Free AWS Certified Developer - Associate DVA-C02 Exam Braindumps (page: 55)

Page 55 of 116

A developer has built a market application that stores pricing data in Amazon
DynamoDB with Amazon ElastiCache in front. The prices of items in the market change frequently. Sellers have begun complaining that, after they update the price of an item, the price does not actually change in the product listing.
What could be causing this issue?

  1. The cache is not being invalidated when the price of the item is changed.
  2. The price of the item is being retrieved using a write-through ElastiCache cluster.
  3. The DynamoDB table was provisioned with insufficient read capacity.
  4. The DynamoDB table was provisioned with insufficient write capacity.

Answer(s): A



A company requires that all applications running on Amazon EC2 use IAM roles to gain access to AWS services. A developer is modifying an application that currently relies on IAM user access keys stored in environment variables to access Amazon
DynamoDB tables using boto, the AWS SDK for
Python.
The developer associated a role with the same permissions as the IAM user to the EC2 instance, then deleted the IAM user.
When the application was restarted, the AWS AccessDeniedException messages started appearing in the application logs. The developer was able to use their personal account on the server to run DynamoDB API commands using the AWS CLI.
What is the MOST likely cause of the exception?

  1. IAM policies might take a few minutes to propagate to resources.
  2. Disabled environment variable credentials are still being used by the application.
  3. The AWS SDK does not support credentials obtained using an instance role.
  4. The instance’s security group does not allow access to http://169.254.169.254.

Answer(s): B



A company has an existing application that has hardcoded database credentials. A
developer needs to modify the existing application. The application is deployed in two AWS Regions with an active-passive failover configuration to meet company’s disaster recovery strategy.
The developer needs a solution to store the credentials outside the code. The solution must comply with the company’s disaster recovery strategy.
Which solution will meet these requirements in the MOST secure way?

  1. Store the credentials in AWS Secrets Manager in the primary Region. Enable secret replication to the secondary Region. Update the application to use the Amazon Resource Name (ARN) based on the Region.
  2. Store credentials in AWS Systems Manager Parameter Store in the primary
    Region. Enable parameter replication to the secondary Region. Update the application to use the Amazon Resource Name (ARN) based on the Region.
  3. Store credentials in a config file. Upload the config file to an S3 bucket in the primary Region. Enable Cross-Region Replication (CRR) to an S3 bucket in the secondary region. Update the application to access the config file from the S3 bucket, based on the Region.
  4. Store credentials in a config file. Upload the config file to an Amazon
    Elastic File System (Amazon EFS) file system. Update the application to use the Amazon EFS file system Regional endpoints to access the config file in the primary and secondary Regions.

Answer(s): A



A developer is receiving HTTP 400: ThrottlingException errors intermittently when calling the Amazon CloudWatch API.
When a call fails, no data is retrieved.
What best practice should first be applied to address this issue?

  1. Contact AWS Support for a limit increase.
  2. Use the AWS CLI to get the metrics.
  3. Analyze the applications and remove the API call.
  4. Retry the call with exponential backoff.

Answer(s): D



Page 55 of 116



Post your Comments and Discuss Amazon AWS Certified Developer - Associate DVA-C02 exam with other Community members:

Ernesto commented on August 26, 2024
Prepared and passed this exam. Valid question and very tough exam. So good luck.
Spain
upvote