AWS Developer Associate certification questions and exam summary helps you to get focused on the exam. This guide also helps you to be on AWS-CDA exam track to get certified with good score in the final exam. The AWS Certified Developer Associate exam is intended for individuals who perform a Developer role.
It validates an examinee’s ability to:
AWS Developer Associate Certification DVA-C01 Exam Syllabus: 1. Deployment (22%)
DVA-C01 Certification Summary
AWS Developer Associate Certification Exam Sample Questions: AWS Developer Associate Certification Sample questions are provided for each exam to illustrate the various question types that may appear. For some credentials, a practice exam is also available. DVA-C01 Sample Questions: Question:01. You have reached your account limit for the number of CloudFormation stacks in a region. How do you increase your limit? a) Use the AWS Command Line Interface. b) Send an email to [email protected] with the subject “CloudFormation.” c) Use the Support Center in the AWS Management Console. d) All service limits are fixed and cannot be increased. Question:02. Which of the following statements about SQS is true? a) Messages will be delivered exactly once and messages will be delivered in First in, First out order b) Messages will be delivered exactly once and message delivery order is indeterminate c) Messages will be delivered one or more times and messages will be delivered in First in, First out order d) Messages will be delivered one or more times and message delivery order is indeterminate Question:03. Your application is trying to upload a 6 GB file to Simple Storage Service and receive a "Your proposed upload exceeds the maximum allowed object size." error message. What is a possible solution for this? a) None, Simple Storage Service objects are limited to 5 GB b) Use the multi-part upload API for this object c) Use the large object upload API for this object d) Contact support to increase your object size limit e) Upload to a different region Question:04. Which operation could return temporarily inconsistent results? a) Getting an object from Amazon S3 after it was initially created b) Selecting a row from an Amazon RDS database after it was inserted c) Selecting a row from an Amazon RDS database after it was deleted d) Getting an object from Amazon S3 after it was deleted Question:05. A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in users can only access an S3 keyspace specific to the user. Which two approaches can satisfy the objectives? a) The application authenticates against LDAP. The application then calls the IAM Security Service to login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to access the appropriate S3 bucket. b) The application authenticates against LDAP, and retrieves the name of an IAM role associated with the user. The application then calls the IAM Security Token Service to assume that IAM Role. The application can use the temporary credentials to access the appropriate S3 bucket. c) The application authenticates against IAM Security Token Service using the LDAP credentials. The application uses those temporary AWS security credentials to access the appropriate S3 bucket. d) Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token Service to get IAM federated user credentials. The application calls the identity broker to get IAM federated user credentials with access to the appropriate S3 bucket. e) Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM Role to get temporary AWS security credentials. The application calls the identity broker to get AWS temporary security credentials with access to the appropriate S3 bucket. Question:06. Your CloudFormation template launches a two-tier web application in us-east-1. When you attempt to create a development stack in us-west-1, the process fails. What could be the problem? a) The AMIs referenced in the template are not available in us-west-1. b) The IAM roles referenced in the template are not valid in us-west-1. c) Two ELB Classic Load Balancers cannot have the same Name tag. d) CloudFormation templates can be launched only in a single region. Question:07. What is one key difference between an Amazon EBS-backed and an instance-store backed instance? a) Instance-store backed instances can be stopped and restarted b) Auto scaling requires using Amazon EBS-backed instances c) Amazon EBS-backed instances can be stopped and restarted d) Virtual Private Cloud requires EBS backed instances Question:08. You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that it has been successfully stored. You then immediately make another API call and attempt to read this object. S3 tells you that the object does not exist. What could explain this behavior? a) US-STANDARD uses eventual consistency and it can take time for an object to be readable in a bucket. b) Objects in Amazon S3 do not become visible until they are replicated to a second region. c) US-STANDARD imposes a 1 second delay before new objects are readable d) You exceeded the bucket object limit, and once this limit is raised the object will be visible. Question:09. EC2 instances are launched from Amazon Machine Images (AMIs). A given public AMI: a) can be used to launch EC2 instances in any AWS region b) can only be used to launch EC2 instances in the same country as the AMI is stored c) can only be used to launch EC2 instances in the same AWS region as the AMI is stored d) can only be used to launch EC2 instances in the same AWS availability zone as the AMI is stored Question:10. Your application must write to an SQS queue. Your corporate security policies require that AWS credentials are always encrypted and are rotated at least once a week. How can you securely provide credentials that allow your application to write to the queue? a) Have the application fetch an access key from an Amazon S3 bucket at run time. b) Launch the application's Amazon EC2 instance with an IAM role. c) Encrypt an access key in the application source code. d) Enroll the instance in an Active Directory domain and use AD authentication. Answers: Question: 01 Answer: c Question: 02 Answer: d Question: 03 Answer: b Question: 04 Answer: d Question: 05 Answer: b, d Question: 06 Answer: a Question: 07 Answer: c Question: 08 Answer: a Question: 09 Answer: c Question: 10 Answer: b How to Register for AWS Developer Associate Certification Exam?
0 Comments
Leave a Reply. |
|