Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified Developer - Associate Certification - Part 10

Mary Smith

Wed, 16 Jul 2025

AWS Certified Developer - Associate Certification - Part 10

1. A web application is using Amazon Kinesis Streams for clickstream data that may not be consumed for up to 12 hours. How can the Developer implement encryption at rest for data within the Kinesis Streams?

A) Enable SSL connections to Kinesis
B) Enable server-side encryption in Kinesis Streams
C) Use Amazon Kinesis Consumer Library
D) Encrypt the data once it is at rest with a Lambda function



2. A Developer needs to use AWS X-Ray to monitor an application that is deployed on EC2 instances. What steps have to be executed to perform the monitoring?

A) Deploy the X-Ray SDK with the application and use X-Ray annotation.
B) Deploy the X-Ray SDK with the application and instrument the application code.
C) Install the X-Ray daemon and configure it to forward data to Amazon CloudWatch Events.
D) Install the X-Ray daemon and instrument the application code.



3. A Developer is using AWS CLI, but when running list commands on a large number of resources, it is timing out. What can be done to avoid this time-out?

A) Use pagination
B) Use shorthand syntax
C) Use parameter values
D) Use quoting strings



4. A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol. What services can the Developer use to meet these requirements?

A) Amazon Cognito with MFA
B) Amazon DynamoDB to store MFA session data, and Amazon SNS to send MFA codes
C) AWS IAM with MFA enabled
D) AWS Directory Service



5. A Developer will be using the AWS CLI on a local development server to manage AWS services. What can be done to ensure that the CLI uses the Developer's IAM permissions when making commands?

A) Specify the Developer's IAM user name and password as parameters for each CLI command.
B) Run the
C) Specify the Developer's IAM access key ID and secret access key as parameters for each CLI command.
D) Use the Developer's IAM role when making the CLI command.



1. Right Answer: B
Explanation: Reference: https://aws.amazon.com/about-aws/whats-new/2017/07/amazon-kinesis-streams-introduces-server-side-encryption/

2. Right Answer: A
Explanation: Reference: https://aws.amazon.com/blogs/aws/category/aws-x-ray/

3. Right Answer: A
Explanation: Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-usage-pagination.html

4. Right Answer: C
Explanation: Reference: https://aws.amazon.com/iam/details/mfa/

5. Right Answer: B
Explanation: Reference: https://aws.amazon.com/premiumsupport/knowledge-center/iam-assume-role-cli/

0 Comments

Leave a comment