AWS-DA(391-400)

Generate a digital illustration of a developer working with AWS services, displaying elements such as cloud icons, code snippets, and infrastructure diagrams in a lively and modern workspace.

AWS Developer Skills Quiz

Test your skills and knowledge with our comprehensive AWS Developer Skills Quiz! This quiz is designed to challenge your understanding of AWS services, best practices, and application development.

Features:

  • 10 engaging questions
  • Immediate feedback on answers
  • Learn as you go with explanations for each question
10 Questions2 MinutesCreated by CodingEagle237
A developer must handle AWS infrastructure as code and be able to deploy multiple identical copies, stage changes, and roll back to prior versions. Which technique satisfies these criteria?
A. Use cost allocation reports and AWS OpsWorks to deploy and manage the infrastructure.
B. Use Amazon CloudWatch metrics and alerts along with resource tagging to deploy and manage the infrastructure
C. Use AWS Elastic Beanstalk and AWS CodeCommit to deploy and manage the infrastructure
D. Use AWS CloudFormation and AWS CodeCommit to deploy and manage the infrastructure.
A developer has created a multi-threaded application that runs on an Amazon EC2 instance fleet. The operations team has requested a graphical tool for tracking the number of threads that are currently operating over time. What is the MOST EFFECTIVE method of completing this request?
A. Periodically send the thread count to AWS X-Ray segments, then generate a service graph on demand.
B. Create a custom Amazon CloudWatch metric and periodically perform a PutMetricData call with the current thread count.
C. Periodically log thread count data to Amazon S3. Use Amazon Kinesis to process the data into a graph.
D. Periodically write the current thread count to a table using Amazon DynamoDB and use Amazon CloudFront to create a graph.
A deployment package utilizes the AWS CLI to put files into any S3 bucket in the account, using environment variables to keep access keys. The package is operating on Amazon EC2 instances that have been updated to run with an assumed IAM role and a more restricted policy that restricts access to a single bucket. Following the update, the Developer login into the host and retains the ability to write to all of the account's S3 buckets. What is the MOST LIKELY REASON for this occurrence?
A. An IAM inline policy is being used on the IAM role
B. An IAM managed policy is being used on the IAM role
C. The AWS CLI is corrupt and needs to be reinstalled
D. The AWS credential provider looks for instance profile credentials last
A developer is tasked with the task of developing a mobile application on a shoestring budget. The solution needs a scalable service that enables clients to register and authenticate for the mobile application utilizing the organization's existing SAML 2.0 identity provider. Which Amazon Web Services (AWS) offering should be utilized to fulfill these requirements?
A. AWS Lambda
B. Amazon Cognito
C. AWS IAM
D. Amazon EC2
A developer is developing an AWS Lambda function that generates temporary files smaller than 10 MB in size during operation. Throughout execution, the temporary files will be viewed and updated several times. There is no need for the Developer to store or retrieve these files in the future. What directory should the temporary file be saved to?
A. the /tmp directory
B. Amazon EFS
C. Amazon EBS
D. Amazon S3
A business requires a new REST API that can deliver data on the contents of an Amazon S3 bucket, such as the number of items stored inside. The organization has opted to build the new API as a microservice and to use AWS Lambda and Amazon API Gateway. How could the developer verify that the microservice gets access to the required Amazon S3 bucket while keeping to security best practices?
A. Create an IAM user that has permissions to access the Amazon S3 bucket, and store the IAM user credentials in the Lambda function source code.
B. Create an IAM role that has permissions to access the Amazon S3 bucket and assign it to the Lambda function as its execution role.
C. Create an Amazon S3 bucket policy that specifies the Lambda service as its principal and assign it to the Amazon S3 bucket.
D. Create an IAM role, attach the AmazonS3FullAccess managed policy to it, and assign the role to the Lambda function as its execution role.
A developer is developing a mobile application that will operate without requiring users to log in. Which approach is the MOST EFFECTIVE for granting people access to AWS resources?
A. Use an identity provider to securely authenticate with the application.
B. Create an AWS Lambda function to create an IAM user when a user accesses the application.
C. Create credentials using AWS KMS and apply these credentials to users when using the application.
D. Use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources.
A developer has built an S3 bucket called s3:/mycoolapp and configured server-wide logging with a path of s3:/mycoolapp/logs. The developer copied 100 KB of Cascading Style Sheets (CSS) files to the subdirectory s3:/mycoolapp/css and then ceased work. When the developer returned a few days later, the bucket had grown to 50 GB in size. What is the MOST LIKELY REASON for this occurrence?
A. The CSS files were not compressed and S3 versioning was enabled.
B. S3 replication was enabled on the bucket.
C. Logging into the same bucket caused exponential log growth.
D. An S3 lifecycle policy has moved the entire CSS file to S3 Infrequent Access.
A developer is developing a new application that will be accessible to users through an Amazon API Gateway-created API. The users must be validated using the Security Assertion Markup Language (SAML) by a third-party identity provider. After users have been validated, they will need access to further AWS services, such as Amazon S3 and Amazon DynamoDB. How are these stipulations to be met?
A. Use an Amazon Cognito user pool with SAML as the resource server.
B. Use Amazon Cognito identity pools with a SAML identity provider as one of the authentication providers.
C. Use the AWS IAM service to provide the sign-up and sign-in functionality.
D. Use Amazon CloudFront signed URLs to connect with the SAML identity provider.
A business is in the process of building a new web application in Python. The application must be deployed using AWS Elastic Beanstalk via the AWS Management Console. The developer produces an Elastic Beanstalk source bundle, which he or she then uploads through the console. Which of the following are prerequisites for developing the source bundle? (Select two.)
A. The source bundle must include the ebextensions.yaml file
B. The source bundle must not include a top-level directory
C. The source bundle must be compressed with any required dependencies in a top-level parent folder
D. The source bundle must be created as a single .zip or .war file
E. The source bundle must be uploaded into Amazon EFS
{"name":"AWS-DA(391-400)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your skills and knowledge with our comprehensive AWS Developer Skills Quiz! This quiz is designed to challenge your understanding of AWS services, best practices, and application development.Features:10 engaging questionsImmediate feedback on answersLearn as you go with explanations for each question","img":"https:/images/course1.png"}
Powered by: Quiz Maker