
☁️ AWS
Comprehensive AWS Certified Developer - Associate (DVA-C02) hive provides study notes, question bank with practice tests, flashcards, and hands-on labs, all supported by a personal AI tutor to help you master the AWS Certified Developer - Associate (DVA-C02) certification.
131 AI-generated study notes covering the full AWS Certified Developer - Associate (DVA-C02) curriculum.
Add annotations for tracing services
864 words
Analyze application performance issues
945 words
Apply application requirements for resources (for example, memory, cores)
1,050 words
Assist in a root cause analysis
985 words
Assist in a root cause analysis
920 words
Assume an IAM role
865 words
Automate deployment testing
865 words
Automate deployment testing
920 words
Cache content based on request headers
1,150 words
Commit code to a repository to invoke build, test, and deployment actions
895 words
Configure application health checks and readiness probes
985 words
Configure deployment strategies (for example, blue/green, canary, rolling) for application releases
945 words
Configure Lambda functions by defining environment variables and parameters (for example, memory, concurrency, timeout, runtime, handler, layers, extensions, triggers, destinations)
870 words
Configure programmatic access to AWS
820 words
Create application environments that use approved versions for integration testing (for example, Lambda aliases, container image tags, AWS Amplify branches, AWS Copilot environments)
890 words
Create application test events (for example, JSON payloads for testing AWS Lambda, API Gateway, AWS SAM resources)
915 words
Create, extend, and maintain APIs (for example, response/request transformations, enforcing validation rules, overriding status codes)
820 words
Create fault-tolerant and resilient applications in a programming language (for example, Java, C#, Python, JavaScript, TypeScript, Go)
885 words
Debug code to identify defects
925 words
Debug service integration issues in applications
850 words
Define Amazon DynamoDB keys and indexing
862 words
Define concurrency
645 words
Define encryption at rest and in transit
925 words
Define permissions for IAM principals
925 words
Deploy an application version by using deployment strategies
845 words
Deploy API resources to various environments
925 words
Deploy application stack updates to existing environments (for example, deploying an AWS SAM template to a different staging environment)
820 words
Deploy code by using AWS Continuous Integration and Continuous Delivery (CI/CD) services
945 words
Deploy code by using AWS Continuous Integration and Continuous Delivery (CI/CD) services
945 words
Describe API Gateway stages and custom domains
875 words
Describe architectural patterns (for example, event-driven, microservices, monolithic, choreography, orchestration, fanout)
1,350 words
Describe certificate management (for example, AWS Private CA)
825 words
Describe database consistency models (for example, strongly consistent, eventually consistent)
820 words
Describe data classification (for example, personally identifiable information [PII], protected health information [PHI])
920 words
Describe differences between client-side encryption and server-side encryption
890 words
Describe differences between logging, monitoring, and observability
850 words
Describe differences between query and scan operations
875 words
Describe differences between stateful and stateless concepts
1,185 words
Describe differences between synchronous and asynchronous patterns
875 words
Describe differences between tightly coupled and loosely coupled components
925 words
Describe high-cardinality partition keys for balanced partition access
820 words
Describe Lambda deployment packaging options
850 words
Describe the access of private resources in VPCs from Lambda code
925 words
Determine minimum memory and compute power for an application
820 words
Develop code for applications hosted on AWS
920 words
Develop code for applications hosted on AWS
945 words
Develop code for AWS Lambda
875 words
Develop code for AWS Lambda
925 words
Enable and disable key rotation
820 words
Encrypt environment variables that contain sensitive data
820 words
Showing 50 of 131 study notes. View all →
Try 5 sample questions from a bank of 570.
Q1.An application is currently running on an `m5.xlarge` instance which provides $4$ vCPUs and $16$ GiB of RAM. After analyzing CloudWatch metrics for the past week, you observe that the CPU utilization never exceeds $20\%$, but the Memory utilization consistently peaks at $92\%$. Which of the following represents the most cost-effective rightsizing strategy that maintains application performance and stability?
Correct: B
Q2.A developer is investigating a performance bottleneck in a high-throughput Java application. They need to identify which methods are consuming the most CPU time without significantly impacting the application's runtime performance. Which profiling technique is most suitable for this scenario, and why?
Correct: B
Q3.When sanitizing sensitive data for non-production environments like staging or development, which of the following best explains why **data masking** is typically preferred over **data redaction** for software testing?
Correct: B
Q4.A developer is investigating a sudden performance degradation in a serverless application. The following information is collected from the monitoring dashboard: * **CloudWatch Metrics**: As shown in the provided chart, throughput (requests per second) remains steady while $p99$ latency increases sharply. * **CloudWatch Logs**: Multiple log streams show the error: `Task timed out after 10.02 seconds`. * **AWS X-Ray Trace**: A trace for a high-latency request reveals that the Lambda function segment is active for $10.0$ seconds, with $9.8$ seconds spent in a subsegment named `ExternalPaymentProvider`. Which of the following is the most likely root cause and appropriate interpretation of these metrics?
Correct: B
Q5.A developer is troubleshooting an application where an AWS Lambda function processes data and then calls an external third-party API. Users report that the application occasionally returns a timeout error. The developer has enabled AWS X-Ray to identify the root cause. Based on the distributed tracing concepts for debugging service integrations, which of the following observations in the X-Ray trace would most specifically indicate that the integration issue lies with the **third-party API's responsiveness** rather than the Lambda function's internal logic?
Correct: C
Want more? Clone this hive to access all 570 questions, timed exams, and AI tutoring. Start studying →
450 flashcard decks for spaced-repetition study.
Sample:
**Loosely Coupled Components**
Sample:
### Monolithic vs. Microservices What are the primary differences between these two architectural styles regarding **deployment** and **scaling**?
Sample:
How do stateful and stateless applications differ regarding scalability and session data?
Sample:
**Tightly Coupled Architecture**
Sample:
**Synchronous Communication**
Sample:
___ refers to the ability of a system to remain operational and accessible even if one or more components fail, while ___ is the ability of an application to scale its resources up or down automatically based on demand.
Clone this hive to get full access to all 570 practice questions, 9 timed mock exams, study notes, flashcards, and a personal AI tutor — completely free.
Start Studying — Free