Exam information

Exam AWS-CDA: AWS Certified Developer - Associate

Other exams

Which approach below provides the least impact to provisioned throughput on the "Product" table?

Which approach below provides the least impact to provisioned throughput on the "Product"table?

Which DynamoDB limits can be raised by contacting AWS support?

Which DynamoDB limits can be raised by contacting AWS support? Choose 2 answers


Which of the following items are required to allow an application deployed on an EC2 instance to write data to a DynamoDB table?

Which of the following items are required to allow an application deployed on an EC2instance to write data to a DynamoDB table? Assume that no security Keys are allowed tobe stored on the EC2 instance. Choose 2 answers

Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?

Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?

what is the region-specific website endpoint?

An Amazon S3 bucket, "myawsbucket” is configured with website hosting in Tokyo region,what is the region-specific website endpoint?

Which two approaches can satisfy the objectives?

A corporate web application is deployed within an Amazon VPC, and is connected to thecorporate data center via IPSec VPN. The application must authenticate against theon-premise LDAP server. Once authenticated, logged-in users can only access an S3keyspace specific to the user. Which two […]

You advise them to:

You are providing AWS consulting services for a company developing a new mobileapplication that will be leveraging Amazon SNS Mobile Push for push notifications. In orderto send direct notification messages to individual devices each device registration identifieror token needs to be […]

What type of block cipher does Amazon S3 offer for server side encryption?

What type of block cipher does Amazon S3 offer for server side encryption?

What is a possible solution to prevent this happening?

You have written an application that uses the Elastic Load Balancing service to spreadtraffic to several web servers Your users complain that they are sometimes forced to loginagain in the middle of using your application, after they have already togged in. This is notbehavior you have […]

Which of the following is an example of a good DynamoDB hash key schema for provisioned throughput efficiency?

Which of the following is an example of a good DynamoDB hash key schema forprovisioned throughput efficiency?

Page 2 of 612345...Last »