Amazon DVA-C01 AWS Certified Developer – Associate Online Training
Amazon DVA-C01 Online Training
The questions for DVA-C01 were last updated at Jul 12,2025.
- Exam Code: DVA-C01
- Exam Name: AWS Certified Developer – Associate
- Certification Provider: Amazon
- Latest update: Jul 12,2025
A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available.
Which of the following could create this situation? (Select two.)
- A . The traces are reaching X-Ray, but the Developer does not have access to view the records.
- B . The X-Ray daemon is not installed on the EC2 instance.
- C . The X-Ray endpoint specified in the application configuration is incorrect.
- D . The instance role does not have “xray:BatchGetTraces” and “xray:GetTraceGraph” permissions.
- E . The instance role does not have “xray:PutTraceSegments” and “xray:PutTelemetryRecords” permissions.
A developer Is designing an AWS Lambda function that create temporary files that are less than 10 MB during execution. The temporary files will be accessed and modified multiple times during execution. The developer has no need to save or retrieve these files in the future.
Where should the temporary file be stored?
- A . the /tmp directory
- B . Amazon EFS
- C . Amazon EBS
- D . Amazon S3
A Developer is writing a REST service that will add items to a shopping list. The service is built on Amazon API Gateway with AWS Lambda integrations. The shopping list items are send as query string parameters in the method request.
How should the Developer convert the query string parameters to arguments for the Lambda function?
- A . Enable request validation
- B . Include the Amazon Resource Name (ARN) of the Lambda function
- C . Change the integration type
- D . Create a mapping template
A Developer wants to encrypt new objects that are being uploaded to an Amazon S3 bucket by an application. There must be an audit trail of who has used the key during this process. There should be no change to the performance of the application.
Which type of encryption meets these requirements?
- A . Server-side encryption using S3-managed keys
- B . Server-side encryption with AWS KMS-managed keys
- C . Client-side encryption with a client-side symmetric master key
- D . Client-side encryption with AWS KMS-managed keys
A Developer has developed a web application and wants to deploy it quickly on a Tomcat
server on AWS. The Developer wants to avoid having to manage the underlying infrastructure.
What is the easiest way to deploy the application, based on these requirements?
- A . AWS CloudFormation
- B . AWS Elastic Beanstalk
- C . Amazon S3
- D . AWS CodePipeline
A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances. The application uses attached Amazon EBS disks for storing data. The application will process sensitive information and all the data must be encrypted.
What should a developer do to ensure the data is encrypted on disk without impacting performance?
- A . Configure the Amazon EC2 instance fleet to use encrypted EBS volumes for storing data
- B . Add logic to write all data to an encrypted Amazon S3 bucket
- C . Add a custom encryption algorithm to the application that will encrypt and decrypt all data
- D . Create a new Amazon Machine Image (AMI) with an encrypted root volume and store the data to ephemeral disks.
A Developer is creating an application that needs to locate the public IPv4 address of the Amazon EC2 instance on which it runs .
How can the application locate this information?
- A . Get the instance metadata by retrieving http://169.254.169.254/latest/metadata/.
- B . Get the instance user data by retrieving http://169.254.169.254/latest/userdata/.
- C . Get the application to run IFCONFIG to get the public IP address.
- D . Get the application to run IPCONFIG to get the public IP address.
Which of the following are good use cases for how Amazon ElastiCache can help an application? (Select TWO.)
- A . Improve the performance of S3 PUT operations
- B . Improve the latency of deployments performed by AWS CodeDeploy
- C . Improve latency and throughput for read-heavy application workloads.
- D . Reduce the time required to merge AWS CodeCommit branches
- E . Improve performance of compute-intensive applications.
Where should the appspec.yml file be placed in order for AWS CodeDeploy to work?
- A . In the root of the application source code directory structure
- B . In the bin folder along with all the complied code
- C . In an S3 bucket
- D . In the same folder as the application configuration files
Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser.
What should Company D do to prevent the web fonts from being blocked by the browser?
- A . Enable versioning on the cdfonts bucket for each web font
- B . Create a policy on the cdfonts bucket to enable access to everyone
- C . Add the Content-MD5 header to the request for webfonts in the cdfonts bucket from the website
- D . Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration