Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

AWS-Certified-Developer-Associate AWS Certified Developer Associate Exam (DVA-C02) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

AWS-Certified-Developer-Associate Practice Questions

AWS Certified Developer Associate Exam (DVA-C02)

Last Update 5 days ago
Total Questions : 368

Dive into our fully updated and stable AWS-Certified-Developer-Associate practice test platform, featuring all the latest AWS Certified Developer Associate exam questions added this week. Our preparation tool is more than just a Amazon study aid; it's a strategic advantage.

Our free AWS Certified Developer Associate practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about AWS-Certified-Developer-Associate. Use this test to pinpoint which areas you need to focus your study on.

AWS-Certified-Developer-Associate PDF

AWS-Certified-Developer-Associate PDF (Printable)
$52.5
$150

AWS-Certified-Developer-Associate Testing Engine

AWS-Certified-Developer-Associate PDF (Printable)
$70
$200

AWS-Certified-Developer-Associate PDF + Testing Engine

AWS-Certified-Developer-Associate PDF (Printable)
$104.65
$299
Question # 31

A developer is writing an application that will process data delivered into an Amazon S3 bucket. The data is delivered approximately 10 times a day, and the developer expects the data will be processed in less than 1 minute, on average.

How can the developer deploy and invoke the application with the lowest cost and lowest latency?

Options:

A.  

Deploy the application as an AWS Lambda function and invoke it with an Amazon CloudWatch alarm triggered by an S3 object upload

B.  

Deploy the application as an AWS Lambda function and invoke it with an S3 event notification

C.  

Deploy the application as an AWS Lambda function and invoke it with an Amazon CloudWatch scheduled event

D.  

Deploy the application onto an Amazon EC2 instance and have it poll the S3 bucket for new objects.

Discussion 0
Question # 32

An IAM role is attached to an Amazon EC2 instance that explicitly denies access to all Amazon S3 API actions. The EC2 instance credentials file specifies the IAM access key and secret access key, which allow full administrative access.

Given that multiple modes of IAM access are present for this EC2 instance, which of the following is correct?

Options:

A.  

The EC2 instance will only be able to list the S3 buckets

B.  

The EC2 instance will only be able to list the contents of one S3 bucket at a time

C.  

The EC2 instance will be able to perform all actions on any S3 bucket

D.  

The EC2 instance will not be able to perform any S3 action on any S3 bucket.

Discussion 0
Question # 33

A developer is designing a distributed application built using a microservices architect spanning multiple AWS accounts. The company's operations team wants to analyze and debug application issues from a centralized account.

How can the developer meet these requirements?

Options:

A.  

Use an Amazon X-Ray agent with role assumption on to publish data into the centralized account.

B.  

Use Amazon X-Ray and create a new IAM user to publish the access keys into the centralized account.

C.  

Use VPC Flow Logs to collect application logs across different accounts.

D.  

Enable AWS CloudTrail to publish the trails in an Amazon S3 bucket in the centralized account.

Discussion 0
Question # 34

A developer is trying to get data from an Amazon DynamoDB table called demoman-table The developer configured the AWS CLI to use a specific 1AM user's credentials and executed the following command:

aws dynamodb get-item table-name demoman-table --key '("id": <"N''; ''1993''}} '

The command returned errors and no rows were returned

What is the MOST likely cause of these issues?

Options:

A.  

The command is incorrect; it should be rewritten to use : ut-i t am with a string argument.

B.  

The developer needs to log a ticket with AWS Support to enable access to the demoman-table.

C.  

Amazon DynamoDB cannot be accessed from the AWS CLI and needs to be called via the REST API

D.  

The 1AM user needs an associated policy with read access to demoman-table.

Discussion 0
Question # 35

A developer is leveraging a Border Gateway Protocol (BGP)-based AWS VPN connection to connect from on-premises to Amazon EC2 instances in the developer's account The developer is able to access an EC2 instance in subnet A, but is unable to access an EC2 instance in subnet B in the same VPC

Which logs can the developer use to verify whether the traffic is reaching subnet B?

Options:

A.  

VPN logs

B.  

BGP logs

C.  

VPC Flow Logs

D.  

AWS CloudTrail logs

Discussion 0
Question # 36

Which of the following are good use cases for how Amazon ElastiCache can help an application? (Select TWO.)

Options:

A.  

Improve the performance of S3 PUT operations

B.  

Improve the latency of deployments performed by AWS CodeDeploy

C.  

Improve latency and throughput for read-heavy application workloads.

D.  

Reduce the time required to merge AWS CodeCommit branches

E.  

Improve performance of compute-intensive applications.

Discussion 0
Question # 37

An application is using a custom library to make HTTP calls directly to AWS service endpoints. The application is experiencing transient errors that are causing processes to stop when each error is first encountered A request has been made to make the application more resilient by adding error retries and exponential backoff.

How should a developer implement the changes with MINIMAL custom code?

Options:

A.  

Add a Retry-After HTTP header to API requests.

B.  

Use the AWS CLI to configure the retry settings in a named profile

C.  

Change the custom library to retry on 5xx errors only

D.  

Use an AWS SDK and set retry-specific configurations.

Discussion 0
Question # 38

A company has a web application In an Amazon Elastic Container Service (Amazon ECS) cluster running hundreds of secure services in AWS Fargate containers. The services are in target groups routed by an Application Load Balancer (ALB) Application users log in to the website anonymously, but they must be authenticated using any OpenID Connect protocol-compatible identity provider (IdP) to access the secure services

Which authentication approach would meet these requirements with the LEAST amount of effort?

Options:

A.  

Configure the services to use Amazon Cognito.

B.  

Configure the ALB to use Amazon Cognito

C.  

Configure the services to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP.

D.  

Configure the Amazon ECS cluster to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP

Discussion 0
Question # 39

Which of the following statements about SWF are true? Choose 3 answers

Options:

A.  

SWF tasks are assigned once and never duplicated

B.  

SWF requires an S3 bucket for workflow storage

C.  

SWF workflow executions can last up to a year

D.  

SWF triggers SNS notifications on task assignment

E.  

SWF uses deciders and workers to complete tasks

F.  

SWF requires at least 1 EC2 instance per domain

Discussion 0
Question # 40

You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers. Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already logged in. This is not behavior you have designed.

What is a possible solution to prevent this happening?

Options:

A.  

Use instance memory to save session state.

B.  

Use instance storage to save session state.

C.  

Use EBS to save session state

D.  

Use ElastiCache to save session state.

E.  

Use Glacier to save session slate.

Discussion 0
Get AWS-Certified-Developer-Associate dumps and pass your exam in 24 hours!

Free Exams Sample Questions