1. A Development team currently supports an application that uses an in-memory store to save accumulated game results. Individual results are stored in a database. As part of migrating to AWS, the team needs to use automatic scaling. The team knows this will yield inconsistent results. Where should the team store these accumulated game results to BEST allow for consistent results without impacting performance?
A) Amazon RDS B) Amazon Kinesis C) Amazon S3 D) Amazon ElastiCache
2. A company is creating an application that will require users to access AWS services and allow them to reset their own passwords. Which of the following would allow the company to manage users and authorization while allowing users to reset their own passwords?
A) Amazon Cognito user pools and identity pools B) Amazon Cognito identify pools and AWS STS C) Amazon Cognito user pools and AWS KMS D) Amazon Cognito identity pools and AWS IAM
3. A legacy service has an XML-based SOAP interface. The Developer wants to expose the functionality of the service to external clients with the Amazon API Gateway. Which technique will accomplish this?
A) Create a RESTful API with the API Gateway; transform the incoming JSON into a valid XML message for the SOAP interface using mapping templates. B) Create a RESTful API with the API Gateway; transform the incoming XML into a valid message for the SOAP interface using mapping templates. C) Create a RESTful API with the API Gateway; pass the incoming XML to the SOAP interface through an Application Load Balancer. D) Create a RESTful API with the API Gateway; pass the incoming JSON to the SOAP interface through an Application Load Balancer.
4. A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as Amazon or Facebook. The APIs should allow access based on a custom authorization model. Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs?
A) Build a OpenID token broker with Amazon and Facebook. Users will authenticate with these identify providers and pass the JSON Web Token to the API to authenticate each API call. B) Store user credentials in Amazon DynamoDB and have the application retrieve temporary credentials from AWS STS. Make API calls by passing user credentials to the APIs for authentication and authorization. C) Use Amazon Cognito user pools and a custom authorizer to authenticate and authorize users based on JSON Web Tokens. D) Use Amazon RDS to store user credentials and pass them to the APIs for authentications and authorization.
5. An application overwrites an object in Amazon S3, and then immediately reads the same object. Why would the application sometimes retrieve the old version of the object?
A) The application needs to add extra metadata to label the latest version when uploading to Amazon S3. B) S3 overwrite PUTS are eventually consistent, so the application may read the old object. C) The application needs to explicitly specify latest version when retrieving the object. D) All S3 PUTS are eventually consistent, so the application may read the old object.
Leave a comment