AWS DEVELOPER TEST MISSED QUESTIONS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A developer is instrumenting an application which will be hosted in a large On-Demand EC2 instance in AWS. Which of the following are valid considerations in X-Ray that the developer should follow? (Select TWO.) Set the metadata object with any additional custom data that you want to store in the segment. Set the namespace subsegment field to aws for AWS SDK calls and remote for other downstream calls. Set the metadata object with key-value pairs that you want X-Ray to index for search. Set the namespace subsegment field to remote for AWS SDK calls and aws for other downstream calls. Set the annotations object with any additional custom data that you want to store in the segment.

12

A developer is designing a multi-threaded e-commerce application that will be reading and writing data on a DynamoDB table. There will be a lot of people who will use the application to update the price of items in the table at the same time. The application should prevent an update operation from modifying an item if one of its attributes has a certain value. Which of the following is the most suitable solution that the developer should use in this application? Use batch operations. Use optimistic locking and conditional writes. Use atomic counters. Use pessimistic locking and conditional writes.

2

A developer is instructed to set up a new serverless architecture composed of AWS Lambda, API Gateway, and DynamoDB in a single stack. The new architecture should allow the developer to locally build, test, and debug serverless applications. Which of the following should the developer use to satisfy the above requirement? CloudFormation AWS Serverless Application Model (AWS SAM) OpsWorks Elastic Beanstalk

2

A developer is working on an online game based on a popular movie, which may have a few users on its first few weeks of release. However, it is expected to grow and reach millions of concurrent users, with terabytes or more of new data generated per day. The database must seamlessly handle hundreds of thousands of reads and writes per second. Which of the following would be the MOST ideal data store to choose for this application? S3 DynamoDB RDS Redshift

2

An application is hosted in an On-Demand Linux EC2 instance which uses an RDS database. There has been a lot of complaints that the application often crashes but the support team can't pinpoint the problem using CloudWatch. To properly troubleshoot the issue, the team needs to track the memory and swap usage of the instance. Which of the following is the MOST suitable solution to use in this scenario? Use Amazon Inspector. Install the Amazon CloudWatch Logs agent to the EC2 instance. Use detailed monitoring in CloudWatch. Use X-Ray.

2

You are developing an application that continuously collects data about player-game interactions and feeds the real-time data into your gaming platform. There is a requirement to make the system highly scalable to accommodate the sudden influx of gamers that will use the platform. Which AWS service will help you achieve this? AWS Redshift AWS Kinesis Data Stream AWS DynamoDB AWS Elastic Map Reduce

2

You have an application that reads an individual item from a DynamoDB table, modifies it locally, and submits the changes as a new entry to a separate table before proceeding onto the next item. The process is repeated for the next 100 entries, and it consumes a lot of time performing this entire process. Which strategy can be applied to your application in order to shorten the time needed to process all the necessary entries with MINIMAL configuration? Use DynamoDB conditional writes. Use DynamoDB's BatchGetItem and BatchWriteItem API operations. Deploy your application into a cluster of EC2 instances. Modify your application to use multithreading.

2

A development team has several developers where each of them has a corresponding IAM user. It is your primary responsibility to grant the developers access to CodeCommit to enable them to fully utilize the code repositories on their local computers. Which of the following should you implement to grant access to your developers? (Select TWO.) Generate new SSH keys and associate the private SSH key to each of your developer's IAM user. Enable Multi-Factor Authentication (MFA) for each IAM User. Generate HTTPS Git credentials. Generate new SSH keys and associate the public SSH key to each of your developer's IAM user. Generate Git credentials in Github.

34

A company has 5 different applications running on several On-Demand EC2 instances. The DevOps team is required to set up a graphical representation of the key performance metrics for each application. These system metrics must be available on a single shared screen for more effective and visible monitoring. Which of the following should the DevOps team do to satisfy this requirement using Amazon CloudWatch? Set up a custom CloudWatch Alarm with a unique metric name for each application. Set up a custom CloudWatch Event with a unique metric name for each application. Set up a custom CloudWatch dimension with a unique metric name for each application. Set up a custom CloudWatch namespace with a unique metric name for each application.

4

A developer has been instructed to configure Cross-Region Replication (CRR) to their S3 bucket as part of the company's disaster recovery plan. She is using the put-bucket-replication AWS CLI to enable CRR on the bucket but it fails whenever she attempts to issue the command. However, the same command works for the other S3 buckets. Which of the following options is the MOST likely reason for this issue? Amazon S3 Object Lock is enabled in the bucket. The bucket should be configured as a static web hosting first. S3 Transfer Acceleration is not enabled in the bucket. Versioning is not enabled in the bucket.

4

An EBS-backed EC2 instance has been recently reported to contain a malware that could spread to your other instances. To fix this security vulnerability, you will need to attach its root EBS volume to a new EC2 instance which hosts a security program that can scan viruses, worms, Trojan horses, or spyware. What steps would you take to detach the root volume from the compromised EC2 instance? Unmount the volume, stop the instance, and then detach. Unmount the volume from the OS and then detach. Stop the instance then detach the volume. Detach the volume from the AWS Console. AWS takes care of unmounting the volume for you.

3

A software engineer is developing a serverless application which will use a DynamoDB database. One of the requirements is that each write request should return the total number of write capacity units consumed, with subtotals for the table and any secondary indexes that were affected by the operation. What should be done to accomplish this feature? Add the ReturnConsumedCapacity parameter with a value of TOTAL in every write request. Add the ReturnValues parameter with a value of TOTAL in every write request. Add the ReturnValues parameter with a value of INDEXES in every write request. Add the ReturnConsumedCapacity parameter with a value of INDEXES in every write request.

4

A startup has an urgent requirement to deploy their new NodeJS application to AWS. You were assigned to perform the deployment to a service where you don't need to worry about the underlying infrastructure that runs the application. The service must also automatically handle provisioning, load balancing, scaling, and application health monitoring. Which service will you use to easily deploy and manage the application? AWS CloudFormation AWS SAM AWS CodeDeploy AWS Elastic Beanstalk

4

An application is hosted in Elastic Beanstalk with an ElastiCache cluster that acts as a database cache layer for accessing its data in DynamoDB. It is currently configured to write the data to the cache only if there is a cache miss, which causes the data in the cache to become stale. A developer is instructed to ensure that the data in the cache is always current and to minimize wasted space in the cluster by automatically deleting the data that are never read. What is the BEST way to implement this to satisfy the given requirement? Use a Write Through caching strategy. Use a Lazy Loading caching strategy. Implement Lazy Loading in the application in conjunction with the Write Through caching strategy. Implement a Write Through caching strategy in the application and enable TTL in Elasticache.

4

You are developing an online learning platform using Lambda, Elastic Beanstalk, and DynamoDB. There is a requirement that whenever a new customer is added to the DynamoDB table, it will invoke a Lambda function that sends a welcome email to the customer. Which of the following is the MOST suitable solution that you should use to implement this feature? Enable DynamoDB Transactions and configure it as the event source for the Lambda function. Use Amazon Kinesis Data Streams to track all new data in your table and configure it as the event source for the Lambda function. Use CloudWatch Events to track all new data in your table and configure it as the event source for the Lambda function. Enable DynamoDB Streams and configure it as the event source for the Lambda function.

4

A developer is designing a multi-tiered system which utilizes various AWS resources. The application will be hosted in Elastic Beanstalk, which uses an RDS database and an S3 bucket that is configured to use Server-Side Encryption with Customer-Provided Encryption Keys (SSE-C). In this configuration, Amazon S3 does not store the encryption key you provide but instead, stores a randomly salted hash-based message authentication code (HMAC) value of the encryption key in order to validate future requests. Which of the following is a valid consideration that the developer should keep in mind when implementing this architecture? If you lose the encryption key, you lose the object. The salted HMAC value can be used to decrypt the contents of the encrypted object. If you lose the encryption key, the salted HMAC value can be used to decrypt the object. The salted HMAC value can be used to derive the value of the encryption key.

1

A developer is writing a CloudFormation template which will be used to deploy a simple Lambda function to AWS. The function to be deployed is made in Python with just 3 lines of codes which can be written inline in the template. Which parameter of the AWS::Lambda::Function resource should the developer use to place the Python code in the template? ZipFile CodeUri Code Handler

1

A global financial company has hundreds of users from all over the world that regularly upload terabytes of transactional data to a centralized S3 bucket. You noticed that there are some users from different parts of the globe that take a lot of time to upload their data, which causes delays in the processing. You need to improve data throughput and ensure consistently fast data transfer to the S3 bucket regardless of the user's location. Which of the following features should you use to satisfy the above requirement? Amazon S3 Transfer Acceleration AWS Direct Connect AWS Transfer for SFTP CloudFront

1

A medical technology company has a system hosted in AWS that manages their patients' high-resolution imaging records such as MRI, PET Positron Emission Tomography, CAT scan, and many others. For their archiving process, the records that are one year older are encrypted before they are archived to AWS Glacier. A doctor has a non-urgent request for a patient's medical record from 2 years ago, which should be made available within 5 hours. Which of the following is the MOST cost-effective retrieval option to use in this scenario? Standard Retrieval Bulk Retrieval Expedited Retrieval Ranged Archive Retrievals

1

A real-time IoT device monitoring application is using Amazon Kinesis Data Stream to ingest data with several EC2 instances used for processing. The developer noticed that the rate of data flow in the stream is steadily growing which means that the stream's capacity must also be increased to maintain peak performance. What should the developer do to increase the capacity of the stream? Split every shard in the stream. Upgrade the instance type of the EC2 instances. Integrate Amazon Kinesis Data Firehose with the Amazon Kinesis Data Stream to increase the capacity of the stream. Merge every shard in the stream

1

A web application is currently using an on-premises Microsoft SQL Server 2019 Enterprise Edition database. Your manager instructed you to migrate the application to Elastic Beanstalk and the database to RDS. For additional security, you must configure your database to automatically encrypt data before it is written to storage, and automatically decrypt data when the data is read from storage. Which of the following services will you use to achieve this? Enable Transparent Data Encryption (TDE). Use Microsoft SQL Server Windows Authentication. Use IAM DB Authentication. Enable RDS Encryption.

1

A write-heavy data analytics application is using DynamoDB database which has global secondary index. Whenever the application is performing heavy write activities on the table, the DynamoDB requests return a ProvisionedThroughputExceededException. Which of the following is the MOST likely cause of this issue? The provisioned write capacity for the global secondary index is less than the write capacity of the base table. The rate of requests exceeds the allowed throughput. The provisioned write capacity for the global secondary index is greater than the write capacity of the base table. The provisioned throughput exceeds the current throughput limit for your account.

1

An aerospace engineering company has recently migrated to AWS for their cloud architecture. They are using CloudFormation and AWS SAM as deployment services for both of their monolithic and serverless applications. There is a new requirement where you have to dynamically install packages, create files, and start services on your EC2 instances upon the deployment of the application stack using CloudFormation. Which of the following helper scripts should you use in this scenario? cfn-init cfn-signal cfn-get-metadata cfn-hup

1

You work for a software development company where the teams are divided into distinct projects. The management wants to have separation on their AWS resources, which will have a detailed report on the costs of each project. Which of the following options is the recommended way to implement this? Create separate AWS accounts for each project and use consolidated billing. Create separate AWS accounts for each project and generate Detailed Billing for each account. Tag resources by IAM group assigned for each project and use Detailed Billing reports to show costing. Tag resources by projects and use Detailed Billing Reports to show costing per tag.

1

A developer runs a shell script that uses the AWS CLI to upload a large file to an S3 bucket, which includes an AWS KMS key. An Access Denied error always shows up whenever the developer uploads a file with a size of 100 GB or more. However, when he tried to upload a smaller file with the KMS key, the upload succeeds. Which of the following are possible reasons why this issue is happening? (Select TWO.) The developer does not have the kms:Decrypt permission. The developer does not have the kms:Encrypt permission. The AWS CLI S3 commands perform a multipart upload when the file is large. The maximum size that can be encrypted in KMS is only 100 GB. The developer's IAM permission has an attached inline policy that restricts him from uploading a file to S3 with a size of 100 GB or more.

13

A company has an application that is using CloudFront to serve their static contents to their users around the globe. They are receiving a number of bad reviews from their customers lately because it takes a lot of time to log into their website. Sometimes, their users are also getting HTTP 504 errors which is why the developer was instructed to fix this problem immediately. Which of the following combination of options should the developer use together to set up a cost-effective solution for this scenario? (Select TWO.) Customize the content that the CloudFront web distribution delivers to your users using Lambda@Edge, which allows your Lambda functions to execute the authentication process in AWS locations closer to the users. Add a Cache-Control max-age directive to your objects in CloudFront and specify the longest practical value for max-age to increase the cache hit ratio of your CloudFront distribution. Launch your application to multiple and geographically disperse VPCs on various AWS regions then create a transit VPC to easily connect all your resources. Use several Lambda functions in each region using the AWS Serverless Application Model (SAM) service to improve the overall application performance. Launch your application to multiple AWS regions to serve your global users. Use a Route 53 record with latency routing policy to route incoming traffic to the region with the best latency to the user. Configure an origin failover by creating an origin group with two origins. Specify one as the primary origin and the other as the second origin which CloudFront automatically switches to when the primary origin returns specific HTTP status code failure responses.

15

You were recently hired as a developer for a leading insurance firm in Asia which has a hybrid cloud architecture with AWS. The project that was assigned to you involves setting up a static website using Amazon S3 with a CORS configuration as shown below: <?xml version="1.0" encoding="UTF-8"?> <CORSConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> <CORSRule> <AllowedOrigin>https://tutorialsdojo.com</AllowedOrigin> <AllowedMethod>GET</AllowedMethod> <AllowedMethod>PUT</AllowedMethod> <AllowedMethod>POST</AllowedMethod> <AllowedMethod>DELETE</AllowedMethod> <AllowedHeader>*</AllowedHeader> <ExposeHeader>ETag</ExposeHeader> <ExposeHeader>x-amz-meta-custom-header</ExposeHeader> <MaxAgeSeconds>3600</MaxAgeSeconds> </CORSRule> </CORSConfiguration> Which of the following statements are TRUE with regards to this S3 configuration? (Select TWO.) It allows a user to view, add, remove or update objects inside the S3 bucket from the domain tutorialsdojo.com. The request will fail if the x-amz-meta-custom-header header is not included. This configuration authorizes the user to perform actions on the S3 bucket. All HTTP Methods are allowed. This will cause the browser to cache the response of the preflight OPTIONS request for 1 hour.

15

A commercial bank is developing an online auction application with a DynamoDB database that will allow customers to bid for real estate properties from the comforts of their homes. The application should allow the minimum acceptable price established by the bank prior to the auction. The opening bid entered by the staff must be at least the minimum bid and the new bids submitted by the customers should be greater than the current bid. The application logic has already been implemented but the DynamoDB database calls should also be tailored to meet the requirements. Which of the following is the MOST effective solution that will satisfy the requirement in this scenario? Use DynamoDB Streams and a Lambda function to track the current bid price and compare against all of the new bids submitted by the customers. Configure the database calls of the application to use conditional updates and conditional writes with a condition expression that will check if the new bid submitted by the customer is greater than the current bid. Use an optimistic locking strategy in your database calls to ensure that the new bid submitted by the customer is greater than the current bid. Enable DynamoDB Transactions to automatically check the minimum acceptable price as well as the current and new bid price.

2

A company has assigned a developer to automate the patch management, data synchronization, and other recurring tasks in their department. The developer needs to have a service which can coordinate multiple AWS services into serverless workflows. Which of the following is the MOST cost-effective service that the developer should implement in this scenario? AWS Batch AWS Step Functions AWS Lambda SWF

2

A company is currently in the process of integrating their on-premises data center to their cloud infrastructure in AWS. One of the requirements is to integrate the on-premises Lightweight Directory Access Protocol (LDAP) directory service to their AWS VPC using IAM. Which of the following provides the MOST suitable solution to implement if the identity store that they are using is not compatible with SAML? Implement the AWS Single Sign-On (SSO) service to enable single sign-on between AWS and your LDAP. Create a custom identity broker application in your on-premises data center and use STS to issue short-lived AWS credentials. Set up an IAM policy that references the LDAP identifiers and AWS credentials. Create IAM roles to rotate the IAM credentials whenever LDAP credentials are updated.

2

A developer is planning to add a global secondary index in a DynamoDB table. This will allow the application to query a specific index that can span all of the data in the base table, across all partitions. Which of the following should the developer consider when using this type of index? (Select TWO.) Queries or scans on this index consume read capacity units from the base table. Queries on this index support eventual consistency only. When you query this index, you can choose either eventual consistency or strong consistency. Queries or scans on this index consume capacity units from the index, not from the base table. For each partition key value, the total size of all indexed items must be 10 GB or less.

24

A company has an application that is using CloudFront to serve their static contents to their users around the globe. They are receiving a number of bad reviews from their customers lately because it takes a lot of time to log into their website. Sometimes, their users are also getting HTTP 504 errors which is why the developer was instructed to fix this problem immediately. Which of the following combination of options should the developer use together to set up a cost-effective solution for this scenario? (Select TWO.) Launch your application to multiple AWS regions to serve your global users. Use a Route 53 record with latency routing policy to route incoming traffic to the region with the best latency to the user. Customize the content that the CloudFront web distribution delivers to your users using Lambda@Edge, which allows your Lambda functions to execute the authentication process in AWS locations closer to the users. Launch your application to multiple and geographically disperse VPCs on various AWS regions then create a transit VPC to easily connect all your resources. Use several Lambda functions in each region using the AWS Serverless Application Model (SAM) service to improve the overall application performance. Add a Cache-Control max-age directive to your objects in CloudFront and specify the longest practical value for max-age to increase the cache hit ratio of your CloudFront distribution. Configure an origin failover by creating an origin group with two origins. Specify one as the primary origin and the other as the second origin which CloudFront automatically switches to when the primary origin returns specific HTTP status code failure responses.

25

A company is developing a serverless website that consists of images, videos, HTML pages and JavaScript files. There is also a requirement to serve the files with lowest possible latency to its global users. Which combination of services should be used in this scenario? (Select TWO.) AWS CodeStar Amazon S3 Amazon Elastic File System Amazon Glacier Amazon CloudFront

25

A developer is working on an application that will process encrypted files. The application will use AWS KMS to decrypt the files locally before it can proceed with the processing of the files. Which of the following are valid and secure steps in decrypting data? (Select TWO.) Use the Decrypt operation to decrypt the plaintext data key. Use the plaintext data key to decrypt data locally, then erase the plaintext data key from memory. Use the plaintext data key to decrypt data locally, then erase the encrypted data key from memory. Use the encrypted data key to decrypt data locally, then erase the encrypted data key from memory. Use the Decrypt operation to decrypt the encrypted data key.

25

A development team has recently completed building their serverless application and they are now ready to deploy it to AWS. They need to zip their code artifacts, upload them to Amazon S3, and produce the package template file for deployment. Which combination of commands is the MOST suitable for automating the deployment steps? (Select TWO.) aws cloudformation package sam package sam publish aws cloudformation deploy sam deploy

25

You are a software developer for a multinational investment bank which has a hybrid cloud architecture with AWS. To improve the security of their applications, they decided to use AWS Key Management Service (KMS) to create and manage their encryption keys across a wide range of AWS services. You were given the responsibility to integrate AWS KMS with the financial applications of the company. Which of the following are the recommended steps to locally encrypt data using AWS KMS that you should follow? (Select TWO.) Erase the encrypted data key from memory and store the plaintext data key alongside the locally encrypted data. Erase the plaintext data key from memory and store the encrypted data key alongside the locally encrypted data. Use the GenerateDataKeyWithoutPlaintext operation to get a data encryption key then use the plaintext data key in the response to encrypt data locally. Encrypt data locally using the Encrypt operation. Use the GenerateDataKey operation to get a data encryption key then use the plaintext data key in the response to encrypt data locally.

25

A clickstream application is using Amazon Kinesis Data Stream for real-time processing. PutRecord API calls are being used by the producer to send data to the stream. However, there are cases where the producer was intermittently restarted while doing the processing, which resulted to sending the same data twice to the stream. This inadvertently causes duplication of entries in the data stream which affects the processing of the consumers. Which of the following should you implement to resolve this issue? Split shards of the data stream. Add more shards. Embed a primary key within the record. Merge shards of the data stream.

3

A company is using OpenAPI, which is also known as Swagger, for the API specifications of their REST web services that are hosted on their on-premises data center. They want to migrate their system to AWS using Lambda and API Gateway. In line with this, you are instructed to create a new API and populate it with the resources and methods from their Swagger definition. Which of the following is the EASIEST way to accomplish this task? Create models and templates for request and response mappings based on the company's API definitions. Use CodeDeploy to migrate and deploy the company's web services to API Gateway. Import their Swagger or OpenAPI definitions to API Gateway using the AWS Console. Use AWS SAM to migrate and deploy the company's web services to API Gateway.

3

A cryptocurrency exchange portal has a key management service hosted in their on-premises data center, which stores encryption keys and uses an RSA asymmetric encryption algorithm. The company has recently implemented a hybrid cloud architecture in AWS and you were assigned to migrate the exchange portal to their cloud infrastructure. For security compliance, the keys should be stored in dedicated, third-party validated hardware security modules under your exclusive control. Which of the following is the BEST solution that you should implement to meet the above requirement? Develop a custom key management service using the AWS Encryption SDK. Import the encryption keys from your on-premises key management service to AWS Secrets Manager as Customer Master Keys (CMKs). Import the encryption keys from your on-premises key management service to AWS CloudHSM. Use AWS KMS to store and manage the encryption keys.

3

A developer is designing an application which will be hosted in ECS and uses an EC2 launch type. You need to group your container instances by certain attributes such as Availability Zone, instance type, or custom metadata. After you have defined a group of container instances, you will need to customize Amazon ECS to place tasks on container instances based on the group you specified. Which of the following ECS features provides you with expressions that you can use to group container instances by a specific attribute? Task Groups Task Placement Constraints Cluster Query Language Task Placement Strategies

3

A developer monitors multiple sensors inside a data center which detects various environmental conditions that may affect their running servers. In the current architecture, the data is initially processed by an AWS Lambda function and then stored in an Amazon Redshift Cluster. To make the system more durable and scalable, the developer used an Amazon SQS FIFO queue to store the data which will be polled by the Lambda function. There is a known issue with the sensor devices that they occasionally send duplicate data. What should you do to manage and avoid duplicates in your system? Refactor the Lambda function to store the message's content and drop the incoming messages with similar content within a 5-minute period. Configure the Amazon SQS queue to automatically drop a duplicate message whenever it arrives within the message's VisibilityTimeout. Add a MessageDeduplicationId parameter to the SendMessage API request. Ensure that the messages are sent at least 5 minutes apart. Use an Amazon SQS Standard queue instead of a FIFO queue to avoid any duplicate messages.

3

A web application running in Amazon Elastic Beanstalk reads and writes a large number of related items in DynamoDB and processes each item one at a time. The network overhead of these transactions causes degradation in the application's performance. You were instructed by your manager to quickly refactor the application but without introducing major code changes such as implementing concurrency management or multithreading. Which of the following solutions is the EASIEST method to implement that will improve the application performance in a cost-effective manner? Refactor the application to use DynamoDB transactional read and write APIs . Enable DynamoDB Streams. Use DynamoDB Batch Operations API for GET, PUT, and DELETE operations. Upgrade the EC2 instances to a higher instance type.

3

You are designing an online medical appointment system that allows patients to book an appointment with their preferred doctor at medical centers all over the country. The DynamoDB Streams feature is enabled in your DynamoDB database, which allows you to capture information about every modification to data items in your table. A Lambda function integrated with CloudWatch Events is used to process the data stream every 36 hours then store the results in an S3 bucket. However, you noticed that there are a lot of updated data in DynamoDB which are not sent to your S3 bucket even though there are no errors in the logs. Which of the following is the MOST appropriate solution for this issue? Set the value of StreamViewType parameter in DynamoDB Streams to NEW_IMAGE. Increase the interval of running your function to 48 hours. Decrease the interval of running your function to 24 hours. Set the value of StreamViewType parameter in DynamoDB Streams to NEW_AND_OLD_IMAGES.

3

You are using an AWS Lambda function to process records in an Amazon Kinesis Data Streams stream which has 100 active shards. The Lambda function takes an average of 10 seconds to process the data and the stream is receiving 50 new items per second. Which of the following statements are TRUE regarding this scenario? The Kinesis shards must be merged to increase the data capacity of the stream as well as the concurrency execution of the Lambda function. The Lambda function will throttle the incoming requests due to the excessive number of Kinesis shards. There will be at most 100 Lambda function invocations running concurrently. The Lambda function has 500 concurrent executions.

3

You have an AWS account, with an ID of 061218980612, which is used by the different departments of your company. You used the AWS CLI command iam create-account-alias --account-alias finance-dept to create a user-friendly identifier for your finance department. Which of the following is a valid sign-in page URL for your AWS account? https://finance-dept.aws.amazon.com/console https://finance-dept.aws.signin.amazon.com/console https://finance-dept.signin.aws.amazon.com/console https://061218980612.aws.signin.amazon.com/console

3

A company has a static website running in an Auto Scaling group of EC2 instances which they want to convert as a dynamic e-commerce web portal. One of the requirements is to use HTTPS to improve the security of their portal and also improve their search ranking as a reputable and secure site. A developer recently requested an SSL/TLS certificate from a third-party certificate authority (CA) which is ready to be imported to AWS. Which of the following services can the developer use to safely import the SSL/TLS certificate? (Select TWO.) CloudFront Amazon Cognito A private S3 bucket with versioning enabled IAM certificate store AWS Certificate Manager

45

A company is heavily using a range of AWS services to host their enterprise applications. Currently, their deployment process still has a lot of manual steps which is why they plan to automate their software delivery process using continuous integration and delivery (CI/CD) pipelines in AWS. They will use CodePipeline to orchestrate each step of their release process and CodeDeploy for deploying applications to various compute platforms in AWS. In this architecture, which of the following are valid considerations when using CodeDeploy? (Select TWO.) The CodeDeploy agent communicates using HTTP over port 80. CodeDeploy can deploy applications to EC2, AWS Lambda, and Amazon ECS only. You have to install and use the CodeDeploy agent installed on your EC2 instances and ECS cluster. AWS Lambda compute platform deployments cannot use an in-place deployment type. CodeDeploy can deploy applications to both your EC2 instances as well as your on-premises servers.

45

A single docker container environment is hosted in Elastic Beanstalk. Your manager instructed you to ensure that the compute resources maintain full capacity during deployments to avoid any degradation of the service or possible down time. Which of the following deployment methods should you use to satisfy the given requirement? (Select TWO.) All at once Canary Rolling Rolling with additional batch Immutable

45

Both the read and write operations to your DynamoDB table are throttled, which are causing errors in your application. You checked the CloudWatch metrics but they indicate that the consumed capacity units haven't exceeded the provisioned capacity units. Upon further investigation, you found that the issue is caused by a "hot partition" in your table in which a certain partition is accessed by your downstream applications much more frequently than other partitions. What should you do to resolve this issue in your application with MINIMAL cost? (Select TWO.) Implement read sharding to distribute workloads evenly. Increase the amount of read or write capacity for your table. Use DynamoDB Accelerator (DAX). Implement error retries and exponential backoff. Refactor your application to distribute your read and write operations as evenly as possible across your table.

45


संबंधित स्टडी सेट्स

chapter 3 The Managers Changing Working Environment and Ethical Responsibilities: Doing the Right Thing

View Set

PrepU Chapter 41: Drug Therapy for Diabetes Mellitus

View Set

Anatomy Homework Questions from Chapter 5 and 6

View Set

Chapter 19 - Plastic and Recontructive Surgery

View Set

ASVAB Practice Questions (sample test questions) P&P

View Set

Biological Psychology Google Form Quiz

View Set

Cultral Geography: Chapter 5 BJU

View Set

125 Basic care and comfort Monday 1-3

View Set