Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

DVA-C02 Exam Dumps - Amazon Web Services AWS Certified Associate Questions and Answers

Question # 49

A developer is making changes to a custom application that uses AWS Elastic Beanstalk.

Which solutions will update the Elastic Beanstalk environment with the new application version after the developer completes the changes? (Select TWO.)

Options:

A.

Package the application code into a .zip file. Use the AWS Management Console to upload the .zip file and deploy the packaged application.

B.

Package the application code into a .tar file. Use the AWS Management Console to create a new application version from the .tar file. Update the environment by using the AWS CLI.

C.

Package the application code into a .tar file. Use the AWS Management Console to upload the .tar file and deploy the packaged application.

D.

Package the application code into a .zip file. Use the AWS CLI to create a new application version from the .zip file and to update the environment.

E.

Package the application code into a .zip file. Use the AWS Management Console to create a new application version from the .zip file. Rebuild the environment by using the AWS CLI.

Buy Now
Question # 50

A developer is writing an application that will retrieve sensitive data from a third-party system. The application will format the data into a PDF file. The PDF file could be more than 1 MB. The application will encrypt the data to disk by using AWS Key Management Service (AWS KMS). The application will decrypt the file when a user requests to download it. The retrieval and formatting portions of the application are complete.

The developer needs to use the GenerateDataKey API to encrypt the PDF file so that the PDF file can be decrypted later. The developer needs to use an AWS KMS symmetric customer managed key for encryption.

Which solutions will meet these requirements?

Options:

A.

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

B.

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

C.

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

D.

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

Buy Now
Question # 51

A company ' s application uses an Amazon API Gateway REST API and AWS Lambda functions to upload media files to and fetch media files from a standard Amazon S3 Standard bucket. The company runs a nightly job on an Amazon EC2 instance to create dashboards and other visualizations for application users. The job usually runs for 1 to 2 hours.

A developer observes request throttling while the function is running. The application generates multiple 429 exceptions in the Lambda function logs when files do not process successfully. The developer needs to resolve the issue and ensure that all of the application ingests all files.

Which solution will meet these requirements?

Options:

A.

Enable S3 Transfer Acceleration on the bucket. Use the appropriate endpoint.

B.

Call the CreateMultipartUpload API in the Lambda functions to upload the files in pieces.

C.

Implement the retry with a backoff pattern in the Lambda functions.

D.

Set up an S3 Lifecycle policy to automatically move the media files to the S3 Intelligent-Tiering storage class.

Buy Now
Question # 52

For a deployment using AWS Code Deploy, what is the run order of the hooks for in-place deployments?

Options:

A.

BeforeInstall - > ApplicationStop - > ApplicationStart - > AfterInstall

B.

ApplicationStop - > BeforeInstall - > AfterInstall - > ApplicationStart

C.

BeforeInstall - > ApplicationStop - > ValidateService - > ApplicationStart

D.

ApplicationStop - > BeforeInstall - > ValidateService - > ApplicationStart

Buy Now
Question # 53

An online sales company is developing a serverless application that runs on AWS. The application uses an AWS Lambda function that calculates order success rates and stores the data in an Amazon DynamoDB table. A developer wants an efficient way to invoke the Lambda function every 15 minutes.

Which solution will meet this requirement with the LEAST development effort?

Options:

A.

Create an Amazon EventBridge rule that has a rate expression that will run the rule every 15 minutes. Add the Lambda function as the target of the EventBridge rule.

B.

Create an AWS Systems Manager document that has a script that will invoke the Lambda function on Amazon EC2. Use a Systems Manager Run Command task to run the shell script every 15 minutes.

C.

Create an AWS Step Functions state machine. Configure the state machine to invoke the Lambda function execution role at a specified interval by using a Wait state. Set the interval to 15 minutes.

D.

Provision a small Amazon EC2 instance. Set up a cron job that invokes the Lambda function every 15 minutes.

Buy Now
Question # 54

A company runs a critical application on AWS. The application uses credentials to access an Amazon RDS database.

As part of a risk assessment to analyze security vulnerabilities, the company found that database credentials are not frequently rotated. A developer needs to implement a solution that securely stores and rotates the credentials. The solution must not expose the credentials to anyone who should not have access to the credentials.

Which solution will meet these requirements?

Options:

A.

Configure AWS Secrets Manager to store the database credentials. Schedule managed rotation for Secrets Manager secrets.

B.

Configure the Systems Manager parameters with an AWS KMS AWS managed key to encrypt the database credentials at rest. Create an AWS Lambda function to rotate the KMS key. Set up an Amazon EventBridge rule to invoke the Lambda function on a schedule.

C.

Configure an Amazon S3 bucket with S3 Bucket Keys for server-side encryption with AWS KMS keys (SSE-KMS) to store the database credentials.

D.

Configure the Systems Manager parameters with an AWS KMS customer managed key to encrypt the database credentials at rest. Create an AWS Lambda function to periodically rotate the KMS key. Use a cron expression to invoke the Lambda function on a schedule.

Buy Now
Question # 55

A company stores data in an Amazon S3 bucket that is updated multiple times each day. S3 Versioning is enabled, and multiple versions of objects accumulate.

The company needs the bucket to retain only the current version and the immediately previous version of each object.

Which solution will meet these requirements?

Options:

A.

Configure an S3 bucket policy to retain one newer noncurrent version.

B.

Configure an S3 Lifecycle rule to retain one newer noncurrent version.

C.

Enable S3 Object Lock with a retention policy.

D.

Suspend S3 Versioning and modify application logic.

Buy Now
Question # 56

A developer updates an AWS Lambda function that is integrated with an Amazon API Gateway API. The API serves as the backend for a web application. The developer must test the updated Lambda function without affecting production users .

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.

Create a canary deployment on the existing API stage and test by using the production URL.

B.

Change the API endpoint type to private and test by using the production URL.

C.

Create a new API Gateway stage for testing and use stage variables to route traffic to the updated Lambda function.

D.

Deploy a separate CloudFormation stack that duplicates the production API and Lambda function.

Buy Now
Question # 57

A company has an Amazon API Gateway REST API that integrates with an AWS Lambda function. The API ' s development stage references a development alias of the Lambda function named " dev " . A developer needs to make a production alias of the Lambda function named " prod " available through the API. Which solution meets these requirements?

Options:

A.

Create a new method on the API. Name the method production. Configure the method to include a stage variable that points to the " prod " Lambda function alias.

B.

Create a new method on the API. Name the method production. Configure an integration request on the API ' s development stage that points to the " prod " Lambda function alias.

C.

Deploy the API to a new stage named production. Configure the stage to include a stage variable that points to the " prod " Lambda function alias.

D.

Deploy the API to a new stage named production. Configure an integration request on the API ' s production stage that points to the " prod " Lambda function alias.

Buy Now
Question # 58

A developer is creating a new batch application that will run on an Amazon EC2 instance. The application requires read access to an Amazon S3 bucket. The developer needs to follow security best practices to grant S3 read access to the application.

Which solution meets these requirements?

Options:

A.

Add the permissions to an 1AM policy. Attach the policy to a role. Attach the role to the EC2 instance profile.

B.

Add the permissions inline to an 1AM group. Attach the group to the EC2 instance profile.

C.

Add the permissions to an 1AM policy. Attach the policy to a user. Attach the user to the EC2 instance profile.

D.

Add the permissions to an 1AM policy. Use 1AM web identity federation to access the S3 bucket with the policy.

Buy Now
Question # 59

An application uses an Amazon EC2 Auto Scaling group. A developer notices that EC2 instances are taking a long time to become available during scale-out events. The UserData script is taking a long time to run.

The developer must implement a solution to decrease the time that elapses before an EC2 instance becomes available. The solution must make the most recent version of the application available at all times and must apply all available security updates. The solution also must minimize the number of images that are created. The images must be validated.

Which combination of steps should the developer take to meet these requirements? (Choose two.)

Options:

A.

Use EC2 Image Builder to create an Amazon Machine Image (AMI). Install all the patches and agents that are needed to manage and run the application. Update the Auto Scaling group launch configuration to use the AMI.

B.

Use EC2 Image Builder to create an Amazon Machine Image (AMI). Install the latest version of the application and all the patches and agents that are needed to manage and run the application. Update the Auto Scaling group launch configuration to use the AMI.

C.

Set up AWS CodeDeploy to deploy the most recent version of the application at runtime.

D.

Set up AWS CodePipeline to deploy the most recent version of the application at runtime.

E.

Remove any commands that perform operating system patching from the UserData script.

Buy Now
Question # 60

An application that runs on AWS Lambda requires access to specific highly confidential objects in an Amazon S3 bucket. In accordance with the principle of least privilege a company grants access to the S3 bucket by using only temporary credentials.

How can a developer configure access to the S3 bucket in the MOST secure way?

Options:

A.

Hardcode the credentials that are required to access the S3 objects in the application code. Use the credentials to access me required S3 objects.

B.

Create a secret access key and access key ID with permission to access the S3 bucket. Store the key and key ID in AWS Secrets Manager. Configure the application to retrieve the Secrets Manager secret and use the credentials to access me S3 objects.

C.

Create a Lambda function execution role Attach a policy to the rote that grants access to specific objects in the S3 bucket.

D.

Create a secret access key and access key ID with permission to access the S3 bucket Store the key and key ID as environment variables m Lambda. Use the environment variables to access the required S3 objects.

Buy Now
Question # 61

A company deploys a new application to AWS. The company is streaming application logs to Amazon CloudWatch Logs. The company ' s development team must receive notification by email when the word " ERROR " appears in any log lines. A developer sets up an Amazon SNS topic and subscribes the development team to the topic.

What should the developer do next to meet the requirements?

Options:

A.

Select the appropriate log group. Create a CloudWatch metric filter with " ERROR " as the search term. Create an alarm on this metric that notifies the SNS topic when the metric is 1 or higher.

B.

In CloudWatch Logs Insights, select the appropriate log group. Create a metric query to search for the term " ERROR " in the logs. Create an alarm on this metric that notifies the SNS topic when the metric is 1 or higher.

C.

Select the appropriate log group. Create an SNS subscription filter with " ERROR " as the filter pattern. Select the SNS topic as the destination.

D.

Create a CloudWatch alarm that includes " ERROR " as a filter pattern, a log group dimension that defines the appropriate log group, and a destination that notifies the SNS topic.

Buy Now
Question # 62

A developer registered an AWS Lambda function as a target for an Application Load Balancer (ALB) using a CLI command. However, the Lambda function is not being invoked when the client sends requests through the ALB.

Why is the Lambda function not being invoked?

Options:

A.

A Lambda function cannot be registered as a target for an ALB.

B.

A Lambda function can be registered with an ALB using AWS Management Console only.

C.

The permissions to invoke the Lambda function are missing.

D.

Cross-zone is not enabled on the ALB.

Buy Now
Question # 63

A developer wants to use an Amazon CloudFront distribution to deliver a web application to users. Users will access the application through the internet.

The developer needs to create an SSL/TLS certificate to use with the CloudFront distribution. The developer wants to minimize operational overhead by ensuring that the certificate is renewed automatically.

Which solution will meet these requirements?

Options:

A.

Create a public certificate that uses DNS validation in IAM.

B.

Import a certificate into IAM. Configure managed renewal for the certificate.

C.

Create a public certificate that uses DNS validation in AWS Certificate Manager (ACM).

D.

Create a public certificate that uses email validation in AWS Certificate Manager (ACM).

Buy Now
Exam Code: DVA-C02
Exam Name: AWS Certified Developer - Associate
Last Update: Apr 30, 2026
Questions: 600
DVA-C02 pdf

DVA-C02 PDF

$25.5  $84.99
DVA-C02 Engine

DVA-C02 Testing Engine

$28.5  $94.99
DVA-C02 PDF + Engine

DVA-C02 PDF + Testing Engine

$40.5  $134.99