option
Cuestiones
ayuda
daypo
buscar.php

AWS Certified Developer Associate 5.1

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
AWS Certified Developer Associate 5.1

Descripción:
AWS Certified Developer Associate 5.1

Fecha de Creación: 2020/05/19

Categoría: Otros

Número Preguntas: 20

Valoración:(1)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which of the following are valid arguments for an SNS Publish request? (Choose three.). TopicAm. Subject. Destination. Format. Message. Language.

How can software determine the public and private IP addresses of the Amazon EC2 instance that it is running on?. Query the appropriate Amazon CloudWatch metric. Use ipconfig or ifconfig command. Query the local instance userdata. Query the local instance metadata.

EC2 instances are launched from Amazon Machine images (AMIs). A given public AMI can: be used to launch EC2 Instances in any AWS region. only be used to launch EC2 instances in the same country as the AMI is stored. only be used to launch EC2 instances in the same AWS region as the AMI is stored. only be used to launch EC2 instances in the same AWS availability zone as the AMI is stored.

Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?. DescnbeInstances. DescribeAMls. DescribeImages. GetAMls. You cannot retrieve a list of AMIs as there are over 10,000 AMIs.

In AWS, which security aspects are the customer’s responsibility? (Choose four.). Life-cycle management of IAM credentials. Decommissioning storage devices. Security Group and ACL (Access Control List) settings. Encryption of EBS (Elastic Block Storage) volumes. Controlling physical access to compute resources. Patch management on the EC2 instance’s operating system.

When using a large Scan operation in DynamoDB, what technique can be used to minimize the impact of a scan on a table's provisioned throughput?. Set a smaller page size for the scan. Use parallel scans. Define a range index on the table. Prewarm the table by updating all items.

Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3- us-west1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser. What should Company D do to prevent the web fonts from being blocked by the browser?. Enable versioning on the cdfonts bucket for each web font. Create a policy on the cdfonts bucket to enable access to everyone. Add the Content-MD5 header to the request for webfonts in the cdfonts bucket from the website. Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration.

Which of the following platforms are supported by Elastic Beanstalk? (Choose two.). Apache Tomcat. .NET. IBM Websphere. Oracle JBoss. Jetty.

Which code snippet below returns the URL of a load balanced web site created in CloudFormation with an AWS::ElasticLoadBalancing::LoadBalancer resource name "ElasticLoad Balancer"?. "Fn::Join" : ["". [ "http://", {"Fn::GetAtr" : [ "ElasticLoadBalancer","DNSName"]}]]. "Fn::Join" : ["". [ "http://", {"Fn::GetAtr" : [ "ElasticLoadBalancer","Url"]}]]. "Fn::Join" : ["". [ "http://", {"Ref" : "ElasticLoadBalancerUrl"}]]. "Fn::Join" : [".", [ "http://", {"Ref" : "ElasticLoadBalancerDNSName"}]].

Which features can be used to restrict access to data in S3? (Choose two.). Use S3 Virtual Hosting. Set an S3 Bucket policy. Enable IAM Identity Federation. Set an S3 ACL on the bucket or the object. Create a CloudFront distribution for the bucket.

What happens, by default, when one of the resources in a CloudFormation stack cannot be created?. Previously-created resources are kept but the stack creation terminates. Previously-created resources are deleted and the stack creation terminates. The stack creation continues, and the final results indicate which steps failed. CloudFormation templates are parsed in advance so stack creation is guaranteed to succeed.

Which of the following are correct statements with policy evaluation logic in AWS Identity and Access Management? (Choose two.). By default, all requests are denied. An explicit allow overrides an explicit deny. An explicit allow overrides default deny. An explicit deny does not override an explicit allow. By default, all request are allowed.

You have an environment that consists of a public subnet using Amazon VPC and 3 instances that are running in this subnet. These three instances can successfully communicate with other hosts on the Internet. You launch a fourth instance in the same subnet, using the same AMI and security group configuration you used for the others, but find that this instance cannot be accessed from the Internet. What should you do to enable internet access?. Deploy a NAT instance into the public subnet. Modify the routing table for the public subnet. Configure a publically routable IP Address In the host OS of the fourth instance. Assign an Elastic IP address to the fourth instance.

If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other users by default?. 0 seconds. 1 hour. 1 day. forever. 30 seconds.

What is the format of structured notification messages sent by Amazon SNS?. An XML object containing MessageId, UnsubscribeURL, Subject, Message and other values. An JSON object containing MessageId, DuplicateFlag, Message and other values. An XML object containing MessageId, DuplicateFlag, Message and other values. An JSON object containing MessageId, unsubscribeURL, Subject, Message and other values.

Which of the following services are key/value stores? (Choose three.). Amazon ElastiCache. Simple Notification Service. DynamoDB. Simple Workflow Service. Simple Storage Service.

When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to encrypt object data when saved on the server side?. x-amz-storage-class. Content-MD5. x-amz-security-token. x-amz-server-side-encryption.

What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?. GetItem. BatchGetItem. GetMultipleItems. GetItemRange.

After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a public subnet you modify your route tables to have the NAT device be the target of internet bound traffic of your private subnet. When you try and make an outbound connection to the Internet from an instance in the private subnet, you are not successful. Which of the following steps could resolve the issue?. Attaching a second Elastic Network interface (ENI) to the NAT instance, and placing it in the private subnet. Attaching a second Elastic Network Interface (ENI) to the instance in the private subnet, and placing it in the public subnet. Disabling the Source/Destination Check attribute on the NAT instance. Attaching an Elastic IP address to the instance in the private subnet.

You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that it has been successfully stored. You then immediately make another API call and attempt to read this object. S3 tells you that the object does not exist. What could explain this behavior?. US-STANDARD uses eventual consistency and it can take time for an object to be readable in a bucket. Objects in Amazon S3 do not become visible until they are replicated to a second region. US-STANDARD imposes a 1 second delay before new objects are readable. You exceeded the bucket object limit, and once this limit is raised the object will be visible.

Denunciar Test