00:20:00

AWS Certified Developer Associate Practice Test (DVA-C02)

Use the form below to configure your AWS Certified Developer Associate Practice Test (DVA-C02). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for AWS Certified Developer Associate DVA-C02
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Developer Associate DVA-C02 Information

AWS Certified Developer - Associate showcases knowledge and understanding of core AWS services, uses, and basic AWS architecture best practices, and proficiency in developing, deploying, and debugging cloud-based applications by using AWS. Preparing for and attaining this certification gives certified individuals more confidence and credibility. Organizations with AWS Certified developers have the assurance of having the right talent to give them a competitive advantage and ensure stakeholder and customer satisfaction.

The AWS Certified Developer - Associate (DVA-C02) exam is intended for individuals who perform a developer role. The exam validates a candidate’s ability to demonstrate proficiency in developing, testing, deploying, and debugging AWS Cloud-based applications. The exam also validates a candidate’s ability to complete the following tasks:

  • Develop and optimize applications on AWS.
  • Package and deploy by using continuous integration and continuous delivery (CI/CD) workflows.
  • Secure application code and data.
  • Identify and resolve application issues.
AWS Certified Developer Associate DVA-C02 Logo
  • Free AWS Certified Developer Associate DVA-C02 Practice Test

  • 20 Questions
  • Unlimited
  • Development with AWS Services
    Security
    Deployment
    Troubleshooting and Optimization
Question 1 of 20

What deployment strategy gradually shifts traffic from a previous version of an application to the latest version, enabling the ability to monitor the effects on a subset of users before full deployment?

  • Canary deployment

  • Blue/green deployment

  • Resume-based deployment

  • Rolling updates

Question 2 of 20

A software company utilizes AWS Lambda for deploying a mission-critical application. In their upcoming release, they plan to incorporate a canary release strategy to introduce a new feature incrementally while mitigating risks. Assuming they already have a Lambda alias for their production environment, how should the company configure the alias to slowly route a small percentage of user traffic to the new feature while the majority still accesses the stable version?

  • Deploy the new feature as a new Lambda function and update the production alias configuration to point solely to the new function, relying on Lambda's inherent traffic shifting capabilities.

  • Deploy the new version as a separate Lambda function without an alias and manually invoke the new function to represent a percentage of total traffic.

  • Adjust the production alias to serve both the old and the new Lambda versions, and configure the alias routing with a small weight towards the new version, gradually increasing it based on the monitoring results.

  • Configure the Lambda alias to immediately redirect 100% of traffic to the new version to test the new feature in live conditions.

Question 3 of 20

A developer is tasked with ensuring an application that stores personally identifiable information (PII) complies with various international data protection regulations. While implementing encryption for all PII at rest and in transit is a critical security measure, why is this action alone insufficient to guarantee full compliance globally?

  • Because modern encryption algorithms are not recognized by most international data protection laws.

  • Because encryption keys managed by the customer are not compliant with any data protection standard.

  • Because regulations often include additional requirements such as data sovereignty, retention policies, and data subject rights.

  • Because regulations require data to be stored only in plaintext format for auditing purposes.

Question 4 of 20

A developer is troubleshooting a multi-service application running on AWS. To debug intermittent errors, the developer needs to record specific, searchable information, such as a user ID and order ID, within the application's transaction traces. This will allow them to filter traces for specific user sessions or transactions.

Which AWS service should the developer use to add these indexed, key-value pairs as annotations to the trace data?

  • AWS Lambda

  • Amazon CloudWatch Logs

  • Amazon Inspector

  • AWS X-Ray

Question 5 of 20

A developer is building an application on an Amazon EC2 instance that requires a connection to an Amazon RDS for PostgreSQL database. For security compliance, the database credentials must be stored securely and automatically rotated every 30 days without requiring manual intervention or application code changes for the rotation to occur. Which AWS service should the developer use to meet these requirements MOST effectively?

  • AWS Systems Manager Parameter Store

  • AWS Key Management Service (KMS)

  • AWS Secrets Manager

  • AWS IAM Identity Center

Question 6 of 20

A development team needs to allow an external consultant's account to access a specific Amazon S3 bucket to store and retrieve files essential for a joint project. The external consultant should not be given user credentials within the team's AWS account. What type of policy should the development team attach to the S3 bucket to allow access directly to the bucket itself?

  • IAM group policy

  • Service control policy (SCP)

  • Identity-based policy attached to a user

  • Resource-based policy (e.g., S3 bucket policy)

Question 7 of 20

A software team has noticed that a serverless function, which processes incoming streaming data, is occasionally hitting its maximum execution time, resulting in incomplete tasks. The function's workload involves complex computations and varying sizes of data payloads. To enhance the processing efficiency and reduce the likelihood of timeouts, which of the following adjustments should be the team's initial step?

  • Allocate more memory to the serverless function.

  • Implement a distributed tracing service to examine the function's behavior in detail.

  • Extend the maximum allowed execution time for the function.

  • Manually optimize the function by removing lines of code to decrease the execution time.

Question 8 of 20

Which service should a developer use to track the requests that travel through multiple components of a distributed system, helping to understand the application's behavior and identify bottlenecks?

  • Inspector

  • CloudFormation

  • CloudTrail

  • X-Ray

Question 9 of 20

When preparing a microservice for deployment that requires multiple sensitive configurations, which approach would ensure the secure and environment-agnostic management of these settings?

  • Fetch the configurations from the host's instance metadata service upon container initialization

  • Embed the configurations into the application code within the container image

  • Dynamically inject the configurations using a secrets management service at container startup

  • Declare sensitive environment variables within the build specification file of the container

Question 10 of 20

A developer is tasked with setting up a serverless architecture for processing incoming data requests from web clients. The system should respond with a client error status code and a structured message when a submission does not conform to the expected input format. Which serverless components should the developer configure to ensure these requirements are met?

  • Configure Amazon CloudFront custom error responses to intercept and reshape the return provided by the backend services.

  • Leverage Amazon API Gateway's request validation feature and tailor the integration response to deliver a structured message upon failure.

  • Utilize a dedicated AWS Lambda function to perform input validation and shape the error return upon detecting non-conforming data.

  • Implement AWS Step Functions to orchestrate input validation and construct an error document to be issued when an invalid request is detected.

Question 11 of 20

A company is looking to encrypt data at rest for their Amazon DynamoDB table, which contains sensitive information. They want to guarantee that the encryption does not affect the performance of their application. Which service should they use to accomplish this without managing server-side encryption themselves?

  • Enable Amazon DynamoDB's default encryption at rest using AWS managed keys

  • Create an IAM role with a policy that enforces encryption at rest

  • Implement client-side encryption before storing the data in the DynamoDB table

  • Force all connections to the DynamoDB table to use SSL/TLS

Question 12 of 20

What process involves converting an object into a data format that can be stored and reconstructed later?

  • Serialization

  • Decoding

  • Encoding

  • Normalizing

Question 13 of 20

A web application is experiencing unpredictable traffic spikes and the development team needs to ensure that it can scale to meet demand efficiently. Which of the following strategies would BEST ensure that the application can handle the increased load without provisioning excessive infrastructure?

  • Provision a larger Amazon EC2 instance size to permanently support higher traffic.

  • Use AWS Lambda functions for all backend processes to handle the variable load.

  • Increase the Amazon RDS read replica count to handle higher database read volumes.

  • Implement AWS Auto Scaling with an Elastic Load Balancer to distribute traffic across multiple compute resources.

Question 14 of 20

An organization has several AWS accounts and must grant developers read-only access to shared Amazon S3 documentation buckets. The security team wants to avoid creating and maintaining custom policies in every account, preferring permissions that are centrally maintained and automatically updated by AWS. Which IAM policy type should the team attach to developer roles to meet these requirements?

  • Resource-based policy on every S3 bucket

  • AWS managed policy

  • Customer-managed policy

  • Inline policy embedded in each role

Question 15 of 20

A developer is building a microservices-based e-commerce application hosted on AWS. The checkout and catalog services read frequently accessed product data from an Amazon Aurora MySQL database. During seasonal traffic spikes, database read latency increases, slowing page loads. The developer wants to add a fully managed, in-memory cache that is compatible with open-source Redis and Memcached so that the team can integrate quickly without significant code changes. Which AWS service should the developer choose?

  • Amazon MemoryDB for Redis

  • Amazon ElastiCache

  • Amazon DynamoDB Accelerator (DAX)

  • AWS AppConfig

Question 16 of 20

Your application, hosted on multiple Amazon EC2 instances, needs to perform periodic data processing tasks on an Amazon S3 bucket. The tasks require the application to have read, write, and list permissions on the bucket. To align with security best practices, which action should you take to grant these S3 permissions to the application?

  • Attach an IAM managed policy with the required S3 permissions directly to the EC2 instances.

  • Create an IAM role with the specified S3 permissions and attach it to the EC2 instances using an instance profile.

  • Create an IAM user for each EC2 instance with permissions to access the S3 bucket and store the credentials in a configuration file on each instance.

  • Configure a resource-based policy on the S3 bucket to grant the EC2 instances the required permissions.

Question 17 of 20

A development team is building a new application entirely within the AWS ecosystem. They plan to use AWS CodePipeline for their CI/CD workflow and IAM for granular access control. For source control, the team requires a fully managed, scalable, and secure private Git repository. Which service should they use to meet these requirements with the least operational overhead?

  • Rely on AWS CodePipeline to host and manage the version control for the source code.

  • Use Bitbucket repositories and create custom scripts to synchronize code to Amazon S3 for backups and integration.

  • Implement GitHub repositories and configure a webhook to trigger AWS CodePipeline.

  • Use AWS CodeCommit for its native integration and managed source control capabilities.

Question 18 of 20

A software engineer is tasked with enabling an application, hosted on a virtual server, to interact with a cloud object storage service for uploading and downloading data. The engineer needs to implement a secure method of authentication that obviates the need to hardcode or manually input long-term credentials. What is the most appropriate strategy to achieve this while adhering to security best practices?

  • Manually enter the user credentials for the service at the start of each application session on the virtual server.

  • Save the service user's access credentials in a text file on the root directory of the virtual server for the application to use.

  • Hardcode the service user's access credentials in the source code of the application on the virtual server.

  • Assign a role to the virtual server that grants appropriate permissions to interact with the object storage service.

Question 19 of 20

Your company runs a mission-critical REST API in an Amazon ECS service behind an Application Load Balancer. Management requires that all future updates be released with zero user-visible downtime and that you can instantly roll back if problems occur. Which AWS CodeDeploy deployment option best meets these requirements?

  • Blue/green deployment that launches a replacement task set and shifts traffic after validation

  • All-at-once deployment that replaces every running task simultaneously

  • Rolling (in-place) deployment that updates one running task at a time

  • Linear 10 percent every 1 minute canary deployment

Question 20 of 20

A company is developing a real-time analytics application that will process and visualize data from social media feeds. The application needs to be able to handle varying volumes of incoming data, with potential bursts of high traffic during specific events. Which AWS service should the developers use to efficiently collect, process, and deliver these real-time streaming data feeds to downstream analytics tools?

  • Amazon S3

  • Amazon RDS

  • Amazon Kinesis Data Streams

  • Amazon DynamoDB