00:15:00

AWS Certified Developer Associate Practice Test (DVA-C02)

Use the form below to configure your AWS Certified Developer Associate Practice Test (DVA-C02). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for AWS Certified Developer Associate DVA-C02
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Developer Associate DVA-C02 Information

AWS Certified Developer - Associate showcases knowledge and understanding of core AWS services, uses, and basic AWS architecture best practices, and proficiency in developing, deploying, and debugging cloud-based applications by using AWS. Preparing for and attaining this certification gives certified individuals more confidence and credibility. Organizations with AWS Certified developers have the assurance of having the right talent to give them a competitive advantage and ensure stakeholder and customer satisfaction.

The AWS Certified Developer - Associate (DVA-C02) exam is intended for individuals who perform a developer role. The exam validates a candidate’s ability to demonstrate proficiency in developing, testing, deploying, and debugging AWS Cloud-based applications. The exam also validates a candidate’s ability to complete the following tasks:

  • Develop and optimize applications on AWS.
  • Package and deploy by using continuous integration and continuous delivery (CI/CD) workflows.
  • Secure application code and data.
  • Identify and resolve application issues.

Free AWS Certified Developer Associate DVA-C02 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Development with AWS Services
    Security
    Deployment
    Troubleshooting and Optimization
Question 1 of 15

Which service should a developer use to track the requests that travel through multiple components of a distributed system, helping to understand the application's behavior and identify bottlenecks?

  • You selected this option

    Inspector

  • You selected this option

    X-Ray

  • You selected this option

    CloudTrail

  • You selected this option

    CloudFormation

Question 2 of 15

Which service is primarily used for the secure storage, management, and retrieval of credentials and other sensitive configuration details, while also supporting automatic rotation of these details?

  • You selected this option

    Key Management Service

  • You selected this option

    Systems Manager

  • You selected this option

    Secure Storage Service

  • You selected this option

    Secrets Manager

Question 3 of 15

A developer needs to ensure that immediate alerts are sent out when a serverless function's usage nears the upper bounds of its allowed parallel executions, potentially impacting the application's availability. Which approach should the developer employ for real-time notification?

  • You selected this option

    Set up a configuration recorder to monitor changes to the function's configuration and alert on significant modifications.

  • You selected this option

    Incorporate error handling in the relevant code to catch execution limit errors and send emails via a mail delivery service.

  • You selected this option

    Create an alarm based on the 'ConcurrentExecutions' metric that triggers an alert to a messaging topic when nearing the execution limit.

  • You selected this option

    Schedule regular audits of usage patterns through log analysis and manually trigger notifications when limits are approached.

Question 4 of 15

Which tool offered by Amazon Web Services can developers use to invoke and debug their serverless functions locally, simulating the cloud environment on their own machine?

  • You selected this option

    Amazon CodePipeline

  • You selected this option

    AWS CodeDeploy

  • You selected this option

    AWS SAM CLI

  • You selected this option

    AWS SDKs

Question 5 of 15

To comply with an inter-company collaboration, your team is required to configure a cloud storage resource enabling another organization to have readonly access to specific files. Your task is to determine how to accomplish this without granting unnecessary privileges or altering user management in the other organization. What is the most effective method to establish this level of access control?

  • You selected this option

    Update the storage resource's ACL to give ownership permissions to the external entity’s account identifier.

  • You selected this option

    Provision individual user accounts for the external entity within your identity management system, assigning full privileges over the storage resource.

  • You selected this option

    Deploy a series of temporary URLs for each file, allowing indefinite access to the resources without restriction.

  • You selected this option

    Create a bucket policy that allows readonly access to the specified files for the external entity's account identifier.

Question 6 of 15

Your team is enhancing the security of your company's application by moving sensitive environment configurations out of the codebase. They need a solution that allows easy updates to these settings as business requirements evolve, without necessitating a new deployment of the application stack. Which service should they implement for storing and retrieving these settings while ensuring sensitive information is encrypted and access is controlled?

  • You selected this option

    Systems Manager Parameter Store

  • You selected this option

    Function-as-a-Service environment variables

  • You selected this option

    Elastic Compute Cloud (EC2) instance metadata

  • You selected this option

    Simple Storage Service (S3) with custom encryption

Question 7 of 15

An application you are developing is responsible for processing messages from a queue and executing an operation that relies on a third-party service, which is known for its occasional unpredictability. To improve your application's robustness against these intermittent service failures, which pattern should you implement in your operation logic?

  • You selected this option

    Implement a circuit breaker to immediately halt operations upon an error

  • You selected this option

    Retries with exponential backoff and jitter

  • You selected this option

    Attempt immediate recursive retries after a failed operation

  • You selected this option

    Increase read and write capacity to the queue during peak times

Question 8 of 15

When refining the debugging process for a serverless function, you decide to enhance its trace data by adding relevant business-specific metadata. Which service would you use to achieve this by annotating the function's execution flow?

  • You selected this option

    Step Functions

  • You selected this option

    X-Ray

  • You selected this option

    CloudTrail

  • You selected this option

    CloudWatch

Question 9 of 15

A team of developers manages a web service endpoint interfacing with a mobile application. They need to roll out a new feature which adjusts the data format returned to clients. To prevent potential disruptions to the live mobile application, what strategy should they employ for introducing this new feature to end-users?

  • You selected this option

    Create a new, identically named environment and quickly switch all user traffic to this updated version to minimize downtime.

  • You selected this option

    Initiate a staged rollout by gradually increasing the new feature exposure to a fraction of live traffic before full deployment.

  • You selected this option

    Conduct thorough testing in an isolated clone of the production environment before updating the live service.

  • You selected this option

    Merge the changes directly into the production environment during low-traffic periods to evaluate real user interactions without notice.

Question 10 of 15

An engineer needs to automate resource management on a virtual server hosted on a cloud platform. The application must abide by security best practices and not use long-term static credentials. What is the most secure approach for the engineer to facilitate necessary permissions for the application?

  • You selected this option

    Place access credentials within the application's source code and configure it to reference these for making service requests.

  • You selected this option

    Embed static access credentials with extensive permissions in the environment variables of the virtual server for application use.

  • You selected this option

    Attach an IAM role to the virtual server which has policies corresponding to the required level of access for the application.

  • You selected this option

    Distribute a static user's access and secret keys to the application through the virtual server's launch configuration.

  • You selected this option

    Configure the virtual server to use the cloud platform's root user credentials for all management tasks.

Question 11 of 15

Your application, hosted on multiple Amazon EC2 instances, needs to perform periodic data processing tasks on an Amazon S3 bucket. The tasks require the application to have read, write, and list permissions on the bucket. To align with security best practices, which action should you take to grant these S3 permissions to the application?

  • You selected this option

    Attach an IAM managed policy with the required S3 permissions directly to the EC2 instances.

  • You selected this option

    Create an IAM role with the specified S3 permissions and attach it to the EC2 instances using an instance profile.

  • You selected this option

    Configure a resource-based policy on the S3 bucket to grant the EC2 instances the required permissions.

  • You selected this option

    Create an IAM user for each EC2 instance with permissions to access the S3 bucket and store the credentials in a configuration file on each instance.

Question 12 of 15

Utilizing Amazon CloudWatch Logs Insights for querying application logs does not support time-based queries, making it unsuitable for isolating incidents that occurred during specific time frames.

  • You selected this option

    False

  • You selected this option

    True

Question 13 of 15

A development team is refining their serverless application's logging approach to enable better insight during debug sessions. They need the capability to effortlessly filter and search through log entries for specific execution contexts like the runtime version and unique request identifiers. Which logging strategy should the team employ to ensure their log data is conducive to rapid and effective troubleshooting?

  • You selected this option

    Focus on capturing only exception stack traces in the log files, considering that this information suffices for pinpointing issues.

  • You selected this option

    Adopt structured logging with a consistent format like JSON that supports key-value pairs for all pertinent information, enhancing the interpretability and searchability of the logs.

  • You selected this option

    Use a rudimentary logging mechanism that captures standard output streams without specific structure to save on storage space.

  • You selected this option

    Depend solely on a distributed tracing service to monitor the application, presuming it alleviates the need for detailed logs.

Question 14 of 15

A developer needs to process incoming files uploaded to an Amazon S3 bucket and transform the data using an AWS Lambda function. The developer wants the function to be triggered as soon as a new file is stored in the bucket. What is the MOST suitable way to achieve this requirement?

  • You selected this option

    Send the S3 event notifications to an Amazon SQS queue and set up the queue as an event source for the Lambda function.

  • You selected this option

    Publish the S3 event notifications to an Amazon SNS topic and subscribe the Lambda function to that topic.

  • You selected this option

    Configure the Lambda function to be triggered by Amazon S3 event notifications when a new object is created.

  • You selected this option

    Route the S3 event notifications to Amazon CloudWatch Events/EventBridge and associate the Lambda function as a target.

Question 15 of 15

A software team has noticed that a serverless function, which processes incoming streaming data, is occasionally hitting its maximum execution time, resulting in incomplete tasks. The function's workload involves complex computations and varying sizes of data payloads. To enhance the processing efficiency and reduce the likelihood of timeouts, which of the following adjustments should be the team's initial step?

  • You selected this option

    Implement a distributed tracing service to examine the function's behavior in detail.

  • You selected this option

    Allocate more memory to the serverless function.

  • You selected this option

    Manually optimize the function by removing lines of code to decrease the execution time.

  • You selected this option

    Extend the maximum allowed execution time for the function.