00:15:00

AWS Certified Developer Associate Practice Test (DVA-C02)

Use the form below to configure your AWS Certified Developer Associate Practice Test (DVA-C02). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.

Logo for AWS Certified Developer Associate DVA-C02
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Developer Associate DVA-C02 Information

AWS Certified Developer - Associate showcases knowledge and understanding of core AWS services, uses, and basic AWS architecture best practices, and proficiency in developing, deploying, and debugging cloud-based applications by using AWS. Preparing for and attaining this certification gives certified individuals more confidence and credibility. Organizations with AWS Certified developers have the assurance of having the right talent to give them a competitive advantage and ensure stakeholder and customer satisfaction.

The AWS Certified Developer - Associate (DVA-C02) exam is intended for individuals who perform a developer role. The exam validates a candidate’s ability to demonstrate proficiency in developing, testing, deploying, and debugging AWS Cloud-based applications. The exam also validates a candidate’s ability to complete the following tasks:

  • Develop and optimize applications on AWS.
  • Package and deploy by using continuous integration and continuous delivery (CI/CD) workflows.
  • Secure application code and data.
  • Identify and resolve application issues.

Free AWS Certified Developer Associate DVA-C02 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Development with AWS Services
    Security
    Deployment
    Troubleshooting and Optimization
Question 1 of 15

A developer needs to ensure that the credentials used by a serverless function to connect to a database are stored securely and are not exposed in plain text. What is the recommended method for managing the credentials to maximize security?

  • Leverage a secrets manager to handle the credentials and retrieve them dynamically within the serverless function.

  • Place the encrypted credentials in a cloud storage service bucket and retrieve them via the serverless function.

  • Hardcode the credentials directly into the code base that is part of the serverless function.

  • Encrypt the credentials manually and include them as part of the serverless function's environment variables.

Question 2 of 15

Your application uses an Amazon DynamoDB table to serve user profile information. You notice an increase in the read load causing throttling issues due to repeated accesses to the same items. Which caching strategy should you implement to minimize read latency and reduce the load on the DynamoDB table while ensuring data consistency for frequently accessed items?

  • Increase the read capacity units (RCUs) for the DynamoDB table to handle the higher load

  • Implement a read-through cache using Amazon ElastiCache

  • Use a write-through cache to preload user profiles into Amazon ElastiCache

  • Apply lazy loading to load user profiles into the cache only when updates occur

  • Set a time-to-live (TTL) for user profiles to invalidate the cache periodically

  • Store user profiles in Amazon S3 and synchronize them with DynamoDB

Question 3 of 15

A developer is working on enhancing the security of a serverless infrastructure where user authentication is handled by an OIDC-compliant external identity provider. Upon a user's successful sign-in, the external service issues a token. The developer needs to ensure that this token is validated before allowing access to the serverless function endpoint. Which approach should the developer implement to enforce token validation?

  • Utilize a Lambda function programmed to evaluate and verify the token before proceeding with the request.

  • Deploy client-side certificates to secure the endpoint and validate the incoming tokens.

  • Configure a role with specified permissions that authenticates users based on the provided token.

  • Apply a resource-based policy directly on the function to check for the presence of the token in the request.

Question 4 of 15

A developer is integrating a serverless function with a third-party web service. The developer needs to confirm that the function reacts appropriately under different response conditions, including successful data retrieval, errors, and timeouts, without interacting with the actual service. What is the most effective method to mimic the third-party service and assess the function's various operational responses?

  • Activate the serverless function in a live setting with enhanced logging to track its handling of different operational conditions.

  • Implement an auxiliary serverless function to reproduce the behavior of the third-party service for testing purposes.

  • Embed static response conditions within the serverless function code to facilitate response scenario assessment.

  • Establish an Amazon API Gateway and configure mock integrations for reproducing varied operational scenarios.

Question 5 of 15

Which service offers the capability to obtain temporary, privileged credentials for making authenticated requests to various resources, particularly in scenarios involving identity federation or cross-account access?

  • Key Management Service

  • Cognito User Identity Pools

  • Security Token Service

  • Simple Storage Service

Question 6 of 15

A web application is leveraging a content delivery network (CDN) to distribute images. The development team wants to implement caching optimizations to serve different image qualities based on the bandwidth of the user's connection, which is indicated by the Save-Data client hint request header. Which strategy should be implemented to provide the most suitable image quality while optimizing for performance and bandwidth usage?

  • Determine the user's device type and capabilities by examining the User-Agent header and serve images from a cache optimized for desktop or mobile.

  • Cache different versions of images depending on the Save-Data header value to serve lower-quality images if the client requests data savings.

  • Ignore request headers and always serve images from the same high-quality cache to all users to simplify the caching logic.

  • Use the Referer header to determine the originating domain of the request and serve a universally optimized image quality based on the most frequent domain.

Question 7 of 15

Your organization requires encryption for sensitive data stored in Amazon S3. The security policy mandates that the organization manages its own encryption keys and that encryption must occur before the data leaves the organization's premises. Which encryption method aligns most closely with these requirements?

  • Server-side encryption with AWS KMS-managed keys (SSE-KMS)

  • Server-side encryption with customer-provided keys (SSE-C)

  • Client-side encryption with a customer-managed encryption key

  • Server-side encryption with Amazon S3-managed keys (SSE-S3)

Question 8 of 15

When designing an application that interacts with Amazon DynamoDB, what is the purpose of serialization?

  • Serialization is a specific DynamoDB operation to replicate data across multiple tables.

  • Serialization is the process of compressing data to minimize the storage space required in Amazon DynamoDB.

  • Serialization is the process of converting an object's state into a format that can be stored in a database like Amazon DynamoDB.

  • Serialization is the process of encrypting data before storing it in Amazon DynamoDB to ensure security.

Question 9 of 15

A development team needs to allow an external consultant's account to access a specific Amazon S3 bucket to store and retrieve files essential for a joint project. The external consultant should not be given user credentials within the team's AWS account. What type of policy should the development team attach to the S3 bucket to allow access directly to the bucket itself?

  • Resource-based policy (e.g., S3 bucket policy)

  • Service control policy (SCP)

  • IAM group policy

  • Identity-based policy attached to a user

Question 10 of 15

Given a situation where a developer must design an API that processes payment transactions, which of the following approaches BEST ensures that the API handles repeated submissions of the same transaction in an idempotent manner?

  • Store the state of each transaction in a database with enforced write locks to prevent concurrent writes.

  • Use a stateless protocol that does not require server-side tracking of transaction states.

  • Implement idempotent receipt tokens that must be submitted with each transaction.

  • Generate random transaction IDs for each submission and use these IDs to detect duplicates.

Question 11 of 15

When you need to perform ad-hoc analysis of log data and write queries using a service-specific query language to gain insights into your application’s operations, which service do you use?

  • AWS CloudTrail

  • AWS Config

  • Amazon Elasticsearch Service

  • Amazon CloudWatch Logs Insights

Question 12 of 15

What is an essential characteristic of a unit test when developing applications?

  • It should interact with a live database to validate integration points.

  • It should be able to be run in a production environment to test real user scenarios.

  • It should be isolated, testing a single component without external dependencies.

  • It should cover multiple components and their interactions to ensure integration.

Question 13 of 15

Utilizing Amazon CloudWatch Logs Insights for querying application logs does not support time-based queries, making it unsuitable for isolating incidents that occurred during specific time frames.

  • True

  • False

Question 14 of 15

Which service is designed to provide developers with insights into the performance and operation of their distributed applications, offering capabilities to collect, analyze, and visualize tracing data?

  • CloudTrail

  • X-Ray

  • CloudFormation

  • Inspector

Question 15 of 15

Your application is generating logs at a high volume and you have been tasked with identifying occurrences of timeout errors that might be hidden within the vast amount of log data. You decide to use Amazon CloudWatch Logs Insights to parse these logs efficiently. Which of the following CloudWatch Logs Insights queries will accurately find log entries that contain the timeout error message 'TimeoutException', along with the timestamp and the requestId of the associated requests?

  • display @timestamp, requestId where @message = 'TimeoutException'

  • filter @logStream = 'TimeoutException' | stats count() by requestId

  • search 'TimeoutException' | fields @timestamp, requestId

  • fields @timestamp, requestId, @message | filter @message like /TimeoutException/