Premium

AWS Certified Developer - Associate Questions and Answers (Dumps and Practice Questions)



Question : While storing the "hadoopexam_logo.jpg" in S, you have to store Creator information as well, but you want to hide(or made Author name private) information
hence, you chose the storing Author information in MetaData, is this correct way to implement your requirement?
 :  While storing the
1. Yes
2. No


Correct Answer : Get Lastest Questions and Answer : Object Key and Metadata : Each Amazon S3 object has data, a key, and metadata. When you create an object you specify the key name. This key name uniquely identifies the object in the bucket. For example, in Amazon S3 console (see AWS Management Console), when you highlight a bucket, a list of objects in your bucket appear. These names are the object keys. The name for a key is a sequence of Unicode characters whose UTF-8 encoding is at most 1024 bytes long.
Note : If you anticipate that your workload against Amazon S3 will exceed 100 requests per second, follow the Amazon S3 key naming guidelines for best performance. For information, see Request Rate and Performance Considerations.

In addition to the key, each Amazon S3 object has metadata. It is a set of name-value pairs. You can set object metadata at the time you upload it. After you upload the object, you cannot modify object metadata. The only way to modify object metadata is to make copy of the object and set the metadata. For more information, go to PUT Object - Copy in the Amazon Simple Storage Service API Reference. You can use the Amazon S3 management console to update the object metadata but internally it makes an object copy replacing the existing object to set the metadata.There are two kinds of metadata: system metadata and user-defined metadata.
Encryption provides added security for your object data stored in your buckets in Amazon S3. You can encrypt data on your client-side and upload the encrypted data to Amazon S3. In this case, you manage encryption process, the encryption keys, and related tools. Optionally, you might want to use the server-side encryption feature in which Amazon S3 encrypts your object data before saving it on disks in its data centers and decrypts it when you download the objects, freeing you from the tasks of managing encryption, encryption keys, and related tools. You can also use your own encryption keys with the Amazon S3 server-side encryption feature

Server-side encryption encrypts only the object data. Any object metadata is not encrypted.

Instead of using Amazon S3's server-side encryption, you also have the option of encrypting your data before sending it to Amazon S3. You can build your own library that encrypts your objects data on the client side before uploading it to Amazon S3. Optionally, you can use the AWS SDK for Java, which you can use to automatically encrypt your data before uploading it to Amazon S3.
Specifying Encryption Metadata Storage Location : When the Amazon S3 client (using the AmazonS3EncryptionClient class) encrypts data and uploads it to Amazon S3, the encrypted envelope symmetric key is also stored in S3. By default, the encrypted key is stored as user-defined object metadata. After you upload an encrypted object, you can view its properties and see the additional metadata name-value pairs related to encryption. For example, the key name x-amz-meta-x-amz-key and key value equal to the envelope key are set on an client-side encrypted object uploaded to Amazon S3. Optionally, you can also choose to store encryption metadata as an instruction file stored at the same location as the encrypted file. The instruction file will have the same key name as the encrypted data file but with the extension ".instruction" appended. You should use an instruction file when the strength of your encryption key results in a symmetric key that is too big for the object metadata. Metadata should be less than 2 KB. Encryption metadata is either stored as object metadata or an instruction file, but not both.






Question :
When you change a user's name or path in IAM, which of the following statements describe better what happens after the change is applied?

1: Any policies attached to the user stay with the user under the new name.
2: The user stays in the same groups under the new name.
3: The unique ID for the user remains the same"

 :
1. 2 and 3 NOT 1
2. 1 and 3 NOT 2
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1, 2 and 3


Correct Answer : Get Lastest Questions and Answer :
To change a user's name or path, you must use the IAM CLI or API. There is no option in the console to rename a user.
To rename IAM users, use the following commands:
CLI: aws iam update-user
API: UpdateUser
When you change a user's name or path, the following happens:
Any policies attached to the user stay with the user under the new name.
The user stays in the same groups under the new name.
The unique ID for the user remains the same. For more information about unique IDs, see Unique IDs.
Any resource or role policies that refer to the user as the principal (the user is being granted access) are automatically updated to use the new name or path. For example, any queue-based policies in Amazon SQS or resource-based policies in Amazon S3 are automatically updated to use the new name and path.

IAM does not automatically update policies that refer to the user as a resource to use the new name or path; you must manually do that. For example, imagine that user Bob has a policy attached to him that lets him manage his security credentials. If an administrator renames Bob to Robert, the administrator also needs to update that policy to change the resource from this:

arn:aws:iam::account-number-without-hyphens:user/division_abc/subdivision_xyz/Bob
to this:
arn:aws:iam::account-number-without-hyphens:user/division_abc/subdivision_xyz/Robert
This is true also if an administrator changes the path; the administrator needs to update the policy to reflect the new path for the user.






Question : Select correct statement which applies to S metadata
1. Object metadata is not encrypted
2. You should not store private data in object metadata
3. Access Mostly Uused Products by 50000+ Subscribers
4. Object metadata is optional
 :  Select correct statement which applies to S metadata
1. 1,2
2. 2,3
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1,2,4
5. 1,3,4

Correct Answer : Get Lastest Questions and Answer : Object Key and Metadata : Each Amazon S3 object has data, a key, and metadata. When you create an object you specify the key name. This key name uniquely identifies the object in the bucket. For example, in Amazon S3 console (see AWS Management Console), when you highlight a bucket, a list of objects in your bucket appear. These names are the object keys. The name for a key is a sequence of Unicode characters whose UTF-8 encoding is at most 1024 bytes long.
Note : If you anticipate that your workload against Amazon S3 will exceed 100 requests per second, follow the Amazon S3 key naming guidelines for best performance. For information, see Request Rate and Performance Considerations.

In addition to the key, each Amazon S3 object has metadata. It is a set of name-value pairs. You can set object metadata at the time you upload it. After you upload the object, you cannot modify object metadata. The only way to modify object metadata is to make copy of the object and set the metadata. For more information, go to PUT Object - Copy in the Amazon Simple Storage Service API Reference. You can use the Amazon S3 management console to update the object metadata but internally it makes an object copy replacing the existing object to set the metadata.There are two kinds of metadata: system metadata and user-defined metadata.
Encryption provides added security for your object data stored in your buckets in Amazon S3. You can encrypt data on your client-side and upload the encrypted data to Amazon S3. In this case, you manage encryption process, the encryption keys, and related tools. Optionally, you might want to use the server-side encryption feature in which Amazon S3 encrypts your object data before saving it on disks in its data centers and decrypts it when you download the objects, freeing you from the tasks of managing encryption, encryption keys, and related tools. You can also use your own encryption keys with the Amazon S3 server-side encryption feature . Server-side encryption encrypts only the object data. Any object metadata is not encrypted.
Instead of using Amazon S3's server-side encryption, you also have the option of encrypting your data before sending it to Amazon S3. You can build your own library that encrypts your objects data on the client side before uploading it to Amazon S3. Optionally, you can use the AWS SDK for Java, which you can use to automatically encrypt your data before uploading it to Amazon S3.
Specifying Encryption Metadata Storage Location : When the Amazon S3 client (using the AmazonS3EncryptionClient class) encrypts data and uploads it to Amazon S3, the encrypted envelope symmetric key is also stored in S3. By default, the encrypted key is stored as user-defined object metadata. After you upload an encrypted object, you can view its properties and see the additional metadata name-value pairs related to encryption. For example, the key name x-amz-meta-x-amz-key and key value equal to the envelope key are set on an client-side encrypted object uploaded to Amazon S3. Optionally, you can also choose to store encryption metadata as an instruction file stored at the same location as the encrypted file. The instruction file will have the same key name as the encrypted data file but with the extension ".instruction" appended. You should use an instruction file when the strength of your encryption key results in a symmetric key that is too big for the object metadata. Metadata should be less than 2 KB. Encryption metadata is either stored as object metadata or an instruction file, but not both.




Related Questions


Question : Select the correct statement regarding to get the count of messages in a queue
  : Select the correct statement regarding to get the count of messages in a queue
1. You can view the number of messages that are visible
2. you can view the number of messages that are not visible
3. you can view the total number of messages that are visible and not visible (By Single request)
4. 1 and 2
5. 1 2 and 3


Question : What is "visibility timeout" in Amazon SQS queue ?
  : What is
1. is a period of time during which Amazon SQS prevents other consuming components from receiving and processing that message, once it is processed by your component
2. is a period after submitting the message to queue will not be available to consumer because queue parse that message during this time.
3. is a period after this message will be deleted
4. is a period of till the message will remain in the queue


Question : EC instances are launched from Amazon Machine images (AMIs). A given public AMI can:
  : EC instances are launched from Amazon Machine images (AMIs). A given public AMI can:
1. be used to launch EC2 Instances in any AWS region.
2. only be used to launch EC2 instances in the same country as the AMI is stored.

3. only be used to launch EC2 instances in the same AWS region as the AMI is stored.
4. only be used to launch EC2 instances in the same AWS availability zone as the AMI is stored



Question : You are writing to a DynamoDB table and receive the following exception:"
ProvisionedThroughputExceededException". though according to your Cloudwatch metrics
for the table, you are not exceeding your provisioned throughput.
What could be an explanation for this?
  : You are writing to a DynamoDB table and receive the following exception:
1. You haven't provisioned enough DynamoDB storage instances
2. You're exceeding your capacity on a particular Range Key
3. You're exceeding your capacity on a particular Hash Key
4. You're exceeding your capacity on a particular Sort Key
5. You haven't configured DynamoDB Auto Scaling triggers





Question :

If you're executing code against AWS on an EC2 instance that is assigned an IAM role, which of the following is a true statement?
  :
1. The code will assume the same permissions as the EC2 role
2. The code must have AWS access keys in order to execute
3. Only Python code can assume
4. IAM roles None of the above




Question : Company C is currently hosting their corporate site in an Amazon S bucket with Static
Website Hosting enabled. Currently, when visitors go to http://www.companyc.com the
index.html page is returned. Company C now would like a new page welcome.html to be
returned when a visitor enters http://www.companyc.com in the browser.
Which of the following steps will allow Company C to meet this requirement? Choose 2 answers

A. Upload an html page named welcome.html to their S3 bucket
B. Create a welcome subfolder in their S3 bucket
C. Set the Index Document property to welcome.html
D. Move the index.html page to a welcome subfolder
E. Set the Error Document property to welcome.html
 : Company C is currently hosting their corporate site in an Amazon S bucket with Static
1. A,B
2. B,C
3. C,E
4. B,D
5. A,C