Premium

AWS Certified Developer - Associate Questions and Answers (Dumps and Practice Questions)



Question : You are working in a start up organization, where it is decided each individual developer will work on the AWS, which of the following best suits for the organization to have AWS account
 :  You are working in a start up organization, where it is decided each individual developer will work on the AWS, which of the following best suits for the organization to have AWS account
1. For multiple users create create multiple accounts.
2. There should be single AWS account created and share the security credentials
3. Access Mostly Uused Products by 50000+ Subscribers
4. Any one of the above is fine


Correct Answer : Get Lastest Questions and Answer :


Explanation: AWS Identity and Access Management is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS.
The service is targeted at organizations with multiple users or systems that use AWS products such as Amazon EC2, Amazon RDS, and the AWS Management Console. With IAM,
you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access.

Without IAM, organizations with multiple users and systems must either create multiple AWS accounts, each with its own billing and subscriptions to AWS products,
or employees must all share the security credentials of a single AWS account.
Also, without IAM, you have no control over the tasks a particular user or system can do and what AWS resources they might use.

IAM addresses this issue by enabling organizations to create multiple users (each user is a person, system, or application) who can use AWS products,
each with individual security credentials, all controlled by and billed to a single AWS account. With IAM, each user is allowed to do only what they need to do as part of the user's job.





Question : Select the correct statement which applies to S object
1. Each object has a unique key :name
2. Each obkect has version id
3. Access Mostly Uused Products by 50000+ Subscribers
4. All of the above
 :  Select the correct statement which applies to S object
1. 1,2
2. 2,3
3. Access Mostly Uused Products by 50000+ Subscribers
4. 4



Correct Answer : Get Lastest Questions and Answer : Object Key and Metadata : Each Amazon S3 object has data, a key, and metadata. When you create an object you specify the key name. This key name uniquely identifies the object in the bucket. For example, in Amazon S3 console (see AWS Management Console), when you highlight a bucket, a list of objects in your bucket appear. These names are the object keys. The name for a key is a sequence of Unicode characters whose UTF-8 encoding is at most 1024 bytes long.
Note : If you anticipate that your workload against Amazon S3 will exceed 100 requests per second, follow the Amazon S3 key naming guidelines for best performance. For information, see Request Rate and Performance Considerations.

In addition to the key, each Amazon S3 object has metadata. It is a set of name-value pairs. You can set object metadata at the time you upload it. After you upload the object, you cannot modify object metadata. The only way to modify object metadata is to make copy of the object and set the metadata. For more information, go to PUT Object - Copy in the Amazon Simple Storage Service API Reference. You can use the Amazon S3 management console to update the object metadata but internally it makes an object copy replacing the existing object to set the metadata.There are two kinds of metadata: system metadata and user-defined metadata.
Encryption provides added security for your object data stored in your buckets in Amazon S3. You can encrypt data on your client-side and upload the encrypted data to Amazon S3. In this case, you manage encryption process, the encryption keys, and related tools. Optionally, you might want to use the server-side encryption feature in which Amazon S3 encrypts your object data before saving it on disks in its data centers and decrypts it when you download the objects, freeing you from the tasks of managing encryption, encryption keys, and related tools. You can also use your own encryption keys with the Amazon S3 server-side encryption feature . Server-side encryption encrypts only the object data. Any object metadata is not encrypted.
Instead of using Amazon S3's server-side encryption, you also have the option of encrypting your data before sending it to Amazon S3. You can build your own library that encrypts your objects data on the client side before uploading it to Amazon S3. Optionally, you can use the AWS SDK for Java, which you can use to automatically encrypt your data before uploading it to Amazon S3.
Specifying Encryption Metadata Storage Location : When the Amazon S3 client (using the AmazonS3EncryptionClient class) encrypts data and uploads it to Amazon S3, the encrypted envelope symmetric key is also stored in S3. By default, the encrypted key is stored as user-defined object metadata. After you upload an encrypted object, you can view its properties and see the additional metadata name-value pairs related to encryption. For example, the key name x-amz-meta-x-amz-key and key value equal to the envelope key are set on an client-side encrypted object uploaded to Amazon S3. Optionally, you can also choose to store encryption metadata as an instruction file stored at the same location as the encrypted file. The instruction file will have the same key name as the encrypted data file but with the extension ".instruction" appended. You should use an instruction file when the strength of your encryption key results in a symmetric key that is too big for the object metadata. Metadata should be less than 2 KB. Encryption metadata is either stored as object metadata or an instruction file, but not both.





Question : How AWS Identity and Access Management features are charged by Amazon
 :  How AWS Identity and Access Management features are charged by Amazon
1. Per User Basis
2. Per account basis and an account could have multiple users
3. Access Mostly Uused Products by 50000+ Subscribers
4. It is based on group of users, which needs to be negotiated by Amazon billing team
5. It has to be accessed by Query only

Correct Answer : Get Lastest Questions and Answer :

AWS Identity and Access Management is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your IAM users.



Related Questions


Question :

Which of the following is a valid S3 bucket name?
  :
1. .mybucket.com
2. -mybucket.com

3. mybucket--com

4. mybucket.com



Question :

Which of the following request headers, when specified in an API call, will cause an object to be SSE?
  :
1. server-side-encryption
2. AES256
3. amz-server-side-encryption
4. x-amz-server-side-encryption


Question : While hosting a static website with Amazon S, your static JavaScript code attempts to
include resources from another S3 bucket but permission is denied. How might you solve the problem?
  : While hosting a static website with Amazon S, your static JavaScript code attempts to
1. Enable CORS Configuration
2. Disable Public Object Permissions
3. Move the object to the main bucket
4. None of the above


Question :

Amazon S3 can use what type of server side encryption?
  :
1. AES256
2. RC6
3. TKIP256
4. MARS




Question : Company B provides an online image recognition service and utilizes SQS to decouple
system components for scalability The SQS consumers poll the imaging queue as often as
possible to keep end-to-end throughput as high as possible. However, Company B is
realizing that polling in tight loops is burning CPU cycles and increasing costs with empty
responses.
How can Company B reduce the number of empty responses?
  : Company B provides an online image recognition service and utilizes SQS to decouple
1. Set the imaging queue visibility Timeout attribute to 20 seconds
2. Set the Imaging queue ReceiveMessageWaitTimeSeconds attribute to 20 seconds
3. Set the imaging queue MessageRetentionPeriod attribute to 20 seconds
4. Set the DelaySeconds parameter of a message to 20 seconds





Question : While working with the AWS API you receive the following error message: Conflict. What might be the cause of this error?

  : While working with the AWS API you receive the following error message:  Conflict. What might be the cause of this error?
1. Bucket name does not exist
2. Bucket already exists
3. User does not have proper permissions to make the API call
4. BadDigest