aiotestking uk

AWS-Certified-Developer-Associate Exam Questions - Online Test


AWS-Certified-Developer-Associate Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. A user has created an application which sends data to a log file. The server hosting the log files can be unavailable due to any reason. The user wants to make it so that whenever the log server is up it should  be receMng the messages. Which of the below mentioned AWS services helps achieve this functionality?

A. AWS Simple Workflow

B. AWS Simple Task Service

C. AWS Simple Notification Service

D. AWS Simple Queue Service 

Answer: D

Explanation:

Amazon Simple Queue Service (SQS) is a fast, reliable, scalable, and fully managed message queuing service. SQS provides a simple and cost-effective way to decouple the components of an application. The user can use SQS to transmit any volume of data without losing messages or requiring other services to always be available. Using SQS, the application has to just send the data to SQS and SQS transmits it to the log file whenever it is available.

Reference: http://aws.amazon.com/sqs/

Q2. An orgAMzation has launched two applications: one for blogging and one for ECM on the same AWS Linux EC2 instance running in the AWS VPC. The orgAMzation has attached two private IPs (primary and secondary) to the above mentioned instance. The orgAMzation wants the instance OS to recognize the secondary IP address. How can the orgAMzation configure this?

A. Use the ec2-net-utility package which updates routing tables, uses DHCP to refresh the secondary IP and adds the network interface.

B. Use the ec2-net-utils package which will configure an additional network interface and update the routing table

C. Use the ec2-ip-update package which can configure the network interface as well as update the secondary IP with DHCP.

D. Use the ec2-ip-utility package which can update the routing tables as well as refresh the secondary IP using DHCP.

Answer:

Explanation:

A Virtual Private Cloud (VPC) is a virtual network dedicated to the user’s AWS account. It enables the

user to launch AWS resources into a virtual network that the user has defined. With VPC the user can specify multiple private IP addresses for his instances.

The number of network interfaces and private IP addresses that a user can specify for an instance depends on the instance type. This scenario helps when the user wants to host multiple websites on a single EC2 instance. After the user has assigned a secondary private IP address to his instance, he   needs to configure the operating system on that instance to recognize the secondary private IP address. For AWS Linux, the ec2-net-utils package can take care of this step. It configures additional network interfaces that the user can attach while the instance is running, refreshes secondary IP addresses during DHCP lease renewal, and updates the related routing rules.

Reference:       http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/MuItipIeIP.html

Q3. You cannot access your AWS console, so you revert to using the CLI that you are not familiar with. Which of the following commands is not a valid CLI command for EC2 instances?

A. ec2-allocate-address

B. ec2-attach-internet-gateway

C. ec2-associate-route-table

D. ec2-allocate-interface 

Answer: D

Explanation:

You can use the CLI tools to manage your Amazon EC2 resources (such as instances, security groups, and volumes) and your Amazon VPC resources (such as VPCs, subnets, route tables, and Internet gateways). Before you can start using the tools, you must download and configure them.

The following are valid CLI commands for EC2 instances: ec2-accept-vpc-peering-connection

ec2-allocate-address

ec2-assign-private-ip-addresses ec2-associate-address

ec2-associate-dhcp-options ec2-associate-route-table

ec2-attach-internet-gateway

ec2-attach-network-interface (not ec2-allocate-interface) Reference:

http://docs.aws.amazon.com/AWSEC2/latest/CommandLineReference/command-reference.html

Q4. A user is creating a snapshot of an EBS volume. Which of the below statements is incorrect in relation to the creation of an EBS snapshot?

A. Its incremental

B. It can be used to launch a new instance

C. It is stored in the same AZ as the volume

D. It is a point in time backup of the EBS volume 

Answer: C

Explanation:

The EBS snapshots are a point in time backup of the EBS volume. It is an incremental snapshot, but is always specific to the region and never specific to a single AZ.

Hence the statement "|t is stored in the same AZ as the volume" is incorrect.

Reference:       http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSSnapshots.htmI

Q5. A user has created a MySQL RDS instance. Which of the below mentioned options is mandatory to configure while creating an instance?

A. MuIti AZ deployment setup

B. Automated backup window

C. Availability Zone

D. Maintenance window 

Answer: A

Explanation:

When creating an RDS instance, the user needs to specify whether it is Nlulti AZ or not. If the user does not provide the value for the zone, the maintenance window or automated backup window, RDS will automatically select the value.

Reference:        http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.lV|u|tiAZ.htmI

Q6. Can a user get a notification of each instance start / terminate configured with Auto Scaling?

A. Yes, always

B. No

C. Yes, if configured with the Auto Scaling group

D. Yes, if configured with the Launch Config 

Answer: C

Explanation:

The user can get notifications using SNS if he has configured the notifications while creating the Auto Scaling group.

Reference:        http://docs.aws.amazon.com/AutoScaIing/latest/DeveIoperGuide/GettingStartedTutoriaI.html

Q7. An orgAMzation is setting up their website on AWS. The orgAMzation is working on various security measures to be performed on the AWS EC2 instances. Which of the below mentioned security mechAMsms will not help the orgAMzation to avoid future data leaks and identify security weaknesses?

A. Perform SQL injection for application testing.

B. Run penetration testing on AWS with prior approval from Amazon.

C. Perform a hardening test on the AWS instance.

D. Perform a Code Check for any memory leaks. 

Answer: D

Explanation:

AWS security follows the shared security model where the user is as much responsible as Amazon. Since Amazon is a public cloud it is bound to be targeted by hackers. If an orgAMzation is planning to host their application on AWS EC2, they should perform the below mentioned security checks as a measure to find any security weakness/data leaks:

Perform penetration testing as performed by attackers to find any vulnerability. The orgAMzation must take an approval from AWS before performing penetration testing

Perform hardening testing to find if there are any unnecessary ports open Perform SQL injection to find any DB security issues

The code memory checks are generally useful when the orgAMzation wants to improve the application performance.

Reference:     http://aws.amazon.com/security/penetration-testing/

Q8. A user is planning to create a structured database in the cloud. Which of the below mentioned AWS offerings help the user achieve the goal?

A. AWS DynamoDB

B. AWS RDS

C. AWS Simp|eDB

D. AWS RSD

Answer:

Explanation:

AWS RDS is a managed database server offered by AWS, which makes it easy to set up, operate, and scale a relational database or structured data in cloud.

Reference:       http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Welcome.html

Q9. You are building an online store on AWS that uses SQS to process your customer orders. Your backend system needs those messages in the same sequence the customer orders have been put in. How can

you achieve that?

A. You can do this with SQS but you also need to use SWF

B. Messages will arrive in the same order by default

C. You can use sequencing information on each message

D. It is not possible to do this with SQS 

Answer: C

Explanation:

Amazon SQS is engineered to always be available and deliver messages. One of the resulting tradeoffs is that SQS does not guarantee first in, first out delivery of messages. For many distributed applications, each message can stand on its own, and as long as all messages are delivered, the order is not important. If your system requires that order be preserved, you can place sequencing information in each message,

so that you can reorder the messages when the queue returns them. Reference:

http://docs.aws.amazon.com/AWSSimpIeQueueService/latest/SQSDeveIoperGuide/\NeIcome.html

Q10. In DynamoDB, could you use IAM to grant access to Amazon DynamoDB resources and API actions?

A. Yes

B. Depended to the type of access

C. In DynamoDB there is no need to grant access

D. No

Answer:

Explanation:

Amazon DynamoDB integrates with AWS Identity and Access Management (IAM). You can use AWS IAM to grant access to Amazon DynamoDB resources and API actions. To do this, you first write an AWS IAM policy, which is a document that explicitly lists the permissions you want to grant. You then attach that  policy to an AWS IAM user or role.

Reference: http://docs.aws.amazon.com/amazondynamodb/latest/developerguide/UsingIAMWithDDB.htmI