developers can store the database string and credentials in the AWS Systems Manager parameter store and have Lambda function reference the AWS Systems Manager parameter store for the database credentials. Developers can hard code the database string and credentials in the Lambda function code.

Developers can store the database string and credentials in the AWS Systems Manager parameter store and have Lambda function reference the AWS Systems Manager parameter store for the database credentials.

A company develops an application that connects to DynamoDB at start-up to load content. Application load times need to be improved by changing to an eventual consistency model. Which solution should be used? Athena CloudFront Lambda ElastiCache

ElastiCache

A company requires a fully managed database caching solution that supports replication and multiple availability zones for its SQL database instances. Which solution should the developer deploy to meet these requirements? ElastiCache for Redis CloudFront cache Elasticache for Memcached DynamoDB Accelerator

ElastiCache for Redis

A company has a production environment on AWS built with Elastic Beanstalk. Which action or feature in Elastic Beanstalk should the company employ to rapidly build a test environment based on this production environment? Elastic Beanstalk clone Elastic Beanstalk migration Elastic Beanstalk update Elastic Beanstalk worker

Elastic Beanstalk clone

In the given AWS step function, which state gets executed? { "StartAt": "LookupCustomerInfo", "States": { "LookupCustomerInfo": { "Type": "Parallel", "End": true, "Branches": [ { "StartAt": "LookupAddress", "States": { "LookupAddress": { "Type": "Task", "Resource": "arn:aws:lambda:us-east-1:123456789012:function:AddressFinder", "End": true } } }, { "StartAt": "LookupAddress", "States": { "LookupAddress": { "Type": "Task", "Resource": "arn:aws:lambda:us-east-1:123456789012:function:PhoneFinder", "End": true } } } ] } } } Execute state LookupAddress and LookupPhone. Execute state LookupAddress. Execute state LookupPhone. Execution fails as End:true.

Execute state LookupAddress and LookupPhone.

When creating a Lambda function, what must be specified to provide the entry point for Lambda calls? Deployment package Event object Context object Function handler

Function handler

A user requested a resource on the server using the HTTP GET API. Which HTTP response code indicates that the request was successfully handled? HTTP response code 200 HTTP response code 404 HTTP response code 201 HTTP response code 400

HTTP response code 200

Which policy is used to give an application global read-and-write access to all services in AWS? Resource policy Identity policy Password policy Session policy

Identity policy

You are a developer for an e-commerce startup using Amazon RDS to store their transaction details. The startup wants to improve the application performance and reduce database costs. Which cache strategy will work best if it will be costly to regenerate the cache material if the data is lost? Migrate the database to Amazon Redshift. Implement Amazon ElastiCache Memcached. Install Redis on an Amazon EC2 instance. Implement Amazon ElastiCache Redis in Cluster Mode.

Implement Amazon ElastiCache Redis in Cluster Mode.

A healthcare company wants to migrate critical patient data to AWS. Top management wants the data to be encrypted before it is sent to Amazon S3 for storage. They also agree that the company's security team should maintain and manage the encryption keys. Which encryption method can be used in this scenario to protect the client data at rest? Implement server-side encryption using customer-provided encryption keys Implement client-side encryption using an AWS Key Management Service (KMS) managed customer master key (CMK) Implement client-side encryption using Amazon S3 managed keys Implement server-side encryption by using a client-side master key

Implement client-side encryption using an AWS Key Management Service (KMS) managed customer master key (CMK)

What permissions does the identity-based policy specify? { "Version": "2012-10-17", "Statement": [ { "Sid": "ListObjectsInBucket", "Effect": "Allow", "Action": ["s3:ListBucket"], "Resource": ["arn:aws:s3:::bucket-name"], }, { "Sid": "AllObjectActions", "Effect": "Allow", "Action": "s3:*Object", "Resource": ["arn:aws:s3:::bucket-name/*"] } ] { It allows read and write access to objects in a specific S3 bucket. It allows only to write objects to a specific bucket. It allows only read objects in a specific S3 bucket. It restricts Delete objects in a specific S3 bucket.

It allows read and write access to objects in a specific S3 bucket

What is the role of an Application Load Balancer in an Elastic Container Service (ECS)? It is used to create a static host. It is used to organize container configurations. It is used to create an elastic internet protocol address. It is used to facilitate dynamic port forwarding.

It is used to facilitate dynamic port forwarding.

A company develops an application that requires an eventual consistency model and scheduled function execution. Which solution should be used? ElastiCache CloudFront Lambda Athena

Lambda

Which logging mechanism provides a collection of logs in CloudWatch that share the same source? Log subscription Log group Log filter Log stream

Log stream

REST APIs enable you to develop all kinds of web applications that have all possible CRUD (create, retrieve, update, delete) operations. Which HTTP method is used for creating a new resource? GET PUT PATCH POST

POST

An application streams real-time data to Simple Queue Service (SQS). Critical events must be detected to trigger notifications. The developer needs to ensure that the processing does not affect other Lambda functions. Which Lambda feature meets this requirement? Provisioned concurrency Synchronous notification Asynchronous notification Reserved concurrency

Reserved concurrency

A company has deployed CloudWatch for its logging requirements in AWS. It is now attempting to associate a Key Management Service (KMS) key with the log groups to provide encryption at rest. When running the associate-kms-key CLI, an AccessDeniedException error is returned. The developers know the key exists in KMS, so they need to provide permissions to access the key. Which policy should be changed to add permissions to this key? Session policy Identity-based policy Resource policy Service control policy

Resource policy

Which item should be configured to grant an EC2 instance access to an S3 bucket without the use of a password? Root user Federated user Role User

Role

A company is using AWS Serverless Application Model (SAM) to manage an application. Each time a deployment is run, it wants to be able to back up the packages created by that deployment. Where are the packages created by the SAM templates stored? CodeDeploy EFS S3 CloudFront

S3

What is CodePipeline's default location to store artifacts? EC2 GitHub CodeCommit S3

S3

A company with remote offices in different countries uses a centralized S3 bucket for data backup. Each branch does multiple uploads to the S3 bucket daily. Recently, the rate of uploads has slowed. Which service can the company use to speed up data exchange between the remote offices and the central S3 bucket? Amazon ElastiCache for Memcached Amazon CloudFront S3 Transfer Acceleration Amazon ElastiCache for Redis

S3 Transfer Acceleration

What is the effect of this resource-based policy? { "Version": "2012-10-17", "Id": "default", "Statement": [ { "Sid": "lambda-allow-s3-my-function", "Effect": "Allow", "Principal": { "Service": "s3.amazonaws.com" }, "Action": "lambda:InvokeFunction", "Resource": "arn:aws:lambda:us-east-2:123456789012:function:my-function:*", "Condition": { "StringEquals": { "AWS:SourceAccount": "123456789012" }, "ArnLike": { "AWS:SourceArn": "arn:aws:s3:::my-bucket" } } } S3 can invoke the Lambda function my-function for a bucket named my-bucket. The Lambda function can access all the S3 buckets that belong to AWS account: 123456789012. The Lambda function can only access the bucket my-bucket. S3 can invoke the Lambda function my-function for all buckets that belong to the AWS account:123456789012.

S3 can invoke the Lambda function my-function for a bucket named my-bucket.

To provide a performant and cost-effective experience, X-Ray does not collect data for every request that is sent to an application. Instead, it collects data for a statistically significant number of requests. This is called a _____________.

Sampling

What is required to run X-Ray with Elastic Beanstalk? Install the X-Ray daemon on the instances Set XRayEnabled to true in a config file inside the .ebextensions folder Set XRayEnabled to true in a config file in the root folder of the app Use the X-Ray API calls on the code

Set XRayEnabled to true in a config file inside the .ebextensions folder

A Lambda function requires access to a Simple Storage Service (S3) bucket to write its output. How should Lambda be configured? Set a role with the required permissions, passing it to the Lambda function Set the S3 bucket as the destination for the Lambda function Set a role with the required permissions as the Lambda function execution role Set the S3 bucket as the trigger for the Lambda function

Set a role with the required permissions as the Lambda function execution role

An application needs a middleware solution with the following requirements: adapts to sudden spikes of traffic operates asynchronously persists data for up to one year requires no capacity provisioning Which solution meets these requirements? Simple Queue Service (SQS) Simple Notification Service (SNS) Kinesis Data Streams Kinesis Firehose

Simple Queue Service (SQS)

A developer has X-Ray for code running in an EC2 instance, and no data about the application is seen in the X-Ray console. What can be causing this problem? The EC2 instance has no public IP address. The EC2 instance is not memory optimized. The developer does not have permissions to write to X-Ray. The X-Ray daemon is not running on the instance.

The X-Ray daemon is not running on the instance.

A developer makes an API request to the Amazon S3 service in the process of testing an application. The S3 service performs the request and returns a response that includes an HTTP 404 error code. Where should the developer handle the error? The Amazon S3 console The developer's application The AWS internal server The proxy server

The developer's application

A company plans to deploy AWS CodeBuild and needs to securely pass a password into the build process.How should this be done? Through an Amazon S3 bucket Through the AWS Secrets Manager In a GitHub repository Through the SSM Parameter Store

Through the AWS Secrets Manager

An X-Ray ______ is a set of data points that share the same ID.

Trace

An AWS SAM template follows the CloudFormation template format. Which declaration specifies that template is an AWS SAM template? Properties Transform Resources Policies

Transform

What is a required field in an AWS Step Functions state? OutputPath Type Comment InputPath

Type

An IT security team has noticed a sudden spike in traffic and has determined that their VPC subnet is experiencing a DDoS attack from three specific IPs. What is the fastest way of stopping this unwanted traffic to prevent any further damage? Update the inbound network access control list (ACL) to deny access to connections originating from the identified IPs. Update the outbound security group of the EC2 instance to deny access from the identified IPs. Update the outbound network access control list (ACL) to deny access to connections originating from the identified IPs. Update the inbound security group of the EC2 instance to deny access from the identified IPs.

Update the inbound network access control list (ACL) to deny access to connections originating from the identified IPs.

A social media application that manages millions of user profiles is experiencing a page load delay. As more users visit the system at the same time, each web page viewed also loads the user profile from the database. Which caching strategy can be used to cache user profiles to reduce the database load? Install RDS database on an Amazon EC2 Instance to cache user profile data. Use a write-through caching strategy. Use Amazon ElastiCache cluster to cache user profile data. Use lazy loading caching strategy. Install RDS database on an Amazon EC2 Instance to cache user profile data. Use a write-through caching strategy. Use Amazon ElastiCache cluster to cache user profile data. Use a write-through caching strategy.

Use Amazon ElastiCache cluster to cache user profile data. Use lazy loading caching strategy.

A company is using DynamoDB to manage a large customer base spread across three regions. The company has three separate CustomerProfiles tables to allow customers in each region to update their profile information. Changes to data in one table are currently not reflected in other tables and customers in one region could lose their data if that region becomes unavailable. Which solution can the company use to keep the DynamoDB tables in sync? Create a local secondary index (LSI) from the base music table. Use a global table. Use global secondary index (GSI). Write code to replicate data changes among these tables.

Use a global table.

A bank is using DynamoDB to manage their transaction records. The database has grown to tens of millions of records and querying the table is resulting in increased latency and cost. How can the bank optimize the database to reduce latency and costs, and still be able to query the entire table across all partitions with attributes other than the primary key? Use a composite primary key. Use local secondary index (LSI). Use the Scan operation. Use global secondary index (GSI).

Use global secondary index (GSI)

An organization is looking to reduce costs associated with GET requests to a Simple Storage Service (S3) bucket. Which technique can the developers use to reduce the size of the request query? Use a unique key identifier Use prefixes and delimiters Use suffixes and delimiters Use prefixes and suffixes

Use prefixes and delimiters

A developer tries to upload a 17 GB object to Amazon S3. The upload failed and the developer received an error message that said, "Your proposed upload exceeds the maximum allowed size." How should the developer upload the object? Use Amazon Redshift instead Retry the upload with a single PUT operation Use the multipart upload API Upload the object over an AWS Direct Connect connection

Use the multipart upload API

A company is planning to migrate an existing Python application to AWS as a collection of Lambda functions. It needs to redevelop its package tooling to prepare the application and manage the deployment of dependencies. Which technology should be used to isolate Python dependencies in the Lambda package when packaging the application? Composer Virtualenv Docker Conda

Virtualenv

Helps developers analyze and debug production, distributed applications, such as those built using a microservices architecture.

X-Ray

An X-Ray ________ is system-defined, or user-defined data associated with a segment.

annotation

A developer needs to ensure encryption in transit is active for operations on an S3 bucket. Which condition must be present in the bucket policy? aws:PrincipalServiceName aws:MultiFactorAuthPresent aws:SecureTransport aws:FederatedProvider

aws:SecureTransport

A developer needs to force the use of SSL for data in transit with the S3 buckets. Which condition should be used in the bucket policy to force the use of SSL? aws:VersionId s3:x-amz-server-side-encryption aws:SecureTransport s3:x-amz-storage-class

aws:SecureTransport

A developer is running Docker command line interface (CLI) commands from a bash terminal to manage Docker images and containers. Which CLI command can the developer use to launch a container from a Docker image? docker push docker build docker ps docker run

docker run

Which permission should a developer use to allow an entity to assign additional permissions? sts:GetSessionToken iam:PassRole iam:AttachRolePolicy sts:GetCallerIdentity

iam:PassRole

A company just deployed a containerized guest book application onto Kubernetes clusters. They are using Amazon EKS to manage and scale the containerized application. Which command line tool can the developers use to interact with the Kubernetes infrastructure and view the Kubernetes resources? Boto3 eksctl AWS CLI kubectl

kubectl

A developer is working on deploying a new Node application with Elastic Beanstalk. He needs to make sure all dependencies are deployed alongside the main application source code. Which file name should this developer use to describe the dependencies that need to be deployed? requirements.txt package.json manifest.mf build.gradle

package.json

Which command is used to upload a SAM template to AWS S3? sam build sam package sam deploy sam init

sam package

An X-Ray ________ encapsulates all the data points for a single component (for example, authorization service) of the distributed application.

segment

X-Ray _____________ provide more granular timing information and details about downstream calls that your application made to fulfill the original request.

sub-segments


Ensembles d'études connexes

Chp 16: Reentry into the Community

View Set

STAAR Vocab English 9th grade: Set 1

View Set

Chapter 1: General Principles of Pharmacology - PrepU

View Set

5.7A Formación de rocas sedimentarias y combustibles fósiles

View Set

Bones of the upper limbs or upper extremities

View Set

NU 226 Prep U Chapter 39: Oxygenation & Perfusion

View Set