1. An application that runs on an Amazon EC2 instance needs to access and make API calls to multiple AWS services. What is the MOST secure way to provide access to the AWS services with MINIMAL management overhead?
A) Use AWS KMS to store and retrieve credentials. B) Use AWS root user to make requests to the application. C) Store and retrieve credentials from AWS CodeCommit. D) Use EC2 instance profiles.
2. A Developer is creating an AWS Lambda function to process a stream of data from an Amazon Kinesis Data Stream. When the Lambda function parses the data and encounters a missing field, it exits the function with an error. The function is generating duplicate records from the Kinesis stream. When the Developer looks at the stream output without the Lambda function, there are no duplicate records. What is the reason for the duplicates?
A) The Lambda function did not handle the error, and the Lambda service attempted to reprocess the data. B) The Lambda event source used asynchronous invocation, resulting in duplicate records. C) The Lambda function did not advance the Kinesis stream pointer to the next record after the error. D) The Lambda function is not keeping up with the amount of data coming from the stream.
3. A Developer is building a three-tier web application that should be able to handle a minimum of 5000 requests per minute. Requirements state that the web tier should be completely stateless while the application maintains session state for the users. How can session data be externalized, keeping latency at the LOWEST possible value?
A) Create an Amazon DynamoDB table, then implement session handling at the application level to leverage the table for session data storage B) Create an Amazon RDS instance, then implement session handling at the application level to leverage a database inside the RDS database instance for session data storage C) Create an Amazon ElastiCache Memcached cluster, then implement session handling at the application level to leverage the cluster for session data storage D) Implement a shared file system solution across the underlying Amazon EC2 instances, then implement session handling at the application level to leverage the shared file system for session data storage
4. An application under development is required to store hundreds of video files. The data must be encrypted within the application prior to storage, with a unique key for each video file. How should the Developer code the application?
A) Use a cryptography library to generate an encryption key for the application. Use the encryption key to encrypt the data. Store the encrypted data. B) Upload the data to an S3 bucket using server side-encryption with an AWS KMS key. C) Use the KMS D) Use the KMS
5. An e-commerce web application that shares session state on-premises is being migrated to AWS. The application must be fault tolerant, natively highly scalable, and any service interruption should not affect the user experience. What is the best option to store the session state?
A) Enable session stickiness using elastic load balancers B) Store the session state in Amazon CloudFront C) Store the session state in Amazon S3 D) Store the session state in Amazon ElastiCache
Leave a comment