Which of the following are valid arguments for an SNS Publish request? Choose 3 answers A. TopicAm
B. Subject
C. Destination
D. Format
E. Message
F. Language
A developer at a company recently created a serverless application to process and show data from business reports. The application's user interface (Ul) allow users to select and start processing the files. The Ul displays a message when the result is available to view. The application uses AWS Step Functions with A Lambda functions "to process the files. The developer used Amazon API Gateway and Lambda functions to create an API to support the Ul.
The company's Ul team reports that the request to process a file is often returning timeout errors because of the size or complexity of the files. The Ul team w< API to provide an immediate response so that the Ul can display a message while the files are being processed. The backend process that is invoked by the A needs to send an email message when the report processing is complete.
What should the developer do to configure the API to meet these requirements?
A. Change the API Gateway route to add an X-Amz-lnvocation-Type header with a static value of 'Event' in the integration request. Deploy the API Gatt stage to apply the changes.
B. Change the configuration of the Lambda function that implements the request to process a file. Configure the maximum age of the event so that the Lambda function will run asynchronously.
C. Change the API Gateway timeout value to match the Lambda function timeout value. Deploy the API Gateway stage to apply the changes.
D. Change the API Gateway route to add an X-Amz-Target header with a static value of 'Async' in the integration request. Deploy the API Gateway stag apply the changes.
A Developer has created a software package to be deployed on multiple EC2 instances using IAM roles.
What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams? (Select TWO.)
A. Use the AWS CLI to retrieve the IAM group.
B. Query Amazon EC2 metadata for in-line IAM policies.
C. Request a token from AWS STS, and perform a describe action.
D. Perform a get action using the ?dry-run argument.
E. Validate the IAM role policy with the IAM policy simulator.
A Developer has a stateful web server on-premises that is being migrated to AWS. The Developer must have greater elasticity in the new design. How should the Developer re-factor the application to make it more elastic? (Choose two.)
A. Use pessimistic concurrency on Amazon DynamoDB
B. Use Amazon CloudFront with an Auto Scaling group
C. Use Amazon CloudFront with an AWS Web Application Firewall
D. Store session state data in an Amazon DynamoDB table
E. Use an ELB with an Auto Scaling group
Which of the following is chosen as the default region when making an API call with an AWS SDK?
A. ap-northeast-1
B. us-west-2
C. us-east-1
D. eu-west-1
E. us-central-1
A developer is implementing authentication and authorization for an application. The developer needs to ensure that the user credentials are never exposed. Which approach should the developer take to meet this requirement?
A. Store the user credentials In Amazon DynamoDB Build an AWS Lambda function to validate the credentials and authorize users
B. Deploy a custom authentication and authorization API on an Amazon EC2 instance. Store the user credentials in Amazon S3 and encrypt the credentials using Amazon S3 server-side encryption.
C. Use Amazon Cognito to configure a user pool, and use the Cognito API to authenticate and authorize the user
D. Store the user credentials In Amazon RDS Enable the encryption option for the Amazon RDS D8 instances Build an API using AWS Lambda to validate the credentials and authorize users
An application takes longer than expected to process an Amazon SQS message.
What should the developer do to the application so that other instances do not pick up the same message?
A. Make a ReceiveMessage call to get the same message again from the queue
B. Issue a DeleteMessage call to delete the message from the queue
C. Use SendMessage to pass the message to the dead letter queue
D. Send a ChangeMessageVisibility call to extend VisibilityTimeout
A developer has created a Node.js web application on a local development machine. The developer wants to use AWS technology to host the website. The developer needs a solution that requires the least possible operational overhead and no code changes.
Which AWS service should the developer use to meet these requirements?
A. AWS Elastic Beanstalk
B. Amazon EC2
C. AWS Lambda
D. Amazon Elastic Kubernetes Service (Amazon EKS)
An organization is using Amazon API Gateway to provide a public API called “Survey” for collecting user feedback posts about its products. The survey API has “DEV” and “PROD” stages and consists of one resource “/feedback” which allows users to retrieve/create/update single feedback posts.
A version-controlled Swagger file is used to define a new API that retrieves multiple feedback posts. To add the new API resource “/listFeedbackForProduct” the developer makes changes to the Swagger file defining an API, uploads the file to the organization's version control system, and uses the API Gateway Import API feature to apply the changes to the Survey API. After successful import, the developer runs the tests against the DEV stage and finds that resource “/listFeedbackForProduct” is not available.
What is MOST likely the reason for resource not being available?
A. Even though the Swagger import was successful, resource creation failed afterwards.
B. There is a propagation delay of several minutes in creating API Gateway resources after import.
C. The developer needs to restart the API Gateway stage after import in order to apply the changes.
D. The developer needs to create a new deployment after import in order to deploy the changes.
A company maintains an application that uses an Amazon RDS DB instance for its database. A developer needs to implement encryption at rest for the database. Which combination of steps should the developer take to meet this requirement? (Choose two.)
A. Enable encryption on the DB instance in the AWS Management Console.
B. Stop the DB instance.
C. Restore the DB instance from the encrypted snapshot.
D. Take a snapshot of the DB instance, and create an encrypted copy of the snapshot.
E. Create a customer managed key in AWS Key Management Service (AWS KMS).