00:15:00

Free AWS Certified Developer Associate DVA-C02 Practice Test

Prepare for the AWS Certified Developer Associate DVA-C02 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Development with AWS Services
    • Security
    • Deployment
    • Troubleshooting and Optimization
Question 1 of 15

A company is storing sensitive documents in an Amazon S3 bucket and wants to implement a solution where the development team can upload encrypted files without managing the encryption keys directly. The encryption should allow the use of different keys for each S3 object and enable the automatic rotation of those keys. Which of the following should the development team implement to meet these requirements?

  • Apply an S3 Bucket Policy that requires uploads to be encrypted with a specific AWS KMS Customer Master Key (CMK) without enabling key rotation.

  • Implement Server-Side Encryption with Customer Provided Keys (SSE-C) and manage key rotation using a cron job on an EC2 instance.

  • Store and manage encryption keys in AWS CloudHSM and manually rotate the keys by creating new HSM-backed keys when required.

  • Use Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS) and enable automatic key rotation.

  • Utilize AWS Secrets Manager to generate data keys for S3 object encryption and configure automatic rotation.

  • Enable Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3) and schedule an AWS Lambda function to rotate the keys regularly.

Question 2 of 15

A developer is implementing a logging solution for an AWS Lambda-based service, which processes a series of online retail operations. Each operation must be traceable back to the specific session, item involved, and the shopper involved in the interaction. What kind of logging technique should the developer utilize to ensure that the log data can be indexed effectively, facilitating the extraction of relevant information for any investigation or analysis?

  • Generate distinct log streams categorized by type of operation and involved entities for better segregation.

  • Embed CloudWatch Logs insights within the log entries to enhance the searchability of operations.

  • Use JSON formatting for logs, which allows indexing and querying based on specific keys like session, item, and shopper details.

  • Format logs as delimited text with special characters to separate different pieces of information such as session, item, and shopper details.

Question 3 of 15

A developer is integrating a serverless function with a third-party web service. The developer needs to confirm that the function reacts appropriately under different response conditions, including successful data retrieval, errors, and timeouts, without interacting with the actual service. What is the most effective method to mimic the third-party service and assess the function's various operational responses?

  • Embed static response conditions within the serverless function code to facilitate response scenario assessment.

  • Establish an Amazon API Gateway and configure mock integrations for reproducing varied operational scenarios.

  • Activate the serverless function in a live setting with enhanced logging to track its handling of different operational conditions.

  • Implement an auxiliary serverless function to reproduce the behavior of the third-party service for testing purposes.

Question 4 of 15

An application developer is tasked with enabling authentication through social media logins for a new mobile app and subsequently permitting access to specific cloud storage and database services on behalf of the authenticated user. Which Amazon Cognito feature should the developer leverage to achieve these requirements?

  • IAM roles with trust relationships

  • Amazon Cognito Identity Pools

  • Directory services with custom application-level federation logic

  • Synchronization service for user data and preferences

  • Amazon Cognito User Pools

  • External identity provider integration with a token broker service

Question 5 of 15

When granting an EC2 instance the necessary permissions to access S3 buckets, which AWS feature should you primarily use?

  • Using Amazon Cognito user pools

  • Attaching an IAM role to the instance

  • Generating access keys for the root account

  • Creating a new IAM user for the instance

Question 6 of 15

A developer needs to deploy a web application in the cloud. What is an effective approach to ensure the allocated resources meet the application's performance requirements without incurring unnecessary costs?

  • Analyze resource usage patterns from similar projects and perform load tests to determine the application's specific requirements.

  • Automatically use the largest instance types available to guarantee the best performance, disregarding cost considerations.

  • Choose a one-size-fits-all allocation based on the provider's default or recommended settings.

Question 7 of 15

Which approach should be used to retrieve an item from an Amazon DynamoDB table based on a unique hash key to ensure the MOST efficient read performance?

  • Search using a secondary index that contains the unique hash key.

  • Enable continuous backup and restore to retrieve the item quickly.

  • Perform a query operation using the table's primary key.

  • Perform a scan operation and then filter the results to find the specific item.

Question 8 of 15

Which service offers automated code reviews and actionable recommendations for improving code quality, along with identifying sections of code that might expose security vulnerabilities?

  • Config

  • CodeGuru

  • CloudFormation

  • CloudTrail

Question 9 of 15

Your company is developing a serverless application with an AWS Lambda function that requires multiple development and testing environments. Which AWS feature allows you to point to different versions of a Lambda function for different integration testing environments without modifying the function's ARN?

  • Lambda Versions

  • Stage Variables in API Gateway

  • Lambda Aliases

  • Environment Variables in Lambda

Question 10 of 15

An enterprise has mandated that their cloud-hosted applications authenticate users from the on-premises directory service without duplicating sensitive credentials. Which approach should be employed to meet this requirement while leveraging the organization's existing user directory?

  • Integrate the application through federation using SAML 2.0 with the organization's existing identity management system.

  • Generate temporary access credentials for users via a token service to authenticate against the on-premises directory service.

  • Migrate the on-premises directory service users to a cloud directory service with User Pools.

  • Implement application-side user authentication controls using the Access Control List (ACL) feature of a cloud directory service.

Question 11 of 15

Which service should be employed for aggregating, manipulating, and evaluating streaming content instantaneously?

  • Amazon Relational Database Service

  • AWS Lambda

  • Amazon Kinesis

  • Amazon Simple Storage Service

Question 12 of 15

A development team is implementing a strategy to gradually introduce a feature update in their serverless function. They wish to monitor the feature's impact by initially exposing it to a small fraction of their user base. Which approach should they employ to control the traffic between the current and new function code?

  • Update the serverless function's execution role to include permissions for accessing the new feature code.

  • Adjust the serverless function's environment variables to point to the new version for a subset of the user base.

  • Assign an alias to the new function code and specify the percentage of traffic to distribute to this alias.

Question 13 of 15

Your company has an application that generates user analytics data that is frequently accessed for the first 30 days and then less frequently accessed for up to 90 days. After 90 days, the data is accessed only occasionally for historical analysis. Your task is to optimize the storage costs by implementing lifecycle rules on the S3 bucket containing this data. Which lifecycle configuration would you recommend to meet these access patterns and cost optimization goals?

  • Transition to S3 Standard-Infrequent Access after 30 days and then to S3 Glacier after 90 days.

  • Retain data in S3 Standard for 30 days and permanently delete it after 90 days.

  • Transition to S3 One Zone-Infrequent Access after 30 days, and retain without further transitions.

  • Keep the data in S3 Standard for 90 days, then move to S3 Glacier.

Question 14 of 15

Which design pattern allows components of a system to interact with each other with minimal interdependencies, thereby enhancing flexibility and maintenance?

  • Tightly coupled design

  • Choreography pattern

  • Monolithic design

  • Loosely coupled design

Question 15 of 15

Your company has an application that uploads processed data to an S3 bucket. You need to design a system where an AWS Lambda function is invoked for each new object created in the bucket to perform additional processing. What combination of steps should be taken to ensure the proper integration between S3 and the Lambda function?

  • Enable Cross-Origin Resource Sharing (CORS) on the S3 bucket to trigger the Lambda function.

  • Create an S3 lifecycle policy that invokes the Lambda function upon new object upload.

  • Apply a bucket policy to the S3 bucket to allow the Lambda function to be invoked when a new object is created.

  • Configure an event notification on the S3 bucket to invoke the Lambda function when an object is created.