exam 1 Flashcards
Which of the following are good use cases for how Amazon ElastiCache can help an application? (Select TWO.)
A. Improve the performance of S3 PUT operations.
B. Improve the latency of deployments performed by AWS CodeDeploy.
C. Improve latency and throughput for read-heavy application workloads.
D. Reduce the time required to merge AWS CodeCommit branches
E. Improve performance of compute-intensive applications.
C. Improve latency and throughput for read-heavy application workloads.
E. Improve performance of compute-intensive applications.
Which of the following services are key/value stores? (Choose 3 answers)
A. Amazon ElastiCache.
B. Simple Notification Service.
C. DynamoDB.
D. Simple Workflow Service.
E. Simple Storage Service.
A. Amazon ElastiCache.
C. DynamoDB.
E. Simple Storage Service.
A developer wants to send multi-value headers to an AWS Lambda function that is registered as a target with an Application Load Balancer (ALB). What should the developer do to achieve this?
A. Place the Lambda function and target group in the same account.
B. Send the request body to the Lambda function with a size less than 1 MB 0.
C. Include the Base64 encoding status status code, status description, and headers in the Lambda function.
D. Enable the multi-value headers on the ALB.
D. Enable the multi-value headers on the ALB.
A company’s ecommerce website is experiencing massive traffic spikes, which are causing performance problems in the company database. Users are reporting that accessing the website takes a long time. A developer wants to implement a caching layer using Amazon ElastiCache. The website is required to be responsive no matter which product a user views, and the updates to product information and prices must be strongly consistent
A. Which cache writing policy will satisfy these requirements?.
B. Write to the cache directly and sync the backend at a later time.
C. Write to the backend first and wait for the cache to expire.
D. Write to the cache and the backend at the same timeWrite to the backend first and invalidate the cache.
E. Write to the backend first and invalidate the cache.
E. Write to the backend first and invalidate the cache.
A Developer wants to upload data to Amazon S3 and must encrypt the data in transit. Which of the following solutions will accomplish this task? (Choose two.)
A. Set up hardware VPN tunnels to a VPC and access S3 through a VPC endpoint.
B. Set up Client-Side Encryption with an AWS KMS-Managed Customer Master Key.
C. Set up Server-Side Encryption with AWS KMS-Managed Keys.
D. Transfer the data over an SSL connectionSet up Server-Side Encryption with S3-Managed Keys.
E. Set up Server-Side Encryption with S3-Managed Keys.
B. Set up Client-Side Encryption with an AWS KMS-Managed Customer Master Key.
D. Transfer the data over an SSL connectionSet up Server-Side Encryption with S3-Managed Keys.
A Developer wants to encrypt new objects that are being uploaded to an Amazon S3 bucket by an application. There must be an audit trail of who has used the key during this process. There should be no change to the performance of the application. Which type of encryption meets these requirements?
A. Server-side encryption using S3-managed keys.
B. Server-side encryption with AWS KMS-managed keys.
C. Client-side encryption with a client-side symmetric master key.
D. Client-side encryption with AWS KMS-managed keys.
B. Server-side encryption with AWS KMS-managed keys.
An application is being developed to audit several AWS accounts. The application will run in Account A and must access AWS services in Accounts B and C. What is the MOST secure way to allow the application to call AWS services in each audited account?
A. Configure cross-account roles in each audited account. Write code in Account A that assumes those roles.
B. Use S3 cross-region replication to communicate among accounts, with Amazon S3 event notifications to trigger Lambda functions.
C. Deploy an application in each audited account with its own role. Have Account A authenticate with the application.
D. Create an IAM user with an access key in each audited account. Write code in Account A that uses those access keys.
A. Configure cross-account roles in each audited account. Write code in Account A that assumes those roles.
A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available. Which of the following could create this situation? (Select two.)
A. The traces are reaching X-Ray, but the Developer does not have access to view the records.
B. The X-Ray daemon is not installed on the EC2 instance.
C. The X-Ray endpoint specified in the application configuration is incorrect.
D. The instance role does not have ‘xray:BatchGetTraces’ and ‘xray:GetTraceGraph’ permissions.The instance role does not have ‘xray:PutTraceSegments’ and ‘xray:PutTelemetryRecords’ permissions.
E. The instance role does not have ‘xray:PutTraceSegments’ and ‘xray:PutTelemetryRecords’ permissions.
B. The X-Ray daemon is not installed on the EC2 instance.
E. The instance role does not have ‘xray:PutTraceSegments’ and ‘xray:PutTelemetryRecords’ permissions.
A company uses a third-party tool to build, bundle, and package rts applications on-premises. and store them locally. The company uses Amazon EC2 instances to run its front-end applications. How can an application be deployed from the source control system onto the EC2 instances?
A. Use AWS CodeDeploy and point it to the local storage to directly deploy a bundle m a zip. tar. or tar.gz format.
B. Upload the bundle to an Amazon S3 bucket and specify the S3 location when doing a deployment using AWS CodeDeploy.
C. Create a repository using AWS CodeCommit to automatically trigger a deployment to the EC2 instances.
D. Use AWS CodeBuild to automatically deploy the latest build to the latest EC2 instances.
B. Upload the bundle to an Amazon S3 bucket and specify the S3 location when doing a deployment using AWS CodeDeploy.
A developer is writing a web application that must share secure documents with end users. The documents are stored in a private Amazon S3 bucket. The application must allow only authenticated users to download specific documents when requested, and only for a duration of 15 minutes. How can the developer meet these requirements?
A. Copy the documents to a separate S3 bucket that has a lifecycle policy for deletion after 15 minutes.
B. Create a presigned S3 URL using the AWS SDK with an expiration time of 15 minutes.
C. Use server-side encryption with AWS KMS managed keys (SSE-KMS) and download the documents using HTTPS.
D. Modify the S3 bucket policy to only allow specific users to download the documents Revert the change after 15 minutes.
B. Create a presigned S3 URL using the AWS SDK with an expiration time of 15 minutes.
A Developer has developed a web application and wants to deploy it quickly on a Tomcat server on AWS. The Developer wants to avoid having to manage the underlying infrastructure. What is the easiest way to deploy the application, based on these requirements?
A. AWS CloudFormation.
B. AWS Elastic Beanstalk.
C. Amazon S3.
D. AWS CodePipeline.
B. AWS Elastic Beanstalk.
A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances. The application uses attached Amazon EBS disks for storing data. The application will process sensitive information and all the data must be encrypted. What should a developer do to ensure the data is encrypted on disk without impacting performance?
A. Configure the Amazon EC2 instance fleet to use encrypted EBS volumes for storing data.
B. Add logic to write all data to an encrypted Amazon S3 bucket.
C. Add a custom encryption algorithm to the application that will encrypt and decrypt all data.
D. Create a new Amazon Machine Image (AMI) with an encrypted root volume and store the data to ephemeral disks.
A. Configure the Amazon EC2 instance fleet to use encrypted EBS volumes for storing data.
A global company has an application running on Amazon EC2 instances that serves image files from Amazon S3. User requests from the browser are causing high traffic, which results in degraded performance. Which optimization solution should a Developer implement to increase application performance?
A. Create multiple prefix in the S3 bucket to increase the request rate.
B. Create an Amazon ElastiCache cluster to cache and serve frequently accessed items.
C. Use Amazon CloudFront to serve the content of images stored in Amazon S3.
D. Submit a ticket to AWS support to request a rate limit increase for the S3 bucket.
B. Create an Amazon ElastiCache cluster to cache and serve frequently accessed items.
A Developer has setup an Amazon Kinesis Stream with 4 shards to ingest a maximum of 2500 records per second. A Lambda function has been configured to process these records. In which order will these records be processed?
A. Lambda will receive each record in the reverse order it was placed into the stream following a LIFO (last-in, first-out) method.
B. Lambda will receive each record in the exact order it was placed into the stream following a FIFO (first-in, first-out) method.
C. Lambda will receive each record in the exact order it was placed into the shard following a FIFO (first-in, first-out) method. There is no guarantee of order across shards.
D. The Developer can select FIFO, (first-in, first-out), LIFO (last-in, last-out), random, or request specific record using the getRecords AP.
C. Lambda will receive each record in the exact order it was placed into the shard following a FIFO (first-in, first-out) method. There is no guarantee of order across shards.
An AWS Lambda function generates a 3MB JSON file and then uploads it to an Amazon S3 bucket daily. The file contains sensitive information, so the Developer must ensure that it is encrypted before uploading to the bucket. Which of the following modifications should the Developer make to ensure that the data is encrypted before uploading it to the bucket?
A. Use the default AWS KMS customer master key for S3 in the Lambda function code.
B. Use the S3 managed key and call the GenerateDataKey API to encrypt the file.
C. Use the GenerateDateKey API, then use that data key to encrypt the file in the Lambda function code.
D. Use a custom KMS customer master key created for S3 in the Lambda function code.
C. Use the GenerateDateKey API, then use that data key to encrypt the file in the Lambda function code.
Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser. What should Company D do to prevent the web fonts from being blocked by the browser?
A. Enable versioning on the cdfonts bucket for each web font.
B. Create a policy on the cdfonts bucket to enable access to everyone.
C. Add the Content-MD5 header to the request for webfonts in the cdfonts bucket from the website.
D. Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration.
D. Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration.
A developer must extend an existing application that is based on the AWS Services Application Model (AWS SAM). The developer has used the AWS SAM CLI to create the project. The project contains different AWS Lambda functions. Which combination of commands must the developer use to redeploy the AWS SAM application? (Select TWO.)
A. Sam init.
B. Sam validate.
C. Sam build.
D. Sam deploySam publish.
E. Sam publish.
A. Sam init.
D. Sam deploySam publish.
An application deployed on AWS Elastic Beanstalk experiences increased error rates during deployments of new application versions, resulting in service degradation for users. The Development team believes that this is because of the reduction in capacity during the deployment steps. The team would like to change the deployment policy configuration of the environment to an option that maintains full capacity during deployment while using the existing instances. Which deployment policy will meet these requirements while using the existing instances?
A. All at once.
B. Rolling.
C. Rolling with additional batch.
D. Immutable.
D. Immutable.
A Developer is creating an application that needs to locate the public IPv4 address of the Amazon EC2 instance on which it runs . How can the application locate this information?
A. Get the instance metadata by retrieving http://169.254.169.254/latest/metadata/.
B. Get the instance user data by retrieving http://169.254.169.254/latest/userdata/.
C. Get the application to run IFCONFIG to get the public IP address.
D. Get the application to run IPCONFIG to get the public IP address.
A. Get the instance metadata by retrieving http://169.254.169.254/latest/metadata/.
The development team is working on an API that will be served from Amazon API gateway. The API will be served from three environments: development, test, and production. The API Gateway is configured to use 237 GB of cache in all three stages. Which is the MOST cost-efficient deployment strategy?
A. Create a single API Gateway with all three stages.
B. Create three API Gateways, one for each stage in a single AWS account.
C. Create an API Gateway in three separate AWS accounts.
D. Enable the cache for development and test environments only when needed.
D. Enable the cache for development and test environments only when needed.