Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

AWS Certified Developer - Associate

Last Update 9 hours ago Total Questions : 600

The AWS Certified Developer - Associate content is now fully updated, with all current exam questions added 9 hours ago. Deciding to include DVA-C02 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our DVA-C02 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these DVA-C02 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any AWS Certified Developer - Associate practice test comfortably within the allotted time.

Question # 151

A developer is working on a web application that requires selective activation of features . Features must remain hidden from end users until they are ready for release.

Which solution will meet these requirements?

A.

Create a feature flag configuration profile in AWS AppSync.

B.

Store prerelease data in DynamoDB and toggle visibility by using DynamoDB Streams.

C.

Create a feature flag configuration profile in AWS AppConfig . Activate and deactivate feature flags as needed.

D.

Store prerelease data in AWS Amplify DataStore and toggle visibility through synchronization.

Question # 152

A company has an application that is hosted on Amazon EC2 instances The application stores objects in an Amazon S3 bucket and allows users to download objects from the S3 bucket A developer turns on S3 Block Public Access for the S3 bucket After this change, users report errors when they attempt to download objects The developer needs to implement a solution so that only users who are signed in to the application can access objects in the S3 bucket.

Which combination of steps will meet these requirements in the MOST secure way? (Select TWO.)

A.

Create an EC2 instance profile and role with an appropriate policy Associate the role with the EC2 instances

B.

Create an 1AM user with an appropriate policy. Store the access key ID and secret access key on the EC2 instances

C.

Modify the application to use the S3 GeneratePresignedUrl API call

D.

Modify the application to use the S3 GetObject API call and to return the object handle to the user

E.

Modify the application to delegate requests to the S3 bucket.

Question # 153

A company is using AWS SAM to develop a social media application. A developer needs a quick way to test AWS Lambda functions locally by using test event payloads. The developer needs the structure of these test event payloads to match the actual events that AWS services create.

Which solution will meet these requirements with the LEAST development effort?

A.

Create shareable test Lambda events. Use these test Lambda events for local testing.

B.

Store manually created test event payloads locally. Use the sam local invoke command with the file path to the payloads.

C.

Store manually created test event payloads in an Amazon S3 bucket. Use the sam local invoke command with the S3 path to the payloads.

D.

Use the sam local generate-event command to create test payloads for local testing.

Question # 154

A company stores its data in data tables in a series of Amazon S3 buckets. The company received an alert that customer credit card information might have been exposed in a data table on one of the company ' s public applications. A developer needs to identify all potential exposures within the application environment.

Which solution will meet these requirements?

A.

Use Amazon Athena to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Personal finding type.

B.

Use Amazon Made to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Financial finding type.

C.

Use Amazon Made to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Personal finding type.

D.

Use Amazon Athena to run a job on the S3 buckets that contain the affected data. Filter the findings by using the SensitiveData:S30bject/Financial finding type.

Question # 155

A developer is investigating recent performance bottlenecks within a company ' s distributed web application that runs on various AWS services, including Amazon EC2 and Amazon DynamoDB.

How can the developer determine the length of time of the application ' s calls to the various downstream AWS services?

A.

Enable VPC Flow Logs and analyze them in Amazon OpenSearch Service.

B.

Use Amazon CloudWatch Logs to analyze application logs for the various calls.

C.

Enable detailed monitoring for the EC2 instances in Amazon CloudWatch.

D.

Implement AWS X-Ray with client handlers for the various downstream calls.

Question # 156

A developer needs to add additional monitoring to an application that runs in an Amazon ECS cluster. The solution must publish and store custom metrics for the application. The developer must be able to save metadata about the custom metrics and store data with a granularity of 1 second.

Which solution will meet these requirements?

A.

Instrument the application to use AWS X-Ray by installing and running the X-Ray daemon. Use the X-Ray SDK to upload custom metrics and metadata through traces. Segment and subsegment data.

B.

Use Amazon ECS Container Insights to publish custom metrics from within the application. Specify high resolution and use the metadata feature to store more data.

C.

Use the Amazon CloudWatch PutMetricData API to publish the custom metrics. Set the StorageResolution field to 1. Use the dimensions parameter to assign name-value pairs to the metrics.

D.

Monitor the containers by using Amazon ECS Exec. Use Amazon EventBridge Scheduler to run the ECS execute-command CLI command on the cluster to publish custom metrics on a schedule.

Question # 157

A company needs to deploy all its cloud resources by using AWS CloudFormation templates A developer must create an Amazon Simple Notification Service (Amazon SNS) automatic notification to help enforce this rule. The developer creates an SNS topic and subscribes the email address of the company ' s security team to the SNS topic.

The security team must receive a notification immediately if an 1AM role is created without the use of CloudFormation.

Which solution will meet this requirement?

A.

Create an AWS Lambda function to filter events from CloudTrail if a role was created without CloudFormation Configure the Lambda function to publish to the SNS topic. Create an Amazon EventBridge schedule to invoke the Lambda function every 15 minutes

B.

Create an AWS Fargate task in Amazon Elastic Container Service (Amazon ECS) to filter events from CloudTrail if a role was created without CloudFormation Configure the Fargate task to publish to the SNS topic Create an Amazon EventBridge schedule to run the Fargate task every 15 minutes

C.

Launch an Amazon EC2 instance that includes a script to filter events from CloudTrail if a role was created without CloudFormation. Configure the script to publish to the SNS topic. Create a cron job to run the script on the EC2 instance every 15 minutes.

D.

Create an Amazon EventBridge rule to filter events from CloudTrail if a role was created without CloudFormation Specify the SNS topic as the target of the EventBridge rule.

Question # 158

A developer maintains applications that store several secrets in AWS Secrets Manager. The applications use secrets that have changed over time. The developer needs to identify required secrets that are still in use. The developer does not want to cause any application downtime.

What should the developer do to meet these requirements?

A.

Configure an AWS CloudTrail log file delivery to an Amazon S3 bucket. Create an Amazon CloudWatch alarm for the GetSecretValue. Secrets Manager API operation requests

B.

Create a secrets manager-secret-unused AWS Config managed rule. Create an Amazon EventBridge rule to Initiate notification when the AWS Config managed rule is met.

C.

Deactivate the applications secrets and monitor the applications error logs temporarily.

D.

Configure AWS X-Ray for the applications. Create a sampling rule lo match the GetSecretValue Secrets Manager API operation requests.

Question # 159

A developer is deploying a new application to Amazon Elastic Container Service (Amazon ECS). The developer needs to securely store and retrieve different types of variables. These variables include authentication information for a remote API, the URL for the API, and credentials. The authentication information and API URL must be available to all current and future deployed versions of the application across development, testing, and production environments.

How should the developer retrieve the variables with the FEWEST application changes?

A.

Update the application to retrieve the variables from AWS Systems Manager Parameter Store. Use unique paths in Parameter Store for each variable in each environment. Store the credentials in AWS Secrets Manager in each environment.

B.

Update the application to retrieve the variables from AWS Key Management Service (AWS KMS). Store the API URL and credentials as unique keys for each environment.

C.

Update the application to retrieve the variables from an encrypted file that is stored with the application. Store the API URL and credentials in unique files for each environment.

D.

Update the application to retrieve the variables from each of the deployed environments. Define the authentication information and API URL in the ECS task definition as unique names during the deployment process.

Question # 160

A company is using Amazon API Gateway to develop an API for its application on AWS. A developer needs to test and generate API responses. Other teams are required to test the API immediately.

What should the developer do to meet these requirements?

A.

Set up a mock integration request in API Gateway. Configure the method ' s integration request and integration response to associate a response with a given status code.

B.

Set up the request validators in the API ' s OpenAPI definition file. Import the OpenAPI definitions into API Gateway to test the API.

C.

Set up a gateway response for the API in API Gateway. Configure response headers with hardcoded HTTP status codes and responses.

D.

Set up a request parameter-based Lambda authorizer to control access to the API. Configure the Lambda function with the necessary mapping template.

Question # 161

A developer is testing a Python application that is deployed on AWS Elastic Beanstalk. The application is using the Boto3 library to send events to an Amazon SQS queue. An external tool consumes the events.

During the tests, a ThrottlingException error occurs at irregular intervals.

What should the developer do to resolve this error?

A.

Increase the number of instances that are assigned to the Elastic Beanstalk deployment.

B.

Scale up the instances in the Elastic Beanstalk deployment to provide more RAM and CPU to the environment.

C.

Configure Boto3 to use the adaptive retry mode to retry the failing step with progressively longer waits between calls.

D.

Redeploy the Elastic Beanstalk environment. Choose a less memory-intensive programming language.

Question # 162

A developer is building an application that uses Amazon DynamoDB. The developer wants to retrieve multiple specific items from the database with a single API call. Which DynamoDB API call will meet these requirements with the MINIMUM impact on the database?

A.

BatchGetltem

B.

Getltem

C.

Scan

D.

Query

Question # 163

A healthcare company uses AWS Amplify to host a patient management system. The system uses Amazon API Gateway to expose RESTful APIs. The backend logic of the system is handled by AWS Lambda functions.

One of the Lambda functions receives patient data that includes personally identifiable information (PII). The Lambda function sends the patient data to an Amazon DynamoDB table. The company must encrypt all patient data at rest and in transit before the data is stored in DynamoDB.

Which solution will meet these requirements?

A.

Configure the Lambda function to use AWS KMS keys with the AWS Database Encryption SDK to encrypt the patient data before sending the data to DynamoDB.

B.

Use AWS managed AWS KMS keys to encrypt the data in the DynamoDB table.

C.

Configure a DynamoDB stream on the table to invoke a Lambda function. Configure the Lambda function use an AWS KMS key to encrypt the DynamoDB table and to update the table.

D.

Use an AWS Step Functions workflow to transfer the data to an Amazon SQS queue. Configure a Lambda function to encrypt the data in the queue before sending the data to the DynamoDB table.

Question # 164

A developer is building a highly secure healthcare application using serverless components. This application requires writing temporary data to /Imp storage on an AWS Lambda function.

How should the developer encrypt this data?

A.

Enable Amazon EBS volume encryption with an AWS KMS key in the Lambda function configuration so that all storage attached to the Lambda function is encrypted.

B.

Set up the Lambda function with a role and key policy to access an AWS KMS key. Use the key to generate a data key used to encrypt all data prior to writing to Amp storage.

C.

Use OpenSSL to generate a symmetric encryption key on Lambda startup. Use this key to encrypt the data prior to writing to /tmp.

D.

Use an on-premises hardware security module (HSM) to generate keys, where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function.

Question # 165

A developer needs to use Amazon DynamoDB to store customer orders. The developer ' s company requires all customer data to be encrypted at rest with a key that the company generates.

What should the developer do to meet these requirements?

A.

Create the DynamoDB table with encryption set to None. Code the application to use the key to decrypt the data when the application reads from the table. Code the application to use the key to encrypt the data when the application writes to the table.

B.

Store the key by using AW5 KMS. Choose an AVVS KMS customer managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.

C.

Store the key by using AWS KMS. Create the DynamoDB table with default encryption. Include the kms:Encrypt parameter with the Amazon Resource Name (ARN) of the AWS KMS key when using the DynamoDB SDK.

D.

Store the key by using AWS KMS. Choose an AWS KMS AWS managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.

Go to page: