What services can the Developer use to meet these requirements?
A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol. What services can the Developer use to meet these requirements?A . Amazon DynamoDB to store MFA session data, and Amazon SNS to send MFA codesB...
Which option has the highest read throughput?
A Developer is writing transactions into a DynamoDB table called “SystemUpdates” that has 5 write capacity units. Which option has the highest read throughput?A . Eventually consistent reads of 5 read capacity units reading items that are 4 KB in sizeB . Strongly consistent reads of 5 read capacity units...
What action can be taken to allow API customers to invalidate the API Cache?
A set of APIs are exposed to customers using the Amazon API Gateway. These APIs have caching enabled on the API Gateway. Customers have asked for an option to invalidate this cache for each of the APIs. What action can be taken to allow API customers to invalidate the API...
What is the MOST likely cause of this situation?
A Developer has created an S3 bucket s3://mycoolappand has enabled server across logging that points to the folder s3://mycoolapp/logs.The Developer moved 100 KB of Cascading Style Sheets (CSS) documents to the folder s3://mycoolapp/css, and then stopped work. When the developer came back a few days later, the bucket was 50...
What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams?
A Developer has created a software package to be deployed on multiple EC2 instances using IAM roles. What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams? (Choose two.)A . Use the AWS CLI to retrieve the IAM group.B . Query Amazon EC2 metadata...
How should the application authenticate with AWS services in production?
A Developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB. In the local development environment, the application has used IAM access keys. The application is now ready for deployment onto an ECS cluster. How should the application authenticate with AWS services in production?A...
How should the Developer identify the cause of the failures?
A company is using AWS CodeBuild to compile a website from source code stored in AWS CodeCommit. A recent change to the source code has resulted in the CodeBuild project being unable to successfully compile the website. How should the Developer identify the cause of the failures?A . Modify the...
For a deployment using AWS CodeDeploy, what is the run order of the hooks for in-place deployments?
For a deployment using AWS CodeDeploy, what is the run order of the hooks for in-place deployments?A . Before Install -> Application Stop -> Application Start -> After InstallB . Application Stop -> Before Install -> After Install -> Application StartC . Before Install -> Application Stop -> Validate Service...
Where should an Elastic Beanstalk configuration file named healthcheckur1.configbe placed in the application source bundle?
Where should an Elastic Beanstalk configuration file named healthcheckur1.configbe placed in the application source bundle?A . In the root of the applicationB . In the bin folderC . In healthcheckur1.config.ebextension under rootD . In the .ebextensions folderView AnswerAnswer: D Explanation: Reference: https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/ebextensions.html
What is the most scalable method to add the fraud detection solution to the order processing pipeline?
The Developer for a retail company must integrate a fraud detection solution into the order processing solution. The fraud detection solution takes between ten and thirty minutes to verify an order. At peak, the web site can receive one hundred orders per minute. What is the most scalable method to...