00:15:00

Free AWS Certified Developer Associate DVA-C02 Practice Test

Prepare for the AWS Certified Developer Associate DVA-C02 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    Development with AWS Services
    Security
    Deployment
    Troubleshooting and Optimization
Change
Question 1 of 15

An enterprise has mandated that their cloud-hosted applications authenticate users from the on-premises directory service without duplicating sensitive credentials. Which approach should be employed to meet this requirement while leveraging the organization's existing user directory?

  • Migrate the on-premises directory service users to a cloud directory service with User Pools.

  • Generate temporary access credentials for users via a token service to authenticate against the on-premises directory service.

  • Implement application-side user authentication controls using the Access Control List (ACL) feature of a cloud directory service.

  • Integrate the application through federation using SAML 2.0 with the organization's existing identity management system.

Question 2 of 15

When a team of Developers requires a secure, scalable, managed repository for their collaborative coding efforts, which solution should they primarily consider?

  • Use Bitbucket as the primary remote repositories with scripts to synchronize code with S3 for backups.

  • Employ CodeCommit for its native integration and managed source control capabilities.

  • Implement a series of GitHub repositories configured to trigger CodePipeline for integration with platform services.

  • Rely on CodePipeline to host and manage the version control of the source code.

Question 3 of 15

Your team is responsible for the upkeep of a distributed architecture spanning numerous services. The services generate copious amounts of operational data, and you need an effective way to track and visualize key performance indicators such as error rates, response times, and throughput. Select the method that would BEST enable your team to grasp the overall system health at a glance, considering the diverse datasets and the need for real-time analysis.

  • Configure individual alarms for each service to trigger notifications when performance metrics fall outside of expected norms.

  • Exclusively deploy a tracing tool to visualize service interactions and deduce error rates and latencies without additional metric analysis.

  • Regularly perform ad-hoc queries on operational logs using the built-in query language of the cloud provider's logging service.

  • Implement a comprehensive dashboard using the monitoring service provided by the cloud provider, including appropriate widgets for key metrics from different services.

Question 4 of 15

As part of setting up the CI/CD pipeline for a newly developed serverless application, your team needs to ensure that code changes are automatically tested before they are merged into the main branch of the repository. Which service would you use to perform this action after every commit?

  • CodeCommit

  • CodeDeploy

  • CodeBuild

  • CodePipeline

Question 5 of 15

A developer has written a Lambda function to process incoming user profile updates and wants to track the number of failed update attempts due to validation errors. They need to create a custom metric for this purpose and report it using Amazon CloudWatch. Which approach should the developer use to implement this requirement?

  • Emit logs in the CloudWatch embedded metric format (EMF) from the Lambda function for every failed validation attempt.

  • Implement AWS X-Ray tracing in the Lambda function and filter the trace data to count the validation errors.

  • Use the AWS SDK in the Lambda function to put a custom metric by calling the CloudWatch PutMetricData API when a validation error occurs.

  • Create a new CloudWatch Logs log stream and write an error message with a specific format for every failed validation attempt.

Question 6 of 15

AWS Private Certificate Authority allows you to issue certificates that can be used to secure network communications and establish trust, even without the internet.

  • True

  • False

Question 7 of 15

A developer is implementing an application that requires frequent retrieval of items from an Amazon DynamoDB table. To optimize performance, the application needs to minimize latency and reduce the number of network calls. Given the need for efficient data access patterns, which method should the developer use when implementing code that interacts with the DynamoDB table using the AWS SDK?

  • Use PutItem calls with a filter to only insert the desired items.

  • Employ a Scan operation to fetch all table items and filter as needed.

  • Perform individual GetItem operations for each item.

  • Utilize BatchGetItem for batch retrieval of items.

Question 8 of 15

A development team is looking to manage environment-specific settings for their e-commerce web service interface, which routes incoming requests to the same backend AWS Lambda functions. They want to ensure that while the Lambda codebase remains identical, the behavior can be customized based on the environment it's deployed in. How should the team achieve this distinction within the web service interface provided by AWS?

  • Introduce separate interface methods distinguished by the intended environment to control the routing of requests.

  • Establish distinct backend functions for each deployment stage to manage the configuration differences, and allocate them to the web service interface accordingly.

  • Utilize environment configuration parameters, unique to each deployment stage of the web service interface, to pass specific values to the backend without changing the functions.

  • Alter the backend function code to incorporate environment-specific logic, and bundle this variance within the function deployment package.

Question 9 of 15

Which configuration under Amazon API Gateway allows a developer to associate a REST API with a custom domain name?

  • Stage Variables

  • Base Path Mapping

  • Resource Policies

  • Custom Domain Names

Question 10 of 15

Which type of encryption key provided by AWS allows a developer to explicitly handle rotation schedules and define the key's usage policy?

  • Customer-managed keys

  • Provider-managed keys

  • Platform-managed keys

  • Automatically-rotated keys

Question 11 of 15

A developer is tasked with enabling a mobile application to authenticate users via third-party social media platforms and subsequently authorize them to directly call cloud services. Which Amazon service should be utilized to fulfill this requirement?

  • Implement an Amazon Cognito Identity Pool to federate with external identity providers and acquire temporary credentials for service access.

  • Leverage the Security Token Service to build federated user sessions with external platforms.

  • Incorporate Amazon QuickSight for identity management and authorization of cloud service API calls.

  • Deploy an Amazon Cognito User Pool to directly manage external authentication and access.

Question 12 of 15

To increase the transparency into the performance of a critical web application, a developer needs to record event-specific information that can indicate the system's health. Without altering the existing infrastructure setup, which method should the developer choose to directly integrate this telemetry capture within the application's code base?

  • Incorporate the necessary API calls to the monitoring service to transmit the custom telemetry data as required.

  • Leverage the high-level functionalities of a software development kit to streamline the transmission process of telemetry data.

  • Adapt the system agent pre-installed on the host machine to gather and dispatch the new set of metrics.

  • Utilize a configuration management service to automate the creation of telemetry resources for the monitoring service.

Question 13 of 15

A cloud architect must design a system for handling image processing tasks that could peak unpredictably, ensuring continuation of image submissions without delay for the end-users. Which design pattern should the architect choose to fulfill this requirement?

  • Implementing a design where image processing tasks are queued for execution without requiring the user to wait for each task completion

  • Creating a design based on a pattern that is driven by the occurrence of specific events, without addressing user submission responsiveness

  • Establishing a system where image processing operations are performed instantaneously upon submission and acknowledgment is made only after completion

  • Configuring a direct processing method where each request is processed in order and the user session is maintained until confirmation of image handling

Question 14 of 15

Your company's new web application has just been deployed to production, and you're tasked with setting up its operational backbone. You need to prepare the application for incident response and ensure that you have adequate visibility into the system's performance and behavior. Which approach aligns best with your goal of full system observability?

  • Caching frequently accessed data to optimize read times.

  • Setting up a comprehensive system of structured logs, detailed metrics, and distributed tracing.

  • Creating a detailed metrics dashboard that displays the CPU and memory usage of your application environments.

  • Configuring alerts to notify the team upon encountering any HTTP 5XX errors.

Question 15 of 15

You are implementing a notification system for an online shopping platform hosted on AWS. The system must send emails to customers after their order has been processed. Given that the order processing system can become backlogged during peak times, which pattern should you employ to ensure that the email notifications do not block or slow down the order processing workflow?

  • Employ an asynchronous pattern with a message queue that collects notifications to be processed by a separate email-sending service independently of order processing.

  • Use a synchronous pattern where the order processing service sends the email directly before confirming the order as complete within the same workflow.

  • Implement a hybrid pattern, sending the email synchronously for premium customers, while using an asynchronous approach for regular customers.

  • Adopt a synchronous pattern for small batches of orders, switching to an asynchronous pattern only when detecting a processing backlog.