New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following DVA-C01 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is DVA-C02

DVA-C01 Exam Dumps - AWS Certified Developer Associate Exam

Go to page:
Question # 4

A developer notices timeouts from the AWS CLI when the developer runs list commands. What should the developer do to avoid these timeouts?

A.

Use the -page-size parameter to request a smaller number of items.

B.

Use shorthand syntax to separate the list by a single space.

C.

Use the yaml-stream output for faster viewing of large datasets.

D.

Use quotation marks around strings to enclose data structure.

Full Access
Question # 5

A developer deployed an application to an Amazon EC2 instance. The application needs to know the public IPv4 address of the instance. How can the application find this information?

A.

Query the instance metadata from http://169.254.169.254/latest/meta-data/.

B.

Query the instance user data from http://169 254.169.254/latest/user-data/.

C.

Query the Amazon Machine Image (AMI) information from http://169 254.169.254/latesl/meta-data/ami/.

D.

Check the hosts file of the operating system.

Full Access
Question # 6

A developer is troubleshooting a new AWS Lambda function. The function should run automatically each time a new object is uploaded to an Amazon S3 bucket. However, the developer finds that all calls failed before they reached the application code inside the function.

Which of the following is a possible reason for this failure?

A.

The function resource policy does not allow access from Amazon S3.

B.

The function execution role does not allow access from Amazon S3.

C.

The function execution role does not allow access to Amazon S3.

D.

The IAM user does not have access to Amazon S3.

Full Access
Question # 7

A business intelligence application runs on Amazon Elastic Container Service (Amazon ECS) on AWS Fargate. Application-level audits require a searchable log of all API calls from users to the application. The application’s developers must store the logs centrally on AWS.

Which solution will meet these requirements?

A.

Install the Amazon CloudWatch agent on the Amazon EC2 host that runs Fargate.

B.

Configure the awslogs log driver in the ECS task definition.

C.

Configure AWS CloudTrail for the ECS containers.

D.

Install the ECS logs collector on the ECS hosts.

Full Access
Question # 8

A Developer is working on an application that handles 10MB documents that contain highly-sensitive data. The application will use AWS KMS to perform client-side encryption.

What steps must be followed?

A.

Invoke the Encrypt API passing the plaintext data that must be encrypted, then reference the customer managed key ARN in the KeyId parameter

B.

Invoke the GenerateRandom API to get a data encryption key, then use the data encryption key to encrypt the data

C.

Invoke the GenerateDataKey API to retrieve the encrypted version of the data encryption key to encrypt the data

D.

Invoke the GenerateDataKey API to retrieve the plaintext version of the data encryption key to encrypt the data

Full Access
Go to page: