New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following DVA-C01 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is DVA-C02

DVA-C01 Exam Dumps - AWS Certified Developer Associate Exam

Go to page:
Question # 25

If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other users by default?

A.

0 seconds

B.

1 hour

C.

1 day

D.

forever

E.

30 seconds

Full Access
Question # 26

An application running on EC2 instances is storing data in an S3 bucket. Security policy mandates that all data must be encrypted in transit.

How can the Developer ensure that all traffic to the S3 bucket is encrypted?

A.

Install certificates on the EC2 instances.

B.

Create a bucket policy that allows traffic where SecureTransport is true.

C.

Create an HTTPS redirect on the EC2 instances.

D.

Create a bucket policy that denies traffic where SecureTransport is false.

Full Access
Question # 27

A Developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon

DynamoDB. In the local development environment, the application has used IAM access keys. The application is now ready for deployment onto an ECS cluster.

How should the application authenticate with AWS services in production?

A.

Configure an ECS task IAM role for the application to use

B.

Refactor the application to call AWS STS AssumeRole based on an instance role

C.

Configure AWS access key/secret access key environment variables with new credentials

D.

Configure the credentials file with a new access key/secret access key

Full Access
Question # 28

An application running on Amazon EC2 instances must access objects within an Amaon S3 busket that are encrypted using server-side encryption using AWS KMS encryption keys (SSE-KMS). The application must have access to the customer master key (CMK) to decrypt the objects.

Which combination of steps will grant the application access? (Select TWO.)

A.

Write an S3 bucket policy that grants the bucket access to the key.

B.

Grant access to the key in the IAM EC2 role attached to the application’s EC2 instances.

C.

Write a key policy that enables IAM policies to grant access to the key.

D.

Grant access to the key in the S3 bucket’s ACL

E.

Create a Systems Manager parameter that exposes the KMS key to the EC2 instances.

Full Access
Question # 29

A Developer is designing a new application that uses Amazon S3. To satisfy compliance requirements, the Developer must encrypt the data at rest.

How can the Developer accomplish this?

A.

Use s3:x-amz-acl as a condition in the S3 bucket policy.

B.

Use Amazon RDS with default encryption.

C.

Use aws:SecureTransport as a condition in the S3 bucket policy.

D.

Turn on S3 default encryption for the S3 bucket.

Full Access
Question # 30

A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol.

What services can the Developer use to meet these requirements?

A.

Amazon DynamoDB to store MFA session data, and Amazon SNS to send MFA codes

B.

Amazon Cognito with MFA

C.

AWS Directory Service

D.

AWS IAM with MFA enabled

Full Access
Question # 31

What does an Amazon SQS delay queue accomplish?

A.

Messages are hidden for a configurable amount of time when they are first added to the queue.

B.

Messages are hidden for a configurable amount of time after they are consumed from the queue.

C.

The consumer can poll the queue for a configurable amount of time before retrieving a message.

D.

Message cannot be deleted for a configurable amount of time after they are consumed from the queue.

Full Access
Question # 32

A developer deploys an ecommerce application on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances run in an Amazon EC2 Auto Scaling group. The EC2 instances are based on an Amazon Machine Image (AMI) that uses an Amazon Elastic Block Store (Amazon EBS) root volume. After deployment, the developer notices that a third of the instances seem to be idle. These instances are not receiving requests from the load balancer. The developer verifies that all the instances are registered with the load balancer. The developer must implement a solution to allow the EC2 instances to receive requests from the load balancer.

Which action will meet this requirement?

A.

Reregister the failed instances with the ALB.

B.

Enable all Availability Zones for the ALB.

C.

Use the instance refresh feature to redeploy the EC2 Auto Scaling group.

D.

Restart the EC2 instances that are not receiving traffic.

Full Access
Go to page: