AWS Certified Developer AssociateFree trialFree trial

By amazon
Aug, 2025

Verified

25Q per page

Question 1

A gaming website gives users the ability to trade game items with each other on the platform. The platform requires both users' records to be updated and persisted in one transaction. If any update fails, the transaction must roll back.
Which AWS solution can provide the transactional capability that is required for this feature?

  • A: Amazon DynamoDB with operations made with the Consistent Read parameter set to true
  • B: Amazon ElastiCache for Memcached with operations made within a transaction block
  • C: Amazon DynamoDB with reads and writes made by using Transact* operations
  • D: Amazon Aurora MySQL with operations made within a transaction block
  • E: Amazon Athena with operations made within a transaction block

Question 2

A company hosts a three-tier web application on AWS behind an Amazon CloudFront distribution. A developer wants a dashboard to monitor error rates and anomalies of the CloudFront distribution with the shortest possible refresh interval.
Which combination of slops should the developer take to meet these requirements? (Choose two.)

  • A: Activate real-time logs on the CloudFront distribution. Create a stream in Amazon Kinesis Data Streams.
  • B: Export the CloudFront logs to an Amazon S3 bucket. Detect anomalies and error rates with Amazon QuickSight.
  • C: Configure Amazon Kinesis Data Streams to deliver logs to Amazon OpenSearch Service (Amazon Elasticsearch Service). Create a dashboard in OpenSearch Dashboards (Kibana).
  • D: Create Amazon CloudWatch alarms based on expected values of selected CloudWatch metrics to detect anomalies and errors.
  • E: Design an Amazon CloudWatch dashboard of the selected CloudFront distribution metrics.

Question 3

A company has an online order website that uses Amazon DynamoDB to store item inventory. A sample of the inventory object is as follows:

Image 1

A developer needs to reduce all inventory prices by 100 as long as the resulting price would not be less than 500.
What should the developer do to make this change with the LEAST number of calls to DynamoDB?

  • A: Perform a DynamoDB Query operation with the Id. If the price is >= 600, perform an UpdateItem operation to update the price.
  • B: Perform a DynamoDB UpdateItem operation with a condition expression of "Price >= 600".
  • C: Perform a DynamoDB UpdateItem operation with a condition expression of "ProductCategory IN ({"S": "Sporting Goods"}) and Price 600".
  • D: Perform a DynamoDB UpdateItem operation with a condition expression of "MIN Price = 500".

Question 4

A company is using an AWS Lambda function to process records from an Amazon Kinesis data stream. The company recently observed slow processing of the records. A developer notices that the iterator age metric for the function is increasing and that the Lambda run duration is constantly above normal.
Which actions should the developer take to increase the processing speed? (Choose two.)

  • A: Increase the number of shards of the Kinesis data stream.
  • B: Decrease the timeout of the Lambda function.
  • C: Increase the memory that is allocated to the Lambda function.
  • D: Decrease the number of shards of the Kinesis data stream.
  • E: Increase the timeout of the Lambda function.

Question 5

A developer is making changes to a custom application that uses AWS Elastic Beanstalk.
Which solutions will update the Elastic Beanstalk environment with the new application version after the developer completes the changes? (Choose two.)

  • A: Package the application code into a .zip file. Use the AWS Management Console to upload the zip file and deploy the packaged application.
  • B: Package the application code into a .tar file. Use the AWS Management Console to create a new application version from the .tar file. Update the environment by using the AWS CLI.
  • C: Package the application code into a .tar file. Use the AWS Management Console to upload the .tar file and deploy the packaged application.
  • D: Package the application code into a .zip file. Use the AWS CLI to create a new application version from the .zip file and to update the environment.
  • E: Package the application code into a .zip file. Use the AWS Management Console to create a new application version from the .zip file. Rebuild the environment by using the AWS CLI.

Question 6

A company has an application where reading objects from Amazon S3 is based on the type of user. The user types are registered user and guest user. The company has 25,000 users and is growing. Information is pulled from an S3 bucket depending on the user type.
Which approaches are recommended to provide access to both user types? (Choose two.)

  • A: Provide a different access key and secret access key in the application code for registered users and guest users to provide read access to the objects.
  • B: Use S3 bucket policies to restrict read access to specific IAM users.
  • C: Use Amazon Cognito to provide access using authenticated and unauthenticated roles.
  • D: Create a new IAM user for each user and grant read access.
  • E: Use the AWS IAM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using the assumed role.

Question 7

A developer is writing an application to analyze the traffic to a fleet of Amazon EC2 instances. The EC2 instances run behind a public Application Load Balancer
(ALB). An HTTP server runs on each of the EC2 instances, logging all requests to a log file.
The developer wants to capture the client public IP addresses. The developer analyzes the log files and notices only the IP address of the ALB.
What must the developer do to capture the client public IP addresses in the log file?

  • A: Add a Host header to the HTTP server log configuration file.
  • B: Install the Amazon CloudWatch Logs agent on each EC2 instance. Configure the agent to write to the log file.
  • C: Install the AWS X-Ray daemon on each EC2 instance. Configure the daemon to write to the log file.
  • D: Add an X-Forwarded-For header to the HTTP server log configuration file.

Question 8

A developer is writing a new AWS Serverless Application Model (AWS SAM) template with a new AWS Lambda function. The Lambda function runs complex code. The developer wants to test the Lambda function with more CPU power.
What should the developer do to meet this requirement?

  • A: Increase the runtime engine version.
  • B: Increase the timeout.
  • C: Increase the number of Lambda layers.
  • D: Increase the memory.

Question 9

A developer uses a single AWS CloudFormation template to configure the test environment and the production environment for an application. The developer handles environment-specific requirements in the CloudFormation template.
The developer decides to update the Amazon EC2 Auto Scaling launch template with new Amazon Machine Images (AMIs) for each environment. The
CloudFormation update for the new AMIs is successful in the test environment, but the update fails in the production environment.
What are the possible causes of the CloudFormation update failure in the production environment? (Choose two.)

  • A: The new AMIs do not fulfill the specified conditions in the CloudFormation template.
  • B: The service quota for the number of EC2 vCPUs in the AWS Region has been exceeded.
  • C: The security group that is specified in the CloudFormation template does not exist.
  • D: CloudFormation does not recognize the template change as an update.
  • E: CloudFormation does not have sufficient IAM permissions to make the changes.

Question 10

A developer is creating a serverless web application and maintains different branches of code. The developer wants to avoid updating the Amazon API Gateway target endpoint each time a new code push is performed.
What solution would allow the developer to perform a code push efficiently, without the need to update the API Gateway?

  • A: Associate different AWS Lambda functions to an API Gateway target endpoint.
  • B: Create different stages in API Gateway. then associate API Gateway with AWS Lambda.
  • C: Create aliases and versions in AWS Lambda.
  • D: Tag the AWS Lambda functions with different names.

Question 11

A developer needs to deploy an application running on AWS Fargate using Amazon ECS. The application has environment variables that must be passed to a container for the application to initialize.
How should the environment variables be passed to the container?

  • A: Define an array that includes the environment variables under the environment parameter within the service definition.
  • B: Define an array that includes the environment variables under the environment parameter within the task definition.
  • C: Define an array that includes the environment variables under the entryPoint parameter within the task definition.
  • D: Define an array that includes the environment variables under the entryPoint parameter within the service definition.

Question 12

A developer must extend an existing application that is based on the AWS Serverless Application Model (AWS SAM). The developer has used the AWS SAM CLI to create the project. The project contains different AWS Lambda functions.
Which combination of commands must the developer use to redeploy the AWS SAM application? (Choose two.)

  • A: sam init
  • B: sam validate
  • C: sam build
  • D: sam deploy
  • E: sam publish

Question 13

A developer creates a customer managed key for multiple AWS users to encrypt data in Amazon S3. The developer configures Amazon Simple Notification
Service (Amazon SNS) to publish a message if key deletion is scheduled. The developer needs to preserve any SNS messages that cannot be delivered so that those messages can be reprocessed.
Which AWS service or feature should the developer use to meet this requirement?

  • A: Amazon Simple Email Service (Amazon SES)
  • B: AWS Lambda
  • C: Amazon Simple Queue Service (Amazon SQS)
  • D: Amazon CloudWatch alarm

Question 14

A developer manages an application that interacts with Amazon RDS. After observing slow performance with read queries, the developer implements Amazon
ElastiCache to update the cache immediately following the primary database update.
What will be the result of this approach to caching?

  • A: Caching will increase the load on the database instance because the cache is updated for every database update.
  • B: Caching will slow performance of the read queries because the cache is updated when the cache cannot find the requested data.
  • C: The cache will become large and expensive because the infrequently requested data is also written to the cache.
  • D: Overhead will be added to the initial response time because the cache is updated only after a cache miss.

Question 15

A developer has a stateful web server on-premises that is being migrated to AWS. The developer must have greater elasticity in the new design.
How should the developer re-factor the application to make it more elastic? (Choose two.)

  • A: Use pessimistic concurrency on Amazon DynamoDB.
  • B: Use Amazon CloudFront with an Auto Scaling group.
  • C: Use Amazon CloudFront with an AWS Web Application Firewall.
  • D: Store session state data in an Amazon DynamoDB table.
  • E: Use an ELB with an Auto Scaling group.

Question 16

A developer has a legacy application that is hosted on-premises. Other applications hosted on AWS depend on the on-premises application for proper functioning.
In case of any application errors, the developer wants to be able to use Amazon CloudWatch to monitor and troubleshoot all applications from one place.
How can the developer accomplish this?

  • A: Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.
  • B: Download the CloudWatch agent to the on-premises server. Configure the agent to use IAM user credentials with permissions for CloudWatch.
  • C: Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.
  • D: Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch.

Question 17

A developer is designing a serverless application with two AWS Lambda functions to process photos. One Lambda function stores objects in an Amazon S3 bucket and stores the associated metadata in an Amazon DynamoDB table. The other Lambda function fetches the objects from the S3 bucket by using the metadata from the DynamoDB table. Both Lambda functions use the same Python library to perform complex computations and are approaching the quota for the maximum size of zipped deployment packages.
What should the developer do to reduce the size of the Lambda deployment packages with the LEAST operational overhead?

  • A: Package each Python library in its own .zip file archive. Deploy each Lambda function with its own copy of the library.
  • B: Create a Lambda layer with the required Python library. Use the Lambda layer in both Lambda functions.
  • C: Combine the two Lambda functions into one Lambda function. Deploy the Lambda function as a single .zip file archive.
  • D: Download the Python library to an S3 bucket. Program the Lambda functions to reference the object URLs.

Question 18

A developer is adding a feature to a client-side application so that users can upload videos to an Amazon S3 bucket.
What is the MOST secure way to give the application the ability to write files to the S3 bucket?

  • A: Update the S3 bucket policy to allow public write access. Allow any user to upload videos by removing the need to handle user authentication within the client- side application.
  • B: Create a new IAM policy and a corresponding IAM user with permissions to write to the S3 bucket. Store the key and the secret for the user in the application code. Use the key to authenticate the video uploads.
  • C: Configure the API layer of the application to have a new endpoint that creates signed URLs that allow an object to be put into the S3 bucket. Generate a presigned URL through this API call in the client application. Upload the video by using the signed URL.
  • D: Generate a new IAM key and a corresponding secret by using the AWS account root user credentials. Store the key and the secret for the user in the application code. Use the key to authenticate the video uploads.

Question 19

A company is building an application for stock trading. The application needs sub-millisecond latency for processing trade requests. The company uses Amazon
DynamoDB to store all the trading data that is used to process each trading request.
A development team performs load testing on the application and finds that the data retrieval time is higher than expected. The development team needs a solution that reduces the data retrieval time with the least possible effort.
Which solution meets these requirements?

  • A: Add local secondary indexes (LSIs) for the trading data.
  • B: Store the trading data in Amazon S3, and use S3 Transfer Acceleration.
  • C: Add retries with exponential backoff for DynamoDB queries.
  • D: Use DynamoDB Accelerator (DAX) to cache the trading data.

Question 20

A developer needs to build and deploy a serverless application that has an API that mobile clients will use. The API will use Amazon DynamoDB and Amazon
OpenSearch Service (Amazon Elasticsearch Service) as data sources. Responses that are sent to the clients will contain aggregated data from both data sources.
The developer must minimize the number of API endpoints and must minimize the number of API calls that are required to retrieve the necessary data.
Which solution should the developer use to meet these requirements?

  • A: GraphQL API on AWS AppSync
  • B: REST API on Amazon API Gateway
  • C: GraphQL API on an Amazon EC2 instance
  • D: REST API on AWS Elastic Beanstalk

Question 21

A Lambda function processes data before sending it to a downstream service. Each piece of data is approximately 1MB in size. After a security audit, the function is now required to encrypt the data before sending it downstream.
Which API call is required to perform the encryption?

  • A: Pass the data to the KMS ReEncrypt API for encryption.
  • B: Use the KMS GenerateDataKey API to get an encryption key.
  • C: Use the KMS GenerateDataKeyWithoutPlainText API to get an encryption key.
  • D: Pass the data to KMS as part of the Encrypt API for encryption.

Question 22

A company has a web application that runs on Amazon EC2 instances with a custom Amazon Machine Image (AMI). The company uses AWS CloudFormation to provision the application. The application runs in the us-east-1 Region, and the company needs to deploy the application to the us-west-1 Region.
An attempt to create the AWS CloudFormation stack in us-west-1 fails. An error message states that the AMI ID does not exist. A developer must resolve this error with a solution that uses the least amount of operational overhead.
Which solution meets these requirements?

  • A: Change the AWS CloudFormation templates for us-east-1 and us-west-1 to use an AWS AMI. Relaunch the stack for both Regions.
  • B: Copy the custom AMI from us-east-1 to us-west-1. Update the AWS CloudFormation template for us-west-1 to refer to AMI ID for the copied AMI. Relaunch the stack.
  • C: Build the custom AMI in us-west-1. Create a new AWS CloudFormation template to launch the stack in us-west-1 with the new AMI ID.
  • D: Manually deploy the application outside AWS CloudFormation in us-west-1.

Question 23

A developer wants to run a PHP website with an NGINX proxy and package them as Docker containers in one environment. The developer wants a managed environment with automated provisioning and load balancing. The developer cannot change the configuration and must minimize operational overhead.
How should the developer build the website to meet these requirements?

  • A: Create a new application in AWS Elastic Beanstalk that is preconfigured for a multicontainer Docker environment. Upload the code, and deploy it to a web server environment.
  • B: Deploy the code on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer.
  • C: Construct an AWS CloudFormation template that launches Amazon EC2 instances. Install and configure the PHP code by using cfn helper scripts.
  • D: Upload the code for the PHP website into an Amazon S3 bucket. Host the website from the S3 bucket.

Question 24

A developer needs to deploy an application to AWS Elastic Beanstalk for a company. The application consists of a single Docker image. The company's automated continuous integration and continuous delivery (CI/CD) process builds the Docker image and pushes the image to a public Docker registry.
How should the developer deploy the application to Elastic Beanstalk?

  • A: Create a Dockerfile. Configure Elastic Beanstalk to build the application as a Docker image.
  • B: Create a docker-compose.yml file. Use the Elastic Beanstalk CLI to deploy the application.
  • C: Create a .zip file that contains the Docker image. Upload the .zip file to Elastic Beanstalk.
  • D: Create a Dockerfile. Run the Elastic Beanstalk CLI eb local run command in the same directory.

Question 25

A company has a website that displays a daily newsletter. When a user visits the website, an AWS Lambda function processes the browser's request and queries the company's on-premises database to obtain the current newsletter. The newsletters are stored in English. The Lambda function uses the Amazon Translate
TranslateText API operation to translate the newsletters, and the translation is displayed to the user.
Due to an increase in popularity, the website's response time has slowed. The database is overloaded. The company cannot change the database and needs a solution that improves the response time of the Lambda function.
Which solution meets these requirements?

  • A: Change to asynchronous Lambda function invocation.
  • B: Cache the translated newsletters in the Lambda /tmp directory.
  • C: Enable TranslateText API caching.
  • D: Change the Lambda function to use parallel processing.
Page 1 of 18 • Questions 1-25 of 443

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!