AWS-DA(281-290)
AWS Development Certification Quiz
Test your knowledge on AWS development with this comprehensive quiz designed for developers preparing for certification. Each question will challenge your understanding of key AWS services and best practices.
Key Features:
- 10 carefully crafted questions
- Multiple choice format
- Focus on real-world applications of AWS
A developer wishes to encrypt new objects that an application uploads to an Amazon S3 bucket. There must be a record of who used the key throughout this procedure. There should be no difference in the application's performance. Which form of encryption satisfies these criteria?
A. Server-side encryption using S3-managed keys
B. Server-side encryption with AWS KMS-managed keys
C. Client-side encryption with a client-side symmetric master key
D. Client-side encryption with AWS KMS-managed keys
Three microservice projects are created by a developer and are stored in distinct folders under the same AWS CodeCommit repository. Each project is served by a distinct AWS CodePipeline pipeline. When a developer pushes modifications to a single microservice, all three pipelines begin to execute. The developer must ensure that only necessary pipelines are executed. The developer is not permitted to alter the organization of the repository. Which solution will satisfy these criteria?
A. For each of the three microservice projects, create a separate CodeCommit repository.
B. Create an Amazon EventBridge (Amazon CloudWatch Events) rule that invokes an AWS Lambda function to evaluate changes to the repository and run the appropriate pipeline.
C. Create an Amazon API Gateway API that is backed by an AWS Lambda function to determine the appropriate pipeline to run. Add the API endpoint to a webhook in CodeCommit.
D. Migrate all three pipelines to a single pipeline. Add conditional stages to build a certain microservice project.
A developer is currently building code for an Amazon Web Services Lambda function. The function will act as a Lambda authorizer, allowing Amazon API Gateway to manage access to a certain API. Along with the primary identity, what should this code return following successful authentication?
A. An HTTP response status code of 200 that indicates successful completion
B. An integer 0 that indicates successful completion
C. The Amazon Resource Name (ARN) of an IAM role that will be assumed for authentication
D. A policy document with desired permissions
Continuous integration/continuous delivery (CI/CD) systems are being used by a business. A developer needs automate the distribution of a software application bundle to Amazon EC2 instances and on-premises virtual servers. Which Amazon Web Services (AWS) service should the developer utilize to satisfy these requirements?
A. AWS Cloud9
B. AWS CodeBuild
C. AWS Elastic Beanstalk
D. AWS CodeDeploy
A smartphone application that allows users to see photographs from an S3 bucket is being developed by a developer. Users must be able to log in using their Amazon credentials as well as their Facebook® and/or Google® accounts. How will the Developer be able to implement this authentication feature?
A. Use Amazon Cognito with web identity federation.
B. Use Amazon Cognito with SAML-based identity federation.
C. Use AWS IAM Access/Secret keys in the application code to allow Get* on the S3 bucket.
D. Use AWS STS AssumeRole in the application code and assume a role with Get* permissions on the S3 bucket.
A developer is developing an application that will operate on Amazon EC2 instances that are members of an Auto Scaling group. The application's data is kept in an Amazon DynamoDB database, and all instances maintain records in real time. At times, an instance retrieves outdated data. The Developer want to rectify issue by ensuring that readings are very consistent. How is this accomplished by the Developer?
A. Set ConsistentRead to true when calling GetItem.
B. Create a new DynamoDB Accelerator (DAX) table.
C. Set Consistency to strong when calling UpdateTable.
D. Use the GetShardIterator command.
A developer is developing a web application for AWS Lambda. Users will be able to log in and see private documents using the application. All pages in the application must adhere to the company's branding guidelines. How can the developer host the sign-in pages with the LESS custom code possible?
A. Upload files for the sign-in pages with the required branding to an Amazon S3 bucket. Configure static website hosting for the S3 bucket.
B. Create a Lambda function to serve the sign-in pages with the required branding. Configure Amazon API Gateway to route traffic to the function.
C. Create a Lambda@Edge function to serve the sign-in pages with the required branding. Configure Amazon CloudFront to invoke the function in response to user requests.
D. Configure an Amazon Cognito user pool with an Amazon Cognito hosted UI for the sign-in pages. Customize the pages with the required branding.
An AWS Lambda function is being written by a developer. The developer want to record critical events that occur during the Lambda function's execution and to provide a unique identifier that will allow the events to be associated with a single function invocation. Which of the following will assist the developer in achieving this goal?
A. Obtain the request identifier from the Lambda context object. Architect the application to write logs to the console.
B. Obtain the request identifier from the Lambda event object. Architect the application to write logs to a file.
C. Obtain the request identifier from the Lambda event object. Architect the application to write logs to the console.
D. Obtain the request identifier from the Lambda context object. Architect the application to write logs to a file.
A business has an Amazon S3 bucket holding premium material that it wants to make accessible exclusively to paying website subscribers. Currently, the S3 bucket's default permissions set all objects to private to avoid inadvertently exposing premier material to non-paying website users. How is the corporation able to restrict access to a premium content file in the S3 bucket to just paying subscribers?
A. Apply a bucket policy that allows anonymous users to download the content from the S3 bucket.
B. Generate a pre-signed object URL for the premier content file when a paid subscriber requests a download.
C. Add a bucket policy that requires multi-factor authentication for requests to access the S3 bucket objects.
D. Enable server-side encryption on the S3 bucket for data protection against the non-paying website visitors.
A developer hosts static websites using Amazon S3 buckets. The developer builds two S3 buckets: one for the code and another for the assets, which include picture and video files. When a user tries to access the assets bucket from the code bucket, access is forbidden, and the website application displays a 403 error. How should the Developer approach this situation?
A. Create an IAM role and apply it to the assets bucket for the code bucket to be granted access.
B. Edit the bucket policy of the assets bucket to open access to all principals.
C. Edit the cross-origin resource sharing (CORS) configuration of the assets bucket to allow any origin to access the assets.
D. Change the code bucket to use AWS Lambda functions instead of static website hosting.
{"name":"AWS-DA(281-290)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on AWS development with this comprehensive quiz designed for developers preparing for certification. Each question will challenge your understanding of key AWS services and best practices.Key Features:10 carefully crafted questionsMultiple choice formatFocus on real-world applications of AWS","img":"https:/images/course4.png"}