00:15:00

Free AWS Certified Developer Associate DVA-C02 Practice Test

Prepare for the AWS Certified Developer Associate DVA-C02 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Development with AWS Services
    • Security
    • Deployment
    • Troubleshooting and Optimization
Question 1 of 15

Which configuration under Amazon API Gateway allows a developer to associate a REST API with a custom domain name?

  • Custom Domain Names

  • Resource Policies

  • Base Path Mapping

  • Stage Variables

Question 2 of 15

A company is looking to encrypt data at rest for their Amazon DynamoDB table, which contains sensitive information. They want to guarantee that the encryption does not affect the performance of their application. Which service should they use to accomplish this without managing server-side encryption themselves?

  • Implement client-side encryption before storing the data in the DynamoDB table

  • Force all connections to the DynamoDB table to use SSL/TLS

  • Enable Amazon DynamoDB's default encryption at rest using AWS managed keys

  • Create an IAM role with a policy that enforces encryption at rest

Question 3 of 15

What best describes the practice of periodically changing the encryption key used to secure data in AWS?

  • Key agreement

  • Key rotation

  • Key revocation

  • Key escrow

Question 4 of 15

Your web application is experiencing unpredictable traffic spikes, leading to increased latency and timeouts. To address this, you aim to implement a caching strategy to store frequently accessed data. Which service should you use to cache query results and reduce database load while also providing a distributed in-memory cache that can scale with your application traffic?

  • Amazon Relational Database Service (RDS)

  • Amazon CloudFront

  • Amazon ElastiCache

  • Amazon Elastic Beanstalk

Question 5 of 15

To increase the transparency into the performance of a critical web application, a developer needs to record event-specific information that can indicate the system's health. Without altering the existing infrastructure setup, which method should the developer choose to directly integrate this telemetry capture within the application's code base?

  • Utilize a configuration management service to automate the creation of telemetry resources for the monitoring service.

  • Adapt the system agent pre-installed on the host machine to gather and dispatch the new set of metrics.

  • Incorporate the necessary API calls to the monitoring service to transmit the custom telemetry data as required.

  • Leverage the high-level functionalities of a software development kit to streamline the transmission process of telemetry data.

Question 6 of 15

A software company utilizes AWS Lambda for deploying a mission-critical application. In their upcoming release, they plan to incorporate a canary release strategy to introduce a new feature incrementally while mitigating risks. Assuming they already have a Lambda alias for their production environment, how should the company configure the alias to slowly route a small percentage of user traffic to the new feature while the majority still accesses the stable version?

  • Adjust the production alias to serve both the old and the new Lambda versions, and configure the alias routing with a small weight towards the new version, gradually increasing it based on the monitoring results.

  • Deploy the new version as a separate Lambda function without an alias and manually invoke the new function to represent a percentage of total traffic.

  • Configure the Lambda alias to immediately redirect 100% of traffic to the new version to test the new feature in live conditions.

  • Deploy the new feature as a new Lambda function and update the production alias configuration to point solely to the new function, relying on Lambda's inherent traffic shifting capabilities.

Question 7 of 15

When using the AWS SDK for Python (Boto3) to perform an operation on an Amazon S3 bucket, which exception would typically be raised if the specified bucket does not exist?

  • BucketNotFound

  • NoSuchBucket

  • S3BucketMissing

  • ClientError

Question 8 of 15

Which design pattern allows components of a system to interact with each other with minimal interdependencies, thereby enhancing flexibility and maintenance?

  • Tightly coupled design

  • Monolithic design

  • Choreography pattern

  • Loosely coupled design

Question 9 of 15

A developer has deployed a web application that is exhibiting intermittent failures. To effectively monitor application behavior and quickly pinpoint these issues, which service could be used to analyze log data in real time and trigger appropriate responses based on specific log patterns?

  • Utilize Amazon RDS Performance Insights for log events assessment.

  • Implement Amazon S3 event notifications to monitor log object changes.

  • Use Amazon CloudWatch Logs to establish metric filters and alarms.

  • Set up AWS Lambda to poll logs periodically and act on them.

Question 10 of 15

A developer is troubleshooting an application that intermittently fails to connect to an Amazon RDS database instance. The logs indicate occasional connection timeouts. The application and database have not been modified recently, and there is no predictable pattern for the timeout occurrences. After ensuring there are no network issues and the database is healthy, what should the developer investigate NEXT to identify the root cause?

  • Profile the application code to identify any performance bottlenecks that could cause delays.

  • Inspect the number of database connections and ensure proper management in the application's connection pooling configuration.

  • Review the application's usage of Amazon SQS to check for any unprocessed messages accumulating in a dead-letter queue.

  • Analyze the application's interaction with the Amazon EC2 instance to gauge the processing time of web requests.

  • Check for any misconfigured request headers impacting CloudFront distributions, assuming it serves content to the application.

  • Enable AWS X-Ray tracing for in-depth analysis of the underlying Lambda function's execution flow.

Question 11 of 15

A development team is utilizing a CI/CD service provided by AWS to streamline their application deployment. They have automated their release process but require a senior developer's sign-off before the application is pushed to the live environment. Which step should be taken to guarantee that the senior developer is notified to review and approve the release after the automated tests pass?

  • Implement an approval action linked to a notification mechanism using an Amazon SNS topic which the senior developer is subscribed to for email alerts.

  • Develop a function within a serverless compute service to dispatch emails after validation checks have been passed.

  • Configure a monitoring service to send an alert to the senior developer when the automated testing phase succeeds.

  • Arrange for a service hook to issue an email notice to the senior developer upon the conclusion of the verification procedures.

Question 12 of 15

Your development team is creating a web application that should allow users to authenticate using their corporate Active Directory credentials. The team has decided to employ Amazon Cognito to facilitate this process. Which combination of Amazon Cognito features should be used to integrate the corporate Active Directory and provide authenticated user sessions?

  • Combine Amazon Cognito Identity Pools with SAML based federation

  • Integrate AWS IAM Identity Center with Amazon Cognito User Pools

  • Configure AWS Directory Service with Amazon Cognito User Pools

  • Use Amazon Cognito User Pools with corporate Active Directory as a custom identity provider

Question 13 of 15

As part of setting up the CI/CD pipeline for a newly developed serverless application, your team needs to ensure that code changes are automatically tested before they are merged into the main branch of the repository. Which service would you use to perform this action after every commit?

  • CodePipeline

  • CodeBuild

  • CodeDeploy

  • CodeCommit

Question 14 of 15

Your company is deploying a new microservice on AWS that will access an Amazon DynamoDB table to only read records. As an AWS developer, you are tasked with ensuring that the microservice's access adheres to the principle of least privilege. Which of the following would be the most appropriate action to take?

  • Remove any DynamoDB permissions from the microservice as it can assume the required permissions dynamically at runtime

  • Create an IAM policy that includes dynamodb:PutItem and dynamodb:UpdateItem and attach it to the microservice's IAM role

  • Create an IAM policy with permissions for dynamodb:GetItem, dynamodb:BatchGetItem, dynamodb:Query, and dynamodb:Scan and attach it to the microservice's IAM role

  • Grant the microservice full access to the Amazon DynamoDB table

Question 15 of 15

Your application hosted on a cloud platform requires encrypted communication channels to prevent eavesdropping. As a best practice, how should you handle the certificate lifecycle for securing these channels?

  • Regularly engage in a manual process to update and manage the required credentials on the respective servers.

  • Implement a certificate manager to automate the lifecycle management, including the renewal and application of necessary credentials for secured channels.

  • Maintain necessary credentials in a publicly accessible object storage service and programmatically pull them when initializing secured channels.

  • Apply universally accepted public credentials for the encryption of all channels, both public and private, within the application's architecture.