Cause all that matters here is passing the Amazon AWS-Certified-Developer-Associate exam. Cause all that you need is a high score of AWS-Certified-Developer-Associate AWS Certified Developer Associate exam. The only one thing you need to do is downloading Exambible AWS-Certified-Developer-Associate exam study guides now. We will not let you down with our money-back guarantee.
2017 NEW RECOMMEND
Free VCE & PDF File for Amazon AWS-Certified-Developer-Associate Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q51. A user has enabled the automated backup, but not specified the backup window. What will RDS do in this case?
A. Will throw an error on instance launch
B. RDS will take 3 AM â 3:30 AM as the default window
C. RDS assigns a random time period based on the region
D. Will not allow to launch a DB instance
If the user does not specify a preferred backup window while enabling an automated backup, Amazon RDS assigns a default 30-minute backup window which is selected at random from an 8-hour block of
time per region. Reference:
Q52. You need to develop and run some new applications on AWS and you know that Elastic Beanstalk and CIoudFormation can both help as a deployment mechAMsm for a broad range of AWS resources. Which of the following statements best describes the differences between Elastic Beanstalk and C|oudFormation?
A. Elastic Beanstalk uses Elastic load balancing and CIoudFormation doesn't.
B. CIoudFormation is faster in deploying applications than Elastic Beanstalk.
C. CIoudFormation is much more powerful than Elastic Beanstalk, because you can actually design and script custom resources
D. Elastic Beanstalk is faster in deploying applications than C|oudFormation.
These services are designed to complement each other. AWS Elastic Beanstalk provides an environment to easily develop and run applications in the cloud. It is integrated with developer tools and provides a one-stop experience for you to manage the lifecycle of your applications. AWS CIoudFormation is a convenient deployment mechAMsm for a broad range of AWS resources. It supports the infrastructure needs of many different types of applications such as existing enterprise applications, legacy applications, applications built using a variety of AWS resources and container-based solutions (including those built using AWS Elastic Beanstalk).
AWS CIoudFormation introduces two new concepts: The template, a JSON-format, text-based file that describes all the AWS resources you need to deploy to run your application and the stack, the set of AWS resources that are created and managed as a single unit when AWS CIoudFormation instantiates a template.
Q53. Which of the following device names is recommended for an EBS volume that can be attached to an Amazon EC2 Instance running Windows?
The xvd[f-p] is the recommended device name for EBS volumes that can be attached to the Amazon EC2 Instances running on Windows.
Q54. Which Amazon service is not used by Elastic Beanstalk?
A. Amazon S3
B. Amazon ELB
C. Auto scaling
D. Amazon EMR
Elastic Beanstalk leverages AWS services such as Amazon Elastic Cloud Compute (Amazon EC2), Amazon Simple Storage Service (Amazon S3), Amazon Simple Notification Service (Amazon SNS), Elastic Load Balancing and Auto Scaling to deliver the same highly reliable, scalable, and cost-effective infrastructure that hundreds of thousands of businesses depend on today.
Q55. An orgAMzation has 500 employees. The orgAMzation wants to set up AWS access for each department. Which of the below mentioned options is a possible solution?
A. Create IAM roles based on the permission and assign users to each role
B. Create IAM users and provide indMdual permission to each
C. Create IAM groups based on the permission and assign IAM users to the groups
D. It is not possible to manage more than 100 IAM users with AWS
An IAM group is a collection of IAM users. Groups let the user specify permissions for a collection of users, which can make it easier to manage the permissions for those users.
Q56. In DynamoDB, if you create a table and request 10 units of write capacity and 200 units of read capacity of provisioned throughput, how much would you be charged in US East (Northern Virginia) Region?
A. $0.05 per hour
B. $0.10 per hour
C. $0.03 per hour
D. $0.15 per hour
To understand pricing in DynamoDB, consider the following example. If you create a table and request 10 units of write capacity and 200 units of read capacity of provisioned throughput, you would be charged:
$0.01 + (4 x $0.01) = $0.05 per hour
Q57. What happens if your application performs more reads or writes than your provisioned capacity?
B. requests above your provisioned capacity will be performed but you will receive 400 error codes.
C. requests above your provisioned capacity will be performed but you will receive 200 error codes.
D. requests above your provisioned capacity will be throttled and you will receive 400 error codes.
Speaking about DynamoDB, if your application performs more reads/second or writes/second than your tabIeâs provisioned throughput capacity allows, requests above your provisioned capacity will be throttled and you will receive 400 error codes.
Q58. A user has created a MySQL RDS instance. Which of the below mentioned options is mandatory to configure while creating an instance?
A. MuIti AZ deployment setup
B. Automated backup window
C. Availability Zone
D. Maintenance window
When creating an RDS instance, the user needs to specify whether it is Nlulti AZ or not. If the user does not provide the value for the zone, the maintenance window or automated backup window, RDS will automatically select the value.
Q59. An orgAMzation has hosted an application on the EC2 instances. There will be multiple users connecting to the instance for setup and configuration of application. The orgAMzation is planning to implement certain security best practices. Which of the below mentioned pointers will not help the orgAMzation achieve better security arrangement?
A. Apply the latest patch of OS and always keep it updated.
B. Allow only IAM users to connect with the EC2 instances with their own secret access key.
C. Disable the password based login for all the users. All the users should use their own keys to connect with the instance securely.
D. Create a procedure to revoke the access rights of the indMdual user when they are not required to connect to EC2 instance anymore for the purpose of application configuration.
Since AWS is a public cloud any application hosted on EC2 is prone to hacker attacks. It becomes extremely important for a user to setup a proper security mechAMsm on the EC2 instances. A few of the security measures are listed below:
Always keep the OS updated with the latest patch
Always create separate users with in OS if they need to connect with the EC2 instances, create their keys and disable their password
Create a procedure using which the admin can revoke the access of the user when the business work on the EC2 instance is completed
Lock down unnecessary ports
Audit any proprietary applications that the user may be running on the EC2 instance
Provide temporary escalated prMleges, such as sudo for users who need to perform occasional prMleged tasks
The IAM is useful when users are required to work with AWS resources and actions, such as launching an instance. It is not useful to connect (RDP / SSH) with an instance.
Q60. A user is trying to share a video file with all his friends. Which of the below mentioned AWS services will be cheapest and easy to use?
A. AWS S3
B. AWS EC2
C. AWS RRS
D. AWS Glacier
AWS RRS provides the same functionality as AWS S3, but at a cheaper rate. It is ideally suited for non mission critical applications. It provides less durability than S3, but is a cheaper option.