Free AWS Certified Developer - Associate DVA-C02 Exam Braindumps (page: 60)

Page 60 of 116

A developer is writing an application to encrypt files outside of AWS before uploading the files to an Amazon S3 bucket. The encryption must be symmetric and must be performed inside the application.
How can the developer implement the encryption in the application to meet these requirements?

  1. Create a data key in AWS Key Management Service (AWS KMS). Use the AWS
    Encryption SDK to encrypt the files.
  2. Create a Hash-Based Message Authentication Code (HMAC) key in AWS Key
    Management Service (AWS KMS). Use the AWS Encryption SDK to encrypt the files.
  3. Create a data key pair in AWS Key Management Service (AWS KMS). Use the AWS
    CLI to encrypt the files.
  4. Create a data key in AWS Key Management Service (AWS KMS). Use the AWS CLI
    to encrypt the files.

Answer(s): A



A developer is working on an application that is deployed on an Amazon EC2 instance.
The developer needs a solution that will securely transfer files from the application to an Amazon S3 bucket.
What should the developer do to meet these requirements in the MOST secure way?

  1. Create an IAM user. Create an access key for the IAM user. Store the access key in the application’s environment variables.
  2. Create an IAM role. Create an access key for the IAM role. Store the access key in the application’s environment variables.
  3. Create an IAM role. Configure the IAM role to access the specific Amazon S3
    API calls the application requires. Associate the IAM role with the EC2
    instance.
  4. Configure an S3 bucket policy for the S3 bucket. Configure the S3 bucket policy to allow access for the EC2 instance I

Answer(s): C



A developer created a web API that receives requests by using an internet-facing
Application Load Balancer (ALB) with an HTTPS listener. The developer configures an
Amazon Cognito user pool and wants to ensure that every request to the API is authenticated through Amazon Cognito.
What should the developer do to meet this requirement?

  1. Add a listener rule to the listener to return a fixed response if the
    Authorization header is missing. Set the fixed response to 401 Unauthorized.
  2. Create an authentication action for the listener rules of the ALSet the rule action type to authenticate-cognito. Set the OnUnauthenticatedRequest field to “deny.”
  3. Create an Amazon API Gateway API. Configure all API methods to be forwarded to the ALB endpoint. Create an authorizer of the COGNITO_USER_POOLS type.
    Configure every API method to use that authorizer.
  4. Create a new target group that includes an AWS Lambda function target that validates the Authorization header by using Amazon Cognito. Associate the target group with the listener.

Answer(s): B



A company recently deployed an AWS Lambda function. A developer notices an increase in the function throttle metrics in Amazon CloudWatch.
What are the MOST operationally efficient solutions to reduce the function throttling? (Choose two.)

  1. Migrate the function to Amazon Elastic Kubernetes Service (Amazon EKS).
  2. Increase the maximum age of events in Lambda.
  3. Increase the function’s reserved concurrency.
  4. Add the lambda:GetFunctionConcurrency action to the execution role.
  5. Request a service quota change for increased concurrency.

Answer(s): C,E



Page 60 of 116



Post your Comments and Discuss Amazon AWS Certified Developer - Associate DVA-C02 exam with other Community members:

Ernesto commented on August 26, 2024
Prepared and passed this exam. Valid question and very tough exam. So good luck.
Spain
upvote