Show All Posts

You can translate the content of this page by selecting a language in the select box.

  • Free IQ Test Questions and Answers - Train Your Brain What are the top 100 Free IQ Test Questions and Answers – Train and Elevate Your Brain - What are the top 100 Free IQ Test Questions and Answers - Train and Elevate Your Brain. Mensa IQ tests are among the most popular intelligence tests in the world. But what are they for? In this blog post, we'll be discussing the different Mensa IQ tests and what they're meant to assess. 1. The first Mensa IQ test is called the Culture Fair Intelligence Test, or CFIT. This test is designed to minimize the influence of cultural biases on a person's score. The CFIT is made up of four subtests, each of which measures a different type of cognitive ability. 2. The second Mensa IQ test is called the Stanford-Binet Intelligence Scale, or SBIS. The SBIS is a revision of an earlier intelligence test that was used by the US military to screen recruits during World War I. Today, the SBIS is commonly used to diagnose learning disabilities in children. 3. The third Mensa IQ test is called the Universal Nonverbal Intelligence Test, or UNIT. As its name suggests, the UNIT is a nonverbal intelligence test that can be administered to people of all ages, regardless of their native language. 4. The fourth and final Mensa IQ test is called the Wright Scale of Human Ability, or WSHA. The WSHA was developed by William Herschel Wright, a British psychologist who also served as the first president of Mensa International. Like the other tests on this list, the WSHA consists of four subtests that measure different aspects of cognitive ability.
  • How to find common elements in two unsorted arrays with sizes n and m avoiding double for loop? Blog Introduction: In this blog post, we will be discussing how to find common elements in two unsorted arrays with sizes n and m avoiding double for loop. We will be discussing various methods that can be used to solve this problem and comparing the time complexity of each method. Blog Body: Method 1: Linear Search The first method we will discuss is linear search. This method involves iterating through both arrays and comparing each element. If the element is found in both arrays, it is added to the result array. The time complexity of this method is O(nm), where n is the size of the first array and m is the size of the second array. Method 2: HashMap Method The second method we will discuss is the HashMap method. This method involves creating a HashMap of all the elements in the first array. Then, we iterate through the second array and check if the elements are present in the HashMap. If they are, we add them to the result array. The time complexity of this method is O(n+m), where n is the size of the first array and m is the size of the second array. Method 3: Sort andCompare Method The third method we will discuss is the Sort and Compare Method. This method involves sorting both arrays using any sorting algorithm like merge sort or quick sort. Once both arrays are sorted, we compare each element of both arrays one by one until we find a match. If a match is found, we add it to our result array. The time complexity of this method is O(nlogn+mlogm), where n is the size of the first array and m is the size of the second array. Conclusion: In this blog post, we discussed how to find common elements in two unsorted arrays with sizes n and m avoiding double for loop. We discussed three different methods that can be used to solve this problem and compared their time complexities. We hope that this blog post was helpful in understanding how to solve this problem.  How to find common elements in two unsorted arrays with sizes n and m avoiding double for loop? - How to find common elements in two unsorted arrays with sizes n and m avoiding double for loop? One of the most straight forward ways to find common elements in two arrays is by using a double for loop. This approach is simple to understand and implement but it is not very efficient. The time complexity of this algorithm is O(n*m) where n and m are the size of the two arrays respectively. The reason for this is because we are looping through both arrays completely which takes a lot of time. Furthermore, this approach also uses a lot of extra space because we are storing the common elements in a new list.
  • As a data scientist, it's important to understand the difference between simple linear regression, multiple linear regression, and MANOVA. This will come in handy when you're working with different datasets and trying to figure out which one to use. Here's a quick overview of each method: Simple Linear Regression vs. Multiple Linear Regression vs. MANOVA: A Data Scientist’s Guide - Simple Linear Regression vs. Multiple Linear Regression vs. MANOVA: A Data Scientist's Guide As a data scientist, it's important to understand the difference between simple linear regression, multiple linear regression, and MANOVA. This will come in handy when you're working with different datasets and trying to figure out which one to use. Here's a quick overview of each method:
  • Proxy vs VPN What’s the difference between a proxy and a VPN and why is one security stronger than the other? Which security feature is stronger and why? - What's the difference between a proxy and a VPN and why is one security stronger than the other? Which security feature is stronger and why? In the digital age, proxy servers and VPNs have become increasingly popular as people strive to protect their online privacy and security. But what exactly are these two devices, and how do they differ? A proxy server is a computer that acts as an intermediary between your device and the internet. When you connect to the internet through a proxy, your data is routed through the proxy server before it reaches its destination. This allows you to mask your IP address and remain anonymous online. VPNs, on the other hand, encrypt your data before it leaves your device. This creates a private tunnel that cannot be accessed by anyone except for you and the VPN server. As a result, VPNs offer a higher level of security than proxy servers. However, proxy servers are typically faster and more reliable than VPNs, making them a good choice for online activities that don't require a high level of security, such as web browsing or streaming video.
  • AWS Certified Cloud Practitioner Exam Preparation What are the Top 10 AWS jobs you can get with an AWS certification in 2022 plus AWS Interview Questions - What are the Top 10 AWS jobs you can get with an AWS certification in 2022 plus AWS Interview Questions. AWS certified professionals are in high demand across a variety of industries. AWS certs can open the door to a number of AWS jobs, including cloud engineer, solutions architect, and DevOps engineer. Here are the top 10 AWS jobs you can get with an AWS certification. 1. Cloud Engineer: Cloud engineers are responsible for designing, implementing, and managing cloud solutions. They work with customers to understand their needs and then design and implement the best cloud solution for their business. 2. Solutions Architect: Solutions architects work with customers to understand their business needs and then design and implement AWS solutions that meet those needs. They must have a deep understanding of AWS services and how they can be used to solve customer problems. 3. DevOps Engineer: DevOps engineers are responsible for developing and maintaining AWS infrastructure. They work closely with developers to ensure that code is deployed quickly and efficiently. They also work with operations teams to ensure that AWS infrastructure is scalable and reliable. 4. System Administrator: System administrators are responsible for managing AWS systems. They work with customers to provision and configure AWS resources, and they also monitor and troubleshoot AWS systems. 5. Database Administrator: Database administrators are responsible for designing, implementing, and maintaining databases on AWS. They work closely with developers to ensure that data is stored securely and efficiently. They also work with operations teams to ensure that database systems are highly available and scalable. 6. Network Administrator: Network administrators are responsible for designing, implementing, and managing networking solutions on AWS. They work closely with customers to understand their networking needs and then design and implement the best solution for their business. 7. Security Engineer: Security engineers are responsible for designing, implementing, and managing security solutions on AWS. They work closely with customers to understand their security needs and then design and implement the best security solution for their business. 8. Support Engineer: Support engineers are responsible for providing technical support to AWS customers. They work closely with customers to troubleshoot problems and provide resolution within agreed upon SLAs. 9 Sales Engineer: Sales engineers are responsible for working with sales teams to generate new business opportunities through the use of AWS products and services .They must have a deep understanding of AWS products and how they can be used by potential customers to solve their business problems .
  • What are the Top 5 things that can say a lot about a software engineer or programmer's quality? What are the Top 5 things that can say a lot about a software engineer or programmer’s quality? - What are the Top 5 things that can say a lot about a software engineer or programmer's quality? When it comes to the quality of a software engineer or programmer, there are a few key things that can give you a good indication. First, take a look at their code quality. A good software engineer will take pride in their work and produce clean, well-organized code. They will also be able to explain their code concisely and confidently. Another thing to look for is whether they are up-to-date on the latest coding technologies and trends. A good programmer will always be learning and keeping up with the latest industry developments. Finally, pay attention to how they handle difficult problems. A good software engineer will be able to think creatively and come up with innovative solutions to complex issues. If you see these qualities in a software engineer or programmer, chances are they are of high quality.
  • Man in the middle attacks How to Protect Yourself from Man-in-the-Middle Attacks: Tips for Safer Communication - How to Protect Yourself from Man-in-the-Middle Attacks: Tips for Safer Communication Man-in-the-middle attacks are one of the most common types of cyberattacks. They occur when a attacker intercepts communication between two parties and impersonates one or both of them. This can allow the attacker to gain access to sensitive information, such as passwords or financial data. Man-in-the-middle attacks can be very difficult to detect, but there are some steps you can take to protect yourself. First, be aware of the warning signs of a man-in-the-middle attack. These include unexpected changes in login pages, unexpected requests for personal information, and unusual account activity. If you see any of these warning signs, do not enter any sensitive information and contact the company or individual involved immediately. Second, use strong security measures, such as two-factor authentication, to protect your accounts. This will make it more difficult for attackers to gain access to your information. Finally, keep your software and operating system up to date with the latest security patches. This will help to close any potential vulnerabilities that could be exploited by attackers. By following these tips, you can help to keep yourself safe from man-in-the-middle attacks.
  • Summary of Machine Learning and Artificial Intelligence Capabilities What is Problem Formulation in Machine Learning and Top 4 examples of Problem Formulation in Machine Learning? - What is Problem Formulation in Machine Learning and Top 4 examples of Problem Formulation in Machine Learning? Problem formulation is an essential part of the machine learning pipeline. Machine learning problems can be classified into four types: regression, classification, clustering, and ranking. Each type of problem has its own set of challenges and requires a different approach. For example, regression problems involve predicting a continuous value, such as the price of a stock, while classification problems involve predicting a discrete label, such as whether an email is spam or not. Clustering problems involve grouping data points into clusters, while ranking problems involve ordering data points from most to least similar. In each case, the goal is to find a model that can generalize from the training data to the test data. The choice of model will depend on the type of problem and the nature of the data. For instance, linear models are often used for regression problems, while decision trees are often used for classification problems. The challenge in machine learning is to find a model that performs well on the training data but also generalizes well to unseen data. This is where problem formulation comes in. By carefully defining the problem and choosing an appropriate model, we can increase the chances of finding a solution that works well in practice.
  • What are the Greenest or Least Environmentally Programming Languages? What are the Greenest or Least Environmentally Friendly Programming Languages? - What are the Greenest or Least Environmentally Friendly Programming Languages? Are you looking for a new programming language to learn? If you're interested in something that is both green and energy efficient, you might want to consider the Groeningen Programming Language (GPL). Developed by a team of researchers at the University of Groningen in the Netherlands, GPL is a relatively new language that is based on the C and C++ programming languages. Python and Rust are also used in its development. GPL is designed to be used for developing energy efficient applications. Its syntax is similar to other popular programming languages, so it should be relatively easy for experienced programmers to learn. And since it's open source, you can download and use it for free. So why not give GPL a try? It just might be the perfect language for your next project.
  • What are the top 10 biggest lessons you have learned from the corporate world? Why is there a lack of diversity among software engineers in tech companies in USA and Canada? - Why is there a lack of diversity among software engineers in tech companies in USA and Canada? Technology is a rapidly growing industry with a huge demand for qualified software engineers. However, there is a lack of diversity among software engineers in tech companies in the USA and Canada. Women and minorities are greatly underrepresented in the field of software engineering. This is due to several factors, including the misogynistic and racist culture of many tech companies. The lack of diversity among software engineers has a negative impact on the quality of products and services offered by tech companies. It also limits the ability of these companies to innovate and serve a wide range of customers. In order to increase diversity among software engineers, tech companies need to change their hiring practices and create an inclusive environment that values all types of people.
  • Proxy vs VPN How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us? - How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us? Machine learning is a field of artificial intelligence (AI) concerned with the design and development of algorithms that learn from data. Machine learning algorithms have been used for a variety of tasks, including voice recognition, image classification, and spam detection. In recent years, there has been growing concern about the use of machine learning for surveillance and spying. However, it is important to note that machine learning is not necessarily synonymous with spying. Machine learning algorithms can be used for good or ill, depending on how they are designed and deployed. When it comes to voice-activated assistants such as Siri, Alexa, and OK Google, the primary concern is privacy. These assistants are constantly listening for their wake words, which means they may be recording private conversations without the user's knowledge or consent. While it is possible that these recordings could be used for nefarious purposes, it is also important to remember that machine learning algorithms are not perfect. There is always the possibility that recordings could be misclassified or misinterpreted. As such, it is important to weigh the risks and benefits of using voice-activated assistants before making a decision about whether or not to use them.
  • Machine Learning For Dummies What are some jobs or professions that have become or will soon become obsolete due to technology, automation, and artificial intelligence? - Technology, automation, and artificial intelligence are changing the world as we know it. They are making some jobs obsolete and giving rise to new professions. For example, machine learning is automating many tasks that were previously done by human beings, such as data entry and analysis. As a result, many jobs that require these skills are disappearing. In their place, new jobs are being created for people who can code algorithms and train machine learning models. Similarly, artificial intelligence is changing the landscape of many professions. It is being used to automate tasks such as customer service, financial analysis, and even medical diagnosis. As a result, many jobs that have traditionally relied on human expertise are now being performed by machines. While this change can be disruptive, it also opens up new opportunities for people with the right skills.
  • What are some good datasets for Data Science and Machine Learning? What are some good datasets for Data Science and Machine Learning? - What are some good datasets for Data Science and Machine Learning? A dataset is a collection of data, usually presented in tabular form. Good datasets for Data Science and Machine Learning are typically those that are well-structured (easy to read and understand) and large enough to provide enough data points to train a model. The best datasets are often those that are open and freely available - such as the popular Iris dataset. However, there are also many commercial datasets available for purchase. In general, good datasets for Data Science and Machine Learning should be: - Well-structured - Large enough to provide enough data points - Open and freely available whenever possible
  • Top Programming Books What is the single most influential book every Programmers should read - What is the single most influential book every Programmers should read As a programmer, you are constantly learning new technologies and skills. But what is the one book that you should read to help you become a better programmer? That's a tough question, but we're here to help. Keep reading to find out the most influential book for programmers.
  • Software Engineers Hobbies What are popular hobbies among Software Engineers? - Software engineers are a unique bunch. They're passionate about their work and love to spend their free time tinkering with code. But what are they like outside of work? What are some of their favorite hobbies? We took a look at some popular pastimes among software engineers and compiled a list for you. Check it out!
  • Self Driving Cars Programming language - Misra C Programming Languages used for Autopilot in Self Driving Cars like Tesla, Audi, BMW, Mercedes Benz, Volvo, Infiniti - Most self-driving cars on the market today use C programming language for their vehicle software. This is because C is a very robust and stable language that can be trusted for mission-critical applications. In addition, C is relatively easy to learn and has a wide range of features that make it well suited for automotive applications. However, there are some drawbacks to using C for self-driving cars. First, it is not a very concise language, so the code can be quite long and difficult to read. Second, C does not have built-in support for object-oriented programming, which is becoming increasingly important in the world of autonomous vehicles. As a result, many carmakers are starting to explore other languages for their autopilot systems, such as Java and Python.
  • Google Interview Questions and Answers Google interview questions for various roles and How to Ace the Google Software Engineering Interview? - Google is one of the most sought-after employers in the world, known for their cutting-edge technology and innovative products. If you're lucky enough to land an interview with Google, you can expect to be asked some challenging questions. Google is known for their brainteasers and algorithmic questions, so it's important to brush up on your coding skills before the interview. However, Google also values creativity and out-of-the-box thinking, so don't be afraid to think outside the box when answering questions. product managers need to be able to think strategically about Google's products, while software engineers will need to demonstrate their technical expertise. No matter what role you're interviewing for, remember to stay calm and confident, and you'll be sure to ace the Google interview.
  • Google or Microsoft vs startup What are the pros and cons of working as a software engineer for Google or Microsoft versus starting your own startup like Zoom or Uber or Airbnb did when they started out? - Google and Microsoft are two of the most well-known and successful companies in the tech industry. They are both known for their cutting-edge products and their strong work culture. There are also some major differences between working at Google or Microsoft versus starting your own startup. Google and Microsoft are both very large companies, with hundreds of thousands of employees. They are also both very well established, with years of experience in the tech industry. Startups, on the other hand, are much smaller and less established. This can be both good and bad.
  • Data scientist vs Machine learning Engineer What is the Top Job in AI? Data Scientist or Machine Learning Engineer? - A data scientist is someone who creates programming code and combines it with statistical knowledge to create insights from data. Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. The top job in all of AI is the machine learning engineer and NOT the data scientist.
  • Will Software Engineer ever stop being in demand? Will software engineers ever stop being in demand? - , A software engineer is a person who applies the principles of software engineering to design, develop, maintain, test, and evaluate computer software. The term programmer is sometimes used as a synonym, but may also lack connotations of engineering education or skills. The question is "Will software engineers ever stop being in demand?" There are two schools of thought. Those with a background in business see developers as commodities and fully believe that programmers will program themselves out of a job field. The idea is that in some distant future, jobs like project manager, product manager, and marketing manager will still be critical but programmers themselves will be extinct as a result of the tools they created.
  • Kids Garage Sale for Old books and Toys Requirements For Access to Electronics For Kids During Vacation - We are living in a world where electronics are accessible easily and makes it very easy for our kids to get addicted to. It is important to create some boundaries to allow our kids to not get addicted to electronics and at the same time give them some access.
  • Old car or new car Is it better economically to run a car into the ground before buying a new one? Data driven answer - Is it better to drive your car into the ground before buying a new one? You might think that’s an odd question, but there’s some logic to it. We all know cars are expensive, and many people feel they have to buy a new one as soon as theirs starts to show its age. But is that really the best way to go? Let’s take a closer look at the numbers. The advice I’ve always had (and followed) is that you should always EITHER: Buy a new car - keep it for 3 years - then trade it for a new one….OR… Buy a new car and keep it until it goes to the car crusher.
  • What are the Greenest or Least Environmentally Programming Languages? Is it good useful meaningful worthwhile to use register variables in C++? - The register keyword has been largely ignored by compilers for decades. In C, it prevents you from taking the address of a variable. But otherwise, most compilers ignore the hint it offers.
  • Techies and Geek Inspired Movies and TV Shows Techies and Geek Inspired Movies and TV Shows – Netflix Amazon Prime Video HBO YouTube TV - If you're a movie buff or a geek, there's no doubt you love spending your free time watching films and TV shows that inspire your passions. And in the age of Netflix, Amazon Prime Video, and HBO, there's no shortage of inspiring content to watch. This blog post takes a look at some of the best geeky and tech-inspired movies and TV shows available on streaming services today. So whether you're a die-hard Star Wars fan or you can't get enough of Andy Griffith reruns, there's something for everyone in this roundup! As a software engineer who works long hours and go to kids activities after work, TV shows and movies help me relax after work. This blog is an aggregate of trailers, questions and answers about of Geek inspired Movies and TV Shows.
  • What is the single most influential book every Programmers should read What are some coding anti-patterns that can easily slip through code reviews? - What are some coding anti-patterns that can easily slip through code reviews?
  • Algorithm and Tricks to save up to 30 cents per litre on Gas in USA and Canada Algorithm and Tricks to save up to 30 cents per litre on Gas in USA and Canada - Gas is getting very expensive and we are trying to help consumers save on Gas by providing you daily tricks to help you savc up to 30 cents per litre on Gas in USA and Canada.
  • Google Search Engine Tech Stack What is the tech stack behind Google Search Engine? - The technology stack that powers the Google Search Engine is immensely complex, and includes a number of sophisticated algorithms, technologies, and infrastructure components. At the heart of the system is the PageRank algorithm, which ranks pages based on a number of factors, including the number and quality of links to the page. The algorithm is constantly being refined and updated, in order to deliver more relevant and accurate results. In addition to the PageRank algorithm, Google also uses a number of other algorithms, including the Latent Semantic Indexing algorithm, which helps to index and retrieve documents based on their meaning. The search engine also makes use of a massive infrastructure, which includes hundreds of thousands of servers around the world.
  • Legit Side Money Ideas for Techies and Geeks Financial Independence and Legit Side Money Ideas For Techies and Geeks - This blog is about Clever Questions, Answers, Posts, discussions, links about:: Financial Independence (FIRE), NFTs, options, entrepreneurship, legit side hustle, money making ideas, money making from home, bier money, make money from web scraping,
  • Proxy vs VPN CyberSecurity – What are some things that get a bad rap, but are actually quite secure? - CyberSecurity - What are some things that get a bad rap, but are actually quite secure? 1- PGP 2- Very long passwords that are actually a sentence
  • What is the single most influential book every Programmers should read Programming, Coding and Algorithms Questions and Answers - Coding is a complex process that requires precision and attention to detail. While there are many resources available to help learn programming, it is important to avoid making some common mistakes. One mistake is assuming that programming is easy and does not require any prior knowledge or experience. This can lead to frustration and discouragement when coding errors occur. Another mistake is trying to learn too much at once. Coding is a vast field with many different languages and concepts. It is important to focus on one area at a time and slowly build up skills. Finally, another mistake is not practicing regularly. Coding is like any other skill- it takes practice and repetition to improve. By avoiding these mistakes, students will be well on their way to becoming proficient programmers.
  • React As a web developer can you explain why React is needed? - As a web developer can you explain why React is needed? The specific rationale for React is state management and efficient page updates, it’s underlying power comes not just from the structure and tooling provided by it being a framework, but also the shadow-DOM and component lifecycle that along with state management empower greater interactivity without very slow inefficient page updates.
  • Why can’t a macOS be installed in a Windows computer? Why can’t a macOS be installed in a Windows computer? - Why can’t a macOS be installed in a Windows computer? that to happen. Not because they want to extract more money from hardware sales (Apple hardware is actually cheap for the quality you get anyway), not because they wouldn’t sell OS X as a product if they could.
  • How does a database handle pagination? How does a database handle pagination? - How does a database handle pagination? Some database languages provide helpful facilities that aide in implementing pagination. For example, many SQL dialects provide LIMIT and OFFSET clauses that can be used to emit up to n rows starting at a given row number. I.e., a “page” of rows. If the query results are sorted via ORDER BY and are generally unchanged between successive invocations, then that can be used to implement pagination.
  • How many spaces is a tab in Java, Rust, C++, Python, C#, Powershell, Golang, Javascript How many spaces is a tab in Java, Rust, C++, Python, C#, Powershell, Golang, Javascript - How many spaces is a tab in Java, Rust, C++, Python, C#, Powershell, Golang, Javascript
  • MAANGM Tech Jobs and Career at FAANG (now MAANGM): Facebook Meta Amazon Apple Netflix Google Microsoft - Tech Jobs and Career at FAANG (now MAANGM): Facebook Meta Amazon Apple Netflix Google Microsoft. The FAANG companies (Facebook, Amazon, Apple, Netflix, Google, and Microsoft) are some of the most sought-after employers in the tech industry. They offer competitive salaries and benefits, and their employees are at the forefront of innovation. This blog is about Clever Questions, Answers, Resources, Feeds, Discussions about Tech jobs and careers at MAANGM companies including: Amazon AWS Netflix Google (Alphabet) Microsoft
  • Register to AI Driven Cloud Cert Prep Dumps AWS Azure Google Cloud Certifications Testimonials and Dumps - Do you want to become a Professional DevOps Engineer, a cloud Solutions Architect, a Cloud Engineer or a modern Developer or IT Professional, a versatile Product Manager, a hip Project Manager? Therefore Cloud skills and certifications can be just the thing you need to make the move into cloud or to level up and advance your career.
  • Vegi Skewer Canada Food For Thought – Delicious Homemade Cuisine From All over the World - Food For Thought - Delicious Homemade Cuisine From All over the World. Who doesn't remember their favourite food from home when they were growing up? That delicious taste stays with us forever. We can move all over the World, but the thought of our favourite home-cooked meals always make us happy.
  • IT Engineering Finance Login Breaking News – Top Stories - Breaking News, Top Stories, Google Trends, updated hourly
  • Pay Per Click - google Facebook Instagram Twitter Facebook, Instagram, Apple and Google Apps Search Ads Secrets – Make Money From Your Products - There are billions of Apps out there and it is becoming harder and harder to stand out. You don't want to spend countless of hours developing your dream app just to have less than 10 downloads per month. This blog is an aggregate of the best secrets of Apple and Google Apps search ads for successful App developers.
  • Azure Solutions Architect Expert Exam Preparation Azure Solutions Architect Expert Certification Questions And Answers Dumps - Top 50 Azure Solutions Architect Expert Certification Questions And Answers Dumps
  • Data Science Bias Variance Trade-off Top 100 Data Science and Data Analytics and Data Engineering Interview Questions and Answers - Data Science is a blend of various tools, algorithms, and machine learning principles with the goal to discover hidden patterns from the raw data. How is this different from what statisticians have been doing for years? The answer lies in the difference between explaining and predicting: statisticians work a posteriori, explaining the results and designing a plan; data scientists use historical data to make predictions.
  • Summary of Machine Learning and AI Capabilities Machine Learning Engineer Interview Questions and Answers - Machine Learning Engineer Interview Questions and Answers: Machine learning is the study of computer algorithms that improve automatically through experience. It is seen as a subset of artificial intelligence. Machine Learning explores the study and construction of algorithms that can learn from and make predictions on data. You select a model to train and then manually perform feature extraction. Used to devise complex models and algorithms that lend themselves to a prediction which in commercial use is known as predictive analytics.
  • DevOps Interviews Question and Answers and Scripts DevOps Interviews Question and Answers and Scripts - DevOps Interviews Question and Answers and Scripts
  • Options Trading/Strategies 10 Commandments of Options Trading Strategies - Option strategies are the simultaneous, and often mixed, buying or selling of one or more options that differ in one or more of the options' variables. Call options, simply known as calls, give the buyer a right to buy a particular stock at that option's strike price. Conversely, put options, simply known as puts, give the buyer the right to sell a particular stock at the option's strike price. This is often done to gain exposure to a specific type of opportunity or risk while eliminating other risks as part of a trading strategy. A very straightforward strategy might simply be the buying or selling of a single option; however, option strategies often refer to a combination of simultaneous buying and or selling of options.
  • How crypto could change the world and Why Cryptocurrency was invented in the first place. How crypto could change the world and Why Cryptocurrency was invented in the first place. - People used to pay each other in gold and silver. Difficult to transport. Difficult to divide. Paper money was invented. A claim to gold in a bank vault. Easier to transport and divide. Banks gave out more paper money than they had gold in the vault. They ran “fractional reserves”. A real money maker. But every now and then, banks collapsed because of runs on the bank.
  • What are some good datasets for Data Science and Machine Learning? Data Sciences – Top 400 Open Datasets – Data Visualization – Data Analytics – Big Data – Data Lakes - Data Sciences - Top 400 Open Datasets - Data Visualization - Data Analytics - Big Data - Data Lakes Data science is an interdisciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data, and apply knowledge and actionable insights from data across a broad range of application domains. In this blog, we are going to provide popular open source data sets, data visualization, data analytics and data lakes.
  • Djamgatech: AI Driven Continuing Education and Certification Preparation Platform Djamgatech: Multilingual and Platform Independent Cloud Certification and Education App for AWS, Azure, Google Cloud - You can translate the content of this page by selecting a language in the select box. The Cloud Education Certification App is an EduFlix App for AWS, Azure, Google Cloud Certification Prep [Android, iOS] Technology is changing and is moving towards the cloud. The cloud will power most businesses in the coming years and is not taught in schools. …
  • Why is there a lack of diversity among software engineers in tech companies in USA and Canada? Jobs, Career, Salary, Total Compensation, Interview Tips at FAANGM: Facebook, Apple, Amazon, Netflix, Google, Microsoft - Jobs, Career, Salary, Total Compensation, Interview Tips at FAANGM: Facebook, Apple, Amazon, Netflix, Google, Microsoft
  • CyberTruck Electric Cars – Autonomous Cars – Self driving cars : Tesla, CyberTruck, EV, Volt, Wayne, Nissan Leaf, Electric Bikes, e-bikes, i-cars, smart cars - BNEF outlines that electric vehicles (EVs) will hit 10% of global passenger vehicle sales in 2025, with that number rising to 28% in 2030 and 58% in 2040. According to the study, EVs currently make up 3% of global car sales.
  • Azure Administrator AZ104 Certification Exam Prep Microsoft Azure Administrator Certification Questions and Answers Dumps – AZ 104 - Microsoft Azure Administrator Certification Questions and Answers Dumps - AZ 104 Microsoft Azure Administrator AZ 104 is one of the most popular Microsoft Azure Administrator certification exams. To pass this exam, you need to have a good understanding of Microsoft Azure and its various components. The best way to prepare for this exam is to use this Microsoft AZ 104 dumps. These dumps will help you to understand the Microsoft Azure platform and its various features. In addition, you will also get an idea about the types of questions that are asked in this exam. With the help of these dumps, you can easily pass the Microsoft AZ 104 exam. Below are the top 100 Microsoft Azure Administrator Certification Questions and Answers Dumps
  • Subscribe Videoconferencing Tools: Zoom vs Microsoft Teams vs Google Meet vs GoToMeeting vs WebEx vs Slack – making the right choice - Videoconferencing Tools: Zoom vs Teams vs Google Meet vs GoToMeeting vs Webex vs Slack
  • Azure Administrator AZ-104 Exam Questions and Answers Dumps Top 50 Google Certified Cloud Professional Architect Exam Questions and Answers Dumps - Top 50 Google Certified Cloud Professional Architect Exam Questions and Answers Dumps. GCP, or the Google Cloud Platform, is a cloud-computing platform that provides users with access to a variety of GCP services. The GCP exam is designed to test a candidate's ability to design, implement, and manage GCP solutions. The GCP questions cover a wide range of topics, from basic GCP concepts to advanced GCP features. To become a GCP Certified Professional, you must pass the GCP exam. However, before you can take the exam, you must first complete the GCP Quiz. The GCP Quiz is designed to help you prepare for the GCP exam by testing your knowledge of GCP concepts. After you complete the GCP Quiz, you will be able to access the GCP Practice Exam. The GCP Practice Exam is an online exam that allows you to test your knowledge of GCP concepts. After you pass the GCP Practice Exam, you will be eligible to take the GCP exam.
  • Top reoccurring words in video games titles List of the most commonly recurring words in Video Game Titles – Mobile Game Name Generator - /u/BDMayhem analyzed 4000 "hardcore" mobile games for Android, and made a list of the most commonly recurring words in the Game Titles.
  • GCP Google Associate Cloud Engineer Exam Prep PRO Google Cloud 101 – Google Associate Cloud Engineer Exam Preparation: Questions and Answers Dumps - Google Associate Cloud Engineer Exam Preparation: Questions and Answers Dumps This blog includes the top 40 Google Associate Cloud Engineer exam preparation questions and answers dumps, google cloud questions and answers around the web, google cloud latest news, Google Cloud Developer Cheat Sheet, All Google Cloud Services in 4 words or less
  • Azure Fundamentals AZ900 Exam Prep AZ-900: Microsoft Azure Fundamentals – Top 100 Questions and Answers Dumps - AZ-900: Microsoft Azure Fundamentals - Top 100 Questions and Answers Dumps Azure Fundamentals exam is an opportunity to prove knowledge of cloud concepts (20%), Azure services (20%), Azure workloads, security and privacy in Azure (30%), as well as Azure pricing and support (25%). This blog also includes Azure Services Cheat Sheet. The exam is intended for candidates who are just beginning to work with cloud-based solutions and services or are new to Azure. Candidates should be familiar with the general technology concepts, including concepts of networking, storage, compute, application support, and application development. Azure Fundamentals can be used to prepare for other Azure role-based or specialty certifications, but it is not a prerequisite for any of them.
  • Loans and Financial Calculators How to Make Money From Web Scraping? The Top 20 Tips - How to Make Money From Web Scraping? Web scraping can be a very useful skill to learn for anyone looking to start or further their career in data. Web scraping is the process of extracting data from websites, and it can be used to collect everything from images to contact information. While it may sound complicated, web scraping is actually quite simple once you get the hang of it. And best of all, it's a skill that can be used to make money. There are a number of ways to make money from web scraping. One popular way is to use web scraping for sport arbitrage. Sport arbitrage is the practice of betting on two different outcomes of the same event in order to profit from the difference in odds. Web scrapers can be used to quickly and easily find arbitrage opportunities by comparing the odds of different bookmakers.
  • AWS machine Learning Specialty Exam Prep MLS-C01 Machine Learning 101 – Top 100 AWS and Google Certified Machine Learning Specialty Questions and Answers Dumps - Top 100 AWS and Google Certified Machine Learning Specialty Questions and Answers Dumps This blog is the best way  is the best way to prepare for your upcoming  AWS Certified Machine Learning Specialty and Google Certified Professional Machine Learning Engineer exam. With over 100 questions and answers, this blog provides quizzes simmilar  that are very similar to the real exam. It also includes  the option to show and hide answers. Additionally, there are machine learning interview questions and detailed answers, as well as cheat sheets and illustrations. This blog is the best way to make sure you are well-prepared for your AWS Certified Machine Learning Specialty Exam.
  • Subscribe Laptop 101 – Pick a laptop for me – MacOS or Windows or Chrome – Apple MacBook or Google ChromeBook or Microsoft Surface or Dell or HP or Lenovo - Laptop 101 - Pick a laptop for me - MacOS or Windows or Chrome - Apple MacBook or Google ChromeBook or Microsoft Surface or Dell or Hp or Lenovo
  • IT Engineering Finance Login What is trending today – What are people searching today? - 3.5 billion Google searches are made every day and 1.2 trillion searches per year worldwide.
  • IT Engineering Finance Login Smartphone 101 – Pick a smartphone for me – android or iOS – Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel - Smartphone 101 - Pick a smartphone for me. When it comes to choosing a smartphone, there are a few things you need to take into account. First, what operating system do you prefer? Android or iOS? Then, what brand do you prefer? Apple, Samsung, Huawei, Xiaomi, or Google? Finally, what model of phone do you like best? The iPhone 13 Pro Max, the Galaxy S22 Plus, the Huawei Mate 40 Pro, the Xiaomi Mi 11 Pro 5G, or the Google Pixel 6 Pro?
  • Loans and Financial Calculators Loans Debts Mortgages Finances Calculators – Unit and Currency Converters - At some stage, we all need or want more money than we have. Funding a new set of wheels is the number one reason to take out a personal loan. Perhaps unsurprisingly, men are more likely than women to take out a personal loan. According to our survey, 69.05% of men said they’ve taken out a loan compared to 62.09% of women.what to expect when taking out a loan? what is the total cost of a loan? Use these calculators below to find out.
  • AWS Certified Security – Specialty Questions and Answers Dumps CyberSecurity 101 and Top 25 AWS Certified Security Specialty Questions and Answers Dumps - Top 25 AWS Certified Specialty  Exam Practice Quiz including Questions and Answers and References.
  • AWS Certified Security – Specialty Questions and Answers Dumps Big Data and Data Analytics 101 – Top 100 AWS Certified Data Analytics – Specialty Questions and Answers Dumps - Top 100 AWS Certified Data Analytics – Specialty Questions and Answers Dumps and References. If you're looking to take your data analytics career to the next level, then this AWS Data Analytics Specialty Certification Exam Preparation blog is a must-read! With over 100 exam questions and answers, plus data science and data analytics interview questions, cheat sheets and more, you'll be fully prepared to ace the DAS-C01 exam. 
  • Advanced Networking - Specialty Networking 101 and Top 20 AWS Certified Advanced Networking Specialty Questions and Answers Dumps - You can translate the content of this page by selecting a language in the select box. The AWS Certified Advanced Networking – Specialty (ANS-C00) examination is intended for individuals who perform complex networking tasks. This examination validates advanced technical skills and experience in designing and implementing AWS and hybrid IT network architectures at scale. The …
  • AWS Certified Security – Specialty Questions and Answers Dumps Top 200 AWS Certified Associate SysOps Administrator Practice Quiz – Questions and Answers Dumps - You can translate the content of this page by selecting a language in the select box. What is the AWS Certified SysOps Administrator – Associate? The AWS Certified SysOps Administrator – Associate (SOA-C01) examination is intended for individuals who have technical expertise in deployment, management, and operations on AWS. The AWS Certified SysOps Administrator – …
  • Reset BluePrism Admin Password RPA: How to reset Blue Prism admin password - You can translate the content of this page by selecting a language in the select box. Robotic Process Automation: Blue Prism v6 Issue: BluePrism admin Password forgotten or lost Assumption – you have access to the database and you can modify tables Solution: This command finds the user with the username admin and resets their …
  • AWS Certified Developer Associate Exam Prep Top 30 AWS Certified Developer Associate Exam Tips - Top 30 AWS Certified Developer Associate Exam Tips: Understand some basic code samples such as JSON code, config files, and IAM policy documents. LAMBDA [10-15% of Exam]Invocation types, Using notifications and event source mappings, Concurrency and throttling, X-Ray and Amazon SQS DLQs, Versions and aliases, Blue/green deployment, Packaging and deployment, VPC connections (with Internet/NAT GW), Lambda as ELB target, Dependencies, Environment variables (inc. encrypting them) etc.
  • aws certified solution architect exam prep Top 60 AWS Solution Architect Associate Exam Tips - Top 60 AWS Solution Architect Associate Exam Tips
  • AWS certification Quiz App for all platforms AWS certification exam quiz apps for all platforms - You can translate the content of this page by selecting a language in the select box. Below is a listing of AWS certification exam quiz apps for all platforms: AWS Certified Cloud practitioner Exam Prep FREE version: CCP, CLF-C01 IOS: https://apps.apple.com/ca/app/aws-certified-cloud-pract-prep/id1488832117 Microsoft/Windows10:https://www.microsoft.com/en-ca/p/aws-certified-cloud-practitioner-exam-preparation/9ns1xttj1d5s Google play: https://play.google.com/store/apps/details?id=com.awscloudpractitonerexamprep.enoumen Amazon App Store (Android): https://www.amazon.com/dp/B085MFT53J/ref=mp_s_a_1_2?keywords=cloud+practitioner&qid=1583633225&s=mobile-apps&sr=1-2 Web/PWA: https://aws-cloud-practitioner-exam.firebaseapp.com Cloud Practitioner PRO …
  • Subscribe What are some common reasons why a blog doesn’t rank on Google? - You can translate the content of this page by selecting a language in the select box. Any content destined to the public that doesn’t rank on Google or Bing is destined to be obscure and gets no visibility. Writing any blog post or article is not enough to be ranked on Google or Bing, the …
  • What are some financial software products that do not require you to store data in the cloud? - You can translate the content of this page by selecting a language in the select box. For privacy sake, it is very important for a lot of people to not trust cloud providers with their financial data. Below are some free desktop financial software products that do not require you to store data in the …
  • Azure Administrator AZ-104 Exam Questions and Answers Dumps What are the corresponding Azure and Google Cloud services for each of the AWS services? - What are unique distinctions and similarities between AWS, Azure and Google Cloud services? For each AWS service, what is the equivalent Azure and Google Cloud service? For each Azure service, what is the corresponding Google Service? AWS Services vs Azure vs Google Services? Side by side comparison between AWS, Google Cloud and Azure Service?
  • Cloud User insurance and Cloud Provider Insurance Pros and Cons of Cloud Computing - What are the Pros of using cloud computing? What are characteristics of cloud computing? Trade Capital expense for variable expense Benefit from massive economies of scale Stop guessing capacity Increase speed and agility Stop spending money on running and maintaining data centers Go global in minutes
  • Cloud User insurance and Cloud Provider Insurance Cloud User insurance and Cloud Provider Insurance - You can translate the content of this page by selecting a language in the select box. In this blog, we are going to explore the following topics and provide some suggestions and recommendations: What is Cloud User insurance and Cloud Provider Insurance How protected are you when using the cloud? How protected are the cloud …
  • IT Engineering Finance Login What are good competitors to G-Suite? - You can translate the content of this page by selecting a language in the select box. Office 365 comes to mind. Office 365 is a line of subscription services offered by Microsoft as part of the Microsoft Office product line. The brand encompasses plans that allow use of the Microsoft Office software suite over the life of the subscription, as well as cloud-based …
  • What are the top 10 biggest lessons you have learned from the corporate world? What are the top 10 biggest lessons you have learned from the corporate world? - You can translate the content of this page by selecting a language in the select box. According to Wikipedia, Corporate America is  an informal (and sometimes derogatory) phrase describing the world of corporations and big business within the United States and Canada. A job or career in corporate America is usually the best entry to true middle class or even …
  • Subscribe How does using a VPN or Proxy or TOR or private browsing protects your online activity? - You can translate the content of this page by selecting a language in the select box. VPNs are used to provide remote corporate employees, gig economy freelance workers and business travelers with access to software applications hosted on proprietary networks. To gain access to a restricted resource through a VPN, the user must be authorized to use …
  • Subscribe What is the programming model and best language for Hadoop and Spark? Python or Java? - You can translate the content of this page by selecting a language in the select box. Hadoop is an open-source software framework for storing data and running applications on clusters of commodity hardware. It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or …
  • What is the best app for finding people to join group activity in USA and Canada for free? - You can translate the content of this page by selecting a language in the select box. In this blog, I will help answer this question that i get frequently: What is the best app for finding people to join group activity ? 1- The meetup app is the best. You can join as a member …
  • IT Engineering Finance Login Top 10 legal side business that can make you $1000-$2000 a week? - You can translate the content of this page by selecting a language in the select box. Below are the Top 10 legal side business that can make you $1000-$2000 a week. This list is based on my own experience and research. I have tried most of them and it takes dedication and passion to get …
  • IT Engineering Finance Login Top 10 Financial Tips for Young Adults in USA and Canada - You can translate the content of this page by selecting a language in the select box. This blog is geared towards young adults, particularly young first and second generation immigrants like me who don’t have any real estate and assets inherited from their parents here in Canada and USA. In this blog, I will help …
  • Free and Effective Internet Marketing - Online Advertising Free and Effective Internet Marketing in USA and Canada: Top 10 Tips to Sell Online at No Cost - You can translate the content of this page by selecting a language in the select box. Online advertising is the process of promoting a business or brand and its products or services over the internet using tools that help drive traffic, leads, and sales. Internet Marketing, also called online marketing or Internet advertising or web …
  • Top 100 AWS Solutions Architect Associate Certification Exam Questions and Answers Dump SAA-C03 Top 100 AWS Solutions Architect Associate Certification Exam Questions and Answers Dump SAA-C03 - What are the Top 100 AWS Solutions Architect Associate Certification Exam Questions and Answers Dump SAA-C03? AWS Certified Solutions Architects are responsible for designing, deploying, and managing AWS cloud applications. The AWS Cloud Solutions Architect Associate exam validates an examinee's ability to effectively demonstrate knowledge of how to design and deploy secure and robust applications on AWS technologies. The AWS Solutions Architect Associate training provides an overview of key AWS services, security, architecture, pricing, and support. The AWS Certified Solutions Architect - Associate (SAA-C03) Examination is a required examination for the AWS Certified Solutions Architect - Professional level. Successful completion of this examination can lead to a salary raise or promotion for those in cloud roles.
  • AWS Ec2 Facts and Summaries AWS Certification Preparation: AWS Ec2 Facts, Faqs and Summaries, Top 10 Questions and Answers Dump - Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. Amazon Elastic Compute Cloud (EC2) forms a central part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), by allowing users to rent virtual computers on which to run their own computer applications.
  • AWS IAM Facts and Summaries and Questions Answers AWS Certification Preparation: AWS IAM Facts, Faqs, Summaries and Top 10 Questions and Answers Dump - You can translate the content of this page by selecting a language in the select box. AWS IAM Facts and summaries, AWS IAM Top 10 Questions and Answers Dump Definition 1: IAM is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. …
  • AWS Serverless AWS Certification Exams Prep: Serverless Facts and Summaries and Question and Answers - You can translate the content of this page by selecting a language in the select box. AWS Serverless – Facts and summaries, Top 20 AWS Serverless Questions and Answers Dump Definition 1: Serverless computing is a cloud-computing execution model in which the cloud provider runs the server, and dynamically manages the allocation of machine resources. …
  • AWS Certification Exam Preparation AWS Developer and Deployment Theory: Facts and Summaries and Questions/Answers - AWS Developer and Deployment Theory: Facts and Summaries and Questions/Answers The AWS Developer is responsible for designing, deploying, and developing cloud applications on AWS platform
  • DynamoDB AWS Certification Exam Prep: DynamoDB Facts, Summaries and Questions/Answers. - Amazon DynamoDB explained Fully Managed Fast, consistent Performance Fine-grained access control Flexible AWS DynamoDB Facts and Summaries AWS DynamoDB Questions and Answers Dumps
  • AWS Certification Exam Prep: S3 Facts, Summaries, Questions and Answers - S3 is a universal namespace, meaning each S3 bucket you create must have a unique name that is not being used by anyone else in the world. S3 is object based: i.e allows you to upload files.Files can be from 0 Bytes to 5 TBS3 has unlimited storage. Files are stored in Buckets. Read after write consistency for PUTS of new Objects Eventual Consistency for overwrite PUTS and DELETES (can take some time to propagate)
  • 2022 AWS Certified Developer Associate Exam Preparation: Questions and Answers Dump - 2022 AWS Certified Developer Associate Exam Preparation: Questions and Answers Dump A developer is writing an application that will store data in a DynamoDB table. The ratio of reads operations to write operations will be 1000 to 1, with the same data being accessed frequently. What should the Developer enable on the DynamoDB table to optimize performance and minimize costs?
  • AWS Cloud Practitioner CCP CLF-C01 Certification Exam Prep Top 100 AWS Certified Cloud Practitioner Exam Preparation Questions and Answers Dumps - Top 100 Questions and Answers Dumps, White papers, Courses, Labs and Training Materials, Exam info and details, References, Jobs, Others AWS Certificates, AWS Cloud Support Engineer Job Interview Prep, Top 20 AWS Training Q&A , AWS Web Services Cheat Sheet, Latest Products & Services @ AWS RE:INVENT

AWS Certified Developer Associate Exam Prep

You can translate the content of this page by selecting a language in the select box.

Welcome to AWS Certified Developer Associate Exam Preparation: Definition and Objectives, Top 65 Questions and Answers dump, White papers, Courses, Labs and Training Materials, Exam info and details, References, Jobs, Others AWS Certificates

What is the AWS Certified Developer Associate Exam?

This AWS Certified Developer-Associate Examination is intended for individuals who perform a
Developer role. It validates an examinee’s ability to:

  • Demonstrate an understanding of core AWS services, uses, and basic AWS architecture best practices.
  • Demonstrate proficiency in developing, deploying, and debugging cloud-based applications using AWS.

There are no prerequisites for taking the Developer-Associate examination, but here are the recommended AWS Knowledge:

  • One or more years of hands-on experience developing and maintaining an AWS based application
  • In-depth knowledge of at least one high-level programming language
  • Understanding of core AWS services, uses, and basic AWS architecture best practices
  • Proficiency in developing, deploying, and debugging cloud-based applications using AWS
  • Ability to use the AWS service APIs, AWS CLI, and SDKs to write applications
  • Ability to identify key features of AWS services
  • Understanding of the AWS shared responsibility model
  • Understanding of application lifecycle management
  • Ability to use a CI/CD pipeline to deploy applications on AWS
  • Ability to use or interact with AWS services
  • Ability to apply a basic understanding of cloud-native applications to write code
  • Ability to write code using AWS security best practices (e.g., not using secret and access keys in the code, instead using IAM roles)
  • Ability to author, maintain, and debug code modules on AWS
  • Proficiency writing code for serverless applications
  • Understanding of the use of containers in the development process

Top

AWS Certified Developer – Associate Practice Questions And Answers Dump

Q0: Your application reads commands from an SQS queue and sends them to web services hosted by your
partners. When a partner’s endpoint goes down, your application continually returns their commands to the queue. The repeated attempts to deliver these commands use up resources. Commands that can’t be delivered must not be lost.
How can you accommodate the partners’ broken web services without wasting your resources?

  • A. Create a delay queue and set DelaySeconds to 30 seconds
  • B. Requeue the message with a VisibilityTimeout of 30 seconds.
  • C. Create a dead letter queue and set the Maximum Receives to 3.
  • D. Requeue the message with a DelaySeconds of 30 seconds.


C. After a message is taken from the queue and returned for the maximum number of retries, it is
automatically sent to a dead letter queue, if one has been configured. It stays there until you retrieve it for forensic purposes.

Reference: Amazon SQS Dead-Letter Queues


Top

Q1: A developer is writing an application that will store data in a DynamoDB table. The ratio of reads operations to write operations will be 1000 to 1, with the same data being accessed frequently.
What should the Developer enable on the DynamoDB table to optimize performance and minimize costs?

  • A. Amazon DynamoDB auto scaling
  • B. Amazon DynamoDB cross-region replication
  • C. Amazon DynamoDB Streams
  • D. Amazon DynamoDB Accelerator


D. The AWS Documentation mentions the following:

DAX is a DynamoDB-compatible caching service that enables you to benefit from fast in-memory performance for demanding applications. DAX addresses three core scenarios

  1. As an in-memory cache, DAX reduces the response times of eventually-consistent read workloads by an order of magnitude, from single-digit milliseconds to microseconds.
  2. DAX reduces operational and application complexity by providing a managed service that is API-compatible with Amazon DynamoDB, and thus requires only minimal functional changes to use with an existing application.
  3. For read-heavy or bursty workloads, DAX provides increased throughput and potential operational cost savings by reducing the need to over-provision read capacity units. This is especially beneficial for applications that require repeated reads for individual keys.

Reference: AWS DAX


Top

Q2: You are creating a DynamoDB table with the following attributes:

  • PurchaseOrderNumber (partition key)
  • CustomerID
  • PurchaseDate
  • TotalPurchaseValue

One of your applications must retrieve items from the table to calculate the total value of purchases for a
particular customer over a date range. What secondary index do you need to add to the table?

  • A. Local secondary index with a partition key of CustomerID and sort key of PurchaseDate; project the
    TotalPurchaseValue attribute
  • B. Local secondary index with a partition key of PurchaseDate and sort key of CustomerID; project the
    TotalPurchaseValue attribute
  • C. Global secondary index with a partition key of CustomerID and sort key of PurchaseDate; project the
    TotalPurchaseValue attribute
  • D. Global secondary index with a partition key of PurchaseDate and sort key of CustomerID; project the
    TotalPurchaseValue attribute


C. The query is for a particular CustomerID, so a Global Secondary Index is needed for a different partition
key. To retrieve only the desired date range, the PurchaseDate must be the sort key. Projecting the
TotalPurchaseValue into the index provides all the data needed to satisfy the use case.

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLFC01 book below.


Reference: AWS DynamoDB Global Secondary Indexes

Difference between local and global indexes in DynamoDB

  • Global secondary index — an index with a hash and range key that can be different from those on the table. A global secondary index is considered “global” because queries on the index can span all of the data in a table, across all partitions.
  • Local secondary index — an index that has the same hash key as the table, but a different range key. A local secondary index is “local” in the sense that every partition of a local secondary index is scoped to a table partition that has the same hash key.
  • Local Secondary Indexes still rely on the original Hash Key. When you supply a table with hash+range, think about the LSI as hash+range1, hash+range2.. hash+range6. You get 5 more range attributes to query on. Also, there is only one provisioned throughput.
  • Global Secondary Indexes defines a new paradigm – different hash/range keys per index.
    This breaks the original usage of one hash key per table. This is also why when defining GSI you are required to add a provisioned throughput per index and pay for it.
  • Local Secondary Indexes can only be created when you are creating the table, there is no way to add Local Secondary Index to an existing table, also once you create the index you cannot delete it.
  • Global Secondary Indexes can be created when you create the table and added to an existing table, deleting an existing Global Secondary Index is also allowed.

Throughput :

Invest in your future today by enrolling in this Azure Fundamentals - Microsoft Azure Certification and Training ebook below. This Azure Fundamentals Exam Prep Book will prepare you for the Azure Fundamentals AZ900 Certification Exam.


  • Local Secondary Indexes consume throughput from the table. When you query records via the local index, the operation consumes read capacity units from the table. When you perform a write operation (create, update, delete) in a table that has a local index, there will be two write operations, one for the table another for the index. Both operations will consume write capacity units from the table.
  • Global Secondary Indexes have their own provisioned throughput, when you query the index the operation will consume read capacity from the index, when you perform a write operation (create, update, delete) in a table that has a global index, there will be two write operations, one for the table another for the index*.


Top

Q3: When referencing the remaining time left for a Lambda function to run within the function’s code you would use:

  • A. The event object
  • B. The timeLeft object
  • C. The remains object
  • D. The context object


D. The context object.

Reference: AWS Lambda


Top

Q4: What two arguments does a Python Lambda handler function require?

  • A. invocation, zone
  • B. event, zone
  • C. invocation, context
  • D. event, context

D. event, context
def handler_name(event, context):

return some_value

Reference: AWS Lambda Function Handler in Python

Top

Q5: Lambda allows you to upload code and dependencies for function packages:

  • A. Only from a directly uploaded zip file
  • B. Only via SFTP
  • C. Only from a zip file in AWS S3
  • D. From a zip file in AWS S3 or uploaded directly from elsewhere


D. From a zip file in AWS S3 or uploaded directly from elsewhere

Reference: AWS Lambda Deployment Package

Top

Q6: A Lambda deployment package contains:

  • A. Function code, libraries, and runtime binaries
  • B. Only function code
  • C. Function code and libraries not included within the runtime
  • D. Only libraries not included within the runtime


C. Function code and libraries not included within the runtime

With average increases in salary of over 25% for certified individuals, you’re going to be in a much better position to secure your dream job or promotion if you earn your AWS Certified Solutions Architect Associate our Cloud Practitioner certification. Get the books below to for real practice exams:

Use the promo codes: W6XM9XP4TWN9 or T6K9P4J9JPPR or 9LWMYKJ7TWPN or TN4NTERJYHY4 for AWS CCP eBook at Apple iBook store.


Use Promo Codes XKPHAATA6LRL 4XJRP9XLT9XL or LTFFY6JA33EL or HKRMTMTHFMAM or 4XHAFTWT4FN6 for AWS SAA-C03 eBook at Apple iBook store



Use Promo Codes EF46PT44LXPN or L6L9R9LKEFFR or TWELPA4JFJWM for Azure Fundamentals eBook at Apple iBook store.

Reference: AWS Lambda Deployment Package in PowerShell

Top

Q7: You are attempting to SSH into an EC2 instance that is located in a public subnet. However, you are currently receiving a timeout error trying to connect. What could be a possible cause of this connection issue?

  • A. The security group associated with the EC2 instance has an inbound rule that allows SSH traffic, but does not have an outbound rule that allows SSH traffic.
  • B. The security group associated with the EC2 instance has an inbound rule that allows SSH traffic AND has an outbound rule that explicitly denies SSH traffic.
  • C. The security group associated with the EC2 instance has an inbound rule that allows SSH traffic AND the associated NACL has both an inbound and outbound rule that allows SSH traffic.
  • D. The security group associated with the EC2 instance does not have an inbound rule that allows SSH traffic AND the associated NACL does not have an outbound rule that allows SSH traffic.


D. Security groups are stateful, so you do NOT have to have an explicit outbound rule for return requests. However, NACLs are stateless so you MUST have an explicit outbound rule configured for return request.

Reference: Comparison of Security Groups and Network ACLs


We know you like your hobbies and especially coding, We do too, but you should find time to build the skills that’ll drive your career into Six Figures. Cloud skills and certifications can be just the thing you need to make the move into cloud or to level up and advance your career. 85% of hiring managers say cloud certifications make a candidate more attractive. Start your cloud journey with these excellent books below:

AWS Security Groups and NACL


Top

Q8: You have instances inside private subnets and a properly configured bastion host instance in a public subnet. None of the instances in the private subnets have a public or Elastic IP address. How can you connect an instance in the private subnet to the open internet to download system updates?

  • A. Create and assign EIP to each instance
  • B. Create and attach a second IGW to the VPC.
  • C. Create and utilize a NAT Gateway
  • D. Connect to a VPN


C. You can use a network address translation (NAT) gateway in a public subnet in your VPC to enable instances in the private subnet to initiate outbound traffic to the Internet, but prevent the instances from receiving inbound traffic initiated by someone on the Internet.

Reference: AWS Network Address Translation Gateway


Top

Q9: What feature of VPC networking should you utilize if you want to create “elasticity” in your application’s architecture?

  • A. Security Groups
  • B. Route Tables
  • C. Elastic Load Balancer
  • D. Auto Scaling


D. Auto scaling is designed specifically with elasticity in mind. Auto scaling allows for the increase and decrease of compute power based on demand, thus creating elasticity in the architecture.

Reference: AWS Autoscalling


Top

Q10: Lambda allows you to upload code and dependencies for function packages:

  • A. Only from a directly uploaded zip file
  • B. Only from a directly uploaded zip file
  • C. Only from a zip file in AWS S3
  • D. From a zip file in AWS S3 or uploaded directly from elsewhere


D. From a zip file in AWS S3 or uploaded directly from elsewhere

Reference: AWS Lambda

Top

Q11: You’re writing a script with an AWS SDK that uses the AWS API Actions and want to create AMIs for non-EBS backed AMIs for you. Which API call should occurs in the final process of creating an AMI?

  • A. RegisterImage
  • B. CreateImage
  • C. ami-register-image
  • D. ami-create-image


A. It is actually – RegisterImage. All AWS API Actions will follow the capitalization like this and don’t have hyphens in them.

Reference: API RegisterImage

Top

Q12: When dealing with session state in EC2-based applications using Elastic load balancers which option is generally thought of as the best practice for managing user sessions?

  • A. Having the ELB distribute traffic to all EC2 instances and then having the instance check a caching solution like ElastiCache running Redis or Memcached for session information
  • B. Permenantly assigning users to specific instances and always routing their traffic to those instances
  • C. Using Application-generated cookies to tie a user session to a particular instance for the cookie duration
  • D. Using Elastic Load Balancer generated cookies to tie a user session to a particular instance

Top

Q13: Which API call would best be used to describe an Amazon Machine Image?

  • A. ami-describe-image
  • B. ami-describe-images
  • C. DescribeImage
  • D. DescribeImages


D. In general, API actions stick to the PascalCase style with the first letter of every word capitalized.

Reference: API DescribeImages

Top

Q14: What is one key difference between an Amazon EBS-backed and an instance-store backed instance?

  • A. Autoscaling requires using Amazon EBS-backed instances
  • B. Virtual Private Cloud requires EBS backed instances
  • C. Amazon EBS-backed instances can be stopped and restarted without losing data
  • D. Instance-store backed instances can be stopped and restarted without losing data


C. Instance-store backed images use “ephemeral” storage (temporary). The storage is only available during the life of an instance. Rebooting an instance will allow ephemeral data stay persistent. However, stopping and starting an instance will remove all ephemeral storage.

Reference: What is the difference between EBS and Instance Store?

Top

Q15: After having created a new Linux instance on Amazon EC2, and downloaded the .pem file (called Toto.pem) you try and SSH into your IP address (54.1.132.33) using the following command.
ssh -i my_key.pem ec2-user@52.2.222.22
However you receive the following error.
@@@@@@@@ WARNING: UNPROTECTED PRIVATE KEY FILE! @ @@@@@@@@@@@@@@@@@@@
What is the most probable reason for this and how can you fix it?

  • A. You do not have root access on your terminal and need to use the sudo option for this to work.
  • B. You do not have enough permissions to perform the operation.
  • C. Your key file is encrypted. You need to use the -u option for unencrypted not the -i option.
  • D. Your key file must not be publicly viewable for SSH to work. You need to modify your .pem file to limit permissions.


D. You need to run something like: chmod 400 my_key.pem

Reference:

Top

Q16: You have an EBS root device on /dev/sda1 on one of your EC2 instances. You are having trouble with this particular instance and you need to either Stop/Start, Reboot or Terminate the instance but you do NOT want to lose any data that you have stored on /dev/sda1. However, you are unsure if changing the instance state in any of the aforementioned ways will cause you to lose data stored on the EBS volume. Which of the below statements best describes the effect each change of instance state would have on the data you have stored on /dev/sda1?

  • A. Whether you stop/start, reboot or terminate the instance it does not matter because data on an EBS volume is not ephemeral and the data will not be lost regardless of what method is used.
  • B. If you stop/start the instance the data will not be lost. However if you either terminate or reboot the instance the data will be lost.
  • C. Whether you stop/start, reboot or terminate the instance it does not matter because data on an EBS volume is ephemeral and it will be lost no matter what method is used.
  • D. The data will be lost if you terminate the instance, however the data will remain on /dev/sda1 if you reboot or stop/start the instance because data on an EBS volume is not ephemeral.


D. The question states that an EBS-backed root device is mounted at /dev/sda1, and EBS volumes maintain information regardless of the instance state. If it was instance store, this would be a different answer.

Reference: AWS Root Device Storage

Top

Q17: EC2 instances are launched from Amazon Machine Images (AMIs). A given public AMI:

  • A. Can only be used to launch EC2 instances in the same AWS availability zone as the AMI is stored
  • B. Can only be used to launch EC2 instances in the same country as the AMI is stored
  • C. Can only be used to launch EC2 instances in the same AWS region as the AMI is stored
  • D. Can be used to launch EC2 instances in any AWS region


C. AMIs are only available in the region they are created. Even in the case of the AWS-provided AMIs, AWS has actually copied the AMIs for you to different regions. You cannot access an AMI from one region in another region. However, you can copy an AMI from one region to another

Reference: https://aws.amazon.com/amazon-linux-ami/

Top

Q18: Which of the following statements is true about the Elastic File System (EFS)?

  • A. EFS can scale out to meet capacity requirements and scale back down when no longer needed
  • B. EFS can be used by multiple EC2 instances simultaneously
  • C. EFS cannot be used by an instance using EBS
  • D. EFS can be configured on an instance before launch just like an IAM role or EBS volumes


A. and B.

Reference: https://aws.amazon.com/efs/

Top

Q19: IAM Policies, at a minimum, contain what elements?

  • A. ID
  • B. Effects
  • C. Resources
  • D. Sid
  • E. Principle
  • F. Actions


B. C. and F.

Effect – Use Allow or Deny to indicate whether the policy allows or denies access.

Resource – Specify a list of resources to which the actions apply.

Action – Include a list of actions that the policy allows or denies.

Id, Sid aren’t required fields in IAM Policies. But they are optional fields

Reference: AWS IAM Access Policies

Top

Q20: What are the main benefits of IAM groups?

  • A. The ability to create custom permission policies.
  • B. Assigning IAM permission policies to more than one user at a time.
  • C. Easier user/policy management.
  • D. Allowing EC2 instances to gain access to S3.


B. and C.

A. is incorrect: This is a benefit of IAM generally or a benefit of IAM policies. But IAM groups don’t create policies, they have policies attached to them.

Reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html

Top

Q21: What are benefits of using AWS STS?

  • A. Grant access to AWS resources without having to create an IAM identity for them
  • B. Since credentials are temporary, you don’t have to rotate or revoke them
  • C. Temporary security credentials can be extended indefinitely
  • D. Temporary security credentials can be restricted to a specific region

Top

Q22: What should the Developer enable on the DynamoDB table to optimize performance and minimize costs?

  • A. Amazon DynamoDB auto scaling
  • B. Amazon DynamoDB cross-region replication
  • C. Amazon DynamoDB Streams
  • D. Amazon DynamoDB Accelerator


D. DAX is a DynamoDB-compatible caching service that enables you to benefit from fast in-memory performance for demanding applications. DAX addresses three core scenarios:

  1. As an in-memory cache, DAX reduces the response times of eventually-consistent read workloads by an order of magnitude, from single-digit milliseconds to microseconds.
  2. DAX reduces operational and application complexity by providing a managed service that is API-compatible with Amazon DynamoDB, and thus requires only minimal functional changes to use with an existing application.
  3. For read-heavy or bursty workloads, DAX provides increased throughput and potential operational cost savings by reducing the need to over-provision read capacity units. This is especially beneficial for applications that require repeated reads for individual keys.

Reference: AWS DAX


Top

Q23: A Developer has been asked to create an AWS Elastic Beanstalk environment for a production web application which needs to handle thousands of requests. Currently the dev environment is running on a t1 micro instance. How can the Developer change the EC2 instance type to m4.large?

  • A. Use CloudFormation to migrate the Amazon EC2 instance type of the environment from t1 micro to m4.large.
  • B. Create a saved configuration file in Amazon S3 with the instance type as m4.large and use the same during environment creation.
  • C. Change the instance type to m4.large in the configuration details page of the Create New Environment page.
  • D. Change the instance type value for the environment to m4.large by using update autoscaling group CLI command.


B. The Elastic Beanstalk console and EB CLI set configuration options when you create an environment. You can also set configuration options in saved configurations and configuration files. If the same option is set in multiple locations, the value used is determined by the order of precedence.
Configuration option settings can be composed in text format and saved prior to environment creation, applied during environment creation using any supported client, and added, modified or removed after environment creation.
During environment creation, configuration options are applied from multiple sources with the following precedence, from highest to lowest:

  • Settings applied directly to the environment – Settings specified during a create environment or update environment operation on the Elastic Beanstalk API by any client, including the AWS Management Console, EB CLI, AWS CLI, and SDKs. The AWS Management Console and EB CLI also applyrecommended values for some options that apply at this level unless overridden.
  • Saved Configurations
    Settings for any options that are not applied directly to the
    environment are loaded from a saved configuration, if specified.
  • Configuration Files (.ebextensions)– Settings for any options that are not applied directly to the
    environment, and also not specified in a saved configuration, are loaded from configuration files in the .ebextensions folder at the root of the application source bundle.        

    Configuration files are executed in alphabetical order. For example,.ebextensions/01run.configis executed before.ebextensions/02do.config.

  • Default Values– If a configuration option has a default value, it only applies when the option is not set at any of the above levels.

If the same configuration option is defined in more than one location, the setting with the highest precedence is applied. When a setting is applied from a saved configuration or settings applied directly to the environment, the setting is stored as part of the environment’s configuration. These settings can be removed with the AWS CLI or with the EB CLI
.
Settings in configuration files are not applied
directly to the environment and cannot be removed without modifying the configuration files and deploying a new application version.
If a setting applied with one of the other methods is removed, the same setting will be loaded from configuration files in the source bundle.

Reference: Managing ec2 features – Elastic beanstalk

Q24: What statements are true about Availability Zones (AZs) and Regions?

  • A. There is only one AZ in each AWS Region
  • B. AZs are geographically separated inside a region to help protect against natural disasters affecting more than one at a time.
  • C. AZs can be moved between AWS Regions based on your needs
  • D. There are (almost always) two or more AZs in each AWS Region


B and D.

Reference: AWS global infrastructure/

Top

Q25: An AWS Region contains:

  • A. Edge Locations
  • B. Data Centers
  • C. AWS Services
  • D. Availability Zones


B. C. D. Edge locations are actually distinct locations that don’t explicitly fall within AWS regions.

Reference: AWS Global Infrastructure


Top

Q26: Which read request in DynamoDB returns a response with the most up-to-date data, reflecting the updates from all prior write operations that were successful?

  • A. Eventual Consistent Reads
  • B. Conditional reads for Consistency
  • C. Strongly Consistent Reads
  • D. Not possible


C. This is provided very clearly in the AWS documentation as shown below with regards to the read consistency for DynamoDB. Only in Strong Read consistency can you be guaranteed that you get the write read value after all the writes are completed.

Reference: https://aws.amazon.com/dynamodb/faqs/


Top

Q27: You’ve been asked to move an existing development environment on the AWS Cloud. This environment consists mainly of Docker based containers. You need to ensure that minimum effort is taken during the migration process. Which of the following step would you consider for this requirement?

  • A. Create an Opswork stack and deploy the Docker containers
  • B. Create an application and Environment for the Docker containers in the Elastic Beanstalk service
  • C. Create an EC2 Instance. Install Docker and deploy the necessary containers.
  • D. Create an EC2 Instance. Install Docker and deploy the necessary containers. Add an Autoscaling Group for scalability of the containers.


B. The Elastic Beanstalk service is the ideal service to quickly provision development environments. You can also create environments which can be used to host Docker based containers.

Reference: Create and Deploy Docker in AWS


Top

Q28: You’ve written an application that uploads objects onto an S3 bucket. The size of the object varies between 200 – 500 MB. You’ve seen that the application sometimes takes a longer than expected time to upload the object. You want to improve the performance of the application. Which of the following would you consider?

  • A. Create multiple threads and upload the objects in the multiple threads
  • B. Write the items in batches for better performance
  • C. Use the Multipart upload API
  • D. Enable versioning on the Bucket


C. All other options are invalid since the best way to handle large object uploads to the S3 service is to use the Multipart upload API. The Multipart upload API enables you to upload large objects in parts. You can use this API to upload new large objects or make a copy of an existing object. Multipart uploading is a three-step process: You initiate the upload, you upload the object parts, and after you have uploaded all the parts, you complete the multipart upload. Upon receiving the complete multipart upload request, Amazon S3 constructs the object from the uploaded parts, and you can then access the object just as you would any other object in your bucket.

Reference: https://docs.aws.amazon.com/AmazonS3/latest/dev/mpuoverview.html


Top

Q29: A security system monitors 600 cameras, saving image metadata every 1 minute to an Amazon DynamoDb table. Each sample involves 1kb of data, and the data writes are evenly distributed over time. How much write throughput is required for the target table?

  • A. 6000
  • B. 10
  • C. 3600
  • D. 600


B. When you mention the write capacity of a table in Dynamo DB, you mention it as the number of 1KB writes per second. So in the above question, since the write is happening every minute, we need to divide the value of 600 by 60, to get the number of KB writes per second. This gives a value of 10.

You can specify the Write capacity in the Capacity tab of the DynamoDB table.

Reference: AWS working with tables

Q30: What two arguments does a Python Lambda handler function require?

  • A. invocation, zone
  • B. event, zone
  • C. invocation, context
  • D. event, context


D. event, context def handler_name(event, context):

return some_value
Reference: AWS Lambda Function Handler in Python

Top

Q31: Lambda allows you to upload code and dependencies for function packages:

  • A. Only from a directly uploaded zip file
  • B. Only via SFTP
  • C. Only from a zip file in AWS S3
  • D. From a zip file in AWS S3 or uploaded directly from elsewhere


D. From a zip file in AWS S3 or uploaded directly from elsewhere
Reference: AWS Lambda Deployment Package

Top

Q32: A Lambda deployment package contains:

  • A. Function code, libraries, and runtime binaries
  • B. Only function code
  • C. Function code and libraries not included within the runtime
  • D. Only libraries not included within the runtime


C. Function code and libraries not included within the runtime
Reference: AWS Lambda Deployment Package in PowerShell

Top

Q33: You have instances inside private subnets and a properly configured bastion host instance in a public subnet. None of the instances in the private subnets have a public or Elastic IP address. How can you connect an instance in the private subnet to the open internet to download system updates?

  • A. Create and assign EIP to each instance
  • B. Create and attach a second IGW to the VPC.
  • C. Create and utilize a NAT Gateway
  • D. Connect to a VPN


C. You can use a network address translation (NAT) gateway in a public subnet in your VPC to enable instances in the private subnet to initiate outbound traffic to the Internet, but prevent the instances from receiving inbound traffic initiated by someone on the Internet.
Reference: AWS Network Address Translation Gateway

Top

Q34: What feature of VPC networking should you utilize if you want to create “elasticity” in your application’s architecture?

  • A. Security Groups
  • B. Route Tables
  • C. Elastic Load Balancer
  • D. Auto Scaling


D. Auto scaling is designed specifically with elasticity in mind. Auto scaling allows for the increase and decrease of compute power based on demand, thus creating elasticity in the architecture.
Reference: AWS Autoscalling

Top

Q30: Lambda allows you to upload code and dependencies for function packages:

  • A. Only from a directly uploaded zip file
  • B. Only from a directly uploaded zip file
  • C. Only from a zip file in AWS S3
  • D. From a zip file in AWS S3 or uploaded directly from elsewhere

Answer:


D. From a zip file in AWS S3 or uploaded directly from elsewhere
Reference: AWS Lambda

Top

Q31: An organization is using an Amazon ElastiCache cluster in front of their Amazon RDS instance. The organization would like the Developer to implement logic into the code so that the cluster only retrieves data from RDS when there is a cache miss. What strategy can the Developer implement to achieve this?

  • A. Lazy loading
  • B. Write-through
  • C. Error retries
  • D. Exponential backoff

Answer:


Answer – A
Whenever your application requests data, it first makes the request to the ElastiCache cache. If the data exists in the cache and is current, ElastiCache returns the data to your application. If the data does not exist in the cache, or the data in the cache has expired, your application requests data from your data store which returns the data to your application. Your application then writes the data received from the store to the cache so it can be more quickly retrieved next time it is requested. All other options are incorrect.
Reference: Caching Strategies

Top

Q32: A developer is writing an application that will run on Ec2 instances and read messages from SQS queue. The messages will arrive every 15-60 seconds. How should the Developer efficiently query the queue for new messages?

  • A. Use long polling
  • B. Set a custom visibility timeout
  • C. Use short polling
  • D. Implement exponential backoff


Answer – A Long polling will help insure that the applications make less requests for messages in a shorter period of time. This is more cost effective. Since the messages are only going to be available after 15 seconds and we don’t know exacly when they would be available, it is better to use Long Polling.
Reference: Amazon SQS Long Polling

Top

Q33: You are using AWS SAM to define a Lambda function and configure CodeDeploy to manage deployment patterns. With new Lambda function working as per expectation which of the following will shift traffic from original Lambda function to new Lambda function in the shortest time frame?

  • A. Canary10Percent5Minutes
  • B. Linear10PercentEvery10Minutes
  • C. Canary10Percent15Minutes
  • D. Linear10PercentEvery1Minute


Answer – A
With Canary Deployment Preference type, Traffic is shifted in two intervals. With Canary10Percent5Minutes, 10 percent of traffic is shifted in the first interval while remaining all traffic is shifted after 5 minutes.
Reference: Gradual Code Deployment

Top

Q34: You are using AWS SAM templates to deploy a serverless application. Which of the following resource will embed application from Amazon S3 buckets?

  • A. AWS::Serverless::Api
  • B. AWS::Serverless::Application
  • C. AWS::Serverless::Layerversion
  • D. AWS::Serverless::Function


Answer – B
AWS::Serverless::Application resource in AWS SAm template is used to embed application frm Amazon S3 buckets.
Reference: Declaring Serverless Resources

Top

Q35: You are using AWS Envelope Encryption for encrypting all sensitive data. Which of the followings is True with regards to Envelope Encryption?

  • A. Data is encrypted be encrypting Data key which is further encrypted using encrypted Master Key.
  • B. Data is encrypted by plaintext Data key which is further encrypted using encrypted Master Key.
  • C. Data is encrypted by encrypted Data key which is further encrypted using plaintext Master Key.
  • D. Data is encrypted by plaintext Data key which is further encrypted using plaintext Master Key.


Answer – D
With Envelope Encryption, unencrypted data is encrypted using plaintext Data key. This Data is further encrypted using plaintext Master key. This plaintext Master key is securely stored in AWS KMS & known as Customer Master Keys.
Reference: AWS Key Management Service Concepts

Top

Q36: You are developing an application that will be comprised of the following architecture –

  1. A set of Ec2 instances to process the videos.
  2. These (Ec2 instances) will be spun up by an autoscaling group.
  3. SQS Queues to maintain the processing messages.
  4. There will be 2 pricing tiers.

How will you ensure that the premium customers videos are given more preference?

  • A. Create 2 Autoscaling Groups, one for normal and one for premium customers
  • B. Create 2 set of Ec2 Instances, one for normal and one for premium customers
  • C. Create 2 SQS queus, one for normal and one for premium customers
  • D. Create 2 Elastic Load Balancers, one for normal and one for premium customers.


Answer – C
The ideal option would be to create 2 SQS queues. Messages can then be processed by the application from the high priority queue first.<br? The other options are not the ideal options. They would lead to extra costs and also extra maintenance.
Reference: SQS

Top

Q37: You are developing an application that will interact with a DynamoDB table. The table is going to take in a lot of read and write operations. Which of the following would be the ideal partition key for the DynamoDB table to ensure ideal performance?

  • A. CustomerID
  • B. CustomerName
  • C. Location
  • D. Age


Answer- A
Use high-cardinality attributes. These are attributes that have distinct values for each item, like e-mailid, employee_no, customerid, sessionid, orderid, and so on..
Use composite attributes. Try to combine more than one attribute to form a unique key.
Reference: Choosing the right DynamoDB Partition Key

Top

Q38: A developer is making use of AWS services to develop an application. He has been asked to develop the application in a manner to compensate any network delays. Which of the following two mechanisms should he implement in the application?

  • A. Multiple SQS queues
  • B. Exponential backoff algorithm
  • C. Retries in your application code
  • D. Consider using the Java sdk.


Answer- B. and C.
In addition to simple retries, each AWS SDK implements exponential backoff algorithm for better flow control. The idea behind exponential backoff is to use progressively longer waits between retries for consecutive error responses. You should implement a maximum delay interval, as well as a maximum number of retries. The maximum delay interval and maximum number of retries are not necessarily fixed values, and should be set based on the operation being performed, as well as other local factors, such as network latency.
Reference: Error Retries and Exponential Backoff in AWS

Top

Q39: An application is being developed that is going to write data to a DynamoDB table. You have to setup the read and write throughput for the table. Data is going to be read at the rate of 300 items every 30 seconds. Each item is of size 6KB. The reads can be eventual consistent reads. What should be the read capacity that needs to be set on the table?

  • A. 10
  • B. 20
  • C. 6
  • D. 30


Answer – A

Since there are 300 items read every 30 seconds , that means there are (300/30) = 10 items read every second.
Since each item is 6KB in size , that means , 2 reads will be required for each item.
So we have total of 2*10 = 20 reads for the number of items per second
Since eventual consistency is required , we can divide the number of reads(20) by 2 , and in the end we get the Read Capacity of 10.

Reference: Read/Write Capacity Mode


Top

Q40: You are in charge of deploying an application that will be hosted on an EC2 Instance and sit behind an Elastic Load balancer. You have been requested to monitor the incoming connections to the Elastic Load Balancer. Which of the below options can suffice this requirement?

  • A. Use AWS CloudTrail with your load balancer
  • B. Enable access logs on the load balancer
  • C. Use a CloudWatch Logs Agent
  • D. Create a custom metric CloudWatch lter on your load balancer


Answer – B
Elastic Load Balancing provides access logs that capture detailed information about requests sent to your load balancer. Each log contains information such as the time the request was received, the client’s IP address, latencies, request paths, and server responses. You can use these access logs to analyze traffic patterns and troubleshoot issues.
Reference: Access Logs for Your Application Load Balancer

Top

Q41: A static web site has been hosted on a bucket and is now being accessed by users. One of the web pages javascript section has been changed to access data which is hosted in another S3 bucket. Now that same web page is no longer loading in the browser. Which of the following can help alleviate the error?

  • A. Enable versioning for the underlying S3 bucket.
  • B. Enable Replication so that the objects get replicated to the other bucket
  • C. Enable CORS for the bucket
  • D. Change the Bucket policy for the bucket to allow access from the other bucket


Answer – C

Cross-origin resource sharing (CORS) defines a way for client web applications that are loaded in one domain to interact with resources in a different domain. With CORS support, you can build rich client-side web applications with Amazon S3 and selectively allow cross-origin access to your Amazon S3 resources.

Cross-Origin Resource Sharing: Use-case Scenarios The following are example scenarios for using CORS:

  Scenario 1: Suppose that you are hosting a website in an Amazon S3 bucket named website as described in Hosting a Static Website on Amazon S3. Your users load the website endpoint http://website.s3-website-us-east-1.amazonaws.com. Now you want to use JavaScript on the webpages that are stored in this bucket to be able to make authenticated GET and PUT requests against the same bucket by using the Amazon S3 API endpoint for the bucket, website.s3.amazonaws.com. A browser would normally block JavaScript from allowing those requests, but with CORS you can congure your bucket to explicitly enable cross-origin requests from website.s3-website-us-east-1.amazonaws.com.

Scenario 2: Suppose that you want to host a web font from your S3 bucket. Again, browsers require a CORS check (also called a preight check) for loading web fonts. You would congure the bucket that is hosting the web font to allow any origin to make these requests.

Reference: Cross-Origin Resource Sharing (CORS)


Top

Q42: Your mobile application includes a photo-sharing service that is expecting tens of thousands of users at launch. You will leverage Amazon Simple Storage Service (S3) for storage of the user Images, and you must decide how to authenticate and authorize your users for access to these images. You also need to manage the storage of these images. Which two of the following approaches should you use? Choose two answers from the options below

  • A. Create an Amazon S3 bucket per user, and use your application to generate the S3 URL for the appropriate content.
  • B. Use AWS Identity and Access Management (IAM) user accounts as your application-level user database, and offload the burden of authentication from your application code.
  • C. Authenticate your users at the application level, and use AWS Security Token Service (STS)to grant token-based authorization to S3 objects.
  • D. Authenticate your users at the application level, and send an SMS token message to the user. Create an Amazon S3 bucket with the same name as the SMS message token, and move the user’s objects to that bucket.


Answer- C
The AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users). The token can then be used to grant access to the objects in S3.
You can then provides access to the objects based on the key values generated via the user id.

Reference: The AWS Security Token Service (STS)


Top

Q43: Your current log analysis application takes more than four hours to generate a report of the top 10 users of your web application. You have been asked to implement a system that can report this information in real time, ensure that the report is always up to date, and handle increases in the number of requests to your web application. Choose the option that is cost-effective and can fulfill the requirements.

  • A. Publish your data to CloudWatch Logs, and congure your application to Autoscale to handle the load on demand.
  • B. Publish your log data to an Amazon S3 bucket.  Use AWS CloudFormation to create an Auto Scaling group to scale your post-processing application which is congured to pull down your log les stored an Amazon S3
  • C. Post your log data to an Amazon Kinesis data stream, and subscribe your log-processing application so that is congured to process your logging data.
  • D. Create a multi-AZ Amazon RDS MySQL cluster, post the logging data to MySQL, and run a map reduce job to retrieve the required information on user counts.

Answer:


Answer – C
Amazon Kinesis makes it easy to collect, process, and analyze real-time, streaming data so you can get timely insights and react quickly to new information. Amazon Kinesis offers key capabilities to cost effectively process streaming data at any scale, along with the flexibility to choose the tools that best suit the requirements of your application. With Amazon Kinesis, you can ingest real-time data such as application logs, website clickstreams, IoT telemetry data, and more into your databases, data lakes and data warehouses, or build your own real-time applications using this data. 
Reference: Amazon Kinesis

Top

Q44: You’ve been instructed to develop a mobile application that will make use of AWS services. You need to decide on a data store to store the user sessions. Which of the following would be an ideal data store for session management?

  • A. AWS Simple Storage Service
  • B. AWS DynamoDB
  • C. AWS RDS
  • D. AWS Redshift

Answer:


Answer – B
DynamoDB is a alternative solution which can be used for storage of session management. The latency of access to data is less , hence this can be used as a data store for session management
Reference: Scalable Session Handling in PHP Using Amazon DynamoDB

Top

Q45: Your application currently interacts with a DynamoDB table. Records are inserted into the table via the application. There is now a requirement to ensure that whenever items are updated in the DynamoDB primary table , another record is inserted into a secondary table. Which of the below feature should be used when developing such a solution?

  • A. AWS DynamoDB Encryption
  • B. AWS DynamoDB Streams
  • C. AWS DynamoDB Accelerator
  • D. AWSTable Accelerator


Answer – B
DynamoDB Streams Use Cases and Design Patterns This post describes some common use cases you might encounter, along with their design options and solutions, when migrating data from relational data stores to Amazon DynamoDB. We will consider how to manage the following scenarios:

  • How do you set up a relationship across multiple tables in which, based on the value of an item from one table, you update the item in a second table?
  • How do you trigger an event based on a particular transaction?
  • How do you audit or archive transactions?
  • How do you replicate data across multiple tables (similar to that of materialized views/streams/replication in relational data stores)?

Relational databases provide native support for transactions, triggers, auditing, and replication. Typically, a transaction in a database refers to performing create, read, update, and delete (CRUD) operations against multiple tables in a block. A transaction can have only two states—success or failure. In other words, there is no partial completion. As a NoSQL database, DynamoDB is not designed to support transactions. Although client-side libraries are available to mimic the transaction capabilities, they are not scalable and cost-effective. For example, the Java Transaction Library for DynamoDB creates 7N+4 additional writes for every write operation. This is partly because the library holds metadata to manage the transactions to ensure that it’s consistent and can be rolled back before commit. You can use DynamoDB Streams to address all these use cases. DynamoDB Streams is a powerful service that you can combine with other AWS services to solve many similar problems. When enabled, DynamoDB Streams captures a time-ordered sequence of item-level modifications in a DynamoDB table and durably stores the information for up to 24 hours. Applications can access a series of stream records, which contain an item change, from a DynamoDB stream in near real time. AWS maintains separate endpoints for DynamoDB and DynamoDB Streams. To work with database tables and indexes, your application must access a DynamoDB endpoint. To read and process DynamoDB Streams records, your application must access a DynamoDB Streams endpoint in the same Region. All of the other options are incorrect since none of these would meet the core requirement.
Reference: DynamoDB Streams Use Cases and Design Patterns


Top

Q46: An application has been making use of AWS DynamoDB for its back-end data store. The size of the table has now grown to 20 GB , and the scans on the table are causing throttling errors. Which of the following should now be implemented to avoid such errors?

  • A. Large Page size
  • B. Reduced page size
  • C. Parallel Scans
  • D. Sequential scans

Answer – B
When you scan your table in Amazon DynamoDB, you should follow the DynamoDB best practices for avoiding sudden bursts of read activity. You can use the following technique to minimize the impact of a scan on a table’s provisioned throughput. Reduce page size Because a Scan operation reads an entire page (by default, 1 MB), you can reduce the impact of the scan operation by setting a smaller page size. The Scan operation provides a Limit parameter that you can use to set the page size for your request. Each Query or Scan request that has a smaller page size uses fewer read operations and creates a “pause” between each request. For example, suppose that each item is 4 KB and you set the page size to 40 items. A Query request would then consume only 20 eventually consistent read operations or 40 strongly consistent read operations. A larger number of smaller Query or Scan operations would allow your other critical requests to succeed without throttling.
Reference1: Rate-Limited Scans in Amazon DynamoDB

Reference2: Best Practices for Querying and Scanning Data


Top

Q47: Which of the following is correct way of passing a stage variable to an HTTP URL ? (Select TWO.)

  • A. http://example.com/${}/prod
  • B. http://example.com/${stageVariables.}/prod
  • C. http://${stageVariables.}.example.com/dev/operation
  • D. http://${stageVariables}.example.com/dev/operation
  • E. http://${}.example.com/dev/operation
  • F. http://example.com/${stageVariables}/prod


Answer – B. and C.
A stage variable can be used as part of HTTP integration URL as in following cases, ·         A full URI without protocol ·         A full domain ·         A subdomain ·         A path ·         A query string In the above case , option B & C displays stage variable as a path & sub-domain.
Reference: Amazon API Gateway Stage Variables Reference

Top

Q48: Your company is planning on creating new development environments in AWS. They want to make use of their existing Chef recipes which they use for their on-premise configuration for servers in AWS. Which of the following service would be ideal to use in this regard?

  • A. AWS Elastic Beanstalk
  • B. AWS OpsWork
  • C. AWS Cloudformation
  • D. AWS SQS


Answer – B
AWS OpsWorks is a configuration management service that provides managed instances of Chef and Puppet. Chef and Puppet are automation platforms that allow you to use code to automate the configurations of your servers. OpsWorks lets you use Chef and Puppet to automate how servers are configured, deployed, and managed across your Amazon EC2 instances or on-premises compute environments All other options are invalid since they cannot be used to work with Chef recipes for configuration management.
Reference: AWS OpsWorks

Top

Q49: Your company has developed a web application and is hosting it in an Amazon S3 bucket configured for static website hosting. The users can log in to this app using their Google/Facebook login accounts. The application is using the AWS SDK for JavaScript in the browser to access data stored in an Amazon DynamoDB table. How can you ensure that API keys for access to your data in DynamoDB are kept secure?

  • A. Create an Amazon S3 role in IAM with access to the specific DynamoDB tables, and assign it to the bucket hosting your website
  • B. Configure S3 bucket tags with your AWS access keys for your bucket hosing your website so that the application can query them for access.
  • C. Configure a web identity federation role within IAM to enable access to the correct DynamoDB resources and retrieve temporary credentials
  • D. Store AWS keys in global variables within your application and configure the application to use these credentials when making requests.


Answer – C
With web identity federation, you don’t need to create custom sign-in code or manage your own user identities. Instead, users of your app can sign in using a well-known identity provider (IdP) —such as Login with Amazon, Facebook, Google, or any other OpenID Connect (OIDC)-compatible IdP, receive an authentication token, and then exchange that token for temporary security credentials in AWS that map to an IAM role with permissions to use the resources in your AWS account. Using an IdP helps you keep your AWS account secure, because you don’t have to embed and distribute long-term security credentials with your application. Option A is invalid since Roles cannot be assigned to S3 buckets Options B and D are invalid since the AWS Access keys should not be used
Reference: About Web Identity Federation

Top

Q50: Your application currently makes use of AWS Cognito for managing user identities. You want to analyze the information that is stored in AWS Cognito for your application. Which of the following features of AWS Cognito should you use for this purpose?

  • A. Cognito Data
  • B. Cognito Events
  • C. Cognito Streams
  • D. Cognito Callbacks


Answer – C
Amazon Cognito Streams gives developers control and insight into their data stored in Amazon Cognito. Developers can now configure a Kinesis stream to receive events as data is updated and synchronized. Amazon Cognito can push each dataset change to a Kinesis stream you own in real time. All other options are invalid since you should use Cognito Streams
Reference:

Top

Q51: You’ve developed a set of scripts using AWS Lambda. These scripts need to access EC2 Instances in a VPC. Which of the following needs to be done to ensure that the AWS Lambda function can access the resources in the VPC. Choose 2 answers from the options given below

  • A. Ensure that the subnet ID’s are mentioned when configuring the Lambda function
  • B. Ensure that the NACL ID’s are mentioned when configuring the Lambda function
  • C. Ensure that the Security Group ID’s are mentioned when configuring the Lambda function
  • D. Ensure that the VPC Flow Log ID’s are mentioned when configuring the Lambda function


Answer: A and C.
AWS Lambda runs your function code securely within a VPC by default. However, to enable your Lambda function to access resources inside your private VPC, you must provide additional VPCspecific configuration information that includes VPC subnet IDs and security group IDs. AWS Lambda uses this information to set up elastic network interfaces (ENIs) that enable your function to connect securely to other resources within your private VPC.
Reference: Configuring a Lambda Function to Access Resources in an Amazon VPC

Top

Q52: You’ve currently been tasked to migrate an existing on-premise environment into Elastic Beanstalk. The application does not make use of Docker containers. You also can’t see any relevant environments in the beanstalk service that would be suitable to host your application. What should you consider doing in this case?

  • A. Migrate your application to using Docker containers and then migrate the app to the Elastic Beanstalk environment.
  • B. Consider using Cloudformation to deploy your environment to Elastic Beanstalk
  • C. Consider using Packer to create a custom platform
  • D. Consider deploying your application using the Elastic Container Service


Answer – C
Elastic Beanstalk supports custom platforms. A custom platform is a more advanced customization than a Custom Image in several ways. A custom platform lets you develop an entire new platform from scratch, customizing the operating system, additional software, and scripts that Elastic Beanstalk runs on platform instances. This flexibility allows you to build a platform for an application that uses a language or other infrastructure software, for which Elastic Beanstalk doesn’t provide a platform out of the box. Compare that to custom images, where you modify an AMI for use with an existing Elastic Beanstalk platform, and Elastic Beanstalk still provides the platform scripts and controls the platform’s software stack. In addition, with custom platforms you use an automated, scripted way to create and maintain your customization, whereas with custom images you make the changes manually over a running instance. To create a custom platform, you build an Amazon Machine Image (AMI) from one of the supported operating systems—Ubuntu, RHEL, or Amazon Linux (see the flavor entry in Platform.yaml File Format for the exact version numbers)—and add further customizations. You create your own Elastic Beanstalk platform using Packer, which is an open-source tool for creating machine images for many platforms, including AMIs for use with Amazon EC2. An Elastic Beanstalk platform comprises an AMI configured to run a set of software that supports an application, and metadata that can include custom configuration options and default configuration option settings.
Reference: AWS Elastic Beanstalk Custom Platforms

Top

Q53: Company B is writing 10 items to the Dynamo DB table every second. Each item is 15.5Kb in size. What would be the required provisioned write throughput for best performance? Choose the correct answer from the options below.

  • A. 10
  • B. 160
  • C. 155
  • D. 16


Answer – B.
Company B is writing 10 items to the Dynamo DB table every second. Each item is 15.5Kb in size. What would be the required provisioned write throughput for best performance? Choose the correct answer from the options below.
Reference: Read/Write Capacity Mode

Top

Top

Q54: Which AWS Service can be used to automatically install your application code onto EC2, on premises systems and Lambda?

  • A. CodeCommit
  • B. X-Ray
  • C. CodeBuild
  • D. CodeDeploy


Answer: D

Reference: AWS CodeDeploy


Top

Q55: Which AWS service can be used to compile source code, run tests and package code?

  • A. CodePipeline
  • B. CodeCommit
  • C. CodeBuild
  • D. CodeDeploy


Answer: C.

Reference: AWS CodeBuild


Top

Q56: How can your prevent CloudFormation from deleting your entire stack on failure? (Choose 2)

  • A. Set the Rollback on failure radio button to No in the CloudFormation console
  • B. Set Termination Protection to Enabled in the CloudFormation console
  • C. Use the –disable-rollback flag with the AWS CLI
  • D. Use the –enable-termination-protection protection flag with the AWS CLI


Answer: A. and C.

Reference: Protecting a Stack From Being Deleted

Top

Q57: Which of the following practices allows multiple developers working on the same application to merge code changes frequently, without impacting each other and enables the identification of bugs early on in the release process?

  • A. Continuous Integration
  • B. Continuous Deployment
  • C. Continuous Delivery
  • D. Continuous Development


Answer: A

Reference: What is Continuous Integration?

Top

Q58: When deploying application code to EC2, the AppSpec file can be written in which language?

  • A. JSON
  • B. JSON or YAML
  • C. XML
  • D. YAML

Top

Q59: Part of your CloudFormation deployment fails due to a mis-configuration, by defaukt what will happen?

  • A. CloudFormation will rollback only the failed components
  • B. CloudFormation will rollback the entire stack
  • C. Failed component will remain available for debugging purposes
  • D. CloudFormation will ask you if you want to continue with the deployment


Answer: B

Reference: Troubleshooting AWS CloudFormation

Top

Q60: You want to receive an email whenever a user pushes code to CodeCommit repository, how can you configure this?

  • A. Create a new SNS topic and configure it to poll for CodeCommit eveents. Ask all users to subscribe to the topic to receive notifications
  • B. Configure a CloudWatch Events rule to send a message to SES which will trigger an email to be sent whenever a user pushes code to the repository.
  • C. Configure Notifications in the console, this will create a CloudWatch events rule to send a notification to a SNS topic which will trigger an email to be sent to the user.
  • D. Configure a CloudWatch Events rule to send a message to SQS which will trigger an email to be sent whenever a user pushes code to the repository.


Answer: C

Reference: Getting Started with Amazon SNS

Top

Q61: Which AWS service can be used to centrally store and version control your application source code, binaries and libraries

  • A. CodeCommit
  • B. CodeBuild
  • C. CodePipeline
  • D. ElasticFileSystem


Answer: A

Reference: AWS CodeCommit

Top

Q62: You are using CloudFormation to create a new S3 bucket,
which of the following sections would you use to define the properties of your bucket?

  • A. Conditions
  • B. Parameters
  • C. Outputs
  • D. Resources


Answer: D

Reference: Resources

Top

Q63: You are deploying a number of EC2 and RDS instances using CloudFormation. Which section of the CloudFormation template
would you use to define these?

  • A. Transforms
  • B. Outputs
  • C. Resources
  • D. Instances


Answer: C.
The Resources section defines your resources you are provisioning. Outputs is used to output user defines data relating to the reources you have built and can also used as input to another CloudFormation stack. Transforms is used to reference code located in S3.

Reference: Resources

Top

Q64: Which AWS service can be used to fully automate your entire release process?

  • A. CodeDeploy
  • B. CodePipeline
  • C. CodeCommit
  • D. CodeBuild


Answer: B.
AWS CodePipeline is a fully managed continuous delivery service that helps you automate your release pipelines for fast and reliable application and infrastructure updates

Reference: AWS CodePipeline

Top

Q65: You want to use the output of your CloudFormation stack as input to another CloudFormation stack. Which sections of the CloudFormation template would you use to help you configure this?

  • A. Outputs
  • B. Transforms
  • C. Resources
  • D. Exports


Answer: A.
Outputs is used to output user defines data relating to the reources you have built and can also used as input to another CloudFormation stack.

Reference: CloudFormation Outputs

Top

Q66: You have some code located in an S3 bucket that you want to reference in your CloudFormation template. Which section of the template can you use to define this?

  • A. Inputs
  • B. Resources
  • C. Transforms
  • D. Files


Answer: C.
Transforms is used to reference code located in S3 and also specififying the use of the Serverless Application Model (SAM)
for Lambda deployments.
Transform:
Name: ‘AWS::Include’
Parameters:
Location: ‘s3://MyAmazonS3BucketName/MyFileName.yaml’

Reference: Transforms

Top

Q67: You are deploying an application to a number of Ec2 instances using CodeDeploy. What is the name of the file
used to specify source files and lifecycle hooks?

  • A. buildspec.yml
  • B. appspec.json
  • C. appspec.yml
  • D. buildspec.json


Answer: C.

Reference: CodeDeploy AppSpec File Reference

Top

Q68: Which of the following approaches allows you to re-use pieces of CloudFormation code in multiple templates, for common use cases like provisioning a load balancer or web server?

  • A. Share the code using an EBS volume
  • B. Copy and paste the code into the template each time you need to use it
  • C. Use a cloudformation nested stack
  • D. Store the code you want to re-use in an AMI and reference the AMI from within your CloudFormation template.


Answer: C.

Reference: Working with Nested Stacks

Top

Q69: In the CodeDeploy AppSpec file, what are hooks used for?

  • A. To reference AWS resources that will be used during the deployment
  • B. Hooks are reserved for future use
  • C. To specify files you want to copy during the deployment.
  • D. To specify, scripts or function that you want to run at set points in the deployment lifecycle


Answer: D.
The ‘hooks’ section for an EC2/On-Premises deployment contains mappings that link deployment lifecycle event hooks to one or more scripts.

Reference: AppSpec ‘hooks’ Section

Top

Q70: Which command can you use to encrypt a plain text file using CMK?

  • A. aws kms-encrypt
  • B. aws iam encrypt
  • C. aws kms encrypt
  • D. aws encrypt

Answer: C.
aws kms encrypt –key-id 1234abcd-12ab-34cd-56ef-1234567890ab –plaintext fileb://ExamplePlaintextFile –output text –query CiphertextBlob > C:\Temp\ExampleEncryptedFile.base64

Reference: AWS CLI Encrypt

Top

Q72: Which of the following is an encrypted key used by KMS to encrypt your data

  • A. Custmoer Mamaged Key
  • B. Encryption Key
  • C. Envelope Key
  • D. Customer Master Key

Answer: C.
Your Data key also known as the Enveloppe key is encrypted using the master key.This approach is known as Envelope encryption.
Envelope encryption is the practice of encrypting plaintext data with a data key, and then encrypting the data key under another key.

Reference: Envelope Encryption

Top

Q73: Which of the following statements are correct? (Choose 2)

  • A. The Customer Master Key is used to encrypt and decrypt the Envelope Key or Data Key
  • B. The Envelope Key or Data Key is used to encrypt and decrypt plain text files.
  • C. The envelope Key or Data Key is used to encrypt and decrypt the Customer Master Key.
  • D. The Customer MasterKey is used to encrypt and decrypt plain text files.

Answer: A. and B.

Reference: AWS Key Management Service Concepts

Top

Q74: Which of the following statements is correct in relation to kMS/ (Choose 2)

  • A. KMS Encryption keys are regional
  • B. You cannot export your customer master key
  • C. You can export your customer master key.
  • D. KMS encryption Keys are global

Answer: A. and B.

Reference: AWS Key Management Service FAQs

Top

AWS Certified Developer Associate exam: Whitepapers

AWS has provided whitepapers to help you understand the technical concepts. Below are the recommended whitepapers for the AWS Certified Developer – Associate Exam.

Top

Online Training and Labs for AWS Certified Developer Associates Exam

Top

AWS Developer Associates Jobs

Top

AWS Certified Developer-Associate Exam info and details, How To:

The AWS Certified Developer Associate exam is a multiple choice, multiple answer exam. Here is the Exam Overview:

  • Certification Name: AWS Certified Developer Associate.
  • Prerequisites for the Exam: None.
  • Exam Pattern: Multiple Choice Questions
  • The AWS Certified Developer-Associate Examination (DVA-C01) is a pass or fail exam. The examination is scored against a minimum standard established by AWS professionals guided by certification industry best practices and guidelines.
  • Your results for the examination are reported as a score from 100 – 1000, with a minimum passing score of 720.
  • Exam fees: US $150
  • Exam Guide on AWS Website
  • Available languages for tests: English, Japanese, Korean, Simplified Chinese
  • Read AWS whitepapers
  • Register for certification account here.
  • Prepare for Certification Here
  • Exam Content Outline

    Domain % of Examination
    Domain 1: Deployment (22%)
    1.1 Deploy written code in AWS using existing CI/CD pipelines, processes, and patterns.
    1.2 Deploy applications using Elastic Beanstalk.
    1.3 Prepare the application deployment package to be deployed to AWS.
    1.4 Deploy serverless applications
    22%
    Domain 2: Security (26%)
    2.1 Make authenticated calls to AWS services.
    2.2 Implement encryption using AWS services.
    2.3 Implement application authentication and authorization.
    26%
    Domain 3: Development with AWS Services (30%)
    3.1 Write code for serverless applications.
    3.2 Translate functional requirements into application design.
    3.3 Implement application design into application code.
    3.4 Write code that interacts with AWS services by using APIs, SDKs, and AWS CLI.
    30%
    Domain 4: Refactoring
    4.1 Optimize application to best use AWS services and features.
    4.2 Migrate existing application code to run on AWS.
    10%
    Domain 5: Monitoring and Troubleshooting (10%)
    5.1 Write code that can be monitored.
    5.2 Perform root cause analysis on faults found in testing or production.
    10%
    TOTAL 100%

Top

AWS Certified Developer Associate exam: Additional Information for reference

Below are some useful reference links that would help you to learn about AWS Certified Developer Associate Exam.

Top

Other Relevant and Recommended AWS Certifications

AWS Certification Exams Roadmap
AWS Certification Exams Roadmap

Top

Top

error: Content is protected !!