web analytics

How can these requirements be met? (Choose two.)

An organization is using Amazon CloudFront to ensure that its users experience low-latency access to its web application. The organization has identified a need to encrypt all traffic between users

Based on this system configuration, where would the Developer find the logs?

An application uses Lambda functions to extract metadata from files uploaded to an S3 bucket; the metadata is stored in Amazon DynamoDB. The application starts behaving unexpectedly, and the Developer

What is the easiest way to deploy the application, based on these requirements?

A Developer has developed a web application and wants to deploy it quickly on a Tomcat server on AWS. The Developer wants to avoid having to manage the underlying infrastructure.

How can the Developer MOST efficiently handle the temporary files?

A Developer is creating a Lambda function that will generate and export a file. The function requires 100 MB of temporary storage for temporary files while executing. These files will

Where is the session data best written so that it can be served reliably across multiple requests?

An application runs on multiple EC2 instances behind an ELB. Where is the session data best written so that it can be served reliably across multiple requests? A. Write data

Use of which managed AWS services will enable asynchronous message passing? (Choose two.)

A company is migrating from a monolithic architecture to a microservices-based architecture. The Developers need to refactor the application so that the many microservices can asynchronously communicate with each other

How can the EC2 instance be configured to make AWS API calls securely?

An application running on an Amazon Linux EC2 instance needs to manage the AWS infrastructure. How can the EC2 instance be configured to make AWS API calls securely? A. Sign

Which is the MOST cost-efficient deployment strategy?

The development team is working on an API that will be served from Amazon API gateway. The API will be served from three environments: development, test, and production. The API

According to best practice, how should access keys be managed in AWS? (Choose two.)

According to best practice, how should access keys be managed in AWS? (Choose two.) A. Use the same access key in all applications for consistency. B. Delete all access keys

How can this be accomplished?

A development team is using AWS Elastic Beanstalk to deploy a two-tier application that consists of a load-balanced web tier and an Amazon RDS database tier in production. The team

Based on this scenario, what is the MOST cost-effective solution to this problem?

An application needs to use the IP address of the client in its processing. The application has been moved into AWS and has been placed behind an Application Load Balancer

Which caching strategy will address this situation MOST efficiently?

A website’s page load times are gradually increasing as more users access the system at the same time. Analysis indicates that a user profile is being loaded from a database

Which of the following configurations can be used to silently notify users whenever an update is available on all other devices?

A social media company is using Amazon Cognito in order to synchronize profiles across different mobile devices, to enable end users to have a seamless experience. Which of the following

What are the possible causes? (Choose two.)

A company is using AWS CodePipeline to deliver one of its applications. The delivery pipeline is triggered by changes to the master branch of an AWS CodeCommit repository and uses

What technique provides the shortest delay in updating the dashboard?

An application displays a status dashboard. The status is updated by 1 KB messages from an SQS queue. Although the status changes infrequently, the Developer must minimize the time between

Which of the following sets of AWS services can be used to run this stack?

An on-premises application is implemented using a Linux, Apache, MySQL and PHP (LAMP) stack. The Developer wants to run this application in AWS. Which of the following sets of AWS

Which service should be used to synchronize user data across devices without the need to create a backend application?

A gaming company is developing a mobile game application for iOS® and Android® platforms. This mobile game securely stores user data locally on the device. The company wants to allow

How can the Developer create the solution?

A Developer must trigger an AWS Lambda function based on the item lifecycle activity in an Amazon DynamoDB table. How can the Developer create the solution? A. Enable a DynamoDB

What is necessary to allow for horizontal scaling when migrating the application to AWS?

An on-premises legacy application is caching data files locally and writing shared images to local disks. What is necessary to allow for horizontal scaling when migrating the application to AWS?

What is the most likely cause of this error?

After installing the AWS CLI, a Developer tries to run the command aws configure but receives the following error: Error: aws: command not found What is the most likely cause

What can be done to ensure that the CLI uses the Developer’s IAM permissions when making commands?

A Developer will be using the AWS CLI on a local development server to manage AWS services. What can be done to ensure that the CLI uses the Developer’s IAM

What steps have to be executed to perform the monitoring?

A Developer needs to use AWS X-Ray to monitor an application that is deployed on EC2 instances. What steps have to be executed to perform the monitoring? A. Deploy the

What service could be used to allow multiple consumers to process the data concurrently and MOST cost- effectively?

An application is real-time processing millions of events that are received through an API. What service could be used to allow multiple consumers to process the data concurrently and MOST

Which AWS service should be used to meet these requirements?

A Developer is creating a mobile application with a limited budget. The solution requires a scalable service that will enable customers to sign up and authenticate into the mobile application

What is the most scalable method to add the fraud detection solution to the order processing pipeline?

The Developer for a retail company must integrate a fraud detection solution into the order processing solution. The fraud detection solution takes between ten and thirty minutes to verify an

How can the Lambda function use the resources for the current environment?

A Lambda function is packaged for deployment to multiple environments, including development, test, production, etc. Each environment has unique set of resources such as databases, etc. How can the Lambda

What is the recommended solution?

When a Developer tries to run an AWS CodeBuild project, it raises an error because the length of all environment variables exceeds the limit for the combined maximum of characters.

Which of the following AWS service can be used to meet these requirements?

A company needs to encrypt data at rest, but it wants to leverage an AWS managed service using its own master key. Which of the following AWS service can be

Which configuration would allow the Development team to meet these requirements MOST securely?

A company is developing a new online game that will run on top of Amazon ECS. Four distinct Amazon ECS services will be part of the architecture, each requiring specific

How can the Developer ensure that all traffic to the S3 bucket is encrypted?

An application running on EC2 instances is storing data in an S3 bucket. Security policy mandates that all data must be encrypted in transit. How can the Developer ensure that

Which of the following solutions would involve the LEAST administrative effort?

A Developer uses AWS CodeDeploy to automate application deployment that connects to an external MySQL database. The Developer wants to securely access the encrypted secrets, such as API keys and

What action can be taken to allow API customers to invalidate the API Cache?

A set of APIs are exposed to customers using the Amazon API Gateway. These APIs have caching enabled on the API Gateway. Customers have asked for an option to invalidate

Which techniques will work? (Choose two.)

A Developer must repeatedly and consistently deploy a serverless RESTful API on AWS. Which techniques will work? (Choose two.) A. Define a Swagger file. Use AWS Elastic Beanstalk to deploy

What is the optimal and MOST cost-effective design to ensure that the real-time dashboard is kept up to date with the state of the objects in the Amazon S3 buckets?

A Developer has been asked to build a real-time dashboard web application to visualize the key prefixes and storage size of objects in Amazon S3 buckets. Amazon DynamoDB will be

What deployment policy would satisfy these requirements?

A customer wants to deploy its source code on an AWS Elastic Beanstalk environment. The customer needs to perform deployment with minimal outage and should only use existing instances to

What is the MOST efficient and SIMPLEST way to implement a system that meets these requirements?

A Developer must re-implement the business logic for an order fulfilment system. The business logic has to make requests to multiple vendors to decide where to purchase an item. The

How can thumbnail generation be added to the application, meeting user requirements while minimizing changes to existing code?

An existing serverless application processes uploaded image files. The process currently uses a single Lambda function that takes an image file, performs the processing, and stores the file in Amazon

Where should the appspec.yml file be placed in order for AWS CodeDeploy to work?

Where should the appspec.yml file be placed in order for AWS CodeDeploy to work? A. In the root of the application source code directory structure B. In the bin folder

What is the BEST way to achieve this using AWS CodePipeline?

The release process workflow of an application requires a manual approval before the code is deployed into the production environment. What is the BEST way to achieve this using AWS

An application overwrites an object in Amazon S3, and then immediately reads the same object. Why would the application sometimes retrieve the old version of the object?

An application overwrites an object in Amazon S3, and then immediately reads the same object. Why would the application sometimes retrieve the old version of the object? A. S3 overwrite

How can compliance with this policy be ensured?

An organization must store thousands of sensitive audio and video files in an Amazon S3 bucket. Organizational security policies require that all data written to this bucket be encrypted. How

An application stops working with the following error: The specified bucket does not exist. Where is the BEST place to start the root cause analysis?

An application stops working with the following error: The specified bucket does not exist. Where is the BEST place to start the root cause analysis? A. Check the Elastic Load

What is the MOST likely cause of the problem?

A company has written a Java AWS Lambda function to be triggered whenever a user uploads an image to an Amazon S3 bucket. The function converts the original image to

Which approach should the Developer use to handle this change?

A company is using Amazon API Gateway to manage access to a set of microservices implemented as AWS Lambda functions. Following a bug report, the company makes a minor breaking

Which of the following could create this situation? (Select two.)

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found

How can the Developer implement encryption at rest for data within the Kinesis Streams?

A web application is using Amazon Kinesis Streams for clickstream data that may not be consumed for up to 12 hours. How can the Developer implement encryption at rest for

How should the Developer identify the cause of the failures?

A company is using AWS CodeBuild to compile a website from source code stored in AWS CodeCommit. A recent change to the source code has resulted in the CodeBuild project

A legacy service has an XML-based SOAP interface. The Developer wants to expose the functionality of the service to external clients with the Amazon API Gateway. Which technique will accomplish this?

A legacy service has an XML-based SOAP interface. The Developer wants to expose the functionality of the service to external clients with the Amazon API Gateway. Which technique will accomplish

Which of the following application designs meet the requirements? (Select two.)

A supplier is writing a new RESTful API for customers to query the status of orders. The customers requested the following API endpoint. http://www.supplierdomain.com/status/customerID Which of the following application designs

Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs?

A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as