Premium

AWS Certified Developer - Associate Questions and Answers (Dumps and Practice Questions)



Question :You have created a WebApplication using AWS SDK, and your application is running on ec instance with the IAM role.
To successfully use the AWS services e.g. s3, you first have to get the access key from the EC2 Instance Metadata Service.

  :You have created a WebApplication using AWS SDK, and your application is running on ec instance with the IAM role.
1. True
2. False


Correct Answer : Get Lastest Questions and Answer :

Explanation: If you develop your application with the AWS SDK then you dont need to do anything. The AWS SDK will automatically use the AWS access keys that have been made available on the EC2 instance. If you are not using the AWS SDK then you can retrieve the access keys from the EC2 Instance Metadata Service.




Question : Select the correct statment in regards to IAM

  : Select the correct statment in regards to IAM
1. IAM roles for EC2 instances also work in Virtual Private Cloud, with spot insnaces only
2. IAM roles for EC2 instances also work in Virtual Private Cloud, with with reserved instances only
3. Access Mostly Uused Products by 50000+ Subscribers
4. The AWS temporary security credentials associated with an IAM role are automatically rotated multiple times a day on the EC2 instance
5. 3 and 4

Correct Answer : Get Lastest Questions and Answer :

Explanation: The AWS temporary security credentials associated with an IAM role are automatically rotated multiple times a day. New temporary security credentials are made available no later than 5 minutes before the existing temporary security credentials expire.
IAM roles for EC2 instances also work in Virtual Private Cloud, with spot and with reserved instances.






Question :

Which of the following industry-specific standards customers can deploy ...


 :
1. HIPAA
2. Cloud Security Alliance (CSA)
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1 and 2
5. 1,2 and 3

Correct Answer : Get Lastest Questions and Answer :


Explanation: The AWS Compliance Program enables customers to understand the robust security in place and then helps them streamline their compliance with industry and government requirements for security and data protection. The IT infrastructure that AWS provides to its customers is designed and managed in alignment with best security practices and a variety of IT security standards, including:
SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II)
SOC 2
SOC 3
FISMA, DIACAP, and FedRAMP
PCI DSS Level 1
ISO 27001
ITAR
FIPS 140-2

In addition, the flexibility and control that the AWS platform provides allows customers to deploy solutions that meet several industry-specific standards, including:
HIPAA
Cloud Security Alliance (CSA)
Motion Picture Association of America (MPAA)
AWS provides a wide range of information regarding its IT control environment to customers through white papers, reports, certifications, accreditations, and other third-party attestations.



Related Questions


Question : How can you have complete separation of the physical hardware for the virtual machines from the other tenants in EC?
  : How can you have complete separation of the physical hardware for the virtual machines from the other tenants in EC?
1. Use single tenant option
2. Use enhanced EC2 instances
3. Access Mostly Uused Products by 50000+ Subscribers
4. Use dedicated instances


Question : You have launched an EC micro instance from the AWS Linux image and when you are trying to SSH the instance,
it gives a message "No supported Authentication Method" after the user enters the user ID ec2-user.
Which of the below mentioned options is a possible reason for the error?
  : You have launched an EC micro instance from the AWS Linux image and when you are trying to SSH the instance,
1. The instance is not configured for security
2. The instance default user name is wrong
3. Access Mostly Uused Products by 50000+ Subscribers
4. The user might not have attached the key-pair with the EC2 instance


Question : You have launched an EC instance and wants to launch a similar instance with the same AMI ID,
Instance Type and AZ with ease. What is the option provided by AWS?
  : You have launched an EC instance and wants to launch a similar instance with the same AMI ID,
1. Create the instance template and launch it
2. Use the option "Launch More like this" from the AWS console
3. Access Mostly Uused Products by 50000+ Subscribers
4. Use the option "Launch from template" from the AWS console


Question : An EBS volume was unable to detach from an instance. Thus, the user used the Force Detach option.
Which of the below mentioned options can happen after the volume has been Forcibly detached?
  : An EBS volume was unable to detach from an instance. Thus, the user used the Force Detach option.
1. AWS deletes the volume automatically since it will be in a corrupted state
2. The instance may not be able to flush the file system and may result in a corrupted file system of the volume
3. Access Mostly Uused Products by 50000+ Subscribers
4. AWS terminates the instance automatically since the file system is corrupted


Question : You have created an EBS volume of GB. The user takes the first snapshot of that volume. What will happen when the snapshot is taken?
  : You have created an EBS volume of  GB. The user takes the first snapshot of that volume. What will happen when the snapshot is taken?
1. AWS will copy all the blocks from EBS and create a snapshot
2. The I/O on the volume will be frozen while a snapshot is being taken
3. Access Mostly Uused Products by 50000+ Subscribers
4. AWS will create a snapshot of the modified content in the same AZ of the region


Question : You have attached an EBS volume created from an existing snapshot to a running instance. The volume is not mounted on the instance yet.
Now you takes a snapshot of the attached volume, what will happen?
  : You have attached an EBS volume created from an existing snapshot to a running instance. The volume is not mounted on the instance yet.
1. The new snapshot will only have the original volume content
2. The snapshot will succeed but it will have no data
3. Access Mostly Uused Products by 50000+ Subscribers
4. The snapshot will succeed with all the modified data of the EBS volume