00:20:00

AWS Certified Developer Associate Practice Test (DVA-C02)

Use the form below to configure your AWS Certified Developer Associate Practice Test (DVA-C02). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for AWS Certified Developer Associate DVA-C02
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Developer Associate DVA-C02 Information

AWS Certified Developer - Associate showcases knowledge and understanding of core AWS services, uses, and basic AWS architecture best practices, and proficiency in developing, deploying, and debugging cloud-based applications by using AWS. Preparing for and attaining this certification gives certified individuals more confidence and credibility. Organizations with AWS Certified developers have the assurance of having the right talent to give them a competitive advantage and ensure stakeholder and customer satisfaction.

The AWS Certified Developer - Associate (DVA-C02) exam is intended for individuals who perform a developer role. The exam validates a candidate’s ability to demonstrate proficiency in developing, testing, deploying, and debugging AWS Cloud-based applications. The exam also validates a candidate’s ability to complete the following tasks:

  • Develop and optimize applications on AWS.
  • Package and deploy by using continuous integration and continuous delivery (CI/CD) workflows.
  • Secure application code and data.
  • Identify and resolve application issues.
AWS Certified Developer Associate DVA-C02 Logo
  • Free AWS Certified Developer Associate DVA-C02 Practice Test

  • 20 Questions
  • Unlimited
  • Development with AWS Services
    Security
    Deployment
    Troubleshooting and Optimization
Question 1 of 20

What process involves converting an object into a data format that can be stored and reconstructed later?

  • Normalizing

  • Decoding

  • Serialization

  • Encoding

Question 2 of 20

A developer needs to securely manage the storage and retrieval of database login credentials for an application hosted on Amazon EC2 instances. The application code requires these credentials to establish database connections at runtime. Which method is the recommended best practice for handling these credentials securely?

  • Use a secret management service like AWS Secrets Manager to store the database credentials, allowing the application to retrieve them securely at runtime.

  • Create an IAM policy that grants the EC2 instance profile the necessary permissions to connect to the database without needing to store explicit credentials.

  • Embed the database credentials directly in the source code of the application after encrypting them with a basic encryption algorithm.

  • Configure environment variables on the EC2 instances to hold the login details, and read them directly within the application when needed.

Question 3 of 20

An application includes an AWS Lambda function that is triggered when an object is uploaded to an Amazon S3 bucket. The function extracts metadata from the file and stores it in an Amazon DynamoDB table. The development team is adding a CI workflow that will run unit tests on every commit. They want the tests to execute quickly on build servers without provisioning AWS resources or incurring charges, while still confirming that the function calls S3 and DynamoDB with the expected parameters. Which approach should they use?

  • Create a dedicated developer AWS account and provision the S3 bucket and DynamoDB table as part of test setup.

  • Enable AWS X-Ray tracing and analyze the service calls recorded during test execution.

  • Configure a Lambda alias named test and invoke that alias from the unit tests.

  • Use a mocking framework or AWS SDK stubber to simulate Amazon S3 and Amazon DynamoDB in the unit tests.

Question 4 of 20

Your team has developed a new feature that makes asynchronous API calls to a backend service and you need to verify its behavior in the production-like environment. Which service would provide the BEST approach to test this feature before it is released to production considering you want to detect any integration issues as early as possible?

  • Use AWS X-Ray to trace the requests made by the new feature and analyze the service response times.

  • Deploy the new feature using a canary deployment with AWS CodeDeploy to test its behavior with a small percentage of traffic.

  • Run the feature on a selection of real devices using AWS Device Farm to test different network conditions and device interaction.

  • Initiate a build using AWS CodeBuild to integrate the new feature and run unit tests against the updated backend service.

Question 5 of 20

An application utilizes a serverless function to handle web requests and needs to retrieve data from a relational database safely contained within a subnet that is not exposed to the public internet. Which step is vital for the serverless function to communicate effectively with the database?

  • Establish a VPC Peering connection to enable the serverless function hosted on one VPC to access the database in another VPC.

  • Enhance the computational resources of the function by increasing its allocated memory capacity.

  • Alter the database settings to make it publicly accessible and thereby simplify function's access to it.

  • Configure the serverless function with specific network settings that include the VPC ID, subnet identifiers within the VPC, and security group identifiers.

Question 6 of 20

A company is looking to encrypt data at rest for their Amazon DynamoDB table, which contains sensitive information. They want to guarantee that the encryption does not affect the performance of their application. Which service should they use to accomplish this without managing server-side encryption themselves?

  • Force all connections to the DynamoDB table to use SSL/TLS

  • Enable Amazon DynamoDB's default encryption at rest using AWS managed keys

  • Create an IAM role with a policy that enforces encryption at rest

  • Implement client-side encryption before storing the data in the DynamoDB table

Question 7 of 20

Which service offers the capability to obtain temporary, privileged credentials for making authenticated requests to various resources, particularly in scenarios involving identity federation or cross-account access?

  • Security Token Service

  • Cognito User Identity Pools

  • Simple Storage Service

  • Key Management Service

Question 8 of 20

An application is experiencing intermittent failures due to throttling when making requests to an AWS service. Which implementation would BEST enhance the application's resiliency by addressing these specific failures?

  • Implementing retries with exponential backoff and jitter

  • Increasing the timeout settings for the API requests

  • Migrating the application to run on larger EC2 instances

  • Creating additional replicas of the application's database

Question 9 of 20

When designing a system that requires the capability to process a high number of messages per second, which service feature should be used to ensure the most efficient processing while maintaining the ordering of messages?

  • Implementing Dead Letter Queues in Amazon SQS

  • Using Amazon SQS FIFO Queues with Message Group IDs

  • Utilizing Amazon SNS with Content-Based Filtering

  • Enabling Long Polling on Amazon SQS Standard Queues

Question 10 of 20

A development team must secure sensitive customer files in cloud-based object storage. The requirements stipulate that the encryption keys used should be under the company's direct control, with an automated process for changing these keys periodically. Which service and configuration would best fulfill these criteria?

  • Enable a managed key rotation service within the platform's cloud object storage

  • Engage a private certificate authority to apply server-side encryption policies to the cloud storage

  • Use self-managed keys in Key Management Service set to automatically rotate for object storage server-side encryption

  • Adopt a hardware security module service for key storage and institute a manual rotation process

Question 11 of 20

A company needs to update its web application running on AWS without disrupting the user experience. Which deployment strategy should they employ to ensure that only a portion of users are directed to the new version initially, thereby allowing for performance and stability monitoring before the new version is fully deployed?

  • Canary deployment

  • Rolling deployment

  • Blue/green deployment

  • All-at-once deployment

Question 12 of 20

A development team manages a critical serverless application using Amazon API Gateway and AWS Lambda. They have a single REST API definition that needs to be deployed across three distinct environments: dev, test, and prod. Each environment requires the API to integrate with a different backend Lambda function (e.g., my-function-dev, my-function-test, and my-function-prod). The team wants to avoid duplicating the entire API definition for each environment and needs a dynamic way to specify the correct Lambda function based on the deployment stage. Which API Gateway feature should the developer use to meet these requirements most efficiently?

  • Comprehensive resource duplication for each environment

  • Exclusive deployment of separate Lambda functions per environment

  • Isolation of environments using network ACLs and security groups

  • Stage variables

Question 13 of 20

A development team is working on a web application hosted on AWS. The team uses AWS CodeCommit as their version control system and follows a standard naming convention for branches, where 'main' is used for production, 'develop' for staging, and feature branches are created off 'develop' for new features. They decide to work on a new feature and want to ensure it goes through proper testing in staging before being merged into 'main' for production. Which of the following branching strategies should the development team follow to best adhere to their workflow and ensure that the new feature is properly tested and reviewed before deploying to production?

  • Create a feature branch off another existing feature branch to work on the new functionality.

  • Merge the new feature code directly into 'main' from the developer's local machine.

  • Create a new feature branch from 'develop', commit changes to this branch, and upon completion, merge back into 'develop' for staging.

  • Branch off from 'main', work on the new feature, and then merge back into 'main' when testing is concluded.

Question 14 of 20

Which tool offered by Amazon Web Services can developers use to invoke and debug their serverless functions locally, simulating the cloud environment on their own machine?

  • AWS CodeDeploy

  • Amazon CodePipeline

  • AWS SAM CLI

  • AWS SDKs

Question 15 of 20

A development team needs to store access credentials for a production database securely. These credentials must be retrievable programmatically by their web application without embedding them directly into the source code or configuration files. Which service should the team use to achieve this with the ability to rotate secrets periodically and audit access?

  • Web Application Firewall

  • Certificate Manager

  • Secrets Manager

  • Parameter Store

Question 16 of 20

Which technique should be implemented to develop a resilient and fault-tolerant application that can handle intermittent failures when making HTTP requests to an AWS service?

  • Decreasing the timeout with each retry attempt

  • Increasing the payload size with each retry attempt

  • Retries with exponential backoff and jitter

  • Using static waits between retry attempts

  • Retries with constant backoff

  • Sending multiple parallel requests to expedite processing

Question 17 of 20

When retrieving data from a DynamoDB table, which operation allows you to use a partition key to narrow down results and retrieve only the items that match your specific criteria?

  • Query operation

  • Fetch operation

  • Scan operation

  • Lookup operation

Question 18 of 20

A developer is integrating a serverless function with a third-party web service. The developer needs to confirm that the function reacts appropriately under different response conditions, including successful data retrieval, errors, and timeouts, without interacting with the actual service. What is the most effective method to mimic the third-party service and assess the function's various operational responses?

  • Embed static response conditions within the serverless function code to facilitate response scenario assessment.

  • Establish an Amazon API Gateway and configure mock integrations for reproducing varied operational scenarios.

  • Activate the serverless function in a live setting with enhanced logging to track its handling of different operational conditions.

  • Implement an auxiliary serverless function to reproduce the behavior of the third-party service for testing purposes.

Question 19 of 20

A development team needs an automated workflow that, whenever source code is committed, compiles the code, runs tests, and deploys the resulting artifact to a test environment. If the tests pass, the workflow must automatically promote the application to a staging (pre-production) environment. Which AWS service should the team use to orchestrate these multiple deployment stages?

  • CodeCommit

  • CloudFormation

  • CodeBuild

  • CodePipeline

Question 20 of 20

You are implementing a notification system for an online shopping platform hosted on AWS. The system must send emails to customers after their order has been processed. Given that the order-processing system can become backlogged during peak times, which pattern should you employ to ensure that the email notifications do not block or slow down the order-processing workflow?

  • Adopt a synchronous pattern for small batches of orders, switching to an asynchronous pattern only when detecting a processing backlog.

  • Employ an asynchronous pattern with a message queue that collects notifications to be processed by a separate email-sending service independently of order processing.

  • Use a synchronous pattern where the order-processing service sends the email directly before confirming the order as complete within the same workflow.

  • Implement a hybrid pattern, sending the email synchronously for premium customers, while using an asynchronous approach for regular customers.