AWS-DA(141-150)

Create an engaging and informative image representing cloud computing, AWS services, and application deployment with a vibrant color scheme and modern design elements.

AWS Deployment Mastery Quiz

Testing your knowledge on AWS deployment strategies can provide you with valuable insights into best practices and innovative solutions. This quiz covers a range of topics related to Amazon Web Services, ensuring you have a comprehensive understanding of cloud deployment scenarios.

  • 10 thought-provoking questions
  • Real-world scenarios
  • Test your AWS knowledge
10 Questions2 MinutesCreated by DeployingCloud42
AWS Organizations enables a business to manage many accounts. Account A utilizes an Amazon EC2 instance to host an application. The program makes advantage of the AWS command line interface to do automatic deployments in Account '. By using an EC2 IAM service role in Account A and an IAM role in Account ', an administrator established cross-account access. The application attempts to take the IAM role in Account' using the following command but is unable to deploy anything in Account'. Assume aws sts - -role —role-arn :aws:iam::AccountB-ID>:role/AccountB-Role€am:aws:iam::AccountB-ID>:role/AccountB-Role AccountB-Role-Session-Name € —role-session-name Which action is required next to enable the application to effectively utilise the credentials obtained via the usage of Account B's role?
A. Configure the access key and secret access key of a valid IAM user from Account ׀’ in the environment variables.
B. Configure the access key, secret access key, and token from the assume-role command in the environment variables.
C. Create a CLI profile for the EC2 IAM service role in the AWS configuration file.
D. Delete any access keys and secret access keys in the environment variables.
A business is developing a REST service utilizing an Amazon API Gateway integrated with AWS Lambda. For testing reasons, the service must run several versions. What is the MOST EFFECTIVE approach to do this?
A. Use an X-Version header to denote which version is being called and pass that header to the Lambda function(s)
B. Create an API Gateway Lambda authorizer to route API clients to the correct API version
C. Create an API Gateway resource policy to isolate versions and provide context to the Lambda function(s)
D. Deploy the API versions as unique stages with unique endpoints and use stage variables to provide further context
A developer has created a web application that is accessible to customers and is running on an Amazon EC2 instance. Every request made to the program is logged. Normally, the program operates without incident, but a traffic surge creates numerous logs, causing the disk to fill up and finally run out of memory. According to company policy, all historical logs must be consolidated for analysis. Which long-term remedy should the developer use to avoid a recurrence of the issue?
A. Set up log rotation to rotate the file every day. Also set up log rotation to rotate after every 100 MB and compress the file.
B. Install the Amazon CloudWatch agent on the instance to send the logs to CloudWatch. Delete the logs from the instance once they are sent to CloudWatch.
C. Enable AWS Auto Scaling on Amazon Elastic Block Store (Amazon EBS) to automatically add volumes to the instance when it reaches a specified threshold.
D. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to pull the logs from the instance. Configure the rule to delete the logs after they have been pulled.
An application must handle the client's IP address. The application has been transferred to Amazon Web Services and is now protected by an Application Load Balancer (ALB). However, it seems as if all client IP addresses have become identical. The application must retain its horizontal scalability. What is the MOST cost-effective solution to this issue based on this scenario?
A. Remove the application from the ALB. Delete the ALB and change Amazon Route 53 to direct traffic to the instance running the application.
B. Remove the application from the ALB. Create a Classic Load Balancer in its place. Direct traffic to the application using the HTTP protocol.
C. Alter the application code to inspect the X-Forwarded-For header. Ensure that the code can work properly if a list of IP addresses is passed in the header.
D. Alter the application code to inspect a custom header. Alter the client code to pass the IP address in the custom header.
A developer is attempting to use AWS CodeDeploy to deploy a serverless application. The application has been upgraded and requires re-deployment. What file does the developer need to edit to enable CodeDeploy to submit the change?
A. dockerrun.aws.json
B. buildspec.yml
C. appspec.yml
D. ebextensions.config
All personally identifiable information (PII) is stored by a corporation in an Amazon DynamoDB database called PII in Account A. Access to the PII database is required by an application operating on Amazon EC2 instances in Account B. Account A's administrator established an IAM role called AccessPII with access credentials to the PII database and added Account B as a trusted entity. Which extra actions need developers take in order to have access to the table? (Select two.)
A. Ask an administrator in Account B to allow the EC2 IAM role permission to assume the AccessPII role.
B. Ask an administrator in Account B to allow the EC2 IAM role permission to assume the AccessPII role with predefined service control policies.
C. Ask an administrator in Account A to allow the EC2 IAM role permission to assume the AccessPII role with predefined service control policies.
D. Include the AssumeRole API in the application code logic to obtain credentials to access the PII table.
E. Include the GetSessionToken API in the application code logic to obtain credentials to access the PII table.
Users will be required to access AWS services and will be able to update their own passwords, according to an application being developed by a business. Which of the following would allow the organization to manage users and authorization while allowing users to change their passwords on their own?
A. Amazon Cognito identify pools and AWS STS
B. Amazon Cognito identity pools and AWS IAM
C. Amazon Cognito user pools and AWS KMS
D. Amazon Cognito user pools and identity pools
A developer enhanced an application that runs on an Amazon EC2 instance and makes use of Amazon SQS. The developer observed a large spike in Amazon SQS prices upon deployment. When monitoring the Amazon SQS metrics using Amazon CloudWatch, the developer saw that this queue receives an average of one message every minute. What can be done to lower this application's Amazon SQS costs?
A. Increase the Amazon SQS queue polling timeout.
B. Scale down the Amazon SQS queue to the appropriate size for low traffic demand.
C. Configure push delivery via Amazon SNS instead of polling the Amazon SQS queue.
D. Use an Amazon SQS first-in, first-out (FIFO) queue instead of a standard queue.
A developer has configured an Amazon Kinesis Stream with four shards to accept records at a rate of up to 2500 per second. To handle these records, a Lambda function has been configured. Which records will be processed first?
A. Lambda will receive each record in the reverse order it was placed into the stream following a LIFO (last-in, first-out) method
B. Lambda will receive each record in the exact order it was placed into the stream following a FIFO (first-in, first-out) method.
C. Lambda will receive each record in the exact order it was placed into the shard following a FIFO (first-in, first-out) method. There is no guarantee of order across shards.
D. The Developer can select FIFO, (first-in, first-out), LIFO (last-in, last-out), random, or request specific record using the getRecords API.
A developer is doing testing on a Docker-based application that communicates with Amazon DynamoDB using the AWS SDK. The program utilized IAM access credentials in the local development environment. The application is now prepared for ECS cluster deployment. In production, how should the application authenticate with AWS services?
A. Configure an ECS task IAM role for the application to use
B. Refactor the application to call AWS STS AssumeRole based on an instance role
C. Configure AWS access key/secret access key environment variables with new credentials
D. Configure the credentials file with a new access key/secret access key
{"name":"AWS-DA(141-150)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Testing your knowledge on AWS deployment strategies can provide you with valuable insights into best practices and innovative solutions. This quiz covers a range of topics related to Amazon Web Services, ensuring you have a comprehensive understanding of cloud deployment scenarios.10 thought-provoking questionsReal-world scenariosTest your AWS knowledge","img":"https:/images/course2.png"}
Powered by: Quiz Maker