aiotestking uk

AWS-Certified-Developer-Associate Exam Questions - Online Test


AWS-Certified-Developer-Associate Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. When AutoScaIing is launching a new instance based on condition, which of the below mentioned policies will it follow?

A. Based on the criteria defined with cross zone Load balancing

B. Launch an instance which has the highest load distribution

C. Launch an instance in the AZ with the fewest instances

D. Launch an instance in the AZ which has the highest instances 

Answer: C

Explanation:

AutoScaIing attempts to distribute instances evenly between the Availability Zones that are enabled for the user’s AutoScaIing group. Auto Scaling does this by attempting to launch new instances in the Availability Zone with the fewest instances.

Reference:http://docs.aws.amazon.com/AutoScaIing/latest/Deve|operGuide/AS_Concepts.htmI

Q2. How do you configure SQS to support longer message retention?

A. Set the lVIessageRetentionPeriod attribute using the SetQueueAttributes method

B. Using a Lambda function

C. You can't. It is set to 14 days and cannot be changed

D. You need to request it from AWS 

Answer: A

Explanation:

To configure the message retention period, set the lVIessageRetentionPeriod attribute using the SetQueueAttributes method. This attribute is used to specify the number of seconds a message will be retained by SQS. Currently the default value for the message retention period is 4 days. Using the lVIessageRetentionPeriod attribute, the message retention period can be set anywhere from 60 seconds (1 minute), up to 1209600 seconds (14 days).

Reference: https://aws.amazon.com/sqs/faqs/

Q3. Which header received at the EC2 instance identifies the port used by the client while requesting ELB?

A. X-Forvvarded-Proto

B. X-Requested-Proto

C. X-Forvvarded-Port

D. X-Requested-Port 

Answer: C

Explanation:

The X-Forvvarded-Port request header helps the user identify the port used by the client while sending a request to ELB.

Reference: http://docs.aws.amazon.com/EIasticLoadBalancing/latest/DeveIoperGuide/TerminologyandKeyConcepts. html

Q4. You cannot access your AWS console, so you revert to using the CLI that you are not familiar with. Which of the following commands is not a valid CLI command for EC2 instances?

A. ec2-allocate-address

B. ec2-attach-internet-gateway

C. ec2-associate-route-table

D. ec2-allocate-interface 

Answer: D

Explanation:

You can use the CLI tools to manage your Amazon EC2 resources (such as instances, security groups, and volumes) and your Amazon VPC resources (such as VPCs, subnets, route tables, and Internet gateways). Before you can start using the tools, you must download and configure them.

The following are valid CLI commands for EC2 instances: ec2-accept-vpc-peering-connection

ec2-allocate-address

ec2-assign-private-ip-addresses ec2-associate-address

ec2-associate-dhcp-options ec2-associate-route-table

ec2-attach-internet-gateway

ec2-attach-network-interface (not ec2-allocate-interface) Reference:

http://docs.aws.amazon.com/AWSEC2/latest/CommandLineReference/command-reference.html

Q5. You need to develop and run some new applications on AWS and you know that Elastic Beanstalk and CIoudFormation can both help as a deployment mechAMsm for a broad range of AWS resources. Which of the following statements best describes the differences between Elastic Beanstalk and C|oudFormation?

A. Elastic Beanstalk uses Elastic load balancing and CIoudFormation doesn't.

B. CIoudFormation is faster in deploying applications than Elastic Beanstalk.

C. CIoudFormation is much more powerful than Elastic Beanstalk, because you can actually design and script custom resources

D. Elastic Beanstalk is faster in deploying applications than C|oudFormation. 

Answer: C

Explanation:

These services are designed to complement each other. AWS Elastic Beanstalk provides an environment to easily develop and run applications in the cloud. It is integrated with developer tools and provides a one-stop experience for you to manage the lifecycle of your applications. AWS CIoudFormation is a convenient deployment mechAMsm for a broad range of AWS resources. It supports the infrastructure needs of many different types of applications such as existing enterprise applications, legacy applications, applications built using a variety of AWS resources and container-based solutions (including those built using AWS Elastic Beanstalk).

AWS CIoudFormation introduces two new concepts: The template, a JSON-format, text-based file that describes all the AWS resources you need to deploy to run your application and the stack, the set of AWS resources that are created and managed as a single unit when AWS CIoudFormation instantiates a template.

Reference: http://aws.amazon.com/c|oudformation/faqs/

Q6. Which of the below mentioned options is not a best practice to securely manage the AWS access credentials?

A. Enable MFA for prMleged users

B. Create indMdual IAM users

C. Keep rotating your secure access credentials at regular intervals

D. Create strong access key and secret access key and attach to the root account 

Answer: D

Explanation:

It is a recommended approach to avoid using the access and secret access keys of the root account.

Thus, do not download or delete it. Instead make the IAM user as powerful as the root account and use its credentials. The user cannot generate their own access and secret access keys as they are always  generated by AWS.

Reference:       http://docs.aws.amazon.com/IAM/latest/UserGuide/IAMBestPractices.html

Q7. Which one of the following statements is NOT an advantage of DyanamoDB being built on Solid State Drives:

A. serve high-scale request workloads

B. low request pricing

C. high I/O performance of WebApp on EC2 instance

D. low-latency response times 

Answer: C

Explanation:

In DynamoDB, SSDs help achieve design goals of predictable low-latency response times for storing and accessing data at any scale. The high I/O performance of SSDs also enables to serve high-scale request workloads cost efficiently, and to pass this efficiency along in low request pricing.

Reference: http://aws.amazon.com/dynamodb/faqs/

Q8. AWS Elastic Load Balancer supports SSL termination.

A. True. For specific availability zones only.

B. False

C. True. For specific regions only

D. True. For all regions 

Answer: D

Explanation:

You can configure your load balancer in ELB (Elastic Load Balancing) to use a SSL certificate in order to improve your system security.The load balancer uses the certificate to terminate and then decrypt   requests before sending them to the back-end instances. Elastic Load Balancing uses AWS Identity and Access Management (IAM) to upload your certificate to your load balancer.

Reference: http://docs.aws.amazon.com/EIasticLoadBaIancing/latest/DeveIoperGuide/US_SettingUpLoadBaIancerH TTPS.htmI

Q9. What is the data model of DynamoDB?

A. "Items", with Keys and one or more Attribute; and "Attribute", with Name and Value.

B. "Database", which is a set of "TabIes", which is a set of "Items", which is a set of "Attributes".

C. "TabIe", a collection of Items; "Items", with Keys and one or more Attribute; and "Attribute", with Name and Value.

D. "Database", a collection of Tables; "TabIes", with Keys and one or more Attribute; and "Attribute", with Name and Value.

Answer:

Explanation:

The data model of DynamoDB is: "TabIe", a collection of Items;

"Items", with Keys and one or more Attribute; "Attribute", with Name and Value.

Reference:        http://docs.aws.amazon.com/amazondynamodb/latest/developerguide/DataModeI.html

Q10. An orgAMzation has enabled a strict password policy for its IAM users. The orgAMzation is taking help from the IAM console to set the password policy. Which of the below mentioned rules cannot be specified by the user as a part of the policy?

A. Allow at least one lower case letter

B. Allow at least one number

C. Allow at least one non-alphanumeric character

D. Do not allow the user to use the password from the last three passwords 

Answer: D

Explanation:

AWS IAM allows an orgAMzation to create multiple users and provide them access to various AWS services. By default when the user is created, he does not have password enabled and can not login to   AWS console. If the orgAMzation wants to allow the users to login to AWS console, they can enable password for each user. It is required that IAM users follow certain guidelines to set their IAM login password. For this IAM provides root account owner to setup passwrod policy. The password policy also lets the specify whether all IAM users can change their own passwords. As part of policy, orgAMzation can specify that passwords for IAM users must be of a certain minimum length, must include certain   characters, and a few more criteria such as below.

One upper/ lower or both letters One alpha numeric

One number

Reference:         http://docs.aws.amazon.com/|AM/Iatest/UserGuide/Using_ManagingPasswordPoIicies.htm|