***NOT READY FOR STUDY*** AWS DEV-A Practice Exam 3 Flashcards

1
Q

Time to Live (TTL) for Amazon DynamoDB lets you ________ when items in a table ________ so that they can be automatically deleted from the database.

A

define ; expire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When Time to Live (TTL) is enabled on a table in Amazon DynamoDB, a background job _____ __ _______ attribute of items to determine whether they are expired.

A

checks the TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CodeBuild ________ your source code, ____ unit tests, and ________ artifacts that are ready to deploy.

A

compiles ; runs ; produces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CodeDeploy is a deployment service that automates application deployments to Amazon EC2 instances, on-premises instances, serverless Lambda functions, or Amazon ECS services

A

CodeDeploy is a deployment service that automates application deployments to Amazon EC2 instances, on-premises instances, serverless Lambda functions, or Amazon ECS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Developer needs to create an instance profile for an Amazon EC2 instance using the AWS CLI. How can this be achieved? (Select THREE.)

A

aws iam create-instance-profile –instance-profile-name EXAMPLEPROFILENAME

aws iam add-role-to-instance-profile –instance-profile-name EXAMPLEPROFILENAME –role-name EXAMPLEROLENAME

aws ec2 associate-iam-instance-profile –iam-instance-profile Name=EXAMPLEPROFILENAME –instance-id i-012345678910abcde

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lambda: In synchronous invocations, the caller

A

waits for the function to complete execution and the function can return a value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lambda: In asynchronous operation, the caller

A

places the event on an internal queue, which is then processed by the Lambda function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Lambda authorizer (formerly known as a custom authorizer) is an API Gateway feature that uses a Lambda function to control access to your API.

A

A Lambda authorizer (formerly known as a custom authorizer) is an API Gateway feature that uses a Lambda function to control access to your API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Lambda authorizer is useful if you want to implement a custom authorization scheme that uses a bearer token authentication or that uses request parameters to determine the caller’s identity.

A

A Lambda authorizer is useful if you want to implement a custom authorization scheme that uses a bearer token authentication or that uses request parameters to determine the caller’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data key caching can improve performance, reduce cost, and help you stay within service limits as your application scales.

A

Data key caching can improve performance, reduce cost, and help you stay within service limits as your application scales.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Data key caching keep you from exceeding KMS service limits?

When you encrypt or decrypt data, the AWS Encryption SDK looks for a

A

matching data key in the cache. If it finds a match, it uses the cached data key rather than generating a new one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is more secure, an AWS or Customer Managed IAM policy?

A

The customer-managed policy is more secure since it can be locked down with more granularity down to the

AWS-managed policy always provides more privileges than required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You should initialize SDK clients and database connections outside of the function handler, and cache static assets locally in the /tmp directory.

A

You should initialize SDK clients and database connections outside of the function handler, and cache static assets locally in the /tmp directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You can point an alias to multiple versions of your function code and then assign a weighting to direct certain amounts of traffic to each version.

A

You can point an alias to multiple versions of your function code and then assign a weighting to direct certain amounts of traffic to each version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The write-through strategy adds data or updates data in the cache whenever data is written to the database.

A

The write-through strategy adds data or updates data in the cache whenever data is written to the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The advantages of write-through as a writing policy are:

A

Data in the cache is never stale. Because the data in the cache is updated every time it’s written to the database.

Write penalty vs. read penalty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Lazy loading is a caching strategy that loads data into the cache only when necessary.

A

Lazy loading is a caching strategy that loads data into the cache only when necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Concurrency is the number of requests that your function is serving at any given time

A

Concurrency is the number of requests that your function is serving at any given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If the function is invoked again while a request is still being processed, another instance is allocated, which increases the function’s concurrency.

A

If the function is invoked again while a request is still being processed, another instance is allocated, which increases the function’s concurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When requests come in faster than your function can scale, or when your function is at maximum concurrency, additional requests fail with a throttling error (429 status code).

A

When requests come in faster than your function can scale, or when your function is at maximum concurrency, additional requests fail with a throttling error (429 status code).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Concurrency is subject to a Regional limit that is shared by all functions in a Region. What is the concurrency limit in

US West (Oregon), US East (N. Virginia), Europe (Ireland)

A

3000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To calculate the concurrency requirements, multiply the invocation ___________ per second (50) with the average ___________ ______ in seconds.

A

To calculate the concurrency requirements, multiply the invocation requests per second (50) with the average execution time in seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Developer needs to add in-transit encryption to data by configuring end-to-end SSL between the CloudFront Origin and the end users. What two things need to happen to accomplish this?

A
  • Configure the Viewer Protocol Policy
  • Configure the Origin Protocol Policy
24
Q

DynamoDB is not a destination form________ ______ _____________

A

Kinesis Data Firehose

25
Q

A namespace is a container for CloudWatch metrics. Metrics in different namespaces are isolated from each other, so that metrics from different applications are not mistakenly grouped into the same statistics.

A

A namespace is a container for CloudWatch metrics. Metrics in different namespaces are isolated from each other, so that metrics from different applications are not mistakenly grouped into the same statistics.

26
Q

What is the difference between a public and elastic IP Address ?

A

Public – assigned automatically to instances in public subnets and reassigned if instance is stopped/started.

Elastic IP – public address that is static.

27
Q

When you create a user pool in Amazon Cognito and configure a domain for it, Amazon Cognito automatically provisions a hosted web UI to let you add sign-up and sign-in pages to your app.

A

When you create a user pool in Amazon Cognito and configure a domain for it, Amazon Cognito automatically provisions a hosted web UI to let you add sign-up and sign-in pages to your app.

28
Q

The company has a policy that states that all data written to the S3 bucket must be encrypted.

How can a Developer ensure compliance with this policy?

A

Create an S3 bucket policy that denies any S3 Put request that does not include the x-amz-server-side-encryption

29
Q

S3 POLICY

There are two possible values for the x-amz-server-side-encryption header: AES256, which tells S3 to use S3-managed keys, and aws:kms, which tells S3 to use AWS KMS–managed keys.

A

There are two possible values for the x-amz-server-side-encryption header: AES256, which tells S3 to use S3-managed keys, and aws:kms, which tells S3 to use AWS KMS–managed keys.

30
Q

Cognito user pool = Authentication

With a Cognito user pool you can add sign-up and sign-in to mobile and web apps and it also offers a user directory so user accounts can be created within the user pool.

A

With a Cognito user pool you can add sign-up and sign-in to mobile and web apps and it also offers a user directory so user accounts can be created within the user pool.

31
Q

With a Cognito user pool Users also have the ability to reset their passwords.

A

With a Cognito user pool Users also have the ability to reset their passwords.

32
Q

Cognito Identity Pool = Authoriazation

To access AWS services you need a Cognito Identity Pool.

A

To access AWS services you need a Cognito Identity Pool.

33
Q

A Cognito Identity pool can be used with a user pool and enables a user to obtain temporary limited-privilege credentials to access AWS services

A

A Cognito Identity pool can be used with a user pool and enables a user to obtain temporary limited-privilege credentials to access AWS services

34
Q

AWS Secrets Manager encrypts secrets at rest using encryption keys that you own and store in AWS Key Management Service (KMS).

A

AWS Secrets Manager encrypts secrets at rest using encryption keys that you own and store in AWS Key Management Service (KMS).

35
Q

When you retrieve a secret, Secrets Manager decrypts the secret and transmits it securely over TLS to your local environment.

A

When you retrieve a secret, Secrets Manager decrypts the secret and transmits it securely over TLS to your local environment.

36
Q

AWS Secrets Manager, you can rotate secrets on a schedule or on demand by using the Secrets Manager console, AWS SDK, or AWS CLI.

A

AWS Secrets Manager, you can rotate secrets on a schedule or on demand by using the Secrets Manager console, AWS SDK, or AWS CLI.

37
Q

The DynamoDB Session Handler is a custom session handler for PHP that allows developers to use Amazon DynamoDB as a session store

A

The DynamoDB Session Handler is a custom session handler for PHP that allows developers to use Amazon DynamoDB as a session store

38
Q

serverless application is more than just a Lambda function—it can include additional resources such as APIs, databases, and event source mappings.

A

serverless application is more than just a Lambda function—it can include additional resources such as APIs, databases, and event source mappings.

39
Q

AWS Serverless Application Model (SAM) is an open-source framework for building serverless applications

A

AWS Serverless Application Model (SAM) is an open-source framework for building serverless applications

40
Q

To create a Lambda function using an AWS SAM template use the AWS::Serverless::Function resource type.

A

To create a Lambda function using an AWS SAM template use the AWS::Serverless::Function resource type.

41
Q

The AWS::Serverless::Function resource type can be used to Create a Lambda function, IAM execution role, and **event source **mappings that trigger the function.

A

The AWS::Serverless::Function resource type can be used to Create a Lambda function, IAM execution role, and **event source **mappings that trigger the function.

42
Q

VPC Flow logs can help you with a number of tasks, such as: (3)

A
  1. Diagnosing overly restrictive security group rules
  2. Monitoring the traffic that is reaching your instance
  3. Determining the direction of the traffic to and from the network interfaces
43
Q

If you create a flow log for a subnet or VPC, each network interface in that subnet or VPC is monitored.

A

If you create a flow log for a subnet or VPC, each network interface in that subnet or VPC is monitored.

44
Q

A Network ACL is a subnet-level firewall.

A

A Network ACL is a subnet-level firewall.

45
Q

To use an HTTPS listener, on a Load Balancer you must deploy at least one SSL/TLS server certificate on your load balancer.

A

To use an HTTPS listener, on a Load Balancer you must deploy at least one SSL/TLS server certificate on your load balancer.

46
Q

Elastic Load Balancer with SSL passthrough is used to forward encrypted packets directly to the EC2 instance for termination.

A

Elastic Load Balancer with SSL passthrough is used to forward encrypted packets directly to the EC2 instance for termination.

47
Q

AWS CodeDeploy

The ‘resources’ section of the AppSpec file for an AWS Lambda deployment contains the name, alias, current version, and target version of a Lambda function.

A

The ‘resources’ section of the AppSpec file for an AWS Lambda deployment contains the name, alias, current version, and target version of a Lambda function.

48
Q

CodeDeploy

In CodeDeploy There are three ways traffic can shift during a blue/green deployment:

A

Linear
Canary
All-At-Once

49
Q

AWS CodeDeploy

Linear — Traffic is shifted in equal increments with an equal number of minutes between each increment.

A

Linear — Traffic is shifted in equal increments with an equal number of minutes between each increment.

50
Q

AWS CodeDeploy

Canary — Traffic is shifted in two increments. Specify the percentage of traffic shifted to your updated task set in the first increment and the interval, in minutes, before the remaining traffic is shifted in the second increment.

A

Canary — Traffic is shifted in two increments. Specify the percentage of traffic shifted to your updated task set in the first increment and the interval, in minutes, before the remaining traffic is shifted in the second increment.

51
Q

The ReceiveMessage API retrieves one or more messages (up to 10), from the specified queue

A

The ReceiveMessage API retrieves one or more messages (up to 10), from the specified queue

52
Q

A developer can inistantiate a CodeCommit client using the AWS SDK. This provides the ability to programmatically work with the AWS CodeCommit repository.

A

The developer can instantiate a CodeCommit client using the AWS SDK. This provides the ability to programmatically work with the AWS CodeCommit repository.

53
Q

You can use Amazon Kinesis Data Streams to collect and process large streams of data records in real time

A

You can use Amazon Kinesis Data Streams to collect and process large streams of data records in real time

54
Q

CodeDeploy Deployment Types

Canary: Traffic is shifted in two increments. You can choose from predefined canary options that specify the percentage of traffic shifted to your updated Lambda function or ECS task set in the first increment and the interval, in minutes, before the remaining traffic is shifted in the second increment.

A
55
Q

CodeDeploy Deployment Types

Linear: Traffic is shifted in equal increments with an equal number of minutes between each increment. You can choose from predefined linear options that specify the percentage of traffic shifted in each increment and the number of minutes between each increment.

A
56
Q

CodeDeploy Deployment Types

All-at-once: All traffic is shifted from the original Lambda function or ECS task set to the updated function or task set all at once.

A