100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D321 - AWS Developer Exam Questions and Answers (Rated A+)

Rating
-
Sold
2
Pages
29
Grade
A+
Uploaded on
14-12-2024
Written in
2024/2025

WGU D321 - AWS Developer Exam Questions and Answers (Rated A+) Send an email after push to CodeCommit? - Answers Use Notifications, this will add CW Events rule to send a notification to SNS which will trigger an email to be sent What AWS service to fully automate entire process? - Answers CodePipeline What 2 things can go in the Transforms section of CF? - Answers - Re-use Code located in S3 - Specify the use of the Serverless Application Model for Lamdba deployments. What CF section to define proerties of a new bucket? - Answers Resources What are hooks for in CodeDeploy AppSpec file? - Answers To specify code, scripts or functions that you want to run at set points int he developmnet lifecycle Name of CodeDeply file to specify source files and lifecylce hooks? - Answers is appSpec file only YAML - Answers no, also json What API call to enable user authentication via Facebook to a app in AWS? - Answers STS assume-role-with-web-identity when would you use an Inline Policy over Managed? - Answers To add permissions that are only ever intended to be used for a single user in your account What does Congnito use to manage sign-up and sign-in functionality for mobile and web applications? - Answers User Pools what does Cog to create unique identities for user and authenticate them with Web ID providers - Answers Identity Pools App behind ELB, how to get public IP addresses of the users? - Answers Update App to log the x-forwarded-for header. Which feature of AWS can you use to configure S3 to allow web applications being hosted in one S3 bucket to access files in another S3 bucket? - Answers CORS How does S3 determine which partition to use to store files? - Answers The key name determines which partition the file is stored in You are using S3 in AP-Northeast to host a static website in a bucket called "acloudguru". What would the new URL endpoint be? - Answers What is the HTTP code you would see once you successfully place a file in an S3 bucket? - Answers 200 Is a new S3 bucket public by default? - Answers No You work for an online gaming store which has a global worldwide leaderboard for players of the game. You need to implement a caching system for your leaderboard that has multiple availability zones in order to prevent an outage. Which ElastiCache solution should you use? - Answers Redis You have a three-tier web application with a webserver tier, application tier and database tier. The application is spread across multiple availability zones for redundancy and is in an autoscaling group with a minimum size of 2 and a maximum size of 10. The application relies on connecting to an RDS multi-AZ database. When new instances are launched they download a connection string file which is saved in an encrypted S3 bucket using a bootstrap script. During a routine scaling event you notice that your new webservers are failing their health checks and are not coming in to service. You investigate and discover that the EC2 - S3 read only role that the webservers rely on has no policies attached to it. What steps should you take together to remediate this problem while maintaining the principle of least privilege? (Choose 2) - Answers Terminate the existing instances and allow new instances to come into service. Attach the S3 - Read-only policy to the role. You have an EC2 instance in a single availability zone connected to an RDS instance. The EC2 instance needs to communicate to S3 to download some important configuration files from it. You try the command aws s3 cp s3://yourbucket /var/www/html however you receive an error message. You log in to Identity Access Management (IAM) and discover there is no role created to allow EC2 to communicate to S3. You create the role and attach it to the existing EC2 instance. How fast will the changes take to propagate? - Answers Immediately Your EC2 instance needs to access files located in an S3 bucket, what is the best way to enable access? - Answers Create an IAM role with read access to S3 and assign the role to the EC2 instance * Using an IAM role associated with the EC2 instance is the recommended way, storing credentials locally is not recommended. When using the AWS REST API to upload an object to S3, which of the following request headers will ensure that your data must be encrypted using SSE? - Answers x-amz-server-side-encryption You need to allow another AWS account access to resources in your AWS account, what is the recommended mechanism to configure this? - Answers Configure cross account access by creating a role in your account which has permission to access only the resources they need. Allow the third party account to assume the role based on their account ID and unique external ID Roles are the primary way to grant cross-account access. With IAM roles, you can grant third parties access to your AWS resources without sharing your AWS security credentials. Instead, the third party can access your AWS resources by assuming a role that you create in your AWS account. Which of the following activities are the responsibility of the customer? Safe disposal of storage devices Security Group configuration settings Controls around who can physically access the data center Management of user credentials Encryption of sensitive data - Answers Security Group configuration settings Management of user credentials Encryption of sensitive data Security and Compliance is a shared responsibility between AWS and the customer. The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS-provided security group firewall. AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run AWS Cloud services. Your application needs to access content located in an S3 bucket which is residing in a different AWS account, which of the following API calls should be used to gain access? - Answers The STS AssumeRole API call returns a set of temporary security credentials which can be used to access AWS resources, incuding those in a different account You are working on a mobile phone app for an online retailer which stores customer data in DynamoDB. You would like to allow new users to sign-up using their Facebook credentials. What is the recommended approach? - Answers After the user has successfully logged in to Facebook and received an authentication token, Cognito should be used to exchange the token for temporary access to DynamoDB For mobile applications, using Cognito as an ID broker is the recommended approach to enabling user sign-up, sign-in and guest access using Web Identity Providers like Facebook. Which of the following does Cognito use to manage sign-up and sign-in functionality for mobile and web applications? - Answers Cognito User Pools are like a directory, allowing users sign-up and sign-in. Identity pools are used to grant temporary access to unauthenticated guests. IAM users are user account entities which allow you to interact with AWS resources. IAM groups are collections of IAM users and are used to specify permissions for multiple users. You are working on a mobile phone app for an online retailer which stores its customer data in DynamoDB. You would like to enable new users to sign-up using Facebook or Google credentials. What is the recommended approach? - Answers Once the user has logged in to the Web Identity Provider, use Cognito to exchange the authentication tokens for temporary access to DynamoDB You are building an S3 hosted website and your website is accessing javascript and image files located in another S3 bucket. How can you enable this? - Answers Cross-origin resource sharing (CORS) defines a way for client web applications that are loaded in one domain to interact with resources in a different domain. ou have provisioned an RDS database and then deployed your application servers using Elastic Beanstalk. You now need to connect your application servers to the database. What should you do? 2 things - Answers Configure a security group allowing access to the database and add it to your environments auto-scaling group Provide the database connection information to your application *As you are connecting to a database that was not created within your Elastic Beanstalk environment, you will need to create the Security Group yourself and also provide connection string and credentials to allow your application servers to connect to the database You have an application running on multiple EC2 instances, however every time an instance fails, your users complain that they lose their session. What can you do to prevent this from happening? - Answers Store session state in ElastiCache There are various ways to manage user sessions including storing those sessions locally to the node responding to the HTTP request or designating a layer in your architecture which can store those sessions in a scalable and robust manner. Common approaches used include utilizing Sticky sessions or using a Distributed Cache for your session management. In order to address scalability and to provide a shared data storage for sessions that can be accessed from any individual web server, you can abstract the HTTP sessions from the web servers themselves. A

Show more Read less
Institution
WGU D321 - AWS Developer
Course
WGU D321 - AWS Developer










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D321 - AWS Developer
Course
WGU D321 - AWS Developer

Document information

Uploaded on
December 14, 2024
Number of pages
29
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D321 - AWS Developer Exam Questions and Answers (Rated A+)

Send an email after push to CodeCommit? - Answers Use Notifications, this will add CW Events rule to
send a notification to SNS which will trigger an email to be sent

What AWS service to fully automate entire process? - Answers CodePipeline

What 2 things can go in the Transforms section of CF? - Answers - Re-use Code located in S3

- Specify the use of the Serverless Application Model for Lamdba deployments.

What CF section to define proerties of a new bucket? - Answers Resources

What are hooks for in CodeDeploy AppSpec file? - Answers To specify code, scripts or functions that you
want to run at set points int he developmnet lifecycle

Name of CodeDeply file to specify source files and lifecylce hooks? - Answers appspec.yml

is appSpec file only YAML - Answers no, also json

What API call to enable user authentication via Facebook to a app in AWS? - Answers STS assume-role-
with-web-identity

when would you use an Inline Policy over Managed? - Answers To add permissions that are only ever
intended to be used for a single user in your account

What does Congnito use to manage sign-up and sign-in functionality for mobile and web applications? -
Answers User Pools

what does Cog to create unique identities for user and authenticate them with Web ID providers -
Answers Identity Pools

App behind ELB, how to get public IP addresses of the users? - Answers Update App to log the x-
forwarded-for header.

Which feature of AWS can you use to configure S3 to allow web applications being hosted in one S3
bucket to access files in another S3 bucket? - Answers CORS

How does S3 determine which partition to use to store files? - Answers The key name determines which
partition the file is stored in

You are using S3 in AP-Northeast to host a static website in a bucket called "acloudguru". What would
the new URL endpoint be? - Answers http://acloudguru.s3-website-ap-northeast-1.amazonaws.com

What is the HTTP code you would see once you successfully place a file in an S3 bucket? - Answers 200

Is a new S3 bucket public by default? - Answers No

,You work for an online gaming store which has a global worldwide leaderboard for players of the game.
You need to implement a caching system for your leaderboard that has multiple availability zones in
order to prevent an outage. Which ElastiCache solution should you use? - Answers Redis

You have a three-tier web application with a webserver tier, application tier and database tier. The
application is spread across multiple availability zones for redundancy and is in an autoscaling group
with a minimum size of 2 and a maximum size of 10. The application relies on connecting to an RDS
multi-AZ database. When new instances are launched they download a connection string file which is
saved in an encrypted S3 bucket using a bootstrap script. During a routine scaling event you notice that
your new webservers are failing their health checks and are not coming in to service. You investigate
and discover that the EC2 - S3 read only role that the webservers rely on has no policies attached to it.
What steps should you take together to remediate this problem while maintaining the principle of least
privilege? (Choose 2) - Answers Terminate the existing instances and allow new instances to come into
service.



Attach the S3 - Read-only policy to the role.

You have an EC2 instance in a single availability zone connected to an RDS instance. The EC2 instance
needs to communicate to S3 to download some important configuration files from it. You try the
command aws s3 cp s3://yourbucket /var/www/html however you receive an error message. You log in
to Identity Access Management (IAM) and discover there is no role created to allow EC2 to
communicate to S3. You create the role and attach it to the existing EC2 instance. How fast will the
changes take to propagate? - Answers Immediately

Your EC2 instance needs to access files located in an S3 bucket, what is the best way to enable access? -
Answers Create an IAM role with read access to S3 and assign the role to the EC2 instance



* Using an IAM role associated with the EC2 instance is the recommended way, storing credentials
locally is not recommended.

When using the AWS REST API to upload an object to S3, which of the following request headers will
ensure that your data must be encrypted using SSE? - Answers x-amz-server-side-encryption

You need to allow another AWS account access to resources in your AWS account, what is the
recommended mechanism to configure this? - Answers Configure cross account access by creating a role
in your account which has permission to access only the resources they need. Allow the third party
account to assume the role based on their account ID and unique external ID

, Roles are the primary way to grant cross-account access. With IAM roles, you can grant third parties
access to your AWS resources without sharing your AWS security credentials. Instead, the third party
can access your AWS resources by assuming a role that you create in your AWS account.

Which of the following activities are the responsibility of the customer?

Safe disposal of storage devices

Security Group configuration settings

Controls around who can physically access the data center

Management of user credentials

Encryption of sensitive data - Answers Security Group configuration settings

Management of user credentials

Encryption of sensitive data



Security and Compliance is a shared responsibility between AWS and the customer. The customer
assumes responsibility and management of the guest operating system (including updates and security
patches), other associated application software as well as the configuration of the AWS-provided
security group firewall. AWS is responsible for protecting the infrastructure that runs all of the services
offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and
facilities that run AWS Cloud services.

Your application needs to access content located in an S3 bucket which is residing in a different AWS
account, which of the following API calls should be used to gain access? - Answers The STS AssumeRole
API call returns a set of temporary security credentials which can be used to access AWS resources,
incuding those in a different account

You are working on a mobile phone app for an online retailer which stores customer data in DynamoDB.
You would like to allow new users to sign-up using their Facebook credentials. What is the
recommended approach? - Answers After the user has successfully logged in to Facebook and received
an authentication token, Cognito should be used to exchange the token for temporary access to
DynamoDB



For mobile applications, using Cognito as an ID broker is the recommended approach to enabling user
sign-up, sign-in and guest access using Web Identity Providers like Facebook.

Which of the following does Cognito use to manage sign-up and sign-in functionality for mobile and web
applications? - Answers Cognito User Pools are like a directory, allowing users sign-up and sign-in.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
328
Member since
1 year
Number of followers
16
Documents
28195
Last sold
8 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

52 reviews

5
18
4
14
3
11
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions