Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A developer is migrating a containerized application from an on-premises environment to the AWS Cloud. The developer is using the AWS CDK to provision a container in Amazon ECS on AWS Fargate. The container is behind an Application Load Balancer (ALB).

When the developer deploys the stack, the deployment fails because the ALB fails health checks. The developer needs to resolve the failed health checks.

Which solutions will meet this requirement? (Select TWO.)

A.

Confirm that the capacity providers for the container have been provisioned and are properly sized.

B.

Confirm that the target group port matches the port mappings in the ECS task definition.

C.

Confirm that a hosted zone associated with the ALB matches a hosted zone that is referenced in the ECS task definition.

D.

Confirm that the ALB listener on the mapped port has a default action that redirects to the application ' s health check path endpoint.

E.

Confirm that the ALB listener on the mapped port has a default action that forwards to the correct target group.

A company has developed a new serverless application using AWS Lambda functions that will be deployed using the AWS Serverless Application Model (AWS SAM) CLI.

Which step should the developer complete prior to deploying the application?

A.

Compress the application to a zip file and upload it into AWS Lambda.

B.

Test the new AWS Lambda function by first tracing it m AWS X-Ray.

C.

Bundle the serverless application using a SAM package.

D.

Create the application environment using the eb create my-env command.

A developer is building an application on a fleet of Amazon EC2 Linux instances that run Apache web server. The application needs to send API calls that contain sensitive customer data to a second Linux fleet that also runs Apache within a peered VPC in the same AWS account and AWS Region as the original cluster. All sensitive data must be encrypted in transit. Instances in both fleets have Amazon EBS volumes attached.

Which solution will meet these requirements in the MOST operationally efficient way?

A.

Create a security group in each VPC that allows traffic only from the other fleet ' s security group. Assign each security group to the corresponding instances.

B.

Create an AWS Site-to-Site VPN connection between the two peered VPCs. Pass the sensitive data in the API calls through the Site-to-Site VPN connection.

C.

Create a customer managed key in AWS KMS to encrypt all EBS volumes. Create an IAM instance profile that has permission to use the customer managed key and attach the key to all instances in both fleets.

D.

Request a valid certificate through AWS Certificate Manager (ACM) and redeploy both fleets as AWS Nitro Enclaves. Use the ACM for Nitro Enclaves Amazon Machine Image (AMI) and specify the requested certificate for all instances.

A developer is building a serverless application that uses asynchronous AWS Lambda functions. The developer needs a solution to capture records of every Lambda function invocation. Each function must have multiple destinations based on whether each invocation is successful. The solution must record function responses in JSON format.

Which solution will meet these requirements?

A.

Amazon CloudWatch Logs log groups that use the default log format for Lambda functions. Route each invocation to the appropriate log group by using a Lambda canary deployment and weighted aliases. Set the appropriate log group as the target for each function.

B.

Set up an S3 bucket as an on-failure destination for the Lambda function. Configure an Amazon SNS topic as the destination for successful Lambda function invocations.

C.

Configure an Amazon SQS dead-letter queue as an event source for the Lambda function to store failed invocations. In the Lambda function code, use the PutItem Amazon DynamoDB API call to add the successful invocation information to the database.

D.

Set up an Amazon SQS queue as an on-failure destination for the Lambda function. Configure an Amazon OpenSearch Service cluster as the destination for the Lambda function for successful invocations.

A company needs to set up secure database credentials for all its AWS Cloud resources. The company ' s resources include Amazon RDS DB instances Amazon DocumentDB clusters and Amazon Aurora DB instances. The company ' s security policy mandates that database credentials be encrypted at rest and rotated at a regular interval.

Which solution will meet these requirements MOST securely?

A.

Set up IAM database authentication for token-based access. Generate user tokens to provide centralized access to RDS DB instances. Amazon DocumentDB clusters and Aurora DB instances.

B.

Create parameters for the database credentials in AWS Systems Manager Parameter Store Set the Type parameter to Secure Sting. Set up automatic rotation on the parameters.

C.

Store the database access credentials as an encrypted Amazon S3 object in an S3 bucket Block all public access on the S3 bucket. Use S3 server-side encryption to set up automatic rotation on the encryption key.

D.

Create an AWS Lambda function by using the SecretsManagerRotationTemplate template in the AWS Secrets Manager console. Create secrets for the database credentials in Secrets Manager Set up secrets rotation on a schedule.

A developer maintains a serverless application that uses an Amazon API Gateway REST API to invoke an AWS Lambda function by using a non-proxy integration. The Lambda function returns data, which is stored in Amazon DynamoDB.

Several application users begin to receive intermittent errors from the API. The developer examines Amazon CloudWatch Logs for the Lambda function and discovers several ProvisionedThroughputExceededException errors.

The developer needs to resolve the errors and ensure that the errors do not reoccur.

A.

Use provisioned capacity mode for the DynamoDB table, and assign sufficient capacity units. Configure the Lambda function to retry requests with exponential backoff.

B.

Update the REST API to send requests on an Amazon SQS queue. Configure the Lambda function to process requests from the queue.

C.

Configure a usage plan for the REST API.

D.

Update the REST API to invoke the Lambda function asynchronously.

A company is migrating its PostgreSQL database into the AWS Cloud. The company wants to use a database that will secure and regularly rotate database credentials. The company wants a solution that does not require additional programming overhead.

Which solution will meet these requirements?

A.

Use Amazon Aurora PostgreSQL tor the database. Store the database credentials in AWS Systems Manager Parameter Store Turn on rotation.

B.

Use Amazon Aurora PostgreSQL for the database. Store the database credentials in AWS Secrets Manager Turn on rotation.

C.

Use Amazon DynamoDB for the database. Store the database credentials in AWS Systems Manager Parameter Store Turn on rotation.

D.

Use Amazon DynamoDB for the database. Store the database credentials in AWS Secrets Manager Turn on rotation.

A company is building a new application that processes customer transactions by using an event-driven architecture. The company needs to receive a notification that includes transaction details when the transactions are above a price threshold.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Create an Amazon SQS standard queue and an SQS dead-letter queue (DLQ). Configure a redrive policy for the standard queue to send failed messages to the DLQ based on the price threshold. Use an Amazon EventBridge event to notify the company when a message is sent to the DLQ.

B.

Create an Amazon SNS topic and an Amazon SQS dead-letter queue (DLQ). Create a subscription and configure a redrive policy for the subscription to send failed messages to the DLQ when the transaction price is above the threshold. Use an Amazon CloudWatch alarm to notify the company when a message is sent to the DLQ.

C.

Create an Amazon SQS queue and an event source mapping with an AWS Lambda function. Use the body key in the Amazon SQS message record and a FilterCriteria object to process only the transactions that are above the threshold price. Configure an Amazon CloudWatch alarm to invoke the Lambda function to notify the company.

D.

Create an Amazon SNS topic. Include the MessageAttributes field to list attributes that describe the transaction, including the price. Subscribe the company to the SNS topic. Create a topic filter on the subscription for the MessageAttributes field. Use the numeric value range matching policy.

A developer is designing a serverless application that customers use to select seats for a concert venue. Customers send the ticket requests to an Amazon API Gateway API with an AWS Lambda function that acknowledges the order and generates an order ID. The application includes two additional Lambda functions: one for inventory management and one for payment processing. These two Lambda functions run in parallel and write the order to an Amazon DynamoDB table.

The application must provide seats to customers according to the following requirements. If a seat is accidentally sold more than once, the first order that the application received must get the seat. In these cases, the application must process the payment for only the first order. However, if the first order is rejected during payment processing, the second order must get the seat. In these cases, the application must process the payment for the second order.

Which solution will meet these requirements?

A.

Send the order ID to an Amazon SNS FIFO topic that fans out to one Amazon SQS FIFO queue for inventory management and another SQS FIFO queue for payment processing.

B.

Change the Lambda function that generates the order ID to initiate the Lambda function for inventory management. Then initiate the Lambda function for payment processing.

C.

Send the order ID to an Amazon SNS topic. Subscribe the Lambda functions for inventory management and payment processing to the topic.

D.

Deliver the order ID to an Amazon SQS queue. Configure the Lambda functions for inventory management and payment processing to poll the queue.

A developer manages a website that distributes its content by using Amazon CloudFront. The website ' s static artifacts are stored in an Amazon S3 bucket.

The developer deploys some changes and can see the new artifacts in the S3 bucket. However, the changes do not appear on the webpage that the CloudFront distribution delivers.

How should the developer resolve this issue?

A.

Configure S3 Object Lock to update to the latest version of the files every time an S3 object is updated.

B.

Configure the S3 bucket to clear all old objects from the bucket before new artifacts are uploaded.

C.

Set CloudFront to invalidate the cache after the artifacts have been deployed to Amazon S3.

D.

Set CloudFront to modify the distribution origin after the artifacts have been deployed to Amazon S3.

A developer wrote an application that uses an AWS Lambda function to asynchronously generate short videos based on requests from customers. This video generation can take up to 10 minutes. After the video is generated, a URL to download the video is pushed to the customer’s web browser. The customer should be able to access these videos for at least 3 hours after generation.

Which solution will meet these requirements?

A.

Store the video in the /tmp folder within the Lambda execution environment. Push a Lambda function URL to the customer.

B.

Store the video in an Amazon EFS file system attached to the function. Generate a presigned URL for the video object and push the URL to the customer.

C.

Store the video in Amazon S3. Generate a presigned URL for the video object and push the URL to the customer.

D.

Store the video in an Amazon CloudFront distribution. Generate a presigned URL for the video object and push the URL to the customer.

A company had an Amazon RDS for MySQL DB instance that was named mysql-db. The DB instance was deleted within the past 90 days. A developer needs to find which 1AM user or role deleted the DB instance in the AWS environment. Which solution will provide this information?

A.

Retrieve the AWS CloudTrail events for the resource mysql-db where the event name is DeleteDBInstance. Inspect each event.

B.

Retrieve the Amazon CloudWatch log events from the most recent log stream within the rds/mysql-db log group. Inspect the log events.

C.

Retrieve the AWS X-Ray trace summaries. Filter by services with the name mysql-db. Inspect the ErrorRootCauses values within each summary.

D.

Retrieve the AWS Systems Manager deletions inventory Filter the inventory by deletions that have a TypeName value of RDS. Inspect the deletion details.

A developer is writing an application that will provide data files to an external company. The external company needs to verify that the data is not modified in transit.

How can the developer use AWS KMS to prove the integrity of the transferred data?

A.

Encrypt the data by using a symmetric key. Provide the key to the external company.

B.

Sign the data by using a symmetric key. Provide the key to the external company.

C.

Sign the data by using the private key of an asymmetric key pair. Provide the public key to the external company.

D.

Sign the data by using the public key of an asymmetric key pair. Provide the private key to the external company.

A developer owns and supports an application that has database credentials stored in environment variables for AWS Lambda functions. The developer needs an alternate storage method for the credentials instead of using plaintext environment variables. Which solution will handle the credentials MOST securely?

A.

Store the database credentials as a secret in AWS Secrets Manager. Set the secret ' s Amazon Resource Name (ARN) as the value of an environment variable. Use the AWS Parameters and Secrets Lambda Extension to retrieve the credentials in the Lambda function.

B.

Use base64 encoding for the database credentials. Include the database credentials in the Lambda function ' s source code as part of a build process. Update the Lambda function ' s code to decode the credentials before the credentials are used.

C.

Store the database credentials as a string-type parameter in AWS Systems Manager Parameter Store. Set the parameter ' s Amazon Resource Name (ARN) as the value of an environment variable. Use the AWS Parameters and Secrets Lambda Extension to retrieve the credentials in the Lambda function.

D.

Use AWS CloudFormation to deploy the application. Ensure that the NoEcho property is set to true for the parameters that contain the database credentials.

A developer manages a serverless application that uses an AWS Lambda function. The application periodically interacts with an external API by using short-lived authentication keys . Currently, the developer embeds the authentication keys directly in the Lambda function code. This approach requires manual updates and introduces security risks and operational inefficiencies.

The developer needs a secure and automated solution for authentication key storage, retrieval, and rotation.

Which solution will meet these requirements?

A.

Store the authentication keys in AWS Secrets Manager. Configure the Lambda function to retrieve and cache the keys by using Lambda extensions.

B.

Store the authentication keys in an Amazon S3 bucket. Configure the Lambda function to retrieve the keys from the bucket during each invocation.

C.

Store the authentication keys in Lambda environment variables and manually update the values when needed.

D.

Store the authentication keys in AWS Systems Manager Parameter Store. Configure the Lambda function to retrieve the keys during every invocation.