Free AWS Certified Developer - Associate DVA-C02 Exam Braindumps (page: 65)

Page 65 of 116

A developer is building an application that will use an Amazon API Gateway API with an AWS Lambda backend. The team that will develop the frontend requires immediate access to the API endpoints to build the UI. To prepare the backend application for integration, the developer needs to set up endpoints. The endpoints need to return predefined HTTP status codes and JSON responses for the frontend team. The developer creates a method for an API resource.
Which solution will meet these requirements?

  1. Set the integration type to AWS_PROXY. Provision Lambda functions to return hardcoded JSON data.
  2. Set the integration type to MOCK. Configure the method's integration request and integration response to associate a JSON responses with specific HTTP
    status codes.
  3. Set the integration type to HTTP_PROXY. Configure API Gateway to pass all requests to an external placeholder API. which the team will build.
  4. Set the integration type to MOCK. Use a method request to define HTTP status codes. Use an integration request to define JSON responses.

Answer(s): B



A developer is migrating an application to Amazon Elastic Kubernetes Service (Amazon
EKS). The developer migrates the application to Amazon Elastic Container Registry
(Amazon ECR) with an EKS cluster. As part of the application migration to a new backend, the developer creates a new AWS account. The developer makes configuration changes to the application to point the application to the new AWS account and to use new backend resources. The developer successfully tests the changes within the application by deploying the pipeline.
The Docker image build and the pipeline deployment are successful, but the application is still connecting to the old backend. The developer finds that the application's configuration is still referencing the original EKS cluster and not referencing the new backend resources.
Which reason can explain why the application is not connecting to the new resources?

  1. The developer did not successfully create the new AWS account.
  2. The developer added a new tag to the Docker image.
  3. The developer did not update the Docker image tag to a new version.
  4. The developer pushed the changes to a new Docker image tag.

Answer(s): C



A developer is creating an application that reads and writes to multiple Amazon S3
buckets. The application will be deployed to an Amazon EC2 instance. The developer wants to make secure API requests from the EC2 instances without the need to manage the security credentials for the application. The developer needs to apply the principle of least privilege.
Which solution will meet these requirements?

  1. Create an IAM user. Create access keys and secret keys for the user.
    Associate the user with an IAM policy that allows s3:* permissions.
  2. Associate the EC2 instance with an IAM role that has an IAM policy that allows s3:ListBucket and s3:*Object permissions for specific S3 buckets.
  3. Associate the EC2 instance with an IAM role that has an AmazonS3FullAccess
    AWS managed policy.
  4. Create a bucket policy on the S3 bucket that allows s3:ListBucket and s3:*Object permissions to the EC2 instance.

Answer(s): B



A developer is writing an application that will retrieve sensitive data from a third-party system. The application will format the data into a PDF file. The PDF
file could be more than 1 MB. The application will encrypt the data to disk by using
AWS Key Management Service (AWS KMS). The application will decrypt the file when a user requests to download it. The retrieval and formatting portions of the application are complete.
The developer needs to use the GenerateDataKey API to encrypt the PDF file so that the PDF file can be decrypted later. The developer needs to use an AWS KMS symmetric customer managed key for encryption.
Which solutions will meet these requirements?

  1. Write the encrypted key from the GenerateDataKey API to disk for later use.
    Use the plaintext key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.
  2. Write the plain text key from the GenerateDataKey API to disk for later use.
    Use the encrypted key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.
  3. Write the encrypted key from the GenerateDataKey API to disk for later use.
    Use the plaintext key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API.
  4. Write the plain text key from the GenerateDataKey API to disk for later use.
    Use the encrypted key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API.

Answer(s): A



Page 65 of 116



Post your Comments and Discuss Amazon AWS Certified Developer - Associate DVA-C02 exam with other Community members:

Ernesto commented on August 26, 2024
Prepared and passed this exam. Valid question and very tough exam. So good luck.
Spain
upvote