...

68 Essential DVA-C02 Questions to Master AWS Development

The AWS Certified Developer – Associate (DVA-C02) certification validates your technical proficiency in developing, deploying, and debugging cloud-based applications using AWS services. The DVA-C02 exam is highly focused on serverless technologies, containerization, security best practices, and CI/CD pipelines. To secure this credential and prove your expertise, you must engage with a verified, high-quality, free AWS practice test. This comprehensive set of 68 DVA-C02 questions is the definitive resource for your final preparation.

Note: The full interactive practice test is available immediately at the bottom of this post.

68 Essential DVA-C02 Questions to Master AWS Development

Why High-Quality DVA-C02 Practice Is Your Competitive Edge

The DVA-C02 exam presents complex, scenario-based questions that require not just memorization, but a practical understanding of service integration and security architecture. Relying solely on unreliable AWS DVA-C02 exam dumps will result in critical gaps in your knowledge. Our free AWS practice tests are engineered by experts to reflect the depth and structure of the actual DVA-C02 exam, ensuring you gain the necessary competence to pass and thrive as a developer.

Serverless Security and Performance on the DVA-C02

Serverless technology, especially AWS Lambda, is a major component of the DVA-C02 curriculum, focusing on both performance optimization and secure configuration.

Secure Access for Lambda Functions

Adhering to security best practices for the DVA-C02 means eliminating long-term credentials. When a Lambda function needs to read data from a DynamoDB table, the function should be configured to use an IAM Execution Role. This role grants the function temporary, automatically rotated credentials, which is the most secure and recommended method for granting permissions to AWS compute services.

Mitigating the Cold Start Problem (A Key DVA-C02 Focus)

One challenge with Lambda is the “cold start,” where the first invocation after inactivity experiences high latency. For latency-sensitive applications, the DVA-C02 solution is Provisioned Concurrency. This feature keeps a specified number of function instances initialized and ready to respond immediately, effectively eliminating cold starts for those instances and ensuring consistent performance.

https://aws.amazon.com/serverless

Mastering AWS Messaging and Integration Services

A significant portion of the DVA-C02 exam covers asynchronous communication patterns, particularly using Amazon SQS (Simple Queue Service).

Preventing Message Duplication in SQS

A frequent problem tested on the DVA-C02 is message duplication under high load. When EC2 instances process messages from an SQS standard queue, the key setting to prevent a message from being processed by multiple consumers simultaneously is the Visibility Timeout. The timeout must be set to be longer than the maximum time it takes a consumer to process and delete the message. Setting the timeout too short risks the message becoming visible again before processing is complete, leading to duplication.

Handling Manual Approval in CI/CD Pipelines

For production deployments, adding a verification step is critical. AWS CodePipeline supports integrating manual intervention using the Manual Approval Action type. This action can be easily added to any stage of the pipeline (e.g., between Staging and Production) to pause execution until an authorized user explicitly approves or rejects the deployment, a necessary skill for the DVA-C02 developer.

https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/welcome.html

Secure Development and Credential Management for the DVA-C02

The DVA-C02 requires expertise in handling sensitive application data and automating credential rotation.

Automating Secret Rotation with a Managed Service

Storing sensitive database credentials directly in application code or configuration files is a security failure. When an application running on an EC2 instance needs credentials that must be automatically rotated every 30 days, the solution is AWS Secrets Manager. Secrets Manager is purpose-built to store, retrieve, and automatically rotate credentials and API keys, providing integration with services like RDS. This service is a core security component tested on the DVA-C02.

Securing Public Access to Data

When dealing with static assets in Amazon S3, ensuring that content is served securely via CloudFront but cannot be accessed directly via the S3 URL requires using an Origin Access Control (OAC) or, for older configurations, an Origin Access Identity (OAI). The DVA-C02 focuses on configuring the CloudFront distribution to restrict direct S3 bucket access, forcing all traffic through the secure CDN endpoint.

Conclusion

Passing the AWS DVA-C02 certification confirms your status as a competent cloud developer. Your success depends on moving beyond theoretical knowledge and demonstrating practical understanding of AWS services in scenario-based challenges. This free AWS DVA-C02 practice test offers 68 expert questions and authoritative explanations to ensure you master every domain. Avoid the low confidence that comes from using unreliable AWS DVA-C02 exam dumps. Please do not forget to checkout other free Amazon Web Services Certifications on CertyBuddy.com: https://certybuddy.com/practice-tests/?vendor=aws

Take the professional step now. Master the core development services and pass the DVA-C02 exam on your first attempt!

/136
0

68 Essential DVA-C02 Questions to Master AWS Development

Which AWS service is specifically designed to be a registry for container images?

1 / 136

A developer wants to package a Lambda function as a container image to include a large machine learning model. Where should the container image be stored so that Lambda can access it?

Remember the order of precedence in IAM policy evaluation, specifically how ‘Deny’ is treated.

2 / 136

A developer is creating a policy for an IAM role. The policy must allow all actions on EC2 (`ec2:*`) but explicitly forbid terminating instances (`ec2:TerminateInstances`). How should the IAM policy be structured?

Think of a ‘development kit’ that lets you write infrastructure definitions as if you were writing a regular software application.

3 / 136

A developer needs to programmatically create, update, and delete AWS infrastructure using a familiar programming language like Python or TypeScript instead of writing YAML/JSON templates. Which AWS Infrastructure as Code (IaC) tool should be used?

Consider the initialization phase of a serverless function and how to keep instances ‘warm’.

4 / 136

A Lambda function is experiencing high latency during its first invocation after a period of inactivity. Subsequent invocations are much faster. What is this phenomenon called, and what is a common strategy to mitigate it for latency-sensitive applications?

Consider the size limits for different Lambda deployment methods.

5 / 136

A developer needs to package a Lambda function and its dependencies. The total size of the deployment package is over 50 MB, but less than 250 MB. How should the developer deploy this function?

Look for a service designed to provide identity solutions for your customer-facing applications.

6 / 136

A web application requires user sign-up, sign-in, and management of user profiles. The developer wants to offload this functionality to a managed service that also supports federation with social identity providers like Google and Facebook. Which AWS service should be used?

Which launch type provides a ‘serverless’ experience for running containers?

7 / 136

When deploying a containerized application to Amazon ECS, the developer wants AWS to manage the underlying EC2 instances, including patching and scaling. The developer only wants to define the task (container definitions, CPU, memory). What ECS launch type should be used?

This strategy is named after the ‘canary in a coal mine’ analogy, used to detect problems early.

8 / 136

A developer needs to deploy a new version of a Lambda function with minimal risk. The strategy should involve directing a small percentage of production traffic (e.g., 10%) to the new version first. If it performs well, traffic can be gradually increased. What deployment strategy does this describe?

Look for a Platform as a Service (PaaS) offering that simplifies web application deployment.

9 / 136

A developer needs to deploy a Dockerized web application to AWS. The service should automatically handle load balancing, auto scaling, and application health monitoring with minimal configuration. The developer wants a simple, PaaS-like experience. Which service is the best fit?

Consider CloudFormation’s default behavior for maintaining stack integrity when an operation goes wrong.

10 / 136

A CloudFormation stack update fails. By default, what is the state of the stack after the failure?

Think about what information the server needs to hold (or not hold) between user interactions.

11 / 136

Which of the following is a key characteristic of a ‘stateless’ application?

Think about how to simulate the behavior of an external service within your local test environment.

12 / 136

A developer is writing unit tests for a Lambda function that interacts with S3. To avoid making actual API calls to S3 during the tests, what is a common practice?

Consider the hierarchy of IAM policy evaluation. Which effect is final?

13 / 136

What does an explicit `Deny` in an IAM policy statement do?

Consider how DynamoDB uses the partition key to distribute data and workload across its underlying storage.

14 / 136

When configuring a DynamoDB table, a developer chooses a partition key with low cardinality (e.g., a ‘status’ field with only three possible values: ‘pending’, ‘complete’, ‘failed’). What is the likely performance consequence of this design?

Consider the order of operations in a DynamoDB query: when is the filter applied relative to the data being read from storage?

15 / 136

An application is reading data from a DynamoDB global secondary index (GSI). The query is using a filter expression, but the developer notices that this is consuming a large number of read capacity units (RCUs), even for queries that return few items. What is the reason for this high RCU consumption?

Think about the AWS mechanism for granting temporary, secure permissions to services without using long-term credentials.

16 / 136

A developer is building a serverless application where a Lambda function needs to read data from a DynamoDB table. To adhere to security best practices, how should the Lambda function be configured to access the DynamoDB table?

A template must define something to be created. Which section serves this fundamental purpose?

17 / 136

Which section of an AWS CloudFormation template is mandatory?

Consider the initialization phase of a serverless function and how to keep instances ‘warm’.

18 / 136

A Lambda function is experiencing high latency during its first invocation after a period of inactivity. Subsequent invocations are much faster. What is this phenomenon called, and what is a common strategy to mitigate it for latency-sensitive applications?

Look for a framework that acts as a transform on top of CloudFormation to simplify serverless definitions.

19 / 136

A developer wants to model and provision a serverless application consisting of Lambda functions, an API Gateway, and a DynamoDB table using infrastructure as code. They prefer a simplified, declarative syntax focused on serverless resources. Which AWS service or framework is most appropriate?

This strategy is named after the ‘canary in a coal mine’ analogy, used to detect problems early.

20 / 136

A developer needs to deploy a new version of a Lambda function with minimal risk. The strategy should involve directing a small percentage of production traffic (e.g., 10%) to the new version first. If it performs well, traffic can be gradually increased. What deployment strategy does this describe?

Think about how to scale a database horizontally for read operations.

21 / 136

To improve the read performance of a high-traffic, read-heavy RDS for PostgreSQL database, what is the MOST effective strategy?

Consider API Gateway’s ability to act as a proxy directly to the APIs of other AWS services.

22 / 136

A developer needs to create a REST API endpoint that returns a list of items from a DynamoDB table. The integration should be as fast as possible, without invoking a Lambda function for this simple read operation. How can this be achieved in API Gateway?

Think about the configuration files the AWS CLI uses to store credentials and settings.

23 / 136

A developer is using the AWS CLI and needs to work with multiple AWS accounts. What is the recommended way to configure the CLI to easily switch between accounts without repeatedly entering credentials?

Which template section acts like a dictionary or a lookup table?

24 / 136

A developer is creating a CloudFormation template and needs to set the EC2 instance type based on the environment (e.g., ‘t2.micro’ for dev, ‘m5.large’ for prod) that is specified as an input parameter. Which section of the template should be used to define this mapping?

Think about the AWS mechanism for granting temporary, secure permissions to services without using long-term credentials.

25 / 136

A developer is building a serverless application where a Lambda function needs to read data from a DynamoDB table. To adhere to security best practices, how should the Lambda function be configured to access the DynamoDB table?

Consider a concurrency control pattern that checks if the data has changed since it was read.

26 / 136

A developer needs to ensure that write operations to a DynamoDB table do not overwrite updates made by another process. For example, if two users try to update an item’s quantity at the same time, the final result should reflect both changes correctly. What is the recommended strategy for this?

The word ‘guided’ suggests an interactive or step-by-step process.

27 / 136

What is the purpose of the `sam deploy –guided` command in the AWS SAM CLI?

Think about the configuration files the AWS CLI uses to store credentials and settings.

28 / 136

A developer is using the AWS CLI and needs to work with multiple AWS accounts. What is the recommended way to configure the CLI to easily switch between accounts without repeatedly entering credentials?

Which service uses ‘topics’ and ‘subscriptions’ as its core concepts?

29 / 136

An application needs to publish messages to a large number of subscribers. Some subscribers are SQS queues, some are Lambda functions, and some are external HTTP endpoints. The application should not need to know the details of each subscriber. Which service facilitates this pub/sub messaging pattern?

A 403 error almost always relates to permissions. What permissions are needed for a public website?

30 / 136

An S3 bucket is configured to host a static website. When users try to access the website using the S3 website endpoint URL, they receive a 403 Forbidden error. The objects in the bucket are not publicly accessible. What is the most likely cause and solution?

A template must define something to be created. Which section serves this fundamental purpose?

31 / 136

Which section of an AWS CloudFormation template is mandatory?

Consider how DynamoDB uses the partition key to distribute data and workload across its underlying storage.

32 / 136

When configuring a DynamoDB table, a developer chooses a partition key with low cardinality (e.g., a ‘status’ field with only three possible values: ‘pending’, ‘complete’, ‘failed’). What is the likely performance consequence of this design?

Look for a service specifically designed for managing the lifecycle of sensitive information like passwords and API keys.

33 / 136

A developer needs to store sensitive database credentials that an application on an EC2 instance will use. The credentials must be rotated automatically every 30 days. Which AWS service is best suited for this requirement?

Which service is designed for ‘object storage’ and is effectively unlimited in scale?

34 / 136

An application needs to store and retrieve large objects (e.g., videos and images) up to several gigabytes in size. The objects must be highly durable and available. Which storage service is the most appropriate choice?

Look for an encryption option in the settings of the CloudWatch Logs resource itself.

35 / 136

A Lambda function processes sensitive data and must write its logs to CloudWatch Logs. How can a developer ensure that the log data is protected at rest in CloudWatch Logs?

Consider a concurrency control pattern that checks if the data has changed since it was read.

36 / 136

A developer needs to ensure that write operations to a DynamoDB table do not overwrite updates made by another process. For example, if two users try to update an item’s quantity at the same time, the final result should reflect both changes correctly. What is the recommended strategy for this?

Think about the part of the URL that identifies the specific website or service being requested.

37 / 136

A developer needs to configure an Application Load Balancer (ALB) to route traffic to different target groups based on the hostname in the request (e.g., `api.example.com` goes to one group, `www.example.com` goes to another). What feature of the ALB listener should be used?

Consider the order of operations in a DynamoDB query: when is the filter applied relative to the data being read from storage?

38 / 136

An application is reading data from a DynamoDB global secondary index (GSI). The query is using a filter expression, but the developer notices that this is consuming a large number of read capacity units (RCUs), even for queries that return few items. What is the reason for this high RCU consumption?

Consider the authentication mechanisms provided by IAM for services that integrate with standard protocols like Git.

39 / 136

A developer is using AWS CodeCommit as a source repository. Which of the following is a valid method for authenticating Git commands from a local development machine?

Think about how the server can identify and disregard duplicate requests from a client.

40 / 136

A developer wants to ensure that an API endpoint is idempotent, meaning that making the same POST request multiple times has the same effect as making it once. What is a common technique to implement idempotency in an API design?

Which AWS service is specifically designed to be a registry for container images?

41 / 136

A developer wants to package a Lambda function as a container image to include a large machine learning model. Where should the container image be stored so that Lambda can access it?

Consider how a software application programmatically interacts with external services.

42 / 136

What is the function of the AWS SDK in application development?

The word ‘guided’ suggests an interactive or step-by-step process.

43 / 136

What is the purpose of the `sam deploy –guided` command in the AWS SAM CLI?

Consider the size limits for different Lambda deployment methods.

44 / 136

A developer needs to package a Lambda function and its dependencies. The total size of the deployment package is over 50 MB, but less than 250 MB. How should the developer deploy this function?

Think about the part of the URL that identifies the specific website or service being requested.

45 / 136

A developer needs to configure an Application Load Balancer (ALB) to route traffic to different target groups based on the hostname in the request (e.g., `api.example.com` goes to one group, `www.example.com` goes to another). What feature of the ALB listener should be used?

Which service uses ‘topics’ and ‘subscriptions’ as its core concepts?

46 / 136

An application needs to publish messages to a large number of subscribers. Some subscribers are SQS queues, some are Lambda functions, and some are external HTTP endpoints. The application should not need to know the details of each subscriber. Which service facilitates this pub/sub messaging pattern?

Look for a service that allows you to define a workflow as a ‘state machine’.

47 / 136

An application is being refactored from a monolith to a microservices architecture. The developer needs a service to orchestrate a complex, multi-step workflow that involves several Lambda functions, some of which may run for a long time. The workflow requires error handling, retries, and parallel execution branches. Which AWS service is best suited for this?

Look for the STS operation that explicitly mentions the required federation protocol.

48 / 136

A developer needs to provide an application running on-premises with temporary, limited-privilege access to an S3 bucket. The company uses an identity provider that supports SAML 2.0. Which AWS STS API call should be used to get temporary AWS credentials?

A 403 error almost always relates to permissions. What permissions are needed for a public website?

49 / 136

An S3 bucket is configured to host a static website. When users try to access the website using the S3 website endpoint URL, they receive a 403 Forbidden error. The objects in the bucket are not publicly accessible. What is the most likely cause and solution?

Check the available action types within a CodePipeline stage for a feature that pauses execution.

50 / 136

A team is using AWS CodePipeline to automate their release process. They need to add a stage where a manager must manually approve the deployment before it proceeds to the production environment. How can this be achieved in CodePipeline?

Look for a feature within the S3 service settings for sending notifications about bucket events.

51 / 136

A Lambda function needs to be triggered whenever a new object is created in a specific S3 bucket. How should this be configured?

Think about how a single broadcast message can be delivered to multiple independent listeners.

52 / 136

An application is designed using an event-driven architecture. A single event from an SNS topic needs to be processed independently and in parallel by multiple downstream services (SQS queues, Lambda functions, etc.). Which architectural pattern should be implemented?

Consider the endpoint type that requires a VPC endpoint for access.

53 / 136

An API Gateway REST API must be accessible only from within a specific VPC. No traffic from the public internet should be able to reach the API. What type of API endpoint should be configured?

Consider the authentication mechanisms provided by IAM for services that integrate with standard protocols like Git.

54 / 136

A developer is using AWS CodeCommit as a source repository. Which of the following is a valid method for authenticating Git commands from a local development machine?

Think about the mechanism Lambda provides for sharing code and dependencies across multiple functions.

55 / 136

A Lambda function written in Python needs to use an external library that is not included in the AWS SDK. How should this dependency be included in the Lambda deployment package?

Consider how permissions can be dynamically managed for running EC2 instances without service interruption.

56 / 136

A developer needs to give an EC2 instance permission to call the S3 `GetObject` API. The EC2 instance is already running. What is the most secure and efficient way to grant these permissions?

Consider the unit of parallelism in a Kinesis Data Stream.

57 / 136

An application writes data to a Kinesis Data Stream. A Lambda function is configured to process records from this stream. Under heavy load, the Lambda function is getting throttled and cannot keep up with the incoming data. What is the most direct way to increase the processing capacity of the Kinesis-Lambda integration?

Think of this file as the ‘specification’ for the ‘build’ process.

58 / 136

What is the primary purpose of a `buildspec.yml` file in an AWS CodeBuild project?

Follow the principle of using IAM roles to grant permissions to AWS services.

59 / 136

During a CI/CD pipeline run with CodeBuild, the build process needs access to a password stored in AWS Secrets Manager. What is the recommended way to provide this access?

The term ‘stateless’ implies that the compute layer itself does not hold state. Where must the state go instead?

60 / 136

A developer is building a stateless REST API using API Gateway and Lambda. Where should the application’s session state (e.g., user login status, shopping cart contents) be stored?

Look for a service that allows you to define a workflow as a ‘state machine’.

61 / 136

An application is being refactored from a monolith to a microservices architecture. The developer needs a service to orchestrate a complex, multi-step workflow that involves several Lambda functions, some of which may run for a long time. The workflow requires error handling, retries, and parallel execution branches. Which AWS service is best suited for this?

Consider the CloudWatch feature that lets you perform calculations on existing metrics.

62 / 136

A developer needs to configure a CloudWatch alarm that triggers when a Lambda function’s error rate exceeds 5% over a 10-minute period. However, the standard `Errors` and `Invocations` metrics are not sufficient to create this specific alarm directly. What feature of CloudWatch can be used to create the required alarm?

The term ‘stateless’ implies that the compute layer itself does not hold state. Where must the state go instead?

63 / 136

A developer is building a stateless REST API using API Gateway and Lambda. Where should the application’s session state (e.g., user login status, shopping cart contents) be stored?

Consider the default safety mechanism of a deployment service when an error is encountered.

64 / 136

A developer is using AWS CodeDeploy to deploy an application to a fleet of EC2 instances. The deployment fails on a few instances. By default, what will CodeDeploy do?

Think of a service that acts as a central ‘bus’ for events from many different sources.

65 / 136

What is a primary use case for Amazon EventBridge?

Look for a service designed to provide identity solutions for your customer-facing applications.

66 / 136

A web application requires user sign-up, sign-in, and management of user profiles. The developer wants to offload this functionality to a managed service that also supports federation with social identity providers like Google and Facebook. Which AWS service should be used?

How can you break down the timing information within a single trace segment?

67 / 136

An X-Ray service map shows that a downstream microservice is a significant bottleneck, with high latency. The developer wants to capture more detailed timing information about the specific database queries being made within that service. What should be added to the service’s code?

Which service is dedicated to managing certificates for AWS endpoints?

68 / 136

A developer needs to configure a custom domain name for an API deployed with API Gateway. The API also needs to be secured with an SSL/TLS certificate. Which service should be used to provide and manage the certificate?

Look for a Platform as a Service (PaaS) offering that simplifies web application deployment.

69 / 136

A developer needs to deploy a Dockerized web application to AWS. The service should automatically handle load balancing, auto scaling, and application health monitoring with minimal configuration. The developer wants a simple, PaaS-like experience. Which service is the best fit?

Look for a service specifically designed for managing the lifecycle of sensitive information like passwords and API keys.

70 / 136

A developer needs to store sensitive database credentials that an application on an EC2 instance will use. The credentials must be rotated automatically every 30 days. Which AWS service is best suited for this requirement?

Think about the intermediate artifact that the CDK generates before deployment.

71 / 136

A developer is using the AWS CDK to define their infrastructure. What is the purpose of the `cdk synth` command?

Look for a standard AWS CLI parameter that uses a specific query language for JSON.

72 / 136

A developer needs to use the AWS CLI to get details about a specific EC2 instance, but only wants to see the `InstanceId`, `InstanceType`, and `State`. How can the output be filtered on the client side to show only these fields?

Think about the mechanism Lambda provides for sharing code and dependencies across multiple functions.

73 / 136

A Lambda function written in Python needs to use an external library that is not included in the AWS SDK. How should this dependency be included in the Lambda deployment package?

Think of a deployment strategy that involves two identical, parallel production environments.

74 / 136

An application deployed using AWS Elastic Beanstalk needs to be updated. The developer wants to ensure zero downtime during the update and wants to have a new, fully functional environment running alongside the old one for a period of time to allow for testing before switching traffic. Which Elastic Beanstalk deployment method is most suitable?

Which mechanism is designed to isolate messages that repeatedly fail processing?

75 / 136

A Lambda function is configured to process messages from an SQS queue. Some messages contain invalid data that causes the function to fail and throw an exception. These ‘poison pill’ messages are repeatedly retried, blocking other valid messages. What should be configured to handle these failed messages?

Consider the structure of a REST API, which involves resources and the actions (methods) you can perform on them.

76 / 136

A REST API built with API Gateway and Lambda needs to handle different business logic based on the HTTP method (GET, POST, DELETE) for the same resource path (e.g., `/items`). How should this be configured in API Gateway?

Consider the lifecycle of a message in an SQS queue and how consumers interact with it.

77 / 136

An application running on EC2 instances processes messages from an SQS standard queue. During periods of high load, some messages are processed more than once, causing data duplication. What is the most effective way to prevent this issue while maintaining high throughput?

Think of a service that is part of a broader management suite and designed for storing ‘parameters’.

78 / 136

A developer needs to store application configuration data, including database connection strings and feature flags, in a centralized location. Some of this data is sensitive. The application should be able to retrieve this configuration dynamically. Which service provides a simple key-value store suitable for both plain-text and encrypted configuration data?

Think about how to simulate the behavior of an external service within your local test environment.

79 / 136

A developer is writing unit tests for a Lambda function that interacts with S3. To avoid making actual API calls to S3 during the tests, what is a common practice?

Compare the feature sets of the two main open-source caching engines supported by ElastiCache.

80 / 136

An application needs to cache frequently accessed data from a database to reduce latency and database load. The caching solution must support advanced data structures like sorted sets and lists, and offer replication for high availability. Which ElastiCache engine should be chosen?

Think of this file as the ‘specification’ for the ‘build’ process.

81 / 136

What is the primary purpose of a `buildspec.yml` file in an AWS CodeBuild project?

Look for the service in the AWS ‘Code’ suite that is analogous to GitHub or Bitbucket.

82 / 136

Which AWS service is a fully managed source control service that hosts secure Git-based repositories?

Compare the feature sets of the two main open-source caching engines supported by ElastiCache.

83 / 136

An application needs to cache frequently accessed data from a database to reduce latency and database load. The caching solution must support advanced data structures like sorted sets and lists, and offer replication for high availability. Which ElastiCache engine should be chosen?

Remember the order of precedence in IAM policy evaluation, specifically how ‘Deny’ is treated.

84 / 136

A developer is creating a policy for an IAM role. The policy must allow all actions on EC2 (`ec2:*`) but explicitly forbid terminating instances (`ec2:TerminateInstances`). How should the IAM policy be structured?

What kind of token does a modern identity provider like Cognito issue upon successful authentication?

85 / 136

An API Gateway endpoint is protected by a Cognito User Pool authorizer. What must the client include in the request to be authenticated successfully?

Which template section acts like a dictionary or a lookup table?

86 / 136

A developer is creating a CloudFormation template and needs to set the EC2 instance type based on the environment (e.g., ‘t2.micro’ for dev, ‘m5.large’ for prod) that is specified as an input parameter. Which section of the template should be used to define this mapping?

Consider the endpoint type that requires a VPC endpoint for access.

87 / 136

An API Gateway REST API must be accessible only from within a specific VPC. No traffic from the public internet should be able to reach the API. What type of API endpoint should be configured?

Look for a feature within the S3 service settings for sending notifications about bucket events.

88 / 136

A Lambda function needs to be triggered whenever a new object is created in a specific S3 bucket. How should this be configured?

Look for the STS operation that explicitly mentions the required federation protocol.

89 / 136

A developer needs to provide an application running on-premises with temporary, limited-privilege access to an S3 bucket. The company uses an identity provider that supports SAML 2.0. Which AWS STS API call should be used to get temporary AWS credentials?

Which service is dedicated to managing certificates for AWS endpoints?

90 / 136

A developer needs to configure a custom domain name for an API deployed with API Gateway. The API also needs to be secured with an SSL/TLS certificate. Which service should be used to provide and manage the certificate?

Look for a feature within the version control service itself that manages how changes are merged into protected branches.

91 / 136

A team uses a Git repository in AWS CodeCommit. They want to ensure that all code pushed to the `main` branch has been reviewed and approved by another team member. How can this be enforced?

Which integration type passes the entire raw request to Lambda and expects a complete HTTP response structure back from Lambda?

92 / 136

An API is built using API Gateway with a Lambda integration. The API should return a custom HTTP status code (e.g., 201 Created) and custom headers. What type of integration must be used?

Which service provides a ‘service map’ to visualize the components of your application?

93 / 136

To trace and analyze user requests as they travel through a distributed system composed of API Gateway, Lambda, and DynamoDB, a developer needs to visualize the entire request path, identify performance bottlenecks, and debug errors. Which AWS service should be used?

Consider the structure of a REST API, which involves resources and the actions (methods) you can perform on them.

94 / 136

A REST API built with API Gateway and Lambda needs to handle different business logic based on the HTTP method (GET, POST, DELETE) for the same resource path (e.g., `/items`). How should this be configured in API Gateway?

Consider how permissions can be dynamically managed for running EC2 instances without service interruption.

95 / 136

A developer needs to give an EC2 instance permission to call the S3 `GetObject` API. The EC2 instance is already running. What is the most secure and efficient way to grant these permissions?

Consider CloudFormation’s default behavior for maintaining stack integrity when an operation goes wrong.

96 / 136

A CloudFormation stack update fails. By default, what is the state of the stack after the failure?

Look for a feature within the version control service itself that manages how changes are merged into protected branches.

97 / 136

A team uses a Git repository in AWS CodeCommit. They want to ensure that all code pushed to the `main` branch has been reviewed and approved by another team member. How can this be enforced?

Consider the CloudWatch feature that lets you perform calculations on existing metrics.

98 / 136

A developer needs to configure a CloudWatch alarm that triggers when a Lambda function’s error rate exceeds 5% over a 10-minute period. However, the standard `Errors` and `Invocations` metrics are not sufficient to create this specific alarm directly. What feature of CloudWatch can be used to create the required alarm?

Look for an encryption option in the settings of the CloudWatch Logs resource itself.

99 / 136

A Lambda function processes sensitive data and must write its logs to CloudWatch Logs. How can a developer ensure that the log data is protected at rest in CloudWatch Logs?

Which capacity mode follows a ‘pay-for-what-you-use’ model without needing to specify throughput in advance?

100 / 136

To optimize DynamoDB costs for a table with unpredictable read/write traffic, which capacity mode should be used?

Check the available action types within a CodePipeline stage for a feature that pauses execution.

101 / 136

A team is using AWS CodePipeline to automate their release process. They need to add a stage where a manager must manually approve the deployment before it proceeds to the production environment. How can this be achieved in CodePipeline?

Think about how the server can identify and disregard duplicate requests from a client.

102 / 136

A developer wants to ensure that an API endpoint is idempotent, meaning that making the same POST request multiple times has the same effect as making it once. What is a common technique to implement idempotency in an API design?

Consider API Gateway’s ability to act as a proxy directly to the APIs of other AWS services.

103 / 136

A developer needs to create a REST API endpoint that returns a list of items from a DynamoDB table. The integration should be as fast as possible, without invoking a Lambda function for this simple read operation. How can this be achieved in API Gateway?

Which service is AWS’s flagship for ingesting and processing ‘streams’ of data?

104 / 136

An application needs to process a real-time stream of data, such as clickstream data from a website. The data must be processed in order for each user, and multiple consumers must be able to read the same stream concurrently. Which service is designed for this use case?

Consider DynamoDB’s native feature for making write operations dependent on the state of an item.

105 / 136

A developer is writing a Python application using the Boto3 SDK to interact with DynamoDB. The application needs to write an item to a table but only if an item with the same primary key does not already exist. How can this be achieved efficiently?

Look for a framework that acts as a transform on top of CloudFormation to simplify serverless definitions.

106 / 136

A developer wants to model and provision a serverless application consisting of Lambda functions, an API Gateway, and a DynamoDB table using infrastructure as code. They prefer a simplified, declarative syntax focused on serverless resources. Which AWS service or framework is most appropriate?

Which service is designed for ‘object storage’ and is effectively unlimited in scale?

107 / 136

An application needs to store and retrieve large objects (e.g., videos and images) up to several gigabytes in size. The objects must be highly durable and available. Which storage service is the most appropriate choice?

Which launch type provides a ‘serverless’ experience for running containers?

108 / 136

When deploying a containerized application to Amazon ECS, the developer wants AWS to manage the underlying EC2 instances, including patching and scaling. The developer only wants to define the task (container definitions, CPU, memory). What ECS launch type should be used?

Consider the default safety mechanism of a deployment service when an error is encountered.

109 / 136

A developer is using AWS CodeDeploy to deploy an application to a fleet of EC2 instances. The deployment fails on a few instances. By default, what will CodeDeploy do?

Consider how a software application programmatically interacts with external services.

110 / 136

What is the function of the AWS SDK in application development?

What kind of token does a modern identity provider like Cognito issue upon successful authentication?

111 / 136

An API Gateway endpoint is protected by a Cognito User Pool authorizer. What must the client include in the request to be authenticated successfully?

Consider features within API Gateway itself for managing the structure of requests and responses.

112 / 136

An application consists of an API Gateway that invokes a Lambda function. The developer wants to validate the body of incoming POST requests against a JSON Schema before the request is sent to the Lambda function. How can this be achieved?

Think about how to scale a database horizontally for read operations.

113 / 136

To improve the read performance of a high-traffic, read-heavy RDS for PostgreSQL database, what is the MOST effective strategy?

Consider the hierarchy of IAM policy evaluation. Which effect is final?

114 / 136

What does an explicit `Deny` in an IAM policy statement do?

Consider the unit of parallelism in a Kinesis Data Stream.

115 / 136

An application writes data to a Kinesis Data Stream. A Lambda function is configured to process records from this stream. Under heavy load, the Lambda function is getting throttled and cannot keep up with the incoming data. What is the most direct way to increase the processing capacity of the Kinesis-Lambda integration?

Look for a standard AWS CLI parameter that uses a specific query language for JSON.

116 / 136

A developer needs to use the AWS CLI to get details about a specific EC2 instance, but only wants to see the `InstanceId`, `InstanceType`, and `State`. How can the output be filtered on the client side to show only these fields?

Think about the AWS feature specifically designed to separate dependencies from function code for reusability.

117 / 136

A developer wants to reduce the size of a Lambda deployment package. The function uses several large, common libraries that are also used by other functions. What is the most efficient way to manage these shared libraries?

Think of a service that is part of a broader management suite and designed for storing ‘parameters’.

118 / 136

A developer needs to store application configuration data, including database connection strings and feature flags, in a centralized location. Some of this data is sensitive. The application should be able to retrieve this configuration dynamically. Which service provides a simple key-value store suitable for both plain-text and encrypted configuration data?

Think about how a single broadcast message can be delivered to multiple independent listeners.

119 / 136

An application is designed using an event-driven architecture. A single event from an SNS topic needs to be processed independently and in parallel by multiple downstream services (SQS queues, Lambda functions, etc.). Which architectural pattern should be implemented?

How can you break down the timing information within a single trace segment?

120 / 136

An X-Ray service map shows that a downstream microservice is a significant bottleneck, with high latency. The developer wants to capture more detailed timing information about the specific database queries being made within that service. What should be added to the service’s code?

Consider features within API Gateway itself for managing the structure of requests and responses.

121 / 136

An application consists of an API Gateway that invokes a Lambda function. The developer wants to validate the body of incoming POST requests against a JSON Schema before the request is sent to the Lambda function. How can this be achieved?

Which capacity mode follows a ‘pay-for-what-you-use’ model without needing to specify throughput in advance?

122 / 136

To optimize DynamoDB costs for a table with unpredictable read/write traffic, which capacity mode should be used?

Think of a deployment strategy that involves two identical, parallel production environments.

123 / 136

An application deployed using AWS Elastic Beanstalk needs to be updated. The developer wants to ensure zero downtime during the update and wants to have a new, fully functional environment running alongside the old one for a period of time to allow for testing before switching traffic. Which Elastic Beanstalk deployment method is most suitable?

Think about the AWS feature specifically designed to separate dependencies from function code for reusability.

124 / 136

A developer wants to reduce the size of a Lambda deployment package. The function uses several large, common libraries that are also used by other functions. What is the most efficient way to manage these shared libraries?

Which integration type passes the entire raw request to Lambda and expects a complete HTTP response structure back from Lambda?

125 / 136

An API is built using API Gateway with a Lambda integration. The API should return a custom HTTP status code (e.g., 201 Created) and custom headers. What type of integration must be used?

Which mechanism is designed to isolate messages that repeatedly fail processing?

126 / 136

A Lambda function is configured to process messages from an SQS queue. Some messages contain invalid data that causes the function to fail and throw an exception. These ‘poison pill’ messages are repeatedly retried, blocking other valid messages. What should be configured to handle these failed messages?

Which service is AWS’s flagship for ingesting and processing ‘streams’ of data?

127 / 136

An application needs to process a real-time stream of data, such as clickstream data from a website. The data must be processed in order for each user, and multiple consumers must be able to read the same stream concurrently. Which service is designed for this use case?

Follow the principle of using IAM roles to grant permissions to AWS services.

128 / 136

During a CI/CD pipeline run with CodeBuild, the build process needs access to a password stored in AWS Secrets Manager. What is the recommended way to provide this access?

Think of a ‘development kit’ that lets you write infrastructure definitions as if you were writing a regular software application.

129 / 136

A developer needs to programmatically create, update, and delete AWS infrastructure using a familiar programming language like Python or TypeScript instead of writing YAML/JSON templates. Which AWS Infrastructure as Code (IaC) tool should be used?

Think about what information the server needs to hold (or not hold) between user interactions.

130 / 136

Which of the following is a key characteristic of a ‘stateless’ application?

Consider DynamoDB’s native feature for making write operations dependent on the state of an item.

131 / 136

A developer is writing a Python application using the Boto3 SDK to interact with DynamoDB. The application needs to write an item to a table but only if an item with the same primary key does not already exist. How can this be achieved efficiently?

Look for the service in the AWS ‘Code’ suite that is analogous to GitHub or Bitbucket.

132 / 136

Which AWS service is a fully managed source control service that hosts secure Git-based repositories?

Which service provides a ‘service map’ to visualize the components of your application?

133 / 136

To trace and analyze user requests as they travel through a distributed system composed of API Gateway, Lambda, and DynamoDB, a developer needs to visualize the entire request path, identify performance bottlenecks, and debug errors. Which AWS service should be used?

Think about the intermediate artifact that the CDK generates before deployment.

134 / 136

A developer is using the AWS CDK to define their infrastructure. What is the purpose of the `cdk synth` command?

Consider the lifecycle of a message in an SQS queue and how consumers interact with it.

135 / 136

An application running on EC2 instances processes messages from an SQS standard queue. During periods of high load, some messages are processed more than once, causing data duplication. What is the most effective way to prevent this issue while maintaining high throughput?

Think of a service that acts as a central ‘bus’ for events from many different sources.

136 / 136

What is a primary use case for Amazon EventBridge?

Share your love
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.