AWS-DA(321-330)
AWS Development and Architecture Quiz
Test your knowledge on AWS development and architecture with this comprehensive quiz designed for developers, architects, and cloud enthusiasts. The quiz covers various aspects of AWS services, infrastructure, and best practices.
- 10 engaging questions
- Multiple choice format
- Focus on practical AWS scenarios
A development team want to use Amazon ECS to host its container workloads. Each container in an application must exchange data with another container in order to gather logs and metrics. What actions should the development team take to ensure that these criteria are met?
A. Create two pod specifications. Make one to include the application container and the other to include the other container. Link the two pods together.
B. Create two task definitions. Make one to include the application container and the other to include the other container. Mount a shared volume between the two tasks.
C. Create one task definition. Specify both containers in the definition. Mount a shared volume between those two containers.
D. Create a single pod specification. Include both containers in the specification. Mount a persistent volume to both containers.
A business wishes to relocate its web application to AWS and use Auto Scaling to manage peak demands. According to the Solutions Architect, the optimum measure for an Auto Scaling event is the concurrent user count. What information should the developer utilize to determine how to autoscale depending on concurrent users?
A. An Amazon SNS topic to be triggered when a concurrent user threshold is met
B. An Amazon Cloudwatch Networkin metric
C. Amazon CloudFront to leverage AWS Edge Locations
D. A Custom Amazon CloudWatch metric for concurrent users.
A business needs that all data saved in Amazon DynamoDB tables be encrypted at rest using keys owned by the business. How can a developer satisfy these needs WITHOUT making changes to the application?
A. Use the AWS Encryption SDK to encrypt items before insertion.
B. Enable table-level encryption with an AWS managed customer master key (CMK).
C. Use AWS Certificate Manager (ACM) to create one certificate for each DynamoDB table.
D. Import key material in DynamoDB, and enable table-level encryption.
A developer has created a market application that utilizes Amazon DynamoDB and Amazon ElastiCache to store price data. The market's prices fluctuate often. Sellers have began to complain that when they alter the price of an item, the price in the product listing does not really change. What may be causing this problem?
A. The cache is not being invalidated when the price of the item is changed
B. The price of the item is being retrieved using a write-through ElastiCache cluster
C. The DynamoDB table was provisioned with insufficient read capacity
D. The DynamoDB table was provisioned with insufficient write capacity
A business wishes to ensure that no more than one person in its Admin group has the permanent permission to remove an Amazon EC2 resource. There should be no modifications to the current Admin group policy. What tools should a developer use to ensure that these criteria are met?
A. AWS managed policy
B. Inline policy
C. IAM trust relationship
D. AWS Security Token Service (AWS STS)
A business uses an Amazon SQS standard queue to hold messages delivered from the application's front-end to back-end tiers. The backend tier parses the message and inserts it into a database in Amazon DynamoDB. A developer notices that multiple entries are being saved in the DynamoDB database, despite the fact that AWS CloudTrail only captures one Amazon SQS message per item. What modification is required to remedy this issue?
A. Enable queue de-duplication to prevent duplicate messages.
B. Modify the front-end tier to use the MessageGroupID argument.
C. Modify the application logic to use Amazon SNS between Amazon SQS and the front-end tier.
D. Change the Amazon SQS queue type to first-in, first-out (FIFO).
A developer is debugging an application's permissions for making modifications to an Amazon RDS database. The developer has access to the application's IAM role. Which command structure should be used by the developer to verify role permissions?
A. Aws sts assume-role
B. Aws iam attach-role-policy
C. Aws ssm resume-session
D. Aws rds add-role-to-db-cluster
A developer is responsible for the administration of an application that communicates with Amazon RDS. Following observations of sluggish performance with read queries, the developer uses Amazon ElastiCache to automatically update the cache following the main database update. What will be the outcome of this caching strategy?
A. Caching will increase the load on the database instance because the cache is updated for every database update.
B. Caching will slow performance of the read queries because the cache is updated when the cache cannot find the requested data.
C. The cache will become large and expensive because the infrequently requested data is also written to the cache.
D. Overhead will be added to the initial response time because the cache is updated only after a cache miss.
During the most recent deployment of a new application, a corporation suffered some downtime. AWS Elastic Beanstalk partitioned the environment's Amazon EC2 instances into batches and delivered the new version one batch at a time after deactivating them. As a result, full capacity was not maintained during the deployment process. The developer intends to deliver a new version of the program and is seeking a policy that will ensure maximum capacity and mitigate the consequences of a failure deployment. Which deployment strategy is appropriate for the developer?
A. Immutable
B. All at Once
C. Rolling
D. Rolling with an Additional Batch
A corporation employs 25,000 people and is expanding. The business is developing an application that will be exclusive to its workers. A developer is storing photos in Amazon S3 and application data in Amazon RDS. The organization demands that all employee data remain in the old Security Assertion Markup Language (SAML) employee directory and is not interested in replicating employee data on AWS. How can the developer ensure that the workers who will be utilizing this program have allowed access to their own application data?
A. Use Amazon VPC and keep all resources inside the VPC, and use a VPC link for the S3 bucket with the bucket policy.
B. Use Amazon Cognito user pools, federate with the SAML provider, and use user pool groups with an IAM policy.
C. Use an Amazon Cognito identity pool, federate with the SAML provider, and use an IAM condition key with a value for the cognito-identity.amazonaws.com:sub variable to grant access to the employees.
D. Create a unique IAM role for each employee and have each employee assume the role to access the application so they can access their personal data only.
{"name":"AWS-DA(321-330)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on AWS development and architecture with this comprehensive quiz designed for developers, architects, and cloud enthusiasts. The quiz covers various aspects of AWS services, infrastructure, and best practices.10 engaging questionsMultiple choice formatFocus on practical AWS scenarios","img":"https:/images/course7.png"}