ITExambyte

AWS Developer Associate Exam Questions Dumps Free

AWS Developer - Associate Exam Dumps

DomainWeightage%
Domain 1: Development with AWS Services32%
Domain 2: Security26%
Domain 3: Deployment24%
Domain 4: Troubleshooting and Optimization18%

1 / 65

1. A developer is adding Amazon ElastiCache for Memcached to a company's existing record storage application. The developer has decided to use lazy loading based on an analysis of common record handling patterns. Which pseudocode example will correctly implement lazy loading?

2 / 65

2. Which of the below functions is used in Cloudformation to retrieve an object from a set of objects? Choose an answer from the options below

3 / 65

3. After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a public subnet you modify your route tables to have the NAT device be the target of internet bound traffic of your private subnet. When you try and make an outbound connection to the Internet from an instance in the private subnet, you are not successful.
Which of the following steps could resolve the issue?

4 / 65

4. A developer migrates a web application from an on-premises data center to the AWS Cloud. Authenticated customers use the application from many different clients simultaneously, including laptops, smartphones, and tablets. The application runs on Amazon EC2 instances behind an Application Load Balancer. The instances run in an Amazon EC2 Auto Scaling group. Upon initial testing, users report that they have to reenter information when they use the web application on their laptops and then switch to using their smartphones.

Which solution will make the session state information persist across devices?

5 / 65

5. As an API developer, you have just configured an API with the AWS API gateway service. You are testing out the API and getting the below response whenever an action is made to an undefined API resource.
{ “message”: “Missing Authentication Token” }
You want to customize the error response and make it more user-readable. How can you achieve this?

6 / 65

6.

To improve their information security management system (ISMS), a company recently released a new policy which requires all database credentials to be encrypted and be automatically rotated to avoid unauthorized access.

Which of the following is the MOST appropriate solution to secure the credentials?

7 / 65

7. A Developer is building a web application that uses Amazon API Gateway to expose an AWS Lambda function to process requests from clients. During testing, the Developer notices that the API Gateway times out even though the Lambda function finishes under the set time limit.

Which of the following API Gateway metrics in Amazon CloudWatch can help the Developer troubleshoot the issue? (Choose two.)

8 / 65

8. A developer uses the AWS SDK for C++ to retrieve data from an Amazon DynamoDB table. The data is sometimes retrieved using a known key, and sometimes the key is not known, resulting in multiple items being returned. The developer wants to ensure the code returns only one item when retrieving data without keys.

Which DynamoDB setting will meet these requirements?

9 / 65

9. A user wants to launch an EC2 Instance for testing and tries to create a new EC2 Key pair also with name "test." But the test key pair is already present. What among the following options can happen?

10 / 65

10.

A developer needs to query a relational database from an AWS Lambda function. The Lambda function will be called frequently. The developer needs to avoid the latency introduced by the initial JDBC connection to the database in subsequent invocations of the Lambda function.

How can the developer ensure the database connection is reused by Lambda?

11 / 65

11.

A company is developing a Python application that submits data to an Amazon DynamoDB table. The company requires client-side encryption of specific data items and end-to-end protection for the encrypted data in transit and at rest.

Which combination of steps will meet the requirement to encrypt specific data items? (Select TWO.)

12 / 65

12. A company has an inventory system that receives sporadic inventory updates from a fulfillment system in the form of large JSON files. While many files can be sent in a short time period, days can pass when no files are sent. The company wants to process these files as soon as they arrive.

Which solution will meet these requirements?

13 / 65

13.

A company runs continuous integration/continuous delivery (CI/CD) pipeline for its application on AWS CodePipeline. A developer must write unit tests and run them as part of the pipelines before staging the artifacts for testing.
How should the Developer incorporate unit tests as part of CI/CD pipeline?

14 / 65

14. A company developed a warehouse fulfillment application by using AWS Step Functions. The Step Functions activity workers run on tablets that warehouse employees use. Some long-running activities fail because of problems with individual tablets. These problems include loss of battery power. The application must re-assign interrupted activities to another worker as soon as possible. If an activity fails three times, the state machine should fail.

Which Step Functions configuration will meet these requirements?

15 / 65

15. A developer is working on an application that stores highly confidential data in a database. The developer must use AWS Key Management Service (AWS KMS) with envelope encryption to protect the data. How should the developer configure the data encryption to meet these requirements?

16 / 65

16.

A developer has recently completed a new version of a serverless application that is ready to be deployed using AWS SAM. There is a requirement that the traffic should shift from the previous Lambda function to the new version in the shortest time possible, but you still don’t want to shift traffic all-at-once immediately.

Which deployment configuration is the MOST suitable one to use in this scenario?

17 / 65

17. An administrator is getting an error while trying to create a new bucket in S3? You feel that bucket limit has been crossed. What is the bucket limit per account in AWS? Choose the correct answer from the options below

18 / 65

18. In a multi-container Docker environment in AWS Elastic Beanstalk, what is required to configure container instances in the environment?

19 / 65

19. A developer built an application that stores data in an Amazon RDS Multi-AZ DB instance. The database performs reads and writes constantly and is responding slowly. The intensive read requests are received unpredictably several times each hour. The application cannot tolerate reading stale data. The developer must increase the retrieval speed for the intensive read requests.

Which strategy will meet these requirements?

20 / 65

20. A company is migrating a legacy application to Amazon EC2 instances. The application uses a user name and password that are stored in the source code to connect to a MySQL database. The company will migrate the database to an Amazon RDS for MySQL DB instance. As part of the migration, the company needs to implement a secure way to store and automatically rotate the database credentials. Which solution will meet these requirements?

21 / 65

21. A developer is building a new application that transforms text files to .pdf files. A separate application writes the text files to a source Amazon S3 bucket. The new application must read the files as they arrive in Amazon S3 and must convert the files to .pdf files by using an AWS Lambda function. The developer has written an IAM policy to allow access to Amazon S3 and Amazon CloudWatch Logs. What should the developer do to ensure that the Lambda function has the correct permissions?

22 / 65

22. A developer is testing an application locally and has deployed the application to an AWS Lambda function. To avoid exceeding the deployment package size quota, the developer did not include the dependencies in the deployment file. When the developer tests the application remotely, the Lambda function does not run because of missing dependencies. Which solution will resolve this issue?

23 / 65

23.

A developer writes an AWS Lambda function in Java that calls a third-party API by using an API key. The developer must keep the API key encrypted and secure from casual observation. The API key can change over time.

How can the developer meet these requirements in the MOST operationally efficient manner?

24 / 65

24. A software development team is using AWS services to automate their software release process. They have set up a CodePipeline to manage the build, test, and deployment stages of their application.
Which of the following statements best describes the purpose of AWS CodePipeline in this scenario?

25 / 65

25. A company uses an AWS Lambda function to call a third-party REST endpoint. Personally identifiable information (PII) is exposed upon a successful request. The third party that manages the REST endpoint requires the company to change the API key that the company uses to invoke the endpoint every 4 months.

The company retrieves the API key by calling an endpoint that the third party owns. The endpoint uses basic authentication (username and password). The new API key is available and active one month prior to the inactivation of the old API key. When the company retrieves the new API key, the company needs to store the key for use in future invocations of the REST endpoint. The company needs a secure solution that eliminates downtime while the company sets up the new API key.

Which solution will meet these requirements?

26 / 65

26. An ecommerce company deploys more than 20 services behind Amazon API Gateway. The interaction between services is complex. Each service can potentially call several others, making performance issues and errors difficult to identify. Some individual API calls have experienced slow response times. The development team needs to quickly identify the underlying causes of the slowdowns.

Which approach would MOST quickly identify the underlying cause of performance issues?

27 / 65

27. A company is writing a Lambda function that will run in multiple stages, such a dev, test, and production. The function is dependent upon several external services, and it must call different endpoints for these services based on the function’s deployment stage.
What Lambda feature will enable the developer to ensure that the code references the correct endpoints when running in each stage?

28 / 65

28. A Lambda function processes data before sending it to a downstream service Each piece of data is approximately 1 MB in size After a security audit, the function t]is now required to encrypt the data before sending it downstream Which API call is required to perform the encryption?

29 / 65

29.

A developer works in an environment with multiple AWS accounts that have AWS Lambda functions processing the same 100 KB payloads. The developer wants to centralize the point of origin of the payloads to one account and have all the Lambda functions be invoked whenever the initiating event occurs in the parent account.
How can the developer design the workflow in the MOST efficient way, so all the multi- account Lambda functions get invoked when the event occurs?

30 / 65

30. A developer tests code running on the developer's laptop. The code is using the AWS SDK for Python (Boto3) to access AWS services. The .aws/credentials file is set up with the user's IAM user name and password. The developer runs the code and receives this error message:

An error occurred (InvalidAccessKeyId)

Which action will resolve this error?

31 / 65

31. What can be used in DynamoDB as a part of the Query API call for the filtration of results based on the primary keys’ values? Choose an answer from the options below

32 / 65

32. A company notices performance degradation in one of its production web applications. The application is running on AWS services and uses a microservices architecture. The company suspects that one of these microservices is causing the performance issue.

Which AWS solution should the company use to identify the service that is contributing to higher application latency?

33 / 65

33.

A developer is preparing a deployment package using AWS Cloud Formation. The package consists of two separate templates: one for the infrastructure and one for the application. The application has to be inside the VPC that is created from the infrastructure template
How can the application stack refer to the VPC created from the infrastructure template?

34 / 65

34. A developer builds an application that uses the AWS SDK for Python (Boto3) to query an Amazon DynamoDB table. When the application is tested on an Amazon EC2 instance, the application returns this error message:

"An error occurred (AccessDenied) when calling the operation"

The EC2 instance is associated with an existing IAM role named myRole.

Which set of actions would resolve this error?

35 / 65

35. You are using AWS SAM to define a Lambda function and configure CodeDeploy to manage deployment patterns. With the new Lambda function working as per expectation which of the following will shift traffic from the original Lambda function to the new Lambda function in the shortest time frame?

36 / 65

36.

A programmer is developing a Node.js application that will be run on a Linux server in their on-premises data center. The application will access various AWS services such as S3, DynamoDB, and ElastiCache using the AWS SDK.

Which of the following is the MOST suitable way to provide access for the developer to accomplish the specified task?

37 / 65

37. A company is using Amazon API Gateway for its REST APIs in an AWS account. A developer wants to allow only IAM users from another AWS account to access the APIs. Which combination of steps should the developer take to meet these requirements? (Select TWO.)

38 / 65

38. A company hosts its web application backend on Amazon Elastic Container Service (Amazon ECS). The application's Amazon ECS tasks run behind an Application Load Balancer (ALB). The application supports three environments: production, testing, and development. The application uses the ALB to route traffic to the correct environment.

The company has configured three listener rules for the ALB to forward traffic to a different target group based on the port number (Port 80 for production target group, Port 8080 for testing target group, and Port 8081 for development target group).

The company decides to migrate the application backend to a serverless architecture by using an Amazon API Gateway API backed by AWS Lambda functions. The company plans to use the URI path pattern to access the desired environment instead of the port number. The company has created the Lambda functions for the application backend. Each Lambda function has three aliases (production, testing, and development).

Which option includes the next steps the company must take to complete the process?

39 / 65

39. A developer is building a web application that uses Amazon API Gateway. The developer wants to maintain different environments for development (dev) and production (prod) workloads. The API will be backed by an AWS Lambda function with two aliases: one for dev and one for prod. How can the developer maintain these environments with the LEAST amount of configuration?

40 / 65

40. An application will ingest data at a very high throughput from many sources and must store the data in an Amazon S3 bucket.
Which service would BEST accomplish this task?

41 / 65

41. A developer is adding sign-up and sign-in functionality to an application. The application must make an API call to a custom analytics solution to log user sign-in events. Which combination of actions should the developer perform to meet these requirements? (Select TWO.)

42 / 65

42. A developer is creating a serverless web application and maintains different branches of code The developer wants to avoid updating the Amazon API Gateway target endpoint each time a new code push is performed What solution would allow me developer to perform a code push efficiently, without the need to update the API Gateway?

43 / 65

43. According to best practice, how should access keys be managed in AWS? (Choose two.)

44 / 65

44. A developer is creating a new application that will be accessed by users through an API created using Amazon API Gateway The users need to be authenticated by a third-party Security Assertion Markup Language (SAML) identity provider Once authenticated, users will need access to other AWS services such as Amazon S3 and Amazon DynamoDB

How can these requirements be met?

45 / 65

45. A company maintains an application responsible for processing several thousand external
callbacks each day. The company's System administrators want to know how many callbacks are being received on a rolling basis, and they want this data available for 10 days. The company also wants the ability to issue automated alerts if the number of callbacks exceeds the defined thresholds.
What is the MOST cost-effective way to address the need to track and alert on these statistics?

46 / 65

46. A developer wants to monitor invocations of an AWS Lambda function by using Amazon CloudWatch Logs. The developer added a number of print statements to the function code that write the logging information to the stdout stream. After running the function, the developer does not see any log data being generated.

Why does the log data NOT appear in the CloudWatch logs?

47 / 65

47. A developer is using Amazon S3 as the event source that invokes a Lambda function when new objects are created in the bucket The event source mapping Information Is stored in the bucket notification configuration The developer is working with different versions of the Lambda function, and has a constant need to update notification configuration so that Amazon S3 invokes the correct version.
What is the MOST efficient and effective way to achieve mapping Between the S3 event and Lambda?

48 / 65

48. A developer is creating a web application that must give users the ability to post comments and receive feedback in near real time. Which solutions will meet these requirements? (Select TWO.)

49 / 65

49. Your application is developed to pick up metrics from several servers and push them off to CloudWatch. At times, the application gets client 429 errors. Which of the following can be done from the programming side to resolve such errors?

50 / 65

50.

A company has a REST application comprised of an Amazon API Gateway and several AWS Lambda functions. A developer is responding to an alert that the API Gateway's HTTP response error rate has unexpectedly increased. The developer must determine must which Lambda function is malfunctioning.
Which method would help the developer make this determination while minimizing delays?

51 / 65

51. Your team has currently developed an application using Docker containers. As the development lead, you now need to host this application in AWS. You also need to ensure that the AWS service has orchestration services built-in. Which of the following can be used for this purpose?

52 / 65

52. A software development team is working on a web application that consists of front-end and back-end components. They want to automate the process of building, testing, and deploying their application using AWS services.
Which stage in the AWS CodePipeline would typically be responsible for running unit tests and integration tests to ensure the quality of the application before deployment?

53 / 65

53. A developer wants to deploy an AWS Serverless Application Model (AWS SAM) application with the AWS SAM CLI. The developer is using the AWS CLI in an AWS Cloud9 environment for deployment and has run the sam build command to prepare the application for deployment. The next day, the developer connects to the same AWS Cloud9 environment and attempts to deploy the application. The sam deploy command returns the following error:

Invalid (or missing) template file (path must be workspace-relative, or absolute)

How can the developer resolve this error?

54 / 65

54. A developer wants to track the performance of an application that runs on a fleet of Amazon EC2 instances. The developer wants to view and track statistics, such as the average request latency and the maximum request latency, across the fleet. The developer wants to receive immediate notification if the average response time exceeds a threshold. Which solution will meet these requirements?

55 / 65

55. A developer has written several custom applications that read and write to the same Amazon DynamoDB table. Each time the data in the DynamoDB table is modified, this change should be sent to an external API.

Which combination of steps should the developer perform to accomplish this task? (Select TWO.)

56 / 65

56. A company has an application that uses Amazon Cognito user pools as an identity provider. The company must secure access to user records. The company I up multi-factor
authentication (MFA). The company also wants to send a login activity notification by email every time a user logs in.
What is the MOST operationally efficient solution that meets this requirement?

57 / 65

57. A developer is working on an ecommerce website. The developer wants to review server logs without logging in to each of the application servers individually. The website runs on multiple Amazon EC2 instances, is written in Python, and needs to be highly available.
How can the developer update the application to meet these requirements with MINIMUM changes?

58 / 65

58. A development team is using AWS Elastic Beanstalk to deploy a two-tier application that consists of a load-balanced web tier and an Amazon RDS database tier in production. The team would like to separate the RDS instance from the Elastic Beanstalk.
How can this be accomplished?

59 / 65

59. A developer configures AWS CodeDeploy to install an application on Amazon EC2 instances in an Amazon EC2 Auto Scaling group.

Where should the developer place the appspec.yml file?

60 / 65

60. A developer needs to modify an application architecture to meet new functional requirements. Application data is stored in Amazon DynamoDB and processed for analysis in a rightly batch. The system analysts do not want to wait unit the next day to view the processed data and have asked to have it available in near-real time.

Which application architect pattern would enables the data to be processed as it is received?

61 / 65

61. Which of the descriptions below best describes what the following bucket policy does?

{
“Version”:”2012-10-17″,
“Id”:”Statement1”,
“Statement”:[
{
“Sid”:” Statement2″,
“Effect”:”Allow”,
“Principal”:”*”,
“Action”:[
“s3:GetObject”,
“s3:PutObject”
],
“Resource”:”arn:aws:s3:::mybucket/*”,
“Condition”:{
“StringLike”:{
“aws:Referer”:[
“http://www.example.com/*”,
“http://www.demo.com/*”
]
}
}
}
]
}

62 / 65

62. Each time a developer publishes a new version of an AWS Lambda function, all the dependent event source mappings need to be updated with the reference to the new version’s Amazon Resource Name (ARN). These updates are time consuming and error-prone.

Which combination of actions should the developer take to avoid performing these updates when publishing a new Lambda version? (Select TWO.)

63 / 65

63. A company is working on a project to enhance its serverless application development process. The company hosts applications on AWS Lambda. The development team regularly updates the Lambda code and wants to use stable code in production.

Which combination of steps should the development team take to configure Lambda functions to meet both development and production requirements? (Select TWO.)

64 / 65

64.

A developer is using Amazon DynamoDB to store application data . The developer wants to further improve application performance by reducing response limes for read and write operations.
Which DynamoDB feature should be used to meet these requirement?

65 / 65

65. A web application is uploading large files, which are over 4 GB in size, in an S3 bucket called http://data.tutorialsdojo.com every 30 minutes. You want to minimize the time required to upload each file. Which of the following should you do to minimize upload time?

Your score is

The average score is 43%

0%

Scroll to Top