AWS Certified Developer Associate Sample Questions

  1. Home
  2. AWS Certified Developer Associate Sample Questions

AWS Certification helps learners gain credibility and confidence by validating their cloud expertise with an industry-recognized credential, and it also helps organizations identify skilled professionals to lead AWS cloud initiatives. The AWS Certified Developer Associate (DVA-C01) Exam validates your knowledge of core AWS services, their applications, and basic AWS architecture best practices.

This certification will help you improve your skills in developing, deploying, and debugging cloud-based applications on AWS. This AWS Certified Developer-Associate Examination (DVA-C01) is designed primarily for individuals who work as Developers. This certification will help you earn more money. The AWS Certified Developer Associate Salary is approximately Rs. 7,25,000 per year.

AWS Certified Developer Associate Sample Questions

Advanced Sample Questions

Which of the following services allows you to run code in response to events and automatically manage the computing resources required by that code?

  • a. AWS Lambda
  • b. Amazon EC2
  • c. Amazon S3
  • d. Amazon RDS

Answer: a. AWS Lambda

Explanation: AWS Lambda is a serverless computing service that allows you to run code in response to events and automatically manages the computing resources required by that code.

Which of the following services allows you to store and retrieve any amount of data from anywhere on the internet?

  • a. Amazon S3
  • b. Amazon EC2
  • c. Amazon RDS
  • d. AWS Lambda

Answer: a. Amazon S3

Explanation: Amazon S3 is a highly-scalable object storage service that allows you to store and retrieve any amount of data from anywhere on the internet.

Which of the following services allows you to build and run applications in a fully-managed container environment?

  • a. Amazon S3
  • b. Amazon EC2
  • c. Amazon Elastic Container Service (ECS)
  • d. AWS Lambda

Answer: c. Amazon Elastic Container Service (ECS)

Explanation: Amazon Elastic Container Service (ECS) is a fully-managed container orchestration service that allows you to build and run applications in a container environment.

Which of the following services provides a managed relational database service?

  • a. Amazon S3
  • b. Amazon EC2
  • c. Amazon RDS
  • d. AWS Lambda

Answer: c. Amazon RDS

Explanation: Amazon RDS is a managed relational database service that allows you to easily set up, operate, and scale a relational database in the cloud.

Which of the following services allows you to build and run scalable and fault-tolerant applications using serverless computing and fully-managed message queuing?

  • a. Amazon S3
  • b. Amazon EC2
  • c. Amazon SQS
  • d. AWS Lambda

Answer: c. Amazon SQS

Explanation: Amazon SQS (Simple Queue Service) is a fully-managed message queuing service that allows you to build and run scalable and fault-tolerant applications using serverless computing. It allows you to decouple and scale microservices, distributed systems, and serverless applications.

Which of the following AWS services provides an easy-to-use graphical interface for deploying and managing applications on AWS?

  • a. AWS Elastic Beanstalk
  • b. AWS CloudFormation
  • c. AWS Lambda
  • d. Amazon S3

Answer: a. AWS Elastic Beanstalk

Explanation: AWS Elastic Beanstalk is a fully-managed service that provides an easy-to-use graphical interface for deploying and managing applications on AWS.

Which of the following services provides a way to securely store and manage user access credentials and keys?

  • a. AWS Key Management Service (KMS)
  • b. Amazon S3
  • c. Amazon EC2
  • d. AWS Lambda

Answer: a. AWS Key Management Service (KMS)

Explanation: AWS Key Management Service (KMS) provides a way to securely store and manage user access credentials and keys, making it easy to encrypt data and control access to resources.

Which of the following services provides a way to distribute incoming traffic across multiple Amazon EC2 instances?

  • a. Amazon S3
  • b. Amazon EC2 Auto Scaling
  • c. Amazon Elastic Load Balancer (ELB)
  • d. AWS Lambda

Answer: c. Amazon Elastic Load Balancer (ELB)

Explanation: Amazon Elastic Load Balancer (ELB) is a fully-managed service that provides a way to distribute incoming traffic across multiple Amazon EC2 instances, increasing availability and scalability.

Which of the following services provides a fully-managed stream processing service for real-time data?

  • a. Amazon S3
  • b. Amazon Kinesis
  • c. Amazon Redshift
  • d. AWS Lambda

Answer: b. Amazon Kinesis

Explanation: Amazon Kinesis is a fully-managed stream processing service for real-time data that makes it easy to collect, process, and analyze streaming data in real-time.

Which of the following services provides a way to deploy and manage containers using Docker containers or custom container images?

  • a. Amazon S3
  • b. Amazon EC2
  • c. Amazon Elastic Container Service (ECS)
  • d. AWS Lambda

Answer: c. Amazon Elastic Container Service (ECS)

Explanation: Amazon Elastic Container Service (ECS) is a fully-managed container orchestration service that allows you to deploy and manage containers using Docker containers or custom container images.

Basic Sample Questions

Where can PortMapping be defined when launching containers in Amazon ECS?
  • A. Security organizations
  • b. AWS Elastic Container Registry (Amazon ECR)
  • C. Shipping agent
  • D. Task Specification

Correct Answer – D

Reference:
https://docs.aws.amazon.com/AmazonECS/latest/userguide/task_definition_parameters.html

Best practices as how access keys should be handled in AWS. (Choose two.)
  • A. For consistency, use the same access key in all applications.
  • B. Delete all access keys for the root user’s account.
  • C. Save any unused access keys in the account for future reference.
  • D. For continuous deployment, embed and encrypt access keys in code.
  • E. When possible, use Amazon IAM roles instead of access keys.

Correct Answer – B, E

Reference:
https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html#iam-user-access-keys

What is the hook run order in an AWS CodeDeploy deployment for in-place deployments?
  • A. Prior to Installation -> Application Stop -> Application Start -> Post Installation
  • B. Before Installation -> After Installation -> Application Start
  • C. Before Installation -> Application Stop -> Service Validation -> Application Start
  • D. Application Stop -> Before Installation -> Service Validation -> Application Start

Correct Answer – B

Reference:
https://docs.aws.amazon.com/codedeploy/latest/userguide/reference-appspec-file-structure-hooks.html

An application reads data from an Amazon DynamoDB database. For a period of 15 seconds, the program receives several ProvisionedThroughputExceeded errors. What should be done in this case?
  • A. To assist with the additional requests, create a new global secondary index for the table.
  • B. Use exponential backoff to retry the failed read requests.
  • C. Retry the failed read requests as soon as possible.
  • D. Use the DynamoDB €UpdateItem€ API to increase the table’s provisioned throughput capacity.

Correct Answer – B

Reference:
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/bp-query-scan.html

For a physician’s office management application, all data in transit between an EC2 instance and an Amazon EBS volume must be encrypted. Which of the following strategies meets this requirement? (Choose two.)
  • A. Take encrypted snapshots and save them to Amazon S3.
  • B. Encrypt your Amazon RDS connections.
  • C. Limit access to the Amazon EBS volume using IAM roles.
  • D. Turn on EBS encryption.
  • E. Make use of OS-level encryption.

Correct Answer – A, D

Reference:
https://aws.amazon.com/blogs/compute/must-know-best-practices-for-amazon-ebs-encryption/

In order to include objects specified by the AWS Serverless Application Model (SAM) in addition to Resources, what section of the document root must be included in an AWS CloudFormation template?
  • A. Situations
  • B. Internationals
  • C. Transformation
  • D. Characteristics

Correct Answer – D

Reference:
https://docs.aws.amazon.com/cloud9/latest/user-guide/lambda-functions.html

While designing an application that runs on Amazon EC2 in an Amazon VPC, a developer recognizes the need for centralized storage of application-level logs. Which AWS service can be used to securely store these logs?
  • A. Flow Logs from Amazon EC2 VPC
  • B. Logs from Amazon CloudWatch
  • C. Amazon CloudSearch
  • D. AWS CloudTrail

Correct Answer – B

Reference: https://aws.amazon.com/answers/logging/centralized-logging/

What are the prerequisites for configuring container instances in a multi-container Docker environment on AWS Elastic Beanstalk?
  • A task definition for Amazon ECS
  • A cluster of Amazon ECS
  • C. A Dockerfile contained within an application package
  • D. An Elastic Beanstalk CLI

Correct Answer – A

Reference:
https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/create_deploy_docker_ecs.html

A developer must regularly and consistently install a serverless RESTful API on AWS. Which strategies will be successful? (Choose two.)
  • A. Create a Swagger file. To deploy the Swagger file, use AWS Elastic Beanstalk.
  • B. Create a Swagger file. To deploy the Swagger file, use AWS CodeDeploy.
  • C. Install a SAM template that includes an inline Swagger definition.
  • D. Create a Swagger file. Deploy a SAM template that includes a reference to the Swagger file.
  • E. In a Lambda function, define an inline Swagger definition. Call the Lambda function.

Correct Answer – D, E

Amazon Kinesis is used to load data into an application that monitors the stock market. During peak data rate testing, the Kinesis stream cannot keep up with the incoming data. What action will Kinesis take to handle peak-hour traffic?
  • A. Download and install the Kinesis Producer Library (KPL) to begin ingesting data into the stream.
  • B. Using DecreaseStreamRetentionPeriod, shorten the data retention period to allow for more data ingestion.
  • C. Using UpdateShardCount, increase the stream’s shard count.
  • D. Using PutRecords, insert multiple records into the stream in a single call.

Correct Answer – A

Reference:
https://aws.amazon.com/kinesis/data-streams/faqs/

An application running on an Amazon EC2 instance must access AWS services and make API calls. What is the SAFEST method for granting AWS service access with the least amount of administrative overhead?
  • A. Store and retrieve credentials using AWS KMS.
  • B. Make use of EC2 instance profiles.
  • C. Make requests to the application as the AWS root user.
  • D. Use AWS CodeCommit to store and retrieve credentials.

Correct Answer – B

A developer must investigate performance issues with production-distributed applications created as AWS Lambda functions. These distributed Lambda applications call other components of the applications. What is the most effective method for a developer to identify and resolve the root cause of product performance issues?
  • A. Add logging statements to the Lambda functions, then view the logs in Amazon CloudWatch.
  • B. Use AWS CloudTrail and inspect the logs.
  • C. Examine the segments and errors using AWS X-Ray.
  • D. Launch Amazon Inspector agents and then evaluate their performance.

Correct Answer – C

What is the benefit of constructing a Lambda function by instantiating AWS clients outside the scope of the handler?
  • A. Legibility and formal conventions
  • B. Making use of connection reuse
  • C. Improved error handling
  • D. Each invocation results in the creation of a new instance.

Correct Answer – B

Reference:
https://www.jeremydaly.com/reuse-database-connections-aws-lambda/

Thousands of sensitive audio and video files must be stored in a bucket on Amazon S3. According to organizational security rules, all data written to this bucket must be encrypted. How can the policy’s adherence be ensured?
  • A. Use AWS Lambda to notify the security team if any unencrypted objects are found in the bucket.
  • B. Create an Amazon S3 bucket policy that prohibits the upload of objects that lack the x-amz-server-side-encryption header.
  • C. Set up an Amazon CloudWatch event rule to ensure that all objects in the Amazon S3 bucket are encrypted.
  • D. Create an Amazon S3 bucket policy that prohibits the upload of objects with the x-amz-server-side-encryption header.

Correct Answer – B

The release process workflow of an application requires human review before code is released into the production environment. What is the MOST EFFECTIVE way to accomplish this using AWS CodePipeline?
  • A. Allow approval through multiple pipelines.
  • B. In a stage, use an approval action.
  • C. Turn off the stage transition to allow for manual approval.
  • D. Turn off a stage just before the deployment stage.

Correct Answer – D

An application is running on an EC2 instance. The developer would like to save a statistic about his program in Amazon CloudWatch. How should this requirement be best implemented?
  • A. To send data to an S3 bucket, use the PUT Object API call. To publish data to CloudWatch, use an event notification to invoke a Lambda function.
  • B. Use a PutRecord API call to publish the metric data to an Amazon Kinesis Stream. Subscription to a Lambda function that sends data to CloudWatch.
  • C. Submit a custom metric to CloudWatch using the CloudWatch PutMetricData API call. To enable the API call, enter the necessary credentials.
  • D. Make use of the CloudWatch To submit a custom metric to CloudWatch, use the PutMetricData API call. Start the EC2 instance with the necessary IAM.

Correct Answer – C

Reference:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/mon-scripts.html

What are the best practices for deploying custom libraries in AWS Lambda?
  • A. Store the library on Amazon S3 and use it as a reference in the Lambda function.
  • B. Download the library and upload a ZIP file containing the Lambda function.
  • C. When creating the function, import the necessary Lambda blueprint.
  • D. Update the function runtime to include the required library.

Correct Answer – D

Reference:
https://docs.aws.amazon.com/lambda/latest/dg/env_variables.html

A large company’s application components are spread across multiple AWS accounts. Account-level trace data must be collected and displayed by the organization.

What materials should be used to meet these requirements?

  • A. AWS X-Ray Machine
  • B. Amazon CloudWatch (B)
  • C. Flow logs from Amazon VPC
  • D. Amazon Elasticsearch Service (D)

Correct Answer – A

Reference:
https://aws.amazon.com/xray/

An application running on Amazon EC2 makes use of Amazon DynamoDB. The program queries DynamoDB via the REST API. When the application writes to a DynamoDB table, it occasionally receives a ProvisionedThroughputExceededException error. Which solutions are most likely to prevent this error? (Choose two.)
  • A. Change the application code to perform exponential backoff when an error occurs.
  • B. Modify the application to use the AWS DynamoDB SDKs.
  • C. Increase the DynamoDB table’s read and write throughput.
  • D. For the DynamoDB table, create a DynamoDB Accelerator (DAX) cluster.
  • E. Make a new DynamoDB table. Distribute reads and writes across two tables.

Correct Answer – A, B

Reference:
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Programming.Errors.html

A corporation uses Amazon DynamoDB to manage and track orders. The DynamoDB table is split using the order date. During a sales event, the company experiences a significant increase in orders, causing DynamoDB writes to choke, and the used throughput is significantly lower than the permitted throughput. According to AWS best practices, how can this issue be resolved with MINIMAL expenses?
  • A. For each order date, create a new DynamoDB table.
  • B. Increase the DynamoDB table’s read and write capacity units.
  • C. To the partition key values, append a random number suffix.
  • D. Create a global secondary index in DynamoDB.

Correct Answer – B

Reference:
https://aws.amazon.com/premiumsupport/knowledge-center/throttled-ddb/

Menu