Which implementation below would work while maintaining maximum uptime?

A Developer is asked to implement a caching layer in front of Amazon RDS. Cached content is expensive to regenerate in case of service failure. Which implementation below would work while maintaining maximum uptime?A . Implement Amazon ElastiCache Redis in Cluster ModeB . Install Redis on an Amazon EC2 instance.C...

August 25, 2020 No Comments READ MORE +

How can thumbnail generation be added to the application, meeting user requirements while minimizing changes to existing code?

An existing serverless application processes uploaded image files. The process currently uses a single Lambda function that takes an image file, performs the processing, and stores the file in Amazon S3. Users of the application now require thumbnail generation of the images. Users want to avoid any impact to the...

August 24, 2020 No Comments READ MORE +

What is the MOST likely cause of the problem?

A company has written a Java AWS Lambda function to be triggered whenever a user uploads an image to an Amazon S3 bucket. The function converts the original image to several different formats and then copies the resulting images to another Amazon S3 bucket. The Developers find that no images...

August 24, 2020 No Comments READ MORE +

How can the Developer implement encryption at rest for data within the Kinesis Streams?

A web application is using Amazon Kinesis Streams for clickstream data that may not be consumed for up to 12 hours. How can the Developer implement encryption at rest for data within the Kinesis Streams?A . Enable SSL connections to KinesisB . Use Amazon Kinesis Consumer LibraryC . Encrypt the...

August 23, 2020 No Comments READ MORE +

Which approach should the Developer use to handle this change?

A company is using Amazon API Gateway to manage access to a set of microservices implemented as AWS Lambda functions. Following a bug report, the company makes a minor breaking change to one of the APIs. In order to avoid impacting existing clients when the new API is deployed, the...

August 23, 2020 No Comments READ MORE +

Which AWS service should be used to meet these requirements?

A Developer is creating a mobile application with a limited budget. The solution requires a scalable service that will enable customers to sign up and authenticate into the mobile application while using the organization’s current SAML 2.0 identity provider. Which AWS service should be used to meet these requirements?A ....

August 23, 2020 No Comments READ MORE +

How can the Developer ensure that all traffic to the S3 bucket is encrypted?

An application running on EC2 instances is storing data in an S3 bucket. Security policy mandates that all data must be encrypted in transit. How can the Developer ensure that all traffic to the S3 bucket is encrypted?A . Install certificates on the EC2 instances.B . Create a bucket policy...

August 22, 2020 No Comments READ MORE +

A company wants to migrate its web application to AWS and leverage Auto Scaling to handle pear workloads. The Solutions Architect determined that the best metric for an Auto Scaling event is the number of concurrent users. Based on this information, what should the Developer use to autoscale based on concurrent users?

A company wants to migrate its web application to AWS and leverage Auto Scaling to handle pear workloads. The Solutions Architect determined that the best metric for an Auto Scaling event is the number of concurrent users. Based on this information, what should the Developer use to autoscale based on...

August 22, 2020 No Comments READ MORE +

How can this deployment be automated, based on these requirements?

A Developer has written a serverless application using multiple AWS services. The business logic is written as a Lambda function which has dependencies on third-party libraries. The Lambda function endpoints will be exposed using Amazon API Gateway. The Lambda function will write the information to Amazon DynamoDB. The Developer is...

August 22, 2020 No Comments READ MORE +

How can this be accomplished?

A game stores user game data in an Amazon DynamoDB table. Individual users should not have access to other users’ game data. How can this be accomplished?A . Encrypt the game data with individual user keys.B . Restrict access to specific items based on certain primary key values.C . Stage...

August 22, 2020 No Comments READ MORE +