Pre-Summer Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

AWS Certified Developer - Associate Question and Answers

AWS Certified Developer - Associate

Last Update Apr 15, 2026
Total Questions : 565

We are offering FREE DVA-C02 Amazon Web Services exam questions. All you do is to just go and sign up. Give your details, prepare DVA-C02 free exam questions and then go for complete pool of AWS Certified Developer - Associate test questions that will help you more.

DVA-C02 pdf

DVA-C02 PDF

$36.75  $104.99
DVA-C02 Engine

DVA-C02 Testing Engine

$43.75  $124.99
DVA-C02 PDF + Engine

DVA-C02 PDF + Testing Engine

$57.75  $164.99
Questions 1

A developer is using AWS Amplify Hosting to build and deploy an application. The developer is receiving an increased number of bug reports from users. The developer wants to add end-to-end testing to the application to eliminate as many bugs as possible before the bugs reach production.

Which solution should the developer implement to meet these requirements?

Options:

A.  

Run the amplify add test command in the Amplify CLI.

B.  

Create unit tests in the application. Deploy the unit tests by using the amplify push command in the Amplify CLI.

C.  

Add a test phase to the amplify.yml build settings for the application.

D.  

Add a test phase to the aws-exports.js file for the application.

Discussion 0
Questions 2

A developer is building an application that processes a stream of user-supplied data. The data stream must be consumed by multiple Amazon EC2 based processing applications in parallel and in real time. Each processor must be able to resume without losing data if there is a service interruption. The application architect plans to add other processors in the near future, and wants to minimize the amount of data duplication involved.

Which solution will satisfy these requirements?

Options:

A.  

Publish the data to Amazon Simple Queue Service (Amazon SQS).

B.  

Publish the data to Amazon Data Firehose.

C.  

Publish the data to Amazon EventBridge.

D.  

Publish the data to Amazon Kinesis Data Streams.

Discussion 0
Questions 3

A company is offering APIs as a service over the internet to provide unauthenticated read access to statistical information that is updated daily. The company uses Amazon API Gateway and AWS Lambda to develop the APIs. The service has become popular, and the company wants to enhance the responsiveness of the APIs.

Which action can help the company achieve this goal?

Options:

A.  

Enable API caching in API Gateway.

B.  

Configure API Gateway to use an interface VPC endpoint.

C.  

Enable cross-origin resource sharing (CORS) for the APIs.

D.  

Configure usage plans and API keys in API Gateway.

Discussion 0
Questions 4

A developer is writing unit tests tor a new application that will be deployed on AWS. The developer wants to validate all pull requests with unit tests and merge the code with the main branch only when all tests pass

The developer stores the code in AWS CodeCommit and sets up AWS CodeBuild to run the unit tests. The developer creates an AWS Lambda function to start the CodeBuild task. The developer needs to identify the CodeCommit events in an Amazon EventBridge event that can invoke the Lambda function when a pull request is created or updated.

Which CodeCommit event will meet these requirements?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 5

A developer for a company uses an Amazon S3 bucket to store log files. A bucket policy on the S3 bucket denies all write and delete operations for all principals.

The developer observes that files have been deleted from the S3 bucket despite the bucket policy. The developer must prevent additional deletions from the S3 bucket.

Which solution will meet this requirement?

Options:

A.  

Remove any existing statements in the S3 bucket policy that allow delete operations.

B.  

Remove any S3 Lifecycle configuration rules on the bucket that are expiring objects.

C.  

Remove any S3 access points on the S3 bucket other company employees use.

D.  

Remove any Amazon EventBridge event bus rules that delete S3 objects from the S3 bucket.

Discussion 0
Questions 6

An AWS Lambda function requires read access to an Amazon S3 bucket and requires read/write access to an Amazon DynamoDB table The correct 1AM policy already exists

What is the MOST secure way to grant the Lambda function access to the S3 bucket and the DynamoDB table?

Options:

A.  

Attach the existing 1AM policy to the Lambda function.

B.  

Create an 1AM role for the Lambda function Attach the existing 1AM policy to the role Attach the role to the Lambda function

C.  

Create an 1AM user with programmatic access Attach the existing 1AM policy to the user. Add the user access key ID and secret access key as environment variables in the Lambda function.

D.  

Add the AWS account root user access key ID and secret access key as encrypted environment variables in the Lambda function

Discussion 0
Questions 7

A company is building a new application that runs on AWS and uses Amazon API Gateway to expose APIs Teams of developers are working on separate components of the application in parallel The company wants to publish an API without an integrated backend so that teams that depend on the application backend can continue the development work before the API backend development is complete.

Which solution will meet these requirements?

Options:

A.  

Create API Gateway resources and set the integration type value to MOCK Configure the method integration request and integration response to associate a response with an HTTP status code Create an API Gateway stage and deploy the API.

B.  

Create an AWS Lambda function that returns mocked responses and various HTTP status codes. Create API Gateway resources and set the integration type value to AWS_PROXY Deploy the API.

C.  

Create an EC2 application that returns mocked HTTP responses Create API Gateway resources and set the integration type value to AWS Create an API Gateway stage and deploy the API.

D.  

Create API Gateway resources and set the integration type value set to HTTP_PROXY. Add mapping templates and deploy the API. Create an AWS Lambda layer that returns various HTTP status codes Associate the Lambda layer with the API deployment

Discussion 0
Questions 8

A company uses more than 100 AWS Lambda functions to handle application services. One Lambda function is critical and must always run successfully. The company notices that occasionally, the critical Lambda function does not initiate. The company investigates the issue and discovers instances of the Lambda TooManyRequestsException: Rate Exceeded error in Amazon CloudWatch logs. Upon further review of the logs, the company notices that some of the non-critical functions run properly while the critical function fails. A developer must resolve the errors and ensure that the critical Lambda function runs successfully. Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Configure reserved concurrency for the critical Lambda function. Set reserved concurrent executions to the appropriate level.

B.  

Configure provisioned concurrency for the critical Lambda function. Set provisioned concurrent executions to the appropriate level.

C.  

Configure CloudWatch alarms for TooManyRequestsException errors. Add the critical Lambda function as an alarm state change action to invoke the critical function again after a failure.

D.  

Configure CloudWatch alarms for TooManyRequestsException errors. Add Amazon EventBridge as an action for the alarm state change. Use EventBridge to invoke the critical function again after a failure.

Discussion 0
Questions 9

A developer is building an image-processing application that includes an AWS Lambda function. The Lambda function moves images from one AWS service to another AWS service for image processing. For images that are larger than 2 MB, the Lambda function returns the following error: " Task timed out after 3.01 seconds. "

The developer needs to resolve the error without modifying the Lambda function code.

Which solution will meet these requirements?

Options:

A.  

Increase the Lambda function’s timeout value.

B.  

Configure the Lambda function to not move images that are larger than 2 M

B.  

C.  

Request a concurrency quota increase for the Lambda function.

D.  

Configure provisioned concurrency for the Lambda function.

Discussion 0
Questions 10

A company developed an API application on AWS by using Amazon CloudFront. Amazon API Gateway, and AWS Lambda. The API has a minimum of four requests every second A developer notices that many API users run the same query by using the POST method. The developer wants to cache the POST request to optimize the API resources.

Which solution will meet these requirements ' ?

Options:

A.  

Configure the CloudFront cache Update the application to return cached content based upon the default request headers.

B.  

Override the cache method in me selected stage of API Gateway Select the POST method.

C.  

Save the latest request response in Lambda /tmp directory Update the Lambda function to check the /tmp directory

D.  

Save the latest request m AWS Systems Manager Parameter Store Modify the Lambda function to take the latest request response from Parameter Store

Discussion 0
Questions 11

A company has an analytics application that uses an AWS Lambda function to process transaction data asynchronously A developer notices that asynchronous invocations of the Lambda function sometimes fail When failed Lambda function invocations occur, the developer wants to invoke a second Lambda function to handle errors and log details.

Which solution will meet these requirements?

Options:

A.  

Configure a Lambda function destination with a failure condition Specify Lambda function as the destination type Specify the error-handling Lambda function ' s Amazon Resource Name (ARN) as the resource

B.  

Enable AWS X-Ray active tracing on the initial Lambda function. Configure X-Ray to capture stack traces of the failed invocations. Invoke the error-handling Lambda function by including the stack traces in the event object.

C.  

Configure a Lambda function trigger with a failure condition Specify Lambda function as the destination type Specify the error-handling Lambda function ' s Amazon Resource Name (ARN) as the resource

D.  

Create a status check alarm on the initial Lambda function. Configure the alarm to invoke the error-handling Lambda function when the alarm is initiated. Ensure that the alarm passes the stack trace in the event object.

Discussion 0
Questions 12

A developer created an AWS Lambda function that performs a series of operations that involve multiple AWS services. The function ' s duration time is higher than normal. To determine the cause of the issue, the developer must investigate traffic between the services without changing the function code

Which solution will meet these requirements?

Options:

A.  

Enable AWS X-Ray active tracing in the Lambda function Review the logs in X-Ray

B.  

Configure AWS CloudTrail View the trail logs that are associated with the Lambda function.

C.  

Review the AWS Config logs in Amazon Cloud Watch.

D.  

Review the Amazon CloudWatch logs that are associated with the Lambda function.

Discussion 0
Questions 13

A developer is creating a new REST API by using Amazon API Gateway and AWS Lambda. The development team tests the API and validates responses for the known use cases before deploying the API to the production environment.

The developer wants to make the REST API available for testing by using API Gateway locally.

Which AWS Serverless Application Model Command Line Interface (AWS SAM CLI) subcommand will meet these requirements?

Options:

A.  

Sam local invoke

B.  

Sam local generate-event

C.  

Sam local start-lambda

D.  

Sam local start-api

Discussion 0
Questions 14

A company is using AWS CloudFormation to deploy a two-tier application. The application will use Amazon RDS as its backend database. The company wants a solution that will randomly generate the database password during deployment. The solution also must automatically rotate the database password without requiring changes to the application.

What is the MOST operationally efficient solution that meets these requirements ' ?

Options:

A.  

Use an AWS Lambda function as a CloudFormation custom resource to generate and rotate the password.

B.  

Use an AWS Systems Manager Parameter Store resource with the SecureString data type to generate and rotate the password.

C.  

Use a cron daemon on the application s host to generate and rotate the password.

D.  

Use an AWS Secrets Manager resource to generate and rotate the password.

Discussion 0
Questions 15

An application that is deployed to Amazon EC2 is using Amazon DynamoDB. The app cation calls the DynamoDB REST API Periodically the application receives a ProvisionedThroughputExceededException error when the application writes to a DynamoDB table.

Which solutions will mitigate this error MOST cost-effectively^ (Select TWO)

Options:

A.  

Modify the application code to perform exponential back off when the error is received.

B.  

Modify the application to use the AWS SDKs for DynamoD

B.  

C.  

Increase the read and write throughput of the DynamoDB table.

D.  

Create a DynamoDB Accelerator (DAX) cluster for the DynamoDB table.

E.  

Create a second DynamoDB table Distribute the reads and writes between the two tables.

Discussion 0
Questions 16

A developer is building an application that will use an Amazon API Gateway API with an AWS Lambda backend. The team that will develop the frontend requires immediate access to the API endpoints to build the UI. To prepare the backend application for integration, the developer needs to set up endpoints. The endpoints need to return predefined HTTP status codes and JSON responses for the frontend team. The developer creates a method for an API resource.

Which solution will meet these requirements?

Options:

A.  

Set the integration type to AWS_PROXY. Provision Lambda functions to return hardcoded JSON data.

B.  

Set the integration type to MOCK. Configure the method ' s integration request and integration response to associate JSON responses with specific HTTP status codes.

C.  

Set the integration type to HTTP PROXY. Configure API Gateway to pass all requests to an external placeholder API, which the team will build.

D.  

Set the integration type to MOCK. Use a method request to define HTTP status codes. Use an integration request to define JSON responses.

Discussion 0
Questions 17

A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances. The application uses attached Amazon

Elastic Block Store (Amazon EBS) volumes for storing data. The Amazon EBS volumes will be created at time of initial deployment. The

application will process sensitive information. All of the data must be encrypted. The solution should not impact the application ' s performance.

Which solution will meet these requirements?

Options:

A.  

Configure the fleet of EC2 instances to use encrypted EBS volumes to store data.

B.  

Configure the application to write all data to an encrypted Amazon S3 bucket.

C.  

Configure a custom encryption algorithm for the application that will encrypt and decrypt all data.

D.  

Configure an Amazon Machine Image (AMI) that has an encrypted root volume and store the data to ephemeral disks.

Discussion 0
Questions 18

A company is developing an application that will be accessed through the Amazon API Gateway REST API. Registered users should be the only ones who can access certain resources of this API. The token being used should expire automatically and needs to be refreshed periodically.

How can a developer meet these requirements?

Options:

A.  

Create an Amazon Cognito identity pool, configure the Amazon Cognito Authorizer in API Gateway, and use the temporary credentials generated by the identity pool.

B.  

Create and maintain a database record for each user with a corresponding token and use an AWS Lambda authorizer in API Gateway.

C.  

Create an Amazon Cognito user pool, configure the Cognito Authorizer in API Gateway, and use the identity or access token.

D.  

Create an 1AM user for each API user, attach an invoke permissions policy to the API. and use an I AM authorizer in API Gateway.

Discussion 0
Questions 19

A developer deployed an application to an Amazon EC2 instance The application needs to know the public IPv4 address of the instance

How can the application find this information?

Options:

A.  

Query the instance metadata from http./M69.254.169.254. latestmeta-data/.

B.  

Query the instance user data from http ' 169 254.169 254. latest/user-data/

C.  

Query the Amazon Machine Image (AMI) information from http://169.254.169.254/latest/meta-data/ami/.

D.  

Check the hosts file of the operating system

Discussion 0
Questions 20

A company has a multi-node Windows legacy application that runs on premises. The application uses a network shared folder as a centralized configuration repository to store configuration files in .xml format. The company is migrating the application to Amazon EC2 instances. As part of the migration to AWS, a developer must identify a solution that provides high availability for the repository.

Which solution will meet this requirement MOST cost-effectively?

Options:

A.  

Mount an Amazon Elastic Block Store (Amazon EBS) volume onto one of the EC2 instances. Deploy a file system on the EBS volume. Use the host operating system to share a folder. Update the application code to read and write configuration files from the shared folder.

B.  

Deploy a micro EC2 instance with an instance store volume. Use the host operating system to share a folder. Update the application code to read and write configuration files from the shared folder.

C.  

Create an Amazon S3 bucket to host the repository. Migrate the existing .xml files to the S3 bucket. Update the application code to use the AWS SDK to read and write configuration files from Amazon S3.

D.  

Create an Amazon S3 bucket to host the repository. Migrate the existing .xml files to the S3 bucket. Mount the S3 bucket to the EC2 instances as a local volume. Update the application code to read and write configuration files from the disk.

Discussion 0
Questions 21

A developer is testing an AWS Lambda function that has an event source of an Amazon SQS queue. The developer notices that some of the messages the Lambda function processes reappear in the queue while the messages are being processed. The developer must correct this behavior. Which solution will meet this requirement?

Options:

A.  

Increase the timeout of the Lambda function.

B.  

Increase the visibility timeout of the SQS queue.

C.  

Increase the memory allocation of the Lambda function.

D.  

Increase the batch size in the event source mapping.

Discussion 0
Questions 22

A developer warns to add request validation to a production environment Amazon API Gateway API. The developer needs to test the changes before the API is deployed to the production environment. For the lest the developer will send test requests to the API through a testing tool.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Export the existing API to an OpenAPI file. Create a new API Import the OpenAPI file Modify the new API to add request validation. Perform the tests Modify the existing API to add request validation. Deploy the existing API to production.

B.  

Modify the existing API to add request validation. Deploy the updated API to a new API Gateway stage Perform the tests Deploy the updated API to the API Gateway production stage.

C.  

Create a new API Add the necessary resources and methods including new request validation. Perform the tests Modify the existing API to add request validation. Deploy the existing API to production.

D.  

Clone the exiting API Modify the new API lo add request validation. Perform the tests Modify the existing API to add request validation Deploy the existing API to production.

Discussion 0
Questions 23

A developer needs to use Amazon DynamoDB to store customer orders. The developer ' s company requires all customer data to be encrypted at rest with a key that the company generates.

What should the developer do to meet these requirements?

Options:

A.  

Create the DynamoDB table with encryption set to None. Code the application to use the key to decrypt the data when the application reads from the table. Code the application to use the key to encrypt the data when the application writes to the table.

B.  

Store the key by using AW5 KMS. Choose an AVVS KMS customer managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.

C.  

Store the key by using AWS KMS. Create the DynamoDB table with default encryption. Include the kms:Encrypt parameter with the Amazon Resource Name (ARN) of the AWS KMS key when using the DynamoDB SDK.

D.  

Store the key by using AWS KMS. Choose an AWS KMS AWS managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.

Discussion 0
Questions 24

A developer is storing JSON files in an Amazon S3 bucket. The developer wants to securely share an object with a specific group of people.

How can the developer securely provide temporary access to the objects that are stored in the S3 bucket?

Options:

A.  

Set object retention on the files. Use the AWS SDK to restore the object before subsequent requests. Provide the bucket’s S3 URL.

B.  

Use the AWS SDK to generate a presigned URL. Provide the presigned URL.

C.  

Set a bucket policy that restricts access after a period of time. Provide the bucket ' s S3 URL.

D.  

Configure static web hosting on the S3 bucket. Provide the bucket ' s web URL.

Discussion 0
Questions 25

A cloud-based video surveillance company is developing an application that analyzes video files. After the application analyzes the files, the company can discard the files.

The company stores the files in an Amazon S3 bucket. The files are 1 GB in size on average. No file is larger than 2 GB. An AWS Lambda function will run one time for each video file that is processed. The processing is very I/O intensive, and the application must read each file multiple times.

Which solution will meet these requirements in the MOST performance-optimized way?

Options:

A.  

Attach an Amazon EBS volume that is larger than 1 GB to the Lambda function. Copy the files from the S3 bucket to the EBS volume.

B.  

Attach an Elastic Network Adapter (ENA) to the Lambda function. Use the ENA to read the video files from the S3 bucket.

C.  

Increase the ephemeral storage size to 2 GB. Copy the files from the S3 bucket to the /tmp directory of the Lambda function.

D.  

Configure the Lambda function code to read the video files directly from the S3 bucket.

Discussion 0
Questions 26

An application that is hosted on an Amazon EC2 instance needs access to files that are stored in an Amazon S3 bucket. The application lists the objects that are stored in the S3 bucket and displays a table to the user. During testing, a developer discovers that the application does not show any objects in the list.

What is the MOST secure way to resolve this issue?

Options:

A.  

Update the IAM instance profile that is attached to the EC2 instance to include the S3:* permission for the S3 bucket.

B.  

Update the IAM instance profile that is attached to the EC2 instance to include the S3:ListBucket permission for the S3 bucket.

C.  

Update the developer ' s user permissions to include the S3:ListBucket permission for the S3 bucket.

D.  

Update the S3 bucket policy by including the S3:ListBucket permission and by setting the Principal element to specify the account number of the EC2 instance.

Discussion 0
Questions 27

A company runs a highly available application in multiple AWS Regions. The application requires access to a secret value that is stored in AWS Secrets Manager. The secret value must be available in all Regions where the application operates. The secret value must remain consistent across the Regions.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Configure an AWS Lambda function to copy the secret to each Region. Configure Amazon EventBridge to trigger the Lambda function to update the copies of the secret when the primary secret is updated.

B.  

Configure the application in all Regions to retrieve the secret value directly from the primary Region by using the secret ' s ARN. Configure the application to cache the secret value locally.

C.  

Enable replication for the secret in the primary Region. Ensure that the application can access the appropriate secret ARN in each Region where the secret is replicated.

D.  

Create a new secret in each Region. Ensure that the application can access the appropriate secret ARN in each Region where the secret is replicated.

Discussion 0
Questions 28

A developer has created a large AWS Lambda function. Deployment of the function Is failing because of an InvalidParameterValueException error. The error message indicates that the unzipped size of the function exceeds the maximum supported value.

Which actions can the developer take to resolve this error? (Select TWO.)

Options:

A.  

Submit a quota increase request to AWS Support to increase the function to the required size.

B.  

Use a compression algorithm that is more efficient than ZIP.

C.  

Break up the function into multiple smaller functions.

D.  

Zip the .zip file twice to compress the file more.

E.  

Move common libraries, function dependencies, and custom runtimes into Lambda layers.

Discussion 0
Questions 29

A developer is using an AWS account to build an application that stores files in an Amazon S3 bucket. Files must be encrypted at rest by AWS KMS keys. A second AWS account must have access to read files from the bucket.

The developer wants to minimize operational overhead for the application.

Which combination of solutions will meet these requirements? (Select TWO.)

Options:

A.  

Use a customer managed key to encrypt the files. Create a key policy that grants kms: Decrypt permissions to the second AWS account.

B.  

Use an AWS managed key to encrypt the files. Create a key policy that grants kms:Decrypt permissions to the second AWS account.

C.  

Create a service control policy (SCP) that grants s3:GetObject permissions to the second AWS account.

D.  

Create a bucket policy for the S3 bucket that grants s3:GetObject permissions to the second AWS account.

E.  

Create a gateway endpoint for the S3 bucket. Modify the endpoint policy to grant s3:GetObject permissions to the second AWS account.

Discussion 0
Questions 30

A company operates a web-based loan processing application. The application ' s UI is implemented in JavaScript. The frontend transmits application data securely by using HTTPS to Amazon API Gateway, which invokes an AWS Lambda function in private subnets. The Lambda function interacts with third-party credit check APIs that require persistent API keys. The company enforces strict policies to ensure that personally identifiable information (PII) and sensitive credentials are never exposed in client code, request paths, headers, or logs. The company needs a solution to manage the API keys that the Lambda function must use. Which solution will meet this requirement in the MOST secure way?

Options:

A.  

Store the API keys as encrypted environment variables by using an AWS KMS key. Configure the execution role of the Lambda function to have permissions to securely decrypt the environment variables at runtime.

B.  

Pass the API keys to the Lambda function by including the keys as URL query parameters in each HTTPS request. Rely on TLS for encryption of the payload and response. Use API Gateway logging controls to manage what query parameters are logged.

C.  

Bundle the API keys inside the minified client-side JavaScript. Configure the web application to call the Lambda function by using an API Gateway HTTP API, cross-origin resource sharing (CORS) restrictions, domain allowlists, and frequent rotation.

D.  

Store the API keys as resource metadata tags on the Lambda function. Configure the Lambda function to read its own tags at startup by using the AWS SDK. Use IAM conditions to control access to the keys when the function retrieves the tags.

Discussion 0
Questions 31

A company wants to migrate applications from its on-premises servers to AWS. As a first step, the company is modifying and migrating a non-critical application to a single Amazon EC2 instance. The application will store information in an Amazon S3 bucket. The company needs to follow security best practices when deploying the application on AWS.

Which approach should the company take to allow the application to interact with Amazon S3?

Options:

A.  

Create an 1AM role that has administrative access to AWS. Attach the role to the EC2 instance.

B.  

Create an 1AM user. Attach the AdministratorAccess policy. Copy the generated access key and secret key. Within the application code, use the access key and secret key along with the AWS SDK to communicate with Amazon S3.

C.  

Create an 1AM role that has the necessary access to Amazon S3. Attach the role to the EC2 instance.

D.  

Create an 1AM user. Attach a policy that provides the necessary access to Amazon S3. Copy the generated access key and secret key. Within the application code, use the access key and secret key along with the AWS SDK to communicate with Amazon S3.

Discussion 0
Questions 32

A company has developed an application that uses AWS Lambda functions to process messages from an Amazon SQS queue. One of the Lambda functions makes a call to an external API that is expected to encounter temporary service unavailability.

A developer needs to configure the function to retry failed messages from an Amazon SQS dead-letter queue. The developer notices that the Lambda function is re-processing some messages in the queue more than once.

Which solution will resolve this issue?

Options:

A.  

Set a message retention period for each message. Configure the Lambda function to add a MessageId to each message.

B.  

Set the visibility timeout parameter at the queue level. Configure the Lambda function to delete processed messages from the queue.

C.  

Set a receive message wait time for each message. Configure the Lambda function to add a MessageId to each message.

D.  

Set the delivery delay parameter at the queue level. Configure the Lambda function to delete processed messages from the queue.

Discussion 0
Questions 33

A company has an application that uses Amazon Cognito user pools as an identity provider. The company must secure access to user records. The company has set up multi-factor authentication (MFA). The company also wants to send a login activity notification by email every time a user logs in.

What is the MOST operationally efficient solution that meets this requirement?

Options:

A.  

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon API Gateway API to invoke the function. Call the API from the client side when login confirmation is received.

B.  

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon Cognito post authentication Lambda trigger for the function.

C.  

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Create an Amazon CloudWatch Logs log subscription filter to invoke the function based on the login status.

D.  

Configure Amazon Cognito to stream all logs to Amazon Kinesis Data Firehose. Create an AWS Lambda function to process the streamed logs and to send the email notification based on the login status of each user.

Discussion 0
Questions 34

A developer is deploying an AWS Lambda function that writes to Amazon DynamoDB. Amazon CloudWatch metrics for the Lambda function show that errors have occurred during some invocations of the function. However, there are no entries available in the CloudWatch Logs for the function. The source code for the function shows that the function writes log data before saving data. What should the developer do to address the missing CloudWatch log entries for the Lambda function?

Options:

A.  

Assign permissions to the Lambda function ' s execution role to send logs to CloudWatch.

B.  

Turn on CloudWatch Lambda Insights. Redeploy the Lambda function.

C.  

Use AWS X-Ray. Turn on active tracing.

D.  

Add CloudWatch as the trusted identity to the Lambda function ' s execution role.

Discussion 0
Questions 35

An application ingests data from an Amazon Kinesis data stream. The shards in the data stream are set for normal traffic.

During tests for peak traffic, the application ingests data slowly. A developer needs to adjust the data stream to handle the peak traffic.

What should the developer do to meet this requirement MOST cost-effectively?

Options:

A.  

Install the Kinesis Producer Library {KPL) to ingest data into the data stream.

B.  

Switch to on-demand capacity mode for the data stream. Specify a partition key when writing data to the data stream.

C.  

Decrease the amount of time that data is kept in the data stream by using the DecreaseStreamRetention Period API operation.

D.  

Increase the shard count in the data stream by using the UpdateShardCount API operation.

Discussion 0
Questions 36

A developer is working on an application that handles 10 MB documents that contain highly sensitive data. The application will use AWS KMS to perform client-side encryption.

What steps must be followed?

Options:

A.  

Invoke the Encrypt API, passing the plaintext data that must be encrypted, then reference the customer managed key ARN in the KeyId parameter.

B.  

Invoke the GenerateRandom API to get a data encryption key, then use the data encryption key to encrypt the data.

C.  

Invoke the GenerateDataKey API to retrieve the encrypted version of the data encryption key to encrypt the data.

D.  

Invoke the GenerateDataKey API to retrieve the plaintext version of the data encryption key to encrypt the data.

Discussion 0
Questions 37

A company uses AWS X-Ray to monitor a serverless application. The components of the application have different request rates. The user interactions and transactions are important to trace, but they are low in volume. The background processes such as application health checks, polling, and connection maintenance generate high volumes of read-only requests.

Currently, the default X-Ray sampling rules are universal for all requests. Only the first request per second and some additional requests are recorded. This setup is not helping the company review the requests based on service or request type.

A developer must configure rules to trace requests based on service or request properties. The developer must trace the user interactions and transactions without wasting effort recording minor background tasks.

Which solution will meet these requirements?

Options:

A.  

Disable sampling for high-volume read-only requests. Sample at a lower rate for all requests that handle user interactions or transactions.

B.  

Disable sampling and trace all requests for requests that handle user interactions or transactions. Sample high-volume read-only requests at a higher rate.

C.  

Disable sampling and trace all requests for requests that handle user interactions or transactions. Sample high-volume read-only requests at a lower rate.

D.  

Disable sampling for high-volume read-only requests. Sample at a higher rate for all requests that handle user interactions or transactions.

Discussion 0
Questions 38

A company runs continuous integration/continuous delivery (CI/CD) pipelines for its application on AWS CodePipeline. A developer must write unit tests and run them as part of the pipelines before staging the artifacts for testing.

How should the developer incorporate unit tests as part of CI/CD pipelines?

Options:

A.  

Create a separate CodePipeline pipeline to run unit tests.

B.  

Update the AWS CodeBuild build specification to include a phase for running unit tests.

C.  

Install the AWS CodeDeploy agent on an Amazon EC2 instance to run unit tests.

D.  

Create a testing branch in a git repository for the pipelines to run unit tests.

Discussion 0
Questions 39

A company is using Amazon OpenSearch Service to implement an audit monitoring system. A developer needs to create an AWS Cloudformation custom resource that is associated with an AWS Lambda function to configure the OpenSearch Service domain. The Lambda function must access the OpenSearch Service domain by using Open Search Service internal master user credentials.

What is the MOST secure way to pass these credentials to the Lambdas function?

Options:

A.  

Use a CloudFormation parameter to pass the master user credentials at deployment to the OpenSearch Service domain ' s MasterUserOptions and the Lambda function ' s environment variable. Set the No Echo attenuate to true.

B.  

Use a CloudFormation parameter to pass the master user credentials at deployment to the OpenSearch Service domain ' s MasterUserOptions and to create a parameter. In AWS Systems Manager Parameter Store. Set the No Echo attribute to true. Create an 1AM role that has the ssm GetParameter permission. Assign me role to the Lambda function. Store me parameter name as the Lambda function ' s environment variable. Resolve the parameter ' s value a

C.  

Use a CloudFormation parameter to pass the master uses credentials at deployment to the OpenSearch Service domain ' s MasterUserOptions and the Lambda function ' s environment varleWe Encrypt the parameters value by using the AWS Key Management Service (AWS KMS) encrypt command.

D.  

Use CloudFoimalion to create an AWS Secrets Manager Secret. Use a CloudFormation dynamic reference to retrieve the secret ' s value for the OpenSearch Service domain ' s MasterUserOptions. Create an 1AM role that has the secrets manager. GetSecretvalue permission. Assign the role to the Lambda Function Store the secrets name as the Lambda function ' s environment variable. Resole the secret ' s value at runtime.

Discussion 0
Questions 40

An ecommerce company integrates with a payment processing service that publishes payment activity messages to an Amazon SNS topic. A developer is building an AWS Lambda function to process refund events. The Lambda function must process only refund-related messages .

Which solution will meet this requirement in the MOST operationally efficient way?

Options:

A.  

Configure a Lambda event filter to allow only refund messages to invoke the function.

B.  

Add logic in the Lambda function to ignore non-refund messages.

C.  

Use Amazon SNS subscription filter policies to deliver only refund messages to the Lambda function.

D.  

Increase batch size and batching window parameters for the Lambda function.

Discussion 0
Questions 41

A developer is updating an Amazon API Gateway REST API to have a mock endpoint. The developer wants to update the integration request mapping template so the endpoint will respond to mock integration requests with specific HTTP status codes based on various conditions.

Options:

A.  

{ if( $input.params(‘integration’) == " mock " ) " statusCode " : 404 else " statusCode " : 500 end }

B.  

{ if( $input.params( ' scope ' ) == " internal " ) " statusCode " : 200 else " statusCode " : 500 end }

C.  

{ if( $input.path( " integration " ) ) " statusCode " : 200 else " statusCode " :404 end }

D.  

{ if( $context.integration.status ) " statusCode " : 200 else " statusCode " : 500 end }

Discussion 0
Questions 42

A developer is deploying a new application to Amazon Elastic Container Service (Amazon ECS). The developer needs to securely store and retrieve different types of variables. These variables include authentication information for a remote API, the URL for the API, and credentials. The authentication information and API URL must be available to all current and future deployed versions of the application across development, testing, and production environments.

How should the developer retrieve the variables with the FEWEST application changes?

Options:

A.  

Update the application to retrieve the variables from AWS Systems Manager Parameter Store. Use unique paths in Parameter Store for each variable in each environment. Store the credentials in AWS Secrets Manager in each environment.

B.  

Update the application to retrieve the variables from AWS Key Management Service (AWS KMS). Store the API URL and credentials as unique keys for each environment.

C.  

Update the application to retrieve the variables from an encrypted file that is stored with the application. Store the API URL and credentials in unique files for each environment.

D.  

Update the application to retrieve the variables from each of the deployed environments. Define the authentication information and API URL in the ECS task definition as unique names during the deployment process.

Discussion 0
Questions 43

A developer manages a serverless application that uses an AWS Lambda function. The application periodically interacts with an external API by using short-lived authentication keys . Currently, the developer embeds the authentication keys directly in the Lambda function code. This approach requires manual updates and introduces security risks and operational inefficiencies.

The developer needs a secure and automated solution for authentication key storage, retrieval, and rotation.

Which solution will meet these requirements?

Options:

A.  

Store the authentication keys in AWS Secrets Manager. Configure the Lambda function to retrieve and cache the keys by using Lambda extensions.

B.  

Store the authentication keys in an Amazon S3 bucket. Configure the Lambda function to retrieve the keys from the bucket during each invocation.

C.  

Store the authentication keys in Lambda environment variables and manually update the values when needed.

D.  

Store the authentication keys in AWS Systems Manager Parameter Store. Configure the Lambda function to retrieve the keys during every invocation.

Discussion 0
Questions 44

A company has implemented AWS CodeDeploy as part of its CI/CD pipeline. The company uses automatic rollbacks during an in-place deployment of a new version of a web application on Amazon EC2 instances.

What happens if the deployment of the new version fails validation ?

Options:

A.  

CodeDeploy restores the last successful deployment from a snapshot stored in Amazon S3.

B.  

CodeDeploy switches Amazon Route 53 alias records back to the previous green deployment.

C.  

CodeDeploy redeploys the last known stable version of the application as a new deployment with a new deployment ID.

D.  

AWS CodePipeline promotes the most recent SUCCEEDED deployment to production.

Discussion 0
Questions 45

A developer is working on a web application that uses Amazon DynamoDB as its data store The application has two DynamoDB tables one table that is named artists and one table that is named songs The artists table has artistName as the partition key. The songs table has songName as the partition key and artistName as the sort key

The table usage patterns include the retrieval of multiple songs and artists in a single database operation from the webpage. The developer needs a way to retrieve this information with minimal network traffic and optimal application performance.

Which solution will meet these requirements ' ?

Options:

A.  

Perform a BatchGetltem operation that returns items from the two tables. Use the list of songName artistName keys for the songs table and the list of artistName key for the artists table.

B.  

Create a local secondary index (LSI) on the songs table that uses artistName as the partition key Perform a query operation for each artistName on the songs table that filters by the list of songName Perform a query operation for each artistName on the artists table

C.  

Perform a BatchGetltem operation on the songs table that uses the songName/artistName keys. Perform a BatchGetltem operation on the artists table that uses artistName as the key.

D.  

Perform a Scan operation on each table that filters by the list of songName/artistName for the songs table and the list of artistName in the artists table.

Discussion 0
Questions 46

A company wants to automate part of its deployment process. A developer needs to automate the process of checking for and deleting unused resources that supported previously deployed stacks but that are no longer used.

The company has a central application that uses the AWS Cloud Development Kit (AWS CDK) to manage all deployment stacks. The stacks are spread out across multiple accounts. The developer’s solution must integrate as seamlessly as possible within the current deployment process.

Which solution will meet these requirements with the LEAST amount of configuration?

Options:

A.  

In the central AWS CDK application, write a handler function in the code that uses AWS SDK calls to check for and delete unused resources. Create an AWS CloudPormation template from a JSON file. Use the template to attach the function code to an AWS Lambda function and lo invoke the Lambda function when the deployment slack runs.

B.  

In the central AWS CDK application. write a handler function in the code that uses AWS SDK calls to check for and delete unused resources. Create an AWS CDK custom resource Use the custom resource to attach the function code to an AWS Lambda function and to invoke the Lambda function when the deployment stack runs.

C.  

In the central AWS CDK, write a handler function m the code that uses AWS SDK calls to check for and delete unused resources. Create an API in AWS Amplify Use the API to attach the function code to an AWS Lambda function and to invoke the Lambda function when the deployment stack runs.

D.  

In the AWS Lambda console write a handler function in the code that uses AWS SDK calls to check for and delete unused resources. Create an AWS CDK custom resource. Use the custom resource to import the Lambda function into the stack and to Invoke the Lambda function when the deployment stack runs.

Discussion 0
Questions 47

A developer is modifying an AWS Lambda function that accesses an Amazon RDS for MySQL database. The developer discovers that the Lambda function has the database credentials stored as plaintext in the Lambda function code.

The developer must implement a solution to make the credentials more secure. The solution must include automated credential rotation every 30 days.

Which solution will meet these requirements?

Options:

A.  

Move the credentials to a secret in AWS Secrets Manager. Modify the Lambda function to read from Secrets Manager. Set a schedule to rotate the secret every 30 days.

B.  

Move the credentials to a secure string parameter in AWS Systems Manager Parameter Store. Modify the Lambda function to read from Parameter Store. Set a schedule to rotate the parameter every 30 days.

C.  

Move the credentials to an encrypted Amazon S3 bucket. Modify the Lambda function to read from the S3 bucket. Configure S3 Object Lambda to rotate the credentials every 30 days.

D.  

Move the credentials to a secure string parameter in AWS Systems Manager Parameter Store. Create an Amazon EventBridge rule to rotate the parameter every 30 days.

Discussion 0
Questions 48

A company has an application that processes audio files for different departments. When audio files are saved to an Amazon S3 bucket, an AWS Lambda function receives an event notification and processes the audio input.

A developer needs to update the solution so that the application can process the audio files for each department independently. The application must publish the audio file location for each department to each department ' s existing Amazon SQS queue.

Which solution will meet these requirements with no changes to the Lambda function code?

Options:

A.  

Configure the S3 bucket to send the event notifications to an Amazon SNS topic. Subscribe each department ' s SQS queue to the SNS topic. Configure subscription filter policies.

B.  

Update the Lambda function to write the file location to a single shared SQS queue. Configure the shared SQS queue to send the file reference to each department ' s SQS queue.

C.  

Update the Lambda function to send the file location to each department ' s SQS queue.

D.  

Configure the S3 bucket to send the event notifications to each department ' s SQS queue.

Discussion 0
Questions 49

A company has a large amount of data in an Amazon DynamoDB table. A large batch of data is appended to the table once each day. The company wants a solution that will make all the existing and future data in DynamoDB available for analytics on a long-term basis.

Which solution meets these requirements with the LEAST operational overhead?

Options:

A.  

Configure DynamoDB incremental exports to Amazon S3.

B.  

Configure Amazon DynamoDB Streams to write records to Amazon S3.

C.  

Configure Amazon EMR to copy DynamoDB data to Amazon S3.

D.  

Configure Amazon EMR to copy DynamoDB data to Hadoop Distributed File System (HDFS).

Discussion 0
Questions 50

A developer at a company recently created a serverless application to process and show data from business reports. The application ' s user interface (UI) allows users to select and start processing the files. The Ul displays a message when the result is available to view. The application uses AWS Step Functions with AWS Lambda functions to process the files. The developer used Amazon API Gateway and Lambda functions to create an API to support the UI.

The company ' s Ul team reports that the request to process a file is often returning timeout errors because of the see or complexity of the files. The Ul team wants the API to provide an immediate response so that the Ul can deploy a message while the files are being processed. The backend process that is invoked by the API needs to send an email message when the report processing is complete.

What should the developer do to configure the API to meet these requirements?

Options:

A.  

Change the API Gateway route to add an X-Amz-Invocation-Type header win a sialic value of ' Event ' in the integration request Deploy the API Gateway stage to apply the changes.

B.  

Change the configuration of the Lambda function that implements the request to process a file. Configure the maximum age of the event so that the Lambda function will ion asynchronously.

C.  

Change the API Gateway timeout value to match the Lambda function ominous value. Deploy the API Gateway stage to apply the changes.

D.  

Change the API Gateway route to add an X-Amz-Target header with a static value of ' A sync ' in the integration request Deploy me API Gateway stage to apply the changes.

Discussion 0
Questions 51

A company has many microservices that are comprised of AWS Lambda functions. Multiple teams within the company split ownership of the microservices.

An application reads configuration values from environment variables that are contained in the Lambda functions. During a security audit, the company discovers that some of the environment variables contain sensitive information.

The company ' s security policy requires each team to have full control over the rotation of AWS KMS keys that the team uses for its respective microservices.

Options:

A.  

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:Decrypt permissions to the Lambda function execution roles.

B.  

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:Decrypt permission to the Lambda function execution roles.

C.  

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

D.  

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

Discussion 0
Questions 52

A company has deployed an application on AWS Elastic Beanstalk. The company has configured the Auto Scaling group that is associated with the Elastic Beanstalk environment to have five Amazon EC2 instances. If the capacity is fewer than four EC2 instances during the deployment, application performance degrades. The company is using the all-at-once deployment policy.

What is the MOST cost-effective way to solve the deployment issue?

Options:

A.  

Change the Auto Scaling group to six desired instances.

B.  

Change the deployment policy to traffic splitting. Specify an evaluation time of 1 hour.

C.  

Change the deployment policy to rolling with additional batch. Specify a batch size of 1.

D.  

Change the deployment policy to rolling. Specify a batch size of 2.

Discussion 0
Questions 53

A developer is designing an AWS Lambda function that creates temporary files that are less than 10 MB during invocation. The temporary files will be accessed and modified multiple times during invocation. The developer has no need to save or retrieve these files in the future.

Where should the temporary files be stored?

Options:

A.  

the /tmp directory

B.  

Amazon Elastic File System (Amazon EFS)

C.  

Amazon Elastic Block Store (Amazon EBS)

D.  

Amazon S3

Discussion 0
Questions 54

An application that runs on AWS receives messages from an Amazon Simple Queue Service (Amazon SQS) queue and processes the messages in batches. The

application sends the data to another SQS queue to be consumed by another legacy application. The legacy system can take up to 5 minutes to process some transaction data.

A developer wants to ensure that there are no out-of-order updates in the legacy system. The developer cannot alter the behavior of the legacy system.

Which solution will meet these requirements?

Options:

A.  

Use an SQS FIFO queue. Configure the visibility timeout value.

B.  

Use an SQS standard queue with a SendMessageBatchRequestEntry data type. Configure the DelaySeconds values.

C.  

Use an SQS standard queue with a SendMessageBatchRequestEntry data type. Configure the visibility timeout value.

D.  

Use an SQS FIFO queue. Configure the DelaySeconds value.

Discussion 0
Questions 55

A company wants to push a new UI for its application to users in a staging environment before the company gradually rolls out the UI to 10% of the company’s production users in a single AWS Region. The company needs a solution that can target the company’s audience based on user attributes. The solution must validate the configuration before deployment. The solution also must have an option for instant rollback without redeploying code. Which solution will meet these requirements?

Options:

A.  

Use environment variables and deploy new UI versions for each environment to change feature flags.

B.  

Use AWS AppConfig feature flags that have environment-scoped configurations, staged rollouts, and instant rollback.

C.  

Store environment flags in AWS Systems Manager Parameter Store. Configure the application to call for parameters at runtime.

D.  

Run a custom feature flag service on an Application Load Balancer (ALB). Configure the application to query the flag service to target the company’s audience and perform percentage rollouts.

Discussion 0
Questions 56

A company uses Amazon API Gateway to expose a set of APIs to customers. The APIs have caching enabled in API Gateway. Customers need a way to invalidate the cache for each API when they test the API.

What should a developer do to give customers the ability to invalidate the API cache?

Options:

A.  

Ask the customers to use AWS credentials to call the InvalidateCache API operation.

B.  

Attach an InvalidateCache policy to the IAM execution role that the customers use to invoke the API. Ask the customers to send a request that contains the HTTP header when they make an API call.

C.  

Ask the customers to use the AWS SDK API Gateway class to invoke the InvalidateCache API operation.

D.  

Attach an InvalidateCache policy to the IAM execution role that the customers use to invoke the API. Ask the customers to add the INVALIDATE_CACHE query string parameter when they make an API call.

Discussion 0
Questions 57

A developer is building a microservices-based application by using Python on AWS and several AWS services The developer must use AWS X-Ray The developer views the service map by using the console to view the service dependencies. During testing, the developer notices that some services are missing from the service map

What can the developer do to ensure that all services appear in the X-Ray service map?

Options:

A.  

Modify the X-Ray Python agent configuration in each service to increase the sampling rate

B.  

Instrument the application by using the X-Ray SDK for Python. Install the X-Ray SDK for all the services that the application uses

C.  

Enable X-Ray data aggregation in Amazon CloudWatch Logs for all the services that the application uses

D.  

Increase the X-Ray service map timeout value in the X-Ray console

Discussion 0
Questions 58

A developer is troubleshooting an application mat uses Amazon DynamoDB in the uswest-2 Region. The application is deployed to an Amazon EC2 instance. The application requires read-only permissions to a table that is named Cars The EC2 instance has an attached IAM role that contains the following IAM policy.

When the application tries to read from the Cars table, an Access Denied error occurs.

How can the developer resolve this error?

Options:

A.  

Modify the IAM policy resource to be " arn aws dynamo* us-west-2 account-id table/* "

B.  

Modify the IAM policy to include the dynamodb * action

C.  

Create a trust policy that specifies the EC2 service principal. Associate the role with the policy.

D.  

Create a trust relationship between the role and dynamodb Amazonas com.

Discussion 0
Questions 59

A company is building an ecommerce application. The company stores the application ' s static content in an Amazon S3 bucket. The application stores data that includes personally identifiable information (PII). The application makes dynamic requests in JSON format through an Amazon CloudFront distribution to an Amazon API Gateway REST API. The REST API invokes an AWS Lambda function that stores and queries data in Amazon DynamoDB.

The company must ensure that all PII data is encrypted at rest in DynamoDB. The company must also protect specific data fields more granularly. The company must ensure that the specified fields are encrypted at the edge. The specified fields must remain encrypted throughout the full stack of the application.

Which solution will meet these requirements?

Options:

A.  

Configure a Lambda@Edge function to identify and encrypt the sensitive fields. Associate the function with the CloudFront distribution.

B.  

Create an RSA key pair. Configure the CloudFront distribution to use field-level encryption directly.

C.  

Create an AWS KMS key. Update the Lambda function to encrypt the data before inserting the data into DynamoDB. Configure the function to decrypt the data after retrieval.

D.  

Create a new resource on the existing REST API and add a new POST method to the new resource. Configure the POST method to invoke the Lambda function and an AWS KMS key to encrypt the sensitive data fields.

Discussion 0
Questions 60

A developer is configuring an applications deployment environment in AWS CodePipeine. The application code is stored in a GitHub repository. The developer wants to ensure that the repository package ' s unit tests run in the new deployment environment. The deployment has already set the pipeline ' s source provider to GitHub and has specified the repository and branch to use in the deployment.

When combination of steps should the developer take next to meet these requirements with the least the LEAST overhead ' (Select TWO).

Options:

A.  

Create an AWS CodeCommt project. Add the repository package ' s build and test commands to the protects buildspec

B.  

Create an AWS CodeBuid project. Add the repository package ' s build and test commands to the projects buildspec

C.  

Create an AWS CodeDeploy protect. Add the repository package ' s build and test commands to the project ' s buildspec

D.  

Add an action to the source stage. Specify the newly created project as the action provider. Specify the build attract as the actions input artifact.

E.  

Add a new stage to the pipeline alter the source stage. Add an action to the new stage. Speedy the newly created protect as the action provider. Specify the source artifact as the action ' s input artifact.

Discussion 0
Questions 61

A development learn has an Amazon API Gateway REST API that is backed by an AWS Lambda function.

Users have reported performance issues for the Lambda function. The development team identified the source of the issues as a cold start of the Lambda function. The development team needs to reduce the time needed for the Lambda function to initialize.

Which solution will meet this requirement?

Options:

A.  

Change the Lambda concurrency lo reserved concurrency.

B.  

Increase the timeout of the Lambda function.

C.  

Increase the memory allocation of the Lambda function.

D.  

Configure provisioned concurrency for the Lambda function.

Discussion 0
Questions 62

A company runs an application as an Amazon ECS service on an AWS Fargate cluster. The company has configured the service to use the rolling update deployment type. The company set the minimum healthy percentage to 100% and set the maximum healthy percentage to 200%.

A developer observes that a new deployment of the ECS service is failing continuously. The developer must ensure that Amazon ECS restores the most recently completed service deployment when a new service deployment fails.

Which solution will meet this requirement?

Options:

A.  

Use Amazon ECS service auto scaling. Set the scaling policy type as step scaling.

B.  

Use Amazon ECS service auto scaling. Set the scaling policy type as target tracking.

C.  

Use the blue/green deployment type. Enable the deployment circuit breaker and rollback on failures options.

D.  

Use the rolling deployment type. Enable deployment circuit breaker and rollback on failures options.

Discussion 0
Questions 63

A company is migrating an on-premises database to Amazon RDS for MySQL. The company has read-heavy workloads. The company wants to refactor the code to achieve optimum read performance for queries.

Which solution will meet this requirement with LEAST current and future effort?

Options:

A.  

Use a multi-AZ Amazon RDS deployment. Increase the number of connections that the code makes to the database or increase the connection pool size if a connection pool is in use.

B.  

Use a multi-AZ Amazon RDS deployment. Modify the code so that queries access the secondary RDS instance.

C.  

Deploy Amazon RDS with one or more read replicas. Modify the application code so that queries use the URL for the read replicas.

D.  

Use open source replication software to create a copy of the MySQL database on an Amazon EC2 instance. Modify the application code so that queries use the IP address of the EC2 instance.

Discussion 0
Questions 64

A company has a website that displays a daily newsletter. When a user visits the website, an AWS Lambda function processes the browser ' s request and queries the company ' s on-premises database to obtain the current newsletter. The newsletters are stored in English. The Lambda function uses the Amazon Translate TranslateText API operation to translate the newsletters, and the translation is displayed to the user.

Due to an increase in popularity, the website ' s response time has slowed. The database is overloaded. The company cannot change the database and needs a solution that improves the response time of the Lambda function.

Which solution meets these requirements?

Options:

A.  

Change to asynchronous Lambda function invocation.

B.  

Cache the translated newsletters in the Lambda /tmp directory.

C.  

Enable TranslateText API caching.

D.  

Change the Lambda function to use parallel processing.

Discussion 0
Questions 65

A social media company is designing a platform that allows users to upload data, which is stored in Amazon S3. Users can upload data encrypted with a public key. The company wants to ensure that only the company can decrypt the uploaded content using an asymmetric encryption key. The data must always be encrypted in transit and at rest.

Options:

Options:

A.  

Use server-side encryption with Amazon S3 managed keys (SSE-S3) to encrypt the data.

B.  

Use server-side encryption with customer-provided encryption keys (SSE-C) to encrypt the data.

C.  

Use client-side encryption with a data key to encrypt the data.

D.  

Use client-side encryption with a customer-managed encryption key to encrypt the data.

Discussion 0
Questions 66

A company has a web application that is hosted on Amazon EC2 instances The EC2 instances are configured to stream logs to Amazon CloudWatch Logs The company needs to receive an Amazon Simple Notification Service (Amazon SNS) notification when the number of application error messages exceeds a defined threshold within a 5-minute period

Which solution will meet these requirements?

Options:

A.  

Rewrite the application code to stream application logs to Amazon SNS Configure an SNS topic to send a notification when the number of errors exceeds the defined threshold within a 5-minute period

B.  

Configure a subscription filter on the CloudWatch Logs log group. Configure the filter to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period.

C.  

Install and configure the Amazon Inspector agent on the EC2 instances to monitor for errors Configure Amazon Inspector to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period

D.  

Create a CloudWatch metric filter to match the application error pattern in the log data. Set up a CloudWatch alarm based on the new custom metric. Configure the alarm to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period.

Discussion 0
Questions 67

A developer is designing a new feature for an existing application that uses an AWS Lambda function. The developer wants to test the Lambda function safely in development and testing AWS accounts before deploying the function to a production AWS account. The developer must be able to roll back the function if issues are discovered.

Which solution will meet these requirements with the LEAST operational overhead ?

Options:

A.  

Create new Lambda function versions and aliases for the development, testing, and production accounts. After successful testing, update the production alias to point to the function version. Roll back to the most recent stable version if issues are discovered.

B.  

Deploy the Lambda function separately to the development, testing, and production accounts after testing the function in each environment.

C.  

Use Lambda layers to separate the code and libraries for each AWS account and deploy the function with different layers.

D.  

Use environment variables to differentiate development, testing, and production behavior.

Discussion 0
Questions 68

A developer maintains a critical business application that uses Amazon DynamoDB as the primary data store The DynamoDB table contains millions of documents and receives 30-60 requests each minute The developer needs to perform processing in near-real time on the documents when they are added or updated in the DynamoDB table

How can the developer implement this feature with the LEAST amount of change to the existing application code?

Options:

A.  

Set up a cron job on an Amazon EC2 instance Run a script every hour to query the table for changes and process the documents

B.  

Enable a DynamoDB stream on the table Invoke an AWS Lambda function to process the documents.

C.  

Update the application to send a PutEvents request to Amazon EventBridge. Create an EventBridge rule to invoke an AWS Lambda function to process the documents.

D.  

Update the application to synchronously process the documents directly after the DynamoDB write

Discussion 0
Questions 69

Users of a web-based music application are experiencing latency issues on one of the application ' s most popular pages. A developer identifies that the issue is caused by the slow load time of specific widgets that rank and sort various songs and albums.

The developer needs to ensure that the widgets load more quickly by using built-in, in-memory ranking and sorting techniques. The developer must ensure that the data remains up to date.

Which solution will meet these requirements with the LEAST latency ?

Options:

A.  

Provision an Amazon ElastiCache (Memcached) cluster. Implement a lazy-loading caching strategy.

B.  

Provision an Amazon ElastiCache (Redis OSS) cluster. Implement a write-through caching strategy.

C.  

Provision an Amazon ElastiCache (Memcached) cluster. Implement a write-through caching strategy.

D.  

Provision an Amazon ElastiCache (Redis OSS) cluster. Implement a lazy-loading caching strategy.

Discussion 0
Questions 70

A company needs to distribute firmware updates to its customers around the world.

Which service will allow easy and secure control of the access to the downloads at the lowest cost?

Options:

A.  

Use Amazon CloudFront with signed URLs for Amazon S3.

B.  

Create a dedicated Amazon CloudFront Distribution for each customer.

C.  

Use Amazon CloudFront with AWS Lambda@Edge.

D.  

Use Amazon API Gateway and AWS Lambda to control access to an S3 bucket.

Discussion 0
Questions 71

A developer is investigating recent performance bottlenecks within a company ' s distributed web application that runs on various AWS services, including Amazon EC2 and Amazon DynamoDB.

How can the developer determine the length of time of the application ' s calls to the various downstream AWS services?

Options:

A.  

Enable VPC Flow Logs and analyze them in Amazon OpenSearch Service.

B.  

Use Amazon CloudWatch Logs to analyze application logs for the various calls.

C.  

Enable detailed monitoring for the EC2 instances in Amazon CloudWatch.

D.  

Implement AWS X-Ray with client handlers for the various downstream calls.

Discussion 0
Questions 72

A developer is designing an event-driven architecture. An AWS Lambda function that processes data needs to push processed data to a subset of four consumer Lambda functions. The data must be routed based on the value of one field in the data.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Create an Amazon Simple Queue Service {Amazon SQS) queue and even! source mapping for each consumer Lambda function. Add message routing logic to the data-processing Lambda function.

B.  

Create an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the four consumer Lambda functions to the topic. Add message filtering logic to each consumer Lambda function. Subscribe the data-processing Lambda function to the SNS topic.

C.  

Create a separate Amazon Simple Notification Service (Amazon SNS) topic and subscription for each consumer Lambda function. Add message routing logic to the data-processing Lambda function to publish to the appropriate topic.

D.  

Create a single Amazon Simple Notification Service {Amazon SNS) topic. Subscribe the four consumer Lambda functions to the topic. Add SNS subscription filter policies to each subscription. Configure the data-processing Lambda function to publish to the topic.

Discussion 0
Questions 73

A developer is working on a Python application that runs on Amazon EC2 instances. The developer wants to enable tracing of application requests to debug performance issues in the code.

Which combination of actions should the developer take to achieve this goal? (Select TWO)

Options:

A.  

Install the Amazon CloudWatch agent on the EC2 instances.

B.  

Install the AWS X-Ray daemon on the EC2 instances.

C.  

Configure the application to write JSON-formatted togs to /var/log/cloudwatch.

D.  

Configure the application to write trace data to /Var/log-/xray.

E.  

Install and configure the AWS X-Ray SDK for Python in the application.

Discussion 0
Questions 74

A developer is building an API that uses an Amazon CloudFront distribution to forward requests to an AWS Lambda function URL. The developer must ensure that the function URL can be accessed only through the CloudFront distribution and not directly.

Which solution will meet this requirement?

Options:

A.  

Create a resource-based policy for the CloudFront distribution. Configure the policy to allow access to the function URL.

B.  

Configure a resource-based policy for the Lambda function to allow only the CloudFront distribution to access the function URL. Configure the distribution to use an origin access control (OAC) for requests to the function URL.

C.  

Create an IAM role that has permissions to invoke the function URL. Configure a service role that has a CloudFront trust policy and permissions to make requests to the function URL.

D.  

Configure a resource-based policy for the Lambda function to allow only the CloudFront distribution ' s IP address range to access the function.

Discussion 0
Questions 75

A company has point-of-sale devices across thousands of retail shops that synchronize sales transactions with a centralized system. The system includes an Amazon API Gateway API that exposes an AWS Lambda function. The Lambda function processes the transactions and stores the transactions in Amazon RDS for MySQL. The number of transactions increases rapidly during the day and is near zero at night.

How can a developer increase the elasticity of the system MOST cost-effectively?

Options:

A.  

Migrate from Amazon RDS to Amazon Aurora MySQL. Use an Aurora Auto Scaling policy to scale read replicas based on CPU consumption.

B.  

Migrate from Amazon RDS to Amazon Aurora MySQL. Use an Aurora Auto Scaling policy to scale read replicas based on the number of database connections.

C.  

Create an Amazon SQS queue. Publish transactions to the queue. Set the queue to invoke the Lambda function. Turn on enhanced fanout for the Lambda function.

D.  

Create an Amazon SQS queue. Publish transactions to the queue. Set the queue to invoke the Lambda function. Set the reserved concurrency of the Lambda function to be less than the number of database connections.

Discussion 0
Questions 76

A developer updates an AWS Lambda function that is integrated with an Amazon API Gateway API. The API serves as the backend for a web application. The developer must test the updated Lambda function without affecting production users .

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.  

Create a canary deployment on the existing API stage and test by using the production URL.

B.  

Change the API endpoint type to private and test by using the production URL.

C.  

Create a new API Gateway stage for testing and use stage variables to route traffic to the updated Lambda function.

D.  

Deploy a separate CloudFormation stack that duplicates the production API and Lambda function.

Discussion 0
Questions 77

A developer creates an AWS Lambda function to publish messages to an Amazon SNS topic. All message content must be encrypted in transit and at rest between AWS Lambda and Amazon SNS.

A portion of the Lambda execution role policy is shown:

" Effect " : " Allow " ,

" Action " : " sns:Publish " ,

" Resource " : " arn:aws:sns:us-east-1:1234567890:secure-topic "

Which combination of steps should the developer take to meet these requirements? (Select TWO.)

Options:

A.  

Enable server-side encryption on the SNS topic.

B.  

Add a Deny statement to the Lambda execution role with a condition of " aws:SecureTransport " : " true " .

C.  

Create a VPC endpoint for Amazon SNS.

D.  

Add a StringEquals condition of " sns:Protocol " : " https " to the Lambda execution role.

E.  

Add a Deny statement to the Lambda execution role with a condition of " aws:SecureTransport " : " false " .

Discussion 0
Questions 78

A developer needs to perform geographic load testing of an API. The developer must deploy resources to multiple AWS Regions to support the load testing of the API.

How can the developer meet these requirements without additional application code?

Options:

A.  

Create and deploy an AWS Lambda function in each desired Region. Configure the Lambda function to create a stack from an AWS CloudFormation template in that Region when the function is invoked.

B.  

Create an AWS CloudFormation template that defines the load test resources. Use the AWS CLI create-stack-set command to create a stack set in the desired Regions.

C.  

Create an AWS Systems Manager document that defines the resources. Use the document to create the resources in the desired Regions.

D.  

Create an AWS CloudFormation template that defines the load test resources. Use the AWS CLI deploy command to create a stack from the template in each Region.

Discussion 0
Questions 79

A team of developed is using an AWS CodePipeline pipeline as a continuous integration and continuous delivery (CI/CD) mechanism for a web application. A developer has written unit tests to programmatically test the functionality of the application code. The unit tests produce a test report that shows the results of each individual check. The developer now wants to run these tests automatically during the CI/CD process.

Options:

A.  

Write a Git pre-commit hook that runs the test before every commit. Ensure that each developer who is working on the project has the pre-commit hook instated locally. Review the test report and resolve any issues before pushing changes to AWS CodeCommit.

B.  

Add a new stage to the pipeline. Use AWS CodeBuild as the provider. Add the new stage after the stage that deploys code revisions to the test environment. Write a buildspec that fails the CodeBuild stage if any test does not pass. Use the test reports feature of Codebuild to integrate the report with the CodoBuild console. View the test results in CodeBuild Resolve any issues.

C.  

Add a new stage to the pipeline. Use AWS CodeBuild at the provider. Add the new stage before the stage that deploys code revisions to the test environment. Write a buildspec that fails the CodeBuild stage it any test does not pass. Use the test reports feature of CodeBuild to integrate the report with the CodeBuild console. View the test results in codeBuild Resolve any issues.

D.  

Add a new stage to the pipeline. Use Jenkins as the provider. Configure CodePipeline to use Jenkins to run the unit tests. Write a Jenkinsfile that fails the stage if any test does not pass. Use the test report plugin for Jenkins to integrate the repot with the Jenkins dashboard. View the test results in Jenkins. Resolve any issues.

Discussion 0
Questions 80

An application uses Lambda functions to extract metadata from files uploaded to an S3 bucket; the metadata is stored in Amazon DynamoDB. The application starts behaving unexpectedly, and the developer wants to examine the logs of the Lambda function code for errors.

Based on this system configuration, where would the developer find the logs?

Options:

A.  

Amazon S3

B.  

AWS CloudTrail

C.  

Amazon CloudWatch

D.  

Amazon DynamoDB

Discussion 0
Questions 81

In a move toward using microservices, a company ' s management team has asked all development teams to build their services so that API requests depend only on that service ' s data store. One team is building a Payments service which has its own database; the service needs data that originates in the Accounts database. Both are using Amazon DynamoDB.

What approach will result in the simplest, decoupled, and reliable method to get near-real time updates from the Accounts database?

Options:

A.  

Use AWS Glue to perform frequent ETL updates from the Accounts database to the Payments database.

B.  

Use Amazon ElastiCache in Payments, with the cache updated by triggers in the Accounts database.

C.  

Use Amazon Data Firehose to deliver all changes from the Accounts database to the Payments database.

D.  

Use Amazon DynamoDB Streams to deliver all changes from the Accounts database to the Payments database.

Discussion 0
Questions 82

A large company has its application components distributed across multiple AWS accounts. The company needs to collect and visualize trace data across these accounts.

What should be used to meet these requirements?

Options:

A.  

AWS X-Ray

B.  

Amazon CloudWatch

C.  

Amazon VPC flow logs

D.  

Amazon OpenSearch Service

Discussion 0
Questions 83

An organization is using Amazon CloudFront to ensure that its users experience low-latency access to its web application. The organization has identified a need to encrypt all traffic between users and CloudFront, and all traffic between CloudFront and the web application.

How can these requirements be met? (Select TWO)

Options:

A.  

Use AWS KMS t0 encrypt traffic between cloudFront and the web application.

B.  

Set the Origin Protocol Policy to " HTTPS Only " .

C.  

Set the Origin’s HTTP Port to 443.

D.  

Set the Viewer Protocol Policy to " HTTPS Only " or Redirect HTTP to HTTPS "

E.  

Enable the CloudFront option Restrict Viewer Access.

Discussion 0
Questions 84

A developer creates an AWS CloudFormation template that defines one AWS Lambda function, one Amazon S3 bucket, and one IAM role. The developer wants to deploy multiple stacks from the same template across different environments. Each resource must have a unique name per environment .

Which combination of solutions will meet this requirement? (Select TWO.)

Options:

A.  

Create a parameter for the environment name.

B.  

Create a condition for the environment name.

C.  

Create a rule for the environment name.

D.  

Define resource names by using Fn::Sub and !Ref with the environment name parameter.

E.  

Define resource names by using Fn::GetAtt and !Ref with the environment name parameter.

Discussion 0
Questions 85

A company hosts its application in the us-west-1 Region. The company wants to add redundancy in the us-east-1 Region. The application secrets are stored in AWS Secrets Manager in us-west-1. A developer needs to replicate the secrets to us-east-1.

Which solution will meet this requirement?

Options:

A.  

Configure secret replication for each secret. Add us-east-1 as a replication Region. Choose an AWS KMS key in us-east-1 to encrypt the replicated secrets.

B.  

Create a new secret in us-east-1 for each secret. Configure secret replication in us-east-1. Set the source to be the corresponding secret in us-west-1. Choose an AWS KMS key in us-west-1 to encrypt the replicated secrets.

C.  

Create a replication rule for each secret. Set us-east-1 as the destination Region. Configure the rule to run during secret rotation. Choose an AWS KMS key in us-east-1 to encrypt the replicated secrets.

D.  

Create a Secrets Manager lifecycle rule to replicate each secret to a new Amazon S3 bucket in us-west-1. Configure an S3 replication rule to replicate the secrets to us-east-1.

Discussion 0
Questions 86

A developer is investigating an issue in part of a company ' s application. In the application messages are sent to an Amazon Simple Queue Service (Amazon SQS) queue The AWS Lambda function polls messages from the SQS queue and sends email messages by using Amazon Simple Email Service (Amazon SES) Users have been receiving duplicate email messages during periods of high traffic.

Which reasons could explain the duplicate email messages? (Select TWO.)

Options:

A.  

Standard SQS queues support at-least-once message delivery

B.  

Standard SQS queues support exactly-once processing, so the duplicate email messages are because of user error.

C.  

Amazon SES has the DomainKeys Identified Mail (DKIM) authentication incorrectly configured

D.  

The SQS queue ' s visibility timeout is lower than or the same as the Lambda function ' s timeout.

E.  

The Amazon SES bounce rate metric is too high.

Discussion 0
Questions 87

A developer is trying to make API calls using the AWS SDK. The IAM user credentials used by the application require multi-factor authentication for all API calls.

Which method should the developer use to access the multi-factor authentication-protected API?

Options:

A.  

GetFederationToken

B.  

GetCallerIdentity

C.  

GetSessionToken

D.  

DecodeAuthorizationMessage

Discussion 0
Questions 88

A developer is incorporating AWS X-Ray into an application that handles personal identifiable information (PII). The application is hosted on Amazon EC2 instances. The application trace messages include encrypted PII and go to Amazon CloudWatch. The developer needs to ensure that no PII goes outside of the EC2 instances.

Which solution will meet these requirements?

Options:

A.  

Manually instrument the X-Ray SDK in the application code.

B.  

Use the X-Ray auto-instrumentation agent.

C.  

Use Amazon Macie to detect and hide PII. Call the X-Ray API from AWS Lambda.

D.  

Use AWS Distro for Open Telemetry.

Discussion 0
Questions 89

A company is creating an AWS Step Functions state machine to run a set of tests for an application. The tests need to run when a specific AWS Cloud Formation stack is deployed.

Which combination of steps will meet these requirements? (Select TWO.)

Options:

A.  

Create an AWS Lambda function to invoke the state machine.

B.  

Create an Amazon EventBridge rule on the default bus that matches on a detail type of CloudFormation stack status change, a status of UPDATE_IN_PROGRESS, and the stack ID of the CloudFormation stack.

C.  

Create a pipe in Amazon EventBridge Pipes that has a source of the default event bus. Set the Lambda function as a target. Filter on a detail type of CloudFormation stack status change, a status of UPDATE_IN_PROGRESS, and the stack ID of the CloudFormation stack.

D.  

Create a pipe in Amazon EventBridge Pipes that has a source of the EventBridge rule. Set the state machine as a target.

E.  

Add the state machine as a target of the EventBridge rule.

Discussion 0
Questions 90

A developer received the following error message during an AWS CloudFormation deployment:

Which action should the developer take to resolve this error?

Options:

A.  

Contact AWS Support to report an issue with the Auto Scaling Groups (ASG > service.

B.  

Add a DependsOn attribute to the ASGInstanceRole12345678 resource in the CloudFormation template. Then delete the stack.

C.  

Modify the CloudFormation template to retain the ASGInstanceRolet 2345678 resource. Then manually delete the resource after deployment.

D.  

Add a force parameter when calling CloudFormation with the role-am of ASGInstanceRole12345678.

Discussion 0
Questions 91

An ecommerce startup is preparing for an annual sales event. As the traffic to the company ' s application increases, the development team wants to be notified when the Amazon EC2 instance ' s CPU utilization exceeds 80%.

Which solution will meet this requirement?

Options:

A.  

Create a custom Amazon CloudWatch alarm that sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%.

B.  

Create a custom AWS CloudTrail alarm that sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%.

C.  

Create a cron job on the EC2 instance that invokes the --describe-instance-information command on the host instance every 15 minutes and sends the results to an Amazon SNS topic.

D.  

Create an AWS Lambda function that queries the AWS CloudTrail logs for the CPUUtilization metric every 15 minutes and sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%.

Discussion 0
Questions 92

A company had an Amazon RDS for MySQL DB instance that was named mysql-db. The DB instance was deleted within the past 90 days.

A developer needs to find which IAM user or role deleted the DB instance in the AWS environment.

Which solution will provide this information?

Options:

A.  

Retrieve the AWS CloudTrail events for the resource mysql-db where the event name is DeleteDBInstance. Inspect each event.

B.  

Retrieve the Amazon CloudWatch log events from the most recent log stream within the rds/mysql-db log group. Inspect the log events.

C.  

Retrieve the AWS X-Ray trace summaries. Filter by services with the name mysql-db. Inspect the ErrorRootCauses values within each summary.

D.  

Retrieve the AWS Systems Manager deletions inventory. Filter the inventory by deletions that have a TypeName value of RDS. Inspect the deletion details.

Discussion 0
Questions 93

A mobile app stores blog posts in an Amazon DynacnoDB table Millions of posts are added every day and each post represents a single item in the table. The mobile app requires only recent posts. Any post that is older than 48 hours can be removed.

What is the MOST cost-effective way to delete posts that are older man 48 hours?

Options:

A.  

For each item add a new attribute of type String that has a timestamp that is set to the blog post creation time. Create a script to find old posts with a table scan and remove posts that are order than 48 hours by using the Balch Write ltem API operation. Schedule a cron job on an Amazon EC2 instance once an hour to start the script.

B.  

For each item add a new attribute of type. String that has a timestamp that its set to the blog post creation time. Create a script to find old posts with a table scan and remove posts that are Oder than 48 hours by using the Batch Write item API operating. Place the script in a container image. Schedule an Amazon Elastic Container Service (Amazon ECS) task on AWS Far gate that invokes the container every 5 minutes.

C.  

For each item, add a new attribute of type Date that has a timestamp that is set to 48 hours after the blog post creation time. Create a global secondary index (GSI) that uses the new attribute as a sort key. Create an AWS Lambda function that references the GSI and removes expired items by using the Batch Write item API operation Schedule me function with an Amazon CloudWatch event every minute.

D.  

For each item add a new attribute of type. Number that has timestamp that is set to 48 hours after the blog post. creation time Configure the DynamoDB table with a TTL that references the new attribute.

Discussion 0
Questions 94

A developer migrated a legacy application to an AWS Lambda function. The function uses a third-party service to pull data with a series of API calls at the end of each month. The function than processes the data to generate the monthly reports. The function has Been working with no issues so far.

The third-party service recently issued a restriction to allow a feed number to API calls each minute and each day. If the API calls exceed the limit tor each minute or each day, then the service will produce errors. The API also provides the minute limit and daily limit in the response header. This restriction might extend the overall process to multiple days because the process is consuming more API calls than the available limit.

What is the MOST operationally efficient way to refactor the server less application to accommodate this change?

Options:

A.  

Use an AWS Step Functions State machine to monitor API failures. Use the Wait state to delay calling the Lambda function.

B.  

Use an Amazon Simple Queue Service (Amazon SQS) queue to hold the API calls. Configure the Lambda function to poll the queue within the API threshold limits.

C.  

Use an Amazon CloudWatch Logs metric to count the number of API calls. Configure an Amazon CloudWatch alarm flat slops the currently running instance of the Lambda function when the metric exceeds the API threshold limits.

D.  

Use Amazon Kinesis Data Firehose to batch me API calls and deliver them to an Amazon S3 bucket win an event notification to invoke the Lambda function.

Discussion 0
Questions 95

A company is creating a new feature for existing software. Before the company fully releases a new version of the software, the company wants to test the feature.

The company needs to gather feedback about the feature from a small group of users while the current software version remains deployed. If the testing validates the feature, the company needs to deploy the new software version to all other users at the same time.

Which deployment strategy will meet these requirements?

Options:

A.  

All-at-once deployment

B.  

Canary deployment

C.  

In-place deployment

D.  

Linear deployment

Discussion 0
Questions 96

A company is using an Amazon API Gateway REST API endpoint as a webhook to publish events from an on-premises source control management (SCM) system to Amazon EventBridge. The company has configured an EventBridge rule to listen for the events and to control application deployment in a central AWS account. The company needs to receive the same events across multiple receiver AWS accounts.

How can a developer meet these requirements without changing the configuration of the SCM system?

Options:

A.  

Deploy the API Gateway REST API to all the required AWS accounts. Use the same custom domain name for all the gateway endpoints so that a single SCM webhook can be used for all events from all accounts.

B.  

Deploy the API Gateway REST API to all the receiver AWS accounts. Create as many SCM webhooks as the number of AWS accounts.

C.  

Grant permission to the central AWS account for EventBridge to access the receiver AWS accounts. Add an EventBridge event bus on the receiver AWS accounts as the targets to the existing EventBridge rule.

D.  

Convert the API Gateway type from REST API to HTTP API.

Discussion 0
Questions 97

A company has an Amazon API Gateway REST API that integrates with an AWS Lambda function. The API’s development stage references a Lambda development alias named dev.

A developer needs to make a production alias of the Lambda function named prod available through the API.

Which solution meets these requirements?

Options:

A.  

Create a new method on the API named production. Configure the method to include a stage variable that points to the prod Lambda alias.

B.  

Create a new method on the API named production. Configure an integration request on the development stage that points to the prod Lambda alias.

C.  

Deploy the API to a new stage named production. Configure the stage to include a stage variable that points to the prod Lambda alias.

D.  

Deploy the API to a new stage named production. Configure an integration request on the production stage that points directly to the prod Lambda alias.

Discussion 0
Questions 98

A developer is managing an application that uploads user files to an Amazon S3 bucket named companybucket. The company wants to maintain copies of all the files uploaded by users for compliance purposes, while ensuring users still have access to the data through the application.

Which IAM permissions should be applied to users to ensure they can create but not remove files from the bucket?

Options:

A.  

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:GetObject " , " s3:PutObject " , " s3:DeleteObject " ], " Resource " : [ " arn:aws:s3:::companybucket " ]}] }

B.  

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:CreateBucket " , " s3:GetBucketLocation " ], " Resource " : " arn:aws:s3:::companybucket " }]}

C.  

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:GetObject " , " s3:PutObject " , " s3:DeleteObject " , " s3:PutObjectRetention " ], " Resource " : " arn:aws:s3:::companybucket " }]}

D.  

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:GetObject " , " s3:PutObject " ], " Resource " : [ " arn:aws:s3:::companybucket " ]}] }

Discussion 0
Questions 99

A developer is designing a serverless application for a game in which users register and log in through a web browser The application makes requests on behalf of users to a set of AWS Lambda functions that run behind an Amazon API Gateway HTTP API

The developer needs to implement a solution to register and log in users on the application ' s sign-in page. The solution must minimize operational overhead and must minimize ongoing management of user identities.

Which solution will meet these requirements ' ?

Options:

A.  

Create Amazon Cognito user pools for external social identity providers Configure 1AM roles for the identity pools.

B.  

Program the sign-in page to create users ' 1AM groups with the 1AM roles attached to the groups

C.  

Create an Amazon RDS for SQL Server DB instance to store the users and manage the permissions to the backend resources in AWS

D.  

Configure the sign-in page to register and store the users and their passwords in an Amazon DynamoDB table with an attached IAM policy.

Discussion 0
Questions 100

A company has an application that stores data in Amazon RDS instances. The application periodically experiences surges of high traffic that cause performance problems.

During periods of peak traffic, a developer notices a reduction in query speed in all database queries.

The team ' s technical lead determines that a multi-threaded and scalable caching solution should be used to offload the heavy read traffic. The solution needs to improve performance.

Which solution will meet these requirements with the LEAST complexity?

Options:

A.  

Use Amazon ElastiCache for Memcached to offload read requests from the main database.

B.  

Replicate the data to Amazon DynamoD

B.  

Set up a DynamoDB Accelerator (DAX) cluster.

C.  

Configure the Amazon RDS instances to use Multi-AZ deployment with one standby instance. Offload read requests from the main database to the standby instance.

D.  

Use Amazon ElastiCache for Redis to offload read requests from the main database.

Discussion 0
Questions 101

A developer needs to write an AWS CloudFormation template on a local machine and deploy a CloudFormation stack to AWS.

What must the developer do to complete these tasks?

Options:

A.  

Install the AWS CLI. Configure the AWS CLI by using an I AM user name and password.

B.  

Install the AWS CLI. Configure the AWS CLI by using an SSH key.

C.  

Install the AWS CLI. Configure the AWS CLI by using an 1AM user access key and secret key.

D.  

Install an AWS software development kit (SDK). Configure the SDK by using an X.509 certificate.

Discussion 0
Questions 102

A company hosts a stateless web application with low data storage in a single AWS Region. The company wants to increase the resiliency of the application to include a multi-Region presence. The company wants to set the recovery time objective (RTO) and recovery point objective (RPO) to hours. The company needs a low-cost and low-complexity disaster recovery (DR) strategy.

Which DR strategy should the company use?

Options:

A.  

Warm standby

B.  

Pilot light

C.  

Backup and restore

D.  

Multi-site active-active

Discussion 0
Questions 103

A social media application stores millions of video clips in Amazon S3 and serves them to users worldwide. Traffic is highly variable and can spike to more than 10,000 PUT and GET requests per second . Users report poor video streaming quality .

Which solution will provide the LARGEST improvement in performance ?

Options:

A.  

Configure an Amazon Route 53 geolocation routing policy.

B.  

Use Amazon S3 Cross-Region Replication.

C.  

Use S3 Intelligent-Tiering.

D.  

Create an Amazon CloudFront distribution with Amazon S3 as the origin.

Discussion 0
Questions 104

A real-time messaging application uses Amazon API Gateway WebSocket APIs with backend HTTP service. A developer needs to build a feature in the application to identify a client that keeps connecting to and disconnecting from the WebSocket connection. The developer also needs the ability to remove the client

Which combination of changes should the developer make to the application to meet these requirements? (Select TWO.)

Options:

A.  

Switch to HTTP APIs in the backend service.

B.  

Switch to REST APIs in the backend service.

C.  

Use the callback URL to disconnect the client from the backend service.

D.  

Add code to track the client status in Amazon ElastiCache in the backend service.

E.  

Implement $connect and $disconnect routes in the backend service.

Discussion 0
Questions 105

A company has an application that is based on Amazon EC2. The company provides API access to the application through Amazon API Gateway and uses Amazon DynamoDB to store the application ' s data. A developer is investigating performance issues that are affecting the application. During peak usage, the application is overwhelmed by a large number of identical data read requests that come through APIs. What is the MOST operationally efficient way for the developer to improve the application ' s performance?

Options:

A.  

Use DynamoDB Accelerator (DAX) to cache database responses.

B.  

Configure Amazon EC2 Auto Scaling policies to meet fluctuating demand.

C.  

Enable API Gateway caching to cache API responses.

D.  

Use Amazon ElastiCache to cache application responses.

Discussion 0
Questions 106

A developer is writing a serverless application that requires an AWS Lambda function to be invoked every 10 minutes.

What is an automated and serverless way to invoke the function?

Options:

A.  

Deploy an Amazon EC2 instance based on Linux, and edit its /etc/confab file by adding a command to periodically invoke the lambda function

B.  

Configure an environment variable named PERIOD for the Lambda function. Set the value to 600.

C.  

Create an Amazon EventBridge rule that runs on a regular schedule to invoke the Lambda function.

D.  

Create an Amazon Simple Notification Service (Amazon SNS) topic that has a subscription to the Lambda function with a 600-second timer.

Discussion 0
Questions 107

A developer is creating a mobile app that calls a backend service by using an Amazon API Gateway REST API. For integration testing during the development phase, the developer wants to simulate different backend responses without invoking the backend service.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Create an AWS Lambda function. Use API Gateway proxy integration to return constant HTTP responses.

B.  

Create an Amazon EC2 instance that serves the backend REST API by using an AWS CloudFormation template.

C.  

Customize the API Gateway stage to select a response type based on the request.

D.  

Use a request mapping template to select the mock integration response.

Discussion 0
Questions 108

A developer is creating an AWS Lambda function that consumes messages from an Amazon Simple Queue Service (Amazon SQS) standard queue. The developer notices that the Lambda function processes some messages multiple times.

How should developer resolve this issue MOST cost-effectively?

Options:

A.  

Change the Amazon SQS standard queue to an Amazon SQS FIFO queue by using the Amazon SQS message deduplication ID.

B.  

Set up a dead-letter queue.

C.  

Set the maximum concurrency limit of the AWS Lambda function to 1

D.  

Change the message processing to use Amazon Kinesis Data Streams instead of Amazon SQS.

Discussion 0
Questions 109

A developer is creating an application that must transfer expired items from Amazon DynamoDB to Amazon S3. The developer sets up the DynamoDB table to automatically delete items after a specific TTL. The application must process the items in DynamoDB and then must store the expired items in Amazon S3. The entire process, including item processing and storage in Amazon S3, will take 5 minutes.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Configure DynamoDB Accelerator (DAX) lo query for expired items based on the TTL Save the results to Amazon S3.

B.  

Configure DynamoDB Streams to invoke an AWS Lambda function. Program the Lambda function to process the items and to store the expired items in Amazon S3.

C.  

Deploy a custom application on an Amazon Elastic Container Service (Amazon ECS) cluster on Amazon EC2 instances. Program the custom application to process the items and to store the expired items in Amazon S3.

D.  

Create an Amazon EventBridge rule to invoke an AWS Lambda function. Program the Lambda function to process The items and to store the expired items in Amazon S3.

Discussion 0
Questions 110

A developer has designed an application to store incoming data as JSON files in Amazon S3 objects. Custom business logic in an AWS Lambda function then transforms the objects, and the Lambda function loads the data into an Amazon DynamoDB table. Recently, the workload has experienced sudden and significant changes in traffic. The flow of data to the DynamoDB table is becoming throttled.

The developer needs to implement a solution to eliminate the throttling and load the data into the DynamoDB table more consistently.

Which solution will meet these requirements?

Options:

A.  

Refactor the Lambda function into two functions. Configure one function to transform the data and one function to load the data into the DynamoDB table. Create an Amazon Simple Queue Service (Amazon SQS) queue in between the functions to hold the items as messages and to invoke the second function.

B.  

Turn on auto scaling for the DynamoDB table. Use Amazon CloudWatch to monitor the table ' s read and write capacity metrics and to track consumed capacity.

C.  

Create an alias for the Lambda function. Configure provisioned concurrency for the application to use.

D.  

Refactor the Lambda function into two functions. Configure one function to store the data in the DynamoDB table. Configure the second function to process the data and update the items after the data is stored in DynamoDB. Create a DynamoDB stream to invoke the second function after the data isstored.

Discussion 0
Questions 111

A company has an application that consists of different microservices that run inside an AWS account. The microservices are running in containers inside a single VPC. The number of microservices is constantly increasing. A developer must create a central logging solution for application logs.

Options:

A.  

Create a different Amazon CloudWatch Logs stream for each microservice.

B.  

Create an AWS CloudTrail trail to log all the API calls.

C.  

Configure VPC Flow Logs to track the communications between the microservices.

D.  

Use AWS Cloud Map to map the interactions of the microservices.

Discussion 0
Questions 112

A company ' s developer has deployed an application in AWS by using AWS CloudFormation. The CloudFormation stack includes parameters in AWS Systems Manager Parameter Store that the application uses as configuration settings. The application can modify the parameter values.

When the developer updated the stack to create additional resources with tags, the developer noted that the parameter values were reset and that the values ignored the latest changes made by the application. The developer needs to change the way the company deploys the CloudFormation stack. The developer also needs to avoid resetting the parameter values outside the stack.

Which solution will meet these requirements with the LEAST development effort?

Options:

A.  

Modify the CloudFormation stack to set the deletion policy to Retain for the Parameter Store parameters.

B.  

Create an Amazon DynamoDB table as a resource in the CloudFormation stack to hold configuration data for the application. Migrate the parameters that the application is modifying from Parameter Store to the DynamoDB table.

C.  

Create an Amazon RDS DB instance as a resource in the CloudFormation stack. Create a table in the database for parameter configuration. Migrate the parameters that the application is modifying from Parameter Store to the configuration table.

D.  

Modify the CloudFormation stack policy to deny updates on Parameter Store parameters.

Discussion 0
Questions 113

A developer maintains a serverless application that uses an Amazon API Gateway REST API to invoke an AWS Lambda function by using a non-proxy integration. The Lambda function returns data, which is stored in Amazon DynamoDB.

Several application users begin to receive intermittent errors from the API. The developer examines Amazon CloudWatch Logs for the Lambda function and discovers several ProvisionedThroughputExceededException errors.

The developer needs to resolve the errors and ensure that the errors do not reoccur.

Options:

A.  

Use provisioned capacity mode for the DynamoDB table, and assign sufficient capacity units. Configure the Lambda function to retry requests with exponential backoff.

B.  

Update the REST API to send requests on an Amazon SQS queue. Configure the Lambda function to process requests from the queue.

C.  

Configure a usage plan for the REST API.

D.  

Update the REST API to invoke the Lambda function asynchronously.

Discussion 0
Questions 114

A company is building a serverless application composed of multiple AWS Lambda functions. The company wants to accelerate feature development without adding staff or reducing quality . The solution must improve unit tests and code reviews , integrate with the existing IDE , and require no new infrastructure .

Which solution will meet these requirements?

Options:

A.  

Use AWS CodeBuild with custom scripts for unit tests and Amazon CodeGuru Reviewer for code reviews.

B.  

Use Amazon CodeGuru for code reviews and a custom Lambda-based solution for unit tests.

C.  

Use AWS CodeBuild for tests and rely on manual pull request reviews.

D.  

Use Amazon Q Developer Pro to generate unit tests and perform code reviews directly in the IDE.

Discussion 0
Questions 115

A developer is building an ecommerce application that uses AWS Lambda functions. Each Lambda function performs a specific step in a customer order workflow, such as order processing and inventory management. The developer must ensure that the Lambda functions run in a specific order.

Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.  

Configure an Amazon SQS queue to contain messages about each step that a Lambda function must perform. Configure the Lambda functions to run sequentially based on the order of messages in the SQS queue.

B.  

Configure an Amazon SNS topic to contain notifications about each step that a Lambda function must perform. Subscribe the Lambda functions to the SNS topic. Use subscription filters based on the step that each Lambda function must perform.

C.  

Configure an AWS Step Functions state machine to invoke the Lambda functions in a specific order.

D.  

Configure Amazon EventBridge Scheduler schedules to invoke the Lambda functions in a specific order.

Discussion 0
Questions 116

A company has a web application that contains an Amazon API Gateway REST API. A developer has created an AWS CloudFormation template for the initial deployment of the application. The developer has deployed the application successfully as part of an AWS CodePipeline continuous integration and continuous delivery (CI/CD) process. All resources and methods are available through the deployed stage endpoint.

The CloudFormation template contains the following resource types:

• AWS::ApiGateway::RestApi

• AWS::ApiGateway::Resource

• AWS::ApiGateway::Method

• AWS:ApiGateway::Stage

• AWS::ApiGateway:;Deployment

The developer adds a new resource to the REST API with additional methods and redeploys the template. CloudFormation reports that the deployment is successful and that the stack is in the UPDATE_COMPLETE state. However, calls to all new methods are returning 404 (Not Found) errors.

What should the developer do to make the new methods available?

Options:

A.  

Specify the disable-rollback option during the update-stack operation.

B.  

Unset the Cloud Forma lion stack failure options.

C.  

Add an AWS CodeBuild stage lo CodePipeline to run the aws apigateway create-deployment AWS CLI command.

D.  

Add an action to CodePipeline to run the aws cloudfront create-invalidation AWS CLI command.

Discussion 0
Questions 117

A developer is migrating some features from a legacy monolithic application to use AWS Lambda functions instead. The application currently stores data in an Amazon Aurora DB cluster that runs in private subnets in a VPC. The AWS account has one VPC deployed. The Lambda functions and the DB cluster are deployed in the same AWS Region in the same AWS account.

The developer needs to ensure that the Lambda functions can securely access the DB cluster without crossing the public internet.

Which solution will meet these requirements?

Options:

A.  

Configure the DB cluster ' s public access setting to Yes.

B.  

Configure an Amazon RDS database proxy for the Lambda functions.

C.  

Configure a NAT gateway and a security group for the Lambda functions.

D.  

Configure the VPC, subnets, and a security group for the Lambda functions.

Discussion 0
Questions 118

A developer is modifying a large-scale IoT application that stores device telemetry data in an Amazon DynamoDB table. The telemetry data is valuable only for a limited time, but the application stores the data indefinitely. Data storage is slowing the application down. The developer needs a solution to improve the performance of the application.

Which solution will meet this requirement in the MOST operationally efficient way?

Options:

A.  

Create an AWS Lambda function to run an Amazon EventBridge job on a schedule to scan the DynamoDB table for old items and to delete them.

B.  

Archive old data in an Amazon S3 bucket. Set up an S3 Lifecycle policy to transition old data to a more cost-effective storage class.

C.  

Set a TTL attribute for the telemetry data. Activate TTL on the DynamoDB table.

D.  

Change the table to on-demand capacity mode.

Discussion 0
Questions 119

A developer writes an AWS Lambda function that processes new object uploads to an Amazon S3 bucket. The Lambda function runs for approximately 30 seconds. The function runs as expected under normal load conditions. Other Lambda functions in the AWS account also run as expected. Occasionally, up to 500 new objects are written to the bucket every minute. Each new object write invokes the processing Lambda function during the high-volume periods through an event. The developer must ensure that the processing function will continue to run as expected during the high-volume periods. Which solution will meet this requirement?

Options:

A.  

Modify the function ' s timeout setting.

B.  

Add an additional layer to optimize the code execution.

C.  

Configure a reserved concurrency quota for the function.

D.  

Decrease the function’s memory allocation.

Discussion 0
Questions 120

A company is creating a new application that gives users the ability to upload and share short video files. The average size of the video files is 10 MB. After a user uploads a file, a message needs to be placed into an Amazon Simple Queue Service (Amazon SQS) queue so the file can be processed. The files need to be accessible for processing within 5 minutes.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.  

Write the files to Amazon S3 Glacier Deep Archive. Add the S3 location of the files to the SQS queue.

B.  

Write the files to Amazon S3 Standard. Add the S3 location of the files to the SQS queue.

C.  

Write the files to an Amazon Elastic Block Store (Amazon EBS) General Purpose SSD volume. Add the EBS location of the files to the SQS queue.

D.  

Write messages that contain the contents of the uploaded files to the SQS queue.

Discussion 0
Questions 121

A developer is building a microservice that uses AWS Lambda to process messages from an Amazon Simple Queue Service (Amazon SQS) standard queue. The Lambda function calls external APIs to enrich the SOS message data before loading the data into an Amazon Redshift data warehouse. The SOS queue must handle a maximum of 1.000 messages per second.

During initial testing, the Lambda function repeatedly inserted duplicate data into the Amazon Redshift table. The duplicate data led to a problem with data analysis. All duplicate messages were submitted to the queue within 1 minute of each other.

How should the developer resolve this issue?

Options:

A.  

Create an SOS FIFO queue. Enable message deduplication on the SOS FIFO queue.

B.  

Reduce the maximum Lambda concurrency that the SOS queue can invoke.

C.  

Use Lambda ' s temporary storage to keep track of processed message identifiers.

D.  

Configure a message group ID for every sent message. Enable message deduplication on the SQS standard queue.

Discussion 0
Questions 122

A developer at a company needs to create a small application that makes the same API call once each day at a designated time. The company does not have infrastructure in the AWS Cloud yet, but the company wants to implement this functionality on AWS.

Which solution meets these requirements in the MOST operationally efficient manner?

Options:

A.  

Use a Kubernetes cron job that runs on Amazon Elastic Kubernetes Service (Amazon EKS).

B.  

Use an Amazon Linux crontab scheduled job that runs on Amazon EC2.

C.  

Use an AWS Lambda function that is invoked by an Amazon EventBridge scheduled event.

D.  

Use an AWS Batch job that is submitted to an AWS Batch job queue.

Discussion 0
Questions 123

A developer is deploying an AWS Lambda function The developer wants the ability to return to older versions of the function quickly and seamlessly.

How can the developer achieve this goal with the LEAST operational overhead?

Options:

A.  

Use AWS OpsWorks to perform blue/green deployments.

B.  

Use a function alias with different versions.

C.  

Maintain deployment packages for older versions in Amazon S3.

D.  

Use AWS CodePipeline for deployments and rollbacks.

Discussion 0
Questions 124

A company ' s development team uses an SSH key pair to copy files among a large fleet of development servers. The SSH key pair has been compromised. A developer has generated a replacement key pair. The company has deployed the AWS Systems Manager Agent (SSM Agent) and the Amazon CloudWatch agent on all of the development servers.

The developer needs a solution to distribute the new key to all the Linux servers.

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.  

Create an Amazon S3 bucket. Store the public key in the root of the S3 bucket. Log in to each server. Copy the private key from the S3 bucket to the appropriate directory of each server.

B.  

Create an Amazon S3 bucket. Store the public key in the root of the S3 bucket. Create a script to copy the private key from the S3 bucket to the appropriate directory of each server. Use Systems Manager Run Command to run the script on all Linux servers.

C.  

Upload the new SSH key pair to AWS Secrets Manager as a new secret. Grant the team members permissions to download the secret into the appropriate directory of each server.

D.  

Upload the new SSH key pair to AWS Systems Manager Parameter Store. Make each key a new parameter. Grant the team members permissions to download the parameters into the appropriate directory of each server.

Discussion 0
Questions 125

A company ' s developer has deployed an application in AWS by using AWS CloudFormation The CloudFormation stack includes parameters in AWS Systems Manager Parameter Store that the application uses as configuration settings. The application can modify the parameter values

When the developer updated the stack to create additional resources with tags, the developer noted that the parameter values were reset and that the values ignored the latest changes made by the application. The developer needs to change the way the company deploys the CloudFormation stack. The developer also needs to avoid resetting the parameter values outside the stack.

Which solution will meet these requirements with the LEAST development effort?

Options:

A.  

Modify the CloudFormation stack to set the deletion policy to Retain for the Parameter Store parameters.

B.  

Create an Amazon DynamoDB table as a resource in the CloudFormation stack to hold configuration data for the application Migrate the parameters that the application is modifying from Parameter Store to the DynamoDB table

C.  

Create an Amazon RDS DB instance as a resource in the CloudFormation stack. Create a table in the database for parameter configuration. Migrate the parameters that the application is modifying from Parameter Store to the configuration table

D.  

Modify the CloudFormation stack policy to deny updates on Parameter Store parameters

Discussion 0
Questions 126

An application uses an Amazon DynamoDB table to manage user profiles. A UserID attribute is the primary key of the table. The table also includes columns named Username, EmailAddress, RegistrationDate, Location, and Status.

The application needs to display a list of users from a specific location who registered after a specific date. Queries on the table must be optimized for efficiency.

Which solution will meet these requirements?

Options:

A.  

Create a global secondary index (GSI). Use Location as the partition key and RegistrationDate as the sort key. Use the Query operation to retrieve the specified users.

B.  

Use the Scan operation to retrieve the specified users. Use a filter expression for a value in the RegistrationDate column that is greater than the date required by the application.

C.  

Create a local secondary index (LSI). Use Location as the partition key and RegistrationDate as the sort key. Use the Query operation to retrieve the specified users.

D.  

Use the BatchGetItem operation with a filter on the RegistrationDate column for a value that is greater than the required date to retrieve the specified users.

Discussion 0
Questions 127

A company ' s application has an AWS Lambda function that processes messages from loT devices. The company wants to monitor the Lambda function to ensure that the Lambda function is meeting its required service level agreement (SLA).

A developer must implement a solution to determine the application ' s throughput in near real time. The throughput must be based on the number of messages that the Lambda function receives and processes in a given time period. The Lambda function performs initialization and post-processing steps that must not factor into the throughput measurement.

What should the developer do to meet these requirements?

Options:

A.  

Use the Lambda function ' s ConcurrentExecutions metric in Amazon CloudWatch to measure the throughput.

B.  

Modify the application to log the calculated throughput to Amazon CloudWatch Logs. Use Amazon EventBridge to invoke a separate Lambda function to process the logs on a schedule.

C.  

Modify the application to publish custom Amazon CloudWatch metrics when the Lambda function receives and processes each message. Use the metrics to calculate the throughput.

D.  

Use the Lambda function ' s Invocations metric and Duration metric to calculate the throughput in Amazon CloudWatch.

Discussion 0
Questions 128

A developer is writing a new serverless application for a company. Several other developers must collaborate on the code for this application, and the company expects frequent changes to the code. The developer needs to deploy the code from source control to AWS Lambda with the fewest number of manual steps.

Which strategy for the build and deployment should the developer use to meet these requirements?

Options:

A.  

Build the code locally, and then upload the code into the source control system. When a release is needed, run AWS CodePipeline to extract the uploaded build and deploy the resources.

B.  

Use the AWS SAM CLI to build and deploy the application from the developer ' s local machine with the latest version checked out locally.

C.  

Use AWS CodeBuild and AWS CodePipeline to invoke builds and corresponding deployments when configured source-controlled branches have pull requests merged into them.

D.  

Use the Lambda console to upload a .zip file of the application that is created by the AWS SAM CLI build command.

Discussion 0
Questions 129

An application interacts with Amazon Aurora to store and track customer information. The primary database is set up with multiple read replicas for improving the performance of the read queries. However, one of the Aurora replicas is receiving most or all of the traffic, while the other Aurora replica remains idle.

How can this issue be resolved?

Options:

A.  

Disable application-level DNS caching.

B.  

Enable application-level DNS caching.

C.  

Enable application pooling.

D.  

Disable application pooling.

Discussion 0
Questions 130

A developer is creating an AWS Serverless Application Model (AWS SAM) template. The AWS SAM template contains the definition of multiple AWS Lambda functions, an Amazon S3 bucket, and an Amazon CtoudFront distribution. One of the Lambda functions runs on Lambda@Edge in the CloudFront distribution. The S3 bucket is configured as an origin for the CloudFront distribution.

When the developer deploys the AWS SAM template in the eu-west-1 Region, the creation of the stack fails.

Which of the following could be the reason for this issue?

Options:

A.  

CloudFront distributions can be created only in the us-east-1 Region.

B.  

Lambda@Edge functions can be created only in the us-east-1 Region.

C.  

A single AWS SAM template cannot contain multiple Lambda functions.

D.  

The CloudFront distribution and the S3 bucket cannot be created in the same Region.

Discussion 0
Questions 131

A developer is writing an application that will retrieve sensitive data from a third-party system. The application will format the data into a PDF file. The PDF file could be more than 1 MB. The application will encrypt the data to disk by using AWS Key Management Service (AWS KMS). The application will decrypt the file when a user requests to download it. The retrieval and formatting portions of the application are complete.

The developer needs to use the GenerateDataKey API to encrypt the PDF file so that the PDF file can be decrypted later. The developer needs to use an AWS KMS symmetric customer managed key for encryption.

Which solutions will meet these requirements?

Options:

A.  

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

B.  

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

C.  

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

D.  

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

Discussion 0
Questions 132

A company regularly receives route status updates from its delivery trucks as events in Amazon EventBridge. The company is building an API-based application in a VPC that will consume and process the events to create a delivery status dashboard. The API application must not be available by using public IP addresses because of security and compliance requirements.

How should the company send events from EventBridge to the API application?

Options:

A.  

Create an AWS Lambda function that runs in the same VPC as the API application. Configure the function as an EventBridge target. Use the function to send events to the API.

B.  

Create an internet-facing Application Load Balancer (ALB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the ALB as an EventBridge target.

C.  

Create an internet-facing Network Load Balancer (NLB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the NLB as an EventBridge target.

D.  

Use the application API endpoint in the VPC as a target for EventBridge. Send events directly to the application API endpoint from EventBridge.

Discussion 0
Questions 133

A developer is using an AWS Lambda function to generate avatars for profile pictures that are uploaded to an Amazon S3 bucket. The Lambda function is automatically invoked for profile pictures that are saved under the /original/ S3 prefix. The developer notices that some pictures cause the Lambda function to time out. The developer wants to implement a fallback mechanism by using another Lambda function that resizes the profile picture.

Which solution will meet these requirements with the LEAST development effort?

Options:

A.  

Set the image resize Lambda function as a destination of the avatar generator Lambda function for the events that fail processing.

B.  

Create an Amazon Simple Queue Service (Amazon SQS) queue. Set the SQS queue as a destination with an on failure condition for the avatar generator Lambda function. Configure the image resize Lambda function to poll from the SQS queue.

C.  

Create an AWS Step Functions state machine that invokes the avatar generator Lambda function and uses the image resize Lambda function as a fallback. Create an Amazon EventBridge rule that matches events from the S3 bucket to invoke the state machine.

D.  

Create an Amazon Simple Notification Service (Amazon SNS) topic. Set the SNS topic as a destination with an on failure condition for the avatar generator Lambda function. Subscribe the image resize Lambda function to the SNS topic.

Discussion 0
Questions 134

A developer created several AWS Lambda functions that write data to a single Amazon S3 bucket. The developer configured all the Lambda functions to send logs and metrics to Amazon CloudWatch.

The developer receives reports that one of the Lambda functions writes data to the bucket very slowly. The developer needs to measure the latency between the problematic Lambda function and the S3 bucket.

Which solution will meet this requirement?

Options:

A.  

Enable AWS X-Ray on the Lambda function. In the generated trace map. select the line between Lambda and Amazon S3.

B.  

Query the Lambda function ' s log file in Amazon CloudWatch Logs Insights. Return the average of the auto-discovered ©duration field.

C.  

Enable CloudWatch Lambda Insights on the function. View the latency graph that CloudWatch Lambda Insights provides.

D.  

Enable AWS X-Ray on the Lambda function. Select Amazon S3 in the latency graph to view the latency histogram.

Discussion 0
Questions 135

A company uses a custom root certificate authority certificate chain (Root CA Cert) that is 10 KB in size generate SSL certificates for its on-premises HTTPS endpoints. One of the company’s cloud based applications has hundreds of AWS Lambda functions that pull date from these endpoints. A developer updated the trust store of the Lambda execution environment to use the Root CA Cert when the Lambda execution environment is initialized. The developer bundled the Root CA Cert as a text file in the Lambdas deployment bundle.

After 3 months of development the root CA Cert is no longer valid and must be updated. The developer needs a more efficient solution to update the Root CA Cert for all deployed Lambda functions. The solution must not include rebuilding or updating all Lambda functions that use the Root CA Cert. The solution must also work for all development, testing and production environment. Each environment is managed in a separate AWS account.

When combination of steps Would the developer take to meet these environments MOST cost-effectively? (Select TWO)

Options:

A.  

Store the Root CA Cert as a secret in AWS Secrets Manager. Create a resource-based policy. Add IAM users to allow access to the secret

B.  

Store the Root CA Cert as a Secure Sting parameter in aws Systems Manager Parameter Store Create a resource-based policy. Add IAM users to allow access to the policy.

C.  

Store the Root CA Cert in an Amazon S3 bucket. Create a resource- based policy to allow access to the bucket.

D.  

Refactor the Lambda code to load the Root CA Cert from the Root CA Certs location. Modify the runtime trust store inside the Lambda function handler.

E.  

Refactor the Lambda code to load the Root CA Cert from the Root CA Cert ' s location. Modify the runtime trust store outside the Lambda function handler.

Discussion 0
Questions 136

A developer is working on an ecommerce website The developer wants to review server logs without logging in to each of the application servers individually. The website runs on multiple Amazon EC2 instances, is written in Python, and needs to be highly available

How can the developer update the application to meet these requirements with MINIMUM changes?

Options:

A.  

Rewrite the application to be cloud native and to run on AWS Lambda, where the logs can be reviewed in Amazon CloudWatch

B.  

Set up centralized logging by using Amazon OpenSearch Service, Logstash, and OpenSearch Dashboards

C.  

Scale down the application to one larger EC2 instance where only one instance is recording logs

D.  

Install the unified Amazon CloudWatch agent on the EC2 instances Configure the agent to push the application logs to CloudWatch

Discussion 0
Questions 137

A developer created a Node.js-based AWS Lambda function by using a container image of an AWS OS-only base image. There is a new security patch for Node.js that must be patched to the new Lambda function.

Which solution will meet this requirement?

Options:

A.  

Set the runtime update mode of the Lambda function to Auto.

B.  

Patch the runtime version by redeploying the same version of the Lambda function.

C.  

Rebuild the Lambda container code with the latest version of the AWS OS base image. Publish a new version of the Lambda function.

D.  

Rebuild the Lambda container code with the latest Node.js patch version. Publish a new version of the Lambda function.

Discussion 0
Questions 138

A developer is creating an Amazon DynamoDB table by using the AWS CLI The DynamoDB table must use server-side encryption with an AWS owned encryption key

How should the developer create the DynamoDB table to meet these requirements?

Options:

A.  

Create an AWS Key Management Service (AWS KMS) customer managed key. Provide the key ' s Amazon Resource Name (ARN) in the KMSMasterKeyld parameter during creation of the DynamoDB table

B.  

Create an AWS Key Management Service (AWS KMS) AWS managed key Provide the key ' s Amazon Resource Name (ARN) in the KMSMasterKeyld parameter during creation of the DynamoDB table

C.  

Create an AWS owned key Provide the key ' s Amazon Resource Name (ARN) in the KMSMasterKeyld parameter during creation of the DynamoDB table.

D.  

Create the DynamoDB table with the default encryption options

Discussion 0
Questions 139

A company is migrating legacy internal applications to AWS. Leadership wants to rewrite the internal employee directory to use native AWS services. A developer needs to create a solution for storing employee contact details and high-resolution photos for use with the new application.

Which solution will enable the search and retrieval of each employee ' s individual details and high-resolution photos using AWS APIs?

Options:

A.  

Encode each employee ' s contact information and photos using Base64. Store the information in an Amazon DynamoDB table using a sort key.

B.  

Store each employee ' s contact information in an Amazon DynamoDB table along with the object keys for the photos stored in Amazon S3.

C.  

Use Amazon Cognito user pools to implement the employee directory in a fully managed software-as-a-service (SaaS) method.

D.  

Store employee contact information in an Amazon RDS DB instance with the photos stored in Amazon Elastic File System (Amazon EFS).

Discussion 0
Questions 140

A developer is deploying an application on Amazon EC2 instances that run in Account A. In certain cases, this application needs to read data from a private Amazon S3 bucket in Account B. The developer must provide the application access to the S3 bucket without exposing the S3 bucket to anyone else.

Which combination of actions should the developer take to meet these requirements? (Select TWO.)

Options:

A.  

Create an IAM role with S3 read permissions in Account B.

B.  

Update the instance profile IAM role in Account A with S3 read permissions.

C.  

Make the S3 bucket public with limited access for Account A.

D.  

Configure the bucket policy in Account B to grant permissions to the instance profile role.

E.  

Add a trust policy that allows s3:Get* permissions to the IAM role in Account B.

Discussion 0
Questions 141

A developer is building an application that stores sensitive user data. The application includes an Amazon CloudFront distribution and multiple AWS Lambda functions that handle user requests.

User requests contain more than 20 data fields. Each application transaction includes sensitive data that must be encrypted. Only specific parts of the application must be able to decrypt the data.

Which solution will meet these requirements?

Options:

A.  

Associate the CloudFront distribution with a Lambda@Edge function. Configure the function to perform field-level asymmetric encryption by using a user-defined RSA public key stored in AWS KMS.

B.  

Integrate AWS WAF with CloudFront and use a Lambda function with self-managed keys to encrypt and decrypt the data.

C.  

Configure the CloudFront distribution to use field-level encryption. Create an asymmetric AWS KMS key and configure CloudFront to use the key.

D.  

Configure CloudFront to require HTTPS and require users to access content by using signed URLs or signed cookies.

Discussion 0
Questions 142

An application that runs on AWS Lambda requires access to specific highly confidential objects in an Amazon S3 bucket. In accordance with the principle of least privilege a company grants access to the S3 bucket by using only temporary credentials.

How can a developer configure access to the S3 bucket in the MOST secure way?

Options:

A.  

Hardcode the credentials that are required to access the S3 objects in the application code. Use the credentials to access me required S3 objects.

B.  

Create a secret access key and access key ID with permission to access the S3 bucket. Store the key and key ID in AWS Secrets Manager. Configure the application to retrieve the Secrets Manager secret and use the credentials to access me S3 objects.

C.  

Create a Lambda function execution role Attach a policy to the rote that grants access to specific objects in the S3 bucket.

D.  

Create a secret access key and access key ID with permission to access the S3 bucket Store the key and key ID as environment variables m Lambda. Use the environment variables to access the required S3 objects.

Discussion 0
Questions 143

A developer is creating a microservices application that runs across multiple compute environments. The application must securely access secrets that are stored in AWS Secrets Manager with minimal network latency. The developer wants a solution that reduces the number of direct calls to Secrets Manager and simplifies secrets management across environments. Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.  

Create a custom script that retrieves secrets directly from Secrets Manager and caches the secrets in a local database for each compute environment.

B.  

Install the Secrets Manager Agent in each compute environment. Configure the agent to cache secrets locally. Securely retrieve the secrets from Secrets Manager as needed.

C.  

Implement lazy loading logic in the application to fetch secrets directly from Secrets Manager and to cache the secrets in Redis.

D.  

Store the secrets in an Amazon S3 bucket. Retrieve and load the secrets as environment variables during application startup for each compute environment.

Discussion 0
Questions 144

An application reads data from an Amazon Aurora global database with clusters in two AWS Regions. Database credentials are stored in AWS Secrets Manager in the primary Region and are rotated regularly.

The application must be able to run in both Regions and remain highly available .

Which combination of actions will meet these requirements? (Select TWO.)

Options:

A.  

Configure the application to retrieve database credentials from the secret in the primary Region.

B.  

Replicate the secret to the secondary Region and configure the application to retrieve credentials from the replica secret.

C.  

Replicate the secret and promote the replica to a standalone secret.

D.  

Store the database endpoint and credentials as a secret and connect to the secret.

E.  

Store credentials in environment variables in the secondary Region.

Discussion 0
Questions 145

An ecommerce company is using an AWS Lambda function behind Amazon API Gateway as its application tier. To process orders during checkout, the application calls a POST API from the frontend. The POST API invokes the Lambda function asynchronously. In rare situations, the application has not processed orders. The Lambda application logs show no errors or failures.

What should a developer do to solve this problem?

Options:

A.  

Inspect the frontend logs for API failures. Call the POST API manually by using the requests from the log file.

B.  

Create and inspect the Lambda dead-letter queue. Troubleshoot the failed functions. Reprocess the events.

C.  

Inspect the Lambda logs in Amazon CloudWatch for possible errors. Fix the errors.

D.  

Make sure that caching is disabled for the POST API in API Gateway.

Discussion 0
Questions 146

A developer is storing sensitive data generated by an application in Amazon S3. The developer wants to encrypt the data at rest. A company policy requires an audit trail of when the AWS Key Management Service (AWS KMS) key was used and by whom.

Which encryption option will meet these requirements?

Options:

A.  

Server-side encryption with Amazon S3 managed keys (SSE-S3)

B.  

Server-side encryption with AWS KMS managed keys (SSE-KMS}

C.  

Server-side encryption with customer-provided keys (SSE-C)

D.  

Server-side encryption with self-managed keys

Discussion 0
Questions 147

A company has an Amazon S3 bucket containing premier content that it intends to make available to only paid subscribers of its website. The S3 bucket currently has default permissions of all objects being private to prevent inadvertent exposure of the premier content to non-paying website visitors.

How can the company Limit the ability to download a premier content file in the S3 Bucket to paid subscribers only?

Options:

A.  

Apply a bucket policy that allows anonymous users to download the content from the S3 bucket.

B.  

Generate a pre-signed object URL for the premier content file when a pad subscriber requests a download.

C.  

Add a Docket policy that requires multi-factor authentication for request to access the S3 bucket objects.

D.  

Enable server-side encryption on the S3 bucket for data protection against the non-paying website visitors.

Discussion 0
Questions 148

A developer compiles an AWS Lambda function and packages the result as a .zip file. The developer uses the Functions page on the Lambda console to attempt to upload the local packaged .zip file. When pushing the package to Lambda, the console returns the following error:

Which solutions can the developer use to publish the code? (Select TWO.)

Options:

A.  

Upload the package to Amazon S3. Use the Functions page on the Lambda console to upload the package from the S3 location.

B.  

Create an AWS Support ticket to increase the maximum package size.

C.  

Use the update-function-code AWS CLI command. Pass the -publish parameter.

D.  

Repackage the Lambda function as a Docker container image. Upload the image to Amazon Elastic Container Registry {Amazon ECR). Create a new Lambda function by using the Lambda console. Reference the image that is deployed to Amazon ECR.

E.  

Sign the .zip file digitally. Create a new Lambda function by using the Lambda console. Update the configuration of the new Lambda function to include the Amazon Resource Name (ARN) of the code signing configuration.

Discussion 0
Questions 149

A developer needs to troubleshoot an AWS Lambda function in a development environment. The Lambda function is configured in VPC mode and needs to connect to an existing Amazon RDS for SOL Server DB instance. The DB instance is deployed in a private subnet and accepts connections by using port 1433.

When the developer tests the function, the function reports an error when it tries to connect to the database.

Which combination of steps should the developer take to diagnose this issue? (Select TWO.)

Options:

A.  

Check that the function ' s security group has outbound access on port 1433 to the DB instance ' s security group. Check that the DB instance ' s security group has inbound access on port 1433 from the function ' s security group.

B.  

Check that the function ' s security group has Inbound access on port 1433 from the DB Instance ' s security group. Check that the DB instance ' s security group has outbound access on port 1433 to the function ' s security group.

C.  

Check that the VPC is set up for a NAT gateway. Check that the DB instance has the public access option turned on.

D.  

Check that the function ' s execution role permissions include rds:DescribeDBInstances, rds: ModifyDB Instance, and rds:DescribeDBSecurityGroups for the DB instance.

E.  

Check that the function ' s execution rote permissions include ec2: CreateNetworklnterface. ec2: DescribeNetworklnterfaces. and ec2: DeleteNetworklnterface.

Discussion 0
Questions 150

A developer is building an application to process a stream of customer orders. The application sends processed orders to an Amazon Aurora MySQL database. The application needs to process the orders in batches.

The developer needs to configure a workflow that ensures each record is processed before the application sends each order to the database.

Options:

Options:

A.  

Use Amazon Kinesis Data Streams to stream the orders. Use an AWS Lambda function to process the orders. Configure an event source mapping for the Lambda function, and set the MaximumBatchingWindowInSeconds setting to 300.

B.  

Use Amazon SQS to stream the orders. Use an AWS Lambda function to process the orders. Configure an event source mapping for the Lambda function, and set the MaximumBatchingWindowInSeconds setting to 0.

C.  

Use Amazon Managed Streaming for Apache Kafka (Amazon MSK) to stream the orders. Use an Amazon EC2 instance to process the orders. Configure an event source mapping for the EC2 instance, and increase the payload size limit to 36 MB.

D.  

Use Amazon DynamoDB Streams to stream the orders. Use an Amazon ECS cluster on AWS Fargate to process the orders. Configure an event source mapping for the cluster, and set the BatchSize setting to 1.

Discussion 0
Questions 151

A developer is deploying an application on Amazon EC2 instances that run in Account A. The application needs to read data from an existing Amazon Kinesis data stream in Account B.

Which actions should the developer take to provide the application with access to the stream? (Select TWO.)

Options:

A.  

Update the instance profile role in Account A with stream read permissions.

B.  

Create an IAM role with stream read permissions in Account

B.  

C.  

Add a trust policy to the instance profile role and IAM role in Account B to allow the instance profile role to assume the IAM role.

D.  

Add a trust policy to the instance profile role and IAM role in Account B to allow reads from the stream.

E.  

Add a resource-based policy in Account B to allow read access from the instance profile role.

Discussion 0
Questions 152

A company has an application that runs across multiple AWS Regions. The application is experiencing performance issues at irregular intervals. A developer must use AWS X-Ray to implement distributed tracing for the application to troubleshoot the root cause of the performance issues.

What should the developer do to meet this requirement?

Options:

A.  

Use the X-Ray console to add annotations for AWS services and user-defined services

B.  

Use Region annotation that X-Ray adds automatically for AWS services Add Region annotation for user-defined services

C.  

Use the X-Ray daemon to add annotations for AWS services and user-defined services

D.  

Use Region annotation that X-Ray adds automatically for user-defined services Configure X-Ray to add Region annotation for AWS services

Discussion 0
Questions 153

A company uses Amazon DynamoDB as a data store for its order management system. The company frontend application stores orders in a DynamoDB table. The DynamoDB table is configured to send change events to a DynamoDB stream. The company uses an AWS Lambda function to log and process the incoming orders based on data from the DynamoDB stream.

An operational review reveals that the order quantity of incoming orders is sometimes set to 0. A developer needs to create a dashboard that will show how many unique customers this problem affects each day.

What should the developer do to implement the dashboard?

Options:

A.  

Grant the Lambda function ' s execution role permissions to upload logs to Amazon CloudWatch Logs. Implement a CloudWatch Logs Insights query that selects the number of unique customers for orders with order quantity equal to 0 and groups the results in 1-day periods. Add the CloudWatch Logs Insights query to a CloudWatch dashboard.

B.  

Use Amazon Athena to query AWS CtoudTrail API logs for API calls. Implement an Athena query that selects the number of unique customers for orders with order quantity equal to 0 and groups the results in 1-day periods. Add the Athena query to an Amazon CloudWatch dashboard.

C.  

Configure the Lambda function to send events to Amazon EventBridge. Create an EventBridge rule that groups the number of unique customers for orders with order quantity equal to 0 in 1-day periods. Add a CloudWatch dashboard as the target of the rule.

D.  

Turn on custom Amazon CloudWatch metrics for the DynamoDB stream of the DynamoOB table. Create a CloudWatch alarm that groups the number of unique customers for orders with order quantity equal to 0 in 1-day periods. Add the CloudWatch alarm to a CloudWatch dashboard.

Discussion 0
Questions 154

A company wants to use AWS AppConfig to gradually deploy a new feature to 15% of users to test the feature before a full deployment.

Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.  

Set up a custom script within the application to randomly select 15% of users. Assign a flag for the new feature to the selected users.

B.  

Create separate AWS AppConfig feature flags for both groups of users. Configure the flags to target 15% of users.

C.  

Create an AWS AppConfig feature flag. Define a variant for the new feature, and create a rule to target 15% of users.

D.  

Use AWS AppConfig to create a feature flag without variants. Implement a custom traffic-splitting mechanism in the application code.

Discussion 0
Questions 155

A company recently deployed an AWS Lambda function. A developer notices an increase in the function throttle metrics in Amazon CloudWatch.

What are the MOST operationally efficient solutions to reduce the function throttling? (Select TWO.)

Options:

A.  

Migrate the function to Amazon EKS.

B.  

Increase the maximum age of events in Lambda.

C.  

Increase the function’s reserved concurrency.

D.  

Add the lambda:GetFunctionConcurrency action to the execution role.

E.  

Request a service quota change for increased concurrency.

Discussion 0
Questions 156

A developer is building an application that gives users the ability to view bank account from multiple sources in a single dashboard. The developer has automated the process to retrieve API credentials for these sources. The process invokes an AWS Lambda function that is associated with an AWS CloudFormation cotton resource.

The developer wants a solution that will store the API credentials with minimal operational overhead.

When solution will meet these requirements?

Options:

A.  

Add an AWS Secrets Manager GenerateSecretString resource to the CloudFormation template. Set the value to reference new credentials to the Cloudformation resource.

B.  

Use the AWS SDK ssm PutParameter operation in the Lambda function from the existing, custom resource to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set ma parameter type to SecureString.

C.  

Add an AWS Systems Manager Parameter Store resource to the CloudFormation template. Set the CloudFormation resource value to reference the new credentials Set the resource NoEcho attribute to true.

D.  

Use the AWS SDK ssm PutParameter operation in the Lambda function from the existing custom resources to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set the parameter NoEcho attribute to true.

Discussion 0
Questions 157

A developer is working on an AWS Lambda function that accesses Amazon DynamoDB. The Lambda function must retrieve an item and update some of its attributes, or create the item if it does not exist. The Lambda function has access to the primary key.

Which IAM permissions should the developer request for the Lambda function to achieve this functionality?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 158

A company is creating an application that processes csv files from Amazon S3 A developer has created an S3 bucket The developer has also created an AWS Lambda function to process the csv files from the S3 bucket

Which combination of steps will invoke the Lambda function when a csv file is uploaded to Amazon S3? (Select TWO.)

Options:

A.  

Create an Amazon EventBridge rule Configure the rule with a pattern to match the S3 object created event

B.  

Schedule an Amazon EventBridge rule to run a new Lambda function to scan the S3 bucket.

C.  

Add a trigger to the existing Lambda function. Set the trigger type to EventBridge Select the Amazon EventBridge rule.

D.  

Create a new Lambda function to scan the S3 bucket for recently added S3 objects

E.  

Add S3 Lifecycle rules to invoke the existing Lambda function

Discussion 0
Questions 159

A developer is building an application that stores objects in an Amazon S3 bucket. The bucket does not have versioning enabled. The objects are accessed rarely after 1 week. However, the objects must be immediately available at all times.

The developer wants to optimize storage costs for the S3 bucket.

Which solution will meet this requirement?

Options:

A.  

Create an S3 Lifecycle rule to expire objects after 7 days.

B.  

Create an S3 Lifecycle rule to transition objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 7 days.

C.  

Create an S3 Lifecycle rule to transition objects to S3 Glacier Flexible Retrieval after 7 days.

D.  

Create an S3 Lifecycle rule to delete objects that have delete markers.

Discussion 0
Questions 160

A developer is building an application that includes an AWS Lambda function that is written in .NET Core. The Lambda function ' s code needs to interact with Amazon DynamoDB tables and Amazon S3 buckets. The developer must minimize the Lambda function ' s deployment time and invocation duration.

Which solution will meet these requirements?

Options:

A.  

Increase the Lambda function ' s memory.

B.  

Include the entire AWS SDK for .NET in the Lambda function ' s deployment package.

C.  

Include only the AWS SDK for .NET modules for DynamoDB and Amazon S3 in the Lambda function ' s deployment package.

D.  

Configure the Lambda function to download the AWS SDK for .NET from an S3 bucket at runtime.

Discussion 0
Questions 161

A developer has implemented an AWS Lambda function that inserts new customers into an Amazon RDS database. The function is expected to run hundreds of times each hour. The function and RDS database are in the same VPC. The function is configured to use 512 MB of RAM and is based on the following pseudocode:

def lambda_handler(event, context):

db = database.connect()

db.statement( " INSERT INTO Customers (CustomerName) VALUES (%s) " , event.name)

db.execute()

db.close()

After successfully testing the function multiple times, the developer notices that the execution time is longer than expected.

What should the developer do to improve performance?

Options:

A.  

Increase the reserved concurrency of the Lambda function.

B.  

Increase the size of the RDS database to facilitate an increased number of database connections each hour.

C.  

Move the database connection and close statement out of the handler. Place the connection in the global space.

D.  

Replace Amazon RDS with Amazon DynamoDB to implement control over the number of writes per second.

Discussion 0
Questions 162

A company is developing a serverless application by using AWS Lambda functions. One of the Lambda functions needs to access an Amazon RDS DB instance. The DB instance is in a private subnet inside a VPC.

The company creates a role that includes the necessary permissions to access the DB instance. The company then assigns the role to the Lambda function. A developer must take additional action to give the Lambda function access to the DB instance.

What should the developer do to meet these requirements?

Options:

A.  

Assign a public IP address to the DB instance. Modify the security group of the DB instance to allow inbound traffic from the IP address of the Lambda function.

B.  

Set up an AWS Direct Connect connection between the Lambda function and the DB instance.

C.  

Configure an Amazon CloudFront distribution to create a secure connection between the Lambda function and the DB instance.

D.  

Configure the Lambda function to connect to the private subnets in the VPC. Add security group rules to allow traffic to the DB instance from the Lambda function.

Discussion 0
Questions 163

A developer is creating an application that uses an AWS Lambda function to transform and load data from an Amazon S3 bucket. When the developer tests the application, the developer finds that some invocations of the Lambda function are slower than others.

The developer needs to update the Lambda function to have predictable invocation durations that run with low latency. Any initialization activities, such as loading libraries and instantiating clients, must run during allocation time rather than during actual function invocations.

Which combination of steps will meet these requirements? (Select TWO.)

Options:

A.  

Create a schedule group in Amazon EventBridge Scheduler to invoke the Lambda function.

B.  

Configure provisioned concurrency for the Lambda function to have the necessary number of execution environments.

C.  

Use the $LATEST version of the Lambda function.

D.  

Configure reserved concurrency for the Lambda function to have the necessary number of execution environments.

E.  

Deploy changes, and publish a new version of the Lambda function.

Discussion 0