AWS Certified Developer – Associate QUIZ SET 3

Welcome to AWS Certified Developer - Associate QUIZ SET 3.

Please enter your email details to get QUIZ Details on your email id.

Click on Next Button to proceed.

Email
1. Which AWS services are tied to a region, such as (select three)
2. How can you allow a user from one AWS account to access and manage resources in another AWS account?
3.

Which of the following statements is not true for SNS?

4. Which statement best describes IAM?
5.

######QUESTION#########
When Jacob's company first created an AWS account, he began with a single sign-in principal called a root user account that had complete access to all AWS services and resources. What should he do to adhere to best practices for using the root user account?

6. When using Web Identity Federation to allow a user to access an AWS service (such as an S3 bucket), which of the following is the correct order of steps?
7.

You are a Developer working with AWS CloudFormation templates. Your templates provision a VPC with one subnet and would like other stacks to use the output value of the subnet created. What must you do to provide this information to another stack?

8. Which of the following is a benefit of using CloudFormation
9.

You are a developer working at a cloud company that embraces serverless. You have performed your initial deployment and would like to work towards adding API Gateway stages and associate them with existing deployments. Your stages will include prod, test, and dev and will match AWS Lambda function aliases. Which of the following features must you add to achieve this? 

10.

When you update your application versions, AWS Elastic Beanstalk performs an in-place update and your application becomes unavailable to users for a short period of time. Instead, you would like to redirect traffic to the new version using a DNS switch. Which deployment method will allow you to do this?

11.

######QUESTION#########
`John is working in a cloud company that has a cloud system in AWS with components that send and receive messages using SQS queues. While reviewing the system he see that it processes a lot of information and would like to be aware of any limits of the system. Which of the following is the maximum number of messages that can be stored in an SQS queue?

12. Which of the following correctly describes a Customer Managed Policy? (Choose 2)
13.

######QUESTION#########
John is a developer working on AWS Lambda functions that are triggered by Amazon API Gateway and would like to perform testing for new API versions. Which of the following features will accomplish this task?

14. What does Cognito use to create unique identities for users and authenticate them with Web ID providers?
15. Which of the following applies to an AWS Managed Policy? (Choose 3)
16. As AWS Developer ,You have to retrieve some items from a DynamoDB table using the primary key. What API call will provide better performance?


  • ​Query

  • ​GetItem


Your Team lead is developing a business intelligence application that performs analytics and your team lead wants to integrate it with a fully managed data warehouse service. What AWS DB platform is suitable for your case?

17.

######QUESTION#########
Jack is working in a cloud company , he is responsible for an application that runs on multiple Amazon EC2 instances. In front of the instances is an Internet-facing load balancer that takes requests from clients over the internet and distributes them to the EC2 instances. A health check is configured to ping the index.html page found in the root directory for the health status. When accessing the website via the internet visitors of the website receive timeout errors. What should be checked first to resolve the issue?

18. Amazon Cognito provides Web Identity Federation with which of the following features? (Choose 2)
19. You are working on a mobile phone app for an online retailer that stores customer data in DynamoDB. You would like to allow new users to sign-up using their Facebook credentials. What is the recommended approach?
20.
Which of the following features of IAM allows you to have your users Authenticate using Facebook, Google or Amazon?
21.

######QUESTION#########
Thomas created an Auto Scaling group to work with an Application Load Balancer. The scaling group is configured with a minimum size value of 5, a maximum value of 20 and a desired capacity value of 10. One of the 10 EC2 instances has been reported as unhealthy. Which of the following actions will take place?

22. In mobile company,You are developing a new mobile application to share photos, which AWS technology can you use to ensure your users have a seamless experience across all their devices?
23. What does Cognito use to manage sign-up and sign-in functionality for mobile and web applications?
24. When would you use an Inline Policy over a Managed Policy?
25. Which of the following tools can you use to monitor CPU utilization metrics for your EC2 instances?
26. Amazon Cognito is recommended for which use case?
27.

######QUESTION#########
Thomas is working in a security company, the company is requiring all developers to perform server-side encryption with customer-provided encryption keys when performing operations in AWS S3. Developers should write software with C# using the AWS SDK and implement the requirement in the PUT, GET, Head and Copy operations. Which of the following encryption methods meets this requirement?

28. Which of the following are provided by AWS to allow you to easily assign IAM permissions to your users based on pre-defined common use cases?
29. Which of the following services can be used to securely store confidential information like credentials and license codes so that they can be accessed by EC2 instances?
30.

You are a DynamoDB developer for an aerospace company that requires you to write 6 objects per second of 4.5KB in size each. What write capacity unit is needed for your project?

31.

######QUESTION#########
Jack is working on a web application front end consists of 5 EC2 instances behind an Application Load Balancer. You have configured your web application to capture the IP address of the client making requests. When viewing the data captured you notice that every IP address being captured is the same, which also happens to be the IP address of the Application Load Balancer. What should you do to identify the true IP address of the client?

32.

######QUESTION#########
Ben is working in a e-commerce company, he needs to improve its software delivery process and is moving away from the waterfall methodology. He decided that every application should be built using the best CI/CD practices and every application should be packaged and deployed as a Docker container. The Docker images should be stored in ECR and pushed with AWS CodePipeline and AWS CodeBuild. When he attempt to do this, the last step fails with an authorization issue. What is the most likely issue?

33.

A company has AWS Lambda functions where each is invoked by other AWS services such as Amazon Kinesis Data Firehose, Amazon API Gateway, Amazon Simple Storage Service or Amazon CloudWatch Events. What all functions have in common is that they all process heavy workloads such as big data analysis, large file processing, and statistical computations. What should you do to improve the performance of your AWS Lambda functions without changing your code?

34. ######QUESTION#########
Which of the following option is correct?
35.

######QUESTION#########
Jack is assigned to a project that requires the use of the AWS CLI to build a project with AWS CodeBuild. His project's root directory includes the buildspec.yml file to run build commands and would like to build artifacts encrypted. Which of the following will accomplish this?

36.

######QUESTION#########
John is working in a company , the company is new to cloud computing and would like to host a static HTML5 website on the cloud and be able to access it via domain www.mycompany.com. John
created a bucket in Amazon Simple Storage Service (S3), enabled website hosting and set the index.html as the default page. Finally, he create an Alias record in Amazon Route 53 that points to the S3 website endpoint of your S3 bucket. When he test the domain www.mycompany.com you get the following error: 'HTTP response code 403 (Access Denied)'. What can he do to resolve this error?

37.

######QUESTION#########
Tom is working for a small organization that does not have a database administrator and are needing to install a database on the cloud quickly to support an accounting application used by thousands of users. The application will act as a backend and will perform (CRUD) operations such as create, read, update and delete as well as inner joins. Which database is best suited for this scenario?

38. Which of the following correctly describes an Inline Policy? (Choose 2)
39.

######QUESTION#########
Justin is a Developer consultant working on several client projects using cloud technology and spending less time managing resources and more time focusing on applications is a priority. Justin created AWS CloudFormation templates that are reusable by taking advantage of input parameters to name resources based on client names. He would like to save his templates on the cloud, which storage option should he choose?

40. What is the name of the service that allows users to use their social media account to gain temporary access to the AWS platform?

Leave a Reply

Your email address will not be published. Required fields are marked *