New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following DVA-C01 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is DVA-C02

DVA-C01 Exam Dumps - AWS Certified Developer Associate Exam

Go to page:
Question # 73

A developer is building an application on Amazon EC2 The developer encountered an "Access Denied" error on some of the API calls to AWS services while testing The developer needs to modify permissions that have been already given to the instance

How can these requirements be met with minimal changes and minimum downtime?

A.

Make a new 1AM role with the needed permissions Stop the instance. Attach the new 1AM role to the instance Start the instance.

B.

Delete the existing 1AM role Attach a new 1AM role with the needed permissions

C.

Stop the instance Update the attached 1AM role adding the needed permissions. Start the instance

D.

Update the attached 1AM role adding the needed permissions

Full Access
Question # 74

A developer supports an application that accesses data in an Amazon DynamoDB table One of the item attributes is expirationDate In the timestamp format The application uses this attribute to find items archive them and remove them from the table based on the timestamp value

The application will be decommissioned soon, and the developer must find another way to implement this functionality The developer needs a solution that will require the least amount of code to write.

Which solution will meet these requirements?

A.

Enable TTL on the expirationDate attribute in the table. Create a DynamoDB stream. Create an AWS Lambda function to process the deleted items. Create a DynamoDB trigger for the Lambda function

B.

Create two AWS Lambda functions one to delete the items and one to process the items Create a DynamoDB stream Use the Deleteltem API operation to delete the items based on the expirationDate attribute Use the GetRecords API operation to get the items from the DynamoDB stream and process them

C.

Create two AWS Lambda functions one to delete the items and one to process the items Create an Amazon EventBridge (Amazon CloudWatch Events) scheduled rule to invoke the Lambda functions Use the Deleteltem API operation to delete the items based on the expirationDate attribute Use the GetRecords API operation to get the items from the DynamoDB table and process them

D.

Enable TTL on the expirationDate attribute in the table Specify an Amazon Simple Queue Service (Amazon SQS) dead-letter queue as the target to delete the items Create an AWS Lambda function to process the items.

Full Access
Question # 75

A developer has written an application that runs on Amazon EC2 instances. The developer is adding functionality for the application to write objects to an Amazon S3 bucket Which policy must the developer modify to allow the instances to write these objects?

A.

The 1AM policy that is attached to the EC2 instance profile role

B.

The session policy that is applied to the EC2 instance role session

C.

The AWS Key Management Service (AWS KMS) key policy that is attached to the EC2 instance profile role.

D.

The Amazon VPC endpoint policy

Full Access
Question # 76

A development team is building a new application that will run on Amazon EC2 and use Amazon DynamoDB as a storage layer The developers all have assigned IAM user accounts in the same IAM group The developers currently can launch EC2 instances and they need to be able to launch EC2 instances with an instance role allowing access to Amazon DynamoDB.

Which AWS I AM changes are needed when creating an instance role to provide this functionality^

A.

Create an IAM permission policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows DynamoDB to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the IAM GetRole and IAM PassRole permissions for the role

B.

Create an IAM permissions policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows Amazon EC2 to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the IAM PassRole permission for the role

C.

Create an IAM permission policy attached to the role that allows access to Amazon EC2 Add a trust policy to the role that allows DynamoDB to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the IAM PassRole permission for the role

D.

Create an IAM permissions policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows Amazon EC2 to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the iam GetRole permission for the role.

Full Access
Question # 77

A developer is building an AWS Lambda function that will dynamically generate and send a weekly newsletter to 100.000 users This newsletter contains both static text and images The developer needs a fast and highly scalable place to store the images that will be hyperlinked in the newsletter

Where should the developer store these images?

A.

Use an Amazon DynamoDB table with DynamoDB Streams and read capacity auto scaling enabled

B.

Use an Amazon S3 bucket and S3 Transfer Acceleration to speed up the image download

C.

Use an Amazon Aurora database with a public DNS endpoint and auto scaling enabled

D.

Use an Amazon S3 backed Amazon CloudFront distribution with a high Time-to-Live (TTL) to maximize caching

Full Access
Question # 78

A company has a web application In an Amazon Elastic Container Service (Amazon ECS) cluster running hundreds of secure services in AWS Fargate containers. The services are in target groups routed by an Application Load Balancer (ALB) Application users log in to the website anonymously, but they must be authenticated using any OpenID Connect protocol-compatible identity provider (IdP) to access the secure services

Which authentication approach would meet these requirements with the LEAST amount of effort?

A.

Configure the services to use Amazon Cognito.

B.

Configure the ALB to use Amazon Cognito

C.

Configure the services to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP.

D.

Configure the Amazon ECS cluster to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP

Full Access
Question # 79

A developer is designing a distributed application built using a microservices architect spanning multiple AWS accounts. The company's operations team wants to analyze and debug application issues from a centralized account.

How can the developer meet these requirements?

A.

Use an Amazon X-Ray agent with role assumption on to publish data into the centralized account.

B.

Use Amazon X-Ray and create a new IAM user to publish the access keys into the centralized account.

C.

Use VPC Flow Logs to collect application logs across different accounts.

D.

Enable AWS CloudTrail to publish the trails in an Amazon S3 bucket in the centralized account.

Full Access
Question # 80

A company is developing a new web application in Python A developer must deploy the application using AWS Elastic Beanstalk from the AWS Management Console The developer creates an Elastic Beanstalk source bundle to upload using the console

Which of the following are requirements when creating the source bundle? (Select TWO.)

A.

The source bundle must include the ebextensions.yaml file.

B.

The source bundle must not include a top-level directory.

C.

The source bundle must be compressed with any required dependencies in a top-level parent folder

D.

The source bundle must be created as a single zip or war file

E.

The source bundle must be uploaded into Amazon EFS.

Full Access
Go to page: