AWS-DA(121-130)

A visually engaging illustration of cloud computing concepts, featuring AWS services such as Lambda, EC2, and S3 in a modern, tech-inspired design.

AWS Development Quiz

Test your knowledge on AWS services and development best practices with our comprehensive quiz! This quiz is designed for developers looking to enhance their understanding of AWS solutions and practices.

After completing the quiz, you will:

  • Gain deeper insights into AWS services
  • Improve your cloud development skills
  • Receive immediate feedback on your answers
10 Questions2 MinutesCreated by CodingCloud99
On a local development workstation, a developer has constructed a Node.js web application. The developer want to host the website on AWS. The developer desires a solution that has the fewest operational overhead and requires no code modifications. Which Amazon Web Services (AWS) service should the developer utilize to satisfy these requirements?
A. AWS Elastic Beanstalk
B. Amazon EC2
C. AWS Lambda
D. Amazon Elastic Kubernetes Service (Amazon EKS)
A business operates an application on AWS Lambda@Edge. The application offers material that adapts according on the device being used by the viewer. The number of hits by device type is written to logs in Amazon CloudWatch Logs that are saved in a log group. For each device type, the organization must provide an Amazon CloudWatch custom metric. Which strategy will satisfy these criteria?
A. Create a CloudWatch Logs Insights query to extract the device type information from the logs and to create a custom metric with device type as a dimension.
B. Create a CloudWatch metric filter to extract metrics from the log files with device type as a dimension.
C. Update the application to write its logs in the CloudWatch embedded metric format with device type as a dimension.
D. Configure the CloudWatch Logs agent for Lambda integration. Update the application to use the StatsD protocol to emit the metrics.
A programmer is developing a new application that will make advantage of Amazon S3. To comply with regulatory standards, the Developer must encrypt data in transit. How is this accomplished by the Developer?
A. Use s3:x-amz-acl as a condition in the S3 bucket policy.
B. Use Amazon RDS with default encryption.
C. Use aws:SecureTransport as a condition in the S3 bucket policy.
D. Turn on S3 default encryption for the S3 bucket.
On Amazon EC2, a developer is developing an application. During testing, the developer experienced a €Access Denied€ error on many API requests to AWS services. The developer must alter the permissions previously granted to the instance. How can these needs be accomplished with the fewest possible adjustments and downtime?
A. Make a new IAM role with the needed permissions. Stop the instance. Attach the new IAM role to the instance. Start the instance.
B. Delete the existing IAM role. Attach a new IAM role with the needed permissions.
C. Stop the instance. Update the attached IAM role adding the needed permissions. Start the instance.
D. Update the attached IAM role adding the needed permissions.
A developing program requires the storage of hundreds of video files. Prior to storage, the data must be encrypted inside the program using a unique key for each video file. How should the application's developer code it?
A. Use the KMS Encrypt API to encrypt the data. Store the encrypted data key and data.
B. Use a cryptography library to generate an encryption key for the application. Use the encryption key to encrypt the data. Store the encrypted data.
C. Use the KMS GenerateDataKey API to get a data key. Encrypt the data with the data key. Store the encrypted data key and data.
D. Upload the data to an S3 bucket using server side-encryption with an AWS KMS key.
An existing serverless application handles picture files that have been uploaded. At the moment, the process is implemented using a single Lambda function that accepts an image file, processes it, and saves it in Amazon S3. The application's users now demand picture thumbnail production. Users desire to minimize the time required to complete picture uploads. How can thumbnail creation be integrated into an application while still adhering to user expectations and requiring little modifications to current code?
A. Change the existing Lambda function handling the uploads to create thumbnails at the time of upload. Have the function store both the image and thumbnail in Amazon S3.
B. Create a second Lambda function that handles thumbnail generation and storage. Change the existing Lambda function to invoke it asynchronously.
C. Create an S3 event notification with a Lambda function destination. Create a new Lambda function to generate and store thumbnails.
D. Create an S3 event notification to an SQS Queue. Create a scheduled Lambda function that processes the queue, and generates and stores thumbnails.
A developer wishes to give systems administrators access to the log data of an application operating on an EC2 instance. In Amazon CloudWatch, which of the following provides monitoring of this metric?
A. Retrieve the log data from CloudWatch using the GetMetricData API call.
B. Retrieve the log data from AWS CloudTrail using the LookupEvents API call.
C. Launch a new EC2 instance, configure Amazon CloudWatch Events, and then install the application.
D. Install the Amazon CloudWatch Logs agent on the EC2 instance that the application is running on.
A business is creating an application that will operate on several Amazon EC2 instances in an Auto Scaling group and will have access to an Amazon EC2 database. The program must save the credentials necessary to connect to the database. Periodic secret rotation must be supported in the application, and the program should remain unchanged when a secret changes. How can these needs be met in the SAFEST manner possible?
A. Associate an IAM role to the EC2 instance where the application is running with permission to access the database.
B. Use AWS Systems Manager Parameter Store with the SecureString data type to store secrets.
C. Configure the application to store secrets in Amazon S3 object metadata.
D. Hard code the database secrets in the application code itself.
A developer used a CLI command to register an AWS Lambda function as a target for an Application Load Balancer (ALB). However, when the client submits requests via the ALB, the Lambda function is not called. Why isn't the Lambda function called?
A. A Lambda function cannot be registered as a target for an ALB.
B. A Lambda function can be registered with an ALB using AWS Management Console only.
C. The permissions to invoke the Lambda function are missing.
D. Cross-zone is not enabled on the ALB.
A corporation has numerous developers stationed across the world who are progressively upgrading code for a development project. When developers upload code simultaneously, internet connection is poor, and uploading code for deployment in AWS Elastic Beanstalk takes a long time. Which approach will result in the smallest amount of administrative work and the shortest upload and deployment times?
A. Allow the Developers to upload the code to an Amazon S3 bucket, and deploy it directly to Elastic Beanstalk.
B. Allow the Developers to upload the code to a central FTP server to deploy the application to Elastic Beanstalk.
C. Create an AWS CodeCommit repository, allow the Developers to commit code to it, and then directly deploy the code to Elastic Beanstalk.
D. Create a code repository on an Amazon EC2 instance so that all Developers can update the code, and deploy the application from the instance to Elastic Beanstalk.
{"name":"AWS-DA(121-130)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on AWS services and development best practices with our comprehensive quiz! This quiz is designed for developers looking to enhance their understanding of AWS solutions and practices.After completing the quiz, you will:Gain deeper insights into AWS servicesImprove your cloud development skillsReceive immediate feedback on your answers","img":"https:/images/course8.png"}
Powered by: Quiz Maker