Skip to content
Tip 2 Cloud

Learn & move to cloud

DVA-C01 (Page 30)

Which combination of actions will meet these requirements?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A company deploys a local news website on a fleet of Amazon EC2 instances behind an Application Load Balancer (ALB).The company wants to implement authentication for viewers through well-known social identity providers (IdPs).The company’s development team must use AWS native services in the solution.Which combination of actions will meet these requirements? (Choose two.)Read More →

What is the MOST operationally efficient solution to deploy a patched open-source library for all three Lambda functions?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A company has three AWS Lambda functions that are written in Node.js.The Lambda functions include a mix of custom code and open-source modules.When bugs are occasionally detected in the open-source modules, all three Lambda functions must be patched.What is the MOST operationally efficient solution to deploy a patched open-source library for all three Lambda functions?Read More →

How can the developer implement the encryption in the application to meet these requirements?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A developer is writing an application to encrypt files outside of AWS before uploading the files to an Amazon S3 bucket.The encryption must be symmetric and must be performed inside the application.How can the developer implement the encryption in the application to meet these requirements?Read More →

How can these requirements be met?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A developer is creating a new application that will be accessed by users through an API created using Amazon API Gateway.The users need to be authenticated by a third-party Security Assertion Markup Language (SAML) identity provider.Once authenticated, users will need access to other AWS services, such as Amazon S3 and Amazon DynamoDB.How can these requirements be met?Read More →

Which method will meet these requirements with the LEAST operational overhead?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A company is working on a new serverless application.A developer needs to find an automated way to deploy AWS Lambda functions and the dependent infrastructure with minimum coding effort.The application also needs to be reliable.Which method will meet these requirements with the LEAST operational overhead?Read More →

Which solutions will mitigate this error MOST cost-effectively?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

An application that is deployed to Amazon EC2 is using Amazon DynamoDB.The application calls the DynamoDB REST API.Periodically, the application receives a ProvisionedThroughputExceededException error when the application writes to a DynamoDB table.Which solutions will mitigate this error MOST cost-effectively? (Choose two.)Read More →

Which combination of steps should a developer take to prepare and perform the deployment?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A company is building a serverless application that uses AWS Lambda.The application includes Lambda functions that are exposed by Amazon API Gateway.The functions will use several large third-party libraries, and the build artifacts will exceed 50 MB in size.Which combination of steps should a developer take to prepare and perform the deployment? (Choose two.)Read More →

How can the developer decrypt the data that was encrypted by the CMK?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A developer is using an AWS Key Management Service (AWS KMS) customer master key (CMK) with imported key material to encrypt data in Amazon S3.The developer accidentally deletes the key material of the CMK and is unable to decrypt the data.How can the developer decrypt the data that was encrypted by the CMK?Read More →

How can the developer modify the code to handle any number of returns?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A developer uses the Amazon S3 ListObjectsV2 API call to retrieve and list object keys from an S3 bucket.The list can contain thousands of keys, and the retrieval often returns more than the max-keys maximum value.The code must handle any number of returned results.How can the developer modify the code to handle any number of returns?Read More →

Which policy must the developer modify to allow the instances to write these objects?

2025-01-08
By: study aws cloud
On: January 8, 2025
In: DVA-C01
With: 0 Comments

A developer has written an application that runs on Amazon EC2 instances.The developer is adding functionality for the application to write objects to an Amazon S3 bucket.Which policy must the developer modify to allow the instances to write these objects?Read More →

Posts pagination

Previous 1 … 29 30 31 … 35 Next

Recent Posts

  • Which of the below mentioned statements helps the user disable connection draining on the ELB?
  • What change should the SysOps Administrator make to the company’s existing AWS setup to achieve this result?
  • How can the user configure this?
  • How can the user achieve DR?
  • What two actions could you take to rectify this?

Categories

  • CLF-C01
  • CLF-C02
  • DBS-C01
  • DOP-C01
  • DOP-C02
  • DVA-C01
  • DVA-C02
  • MLS-C01
  • SAA-C02
  • SAA-C03
  • SAP-C01
  • SAP-C02
  • SCS-C01
  • SOA-C01
  • SOA-C02

© 2025. Tip2Cloud doesn't offer any real exam questions. All questions & answers were supported by AI.