AWS Certified Developer Associate 5.4
![]() |
![]() |
![]() |
Título del Test:![]() AWS Certified Developer Associate 5.4 Descripción: AWS Certified Developer Associate 5.4 Fecha de Creación: 2020/05/20 Categoría: Otros Número Preguntas: 16
|




Comentarios |
---|
NO HAY REGISTROS |
Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser. What should Company D do to prevent the web fonts from being blocked by the browser?. Enable versioning on the cdfonts bucket for each web font. Create a policy on the cdfonts bucket to enable access to everyone. Add the Content-MD5 header to the request for webfonts in the cdfonts bucket from the website. Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration. Which of the following platforms are supported by Elastic Beanstalk? (Choose two.). Apache Tomcat. .NET. IBM Websphere. Oracle JBoss. Jetty. Which code snippet below returns the URL of a load balanced web site created in CloudFormation with an AWS::ElasticLoadBalancing::LoadBalancer resource name "ElasticLoad Balancer"?. "Fn::Join" : ["". [ "http://", {"Fn::GetAtr" : [ "ElasticLoadBalancer","DNSName"]}]]. "Fn::Join" : ["". [ "http://", {"Fn::GetAtr" : [ "ElasticLoadBalancer","Url"]}]]. "Fn::Join" : ["". [ "http://", {"Ref" : "ElasticLoadBalancerUrl"}]]. "Fn::Join" : [".", [ "http://", {"Ref" : "ElasticLoadBalancerDNSName"}]]. Which features can be used to restrict access to data in S3? (Choose two.). Use S3 Virtual Hosting. Set an S3 Bucket policy. Enable IAM Identity Federation. Set an S3 ACL on the bucket or the object. Create a CloudFront distribution for the bucket. What happens, by default, when one of the resources in a CloudFormation stack cannot be created?. Previously-created resources are kept but the stack creation terminates. Previously-created resources are deleted and the stack creation terminates. The stack creation continues, and the final results indicate which steps failed. CloudFormation templates are parsed in advance so stack creation is guaranteed to succeed. Which of the following are correct statements with policy evaluation logic in AWS Identity and Access Management? (Choose two.). By default, all requests are denied. An explicit allow overrides an explicit deny. An explicit allow overrides default deny. An explicit deny does not override an explicit allow. By default, all request are allowed. You have an environment that consists of a public subnet using Amazon VPC and 3 instances that are running in this subnet. These three instances can successfully communicate with other hosts on the Internet. You launch a fourth instance in the same subnet, using the same AMI and security group configuration you used for the others, but find that this instance cannot be accessed from the Internet. What should you do to enable internet access?. Deploy a NAT instance into the public subnet. Modify the routing table for the public subnet. Configure a publically routable IP Address In the host OS of the fourth instance. Assign an Elastic IP address to the fourth instance. If a message is retrieved from a queue in Amazon SQS, how long is the message inaccessible to other users by default?. 0 seconds. 1 hour. 1 day. forever. 30 seconds. What is the format of structured notification messages sent by Amazon SNS?. An XML object containing MessageId, UnsubscribeURL, Subject, Message and other values. An JSON object containing MessageId, DuplicateFlag, Message and other values. An XML object containing MessageId, DuplicateFlag, Message and other values. An JSON object containing MessageId, unsubscribeURL, Subject, Message and other values. Which of the following services are key/value stores? (Choose three.). Amazon ElastiCache. Simple Notification Service. DynamoDB. Simple Workflow Service. Simple Storage Service. When uploading an object, what request header can be explicitly specified in a request to Amazon S3 to encrypt object data when saved on the server side?. x-amz-storage-class. Content-MD5. x-amz-security-token. x-amz-server-side-encryption. What item operation allows the retrieval of multiple items from a DynamoDB table in a single API call?. GetItem. BatchGetItem. GetMultipleItems. GetItemRange. After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a public subnet you modify your route tables to have the NAT device be the target of internet bound traffic of your private subnet. When you try and make an outbound connection to the Internet from an instance in the private subnet, you are not successful. Which of the following steps could resolve the issue?. Attaching a second Elastic Network interface (ENI) to the NAT instance, and placing it in the private subnet. Attaching a second Elastic Network Interface (ENI) to the instance in the private subnet, and placing it in the public subnet. Disabling the Source/Destination Check attribute on the NAT instance. Attaching an Elastic IP address to the instance in the private subnet. You attempt to store an object in the US-STANDARD region in Amazon S3, and receive a confirmation that it has been successfully stored. You then immediately make another API call and attempt to read this object. S3 tells you that the object does not exist. What could explain this behavior?. US-STANDARD uses eventual consistency and it can take time for an object to be readable in a bucket. Objects in Amazon S3 do not become visible until they are replicated to a second region. US-STANDARD imposes a 1 second delay before new objects are readable. You exceeded the bucket object limit, and once this limit is raised the object will be visible. What is the maximum number of S3 Buckets available per AWS account?. 100 per region. there is no limit. 100 per account. 500 per account. 100 per IAM user. Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table? Assume that no security Keys are allowed to be stored on the EC2 instance. (Choose two.). Create an IAM User that allows write access to the DynamoDB table. Add an IAM Role to a running EC2 instance. Add an IAM User to a running EC2 Instance. Launch an EC2 Instance with the IAM Role included in the launch configuration. Create an IAM Role that allows write access to the DynamoDB table. Launch an EC2 Instance with the IAM User included in the launch configuration. |