00:15:00

AWS Certified Developer Associate Practice Test (DVA-C02)

Use the form below to configure your AWS Certified Developer Associate Practice Test (DVA-C02). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for AWS Certified Developer Associate DVA-C02
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Developer Associate DVA-C02 Information

AWS Certified Developer - Associate showcases knowledge and understanding of core AWS services, uses, and basic AWS architecture best practices, and proficiency in developing, deploying, and debugging cloud-based applications by using AWS. Preparing for and attaining this certification gives certified individuals more confidence and credibility. Organizations with AWS Certified developers have the assurance of having the right talent to give them a competitive advantage and ensure stakeholder and customer satisfaction.

The AWS Certified Developer - Associate (DVA-C02) exam is intended for individuals who perform a developer role. The exam validates a candidate’s ability to demonstrate proficiency in developing, testing, deploying, and debugging AWS Cloud-based applications. The exam also validates a candidate’s ability to complete the following tasks:

  • Develop and optimize applications on AWS.
  • Package and deploy by using continuous integration and continuous delivery (CI/CD) workflows.
  • Secure application code and data.
  • Identify and resolve application issues.

Free AWS Certified Developer Associate DVA-C02 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Development with AWS Services
    Security
    Deployment
    Troubleshooting and Optimization
Question 1 of 15

Which service offers automated code reviews and actionable recommendations for improving code quality, along with identifying sections of code that might expose security vulnerabilities?

  • CodeGuru

  • CloudFormation

  • Config

  • CloudTrail

Question 2 of 15

A development team must secure sensitive customer files in cloud-based object storage. The requirements stipulate that the encryption keys used should be under the company's direct control, with an automated process for changing these keys periodically. Which service and configuration would best fulfill these criteria?

  • Adopt a hardware security module service for key storage and institute a manual rotation process

  • Enable a managed key rotation service within the platform's cloud object storage

  • Engage a private certificate authority to apply server-side encryption policies to the cloud storage

  • Use self-managed keys in Key Management Service set to automatically rotate for object storage server-side encryption

Question 3 of 15

A development team is building a serverless application that uses AWS Lambda. To shorten the feedback loop, the team wants to run and debug the Lambda functions on their local machines without deploying the code to AWS after every change. Which AWS tool provides a local environment that emulates the Lambda runtime and lets the team invoke and debug functions locally?

  • AWS CloudFormation CLI

  • AWS CodeDeploy agent

  • AWS Serverless Application Model (AWS SAM) CLI

  • AWS Artifact

Question 4 of 15

Which service allows for the automatic rotation of secrets without human intervention while also enabling seamless integration with RDS databases?

  • AWS Identity and Access Management (IAM) roles

  • AWS Secrets Manager

  • AWS Systems Manager Parameter Store

  • Amazon S3 server-side encryption

Question 5 of 15

Which service provides a secure, scalable, and managed source control repository that supports private Git repositories and integrates with other continuous integration/continuous delivery (CI/CD) services?

  • CodeCommit

  • CodePipeline

  • Elastic Container Registry (ECR)

  • CodeBuild

Question 6 of 15

Following the deployment of a new release, your team encounters severe issues that adversely affect the customer experience. The deployment strategy employed separates the old and new environments, allowing for independent operation and immediate traffic switching between the two. To mitigate these issues swiftly, what is the BEST course of action to revert to the previous, stable release?

  • Redeploy the prior release as a new operation within the deployment service.

  • Utilize function versioning and aliasing to revert the service to the prior stable codebase.

  • Create a fresh environment using the last stable release configuration and direct traffic there.

  • Switch production traffic to the environment running the last stable release using the console of the deployment service.

Question 7 of 15

An application you are developing is responsible for processing messages from a queue and executing an operation that relies on a third-party service, which is known for its occasional unpredictability. To improve your application's robustness against these intermittent service failures, which pattern should you implement in your operation logic?

  • Increase read and write capacity to the queue during peak times

  • Retries with exponential backoff and jitter

  • Implement a circuit breaker to immediately halt operations upon an error

  • Attempt immediate recursive retries after a failed operation

Question 8 of 15

Your team is responsible for a critical online platform. During the next update, it is imperative to ensure that there is no interruption to the service. How would you perform this update to meet the business requirement of zero downtime?

  • Utilize an environment management service with blue/green deployment capability

  • Manage serverless compute resources using alias and version control

  • Utilize a deployment service with an in-place deployment option

  • Configure scaling and lifecycle policies for compute instances

Question 9 of 15

What service allows developers to add annotations to their application traces in order to facilitate detailed monitoring and troubleshooting?

  • AWS Lambda

  • Amazon Inspector

  • AWS Elastic Beanstalk

  • Amazon CloudWatch Logs

  • Amazon CloudFront

  • AWS X-Ray

Question 10 of 15

An organization is deploying a serverless application using AWS Lambda that requires connectivity to a proprietary database. It is crucial to ensure that the database credentials are neither embedded in the application's codebase nor exposed in any configuration files. As the developer for this project, which approach should you employ to most securely handle the credentials and facilitate their automatic rotation?

  • Store the credentials in AWS Secrets Manager and grant the Lambda function's execution role permission to retrieve them at runtime.

  • Embed the database credentials directly within the application's source code for simplicity.

  • Store the database credentials as environment variables within the Lambda function's configuration.

  • Use AWS Systems Manager Parameter Store to store the credentials as SecureString parameters.

Question 11 of 15

When designing an effective logging strategy for an application running on AWS, what is the primary reason to include meaningful custom log messages at various points in the application code?

  • To satisfy compliance requirements for minimum logging verbosity.

  • To make the application run faster by reducing computational overhead.

  • To detail the application's behavior and state for better clarity during debugging and monitoring.

  • To ensure that application logs consume less storage space by having fewer log entries.

Question 12 of 15

Your application running on AWS Lambda is designed to process transactions and write logs to Amazon CloudWatch. You have noticed that the logs are difficult to search through when troubleshooting issues due to inconsistent formatting. To improve this, you decide to implement structured logging. Which approach would ensure that your logs are consistent and easily queryable?

  • Use plain text logs with clear and consistent prefixes for each line.

  • Log the output as comma-separated values (CSV) with consistent ordering of information for each entry.

  • Adopt XML formatted logs, where each entry is structured with relevant data tags.

  • Format all log entries as JSON with consistent key-value pairs for each type of log message.

Question 13 of 15

A developer is working on enhancing the security of a serverless infrastructure where user authentication is handled by an OIDC-compliant external identity provider. Upon a user's successful sign-in, the external service issues a token. The developer needs to ensure that this token is validated before allowing access to the serverless function endpoint. Which approach should the developer implement to enforce token validation?

  • Apply a resource-based policy directly on the function to check for the presence of the token in the request.

  • Configure a role with specified permissions that authenticates users based on the provided token.

  • Utilize a Lambda function programmed to evaluate and verify the token before proceeding with the request.

  • Deploy client-side certificates to secure the endpoint and validate the incoming tokens.

Question 14 of 15

An application you are developing requires that end-users authenticate using their existing social media accounts. Once authenticated, the application should grant temporary permissions to utilize certain cloud resources. Which service allows you to create an identity pool that facilitates this scenario, mapping social media identities to predefined roles for navigating and interacting with your cloud environment?

  • IAM with SAML 2.0

  • Cognito user pools without identity pools

  • Secrets Manager with IAM roles

  • Amazon Cognito with identity pools

Question 15 of 15

Your company's web application, hosted on AWS Elastic Beanstalk, is suddenly returning an error code to the clients when they try to access a particular endpoint. Users are getting a response that indicates the server understood the request but refuses to authorize it. As a developer, you need to determine which HTTP error code is being returned. What is the most likely HTTP status code the application is generating?

  • 403 Forbidden

  • 404 Not Found

  • 500 Internal Server Error

  • 401 Unauthorized