AWS Certified Developer – Associate 2020-SET 4

Welcome to AWS Certified Developer - Associate QUIZ - SET 4.

Please enter your email details to get QUIZ Details on your email id.

Click on Next Button to proceed.

Enter your email ID details to get QUIZ Result
1. Which of the following services can you use to monitor and report on performance metrics for your AWS Infrastructure?
2. A Developer is designing a system where only a single server can be used to run an application. The single server will have multiple containers of a service running. Which services can be used to meet this requirement?
3. Which of the following tools can be used to determine who provisioned an EC2 instance and what time they made the API call?
4. You are running workloads on AWS and have embedded database connection strings within each web server hosting your applications. After failing a security audit you are encouraged to take a different approach where you store your secrets. Which AWS service can you use to manage your database connection strings?
5. Your client is migrating an application to the cloud that will handle thousands of requests. The application will need a load balancer and an auto scaling group and must be stateless. Which AWS service will provide an in-memory data store for your application's session state?

A team lead has asked Jacob to create an AWS CloudFormation template that creates EC2 instances and RDS databases. The template should be reusable by allowing the user to input a parameter value for an Amazon EC2 AMI ID. Which of the following intrinsic function should Jacob choose to reference the parameter?

7. An application is hosted by a 3rd party and exposed at You would like to have your users access your application using, which you own and manage under Route 53. What record should you create?
8. You are configuring your CloudFront distribution to tell CloudFront where you want content to be delivered from. When configuring settings, which protocol is not supported?

Thomas is a developer in a MNC working on an AWS CloudFormation template that will provision resources for a company's cloud infrastructure. His template is composed of three stacks which are Stack-A, Stack-B, and Stack-C. Stack-A will provision a VPC, a security group and subnets for public web applications that will be referenced in Stack-B and Stack-C. After running the stacks he decide to delete them, in which order should he should do it?

10. You want to provision your own Docker images that can be used as input sources for CodeBuild. These images will contain cached dependencies as well as special tooling for your builds that are proprietary to your company. Which of the following services will you use to send your Docker images to?

You are a Developer handling a deployment service that automates application deployments to Amazon EC2 instances. Most of the deployments consist of code, but sometimes web and configuration files. One of your deployments failed and was rolled back by AWS CodeDeploy to the last known good application revision. During rollback which of the following instances did AWS CodeDeploy deploy first to?

12. A company is undergoing a compliance audit by the government. The company has hundreds of IAM users that make API calls but specifically it needs to be determined who is making KMS API calls. Which of the following services should the audit team use?
13. You have created a target group that has marked all your EC2 instances as unhealthy. Surprisingly, when you enter the IP address of the EC2 instances in your web browser, you can access your website. What could be the reason your instances are being marked as unhealthy? (Select two)

John is a Developer for cloudVikas, that has multiple AWS accounts managed with AWS Organizations. John is in the process of creating an Amazon Simple Storage Service (S3) bucket named 'prod' in one account that will contain log files from EC2 instances in production. When creating the bucket an error message displays 'Bucket name already exists'. He check his current account for a duplicate name and none exists. What is the most likely reason for this?


Bob is a DynamoDB expert, companies in his area rely on Bob's expertise to train their developers. Bob have been hired to consult with a company that uses the NoSQL database for mobile applications. The developers are using DynamoDB to perform operations such as
GetItem but are limited in knowledge. They would like to be more efficient with retrieving some attributes rather than all. Which of the following recommendations would he provide?


Your security team is concerned that proper training on encryption was not given to the development team. They have requested your help in determining which KMS API requests are being made, including both management requests such as create/disable keys to cryptographic requests such as encrypt/decrypt. What AWS service should you use to get this information?

17. A Developer at cloudvikas company is working on a CloudFormation template to set up resources. Resources will be defined using code and provisioned based on conditions. Which section of a CloudFormation template does not allow for conditions?

John is working in a mnc company, the company has embraced cloud-native microservices architectures. New applications must be dockerized and stored in a registry service offered by AWS. The architecture should support dynamic port mapping and support multiple tasks from a single service on the same container instance. All services should run on the same EC2 instance. Which technology will best fit John's company requirements?

19. Your team lead has decided to make changes to a current application written in Node.js and running on a Linux server. The team lead would like to deploy the application to a Docker container, then decouple the application into microservices. Which AWS service is best suited for this change?

You are a Developer for a company that uses Amazon ECS container instances. You are revising agent configuration variables for tasks that were written by junior architects. You find that a setting was missed and will need to include an option in the configuration to authorize IAM roles. Which of the following options must you set?


Bob is the owner of a small company running workloads on AWS and recently lost all developers. He need to provision more resources for a client and while going through existing AWS CloudFormation templates he decide that he need to change several major sections to fulfill a request. Which of the following sections in an AWS CloudFormation template is not valid?

22. You run a SAAS company for the healthcare industry that is used worldwide where users pay a monthly subscription. There have been requests by mobile developers to expose public API's created with API Gateway. You decide to make the API's available to mobile developers as product offerings. Which feature will allow you to do that?
23. When using Web Identity Federation to allow a user to access an AWS service, which of the following is the correct order of steps?

You are developing a highly available web application using DynamoDB for its data access. What is the maximum number of attributes that can be combined in a primary key when you create the database?

25. Which of the following services can you use to monitor all API activity in your AWS account?
26. Your company has stored all application secrets in SSM Parameter Store. The audit team has requested to get a report to better understand when and who has issued API calls against SSM Parameter Store. Which AWS service can you use to produce your report?
27. Your departments have distinct AWS accounts and would like to debug and trace data across accounts and visualize it in a centralized account. What would you use to achieve that?

George is a developer working on a web application written in Java and would like to use AWS Elastic Beanstalk for deployment because it would handle deployment, capacity provisioning, load balancing, auto-scaling, and application health monitoring. In the past, he connected to his provisioned instances through SSH to issue configuration commands but instead would like a configuration file that automatically applies settings for him. Which of the following options would help do this?

29. You have launched EC2 instances hosting the same application version. Instances are launched based on traffic using an auto scaling group. Each EC2 instance is assigned an instance-id and plan on capturing this data within the application. How can this be accomplished?
30. Your company has a workflow in AWS consisting of CodePipeline and CodeBuild. In the process, CodeBuild attempts to pull Docker images from Amazon ECR and fails with an authorization error. Which of the following actions should you take?

A company that specializes in cloud communications platform as a service allows software developers to programmatically use their services to send and receive text messages. The initial platform did not have a scalable architecture as all components were hosted on one server and should be redesigned for high availability and scalability. Which of the following options can be used to implement the REST API? 

32. Your company hired an outside consultant to help with redesigning internal systems. The company wants to allow consuming applications to process nearly limitless streams of data in flight. Which solution should the outside consultant recommend?

Jacob is a Developer working for the food channel. Currently, there are 3 EC2 instances running behind an Application Load Balancer and have been asked to create a web application where web visitors enter ingredients and recipes will be generated. No complex joins would be required and IAM policies should be created for each table. Which of the following database technologies meets these requirements?

34. ######QUESTION#########
John is a developer at a university, he is encrypting a large XML payload transferred over the network using AWS KMS and wants to test the application before going to production. What is the maximum data size supported by AWS KMS?

A company has AWS Lambda functions where each is invoked by other AWS services such as Amazon Kinesis Data Firehose, Amazon API Gateway, Amazon Simple Storage Service or Amazon CloudWatch Events. What all functions have in common is that they all process heavy workloads such as big data analysis, large file processing, and statistical computations. What should you do to improve the performance of your AWS Lambda functions without changing your code?

36. Which of the following tools can you use to monitor CPU utilization metrics for your EC2 instances?
37. You have been hired as a new Developer with no experience using CloudFormation. To learn how it works you quickly create a template and upload it through the management console. You find that the template is missing a section that is required. Which section of the template is required?
38. You are the administrator for the company's AWS account that manages new users. Five new employees have been hired to a new department who will be performing the same tasks and you will need to create new IAM users for these employees. Which approach follows best practices?
39. A company would like to deploy new application versions with Elastic Beanstalk to EC2 instances. When a deployment is executed some instances should serve requests with the old version of the application, while other instances serve new requests until the deployment is completed. Which deployment does not meet this requirement without incurring costs?
40. ######QUESTION#########
Which of the following option is correct?

Author: CloudVikas