00:15:00

Free AWS Certified Developer Associate DVA-C02 Practice Test

Prepare for the AWS Certified Developer Associate DVA-C02 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Development with AWS Services
    • Security
    • Deployment
    • Troubleshooting and Optimization
Question 1 of 15

Customer-managed keys in AWS KMS can be created, owned and managed by the user, while AWS managed keys are managed by AWS but are still dedicated to the user's AWS account.

  • True

  • False

Question 2 of 15

A developer is integrating third-party social identity provider authentication in an application and needs to allow authenticated users to interact with cloud storage and computing resources. Which feature of Amazon Cognito should the developer use to fulfill this requirement?

  • Authorize with ID tokens from the social identity provider.

  • Create a User Pool.

  • Deploy an Identity Broker service.

  • Use an Identity Pool.

Question 3 of 15

When preparing a microservice for deployment that requires multiple sensitive configurations, which approach would ensure the secure and environment-agnostic management of these settings?

  • Fetch the configurations from the host's instance metadata service upon container initialization

  • Embed the configurations into the application code within the container image

  • Declare sensitive environment variables within the build specification file of the container

  • Dynamically inject the configurations using a secrets management service at container startup

Question 4 of 15

Your application requires a cost-effective storage solution to archive infrequently accessed data. The solution should maintain the data with 99.999999999% (11 9's) durability and provide retrieval times within minutes. Which AWS cloud storage option would best suit these requirements?

  • Amazon RDS snapshot

  • Amazon S3 Standard

  • Amazon EBS snapshots

  • Amazon S3 Glacier Instant Retrieval

Question 5 of 15

A software development team is implementing a set of microservices that will be exposed to their clients through endpoints. They are looking to adopt best practices for testing newly developed features without affecting the live production environment accessed by their customers. What is the most effective method to achieve this within the service that provides the endpoints?

  • Generate a clone of the existing production environment and make code changes directly there to validate new features

  • Reuse the production endpoints for testing by applying request filtering based on a custom header to differentiate traffic

  • Implement feature toggles in the production codebase to switch between production and development configurations

  • Create a new deployment stage with specific configurations for the microservices that are separate from production settings

Question 6 of 15

You are working on a serverless application where each component is designed to execute a distinct operation within an e-commerce checkout process. During the development cycle, you want to confirm that each component functions independently and as expected without making actual calls to cloud services. What technique should you employ within your unit tests to simulate the behavior of the external dependencies?

  • Create instances of client objects specific to cloud resources within your unit tests

  • Reference recorded responses from an object storage service during test execution

  • Utilize SDK mocking utilities to emulate the behavior of external service calls

  • Configure an API management service to handle dependencies during test runs

Question 7 of 15

When deploying an AWS Lambda function, which packaging option allows you to include common dependencies across multiple functions to promote code reuse and reduce the size of deployment packages?

  • Lambda Environment Variables

  • Lambda Execution Role Policies

  • Lambda Layers

  • Lambda Container Images

Question 8 of 15

Which type of IAM policy allows entities to share a set of permissions defined and updated by the cloud provider without any customization?

  • Principal policies

  • User-defined policies

  • Inline policies assigned directly to entities

  • Managed policies provided by the cloud service provider

Question 9 of 15

A developer is tasked with maintaining the consistent deployment of a serverless function across multiple environments. This function requires a specific version of an external library. What approach should the developer take to manage the dependencies of the serverless function efficiently?

  • Manage the library version through a configuration management service.

  • Embed the dependencies directly into the function's deployment package.

  • Incorporate the library code within the function's script.

  • Utilize layers to package the external library, managing its version independently.

Question 10 of 15

Which description best exemplifies a loosely coupled component within a system architecture?

  • Calling a specific instance of an application server directly to process a task

  • Hardcoding the endpoint of a specific Lambda function for invocation from an EC2 instance

  • Using a shared database table for direct communication between two microservices

  • Publishing messages to an SQS queue instead of making direct API calls to another service

Question 11 of 15

You have been given the task to test an AWS Lambda function locally, which is designed to process JSON data from an Amazon API Gateway proxy integration. The function expects to receive a payload with a nested JSON object in the body that contains project details. Which of the following test events correctly emulates the expected format of the incoming event from API Gateway?

  • {"httpMethod": "POST", "body": "{"project": {"name": "New Project", "description": "An upcoming project."}}", "path": "/projects", "requestContext": {"httpMethod": "POST", "path": "/prod/projects"}, "isBase64Encoded": false}

  • {"method": "POST", "body": {"project": {"name": "New Project", "description": "An upcoming project."}}, "path": "/projects"}

  • {"httpMethod": "POST", "body": "{'project': {'name': 'New Project', 'description': 'An upcoming project.'}}", "path": "/projects", "requestContext": , "isBase64Encoded": false}

  • {"httpMethod": "POST", "body": "{"project": {"name": "New Project", "description": "An upcoming project"}}", "path": "/projects"}

Question 12 of 15

To verify the accuracy of a function tasked with handling file processing and database updates, which practice should a developer employ to simulate interactions with the storage and database services during automated tests?

  • Create various branches and aliases for the function to segregate operational environments during the testing phase.

  • Generate live instances of file storage and managed database services and execute test cases against them.

  • Incorporate a mocking framework to replicate the behavior of file storage and managed database services within the test suite.

  • Implement a strategy for stepping through the function code with a debugger to inspect the file processing and updates.

Question 13 of 15

An organization's development team is preparing to roll out a serverless application that utilizes multiple cloud resources, including object storage, a NoSQL database, and serverless compute functions. The application must be able to read and write data to specific storage buckets and database tables. To comply with best security practices, how should you provision access for this application?

  • Construct a custom security profile for the application, restricting permissions exclusively to the operations required on designated storage buckets and database tables.

  • Generate an access key and secret key combination for the application, granting full management capabilities for all services to avoid potential disruptions.

  • Employ the root user's credentials for the application to ensure uninterrupted service access without having to manage multiple permission sets.

  • Deactivate explicit permission policies and deploy network-based controls to govern access to the necessary service resources.

Question 14 of 15

What deployment strategy gradually shifts traffic from a previous version of an application to the latest version, enabling the ability to monitor the effects on a subset of users before full deployment?

  • Canary deployment

  • Resume-based deployment

  • Blue/green deployment

  • Rolling updates

Question 15 of 15

A developer is working on enhancing the security of a serverless infrastructure where user authentication is handled by an OIDC-compliant external identity provider. Upon a user's successful sign-in, the external service issues a token. The developer needs to ensure that this token is validated before allowing access to the serverless function endpoint. Which approach should the developer implement to enforce token validation?

  • Apply a resource-based policy directly on the function to check for the presence of the token in the request.

  • Configure a role with specified permissions that authenticates users based on the provided token.

  • Utilize a Lambda function programmed to evaluate and verify the token before proceeding with the request.

  • Deploy client-side certificates to secure the endpoint and validate the incoming tokens.