Skip to the content.
AWS Developer Associate

Practice Exam 9

Click on the Answer button for the correct answer and its explanation.

If this practice exam has been helpful to you please share it with others.


  1. An on-premises application makes repeated calls to store files to Amazon S3. As usage of the application has increased, “LimitExceeded” errors are being logged. What should be changed to fix this error?
    • A. Implement exponential backoffs in the application.
    • B. Load balance the application to multiple servers.
    • C. Move the application to Amazon EC2.
    • D. Add a one second delay to each API call.
    Answer

    Correct answer: A

  2. A company caches session information for a web application in an Amazon DynamoDB table. The company wants an automated way to delete old items from the table. What is the simplest way to do this?
    • A. Write a script that deletes old records; schedule the scripts as a cron job on an Amazon EC2 instance.
    • B. Add an attribute with the expiration time; enable the Time To Live feature based on that attribute.
    • C. Each day, create a new table to hold session data; delete the previous day’s table.
    • D. Add an attribute with the expiration time; name the attribute ItemExpiration.
    Answer

    Correct answer: B

  3. An application is expected to process many files. Each file takes four minutes to process each AWS Lambda invocation. The Lambda function does not return any important data. What is the fastest way to process all the files?
    • A. First split the files to make them smaller, then process with synchronous RequestResponse Lambda invocations.
    • B. Make synchronous RequestResponse Lambda invocations and process the files one by one.
    • C. Make asynchronous Event Lambda invocations and process the files in parallel.
    • D. First join all the files, then process it all at once with an asynchronous Event Lambda invocation.
    Answer

    Correct answer: C

  4. The upload of a 15 GB object to Amazon S3 fails. The error message reads: “Your proposed upload exceeds the maximum allowed object size.” What technique will allow the Developer to upload this object?
    • A. Upload the object using the multi-part upload API.
    • B. Upload the object over an AWS Direct Connect connection.
    • C. Contact AWS Support to increase the object size limit.
    • D. Upload the object to another AWS region.
    Answer

    Correct answer: A

  5. An application is running on an EC2 instance. The Developer wants to store an application metric in Amazon CloudWatch. What is the best practice for implementing this requirement?
    • A. Use the PUT Object API call to send data to an S3 bucket. Use an event notification to invoke a Lambda function to publish data to CloudWatch.
    • B. Publish the metric data to an Amazon Kinesis Stream using a PutRecord API call. Subscribe a Lambda function that publishes data to CloudWatch.
    • C. Use the CloudWatch PutMetricData API call to submit a custom metric to CloudWatch. Provide the required credentials to enable the API call.
    • D. Use the CloudWatch PutMetricData API call to submit a custom metric to CloudWatch. Launch the EC2 instance with the required IAM role to enable the API call.
    Answer

    Correct answer: C

  6. AWS CodeBuild builds code for an application, creates the Docker image, pushes the image to Amazon Elastic Container Registry (Amazon ECR), and tags the image with a unique identifier. If the Developers already have AWS CLI configured on their workstations, how can the Docker images be pulled to the workstations?
    • A. Run the following:docker pull REPOSITORY URI : TAG.
    • B. Run the output of the following:aws ecr get-login and then run: docker pull REPOSITORY URI : TAG.
    • C. Run the following:aws ecr get-login and then run: docker pull REPOSITORY URI : TAG.
    • D. Run the output of the following: aws ecr get-download-url-for-layer and then run: docker pull REPOSITORY URI : TAG.
    Answer

    Correct answer: B

  7. A web application is designed to allow new users to create accounts using their email addresses. The application will store attributes for each user, and is expecting millions of user to sign up. What should the Developer implement to achieve the design goals?
    • A. Amazon Cognito user pools.
    • B. AWS Mobile Hub user data storage.
    • C. Amazon Cognito Sync.
    • D. AWS Mobile Hub cloud logic.
    Answer

    Correct answer: A

  8. A company needs a new REST API that can return information about the contents of an Amazon S3 bucket, such as a count of the objects stored in it. The company has decided that the new API should be written as a microservice using AWS Lambda and Amazon API Gateway. How should the Developer ensure that the microservice has the necessary access to the Amazon S3 bucket, while adhering to security best practices?
    • A. Create an IAM user that has permissions to access the Amazon S3 bucket, and store the IAM user credentials in the Lambda function source code.
    • B. Create an IAM role that has permissions to access the Amazon S3 bucket and assign it to the Lambda function as its execution role.
    • C. Create an Amazon S3 bucket policy that specifies the Lambda service as its principal and assign it to the Amazon S3 bucket.
    • D. Create an IAM role, attach the AmazonS3FullAccess managed policy to it, and assign the role to the Lambda function as its execution role.
    Answer

    Correct answer: C

  9. An organization is using Amazon CloudFront to ensure that its users experience low-latency access to its web application. The organization has identified a need to encrypt all traffic between users and CloudFront, and all traffic between CloudFront and the web application. How can these requirements be met? (Choose two.)
    • A. Use AWS KMS to encrypt traffic between CloudFront and the web application.
    • B. Set the Origin Protocol Policy to “HTTPS Only”.
    • C. Set the Origin’s HTTP Port to 443.
    • D. Set the Viewer Protocol Policy to “HTTPS Only” or “Redirect HTTP to HTTPS”.
    • E. Enable the CloudFront option Restrict Viewer Access.
    Answer

    Correct answer: C, D

  10. An application is using Amazon DynamoDB as its data store, and should be able to read 100 items per second as strongly consistent reads. Each item is 5 KB in size. To what value should the table’s provisioned read throughput be set?
    • A. 50 read capacity units.
    • B. 100 read capacity units.
    • C. 200 read capacity units.
    • D. 500 read capacity units.
    Answer

    Correct answer: C

  11. An application uses Lambda functions to extract metadata from files uploaded to an S3 bucket; the metadata is stored in Amazon DynamoDB. The application starts behaving unexpectedly, and the Developer wants to examine the logs of the Lambda function code for errors. Based on this system configuration, where would the Developer find the logs?
    • A. Amazon S3.
    • B. AWS CloudTrail.
    • C. Amazon CloudWatch.
    • D. Amazon DynamoDB
    Answer

    Correct answer: C

  12. A Developer is creating a Lambda function that will generate and export a file. The function requires 100 MB of temporary storage for temporary files while executing. These files will not be needed after the function is complete. How can the Developer MOST efficiently handle the temporary files?
    • A. Store the files in EBS and delete the files at the end of the Lambda function.
    • B. Copy the files to EFS and delete the files at the end of the Lambda function.
    • C. Store the files in the /tmp directory and delete the files at the end of the Lambda function.
    • D. Copy the files to an S3 bucket with a lifecycle policy to delete the files.
    Answer

    Correct answer: C

  13. A Developer has developed a web application and wants to deploy it quickly on a Tomcat server on AWS. The Developer wants to avoid having to manage the underlying infrastructure. What is the easiest way to deploy the application, based on these requirements?
    • A. AWS CloudFormation.
    • B. AWS Elastic Beanstalk.
    • C. Amazon S3.
    • D. AWS CodePipeline
    Answer

    Correct answer: B

  14. An application runs on multiple EC2 instances behind an ELB. Where is the session data best written so that it can be served reliably across multiple requests?
    • A. Write data to Amazon ElastiCache.
    • B. Write data to Amazon Elastic Block Store.
    • C. Write data to Amazon EC2 Instance Store.
    • D. Write data to the root filesystem.
    Answer

    Correct answer: A

  15. A company is migrating from a monolithic architecture to a microservices-based architecture. The Developers need to refactor the application so that the many microservices can asynchronously communicate with each other without impacting performance. Use of which managed AWS services will enable asynchronous message passing? (Choose two.)
    • A. Amazon SQS.
    • B. Amazon Cognito.
    • C. Amazon Kinesis.
    • D. Amazon SNS.
    • E. Amazon ElastiCache
    Answer

    Correct answer: A, D

  16. According to best practice, how should access keys be managed in AWS? (Choose two.)
    • A. Use the same access key in all applications for consistency.
    • B. Delete all access keys for the account root user.
    • C. Leave unused access keys in the account for tracking purposes.
    • D. Embed and encrypt access keys in code for continuous deployment.
    • E. Use Amazon IAM roles instead of access keys where possible.
    Answer

    Correct answer: B, E

  17. An application running on an Amazon Linux EC2 instance needs to manage the AWS infrastructure. How can the EC2 instance be configured to make AWS API calls securely?
    • A. Sign the AWS CLI command using the signature version 4 process.
    • B. Run the aws configure AWS CLI command and specify the access key id and secret access key.
    • C. Specify a role for the EC2 instance with the necessary privileges.
    • D. Pass the access key id and secret access key as parameters for each AWS CLI command.
    Answer

    Correct answer: C

  18. An application needs to use the IP address of the client in its processing. The application has been moved into AWS and has been placed behind an Application Load Balancer (ALB). However, all the client IP addresses now appear to be the same. The application must maintain the ability to scale horizontally. Based on this scenario, what is the MOST cost-effective solution to this problem?
    • A. Remove the application from the ALB. Delete the ALB and change Amazon Route 53 to direct traffic to the instance running the application.
    • B. Remove the application from the ALB. Create a Classic Load Balancer in its place. Direct traffic to the application using the HTTP protocol.
    • C. Alter the application code to inspect the X-Forwarded-For header. Ensure that the code can work properly if a list of IP addresses is passed in the header.
    • D. Alter the application code to inspect a custom header. Alter the client code to pass the IP address in the custom header.
    Answer

    Correct answer: C

  19. A development team is using AWS Elastic Beanstalk to deploy a two-tier application that consists of a load-balanced web tier and an Amazon RDS database tier in production. The team would like to separate the RDS instance from the Elastic Beanstalk. How can this be accomplished?
    • A. Use the Elastic Beanstalk CLI to disassociate the database.
    • B. Use the AWS CLI to disassociate the database.
    • C. Change the deployment policy to disassociate the database.
    • D. Recreate a new Elastic Beanstalk environment without Amazon RDS.
    Answer

    Correct answer: C

  20. A company is using AWS CodePipeline to deliver one of its applications. The delivery pipeline is triggered by changes to the master branch of an AWS CodeCommit repository and uses AWS CodeBuild to implement the test and build stages of the process and AWS CodeDeploy to deploy the application. The pipeline has been operating successfully for several months and there have been no modifications. Following a recent change to the application’s source code, AWS CodeDeploy has not deployed the updates application as expected. What are the possible causes? (Choose two.)
    • A. The change was not made in the master branch of the AWS CodeCommit repository.
    • B. One of the earlier stages in the pipeline failed and the pipeline has terminated.
    • C. One of the Amazon EC2 instances in the company’s AWS CodePipeline cluster is inactive.
    • D. The AWS CodePipeline is incorrectly configured and is not executing AWS CodeDeploy.
    • E. AWS CodePipeline does not have permissions to access AWS CodeCommit.
    Answer

    Correct answer: B, C

  21. A social media company is using Amazon Cognito in order to synchronize profiles across different mobile devices, to enable end users to have a seamless experience. Which of the following configurations can be used to silently notify users whenever an update is available on all other devices?
    • A. Modify the user pool to include all the devices which keep them in sync.
    • B. Use the SyncCallback interface to receive notifications on the application.
    • C. Use an Amazon Cognito stream to analyze the data and push the notifications.
    • D. Use the push synchronization feature with the appropriate IAM role.
    Answer

    Correct answer: C

  22. An on-premises application is implemented using a Linux, Apache, MySQL and PHP (LAMP) stack. The Developer wants to run this application in AWS. Which of the following sets of AWS services can be used to run this stack?
    • A. Amazon API Gateway, Amazon S3.
    • B. AWS Lambda, Amazon DynamoDB.
    • C. Amazon EC2, Amazon Aurora.
    • D. Amazon Cognito, Amazon RDS.
    • E. Amazon ECS, Amazon EBS.
    Answer

    Correct answer: C

  23. An application displays a status dashboard. The status is updated by 1 KB messages from an SQS queue. Although the status changes infrequently, the Developer must minimize the time between the message arrival in the queue and the dashboard update. What technique provides the shortest delay in updating the dashboard?
    • A. Retrieve the messages from the queue using long polling every 20 seconds.
    • B. Reduce the size of the messages by compressing them before sending.
    • C. Retrieve the messages from the queue using short polling every 10 seconds.
    • D. Reduce the size of each message payload by sending it in two parts.
    Answer

    Correct answer: A

  24. An on-premises legacy application is caching data files locally and writing shared images to local disks. What is necessary to allow for horizontal scaling when migrating the application to AWS?
    • A. Modify the application to have both shared images and caching data written to Amazon EBS.
    • B. Modify the application to read and write cache data on Amazon S3, and also store shared images on S3.
    • C. Modify the application to use Amazon S3 for serving shared images; cache data can then be written to local disks.
    • D. Modify the application to read and write cache data on Amazon S3, while continuing to write shared images to local disks.
    Answer

    Correct answer: B

  25. A Developer must trigger an AWS Lambda function based on the item lifecycle activity in an Amazon DynamoDB table. How can the Developer create the solution?
    • A. A Developer must trigger an AWS Lambda function based on the item lifecycle activity in an Amazon DynamoDB table. How can the Developer create the solution?
    • B. Enable a DynamoDB stream that publishes an SNS message. Trigger the Lambda function asynchronously from the SNS message.
    • C. Enable a DynamoDB stream, and trigger the Lambda function synchronously from the stream.
    • D. Enable a DynamoDB stream, and trigger the Lambda function asynchronously from the stream.
    Answer

    Correct answer: C

  26. After installing the AWS CLI, a Developer tries to run the command awsconfigure but receives the following error:Error: aws: command not found. What is the most likely cause of this error?
    • A. The aws executable is not in the PATH environment variable.
    • B. Access to the aws executable has been denied to the installer.
    • C. Incorrect AWS credentials were provided.
    • D. The aws script does not have an executable file mode.
    Answer

    Correct answer: A

  27. The Developer for a retail company must integrate a fraud detection solution into the order processing solution. The fraud detection solution takes between ten and thirty minutes to verify an order. At peak, the web site can receive one hundred orders per minute. What is the most scalable method to add the fraud detection solution to the order processing pipeline?
    • A. Add all new orders to an Amazon SQS queue. Configure a fleet of 10 EC2 instances spanning multiple AZs with the fraud detection solution installed on them to pull orders from this queue. Update the order with a pass or fails status.
    • B. Add all new orders to an SQS queue. Configure an Auto Scaling group that uses the queue depth metric as its unit of scale to launch a dynamically-sized fleet of EC2 instances spanning multiple AZs with the fraud detection solution installed on them to pull orders from this queue. Update the order with a passor fails status.
    • C. Add all new orders to an Amazon Kinesis Stream. Subscribe a Lambda function to automatically read batches of records from the Kinesis Stream. The Lambda function includes the fraud detection software and will update the order witha pass or fail status.
    • D. Write all new orders to Amazon DynamoDB. Configure DynamoDB Streams to include all new orders. Subscribe a Lambda function to automatically read batches of records from the Kinesis Stream. The Lambda function includes thefraud detection software and will update the order with a pass or fail status.
    Answer

    Correct answer: D

  28. When a Developer tries to run an AWS CodeBuild project, it raises an error because the length of all environment variables exceeds the limit for the combined maximum of characters. What is the recommended solution?
    • A. Add the export LC_ALL=”en_US.utf8” command to the pre_build section to ensure POSIX localization.
    • B. Use Amazon Cognito to store key-value pairs for large numbers of environment variables.
    • C. Update the settings for the build project to use an Amazon S3 bucket for large numbers of environment variables.
    • D. Use AWS Systems Manager Parameter Store to store large numbers of environment variables.
    Answer

    Correct answer: D

  29. A set of APIs are exposed to customers using the Amazon API Gateway. These APIs have caching enabled on the API Gateway. Customers have asked for an option to invalidate this cache for each of the APIs. What action can be taken to allow API customers to invalidate the API Cache?
    • A. Ask customers to use AWS credentials to call the InvalidateCache API.
    • B. Ask customers to invoke an AWS API endpoint which invalidates the cache.
    • C. Ask customers to pass an HTTP header called Cache-Control:max-age=0.
    • D. Ask customers to add a query string parameter called “INVALIDATE_CACHE” when making an API call.
    Answer

    Correct answer: B

  30. A Developer has been asked to build a real-time dashboard web application to visualize the key prefixes and storage size of objects in Amazon S3 buckets. Amazon DynamoDB will be used to store the Amazon S3 metadata. What is the optimal and MOST cost-effective design to ensure that the real-time dashboard is kept up to date with the state of the objects in the Amazon S3 buckets?
    • A. Use an Amazon CloudWatch event backed by an AWS Lambda function. Issue an Amazon S3 API call to get a list of all Amazon S3 objects and persist the metadata within DynamoDB. Have the web application poll the DynamoDBtable to reflect this change.
    • B. Use Amazon S3 Event Notification backed by a Lambda function to persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
    • C. Run a cron job within an Amazon EC2 instance to list all objects within Amazon S3 and persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
    • D. Create a new Amazon EMR cluster to get all the metadata about Amazon S3 objects; persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
    Answer

    Correct answer: A

  31. A Developer must repeatedly and consistently deploy a serverless RESTful API on AWS. Which techniques will work? (Choose two.)
    • A. Define a Swagger file. Use AWS Elastic Beanstalk to deploy the Swagger file.
    • B. Define a Swagger file. Use AWS CodeDeploy to deploy the Swagger file.
    • C. Deploy a SAM template with an inline Swagger definition.
    • D. Define a Swagger file. Deploy a SAM template that references the Swagger file.
    • E. Define an inline Swagger definition in a Lambda function. Invoke the Lambda function.
    Answer

    Correct answer: D, E

  32. An existing serverless application processes uploaded image files. The process currently uses a single Lambda function that takes an image file, performs the processing, and stores the file in Amazon S3. Users of the application now require thumbnail generation of the images. Users want to avoid any impact to the time it takes to perform the image uploads.How can thumbnail generation be added to the application, meeting user requirements while minimizing changes to existing code?
    • A. Change the existing Lambda function handling the uploads to create thumbnails at the time of upload. Have the function store both the image and thumbnail in Amazon S3.
    • B. Create a second Lambda function that handles thumbnail generation and storage. Change the existing Lambda function to invoke it asynchronously.
    • C. Create an S3 event notification with a Lambda function destination. Create a new Lambda function to generate and store thumbnails.
    • D. Create an S3 event notification to an SQS Queue. Create a scheduled Lambda function that processes the queue, and generates and stores thumbnails.
    Answer

    Correct answer: A

  33. Developer executed a AWS CLI command and received the error shown below: What action should the Developer perform to make this error human-readable?
    • A. Make a call to AWS KMS to decode the message.
    • B. Use the AWS STS decode-authorization-message API to decode the message.
    • C. Use an open source decoding library to decode the message.
    • D. Use the AWS IAM decode-authorization-message API to decode this message.
    Answer

    Correct answer: C

  34. A company is using Amazon API Gateway to manage access to a set of microservices implemented as AWS Lambda functions. Following a bug report, the company makes a minor breaking change to one of the APIs. In order to avoid impacting existing clients when the new API is deployed, the company wants to allow clients six months to migrate from v1 to v2. Which approach should the Developer use to handle this change?
    • A. Update the underlying Lambda function and provide clients with the new Lambda invocation URL.
    • B. Use API Gateway to automatically propagate the change to clients, specifying 180 days in the phased deployment parameter.
    • C. Use API Gateway to deploy a new stage named v2 to the API and provide users with its URL.
    • D. Update the underlying Lambda function, create an Amazon CloudFront distribution with the updated Lambda function as its origin.
    Answer

    Correct answer: C

  35. A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as Amazon or Facebook. The APIs should allow access based on a custom authorization model. Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs?
    • A. Use Amazon Cognito user pools and a custom authorizer to authenticate and authorize users based on JSON Web Tokens.
    • B. Build a OpenID token broker with Amazon and Facebook. Users will authenticate with these identify providers and pass the JSON Web Token to the API to authenticate each API call.
    • C. Store user credentials in Amazon DynamoDB and have the application retrieve temporary credentials from AWS STS. Make API calls by passing user credentials to the APIs for authentication and authorization.
    • D. Use Amazon RDS to store user credentials and pass them to the APIs for authentications and authorization.
    Answer

    Correct answer: A

  36. A supplier is writing a new RESTful API for customers to query the status of orders. The customers requested the following API endpoint. http:// <www.supplierdomain.com/status/customerID>. Which of the following application designs meet the requirements? (Select two.)
    • A. Amazon SQS; Amazon SNS.
    • B. Elastic Load Balancing; Amazon EC2.
    • C. Amazon ElastiCache; Amazon Elacticsearch Service.
    • D. Amazon API Gateway; AWS Lambda.
    • E. Amazon S3; Amazon CloudFront.
    Answer

    Correct answer: D, E

  37. A development team consists of 10 team members. Similar to a home directory for each team member the manager wants to grant access to user-specific folders in an Amazon S3 bucket. For the team member with the username “TeamMemberX”, the snippet of the IAM policy looks like this: Instead of creating distinct policies for each team member, what approach can be used to make this policy snippet generic for all team members?
    • A. Use IAM policy condition.
    • B. Use IAM policy principal.
    • C. Use IAM policy variables.
    • D. Use IAM policy resource
    Answer

    Correct answer: A

  38. A static website is hosted in an Amazon S3 bucket. Several HTML pages on the site use JavaScript to download images from another Amazon S3 bucket. These images are not displayed when users browse the site. What is the possible cause for the issue?
    • A. The referenced Amazon S3 bucket is in another region.
    • B. The images must be stored in the same Amazon S3 bucket.
    • C. Port 80 must be opened on the security group in which the Amazon S3 bucket is located.
    • D. Cross Origin Resource Sharing must be enabled on the Amazon S3 bucket.
    Answer

    Correct answer: C

  39. Amazon S3 has the following structure: S3://BUCKET/FOLDERNAME/FILENAME.zip Which S3 best practice would optimize performance with thousands of PUT request each second to a single bucket?
    • A. Prefix folder names with user id; for example, s3://BUCKET/2013-FOLDERNAME/FILENAME.zip.
    • B. Prefix file names with timestamps; for example, s3://BUCKET/FOLDERNAME/2013-26-05-15-00-00-FILENAME.zip.
    • C. Prefix file names with random hex hashes; for example, s3://BUCKET/FOLDERNAME/23a6-FILENAME.zip.
    • D. Prefix folder names with random hex hashes; for example, s3://BUCKET/23a6-FOLDERNAME/FILENAME.zip.
    Answer

    Correct answer: B

  40. The Lambda function below is being called through an API using Amazon API Gateway. The average execution time for the Lambda function is about 1 second. The pseudocode for the Lambda function is as shown in the exhibit. What two actions can be taken to improve the performance of this Lambda function without increasing the cost of the solution? (Select two.)
    • A. Package only the modules the Lambda function requires.
    • B. Use Amazon DynamoDB instead of Amazon RDS.
    • C. Move the initialization of the variable Amazon RDS connection outside of the handler function.
    • D. Implement custom database connection pooling with the Lambda function.
    • E. Implement local caching of Amazon RDS data so Lambda can re-use the cache.
    Answer

    Correct answer: A, E

  41. Where should an Elastic Beanstalk configuration file named healthcheckur1.config be placed in the application source bundle?
    • A. In the root of the application.
    • B. In the bin folder.
    • C. In healthcheckur1.config.ebextension under root.
    • D. In the .ebextensions folder.
    Answer

    Correct answer: D

  42. A Developer is receiving HTTP 400: ThrottlingException errors intermittently when calling the Amazon CloudWatch API. When a call fails, no data is retrieved. What best practice should first be applied to address this issue?
    • A. Contact AWS Support for a limit increase.
    • B. Use the AWS CLI to get the metrics.
    • C. Analyze the applications and remove the API call.
    • D. Retry the call with exponential backoff.
    Answer

    Correct answer: B

  43. A Developer has created a software package to be deployed on multiple EC2 instances using IAM roles. What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams? (Select TWO.)
    • A. Use the AWS CLI to retrieve the IAM group.
    • B. Query Amazon EC2 metadata for in-line IAM policies.
    • C. Request a token from AWS STS, and perform a describe action.
    • D. Perform a get action using the “”-dry-run argument.
    • E. Validate the IAM role policy with the IAM policy simulator.
    Answer

    Correct answer: B, E

  44. A large e-commerce site is being designed to deliver static objects from Amazon S3. The Amazon S3 bucket will server more than 300 GET requests per second. What should be done to optimize performance? (Select TWO.)
    • A. Integrate Amazon CloudFront with Amazon S3.
    • B. Enable Amazon S3 cross-region replication.
    • C. Delete expired Amazon S3 server log files.
    • D. Configure Amazon S3 lifecycle rules.
    • E. Randomize Amazon S3 key name prefixes.
    Answer

    Correct answer: A, B

  45. A Developer has implemented a Lambda function that needs to add new customers to an RDS database that is expected to run hundreds of times per hour. The Lambda function is configured to use 512MB of RAM and is based on the following pseudo code: After testing the Lambda function, the Developer notices that the Lambda execution time is much longer than expected. What should the Developer do to improve performance?
    • A. Increase the amount of RAM allocated to the Lambda function, which will increase the number of threads the Lambda can use.
    • B. Increase the size of the RDS database to allow for an increased number of database connections each hour.
    • C. Move the database connection and close statement out of the handler. Place the connection in the global space.
    • D. Replace RDS wit Amazon DynamoDB to implement control over the number of writes per second.
    Answer

    Correct answer: B

  46. A Developer is creating a web application that requires authentication, but also needs to support guest access to provide users limited access without having to authenticate. What service can provide support for the application to allow guest access?
    • A. IAM temporary credentials using AWS STS.
    • B. Amazon Directory Service.
    • C. Amazon Cognito with unauthenticated access enabled.
    • D. IAM with SAML integration
    Answer

    Correct answer: C

  47. A Developer created a dashboard for an application using Amazon API Gateway, Amazon S3, AWS Lambda, and Amazon RDS. The Developer needs an authentication mechanism allowing a user to sign in and view the dashboard. It must be accessible from mobile applications, desktops, and tablets, and must remember user preferences across platforms. Which AWS service should the Developer use to support this authentication scenario?
    • A. AWS KMS.
    • B. Amazon Cognito.
    • C. AWS Directory Service.
    • D. Amazon IAM.
    Answer

    Correct answer: D

  48. A Developer has created an S3 bucket s3://mycoolapp and has enabled server across logging that points to the folder s3://mycoolapp/logs. The Developer moved 100 KB of Cascading Style Sheets (CSS) documents to the folder s3://mycoolapp/css, and then stopped work. When the developer came back a few days later, the bucket was 50 GB. What is the MOST likely cause of this situation?
    • A. The CSS files were not compressed and S3 versioning was enabled.
    • B. S3 replication was enabled on the bucket.
    • C. Logging into the same bucket caused exponential log growth.
    • D. An S3 lifecycle policy has moved the entire CSS file to S3 Infrequent Access.
    Answer

    Correct answer: B

Please feel free to contact us if any information is inaccurate or if any answers need correction.

Exam List