February 9, 2026

AWS Certified Developer – Associate DVA-C02

AWS Certified Developer - Associate DVA-C02 - Practice Exam - 01

AWS Certified Developer - Associate DVA-C02

1 / 50

A developer is building a distributed application that writes logs to CloudWatch Logs. The operations team needs to analyze and alert on specific log patterns in near real time.

Which solution should the developer implement?

2 / 50

A developer is creating a new API using Amazon API Gateway. The API must support CORS for a JavaScript client running in a browser and must handle authentication using Cognito.

What must the developer do to satisfy both requirements?

3 / 50

A developer is building an application that uploads large files (up to 5 GB) to S3 from a web client. The developer needs to optimize the experience to reduce upload failures and ensure resumability.

Which solution should the developer implement?

4 / 50

A Lambda function processes messages from an SQS queue. Occasionally, messages reappear in the queue after successful execution. Upon investigation, the developer sees that Lambda execution logs are incomplete.

What is the MOST likely reason?

5 / 50

A developer is using CloudFormation to deploy a Lambda function and an API Gateway endpoint. After the deployment, calling the API returns a 403 error.

What is the MOST likely cause?

6 / 50

A company is transitioning from a monolithic application to microservices using AWS Lambda and API Gateway. One microservice must call another synchronously and log the entire request-response lifecycle for debugging.

What is the BEST way to implement this?

7 / 50

A developer needs to enforce client-side encryption for an S3 bucket used to store customer documents. The application uses a web client to upload files directly to S3 using pre-signed URLs.

How can the developer enforce client-side encryption?

8 / 50

A developer needs to test a new Lambda function that interacts with DynamoDB and is triggered by an SQS queue. The developer wants to simulate the full workflow locally before deploying.

What is the MOST effective way to achieve this?

9 / 50

A developer is using Step Functions to orchestrate a workflow that includes multiple Lambda functions. Occasionally, one function fails due to input validation issues. The developer wants to skip invalid inputs and continue with the next step.

What is the BEST way to handle this scenario?

10 / 50

A developer deploys a containerized application to Amazon ECS (Fargate) that needs access to secrets stored in AWS Secrets Manager. The application fails to retrieve the secrets.

What is the MOST likely cause?

11 / 50

A developer wants to create a Lambda function to process messages from an Amazon SQS FIFO queue. The function needs to preserve the order of message processing per message group.

Which approach satisfies the requirement?

12 / 50

A developer is building a multi-tenant SaaS application using Cognito user pools and wants to enforce row-level security in DynamoDB so users can only access their own data.

What is the MOST efficient way to enforce this access control?

13 / 50

A developer is designing an order processing system using Amazon DynamoDB. The system must support conditional updates for inventory to prevent race conditions where multiple users may attempt to purchase the same item simultaneously.

What should the developer implement?

14 / 50

An organization uses AWS Lambda functions in a multi-account setup. The Lambda functions in each account need access to a shared S3 bucket in a central logging account. The solution must be secure and auditable.

Which approach should the developer use?

15 / 50

A developer is writing a Lambda function that will interact with an external payment gateway API that requires an API key. The Lambda function should not store the API key in code or environment variables.

What is the MOST secure and maintainable way to handle this requirement?

16 / 50

A developer is designing an image-processing application. Users upload images to an S3 bucket. A Lambda function, triggered by S3 events, extracts metadata and stores it in DynamoDB. Occasionally, some entries are missing in the database even though the image is present in the bucket.

What is the MOST reliable way to ensure that all images trigger metadata processing exactly once?

17 / 50

A developer is building an event-driven reporting system. Reports are uploaded to S3 by sales teams globally. Each report must be processed into a summary format within 3 seconds of upload and stored in DynamoDB. The system must scale with usage and maintain availability.

What should the developer implement?

18 / 50

A developer is working on a CI/CD pipeline. The team wants to ensure that secrets used during testing and deployment are not exposed in logs or stored in plain text in the buildspec.

What is the MOST secure way to provide secrets to the pipeline?

19 / 50

A developer is writing an AWS Lambda function that needs to process events from two separate DynamoDB streams. The function must handle high-throughput updates and preserve event ordering per stream.

What is the best design?

20 / 50

A developer must refactor an existing application that processes financial transactions. The application is containerized and deployed on Amazon ECS (Fargate). All database credentials are currently stored as environment variables in the task definition. The security team has mandated a move to encrypted secrets storage.

What is the MOST secure and scalable approach to store and access these secrets?

21 / 50

A developer is designing an architecture that must ingest user comments through an API, transform them with custom sentiment logic, and store the results in DynamoDB. The processing must scale automatically and maintain input-output ordering per user session.

Which architecture best meets these needs?

22 / 50

An analytics application aggregates user clickstream data. The backend uses a Lambda function triggered by Kinesis Data Streams. Occasionally, some records are missing from the processed output. The developer verifies that the records exist in Kinesis and the function is not throwing errors.

What is the MOST likely cause?

23 / 50

A media company uses Amazon ECS (Fargate) for microservices. A developer needs to update application configuration across all environments — dev, staging, and prod — without modifying container images. Each environment requires different values for the same configuration keys.

What is the most scalable way to achieve this?

24 / 50

A company’s developer team is managing CI/CD pipelines using AWS CodePipeline and AWS CodeBuild. They want to build in automated rollback when a deployment fails, while also storing logs and build artifacts for compliance for at least 12 months.

Which solution meets these requirements?

25 / 50

A developer wants to improve the security of an existing web application deployed on AWS that uses Lambda and API Gateway. Currently, the application uses an API key for authentication. Security auditors have requested token-based authentication, temporary credentials, and user-based access control.

What is the MOST effective way to meet these requirements?

26 / 50

A developer is designing a new application that requires event-driven processing of real-time data from hundreds of sensors. Each sensor sends JSON-formatted data every second. The application must process each event, enrich it with metadata from DynamoDB, and store it for further analysis. The developer wants to avoid polling or running infrastructure continuously.

Which solution should the developer implement?

27 / 50

A team is building a mobile application that uses Cognito identity pools for authentication and stores user data in S3. They want to allow users to share specific files with other authenticated users temporarily, without exposing their entire folder or requiring server-side authorization logic.

How should the team implement this functionality securely?

28 / 50

A developer is implementing an audit logging feature for a serverless app built using Amazon API Gateway and Lambda. All sensitive API calls must generate tamper-proof logs and store them in a system where logs cannot be modified or deleted after being written. The solution should have minimal operational overhead and must scale with traffic.

Which approach should the developer choose?

29 / 50

A company is building a serverless customer support application. The application allows agents to view chat messages submitted by users and stored in Amazon DynamoDB. The application must meet the following security and architectural requirements:

  • Only authenticated agents can access messages

  • Agents should only be able to view messages assigned to them

  • The solution must scale to thousands of concurrent agents

  • Sensitive chat content must be encrypted and not visible to unauthorized agents

  • Minimal custom authorization logic should be implemented

What is the MOST efficient way to design this access control?

30 / 50

A developer is building a data processing workflow where user-submitted CSV files are uploaded to an S3 bucket. Each file is processed line by line using a Lambda function triggered by S3 event notifications. As the number of files grows, the developer notices some functions are timing out and partial data is being processed.

The developer wants to redesign the solution to scale reliably, process large files efficiently, and minimize reprocessing in case of partial failures. The solution should be cost-effective and easy to maintain.

Which approach should the developer take?

31 / 50

A developer is building a CI/CD workflow using AWS CodePipeline and wants to ensure each build artifact is automatically tested before deployment.

What should the developer do?

32 / 50

A developer uses AWS SAM to deploy a Lambda function and an API Gateway. After changes, CloudFormation shows a rollback.

What is the MOST likely cause?

33 / 50

A developer is creating an S3-backed static website. They want to redirect users to /index.html when they access the root URL.

What should the developer configure?

34 / 50

A Lambda function is processing images and uploading thumbnails to an S3 bucket. The bucket has versioning and event notifications enabled. The thumbnails are being reprocessed recursively.

How can this behavior be prevented?

35 / 50

A developer is building a real-time leaderboard API using DynamoDB. The leaderboard must be sorted by score and updated frequently.

Which design provides the most efficient performance?

36 / 50

A Lambda function processing user requests is integrated with an S3 bucket and fails with a 403 error. The function's IAM role has s3:GetObject permissions.

What is the MOST likely cause?

37 / 50

A serverless app uses Amazon SQS and AWS Lambda. The team notices that during peak hours, the Lambda function doesn't scale up to process all messages on time.

What should the developer do?

38 / 50

A developer receives the following error from DynamoDB: ProvisionedThroughputExceededException. This occurs during application peak hours.

What should the developer do FIRST to resolve this?

39 / 50

A company is developing a web app using API Gateway and Lambda. They want to enforce rate limits and restrict access to certain endpoints based on user plans (free vs premium).

Which API Gateway feature should the developer use?

40 / 50

A developer uses AWS CodePipeline to deploy an application. The build fails with permissions errors when accessing Amazon S3 during the build phase.

What is the MOST secure and scalable solution?

41 / 50

A web application deployed on AWS uses Amazon Cognito for user management. The client app stores the JWT token after login. However, the client receives a 403 error after an hour of inactivity.

What is the BEST solution to prevent the client from being logged out?

42 / 50

A developer wants to use AWS X-Ray to trace requests from an API Gateway to a Lambda function and into DynamoDB.

Which steps should the developer take?

43 / 50

A team has a containerized application deployed to Amazon ECS using the Fargate launch type. They need to update environment variables during deployment without changing the container image.

What is the MOST efficient approach?

44 / 50

A developer stores configuration settings in AWS Systems Manager Parameter Store. During deployment, application logs show errors retrieving the parameters.

What is the MOST likely cause?

45 / 50

A developer is building a serverless application that ingests IoT sensor data using AWS IoT Core and stores it in Amazon DynamoDB. The schema may evolve over time with new fields.

Which DynamoDB design best supports this requirement?

46 / 50

A developer is working on a Lambda function that runs for long durations during file conversions. The function occasionally fails with a timeout error.

What is the MOST scalable and reliable solution?

47 / 50

A company uses an Amazon Cognito user pool for authentication. The front-end app uses OAuth 2.0 to authenticate users. The app must get a new access token without forcing the user to log in again when the token expires.

What should the developer implement?

48 / 50

A company has an application that uses AWS Lambda and Amazon DynamoDB. The Lambda function processes user data from an API Gateway event and stores it in DynamoDB. During traffic spikes, some writes are throttled.

What should a developer do to resolve the throttling?

49 / 50

A developer is writing an application that uses Amazon SQS to decouple components. Occasionally, the messages are being processed multiple times, leading to inconsistent application behavior.

What should the developer do to avoid this issue?

50 / 50

A developer is building an application that uploads user profile images to an S3 bucket. The application uses pre-signed URLs for upload. However, some users are bypassing the application and uploading non-image files directly using the URL.

What is the MOST secure way to ensure only valid image files are uploaded?

Your score is

The average score is 0%

0%