Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

AWS Certified Developer - Associate Question and Answers

AWS Certified Developer - Associate

Last Update Feb 28, 2026
Total Questions : 519

We are offering FREE DVA-C02 Amazon Web Services exam questions. All you do is to just go and sign up. Give your details, prepare DVA-C02 free exam questions and then go for complete pool of AWS Certified Developer - Associate test questions that will help you more.

DVA-C02 pdf

DVA-C02 PDF

$36.75  $104.99
DVA-C02 Engine

DVA-C02 Testing Engine

$43.75  $124.99
DVA-C02 PDF + Engine

DVA-C02 PDF + Testing Engine

$57.75  $164.99
Questions 1

A company is building an application to accept data from customers. The data must be encrypted at rest and in transit.

The application uses an Amazon API Gateway API that resolves to AWS Lambda functions. The Lambda functions store the data in an Amazon Aurora MySQL DB cluster. The application worked properly during testing.

A developer configured an Amazon CloudFront distribution with field-level encryption that uses an AWS Key Management Service (AWS KMS) key. After the configuration of the distribution, the application behaved unexpectedly. All the data in the database changed from plaintext to ciphertext.

The developer must ensure that the data is not stored in the database as the ciphertext from the CloudFront field-level encryption.

Which solution will meet this requirement?

Options:

A.  

Change the CloudFront Viewer protocol policy from "HTTP and HTTPS" to "HTTPS only."

B.  

Add a Lambda function that uses the KMS key to decrypt the data fields before saving the data to the database.

C.  

Enable encryption on the DB cluster by using the same KMS key that is used in CloudFront.

D.  

Request and deploy a new SSL certificate to use with the CloudFront distribution.

Discussion 0
Questions 2

A developer is building an application that uses an Amazon RDS for PostgreSQL database. To meet security requirements, the developer needs to ensure that data is encrypted at rest. The developer must be able to rotate the encryption keys on demand.

Options:

A.  

Use an AWS KMS managed encryption key to encrypt the database.

B.  

Create a symmetric customer managed AWS KMS key. Use the key to encrypt the database.

C.  

Create a 256-bit AES-GCM encryption key. Store the key in AWS Secrets Manager, and enable managed rotation. Use the key to encrypt the database.

D.  

Create a 256-bit AES-GCM encryption key. Store the key in AWS Secrets Manager. Configure an AWS Lambda function to perform key rotation. Use the key to encrypt the database.

Discussion 0
Questions 3

A developer is building a serverless application by using AWS Serverless Application Model (AWS SAM) on multiple AWS Lambda functions.

When the application is deployed, the developer wants to shift 10% of the traffic to the new deployment of the application for the first 10 minutes after deployment. If there are no issues, all traffic must switch over to the new version.

Which change to the AWS SAM template will meet these requirements?

Options:

A.  

Set the Deployment Preference Type to Canary10Percent10Minutes. Set the AutoPublishAlias property to the Lambda alias.

B.  

Set the Deployment Preference Type to LinearlOPercentEvery10Minutes. Set AutoPubIishAIias property to the Lambda alias.

C.  

Set the Deployment Preference Type to CanaryIOPercentIOMinutes. Set the PreTraffic and PostTraffic properties to the Lambda alias.

D.  

Set the Deployment Preference Type to LinearlOPercentEveryIOMinutes. Set PreTraffic and Post Traffic properties to the Lambda alias.

Discussion 0
Questions 4

A company developed an API application on AWS by using Amazon CloudFront. Amazon API Gateway, and AWS Lambda. The API has a minimum of four requests every second A developer notices that many API users run the same query by using the POST method. The developer wants to cache the POST request to optimize the API resources.

Which solution will meet these requirements'?

Options:

A.  

Configure the CloudFront cache Update the application to return cached content based upon the default request headers.

B.  

Override the cache method in me selected stage of API Gateway Select the POST method.

C.  

Save the latest request response in Lambda /tmp directory Update the Lambda function to check the /tmp directory

D.  

Save the latest request m AWS Systems Manager Parameter Store Modify the Lambda function to take the latest request response from Parameter Store

Discussion 0
Questions 5

A company has an application that consists of different microservices that run inside an AWS account. The microservices are running in containers inside a single VPC. The number of microservices is constantly increasing. A developer must create a central logging solution for application logs.

Options:

A.  

Create a different Amazon CloudWatch Logs stream for each microservice.

B.  

Create an AWS CloudTrail trail to log all the API calls.

C.  

Configure VPC Flow Logs to track the communications between the microservices.

D.  

Use AWS Cloud Map to map the interactions of the microservices.

Discussion 0
Questions 6

A bookstore has an ecommerce website that stores order information in an Amazon DynamoDB table named BookOrders. The DynamoDB table contains approximately one million records.

The table uses OrderID as a partition key. There are no other indexes.

A developer wants to build a new reporting feature to retrieve all records from the table for a specified customer, based on a CustomerID property.

Options:

A.  

Create a DynamoDB global secondary index (GSI) on the table. Use CustomerID as the partition key. Use the specified CustomerID value to run a query on the table.

B.  

Create a DynamoDB global secondary index (GSI) on the table. Use CustomerID as the sort key. Use a filter expression to perform a scan operation on the table to match on the specified CustomerID value.

C.  

Create a DynamoDB local secondary index (LSI) on the table. Use CustomerID as the sort key. Run a PartiQL query on the table with a SELECT statement where CustomerID equals the specified CustomerID value.

D.  

Create a DynamoDB local secondary index (LSI) on the table. Use CustomerID as the partition key. Use the specified CustomerID value to run a query on the table.

Discussion 0
Questions 7

A company wants to share information with a third party. The third party has an HTTP API endpoint that the company can use to share the information. The company has the required API key to access the HTTP API.

The company needs a way to manage the API key by using code. The integration of the API key with the application code cannot affect application performance.

Which solution will meet these requirements MOST securely?

Options:

A.  

Store the API credentials in AWS Secrets Manager. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.

B.  

Store the API credentials in a local code variable. Push the code to a secure Git repository. Use the local code variable at runtime to make the API call.

C.  

Store the API credentials as an object in a private Amazon S3 bucket. Restrict access to the S3 object by using IAM policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.

D.  

Store the API credentials in an Amazon DynamoDB table. Restrict access to the table by using resource-based policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.

Discussion 0
Questions 8

A developer used the AWS SDK to create an application that aggregates and produces log records for 10 services. The application delivers data to an Amazon Kinesis Data Streams stream.

Each record contains a log message with a service name, creation timestamp, and other log information. The stream has 15 shards in provisioned capacity mode. The stream uses service name as the partition key.

The developer notices that when all the services are producing logs, ProvisionedThroughputExceededException errors occur during PutRecord requests. The stream metrics show that the write capacity the applications use is below the provisioned capacity.

Options:

A.  

Change the capacity mode from provisioned to on-demand.

B.  

Double the number of shards until the throttling errors stop occurring.

C.  

Change the partition key from service name to creation timestamp.

D.  

Use a separate Kinesis stream for each service to generate the logs.

Discussion 0
Questions 9

A company is expanding the compatibility of its photo-snaring mobile app to hundreds of additional devices with unique screen dimensions and resolutions. Photos are stored in Amazon S3 in their original format and resolution. The company uses an Amazon CloudFront distribution to serve the photos The app includes the dimension and resolution of the display as GET parameters with every request.

A developer needs to implement a solution that optimizes the photos that are served to each device to reduce load time and increase photo quality.

Which solution will meet these requirements MOST cost-effective?

Options:

A.  

Use S3 Batch Operations to invoke an AWS Lambda function to create new variants of the photos with the required dimensions and resolutions. Create a dynamic CloudFront origin that automatically maps the request of each device to the corresponding photo variant.

B.  

Use S3 Batch Operations to invoke an AWS Lambda function to create new variants of the photos with the required dimensions and resolutions. Create a Lambda@Edge function to route requests to the corresponding photo vacant by using request headers.

C.  

Create a Lambda@Edge function that optimizes the photos upon request and returns the photos as a response. Change the CloudFront TTL cache policy to the maximum value possible.

D.  

Create a Lambda@Edge function that optimizes the photos upon request and returns the photos as a response. In the same function store a copy of the processed photos on Amazon S3 for subsequent requests.

Discussion 0
Questions 10

A developer must use multi-factor authentication (MFA) to access data in an Amazon S3 bucket that is in another AWS account. Which AWS Security Token Service (AWS STS) API operation should the developer use with the MFA information to meet this requirement?

Options:

A.  

AssumeRoleWithWebidentity

B.  

GetFederationToken

C.  

AssumeRoleWithSAML

D.  

AssumeRole

Discussion 0
Questions 11

A developer is deploying an application on Amazon EC2 instances that run in Account A. In certain cases, this application needs to read data from a private Amazon S3 bucket in Account B. The developer must provide the application access to the S3 bucket without exposing the S3 bucket to anyone else.

Which combination of actions should the developer take to meet these requirements? (Select TWO.)

Options:

A.  

Create an IAM role with S3 read permissions in Account B.

B.  

Update the instance profile IAM role in Account A with S3 read permissions.

C.  

Make the S3 bucket public with limited access for Account A.

D.  

Configure the bucket policy in Account B to grant permissions to the instance profile role.

E.  

Add a trust policy that allows s3:Get* permissions to the IAM role in Account B.

Discussion 0
Questions 12

A developer creates an AWS Lambda function that is written in Java. During testing, the Lambda function does not work how the developer expected. The developer wants to use tracing capabilities to troubleshoot the problem.

Which AWS service should the developer use to accomplish this goal?

Options:

A.  

AWS Trusted Advisor

B.  

Amazon CloudWatch

C.  

AWS X-Ray

D.  

AWS CloudTrail

Discussion 0
Questions 13

A developer is migrating an application to Amazon Elastic Kubernetes Service (Amazon EKS). The developer migrates the application to Amazon Elastic Container Registry (Amazon ECR) with an EKS cluster.

As part of the application migration to a new backend, the developer creates a new AWS account. The developer makes configuration changes to the application to point the application to the new AWS account and to use new backend resources. The developer successfully tests the changes within the application by deploying the pipeline.

The Docker image build and the pipeline deployment are successful, but the application is still connecting to the old backend. The developer finds that the application's configuration is still referencing the original EKS cluster and not referencing the new backend resources.

Which reason can explain why the application is not connecting to the new resources?

Options:

A.  

The developer did not successfully create the new AWS account.

B.  

The developer added a new tag to the Docker image.

C.  

The developer did not update the Docker image tag to a new version.

D.  

The developer pushed the changes to a new Docker image tag.

Discussion 0
Questions 14

A developer is creating a new batch application that will run on an Amazon EC2 instance. The application requires read access to an Amazon S3 bucket. The developer needs to follow security best practices to grant S3 read access to the application.

Which solution meets these requirements?

Options:

A.  

Add the permissions to an 1AM policy. Attach the policy to a role. Attach the role to the EC2 instance profile.

B.  

Add the permissions inline to an 1AM group. Attach the group to the EC2 instance profile.

C.  

Add the permissions to an 1AM policy. Attach the policy to a user. Attach the user to the EC2 instance profile.

D.  

Add the permissions to an 1AM policy. Use 1AM web identity federation to access the S3 bucket with the policy.

Discussion 0
Questions 15

A developer is creating a mobile application that will not require users to log in.

What is the MOST efficient method to grant users access to AWS resources'?

Options:

A.  

Use an identity provider to securely authenticate with the application.

B.  

Create an AWS Lambda function to create an 1AM user when a user accesses the application.

C.  

Create credentials using AWS KMS and apply these credentials to users when using the application.

D.  

Use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources.

Discussion 0
Questions 16

A company has a web application that is hosted on Amazon EC2 instances The EC2 instances are configured to stream logs to Amazon CloudWatch Logs The company needs to receive an Amazon Simple Notification Service (Amazon SNS) notification when the number of application error messages exceeds a defined threshold within a 5-minute period

Which solution will meet these requirements?

Options:

A.  

Rewrite the application code to stream application logs to Amazon SNS Configure an SNS topic to send a notification when the number of errors exceeds the defined threshold within a 5-minute period

B.  

Configure a subscription filter on the CloudWatch Logs log group. Configure the filter to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period.

C.  

Install and configure the Amazon Inspector agent on the EC2 instances to monitor for errors Configure Amazon Inspector to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period

D.  

Create a CloudWatch metric filter to match the application error pattern in the log data. Set up a CloudWatch alarm based on the new custom metric. Configure the alarm to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period.

Discussion 0
Questions 17

A developer is creating a template that uses AWS CloudFormation to deploy an application. The application is serverless and uses Amazon API Gateway, Amazon DynamoDB, and AWS Lambda.

Which AWS service or tool should the developer use to define serverless resources in YAML?

Options:

A.  

CloudFormation serverless intrinsic functions

B.  

AWS Elastic Beanstalk

C.  

AWS Serverless Application Model (AWS SAM)

D.  

AWS Cloud Development Kit (AWS CDK)

Discussion 0
Questions 18

A developer is managing an application that uploads user files to an Amazon S3 bucket named companybucket. The company wants to maintain copies of all the files uploaded by users for compliance purposes, while ensuring users still have access to the data through the application.

Which IAM permissions should be applied to users to ensure they can create but not remove files from the bucket?

Options:

A.  

{"Version": "2012-10-17","Statement": [{"Sid": "statement1","Effect": "Allow","Action": ["s3:GetObject", "s3:PutObject", "s3:DeleteObject"],"Resource": ["arn:aws:s3:::companybucket"]}]}

B.  

{"Version": "2012-10-17","Statement": [{"Sid": "statement1","Effect": "Allow","Action": ["s3:CreateBucket", "s3:GetBucketLocation"],"Resource": "arn:aws:s3:::companybucket"}]}

C.  

{"Version": "2012-10-17","Statement": [{"Sid": "statement1","Effect": "Allow","Action": ["s3:GetObject", "s3:PutObject", "s3:DeleteObject", "s3:PutObjectRetention"],"Resource": "arn:aws:s3:::companybucket"}]}

D.  

{"Version": "2012-10-17","Statement": [{"Sid": "statement1","Effect": "Allow","Action": ["s3:GetObject", "s3:PutObject"],"Resource": ["arn:aws:s3:::companybucket"]}]}

Discussion 0
Questions 19

A company has an analytics application that uses an AWS Lambda function to process transaction data asynchronously A developer notices that asynchronous invocations of the Lambda function sometimes fail When failed Lambda function invocations occur, the developer wants to invoke a second Lambda function to handle errors and log details.

Which solution will meet these requirements?

Options:

A.  

Configure a Lambda function destination with a failure condition Specify Lambda function as the destination type Specify the error-handling Lambda function's Amazon Resource Name (ARN) as the resource

B.  

Enable AWS X-Ray active tracing on the initial Lambda function. Configure X-Ray to capture stack traces of the failed invocations. Invoke the error-handling Lambda function by including the stack traces in the event object.

C.  

Configure a Lambda function trigger with a failure condition Specify Lambda function as the destination type Specify the error-handling Lambda function's Amazon Resource Name (ARN) as the resource

D.  

Create a status check alarm on the initial Lambda function. Configure the alarm to invoke the error-handling Lambda function when the alarm is initiated. Ensure that the alarm passes the stack trace in the event object.

Discussion 0
Questions 20

A financial services company builds a credit card transaction processing application that uses an Amazon API Gateway HTTP API and AWS Lambda functions. The application logs all requests and request parameters to Amazon CloudWatch. The application makes the logs accessible to developer AWS accounts and a separate fraud detection AWS account by using a cross-account IAM role.

The company requires that only the fraud detection account be able to view customer credit card numbers that are associated with the transactions. Developers at the company must not be able to use the credit card numbers for testing or debugging.

The developers create the following data protection policy document snippet:

{

"Name": "data-protection-policy",

"Description": "Credit card redaction",

"Version": "2021-06-01",

"Statement": [{

"Sid": "redact-policy",

"DataIdentifier": [

"arn:aws:dataprotection::aws:data-identifier/CreditCardNumber"

],

"Operation": {

"Deidentify": {

"MaskConfig": {}

}

}

}]

}

Which combination of actions must the developers take to comply with the new policy? (Select TWO.)

Options:

A.  

Add an UnmaskConfig property to the Operation property of the data protection policy. Specify the role that the fraud detection account must assume.

B.  

Add the logs:Unmask permission to the IAM role that the fraud detection account must assume.

C.  

Add the data protection policy to the CloudWatch log group that captures logs for the HTTP API.

D.  

Add the data protection policy to the CloudWatch log group in the account that hosts the application.

E.  

Add the data protection policy to the IAM role that the fraud detection account must assume.

Discussion 0
Questions 21

A company notices that credentials that the company uses to connect to an external software as a service (SaaS) vendor are stored in a configuration file as plaintext.

The developer needs to secure the API credentials and enforce automatic credentials rotation on a quarterly basis.

Which solution will meet these requirements MOST securely?

Options:

A.  

Use AWS Key Management Service (AWS KMS) to encrypt the configuration file. Decrypt the configuration file when users make API calls to the SaaS vendor. Enable rotation.

B.  

Retrieve temporary credentials from AWS Security Token Service (AWS STS) every 15 minutes. Use the temporary credentials when users make API calls to the SaaS vendor.

C.  

Store the credentials in AWS Secrets Manager and enable rotation. Configure the API to have Secrets Manager access.

D.  

Store the credentials in AWS Systems Manager Parameter Store and enable rotation. Retrieve the credentials when users make API calls to the SaaS vendor.

Discussion 0
Questions 22

A company is building a micro services app1 cation that consists of many AWS Lambda functions. The development team wants to use AWS Serverless Application Model (AWS SAM) templates to automatically test the Lambda functions. The development team plans to test a small percentage of traffic that is directed to new updates before the team commits to a full deployment of the application.

Which combination of steps will meet these requirements in the MOST operationally efficient way? (Select TWO.)

Options:

A.  

Use AWS SAM CLI commands in AWS CodeDeploy lo invoke the Lambda functions to lest the deployment

B.  

Declare the EventlnvokeConfig on the Lambda functions in the AWS SAM templates with OnSuccess and OnFailure configurations.

C.  

Enable gradual deployments through AWS SAM templates.

D.  

Set the deployment preference type to Canary10Percen130Minutes Use hooks to test the deployment.

E.  

Set the deployment preference type to Linear10PefcentEvery10Minutes Use hooks to test the deployment.

Discussion 0
Questions 23

An application ingests data from an Amazon Kinesis data stream. The shards in the data stream are set for normal traffic.

During tests for peak traffic, the application ingests data slowly. A developer needs to adjust the data stream to handle the peak traffic.

What should the developer do to meet this requirement MOST cost-effectively?

Options:

A.  

Install the Kinesis Producer Library {KPL) to ingest data into the data stream.

B.  

Switch to on-demand capacity mode for the data stream. Specify a partition key when writing data to the data stream.

C.  

Decrease the amount of time that data is kept in the data stream by using the DecreaseStreamRetention Period API operation.

D.  

Increase the shard count in the data stream by using the UpdateShardCount API operation.

Discussion 0
Questions 24

A developer is setting up a deployment pipeline. The pipeline includes an AWS CodeBuild build stage that requires access to a database to run integration tests. The developer is using a buildspec.yml file to configure the database connection. Company policy requires automatic rotation of all database credentials.

Which solution will handle the database credentials MOST securely?

Options:

A.  

Retrieve the credentials from variables that are hardcoded in the buildspec.yml file. Configure an AWS Lambda function to rotate the credentials.

B.  

Retrieve the credentials from an environment variable that is linked to a SecureString parameter in AWS Systems Manager Parameter Store. Configure Parameter Store for automatic rotation.

C.  

Retrieve the credentials from an environment variable that is linked to an AWS Secrets Manager secret. Configure Secrets Manager for automaticrotation.

D.  

Retrieve the credentials from an environment variable that contains the connection string in plaintext. Configure an Amazon EventBridge event to rotate the credentials.

Discussion 0
Questions 25

A developer has created an AWS Lambda function that consumes messages from an Amazon SQS standard queue. The developer notices that the Lambda function processes some messages multiple times.

How should developer resolve this issue MOST cost-effectively?

Options:

A.  

Change the SQS standard queue to an SQS FIFO queue by using the SQS message deduplication ID.

B.  

Set up a dead-letter queue.

C.  

Set the maximum concurrency limit of the Lambda function to 1.

D.  

Change the message processing to use Amazon Kinesis Data Streams instead of Amazon SQS.

Discussion 0
Questions 26

A developer is building an application that includes an AWS Lambda function that is written in .NET Core. The Lambda function's code needs to interact with Amazon DynamoDB tables and Amazon S3 buckets. The developer must minimize the Lambda function's deployment time and invocation duration.

Which solution will meet these requirements?

Options:

A.  

Increase the Lambda function's memory.

B.  

Include the entire AWS SDK for .NET in the Lambda function's deployment package.

C.  

Include only the AWS SDK for .NET modules for DynamoDB and Amazon S3 in the Lambda function's deployment package.

D.  

Configure the Lambda function to download the AWS SDK for .NET from an S3 bucket at runtime.

Discussion 0
Questions 27

A company runs an application in a third-party cloud. The company wants to use the application to update data in AWS by using API calls to AWS services. The API calls require credentials.

The company's security policy requires the company to limit the scope and duration of any credentials used to make API calls to AWS services.

Which solution will meet these requirements in the MOST secure way?

Options:

A.  

Create an IAM user for the application. Configure the application to load the IAM user's credentials as environment variables. Use the IAM user's credentials to interact with AWS services.

B.  

Create an IAM user for the application. Populate an AWS Secrets Manager secret with the IAM user's AWS credentials. Use the secret to interact with AWS services.

C.  

Create an IAM role for the application. Configure the application to call the AWS STS GetFederationToken API. Use the STS credentials to interact with AWS services.

D.  

Create an IAM role for the application. Configure the application to call the AWS STS AssumeRole API. Use the STS credentials to interact with AWS services.

Discussion 0
Questions 28

A developer is creating an ecommerce workflow in an AWS Step Functions state machine that includes a HTTP Task state. The task passes shipping information and order details to an endpoint.

The developer needs to test the workflow to confirm that the HTTP headers and body are correct and that the responses meet expectations.

Options:

A.  

Use the TestState API to invoke only the HTTP Task. Set the inspection level to TRACE.

B.  

Use the TestState API to invoke the state machine. Set the inspection level to DEBUG.

C.  

Use the data flow simulator to invoke only the HTTP Task. View the request and response data.

D.  

Change the log level of the state machine to ALL. Run the state machine.

Discussion 0
Questions 29

A developer deploys an AWS Lambda function that writes data to Amazon DynamoDB. Amazon CloudWatch metrics show that some Lambda invocations result in errors. However, no CloudWatch log entries exist for the function. The function source code includes logging statements before the write operation.

What should the developer do to resolve the missing CloudWatch Logs entries?

Options:

A.  

Grant the Lambda execution role permission to write logs to Amazon CloudWatch Logs.

B.  

Enable CloudWatch Lambda Insights and redeploy the function.

C.  

Enable AWS X-Ray active tracing for the function.

D.  

Add CloudWatch as a trusted identity in the Lambda execution role.

Discussion 0
Questions 30

A developer has implemented an AWS Lambda function that inserts new customers into an Amazon RDS database. The function is expected to run hundreds of times each hour. The function and RDS database are in the same VPC. The function is configured to use 512 MB of RAM and is based on the following pseudocode:

def lambda_handler(event, context):

db = database.connect()

db.statement("INSERT INTO Customers (CustomerName) VALUES (%s)", event.name)

db.execute()

db.close()

After successfully testing the function multiple times, the developer notices that the execution time is longer than expected.

What should the developer do to improve performance?

Options:

A.  

Increase the reserved concurrency of the Lambda function.

B.  

Increase the size of the RDS database to facilitate an increased number of database connections each hour.

C.  

Move the database connection and close statement out of the handler. Place the connection in the global space.

D.  

Replace Amazon RDS with Amazon DynamoDB to implement control over the number of writes per second.

Discussion 0
Questions 31

A company has built an AWS Lambda function to convert large image files into output files that can be used in a third-party viewer application The company recently added a new module to the function to improve the output of the generated files However, the new module has increased the bundle size and has increased the time that is needed to deploy changes to the function code.

How can a developer increase the speed of the Lambda function deployment?

Options:

A.  

Use AWS CodeDeploy to deploy the function code

B.  

Use Lambda layers to package and load dependencies.

C.  

Increase the memory size of the function.

D.  

Use Amazon S3 to host the function dependencies

Discussion 0
Questions 32

A company has an AWS Step Functions state machine named myStateMachine. The company configured a service role for Step Functions. The developer must ensure that only the myStateMachine state machine can assume the service role.

Options:

A.  

"Condition": { "ArnLike": { "aws":"arn:aws:states:ap-south-1:111111111111:stateMachine" } }

B.  

"Condition": { "ArnLike": { "aws":"arn:aws:states:ap-south-1:*:stateMachine" } }

Discussion 0
Questions 33

An application routinely processes a large number of Amazon S3 GET requests each second. A developer wants to increase the number of requests that the application can handle in parallel.

What should the developer do to achieve this goal?

Options:

A.  

Configure AWS Global Accelerator for Amazon S3.

B.  

Move all Amazon S3 objects into a single object prefix.

C.  

Partition Amazon S3 objects by object prefixes.

D.  

Configure AWS Direct Connect for Amazon S3.

Discussion 0
Questions 34

A company is providing read access to objects in an Amazon S3 bucket for different customers. The company uses 1AM permissions to restrict access to the S3 bucket. The customers can access only their own files.

Due to a regulation requirement, the company needs to enforce encryption in transit for interactions with Amazon S3.

Which solution will meet these requirements?

Options:

A.  

Add a bucket policy to the S3 bucket to deny S3 actions when the aws:SecureTransport condition is equal to false.

B.  

Add a bucket policy to the S3 bucket to deny S3 actions when the s3:x-amz-acl condition is equal to public-read.

C.  

Add an 1AM policy to the 1AM users to enforce the usage of the AWS SDK.

D.  

Add an 1AM policy to the 1AM users that allows S3 actions when the s3:x-amz-acl condition is equal to bucket-owner-read.

Discussion 0
Questions 35

A company's development team uses an SSH key pair to copy files among a large fleet of development servers. The SSH key pair has been compromised. A developer has generated a replacement key pair. The company has deployed the AWS Systems Manager Agent (SSM Agent) and the Amazon CloudWatch agent on all of the development servers.

The developer needs a solution to distribute the new key to all the Linux servers.

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.  

Create an Amazon S3 bucket. Store the public key in the root of the S3 bucket. Log in to each server. Copy the private key from the S3 bucket to the appropriate directory of each server.

B.  

Create an Amazon S3 bucket. Store the public key in the root of the S3 bucket. Create a script to copy the private key from the S3 bucket to the appropriate directory of each server. Use Systems Manager Run Command to run the script on all Linux servers.

C.  

Upload the new SSH key pair to AWS Secrets Manager as a new secret. Grant the team members permissions to download the secret into the appropriate directory of each server.

D.  

Upload the new SSH key pair to AWS Systems Manager Parameter Store. Make each key a new parameter. Grant the team members permissions to download the parameters into the appropriate directory of each server.

Discussion 0
Questions 36

A company is creating an application that processes csv files from Amazon S3 A developer has created an S3 bucket The developer has also created an AWS Lambda function to process the csv files from the S3 bucket

Which combination of steps will invoke the Lambda function when a csv file is uploaded to Amazon S3? (Select TWO.)

Options:

A.  

Create an Amazon EventBridge rule Configure the rule with a pattern to match the S3 object created event

B.  

Schedule an Amazon EventBridge rule to run a new Lambda function to scan the S3 bucket.

C.  

Add a trigger to the existing Lambda function. Set the trigger type to EventBridge Select the Amazon EventBridge rule.

D.  

Create a new Lambda function to scan the S3 bucket for recently added S3 objects

E.  

Add S3 Lifecycle rules to invoke the existing Lambda function

Discussion 0
Questions 37

A developer is writing a serverless application that requires an AWS Lambda function to be invoked every 10 minutes.

What is an automated and serverless way to invoke the function?

Options:

A.  

Deploy an Amazon EC2 instance based on Linux, and edit its /etc/confab file by adding a command to periodically invoke the lambda function

B.  

Configure an environment variable named PERIOD for the Lambda function. Set the value to 600.

C.  

Create an Amazon EventBridge rule that runs on a regular schedule to invoke the Lambda function.

D.  

Create an Amazon Simple Notification Service (Amazon SNS) topic that has a subscription to the Lambda function with a 600-second timer.

Discussion 0
Questions 38

A company stores its data in data tables in a series of Amazon S3 buckets. The company received an alert that customer credit card information might have been exposed in a data table on one of the company's public applications. A developer needs to identify all potential exposures within the application environment.

Which solution will meet these requirements?

Options:

A.  

Use Amazon Athena to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Personal finding type.

B.  

Use Amazon Made to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Financial finding type.

C.  

Use Amazon Made to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Personal finding type.

D.  

Use Amazon Athena to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Financial finding type.

Discussion 0
Questions 39

A developer has created an AWS Lambda function that is written in Python. The Lambda function reads data from objects in Amazon S3 and writes data to an Amazon DynamoDB table.

The function is successfully invoked from an S3 event notification when an object is created. However, the function fails when it attempts to write to the DynamoDB table.

What is the MOST likely cause of this issue?

Options:

A.  

The Lambda function's concurrency limit has been exceeded.

B.  

The DynamoDB table requires a global secondary index (GSI) to support writes.

C.  

The Lambda function does not have IAM permissions to write to DynamoDB.

D.  

The DynamoDB table is not running in the same Availability Zone as the Lambda function.

Discussion 0
Questions 40

A company regularly receives route status updates from its delivery trucks as events in Amazon EventBridge. The company is building an API-based application in a VPC that will consume and process the events to create a delivery status dashboard. The API application must not be available by using public IP addresses because of security and compliance requirements.

How should the company send events from EventBridge to the API application?

Options:

A.  

Create an AWS Lambda function that runs in the same VPC as the API application. Configure the function as an EventBridge target. Use the function to send events to the API.

B.  

Create an internet-facing Application Load Balancer (ALB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the ALB as an EventBridge target.

C.  

Create an internet-facing Network Load Balancer (NLB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the NLB as an EventBridge target.

D.  

Use the application API endpoint in the VPC as a target for EventBridge. Send events directly to the application API endpoint from EventBridge.

Discussion 0
Questions 41

An developer is building a serverless application by using the AWS Serverless Application Model (AWS SAM). The developer is currently testing the application in a development environment. When the application is nearly finsihed, the developer will need to set up additional testing and staging environments for a quality assurance team.

The developer wants to use a feature of the AWS SAM to set up deployments to multiple environments.

Which solution will meet these requirements with the LEAST development effort?

Options:

A.  

Add a configuration file in TOML format to group configuration entries to every environment. Add a table for each testing and staging environment. Deploy updates to the environments by using the sam deploy command and the --config-env flag that corresponds to the each environment.

B.  

Create additional AWS SAM templates for each testing and staging environment. Write a custom shell script that uses the sam deploy command and the --template-file flag to deploy updates to the environments.

C.  

Create one AWS SAM configuration file that has default parameters. Perform updates to the testing and staging environments by using the —parameter-overrides flag in the AWS SAM CLI and the parameters that the updates will override.

D.  

Use the existing AWS SAM template. Add additional parameters to configure specific attributes for the serverless function and database table resources that are in each environment. Deploy updates to the testing and staging environments by using the sam deploy command.

Discussion 0
Questions 42

A developer is building a microservice that uses AWS Lambda to process messages from an Amazon Simple Queue Service (Amazon SQS) standard queue. The Lambda function calls external APIs to enrich the SOS message data before loading the data into an Amazon Redshift data warehouse. The SOS queue must handle a maximum of 1.000 messages per second.

During initial testing, the Lambda function repeatedly inserted duplicate data into the Amazon Redshift table. The duplicate data led to a problem with data analysis. All duplicate messages were submitted to the queue within 1 minute of each other.

How should the developer resolve this issue?

Options:

A.  

Create an SOS FIFO queue. Enable message deduplication on the SOS FIFO queue.

B.  

Reduce the maximum Lambda concurrency that the SOS queue can invoke.

C.  

Use Lambda's temporary storage to keep track of processed message identifiers.

D.  

Configure a message group ID for every sent message. Enable message deduplication on the SQS standard queue.

Discussion 0
Questions 43

A developer needs to write an AWS CloudFormation template on a local machine and deploy a CloudFormation stack to AWS.

What must the developer do to complete these tasks?

Options:

A.  

Install the AWS CLI. Configure the AWS CLI by using an I AM user name and password.

B.  

Install the AWS CLI. Configure the AWS CLI by using an SSH key.

C.  

Install the AWS CLI. Configure the AWS CLI by using an 1AM user access key and secret key.

D.  

Install an AWS software development kit (SDK). Configure the SDK by using an X.509 certificate.

Discussion 0
Questions 44

A company has implemented AWS CodeDeploy as part of its CI/CD pipeline. The company uses automatic rollbacks during an in-place deployment of a new version of a web application on Amazon EC2 instances.

What happens if the deployment of the new version fails validation?

Options:

A.  

CodeDeploy restores the last successful deployment from a snapshot stored in Amazon S3.

B.  

CodeDeploy switches Amazon Route 53 alias records back to the previous green deployment.

C.  

CodeDeploy redeploys the last known stable version of the application as a new deployment with a new deployment ID.

D.  

AWS CodePipeline promotes the most recent SUCCEEDED deployment to production.

Discussion 0
Questions 45

A developer needs to retrieve all data from an Amazon DynamoDB table that matches a particular partition key.

Which solutions will meet this requirement in the MOST operationally efficient way? (Select TWO.)

Options:

A.  

Use the Scan API and a filter expression to match on the key.

B.  

Use the GetItem API with a request parameter for key that contains the partition key name and specific key value.

C.  

Use the ExecuteStatement API and a filter expression to match on the key.

D.  

Use the GetItem API and a PartiQL statement to match on the key.

E.  

Use the ExecuteStatement API and a PartiQL statement to match on the key.

Discussion 0
Questions 46

A company's application runs on a fleet of Amazon EC2 instances in a VPC within private subnets that do not have public internet access. The company uses Amazon CloudWatch to monitor the application.

A developer is troubleshooting an issue with the application. Some performance metrics are not being published to CloudWatch. The developer uses EC2 Instance Connect to access an EC2 instance. The developer verifies that a CloudWatch agent is pre-installed and running.

The developer needs to ensure that the performance metrics are published to CloudWatch.

Which solution will meet this requirement in the MOST secure way?

Options:

A.  

Attach the CloudWatchAgentAdminPolicy managed IAM policy to the IAM role that is associated with the EC2 instance profile. Provision a NAT gateway in a public subnet.

B.  

Add a user data script to install and start up the CloudWatch agent automatically when the EC2 instances are first booted up.

C.  

Attach the CloudWatchAgentServerPolicy managed IAM policy to the IAM role that is associated with the EC2 instance profile. Provision a VPC interface endpoint for CloudWatch.

D.  

Attach the CloudWatchReadOnlyAccess managed IAM policy to the IAM role that is associated with the EC2 instance profile. Provision a VPC interface endpoint for CloudWatch.

Discussion 0
Questions 47

A company wants to migrate applications from its on-premises servers to AWS. As a first step, the company is modifying and migrating a non-critical application to a single Amazon EC2 instance. The application will store information in an Amazon S3 bucket. The company needs to follow security best practices when deploying the application on AWS.

Which approach should the company take to allow the application to interact with Amazon S3?

Options:

A.  

Create an 1AM role that has administrative access to AWS. Attach the role to the EC2 instance.

B.  

Create an 1AM user. Attach the AdministratorAccess policy. Copy the generated access key and secret key. Within the application code, use the access key and secret key along with the AWS SDK to communicate with Amazon S3.

C.  

Create an 1AM role that has the necessary access to Amazon S3. Attach the role to the EC2 instance.

D.  

Create an 1AM user. Attach a policy that provides the necessary access to Amazon S3. Copy the generated access key and secret key. Within the application code, use the access key and secret key along with the AWS SDK to communicate with Amazon S3.

Discussion 0
Questions 48

An application writes transactions to an Amazon DynamoDB table by using the PutItem operation. Each transaction has a unique transactionId. Sometimes duplicate transactions are received. The developer wants to ensure that a duplicate PutItem does not overwrite an existing item. Duplicate transactions are rare.

What is the MOST cost-effective solution?

Options:

A.  

Call GetItem before calling PutItem.

B.  

Enable TTL on the table.

C.  

Use a conditional put with attribute_exists(transactionId).

D.  

Use a conditional put with attribute_not_exists(transactionId).

Discussion 0
Questions 49

A developer is creating an AWS CloudFormation template to deploy Amazon EC2 instances across multiple AWS accounts. The developer must choose the EC2 instances from a list of approved instance types.

How can the developer incorporate the list of approved instance types in the CloudFormation template?

Options:

A.  

Create a separate CloudFormation template for each EC2 instance type in the list.

B.  

In the Resources section of the CloudFormation template, create resources for each EC2 instance type in the list.

C.  

In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.

D.  

In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues.

Discussion 0
Questions 50

A developer needs to store configuration variables for an application. The developer needs to set an expiration date and time for me configuration. The developer wants to receive notifications. Before the configuration expires. Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Create a standard parameter in AWS Systems Manager Parameter Store Set Expiation and Expiration Notification policy types.

B.  

Create a standard parameter in AWS Systems Manager Parameter Store Create an AWS Lambda function to expire the configuration and to send Amazon Simple Notification Service (Amazon SNS) notifications.

C.  

Create an advanced parameter in AWS Systems Manager Parameter Store Set Expiration and Expiration Notification policy types.

D.  

Create an advanced parameter in AWS Systems Manager Parameter Store Create an Amazon EC2 instance with a corn job to expire the configuration and to send notifications.

Discussion 0
Questions 51

A company is planning to securely manage one-time fixed license keys in AWS. The company's development team needs to access the license keys in automaton scripts that run in Amazon EC2 instances and in AWS CloudFormation stacks.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.  

Amazon S3 with encrypted files prefixed with “config”

B.  

AWS Secrets Manager secrets with a tag that is named SecretString

C.  

AWS Systems Manager Parameter Store SecureString parameters

D.  

CloudFormation NoEcho parameters

Discussion 0
Questions 52

An application uses AWS X-Ray to generate a large amount of trace data on an hourly basis. A developer wants to use filter expressions to limit the returned results through user-specified custom attributes.

How should the developer use filter expressions to filter the results in X-Ray?

Options:

A.  

Add custom attributes as annotations in the segment document.

B.  

Add custom attributes as metadata in the segment document.

C.  

Add custom attributes as new segment fields in the segment document.

D.  

Create new sampling rules that are based on custom attributes.

Discussion 0
Questions 53

A developer has written a distributed application that uses micro services. The microservices are running on Amazon EC2 instances. Because of message volume, the developer is unable to match log output from each microservice to a specific transaction. The developer needs to analyze the message flow to debug the application.

Which combination of steps should the developer take to meet this requirement? (Select TWO.)

Options:

A.  

Download the AWS X-Ray daemon. Install the daemon on an EC2 instance. Ensure that the EC2 instance allows UDP traffic on port 2000.

B.  

Configure an interface VPC endpoint to allow traffic to reach the global AWS X-Ray daemon on TCP port 2000.

C.  

Enable AWS X-Ray. Configure Amazon CloudWatch to push logs to X-Ray.

D.  

Add the AWS X-Ray software development kit (SDK) to the microservices. Use X-Ray to trace requests that each microservice makes.

E.  

Set up Amazon CloudWatch metric streams to collect streaming data from the microservices.

Discussion 0
Questions 54

A company is building a web application on AWS. When a customer sends a request, the application will generate reports and then make the reports available to the customer within one hour. Reports should be accessible to the customer for 8 hours. Some reports are larger than 1 MB. Each report is unique to the customer. The application should delete all reports that are older than 2 days.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Generate the reports and then store the reports as Amazon DynamoDB items that have a specified TTL. Generate a URL that retrieves the reports from DynamoDB. Provide the URL to customers through the web application.

B.  

Generate the reports and then store the reports in an Amazon S3 bucket that uses server-side encryption. Attach the reports to an Amazon Simple Notification Service (Amazon SNS) message. Subscribe the customer to email notifications from Amazon SNS.

C.  

Generate the reports and then store the reports in an Amazon S3 bucket that uses server-side encryption. Generate a presigned URL that contains an expiration date Provide the URL to customers through the web application. Add S3 Lifecycle configuration rules to the S3 bucket to delete old reports.

D.  

Generate the reports and then store the reports in an Amazon RDS database with a date stamp. Generate an URL that retrieves the reports from the RDS database. Provide the URL to customers through the web application. Schedule an hourly AWS Lambda function to delete database records that have expired date stamps.

Discussion 0
Questions 55

A company wants to ensure that only one user from its Admin group has the permanent right to delete an Amazon EC2 resource. The company must not modify the existing Admin group policy.

What should a developer use to meet these requirements?

Options:

A.  

AWS managed policy

B.  

Inline policy

C.  

IAM trust relationship

D.  

AWS STS

Discussion 0
Questions 56

A company has an application that processes audio files for different departments. When audio files are saved to an Amazon S3 bucket, an AWS Lambda function receives an event notification and processes the audio input.

A developer needs to update the solution so that the application can process the audio files for each department independently. The application must publish the audio file location for each department to each department's existing Amazon SQS queue.

Which solution will meet these requirements with no changes to the Lambda function code?

Options:

A.  

Configure the S3 bucket to send the event notifications to an Amazon SNS topic. Subscribe each department's SQS queue to the SNS topic. Configure subscription filter policies.

B.  

Update the Lambda function to write the file location to a single shared SQS queue. Configure the shared SQS queue to send the file reference to each department's SQS queue.

C.  

Update the Lambda function to send the file location to each department's SQS queue.

D.  

Configure the S3 bucket to send the event notifications to each department's SQS queue.

Discussion 0
Questions 57

A company has a web application that contains an Amazon API Gateway REST API. A developer has created an AWS CloudFormation template for the initial deployment of the application. The developer has deployed the application successfully as part of an AWS CodePipeline CI/CD process. All resources and methods are available through the deployed stage endpoint.

The CloudFormation template contains the following resource types:

• AWS::ApiGateway::RestApi

• AWS::ApiGateway::Resource

• AWS::ApiGateway::Method

• AWS::ApiGateway::Stage

• AWS::ApiGateway::Deployment

The developer adds a new resource to the REST API with additional methods and redeploys the template. CloudFormation reports that the deployment is successful and that the stack is in the UPDATE_COMPLETE state. However, calls to all new methods are returning 404 (Not Found) errors.

What should the developer do to make the new methods available?

Options:

A.  

Specify the disable-rollback option during the update-stack operation.

B.  

Unset the CloudFormation stack failure options.

C.  

Add an AWS CodeBuild stage to CodePipeline to run the aws apigateway create-deployment AWS CLI command.

D.  

Add an action to CodePipeline to run the aws cloudfront create-invalidation AWS CLI command.

Discussion 0
Questions 58

A developer is building a multi-tenant application that uses an AWS Lambda function and an Amazon S3 bucket. An S3 event notification invokes the Lambda function when a new file is uploaded to the S3 bucket. The function reads each new file from the S3 bucket, processes the file, and writes data to an Amazon DynamoDB table. Each file in the S3 bucket has a prefix that corresponds with the name of the tenant that owns the file. Items in the DynamoDB table use tenant name as the partition key.

The developer must reduce the risk that file data will leak across tenants during processing.

Which combination of actions will meet this requirement? (Select THREE.)

Options:

A.  

Create a data access IAM role. Allow the Lambda function to assume the data access role. Configure the role to allow the sts:TagSession action.

B.  

Create a data access IAM role. Allow the Lambda function execution role to assume the data access role.

C.  

Configure a policy for the data access IAM role to allow access to DynamoDB and Amazon S3 only for data that corresponds with the tenant session tag.

D.  

Create a resource-based policy for the DynamoDB table to restrict access based on the principal tag of the IAM role that the Lambda function assumes.

E.  

Create a resource control policy (RCP) that allows access to the S3 bucket by using the aws:PrincipalTag global condition key.

F.  

Configure the Lambda function to assume the data access IAM role that has the tenant name as a session tag. Use the assumed role credentials to access data.

Discussion 0
Questions 59

Users of a web-based music application are experiencing latency issues on one of the application's most popular pages. A developer identifies that the issue is caused by the slow load time of specific widgets that rank and sort various songs and albums.

The developer needs to ensure that the widgets load more quickly by using built-in, in-memory ranking and sorting techniques. The developer must ensure that the data remains up to date.

Which solution will meet these requirements with the LEAST latency?

Options:

A.  

Provision an Amazon ElastiCache (Memcached) cluster. Implement a lazy-loading caching strategy.

B.  

Provision an Amazon ElastiCache (Redis OSS) cluster. Implement a write-through caching strategy.

C.  

Provision an Amazon ElastiCache (Memcached) cluster. Implement a write-through caching strategy.

D.  

Provision an Amazon ElastiCache (Redis OSS) cluster. Implement a lazy-loading caching strategy.

Discussion 0
Questions 60

A healthcare company is developing a multi-tier web application to manage patient records that are in an Amazon Aurora PostgreSQL database cluster. The company stores the application code in a Git repository and deploys the code to Amazon EC2 instances.

The application must comply with security policies and follow the principle of least privilege. The company must securely manage database credentials and API keys within the application code. The company must have the ability to rotate encryption keys on demand.

Which solution will meet these requirements?

Options:

A.  

Store database credentials and API keys in AWS Secrets Manager. Use AWS managed AWS KMS keys. Set up automatic key rotation. Use the AWS SDK to retrieve secrets.

B.  

Store the database credentials and API keys in AWS Secrets Manager. Use customer managed AWS KMS keys. Set up automatic key rotation. Create a key policy in the application to retrieve secrets by using the AWS SDK.

C.  

Store the database credentials in the application code. Separate credentials by using environment-specific branches that have restricted access to the code repositories.

D.  

Store the database credentials and API keys as parameters in AWS Systems Manager Parameter Store. Encrypt the credentials and API keys with AWS managed AWS KMS keys. Use the AWS SDK to retrieve secrets.

Discussion 0
Questions 61

A developer is building a three-tier web application that should be able to handle a minimum of 5000 requests per minute. Requirements state that the web tier should be completely stateless while the application maintains session state for the users.

How can session data be externalized, keeping latency at the LOWEST possible value?

Options:

A.  

Create an Amazon RDS instance, then implement session handling at the application level to leverage a database inside the RDS database instance for session data storage.

B.  

Implement a shared file system solution across the underlying Amazon EC2 instances, then implement session handling at the application level to leverage the shared file system for session data storage.

C.  

Create an Amazon ElastiCache (Memcached) cluster, then implement session handling at the application level to leverage the cluster for session data storage.

D.  

Create an Amazon DynamoDB table, then implement session handling at the application level to leverage the table for session data storage.

Discussion 0
Questions 62

A developer registered an AWS Lambda function as a target for an Application Load Balancer (ALB) using a CLI command. However, the Lambda function is not being invoked when the client sends requests through the ALB.

Why is the Lambda function not being invoked?

Options:

A.  

A Lambda function cannot be registered as a target for an ALB.

B.  

A Lambda function can be registered with an ALB using AWS Management Console only.

C.  

The permissions to invoke the Lambda function are missing.

D.  

Cross-zone is not enabled on the ALB.

Discussion 0
Questions 63

A company is building an ecommerce application. The company stores the application's static content in an Amazon S3 bucket. The application stores data that includes personally identifiable information (PII). The application makes dynamic requests in JSON format through an Amazon CloudFront distribution to an Amazon API Gateway REST API. The REST API invokes an AWS Lambda function that stores and queries data in Amazon DynamoDB.

The company must ensure that all PII data is encrypted at rest in DynamoDB. The company must also protect specific data fields more granularly. The company must ensure that the specified fields are encrypted at the edge. The specified fields must remain encrypted throughout the full stack of the application.

Which solution will meet these requirements?

Options:

A.  

Configure a Lambda@Edge function to identify and encrypt the sensitive fields. Associate the function with the CloudFront distribution.

B.  

Create an RSA key pair. Configure the CloudFront distribution to use field-level encryption directly.

C.  

Create an AWS KMS key. Update the Lambda function to encrypt the data before inserting the data into DynamoDB. Configure the function to decrypt the data after retrieval.

D.  

Create a new resource on the existing REST API and add a new POST method to the new resource. Configure the POST method to invoke the Lambda function and an AWS KMS key to encrypt the sensitive data fields.

Discussion 0
Questions 64

A developer uses AWS CloudFormation to deploy an Amazon API Gateway API and an AWS Step Functions state machine The state machine must reference the API Gateway API after the CloudFormation template is deployed The developer needs a solution that uses the state machine to reference the API Gateway endpoint.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.  

Configure the CloudFormation template to reference the API endpoint in the DefinitionSubstitutions property for the AWS StepFunctions StateMachme resource.

B.  

Configure the CloudFormation template to store the API endpoint in an environment variable for the AWS::StepFunctions::StateMachine resourc Configure the state machine to reference the environment variable

C.  

Configure the CloudFormation template to store the API endpoint in a standard AWS: SecretsManager Secret resource Configure the state machine to reference the resource

D.  

Configure the CloudFormation template to store the API endpoint in a standard AWS::AppConfig;:ConfigurationProfile resource Configure the state machine to referencethe resource.

Discussion 0
Questions 65

A company has an application that uses Amazon Cognito user pools as an identity provider. The company must secure access to user records. The company has set up multi-factor authentication (MFA). The company also wants to send a login activity notification by email every time a user logs in.

What is the MOST operationally efficient solution that meets this requirement?

Options:

A.  

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon API Gateway API to invoke the function. Call the API from the client side when login confirmation is received.

B.  

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon Cognito post authentication Lambda trigger for the function.

C.  

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Create an Amazon CloudWatch Logs log subscription filter to invoke the function based on the login status.

D.  

Configure Amazon Cognito to stream all logs to Amazon Kinesis Data Firehose. Create an AWS Lambda function to process the streamed logs and to send the email notification based on the login status of each user.

Discussion 0
Questions 66

A company is working on a new serverless application. A developer needs to find an automated way to deploy AWS Lambda functions and the dependent Infrastructure with minimum coding effort. The application also needs to be reliable.

Which method will meet these requirements with the LEAST operational overhead?

Options:

A.  

Build the application by using shell scripts to create .zip files for each Lambda function. Manually upload the .zip files to the AWS Management Console.

B.  

Build the application by using the AWS Serverless Application Model (AWS SAM). Use a continuous integration and continuous delivery (CI/CD) pipeline and the SAM CLI to deploy the Lambda functions.

C.  

Build the application by using shell scripts to create .zip files for each Lambda function. Upload the .zip files. Deploy the .zip files as Lambda functions by using the AWS CLI in a continuous integration and continuous delivery (CI/CD) pipeline.

D.  

Build a container for each Lambda function. Store the container images in AWS CodeArtifact. Deploy the containers as Lambda functions by using the AWS CLI in a continuous integration and continuous delivery (CI/CD) pipeline.

Discussion 0
Questions 67

A developer is building a video search application. Video files average 2.5 TB in size. Files must have instant access for the first 90 days. After 90 days, files can take more than 10 minutes to load.

Which solution will meet these requirements in the MOST cost-effective way?

Options:

A.  

Store files in Amazon EFS Standard, then transition to EFS Standard-I

A.  

B.  

Store files in Amazon S3 Glacier Deep Archive for 90 days, then transition to S3 Glacier Flexible Retrieval.

C.  

Store files in Amazon EBS for 90 days, then transition to S3 Glacier Deep Archive.

D.  

Store files in Amazon S3 Glacier Instant Retrieval for 90 days, then transition to S3 Glacier Flexible Retrieval.

Discussion 0
Questions 68

A developer is building an ecommerce application that uses AWS Lambda functions. Each Lambda function performs a specific step in a customer order workflow, such as order processing and inventory management. The developer must ensure that the Lambda functions run in a specific order.

Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.  

Configure an Amazon SQS queue to contain messages about each step that a Lambda function must perform. Configure the Lambda functions to run sequentially based on the order of messages in the SQS queue.

B.  

Configure an Amazon SNS topic to contain notifications about each step that a Lambda function must perform. Subscribe the Lambda functions to the SNS topic. Use subscription filters based on the step that each Lambda function must perform.

C.  

Configure an AWS Step Functions state machine to invoke the Lambda functions in a specific order.

D.  

Configure Amazon EventBridge Scheduler schedules to invoke the Lambda functions in a specific order.

Discussion 0
Questions 69

An application is processing clickstream data using Amazon Kinesis. The clickstream data feed into Kinesis experiences periodic spikes. The PutRecords API call occasionally fails and the logs show that the failed call returns the response shown below:

Which techniques will help mitigate this exception? (Choose two.)

Options:

A.  

Implement retries with exponential backoff.

B.  

Use a PutRecord API instead of PutRecords.

C.  

Reduce the frequency and/or size of the requests.

D.  

Use Amazon SNS instead of Kinesis.

E.  

Reduce the number of KCL consumers.

Discussion 0
Questions 70

A large company has its application components distributed across multiple AWS accounts. The company needs to collect and visualize trace data across these accounts.

What should be used to meet these requirements?

Options:

A.  

AWS X-Ray

B.  

Amazon CloudWatch

C.  

Amazon VPC flow logs

D.  

Amazon OpenSearch Service

Discussion 0
Questions 71

A developer has created a new IAM user that has the s3:PutObject permission to write to a specific Amazon S3 bucket. The S3 bucket uses server-side encryption with AWS KMS–managed keys (SSE-KMS) as the default encryption. When an application uses the access key and secret key of the IAM user to call the PutObject API operation, the application receives an Access Denied error.

What should the developer do to resolve this error?

Options:

A.  

Update the policy of the IAM user to allow the s3:EncryptionConfiguration action.

B.  

Update the bucket policy of the S3 bucket to allow the IAM user to upload objects.

C.  

Update the policy of the IAM user to allow the kms:GenerateDataKey action.

D.  

Update the ACL of the S3 bucket to allow the IAM user to upload objects.

Discussion 0
Questions 72

A company has three AWS Lambda functions written in Node.js. The Lambda functions include a mix of custom code and open source modules. When bugs are occasionally detected in the open source modules, all three Lambda functions must be patched.

What is the MOST operationally efficient solution to deploy a patched open source library for all three Lambda functions?

Options:

A.  

Create a custom AWS CloudFormation public registry extension. Reference a GitHub repository that hosts the open source modules in the extension. Configure CloudFormation to scan the repository once each day. Write an AWS SAM template to redeploy the three Lambda functions upon a scan notification change.

B.  

Create an Amazon CloudFront distribution with an Amazon S3 bucket as the origin. Upload the patched modules to Amazon S3 when needed. Modify each Lambda function to download the patched modules from the CloudFront distribution during cold starts.

C.  

Launch an Amazon EC2 instance. Host a private open source module registry on the EC2 instance. Upload the modified open source modules to the private registry when needed. Modify each Lambda function deployment script to download the modules from the private registry. Redeploy the three Lambda functions.

D.  

Create a Lambda layer with the open source modules. Modify all three Lambda functions to use the layer. Remove the open source modules from each Lambda function. Patch the Lambda layer with the modified open source modules when needed. Update the Lambda functions to reference the new layer version.

Discussion 0
Questions 73

A company is preparing to migrate an application to the company's first AWS environment Before this migration, a developer is creating a proof-of-concept application to validate a model for building and deploying container-based applications on AWS.

Which combination of steps should the developer take to deploy the containerized proof-of-concept application with the LEAST operational effort? (Select TWO.)

Options:

A.  

Package the application into a zip file by using a command line tool Upload the package to Amazon S3

B.  

Package the application into a container image by using the Docker CLI. Upload the image to Amazon Elastic Container Registry (Amazon ECR)

C.  

Deploy the application to an Amazon EC2 instance by using AWS CodeDeploy.

D.  

Deploy the application to Amazon Elastic Kubernetes Service (Amazon EKS) on AWS Fargate

E.  

Deploy the application to Amazon Elastic Container Service (Amazon ECS) on AWS Fargate

Discussion 0
Questions 74

An organization is using Amazon CloudFront to ensure that its users experience low-latency access to its web application. The organization has identified a need to encrypt all traffic between users and CloudFront, and all traffic between CloudFront and the web application.

How can these requirements be met? (Select TWO)

Options:

A.  

Use AWS KMS t0 encrypt traffic between cloudFront and the web application.

B.  

Set the Origin Protocol Policy to "HTTPS Only".

C.  

Set the Origin’s HTTP Port to 443.

D.  

Set the Viewer Protocol Policy to "HTTPS Only" or Redirect HTTP to HTTPS"

E.  

Enable the CloudFront option Restrict Viewer Access.

Discussion 0
Questions 75

A company hosts its application on AWS. The application runs on an Amazon Elastic Container Service (Amazon ECS) cluster that uses AWS Fargate. The cluster runs behind an Application Load Balancer The application stores data in an Amazon Aurora database A developer encrypts and manages database credentials inside the application

The company wants to use a more secure credential storage method and implement periodic credential rotation.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Migrate the secret credentials to Amazon RDS parameter groups. Encrypt the parameter by using an AWS Key Management Service (AWS KMS) key Turn on secret rotation. Use 1AM policies and roles to grant AWS KMS permissions to access Amazon RDS.

B.  

Migrate the credentials to AWS Systems Manager Parameter Store. Encrypt the parameter by using an AWS Key Management Service (AWS KMS) key. Turn on secret rotation. Use 1AM policies and roles to grant Amazon ECS Fargate permissions to access to AWS Secrets Manager

C.  

Migrate the credentials to ECS Fargate environment variables. Encrypt the credentials by using an AWS Key Management Service (AWS KMS) key Turn on secret rotation. Use 1AM policies and roles to grant Amazon ECS Fargate permissions to access to AWS Secrets Manager.

D.  

Migrate the credentials to AWS Secrets Manager. Encrypt the credentials by using an AWS Key Management Service (AWS KMS) key Turn on secret rotation Use 1AM policies and roles to grant Amazon ECS Fargate permissions to access to AWS Secrets Manager by using keys.

Discussion 0
Questions 76

A developer is troubleshooting a three-tier application, which is deployed on Amazon EC2 instances. There is a connectivity problem between the application servers and the database servers.

Which AWS services or tools should be used to identify the faulty component? (Select TWO.)

Options:

A.  

AWS CloudTrail

B.  

AWS Trusted Advisor

C.  

Amazon VPC Flow Logs

D.  

Network access control lists

E.  

AWS Config rules

Discussion 0
Questions 77

A company has point-of-sale devices across thousands of retail shops that synchronize sales transactions with a centralized system. The system includes an Amazon API Gateway API that exposes an AWS Lambda function. The Lambda function processes the transactions and stores the transactions in Amazon RDS for MySQL. The number of transactions increases rapidly during the day and is near zero at night.

How can a developer increase the elasticity of the system MOST cost-effectively?

Options:

A.  

Migrate from Amazon RDS to Amazon Aurora MySQL. Use an Aurora Auto Scaling policy to scale read replicas based on CPU consumption.

B.  

Migrate from Amazon RDS to Amazon Aurora MySQL. Use an Aurora Auto Scaling policy to scale read replicas based on the number of database connections.

C.  

Create an Amazon SQS queue. Publish transactions to the queue. Set the queue to invoke the Lambda function. Turn on enhanced fanout for the Lambda function.

D.  

Create an Amazon SQS queue. Publish transactions to the queue. Set the queue to invoke the Lambda function. Set the reserved concurrency of the Lambda function to be less than the number of database connections.

Discussion 0
Questions 78

A company operates on-premises data centers that run an image processing service composed of containerized applications on Kubernetes clusters. All applications share access to a common NFS file system for data storage.

The company is running out of NFS capacity and must migrate to AWS quickly. The Kubernetes clusters must be highly available on AWS.

Which combination of actions will meet these requirements? (Select TWO.)

Options:

A.  

Transfer the data from the NFS share to an Amazon EBS volume. Upload the container images to Amazon ECR.

B.  

Transfer the data from the NFS share to an Amazon EFS file system. Upload the container images to Amazon ECR.

C.  

Create an Amazon ECS cluster and configure each node to mount the Amazon EBS volume.

D.  

Create an Amazon EKS cluster and configure each node to mount the Amazon EBS volume.

E.  

Create an Amazon EKS cluster and configure each node to mount the Amazon EFS file system.

Discussion 0
Questions 79

A company needs to distribute firmware updates to its customers around the world.

Which service will allow easy and secure control of the access to the downloads at the lowest cost?

Options:

A.  

Use Amazon CloudFront with signed URLs for Amazon S3.

B.  

Create a dedicated Amazon CloudFront Distribution for each customer.

C.  

Use Amazon CloudFront with AWS Lambda@Edge.

D.  

Use Amazon API Gateway and AWS Lambda to control access to an S3 bucket.

Discussion 0
Questions 80

A team of developed is using an AWS CodePipeline pipeline as a continuous integration and continuous delivery (CI/CD) mechanism for a web application. A developer has written unit tests to programmatically test the functionality of the application code. The unit tests produce a test report that shows the results of each individual check. The developer now wants to run these tests automatically during the CI/CD process.

Options:

A.  

Write a Git pre-commit hook that runs the test before every commit. Ensure that each developer who is working on the project has the pre-commit hook instated locally. Review the test report and resolve any issues before pushing changes to AWS CodeCommit.

B.  

Add a new stage to the pipeline. Use AWS CodeBuild as the provider. Add the new stage after the stage that deploys code revisions to the test environment. Write a buildspec that fails the CodeBuild stage if any test does not pass. Use the test reports feature of Codebuild to integrate the report with the CodoBuild console. View the test results in CodeBuild Resolve any issues.

C.  

Add a new stage to the pipeline. Use AWS CodeBuild at the provider. Add the new stage before the stage that deploys code revisions to the test environment. Write a buildspec that fails the CodeBuild stage it any test does not pass. Use the test reports feature of CodeBuild to integrate the report with the CodeBuild console. View the test results in codeBuild Resolve any issues.

D.  

Add a new stage to the pipeline. Use Jenkins as the provider. Configure CodePipeline to use Jenkins to run the unit tests. Write a Jenkinsfile that fails the stage if any test does not pass. Use the test report plugin for Jenkins to integrate the repot with the Jenkins dashboard. View the test results in Jenkins. Resolve any issues.

Discussion 0
Questions 81

A developer is updating an Amazon API Gateway REST API to have a mock endpoint. The developer wants to update the integration request mapping template so the endpoint will respond to mock integration requests with specific HTTP status codes based on various conditions.

Options:

A.  

{ if( $input.params(‘integration’) == "mock" ) "statusCode": 404 else "statusCode": 500 end }

B.  

{ if( $input.params('scope') == "internal" ) "statusCode": 200 else "statusCode": 500 end }

C.  

{ if( $input.path("integration") ) "statusCode": 200 else "statusCode":404 end }

D.  

{ if( $context.integration.status ) "statusCode": 200 else "statusCode": 500 end }

Discussion 0
Questions 82

A company uses AWS Secrets Manager to store API keys for external REST services. The company uses an AWS Lambda function to rotate the API keys on a regular schedule.

Due to an error in the Lambda function, the API keys are successfully updated in AWS Secrets Manager but are not updated in the external REST services. Before investigating the root cause of the issue, the company wants to resume requests to the external REST services as quickly as possible.

Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.  

Manually create a new version of the API keys in AWS Secrets Manager and update the keys in the external REST services.

B.  

Manually retrieve the new version of the API keys from AWS Secrets Manager and update the keys in the external REST services.

C.  

Roll back to the last known working version of the API keys in AWS Secrets Manager.

D.  

Fix and reinvoke the AWS Lambda rotation function to generate a new version of the API keys in AWS Secrets Manager and update the keys in the external REST services.

Discussion 0
Questions 83

A company runs an application on AWS The application stores data in an Amazon DynamoDB table Some queries are taking a long time to run These slow queries involve an attribute that is not the table's partition key or sort key

The amount of data that the application stores in the DynamoDB table is expected to increase significantly. A developer must increase the performance of the queries.

Which solution will meet these requirements'?

Options:

A.  

Increase the page size for each request by setting the Limit parameter to be higher than the default value Configure the application to retry any request that exceeds the provisioned throughput.

B.  

Create a global secondary index (GSI). Set query attribute to be the partition key of the index

C.  

Perform a parallel scan operation by issuing individual scan requests in the parameters specify the segment for the scan requests and the total number of segments for the parallel scan.

D.  

Turn on read capacity auto scaling for the DynamoDB table. Increase the maximum read capacity units (RCUs).

Discussion 0
Questions 84

A company has an application that is deployed on AWS Elastic Beanstalk. The application generates user-specific PDFs and stores the PDFs in an Amazon S3 bucket. The application then uses Amazon Simple Email Service (Amazon SES) to send the PDFs by email to subscribers.

Users no longer access the PDFs 90 days after the PDFs are generated. The S3 bucket is not versioned and contains many obsolete PDFs.

A developer must reduce the number of files in the S3 bucket by removing PDFs that are older than 90 days.

Which solution will meet this requirement with the LEAST development effort?

Options:

A.  

Update the application code. In the code, add a rule to scan all the objects in the S3 bucket every day and to delete objects after 90 days.

B.  

Create an AWS Lambda function. Program the Lambda function to scan all the objects in the S3 bucket every day and to delete objects after 90 days.

C.  

Create an S3 Lifecycle rule for the S3 bucket to expire objects after 90 days.

D.  

Partition the S3 objects with a // key prefix. Create an AWS Lambda function to remove objects that have prefixes that have reached the expiration date.

Discussion 0
Questions 85

An Amazon Kinesis Data Firehose delivery stream is receiving customer data that contains personally identifiable information. A developer needs to remove pattern-based customer identifiers from the data and store the modified data in an Amazon S3 bucket.

What should the developer do to meet these requirements?

Options:

A.  

Implement Kinesis Data Firehose data transformation as an AWS Lambda function. Configure the function to remove the customer identifiers. Set an Amazon S3 bucket as the destination of the delivery stream.

B.  

Launch an Amazon EC2 instance. Set the EC2 instance as the destination of the delivery stream. Run an application on the EC2 instance to remove the customer identifiers. Store the transformed data in an Amazon S3 bucket.

C.  

Create an Amazon OpenSearch Service instance. Set the OpenSearch Service instance as the destination of the delivery stream. Use search and replace to remove the customer identifiers. Export the data to an Amazon S3 bucket.

D.  

Create an AWS Step Functions workflow to remove the customer identifiers. As the last step in the workflow, store the transformed data in an Amazon S3 bucket. Set the workflow as the destination of the delivery stream.

Discussion 0
Questions 86

A developer has an application that makes batch requests directly to Amazon DynamoDB by using the BatchGetItem low-level API operation. The responses frequently return values in the UnprocessedKeys element.

Which actions should the developer take to increase the resiliency of the application when the batch response includes values in UnprocessedKeys? (Choose two.)

Options:

A.  

Retry the batch operation immediately.

B.  

Retry the batch operation with exponential backoff and randomized delay.

C.  

Update the application to use an AWS software development kit (AWS SDK) to make the requests.

D.  

Increase the provisioned read capacity of the DynamoDB tables that the operation accesses.

E.  

Increase the provisioned write capacity of the DynamoDB tables that the operation accesses.

Discussion 0
Questions 87

A company had an Amazon RDS for MySQL DB instance that was named mysql-db. The DB instance was deleted within the past 90 days.

A developer needs to find which IAM user or role deleted the DB instance in the AWS environment.

Which solution will provide this information?

Options:

A.  

Retrieve the AWS CloudTrail events for the resource mysql-db where the event name is DeleteDBInstance. Inspect each event.

B.  

Retrieve the Amazon CloudWatch log events from the most recent log stream within the rds/mysql-db log group. Inspect the log events.

C.  

Retrieve the AWS X-Ray trace summaries. Filter by services with the name mysql-db. Inspect the ErrorRootCauses values within each summary.

D.  

Retrieve the AWS Systems Manager deletions inventory. Filter the inventory by deletions that have a TypeName value of RDS. Inspect the deletion details.

Discussion 0
Questions 88

A company's application uses an Amazon API Gateway REST API and AWS Lambda functions to upload media files to and fetch media files from a standard Amazon S3 Standard bucket. The company runs a nightly job on an Amazon EC2 instance to create dashboards and other visualizations for application users. The job usually runs for 1 to 2 hours.

A developer observes request throttling while the function is running. The application generates multiple 429 exceptions in the Lambda function logs when files do not process successfully. The developer needs to resolve the issue and ensure that all of the application ingests all files.

Which solution will meet these requirements?

Options:

A.  

Enable S3 Transfer Acceleration on the bucket. Use the appropriate endpoint.

B.  

Call the CreateMultipartUpload API in the Lambda functions to upload the files in pieces.

C.  

Implement the retry with a backoff pattern in the Lambda functions.

D.  

Set up an S3 Lifecycle policy to automatically move the media files to the S3 Intelligent-Tiering storage class.

Discussion 0
Questions 89

A company is creating a new application that gives users the ability to upload and share short video files. The average size of the video files is 10 MB. After a user uploads a file, a message needs to be placed into an Amazon Simple Queue Service (Amazon SQS) queue so the file can be processed. The files need to be accessible for processing within 5 minutes.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.  

Write the files to Amazon S3 Glacier Deep Archive. Add the S3 location of the files to the SQS queue.

B.  

Write the files to Amazon S3 Standard. Add the S3 location of the files to the SQS queue.

C.  

Write the files to an Amazon Elastic Block Store (Amazon EBS) General Purpose SSD volume. Add the EBS location of the files to the SQS queue.

D.  

Write messages that contain the contents of the uploaded files to the SQS queue.

Discussion 0
Questions 90

A developer creates a static website for their department The developer deploys the static assets for the website to an Amazon S3 bucket and serves the assets with Amazon CloudFront The developer uses origin access control (OAC) on the CloudFront distribution to access the S3 bucket

The developer notices users can access the root URL and specific pages but cannot access directories without specifying a file name. For example, /products/index.html works, but /products returns an error The developer needs to enable accessing directories without specifying a file name without exposing the S3 bucket publicly.

Which solution will meet these requirements'?

Options:

A.  

Update the CloudFront distribution's settings to index.html as the default root object is set

B.  

Update the Amazon S3 bucket settings and enable static website hosting. Specify index html as the Index document Update the S3 bucket policy to enable access. Update the CloudFront distribution's origin to use the S3 website endpoint

C.  

Create a CloudFront function that examines the request URL and appends index.html when directories are being accessed Add the function as a viewer request CloudFront function to the CloudFront distribution's behavior.

D.  

Create a custom error response on the CloudFront distribution with the HTTP error code set to the HTTP 404 Not Found response code and the response page path to /index html Set the HTTP response code to the HTTP 200 OK response code

Discussion 0
Questions 91

A data visualization company wants to strengthen the security of its core applications The applications are deployed on AWS across its development staging, pre-production, and production environments. The company needs to encrypt all of its stored sensitive credentials The sensitive credentials need to be automatically rotated Aversion of the sensitive credentials need to be stored for each environment

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.  

Configure AWS Secrets Manager versions to store different copies of the same credentials across multiple environments

B.  

Create a new parameter version in AWS Systems Manager Parameter Store for each environment Store the environment-specific credentials in the parameter version.

C.  

Configure the environment variables in the application code Use different names for each environment type

D.  

Configure AWS Secrets Manager to create a new secret for each environment type. Store the environment-specific credentials in the secret

Discussion 0
Questions 92

A developer is integrating Amazon ElastiCache in an application. The cache will store data from a database. The cached data must populate real-time dashboards. Which caching strategy will meet these requirements?

Options:

A.  

A read-through cache

B.  

A write-behind cache

C.  

A lazy-loading cache

D.  

A write-through cache

Discussion 0
Questions 93

A developer is making changes to a custom application that uses AWS Elastic Beanstalk.

Which solutions will update the Elastic Beanstalk environment with the new application version after the developer completes the changes? (Select TWO.)

Options:

A.  

Package the application code into a .zip file. Use the AWS Management Console to upload the .zip file and deploy the packaged application.

B.  

Package the application code into a .tar file. Use the AWS Management Console to create a new application version from the .tar file. Update the environment by using the AWS CLI.

C.  

Package the application code into a .tar file. Use the AWS Management Console to upload the .tar file and deploy the packaged application.

D.  

Package the application code into a .zip file. Use the AWS CLI to create a new application version from the .zip file and to update the environment.

E.  

Package the application code into a .zip file. Use the AWS Management Console to create a new application version from the .zip file. Rebuild the environment by using the AWS CLI.

Discussion 0
Questions 94

A company built a new application in the AWS Cloud. The company automated the bootstrapping of new resources with an Auto Scaling group by using AWS Cloudf-ormation templates. The bootstrap scripts contain sensitive data.

The company needs a solution that is integrated with CloudFormation to manage the sensitive data in the bootstrap scripts.

Which solution will meet these requirements in the MOST secure way?

Options:

A.  

Put the sensitive data into a CloudFormation parameter. Encrypt the CloudFormation templates by using an AWS Key Management Service (AWS KMS) key.

B.  

Put the sensitive data into an Amazon S3 bucket Update the CloudFormation templates to download the object from Amazon S3 during bootslrap.

C.  

Put the sensitive data into AWS Systems Manager Parameter Store as a secure string parameter. Update the CloudFormation templates to use dynamic references to specify template values.

D.  

Put the sensitive data into Amazon Elastic File System (Amazon EPS) Enforce EFS encryption after file system creation. Update the CloudFormation templates to retrieve data from Amazon EFS.

Discussion 0
Questions 95

A software company is migrating a single-page application from on-premises servers to the AWS Cloud by using AWS Amplify Hosting. The application relies on an API that was created with an existing GraphQL schema. The company needs to migrate the API along with the application.

Which solution will meet this requirement with the LEAST amount of configuration?

Options:

A.  

Create a new API by using the Amplify CLI's amplify import api command. Select REST as the service to use. Add the existing schema to the new API.

B.  

Create a new API in Amazon API Gateway by using the existing schema. Use the Amplify CLI's amplify add api command. Select the API as the application's backend environment.

C.  

Create a new API in AWS AppSync by using the existing schema. Use the Amplify CLI's amplify import api command. Select the API as the application's backend environment.

D.  

Create a new API by using the Amplify CLI's amplify add api command. Select GraphQL as the service to use. Add the existing schema to the new API.

Discussion 0
Questions 96

A developer is building an application that processes a stream of user-supplied data. The data stream must be consumed by multiple Amazon EC2 based processing applications in parallel and in real time. Each processor must be able to resume without losing data if there is a service interruption. The application architect plans to add other processors in the near future, and wants to minimize the amount of data duplication involved.

Which solution will satisfy these requirements?

Options:

A.  

Publish the data to Amazon Simple Queue Service (Amazon SQS).

B.  

Publish the data to Amazon Data Firehose.

C.  

Publish the data to Amazon EventBridge.

D.  

Publish the data to Amazon Kinesis Data Streams.

Discussion 0
Questions 97

A company hosts a batch processing application on AWS Elastic Beanstalk with instances that run the most recent version of Amazon Linux. The application sorts and processes large datasets. In recent weeks, the application's performance has decreased significantly during a peak period for traffic. A developer suspects that the application issues are related to the memory usage. The developer checks the Elastic Beanstalk console and notices that memory usage is not being tracked.

How should the developer gather more information about the application performance issues?

Options:

A.  

Configure the Amazon CloudWatch agent to push logs to Amazon CloudWatch Logs by using port 443.

B.  

Configure the Elastic Beanstalk .ebextensions directory to track the memory usage of the instances.

C.  

Configure the Amazon CloudWatch agent to track the memory usage of the instances.

D.  

Configure an Amazon CloudWatch dashboard to track the memory usage of the instances.

Discussion 0
Questions 98

A company is developing a serverless application that requires storage of sensitive API keys as environment variables for various services. The application requires the automatic rotation of the encryption keys every year.

Which solution will meet these requirements with no development effort?

Options:

A.  

Encrypt the environment variables by using AWS Secrets Manager. Set up automatic rotation in Secrets Manager.

B.  

Encrypt the environment variables by using AWS Key Management Service (AWS KMS) customer managed keys. Enable automatic key rotation.

C.  

Encrypt the environment variables by using AWS Key Management Service (AWS KMS) AWS managed keys. Configure a custom AWS Lambda function to automate key rotation.

D.  

Encrypt the environment variables by using AWS Systems Manager Parameter Store. Set up automatic rotation in Parameter Store.

Discussion 0
Questions 99

A web application is using Amazon Kinesis Data Streams for clickstream data that may not be consumed for up to 12 hours.

How can the developer implement encryption at rest for data within the Kinesis Data Streams?

Options:

A.  

Enable SSL connections to Kinesis.

B.  

Use Amazon Kinesis Consumer Library.

C.  

Encrypt the data once it is at rest with a Lambda function.

D.  

Enable server-side encryption in Kinesis Data Streams.

Discussion 0
Questions 100

A company needs to package and deploy an application that uses AWS Lambda to compress and decompress video clips. The application uses a video codec library that is larger than 250 MB. The application uses the library to compress the videos before storage and to decompress the videos upon retrieval.

Options:

A.  

Create one Lambda function. Upload one zip file that contains code to handle video compression and decompression to the function. Include the codec library in the zip file.

B.  

Create two Lambda functions. Upload one zip file that contains code to handle video compression to one function. Upload a second zip file that contains code for video decompression to the second function. Include the codec library in both zip files.

C.  

Create two Lambda functions. Upload one zip file that contains code to handle video compression to one function. Upload a second zip file that contains code for video decompression to the second function. Create one Lambda layer for the codec library. Add the layer to both functions.

D.  

Create two Lambda functions. Build one container image that contains code to handle video compression and a second image that contains video decompression code. Add the codec library to both images. Upload the images to Amazon ECR. Use the containers to create the Lambda functions.

Discussion 0
Questions 101

A developer is building an application that stores user activity data in an Amazon DynamoDB table. The developer is writing a new AWS Lambda function to process the activity data. The developer grants the IAM role that the function assumes permission to query the table. The developer must ensure that the function does not have access to personally identifiable information (PII) that is stored in some of the table item attributes.

Which solutions will meet these requirements? (Select TWO.)

Options:

A.  

Create a resource-based policy for the DynamoDB table to deny access based on attributes.

B.  

Create an AWS KMS customer managed key and use it to encrypt the table.

C.  

Create an AWS KMS customer managed key and use envelope encryption to encrypt PII attributes in the table.

D.  

Enable attribute-based access control (ABAC) for the DynamoDB table by using resource tags.

E.  

Update the function to use a projection expression when querying the table to control which attributes are returned.

Discussion 0
Questions 102

A company runs a highly available application in multiple AWS Regions. The application requires access to a secret value that is stored in AWS Secrets Manager. The secret value must be available in all Regions where the application operates. The secret value must remain consistent across the Regions.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Configure an AWS Lambda function to copy the secret to each Region. Configure Amazon EventBridge to trigger the Lambda function to update the copies of the secret when the primary secret is updated.

B.  

Configure the application in all Regions to retrieve the secret value directly from the primary Region by using the secret's ARN. Configure the application to cache the secret value locally.

C.  

Enable replication for the secret in the primary Region. Ensure that the application can access the appropriate secret ARN in each Region where the secret is replicated.

D.  

Create a new secret in each Region. Ensure that the application can access the appropriate secret ARN in each Region where the secret is replicated.

Discussion 0
Questions 103

A developer is working on an ecommerce application that stores data in an Amazon RDS for MySQL cluster The developer needs to implement a caching layer for the application to retrieve information about the most viewed products.

Which solution will meet these requirements?

Options:

A.  

Edit the RDS for MySQL cluster by adding a cache node. Configure the cache endpoint instead of the duster endpoint in the application.

B.  

Create an Amazon ElastiCache (Redis OSS) cluster. Update the application code to use the ElastiCache (Redis OSS) cluster endpoint.

C.  

Create an Amazon DynamoDB Accelerator (DAX) cluster in front of the RDS for MySQL cluster. Configure the application to connect to the DAX endpoint instead of the RDS endpoint.

D.  

Configure the RDS for MySQL cluster to add a standby instance in a different Availability Zone. Configure the application to read the data from the standby instance.

Discussion 0
Questions 104

A developer is writing an AWS Lambda function. The developer wants to log key events that occur while the Lambda function runs. The developer wants to include a unique identifier to associate the events with a specific function invocation. The developer adds the following code to the Lambda function:

Which solution will meet this requirement?

Options:

A.  

Obtain the request identifier from the AWS request ID field in the context object. Configure the application to write logs to standard output.

B.  

Obtain the request identifier from the AWS request ID field in the event object. Configure the application to write logs to a file.

C.  

Obtain the request identifier from the AWS request ID field in the event object. Configure the application to write logs to standard output.

D.  

Obtain the request identifier from the AWS request ID field in the context object. Configure the application to write logs to a file.

Discussion 0
Questions 105

A developer is creating an AWS Lambda function. The Lambda function needs an external library to connect to a third-party solution The external library is a collection of files with a total size of 100 MB The developer needs to make the external library available to the Lambda execution environment and reduce the Lambda package space

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Create a Lambda layer to store the external library Configure the Lambda function to use the layer

B.  

Create an Amazon S3 bucket Upload the external library into the S3 bucket. Mount the S3 bucket folder in the Lambda function Import the library by using the proper folder in the mount point.

C.  

Load the external library to the Lambda function's /tmp directory during deployment of the Lambda package. Import the library from the /tmp directory.

D.  

Create an Amazon Elastic File System (Amazon EFS) volume. Upload the external library to the EFS volume Mount the EFS volume in the Lambda function. Import the library by using the proper folder in the mount point.

Discussion 0
Questions 106

A developer has deployed an AWS Lambda function that is subscribed to an Amazon Simple Notification Service {Amazon SNS) topic. The developer must implement a solution to add a record of each Lambda function invocation to an Amazon Simple Queue Service {Amazon SQS) queue.

Which solution will meet this requirement?

Options:

A.  

Configure the SQS queue as a dead-letter queue for the Lambda function.

B.  

Create code that uses the AWS SDK to call the SQS SendMessage operation to add the invocation details to the SQS queue. Add the code to the end of the Lambda function.

C.  

Add two asynchronous invocation destinations to the Lambda function: one destination for successful invocations and one destination for failed invocations. Configure the SQS queue as the destination for each type. Create an Amazon CloudWatch alarm based on the DestinationDeliveryFailures metric to catch any message that cannot be delivered.

D.  

Add a single asynchronous invocation destination to the Lambda function to capture successful invocations. Configure the SQS queue as the destination. Create an Amazon CloudWatch alarm based on the DestinationDeliveryFailures metric to catch any message that cannot be delivered.

Discussion 0
Questions 107

A developer needs to use Amazon DynamoDB to store customer orders. The developer's company requires all customer data to be encrypted at rest with a key that the company generates.

What should the developer do to meet these requirements?

Options:

A.  

Create the DynamoDB table with encryption set to None. Code the application to use the key to decrypt the data when the application reads from the table. Code the application to use the key to encrypt the data when the application writes to the table.

B.  

Store the key by using AW5 KMS. Choose an AVVS KMS customer managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.

C.  

Store the key by using AWS KMS. Create the DynamoDB table with default encryption. Include the kms:Encrypt parameter with the Amazon Resource Name (ARN) of the AWS KMS key when using the DynamoDB SDK.

D.  

Store the key by using AWS KMS. Choose an AWS KMS AWS managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.

Discussion 0
Questions 108

A developer works for a company that only has a single pre-production AWS account with an AWS CloudFormation AWS SAM stack. The developer made changes to an existing AWS Lambda function specified in the AWS SAM template and additional Amazon SNS topics.

The developer wants to do a one-time deployment of the changes to test if the changes are working. The developer does not want to impact the existing pre-production application that is currently being used by other team members as part of the release pipeline.

Which solution will meet these requirements?

Options:

A.  

Use the AWS SAM CLI to package and deploy the SAM application to the pre-production AWS account. Specify the debug parameter.

B.  

Use the AWS SAM CLI to package and create a change set against the pre-production AWS account. Execute the change set in a new AWS account designated for a development environment.

C.  

Use the AWS SAM CLI to package and deploy the SAM application to a new AWS account designated for a development environment.

D.  

Update the CloudFormation stack in the pre-production account. Add a separate stage that points to a new AWS account designated for a development environment.

Discussion 0
Questions 109

A company uses a custom root certificate authority certificate chain (Root CA Cert) that is 10 KB in size generate SSL certificates for its on-premises HTTPS endpoints. One of the company’s cloud based applications has hundreds of AWS Lambda functions that pull date from these endpoints. A developer updated the trust store of the Lambda execution environment to use the Root CA Cert when the Lambda execution environment is initialized. The developer bundled the Root CA Cert as a text file in the Lambdas deployment bundle.

After 3 months of development the root CA Cert is no longer valid and must be updated. The developer needs a more efficient solution to update the Root CA Cert for all deployed Lambda functions. The solution must not include rebuilding or updating all Lambda functions that use the Root CA Cert. The solution must also work for all development, testing and production environment. Each environment is managed in a separate AWS account.

When combination of steps Would the developer take to meet these environments MOST cost-effectively? (Select TWO)

Options:

A.  

Store the Root CA Cert as a secret in AWS Secrets Manager. Create a resource-based policy. Add IAM users to allow access to the secret

B.  

Store the Root CA Cert as a Secure Sting parameter in aws Systems Manager Parameter Store Create a resource-based policy. Add IAM users to allow access to the policy.

C.  

Store the Root CA Cert in an Amazon S3 bucket. Create a resource- based policy to allow access to the bucket.

D.  

Refactor the Lambda code to load the Root CA Cert from the Root CA Certs location. Modify the runtime trust store inside the Lambda function handler.

E.  

Refactor the Lambda code to load the Root CA Cert from the Root CA Cert's location. Modify the runtime trust store outside the Lambda function handler.

Discussion 0
Questions 110

A developer warns to add request validation to a production environment Amazon API Gateway API. The developer needs to test the changes before the API is deployed to the production environment. For the lest the developer will send test requests to the API through a testing tool.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Export the existing API to an OpenAPI file. Create a new API Import the OpenAPI file Modify the new API to add request validation. Perform the tests Modify the existing API to add request validation. Deploy the existing API to production.

B.  

Modify the existing API to add request validation. Deploy the updated API to a new API Gateway stage Perform the tests Deploy the updated API to the API Gateway production stage.

C.  

Create a new API Add the necessary resources and methods including new request validation. Perform the tests Modify the existing API to add request validation. Deploy the existing API to production.

D.  

Clone the exiting API Modify the new API lo add request validation. Perform the tests Modify the existing API to add request validation Deploy the existing API to production.

Discussion 0
Questions 111

A developer is writing an application that will retrieve sensitive data from a third-party system. The application will format the data into a PDF file. The PDF file could be more than 1 MB. The application will encrypt the data to disk by using AWS Key Management Service (AWS KMS). The application will decrypt the file when a user requests to download it. The retrieval and formatting portions of the application are complete.

The developer needs to use the GenerateDataKey API to encrypt the PDF file so that the PDF file can be decrypted later. The developer needs to use an AWS KMS symmetric customer managed key for encryption.

Which solutions will meet these requirements?

Options:

A.  

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

B.  

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

C.  

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

D.  

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

Discussion 0
Questions 112

A developer has been asked to create an AWS Lambda function that is invoked any time updates are made to items in an Amazon DynamoDB table. The function has been created and appropriate permissions have been added to the Lambda execution role Amazon DynamoDB streams have been enabled for the table, but the function 15 still not being invoked.

Which option would enable DynamoDB table updates to invoke the Lambda function?

Options:

A.  

Change the StreamViewType parameter value to NEW_AND_OLOJMAGES for the DynamoDB table.

B.  

Configure event source mapping for the Lambda function.

C.  

Map an Amazon Simple Notification Service (Amazon SNS) topic to the DynamoDB streams.

D.  

Increase the maximum runtime (timeout) setting of the Lambda function.

Discussion 0
Questions 113

A developer is writing an application that will provide data files to an external company. The external company needs to verify that the data is not modified in transit.

How can the developer use AWS KMS to prove the integrity of the transferred data?

Options:

A.  

Encrypt the data by using a symmetric key. Provide the key to the external company.

B.  

Sign the data by using a symmetric key. Provide the key to the external company.

C.  

Sign the data by using the private key of an asymmetric key pair. Provide the public key to the external company.

D.  

Sign the data by using the public key of an asymmetric key pair. Provide the private key to the external company.

Discussion 0
Questions 114

A developer is creating a mobile app that calls a backend service by using an Amazon API Gateway REST API. For integration testing during the development phase, the developer wants to simulate different backend responses without invoking the backend service.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Create an AWS Lambda function. Use API Gateway proxy integration to return constant HTTP responses.

B.  

Create an Amazon EC2 instance that serves the backend REST API by using an AWS CloudFormation template.

C.  

Customize the API Gateway stage to select a response type based on the request.

D.  

Use a request mapping template to select the mock integration response.

Discussion 0
Questions 115

A development team uses an Amazon DynamoDB table as a database for an application. The team notices errors and slowdowns in the application during peak usage hours. The slowdowns and errors occur during a surge of user logins. The application receives frequent write requests. Application logs indicate that write requests are being throttled.

The development team needs to reduce the application latency and resolve the throttling errors.

Which solutions will meet these requirements? (Select TWO.)

Options:

A.  

Create a DynamoDB Accelerator (DAX) cluster. Update the application to send read requests to the DAX endpoint.

B.  

Increase the provisioned throughput of the table.

C.  

Reduce the frequency of write requests by using error retries and exponential backoff.

D.  

Reduce control plane operations that occur during peak usage hours by consolidating the DynamoDB tables and indexes.

E.  

Change the table's capacity mode to on-demand.

Discussion 0
Questions 116

A company is creating a new feature for existing software. Before the company fully releases a new version of the software, the company wants to test the feature.

The company needs to gather feedback about the feature from a small group of users while the current software version remains deployed. If the testing validates the feature, the company needs to deploy the new software version to all other users at the same time.

Which deployment strategy will meet these requirements?

Options:

A.  

All-at-once deployment

B.  

Canary deployment

C.  

In-place deployment

D.  

Linear deployment

Discussion 0
Questions 117

A developer is receiving HTTP 400: ThrottlingException errors intermittently when calling the Amazon CloudWatch API. When a call fails, no data is retrieved.

What best practice should first be applied to address this issue?

Options:

A.  

Contact AWS Support for a limit increase.

B.  

Use the AWS CLI to get the metrics.

C.  

Analyze the applications and remove the API call.

D.  

Retry the call with exponential backoff.

Discussion 0
Questions 118

An ecommerce company manages its application's infrastructure by using AWS Elastic Beanstalk. A developer wants to deploy the new version of the application with the least possible application downtime. The developer also must minimize the application's rollback time if there are issues with the deployment.

Which approach will meet these requirements?

Options:

A.  

Use a rolling deployment to deploy the new version.

B.  

Use a rolling deployment with additional batches to deploy the new version.

C.  

Use an all-at-once deployment to deploy the new version.

D.  

Deploy the new version to a new environment. Use a blue/green deployment.

Discussion 0
Questions 119

A developer has created an AWS Lambda function to provide notification through Amazon Simple Notification Service (Amazon SNS) whenever a file is uploaded to Amazon S3 that is larger than 50 MB. The developer has deployed and tested the Lambda function by using the CLI. However, when the event notification is added to the S3 bucket and a 3.000 MB file is uploaded, the Lambda function does not launch.

Which of the following Is a possible reason for the Lambda function's inability to launch?

Options:

A.  

The S3 event notification does not activate for files that are larger than 1.000 MB.

B.  

The resource-based policy for the Lambda function does not have the required permissions to be invoked by Amazon S3.

C.  

Lambda functions cannot be invoked directly from an S3 event.

D.  

The S3 bucket needs to be made public.

Discussion 0
Questions 120

A developer is using AWS Step Functions to automate a workflow The workflow defines each step as an AWS Lambda function task The developer notices that runs of the Step Functions state machine fail in the GetResource task with either an UlegalArgumentException error or a TooManyRequestsException error

The developer wants the state machine to stop running when the state machine encounters an UlegalArgumentException error. The state machine needs to retry the GetResource task one additional time after 10 seconds if the state machine encounters a TooManyRequestsException error. If the second attempt fails, the developer wants the state machine to stop running.

How can the developer implement the Lambda retry functionality without adding unnecessary complexity to the state machine'?

Options:

A.  

Add a Delay task after the GetResource task. Add a catcher to the GetResource task. Configure the catcher with an error type of TooManyRequestsException. Configure the next step to be the Delay task Configure the Delay task to wait for an interval of 10 seconds Configure the next step to be the GetResource task.

B.  

Add a catcher to the GetResource task Configure the catcher with an error type of TooManyRequestsException. an interval of 10 seconds, and a maximum attempts value of 1. Configure the next step to be the GetResource task.

C.  

Add a retrier to the GetResource task Configure the retrier with an error type of TooManyRequestsException, an interval of 10 seconds, and a maximum attempts value of 1.

D.  

Duplicate the GetResource task Rename the new GetResource task to TryAgain Add a catcher to the original GetResource task Configure the catcher with an error type of TooManyRequestsException. Configure the next step to be TryAgain.

Discussion 0
Questions 121

A developer is setting up infrastructure by using AWS Cloud Formation. If an error occurs when the resources described in the CloudFormation template are provisioned, successfully provisioned resources must be preserved. The developer must provision and update the CloudFormation stack by using the AWS CLI.

Which solution will meet these requirements?

Options:

A.  

Add an --enable-terminal ion-protection command line option to the create-stack command and the update-stack command.

B.  

Add a -disable-roll back command line option to the create-stack command and the update-stack command

C.  

Add a —parameters ParameterKey=P reserve Resources. ParameterVaIue=True command line option to the create-stack command and the update-stack command.

D.  

Add a -tags Key=PreserveResources.VaIue=True command line option to the create-stack command and the update-stack command.

Discussion 0
Questions 122

A company has a website that displays a daily newsletter. When a user visits the website, an AWS Lambda function processes the browser's request and queries the company's on-premises database to obtain the current newsletter. The newsletters are stored in English. The Lambda function uses the Amazon Translate TranslateText API operation to translate the newsletters, and the translation is displayed to the user.

Due to an increase in popularity, the website's response time has slowed. The database is overloaded. The company cannot change the database and needs a solution that improves the response time of the Lambda function.

Which solution meets these requirements?

Options:

A.  

Change to asynchronous Lambda function invocation.

B.  

Cache the translated newsletters in the Lambda /tmp directory.

C.  

Enable TranslateText API caching.

D.  

Change the Lambda function to use parallel processing.

Discussion 0
Questions 123

A company is developing a web application that allows its employees to upload a profile picture to a private Amazon S3 bucket. There is no size limit for the profile pictures, which should be displayed every time an employee logs in. For security reasons, the pictures cannot be publicly accessible.

What is a viable long-term solution for this scenario?

Options:

A.  

Generate a presigned URL when a picture is uploaded. Save the URL in an Amazon DynamoDB table. Return the URL to the browser when the employee logs in.

B.  

Save the picture's S3 key in an Amazon DynamoDB table. Create an Amazon S3 VPC endpoint to allow the employees to download pictures once they log in.

C.  

Encode a picture using base64. Save the base64 string in an Amazon DynamoDB table. Allow the browser to retrieve the string and convert it to a picture.

D.  

Save the picture's S3 key in an Amazon DynamoDB table. Use a function to generate a presigned URL every time an employee logs in. Return the URL to the browser.

Discussion 0
Questions 124

A developer is working on an application that will store protected health information (PHI) in an Amazon RDS database. The developer applies encryption to the database. The developer must also encrypt the PHI data separately to prevent administrators from accessing the data. Because some of the PHI data files are large, the developer must encrypt the PHI data in the application locally before saving the data to the database.

Which solution will meet these requirements in the MOST secure way?

Options:

A.  

Create an AWS KMS customer managed key. Use the KMS Encrypt operation to encrypt the PHI data before storing the PHI data in the database.

B.  

Generate a 256-bit AES encryption key. Store the key in base64-encoded format in the application source code. Use the encryption key to encrypt the PHI data before storing the PHI data in the database.

C.  

Configure the database to use an AWS KMS managed key for encryption.

D.  

Create an AWS KMS customer managed key. Use envelope encryption to encrypt the PHI data. Store the encrypted key in the same database record that stores the PHI data.

Discussion 0
Questions 125

A developer maintains a serverless application that uses AWS Lambda to process financial transaction files that have been uploaded to an Amazon S3 bucket. The developer has scheduled a Lambda function to run once each hour to process the files.

Over time, the frequency of file uploads to the S3 bucket increases. The increasing number of file uploads occasionally causes the Lambda function to exceed its 15-minute execution timeout.

The developer needs to modify the application's architecture to handle increased file uploads and decrease file processing time. The developer must also ensure that the application does not duplicate the processing of files.

Which solution will meet these requirements?

Options:

A.  

Configure Amazon S3 events to invoke the Lambda function when each file is uploaded. Log processed transaction IDs to Amazon DynamoDB.

B.  

Move the application logic to a single Amazon EC2 instance to handle processing more effectively.

C.  

Use Amazon EventBridge Scheduler to run the Lambda function every 5 minutes to scan the S3 bucket.

D.  

Poll the Amazon S3 bucket continuously by using the Lambda function and each object's LastModified timestamp.

Discussion 0
Questions 126

A developer has designed an application to store incoming data as JSON files in Amazon S3 objects. Custom business logic in an AWS Lambda function then transforms the objects, and the Lambda function loads the data into an Amazon DynamoDB table. Recently, the workload has experienced sudden and significant changes in traffic. The flow of data to the DynamoDB table is becoming throttled.

The developer needs to implement a solution to eliminate the throttling and load the data into the DynamoDB table more consistently.

Which solution will meet these requirements?

Options:

A.  

Refactor the Lambda function into two functions. Configure one function to transform the data and one function to load the data into the DynamoDB table. Create an Amazon Simple Queue Service (Amazon SQS) queue in between the functions to hold the items as messages and to invoke the second function.

B.  

Turn on auto scaling for the DynamoDB table. Use Amazon CloudWatch to monitor the table's read and write capacity metrics and to track consumed capacity.

C.  

Create an alias for the Lambda function. Configure provisioned concurrency for the application to use.

D.  

Refactor the Lambda function into two functions. Configure one function to store the data in the DynamoDB table. Configure the second function to process the data and update the items after the data is stored in DynamoDB. Create a DynamoDB stream to invoke the second function after the data isstored.

Discussion 0
Questions 127

A developer is building an image-processing application that includes an AWS Lambda function. The Lambda function moves images from one AWS service to another AWS service for image processing. For images that are larger than 2 MB, the Lambda function returns the following error: "Task timed out after 3.01 seconds."

The developer needs to resolve the error without modifying the Lambda function code.

Which solution will meet these requirements?

Options:

A.  

Increase the Lambda function’s timeout value.

B.  

Configure the Lambda function to not move images that are larger than 2 M

B.  

C.  

Request a concurrency quota increase for the Lambda function.

D.  

Configure provisioned concurrency for the Lambda function.

Discussion 0
Questions 128

A company hosts a client-side web application for one of its subsidiaries on Amazon S3. The web application can be accessed through Amazon CloudFront from https://www.example.com. After a successful rollout, the company wants to host three more client-side web applications for its remaining subsidiaries on three separate S3 buckets.

To achieve this goal, a developer moves all the common JavaScript files and web fonts to a central S3 bucket that serves the web applications. However, during testing, the developer notices that the browser blocks the JavaScript files and web fonts.

What should the developer do to prevent the browser from blocking the JavaScript files and web fonts?

Options:

A.  

Create four access points that allow access to the central S3 bucket. Assign an access point to each web application bucket.

B.  

Create a bucket policy that allows access to the central S3 bucket. Attach the bucket policy to the central S3 bucket.

C.  

Create a cross-origin resource sharing (CORS) configuration that allows access to the central S3 bucket. Add the CORS configuration to the central S3 bucket.

D.  

Create a Content-MD5 header that provides a message integrity check for the central S3 bucket. Insert the Content-MD5 header for each web application request.

Discussion 0
Questions 129

A company is migrating an on-premises database to Amazon RDS for MySQL. The company has read-heavy workloads. The company wants to refactor the code to achieve optimum read performance for queries.

Which solution will meet this requirement with LEAST current and future effort?

Options:

A.  

Use a multi-AZ Amazon RDS deployment. Increase the number of connections that the code makes to the database or increase the connection pool size if a connection pool is in use.

B.  

Use a multi-AZ Amazon RDS deployment. Modify the code so that queries access the secondary RDS instance.

C.  

Deploy Amazon RDS with one or more read replicas. Modify the application code so that queries use the URL for the read replicas.

D.  

Use open source replication software to create a copy of the MySQL database on an Amazon EC2 instance. Modify the application code so that queries use the IP address of the EC2 instance.

Discussion 0
Questions 130

A developer is migrating a containerized application from an on-premises environment to the AWS Cloud. The developer is using the AWS CDK to provision a container in Amazon ECS on AWS Fargate. The container is behind an Application Load Balancer (ALB).

When the developer deploys the stack, the deployment fails because the ALB fails health checks. The developer needs to resolve the failed health checks.

Which solutions will meet this requirement? (Select TWO.)

Options:

A.  

Confirm that the capacity providers for the container have been provisioned and are properly sized.

B.  

Confirm that the target group port matches the port mappings in the ECS task definition.

C.  

Confirm that a hosted zone associated with the ALB matches a hosted zone that is referenced in the ECS task definition.

D.  

Confirm that the ALB listener on the mapped port has a default action that redirects to the application's health check path endpoint.

E.  

Confirm that the ALB listener on the mapped port has a default action that forwards to the correct target group.

Discussion 0
Questions 131

A developer is incorporating AWS X-Ray into an application that handles personal identifiable information (PII). The application is hosted on Amazon EC2 instances. The application trace messages include encrypted PII and go to Amazon CloudWatch. The developer needs to ensure that no PII goes outside of the EC2 instances.

Which solution will meet these requirements?

Options:

A.  

Manually instrument the X-Ray SDK in the application code.

B.  

Use the X-Ray auto-instrumentation agent.

C.  

Use Amazon Macie to detect and hide PII. Call the X-Ray API from AWS Lambda.

D.  

Use AWS Distro for Open Telemetry.

Discussion 0
Questions 132

A company is planning to use AWS CodeDeploy to deploy an application to Amazon Elastic Container Service (Amazon ECS) During the deployment of a new version of the application, the company initially must expose only 10% of live traffic to the new version of the deployed application. Then, after 15 minutes elapse, the company must route all the remaining live traffic to the new version of the deployed application.

Which CodeDeploy predefined configuration will meet these requirements?

Options:

A.  

CodeDeployDefault ECSCanary10Percent15Minutes

B.  

CodeDeployDefault LambdaCanary10Percent5Minutes

C.  

CodeDeployDefault LambdaCanary10Percent15Minutes

D.  

CodeDeployDefault ECSLinear10PercentEvery1 Minutes

Discussion 0
Questions 133

A developer is configuring an applications deployment environment in AWS CodePipeine. The application code is stored in a GitHub repository. The developer wants to ensure that the repository package's unit tests run in the new deployment environment. The deployment has already set the pipeline's source provider to GitHub and has specified the repository and branch to use in the deployment.

When combination of steps should the developer take next to meet these requirements with the least the LEAST overhead' (Select TWO).

Options:

A.  

Create an AWS CodeCommt project. Add the repository package's build and test commands to the protects buildspec

B.  

Create an AWS CodeBuid project. Add the repository package's build and test commands to the projects buildspec

C.  

Create an AWS CodeDeploy protect. Add the repository package's build and test commands to the project's buildspec

D.  

Add an action to the source stage. Specify the newly created project as the action provider. Specify the build attract as the actions input artifact.

E.  

Add a new stage to the pipeline alter the source stage. Add an action to the new stage. Speedy the newly created protect as the action provider. Specify the source artifact as the action's input artifact.

Discussion 0
Questions 134

A company has many microservices that are comprised of AWS Lambda functions. Multiple teams within the company split ownership of the microservices.

An application reads configuration values from environment variables that are contained in the Lambda functions. During a security audit, the company discovers that some of the environment variables contain sensitive information.

The company's security policy requires each team to have full control over the rotation of AWS KMS keys that the team uses for its respective microservices.

Options:

A.  

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:Decrypt permissions to the Lambda function execution roles.

B.  

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:Decrypt permission to the Lambda function execution roles.

C.  

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

D.  

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

Discussion 0
Questions 135

A developer is creating an AWS Lambda function that consumes messages from an Amazon Simple Queue Service (Amazon SQS) standard queue. The developer notices that the Lambda function processes some messages multiple times.

How should developer resolve this issue MOST cost-effectively?

Options:

A.  

Change the Amazon SQS standard queue to an Amazon SQS FIFO queue by using the Amazon SQS message deduplication ID.

B.  

Set up a dead-letter queue.

C.  

Set the maximum concurrency limit of the AWS Lambda function to 1

D.  

Change the message processing to use Amazon Kinesis Data Streams instead of Amazon SQS.

Discussion 0
Questions 136

A developer is building a highly secure healthcare application using serverless components. This application requires writing temporary data to /Imp storage on an AWS Lambda function.

How should the developer encrypt this data?

Options:

A.  

Enable Amazon EBS volume encryption with an AWS KMS key in the Lambda function configuration so that all storage attached to the Lambda function is encrypted.

B.  

Set up the Lambda function with a role and key policy to access an AWS KMS key. Use the key to generate a data key used to encrypt all data prior to writing to Amp storage.

C.  

Use OpenSSL to generate a symmetric encryption key on Lambda startup. Use this key to encrypt the data prior to writing to /tmp.

D.  

Use an on-premises hardware security module (HSM) to generate keys, where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function.

Discussion 0
Questions 137

An application reads data from an Amazon Aurora global database with clusters in two AWS Regions. Database credentials are stored in AWS Secrets Manager in the primary Region and are rotated regularly.

The application must be able to run in both Regions and remain highly available.

Which combination of actions will meet these requirements? (Select TWO.)

Options:

A.  

Configure the application to retrieve database credentials from the secret in the primary Region.

B.  

Replicate the secret to the secondary Region and configure the application to retrieve credentials from the replica secret.

C.  

Replicate the secret and promote the replica to a standalone secret.

D.  

Store the database endpoint and credentials as a secret and connect to the secret.

E.  

Store credentials in environment variables in the secondary Region.

Discussion 0
Questions 138

A developer is building an application that needs to store an API key. An AWS Lambda function needs to use the API key. The developer's company requires secrets to be encrypted at rest by an AWS KMS key. The company must control key rotation.

Which solutions will meet these requirements? (Select TWO.)

Options:

A.  

Store the API key as an AWS Secrets Manager secret. Encrypt the secret with an AWS managed KMS key.

B.  

Store the API key as an AWS Systems Manager Parameter Store String parameter.

C.  

Store the API key as an AWS Systems Manager Parameter Store SecureString parameter. Encrypt the parameter with a customer managed KMS key.

D.  

Store the API key in a Lambda environment variable. Encrypt the environment variable with an AWS managed KMS key.

E.  

Store the API key in a Lambda environment variable. Encrypt the environment variable with a customer managed KMS key.

Discussion 0
Questions 139

A developer is building an application that gives users the ability to view bank account from multiple sources in a single dashboard. The developer has automated the process to retrieve API credentials for these sources. The process invokes an AWS Lambda function that is associated with an AWS CloudFormation cotton resource.

The developer wants a solution that will store the API credentials with minimal operational overhead.

When solution will meet these requirements?

Options:

A.  

Add an AWS Secrets Manager GenerateSecretString resource to the CloudFormation template. Set the value to reference new credentials to the Cloudformation resource.

B.  

Use the AWS SDK ssm PutParameter operation in the Lambda function from the existing, custom resource to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set ma parameter type to SecureString.

C.  

Add an AWS Systems Manager Parameter Store resource to the CloudFormation template. Set the CloudFormation resource value to reference the new credentials Set the resource NoEcho attribute to true.

D.  

Use the AWS SDK ssm PutParameter operation in the Lambda function from the existing custom resources to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set the parameter NoEcho attribute to true.

Discussion 0
Questions 140

A developer is building a multi-tenant application using AWS Lambda, Amazon S3, and Amazon DynamoDB. Each S3 object prefix represents a tenant name, and DynamoDB uses the tenant name as the partition key.

The developer must prevent cross-tenant data access during processing.

Which combination of actions will meet this requirement? (Select THREE.)

Options:

A.  

Create a data access IAM role that allows the sts:TagSession action.

B.  

Allow the Lambda execution role to assume the data access role.

C.  

Configure IAM policies on the data access role to allow S3 and DynamoDB access only when resource attributes match the tenant session tag.

D.  

Create a resource-based policy on DynamoDB based on principal tags.

E.  

Create a resource control policy (RCP) for the S3 bucket.

F.  

Configure the Lambda function to assume the data access role and pass the tenant name as a session tag.

Discussion 0
Questions 141

A company has an Amazon S3 bucket that contains sensitive data. The data must be encrypted in transit and at rest. The company encrypts the data in the S3 bucket by using an AWS Key Management Service (AWS KMS) key. A developer needs to grant several other AWS accounts the permission to use the S3 GetObject operation to retrieve the data from the S3 bucket.

How can the developer enforce that all requests to retrieve the data provide encryption in transit?

Options:

A.  

Define a resource-based policy on the S3 bucket to deny access when a request meets the condition “aws:SecureTransport”: “false”.

B.  

Define a resource-based policy on the S3 bucket to allow access when a request meets the condition “aws:SecureTransport”: “false”.

C.  

Define a role-based policy on the other accounts' roles to deny access when a request meets the condition of “aws:SecureTransport”: “false”.

D.  

Define a resource-based policy on the KMS key to deny access when a request meets the condition of “aws:SecureTransport”: “false”.

Discussion 0
Questions 142

A developer is storing sensitive data generated by an application in Amazon S3. The developer wants to encrypt the data at rest. A company policy requires an audit trail of when the AWS Key Management Service (AWS KMS) key was used and by whom.

Which encryption option will meet these requirements?

Options:

A.  

Server-side encryption with Amazon S3 managed keys (SSE-S3)

B.  

Server-side encryption with AWS KMS managed keys (SSE-KMS}

C.  

Server-side encryption with customer-provided keys (SSE-C)

D.  

Server-side encryption with self-managed keys

Discussion 0
Questions 143

A company hosts its application in the us-west-1 Region. The company wants to add redundancy in the us-east-1 Region. The application secrets are stored in AWS Secrets Manager in us-west-1. A developer needs to replicate the secrets to us-east-1.

Which solution will meet this requirement?

Options:

A.  

Configure secret replication for each secret. Add us-east-1 as a replication Region. Choose an AWS KMS key in us-east-1 to encrypt the replicated secrets.

B.  

Create a new secret in us-east-1 for each secret. Configure secret replication in us-east-1. Set the source to be the corresponding secret in us-west-1. Choose an AWS KMS key in us-west-1 to encrypt the replicated secrets.

C.  

Create a replication rule for each secret. Set us-east-1 as the destination Region. Configure the rule to run during secret rotation. Choose an AWS KMS key in us-east-1 to encrypt the replicated secrets.

D.  

Create a Secrets Manager lifecycle rule to replicate each secret to a new Amazon S3 bucket in us-west-1. Configure an S3 replication rule to replicate the secrets to us-east-1.

Discussion 0
Questions 144

A developer needs to deploy an application running on AWS Fargate using Amazon ECS The application has environment variables that must be passed to a container for the application to initialize.

How should the environment variables be passed to the container?

Options:

A.  

Define an array that includes the environment variables under the environment parameter within the service definition.

B.  

Define an array that includes the environment variables under the environment parameter within the task definition.

C.  

Define an array that includes the environment variables under the entryPoint parameter within the task definition.

D.  

Define an array that includes the environment variables under the entryPoint parameter within the service definition.

Discussion 0
Questions 145

A developer is working on an app for a company that uses an Amazon DynamoDB table named Orders to store customer orders. The table uses OrderlD as the partition key and there is no sort key. The table contains more than 100,000 records. The developer needs to add a functionality that will retrieve all Orders records that contain an OrderSource attribute with the MobileApp value.

Which solution will improve the user experience in the MOST efficient way?

Options:

A.  

Perform a Scan operation on the Orders table. Provide a QueryFilter condition to filter to only the items where the OrderSource attribute is equal to the MobileApp value.

B.  

Create a local secondary index (LSI) with OrderSource as the partition key. Perform a Query operation by using MobileApp as the key.

C.  

Create a global secondary index (GSI) with OrderSource as the sort key. Perform a Query operation by using MobileApp as the key.

D.  

Create a global secondary index (GSI) with OrderSource as the partition key. Perform a Query operation by using MobileApp as the key.

Discussion 0
Questions 146

A company is using an Amazon API Gateway REST API endpoint as a webhook to publish events from an on-premises source control management (SCM) system to Amazon EventBridge. The company has configured an EventBridge rule to listen for the events and to control application deployment in a central AWS account. The company needs to receive the same events across multiple receiver AWS accounts.

How can a developer meet these requirements without changing the configuration of the SCM system?

Options:

A.  

Deploy the API Gateway REST API to all the required AWS accounts. Use the same custom domain name for all the gateway endpoints so that a single SCM webhook can be used for all events from all accounts.

B.  

Deploy the API Gateway REST API to all the receiver AWS accounts. Create as many SCM webhooks as the number of AWS accounts.

C.  

Grant permission to the central AWS account for EventBridge to access the receiver AWS accounts. Add an EventBridge event bus on the receiver AWS accounts as the targets to the existing EventBridge rule.

D.  

Convert the API Gateway type from REST API to HTTP API.

Discussion 0
Questions 147

A company is using Amazon RDS as the Backend database for its application. After a recent marketing campaign, a surge of read requests to the database increased the latency of data retrieval from the database.

The company has decided to implement a caching layer in front of the database. The cached content must be encrypted and must be highly available.

Which solution will meet these requirements?

Options:

A.  

Amazon Cloudfront

B.  

Amazon ElastiCache to Memcached

C.  

Amazon ElastiCache for Redis in cluster mode

D.  

Amazon DynamoDB Accelerate (DAX)

Discussion 0
Questions 148

A company has an ecommerce application. To track product reviews, the company's development team uses an Amazon DynamoDB table.

Every record includes the following

• A Review ID a 16-digrt universally unique identifier (UUID)

• A Product ID and User ID 16 digit UUlDs that reference other tables

• A Product Rating on a scale of 1-5

• An optional comment from the user

The table partition key is the Review ID. The most performed query against the table is to find the 10 reviews with the highest rating for a given product.

Which index will provide the FASTEST response for this query"?

Options:

A.  

A global secondary index (GSl) with Product ID as the partition key and Product Rating as the sort key

B.  

A global secondary index (GSl) with Product ID as the partition key and Review ID as the sort key

C.  

A local secondary index (LSI) with Product ID as the partition key and Product Rating as the sort key

D.  

A local secondary index (LSI) with Review ID as the partition key and Product ID as the sort key

Discussion 0
Questions 149

A developer is building a web application that uses Amazon API Gateway to expose an AWS Lambda function to process requests from clients. During testing, the developer notices that the API Gateway times out even though the Lambda function finishes under the set time limit.

Which of the following API Gateway metrics in Amazon CloudWatch can help the developer troubleshoot the issue? (Choose two.)

Options:

A.  

CacheHitCount

B.  

IntegrationLatency

C.  

CacheMissCount

D.  

Latency

E.  

Count

Discussion 0
Questions 150

A developer is creating an application that uses an AWS Lambda function to transform and load data from an Amazon S3 bucket. When the developer tests the application, the developer finds that some invocations of the Lambda function are slower than others.

The developer needs to update the Lambda function to have predictable invocation durations that run with low latency. Any initialization activities, such as loading libraries and instantiating clients, must run during allocation time rather than during actual function invocations.

Which combination of steps will meet these requirements? (Select TWO.)

Options:

A.  

Create a schedule group in Amazon EventBridge Scheduler to invoke the Lambda function.

B.  

Configure provisioned concurrency for the Lambda function to have the necessary number of execution environments.

C.  

Use the $LATEST version of the Lambda function.

D.  

Configure reserved concurrency for the Lambda function to have the necessary number of execution environments.

E.  

Deploy changes, and publish a new version of the Lambda function.

Discussion 0
Questions 151

A company has many microservices that are comprised of AWS Lambda functions. Multiple teams within the company split ownership of the microservices.

An application reads configuration values from environment variables that are contained in the Lambda functions. During a security audit, the company discovers that some of the environment variables contain sensitive information.

The company's security policy requires each team to have full control over the rotation of AWS KMS keys that the team uses for its respective microservices.

Which solution will meet these requirements?

Options:

A.  

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:Decrypt permissions to the Lambda function execution roles.

B.  

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:Decrypt permission to the Lambda function execution roles.

C.  

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

D.  

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

Discussion 0
Questions 152

For a deployment using AWS Code Deploy, what is the run order of the hooks for in-place deployments?

Options:

A.  

BeforeInstall -> ApplicationStop -> ApplicationStart -> AfterInstall

B.  

ApplicationStop -> BeforeInstall -> AfterInstall -> ApplicationStart

C.  

BeforeInstall -> ApplicationStop -> ValidateService -> ApplicationStart

D.  

ApplicationStop -> BeforeInstall -> ValidateService -> ApplicationStart

Discussion 0
Questions 153

A developer is working on an ecommerce website The developer wants to review server logs without logging in to each of the application servers individually. The website runs on multiple Amazon EC2 instances, is written in Python, and needs to be highly available

How can the developer update the application to meet these requirements with MINIMUM changes?

Options:

A.  

Rewrite the application to be cloud native and to run on AWS Lambda, where the logs can be reviewed in Amazon CloudWatch

B.  

Set up centralized logging by using Amazon OpenSearch Service, Logstash, and OpenSearch Dashboards

C.  

Scale down the application to one larger EC2 instance where only one instance is recording logs

D.  

Install the unified Amazon CloudWatch agent on the EC2 instances Configure the agent to push the application logs to CloudWatch

Discussion 0
Questions 154

A company is migrating legacy internal applications to AWS. Leadership wants to rewrite the internal employee directory to use native AWS services. A developer needs to create a solution for storing employee contact details and high-resolution photos for use with the new application.

Which solution will enable the search and retrieval of each employee's individual details and high-resolution photos using AWS APIs?

Options:

A.  

Encode each employee's contact information and photos using Base64. Store the information in an Amazon DynamoDB table using a sort key.

B.  

Store each employee's contact information in an Amazon DynamoDB table along with the object keys for the photos stored in Amazon S3.

C.  

Use Amazon Cognito user pools to implement the employee directory in a fully managed software-as-a-service (SaaS) method.

D.  

Store employee contact information in an Amazon RDS DB instance with the photos stored in Amazon Elastic File System (Amazon EFS).

Discussion 0
Questions 155

A company is building an application for stock trading. The application needs sub-millisecond latency for processing trade requests. The company uses Amazon DynamoDB to store all the trading data that is used to process each trading request A development team performs load testing on the application and finds that the data retrieval time is higher than expected. The development team needs a solution that reduces the data retrieval time with the least possible effort.

Which solution meets these requirements'?

Options:

A.  

Add local secondary indexes (LSis) for the trading data.

B.  

Store the trading data m Amazon S3 and use S3 Transfer Acceleration.

C.  

Add retries with exponential back off for DynamoDB queries.

D.  

Use DynamoDB Accelerator (DAX) to cache the trading data.

Discussion 0