AWS Certified Developer Associate Page4 (Dumps)
Question No:-16
|
A developer is writing an AWS Lambda function. The Lambda function needs to access items that are stored in an Amazon DynamoDB table.
What is the MOST secure way to configure this access for the Lambda function?
1. Create an IAM user that has permissions to access the DynamoDB table. Create an access key for this user. Store the access key ID and secret access key in the Lambda function environment variables.
2. Add a resource-based policy to the DynamoDB table to allow access from the Lambda function's IAM role.
3. Create an IAM policy that allows access to the DynamoDB table. Attach this policy to the Lambda function's IAM role.
4. Create a DynamoDB Accelerator (DAX) cluster. Configure the Lambda function to use the DAX duster to access the DynamoDB table.
Answer:-3. Create an IAM policy that allows access to the DynamoDB table. Attach this policy to the Lambda function's IAM role.
|
|
Question No:-17
|
A developer is implementing user authentication and authorization for a web application that is hosted on an Amazon EC2 instance. The developer needs to ensure that the user credentials are encrypted and secure when they are stored and transmitted.
Which solution will meet these requirements?
1. Activate web server modules for authentication and authorization on the instance. Use HTTP basic authentication for the user login.
2. Deploy a custom authentication and authorization API over HTTP. Store the user credentials on Amazon ElastiCache for Redis.
3. Use Amazon Cognito to configure a user pool. Use the Amazon Cognito API to authenticate and authorize the users.
4. Create IAM users. Assign the users to different IAM groups. Use AWS Single Sign-On to authenticate and authorize each user.
Answer:-3. Use Amazon Cognito to configure a user pool. Use the Amazon Cognito API to authenticate and authorize the users.
|
|
Question No:-18
|
A company that has multiple offices uses an Amazon DynamoDB table to store employee payroll information. Item attributes consist of employee names, office identifiers, and cumulative daily hours worked The most frequently used query extracts a report of an alphabetical subset of employees for a specific office.
Which design of the DynamoDB table primary key will have the MINIMUM performance impact?
1. Partition key on the office identifier and sort key on the employee name
2. Partition key on the employee name and sort key on the office identifier
3. Partition key on the employee name
4. Partition key on the office identifier
Answer:-1. Partition key on the office identifier and sort key on the employee name
Most user choose there answer as given below
|
|
Question No:-19
|
A company hosts a microservices application that uses Amazon API Gateway. AWS Lambda, Amazon Simple Queue Service (Amazon SQS), and Amazon DynamoDB. One of the Lambda functions adds messages to an SQS FIFO queue.
When a developer checks the application logs, the developer finds a few duplicated items in a DynamoDB table. The items were inserted by another polling function that processes messages from the queue.
What is the MOST likely cause of this issue?
1. Write operations on the DynamoDB table are being throttled.
2. The SQS queue delivered the message to the function more than once.
3. API Gateway duplicated the message in the SQS queue.
4. The polling function timeout is greater than the queue visibility timeout.
Answer:-4. The polling function timeout is greater than the queue visibility timeout.
|
|
Question No:-20
|
A development team has been using a builder server that is hosted on an Amazon EC2 instance to perform builds and deployments for the last 3 months. The EC2 instance's instance profile uses an IAM role that contains the Administrator Access managed policy. The development team must replace that policy with a policy that provides only the required permissions.
What is the FASTEST way to create a custom 1AM policy for the EC2 instance to meet this requirement?
1. Create a new IAM policy based on services that the build server deployed or updated in the last 3 months.
2. Create a new IAM policy that includes all actions that AWS CloudTrail recorded for the IAM role in the last 3 months.
3. Create a new permissions boundary policy that denies all access. Associate the permissions boundaries with the IAM role.
4. Create a new IAM policy by using Amazon Athena to query an Amazon S3 bucket that contains AWS CloudTrail events that the IAM role performed in the last 3 months.
Answer:-2. Create a new IAM policy that includes all actions that AWS CloudTrail recorded for the IAM role in the last 3 months.
Most user choose there answer as given below
|
|
|