we provide 100% Correct Amazon AWS-Certified-Developer-Associate simulations which are the best for clearing AWS-Certified-Developer-Associate test, and to get certified by Amazon AWS Certified Developer Associate. The AWS-Certified-Developer-Associate Questions & Answers covers all the knowledge points of the real AWS-Certified-Developer-Associate exam. Crack your Amazon AWS-Certified-Developer-Associate Exam with latest dumps, guaranteed!
Q31. Your manager has requested you to tag EC2 instances to orgAMze and manage a load balancer. Which of the following statements about tag restrictions is incorrect?
A. The maximum key length is 127 Unicode characters.
B. The maximum value length is 255 Unicode characters.
C. Tag keys and values are case sensitive.
D. The maximum number of tags per load balancer is 20.
Answer: D
Explanation:
Tags help you to categorize your load balancers in different ways, for example, by purpose, owner, or environment. The following basic restrictions apply to tags: The maximum number of tags per resource is
10. The maximum key length is 127 Unicode characters. The maximum value length that can be used is 255 Unicode characters. The tag keys and values are case sensitive. Allowed characters are letters, spaces, and numbers representable in UTF-8, plus the following special characters: + - =. _ : / @. Do not use leading or trailing spaces. Do not use the aws: prefix in your tag names or values because it is reserved for AWS use. You can't edit or delete tag names or values with this prefix. Tags with this prefix do not count against your tags per resource limit.
Reference:
http://docs.aws.amazon.com/EIasticLoadBaIancing/latest/DeveIoperGuide/add-remove-tags.htmI#tag-res trictions
Q32. Can you configure an RDS Read Replica using CIoudFormation templates?
A. Yes, provided that you have root access.
B. Yes, when you create a new CIoudFormation template
C. Yes, but not for all Regions.
D. No, you can add the ReadRepIica only when the resource is made available by CIoudFormation
Answer: B
Explanation:
AWS CIoudFormation gives developers and systems administrators an easy way to create and manage collections of AWS resources. You can now set Read Replicas for your databases with RDS when you create a new C|oudFormation tempIate.You can start using it with the sample template of C|oudFormation.
Reference:
https://s3.amazonaws.com/cloudformation-templates-us-east-1/RDS_MySQL_With_Read_RepIica.tempI
Q33. A user has attached one RDS security group with 5 RDS instances. The user has changed the ingress rule for the security group. What will be the initial status of the ingress rule?
A. Approving
B. Implementing
C. Authorizing
D. It is not possible to assign a single group to multiple DB instances
Answer: C
Explanation:
When the user makes any changes to the RDS security group the rule status will be authorizing for some time until the changes are applied to all instances that the group is connected with. Once the changes are propagated the rule status will change to authorized.
Reference: http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithSecurityGroups.html
Q34. A user has created a new raw EBS volume. The user mounts the volume on the instance to which it is attached. Which of the below mentioned options is a required step before the user can mount the volume?
A. Run a cyclic check on the device for data consistency
B. Create a file system of the volume
C. No step is required. The user can directly mount the device
D. Resize the volume as per the original snapshot size
Answer: B
Explanation:
When a user is trying to mount a blank EBS volume, it is required that the user first creates a file system within the volume.
Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-using-volumes.htmI
Q35. A user has launched an EC2 instance and installed a website with the Apache webserver. The webserver is running but the user is not able to access the website from the internet. What can be the possible reason for this failure?
A. The security group of the instance is not configured properly.
B. The instance is not configured with the proper key-pairs.
C. The Apache website cannot be accessed from the internet.
D. Instance is not configured with an elastic IP.
Answer: A
Explanation:
In Amazon Web Services, when a user has configured an instance with Apache, the user needs to ensure that the ports in the security group are opened as configured in Apache config. E.g. If Apache is running on port 80, the user should open port 80 in the security group.
Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
Q36. A user has set an IAM policy where it allows all requests if a request from IP 10.10.10.1/32. Another policy allows all the requests between 5 PM to 7 PM. What will happen when a user is requesting access from IP 10.10.10.1/32 at 6 PM?
A. IAM will throw an error for policy conflict
B. It is not possible to set a policy based on the time or IP
C. It will deny access
D. It will allow access
Answer: D
Explanation:
With regard to IAM, when a request is made, the AWS service decides whether a given request should be allowed or denied. The evaluation logic follows these rules:
By default, all requests are denied. (In general, requests made using the account credentials for resources in the account are always allowed.)
An explicit allow policy overrides this default. An explicit deny policy overrides any allows. Reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/AccessPoIicyLanguage_EvaIuationLogic.htmI
Q37. In AWS Elastic Beanstalk, if the application returns any response other than 200 ,OK or there is no response within the configured InactMtyTimeout period, .
A. SQS once again makes the message visible in the queue and available for another attempt at processing
B. SQS waits for another timeout
C. SQS run DeIeteMessagecaII and deletes the message from the queue
D. SQS sends a message to the application with the lVIessageID and pending status
Answer: A
Explanation:
In AWS Elastic Beanstalk, if the application returns any response other than 200, OK or there is no response within the configured InactMtyTimeout period, SQS once again makes the message visible in the queue and available for another attempt at processing.
Reference:
http://docs.aws.amazon.com/elasticbeanstaIk/latest/dg/using-features-managing-env-tiers.htmI#worker-e nviron
Q38. ExamKiIIer (with AWS account ID H1122223333) has created 50 IAM users for its orgAMzation’s employees. ExamKiIIer wants to make the AWS console login URL for all IAM users as: https:// examkiI|er.signin.aws.amazon.com/conso|e/. How can this be configured?
A. Create a bucket with the name ExamKiI|er and map it with the IAM alias
B. It is not possible to have capital letters as a part of the alias name
C. The user needs to use Route 53 to map the ExamKiIIer domain and IAM URL
D. For the AWS account, create an alias ExamKiIIer for the IAM login
Answer: B
Explanation:
If a user wants the URL of the AWS IAM sign-in page to have the company name instead of the AWS
account ID, he can create an alias for his AWS account ID. The alias must be unique across all Amazon Webservices products and contain only digits, lowercase letters, and hyphens.
Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/AccountAIias.html
Q39. In DynamoDB, if you create a table and request 10 units of write capacity and 200 units of read capacity of provisioned throughput, how much would you be charged in US East (Northern Virginia) Region?
A. $0.05 per hour
B. $0.10 per hour
C. $0.03 per hour
D. $0.15 per hour
Answer: A
Explanation:
To understand pricing in DynamoDB, consider the following example. If you create a table and request 10 units of write capacity and 200 units of read capacity of provisioned throughput, you would be charged:
$0.01 + (4 x $0.01) = $0.05 per hour
Reference: http://aws.amazon.com/dynamodb/pricing/
Q40. A user is trying to create a list of IAM users with the AWS console. When the IAM users are created which of the below mentioned credentials will be enabled by default for the user?
A. IAM access key and secret access key
B. IAM X.509 certificates
C. Nothing. Everything is disabled by default
D. IAM passwords
Answer: C
Explanation:
Newly created IAM users have no password and no access key (access key ID and secret access key). If the user needs to administer your AWS resources using the AWS Management Console, you can create
a password for the user. If the user needs to interact with AWS programmatically (using the command line interface (CLI), the AWS SDK, or service-specific APIs), you can create an access key for that user. The credentials you create for users are what they use to uniquely identify themselves to AWS.
Reference: http://docs.aws.amazon.com/IAM/|atest/UserGuide/Using_WorkingWithGroupsAndUsers.htmI