An application running on multiple Amazon EC2 instances pulls messages from a standard Amazon SQS queue. A
requirement for the application is that all messages must be encrypted at rest.
Developers are instructed to use methods that allow for centralized key management and minimize possible support
requirements whenever possible.
Which of the following solutions supports these requirements?
A Developer is designing a fault-tolerant environment where client sessions will be saved.
How can the Developer ensure that no sessions are lost if an Amazon EC2 instance fails?
A developer has created a Node.js web application on a local development machine. The developer wants to use AWS
technology to host the website. The developer needs a solution that requires the least possible operational overhead and no
Which AWS service should the developer use to meet these requirements?
A company wants to implement authentication for its new REST service using Amazon API Gateway. To authenticate the
calls, each request must include HTTP headers with a client ID and user ID. These credentials must be compared to
authentication data in an Amazon DynamoDB table.
What MUST the company do to implement this authentication in API Gateway?
Given the source code for an AWS Lambda function in the local store.py containing a handler function called get_store and
the following AWS CloudFormation template:
What should be done to prepare the template so that it can be deployed using the AWS CLI command aws cloudformation
An organization must store thousands of sensitive audio and video files in an Amazon S3 bucket. Organizational security
policies require that all data written to this bucket be encrypted.
How can compliance with this policy be ensured?
A Developer is creating a mobile application with a limited budget. The solution requires a scalable service that will enable
customers to sign up and authenticate into the mobile application while using the organizations current SAML 2.0 identity
Which AWS service should be used to meet these requirements?
A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances. The application
uses attached Amazon EBS disks for storing data. The application will process sensitive information and all the data must be
What should a Developer do to ensure the data is encrypted on disk without impacting performance?
A Developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB. In the local
development environment, the application has used IAM access keys. The application is now ready for deployment onto an
How should the application authenticate with AWS services in production?
A company runs its APIs using Amazon API Gateway in front of AWS Lambda functions. The company wants to add logging
at the API level. Each API must have production and development environments. The developer wants to enable different
logging levels in both environments.
How can these requirements be met?