AWS-DA(221-230)
AWS DevOps Quiz
Test your knowledge of AWS services and DevOps practices with our engaging quiz! Designed for developers and IT professionals, this quiz will challenge your understanding of continuous integration, deployment strategies, and secure data management in the AWS ecosystem.
- 10 thoughtfully crafted questions
- Focus on AWS services like Lambda, DynamoDB, and KMS
- Perfect for preparing for AWS certifications or enhancing your skills
A business makes use of continuous integration and delivery platforms. A developer now wants to automate the distribution of software packages to both Amazon EC2 instances and on-premises virtual machines. Which AWS service should be utilized for this purpose?
A. AWS CodePipeline
B. AWS CodeBuild
C. AWS Elastic Beanstalk
D. AWS CodeDeploy
How does AWS KMS's Envelope Encryption work?
A. The Customer Master Key is used to encrypt/decrypt a data key. The Plaintext Data Key is used to encrypt customer data.
B. Two encryption keys are used. The Customer Master Key encrypts customer data. The Data Key is used to re-encrypt the encrypted data.
C. Two encryption keys are used. The Data Key encrypts customer data. The ׀¡ustomer Master Key is used to re-encrypt the encrypted data.
D. The Customer Master Key is used to encrypt/decrypt a data key. The Encrypted Data Key is used to encrypt customer data.
A developer must construct an application that supports SAML and Facebook authentication. Additionally, it must provide access to AWS services such as Amazon DynamoDB. Which AWS service or feature will allow for the LEAST amount of extra code to achieve these requirements?
A. AWS AppSync
B. Amazon Cognito identity pools
C. Amazon Cognito user pools
D. Amazon Lambda@Edge
A developer is troubleshooting an AWS Lambda function that is being used in conjunction with an Amazon API Gateway. HTTP status code 200 is returned whenever the API Gateway endpoint is contacted, despite the fact that AWS Lambda is logging a 4xx error. What modification is required to deliver an appropriate error code through the API Gateway?
A. Enable CORS in the API Gateway method settings
B. Use a Lambda proxy integration to return HTTP codes and headers
C. Enable API Gateway error pass-through.
D. Return the value in the header x-Amzn-ErrorType.
A developer is developing a three-tier web application that must support at least 5000 requests per minute. According to the requirements, the web layer should be fully stateless, whereas the application should keep user session data. How may session data be externalized while minimizing latency?
A. Create an Amazon RDS instance, then implement session handling at the application level to leverage a database inside the RDS database instance for session data storage
B. Implement a shared file system solution across the underlying Amazon EC2 instances, then implement session handling at the application level to leverage the shared file system for session data storage
C. Create an Amazon ElastiCache Memcached cluster, then implement session handling at the application level to leverage the cluster for session data storage
D. Create an Amazon DynamoDB table, then implement session handling at the application level to leverage the table for session data storage
A development team is now working on a case management system that will enable the processing and evaluation of medical claims. Users log in to share medical and financial information. Sensitive data such as medical records, medical imaging, bank statements, and invoices are uploaded to Amazon S3 as part of the program. All papers must be sent and kept securely. All access to documents must be documented for auditing purposes. Which technique is the MOST SECURE?
A. Use S3 default encryption using Advanced Encryption Standard-256 (AES-256) on the destination bucket.
B. Use Amazon Cognito for authorization and authentication to ensure the security of the application and documents.
C. Use AWS Lambda to encrypt and decrypt objects as they are placed into the S3 bucket.
D. Use client-side encryption/decryption with Amazon S3 and AWS KMS.
A developer is developing a web application that will allow end users to exchange encrypted documents. The papers are saved on Amazon S3 in a private bucket. Only verified users should be able to download certain documents when requested, and only for a period of 15 minutes. How is the developer to adhere to these specifications?
A. Copy the documents to a separate S3 bucket that has a lifecycle policy for deletion after 15 minutes.
B. Create a presigned S3 URL using the AWS SDK with an expiration time of 15 minutes.
C. Use server-side encryption with AWS KMS managed keys (SSE-KMS) and download the documents using HTTPS.
D. Modify the S3 bucket policy to only allow specific users to download the documents. Revert the change after 15 minutes.
A front-end web application handles user authentication with Amazon Cognito user pools. Using the AWS SDK for JavaScript, a developer integrates Amazon DynamoDB into the application. How might a developer contact the API safely without disclosing the access or secret keys?
A. Configure Amazon Cognito identity pools and exchange the JSON Web Token (JWT) for temporary credentials.
B. Run the web application in an Amazon EC2 instance with the instance profile configured.
C. Hardcore the credentials, use Amazon S3 to host the web application, and enable server-side encryption.
D. Use Amazon Cognito user pool JSON Web Tokens (JWITs) to access the DynamoDB APIs.
A business administers a website that is hosted on Amazon EC2 instances that are routed via an Elastic Load Balancer. CPU use is limited on EC2 Instances. The technical staff at the organization is responsible for securing incoming internet traffic. Which combination of actions will satisfy these criteria? (Select two.)
A. Configure the Elastic Load Balancer with SSL passthrough.
B. Configure SSL certificates on the Elastic Load Balancer.
C. Configure the Elastic Load Balancer with a Loadable Storage System.
D. Install SSL certificates on the EC2 instances.
E. Configure the Elastic Load Balancer with SSL termination.
In AWS Lambda, a developer is developing an application. To facilitate testing and deployments, the Developer need the ability to change the database connection string without affecting the Lambda code. How is this criterion to be met?
A. Store the connection string as a secret in AWS Secrets Manager.
B. Store the connection string in an IAM user account.
C. Store the connection string in AWS KMS.
D. Store the connection string as a Lambda layer.
{"name":"AWS-DA(221-230)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of AWS services and DevOps practices with our engaging quiz! Designed for developers and IT professionals, this quiz will challenge your understanding of continuous integration, deployment strategies, and secure data management in the AWS ecosystem.10 thoughtfully crafted questionsFocus on AWS services like Lambda, DynamoDB, and KMSPerfect for preparing for AWS certifications or enhancing your skills","img":"https:/images/course1.png"}