AWS Certified Developer Associate Sample Questions DVA-C02 ( 2025 )
- CertiMaan
- Sep 23
- 13 min read
Get ready for success with our AWS Certified Developer Associate sample questions, crafted to reflect real exam scenarios. Whether you're preparing for DVA-C02 or revisiting AWS Certified Developer Associate DVA-C01 dumps, these questions help sharpen your AWS development skills. Perfect for those practicing with DVA-C02 exam dumps, DVA-C02 practice exams, or reviewing with an AWS developer associate practice exam, this resource ensures deep understanding and readiness. Strengthen your preparation using actual AWS developer associate exam questions tailored to the current certification format.
AWS Certified Developer Associate Sample Questions List :
1. To enhance browser security, you are planning to enable CORS. To enable CORS on a resource using API Gateway for the GET method, which of the following actions needs to be performed for all types of response except 200 response in case of Lambda custom integration?
Add Access-Control-Allow-Methods header in the integration response
Add Access-Control-Allow-Origin header in the integration response
Add Access-Control-Allow-Credentials header in the integration response
Add Access-Control-Allow-Headers header in the integration response
2. You are developing an application with the following architecture: a set of EC2 instances to process messages, which are spun up by an Autoscaling group, and SQS Queues to maintain the processing messages. There will be 2 pricing tiers. How will you ensure that the premium customers’ messages are given more preference?
Use SQS FIFO queues for premium messages
Use two separate SQS queues for standard and premium messages
Use Amazon SNS to push premium messages to EC2 instances directly
Use message attributes to set priority and process based on priority attribute
3. Your company is developing an application in .NET Core with DynamoDB. There is a requirement that all data needs to be encrypted at rest. If the DynamoDB table has already been created, what else is needed to achieve this?
Enable encryption at rest using AWS Management Console
No further action is needed as encryption at rest is automatically enabled
Create a new DynamoDB table with encryption enabled and migrate data
Modify the table to enable encryption using the AWS CLI
4. You are planning to use AWS Kinesis streams for an application being developed for a company. The company policy mandates that all data is encrypted at rest. How can you accomplish this in the easiest way possible for Kinesis streams?
Store data in an encrypted S3 bucket and read from there
Enable server-side encryption with AWS KMS
Use a custom encryption library in the application
Use client-side encryption before sending data to Kinesis
5. A construction firm has stored all its project documents in an Amazon S3 bucket, with external vendors accessing this data on a need basis. The Security Team performs an audit for this access and is looking for cryptographic protocols used by vendors to access this data. Which of the following can help collect this data?
AWS CloudTrail
Amazon S3 Server Access Logging
AWS Config
Amazon S3 Inventory
6. The Application Team is setting up a test application using AWS Elastic Beanstalk. For this new application, the team is expecting a high amount of HTTP 4xx errors. They need to prevent the environment instance health status from being marked as ‘Severe’ due to these errors. What solution will meet this requirement?
Deploy a custom error page for handling 4xx errors
Configure a custom 4xx error threshold in Elastic Beanstalk environment configuration
Use AWS WAF to filter out unwanted requests generating 4xx errors
Increase the instance health check interval to reduce the frequency of health status checks
7. You have defined some custom policies in AWS. You need to test the permissions assigned to those policies. Which of the following can be used for this purpose via the CLI? (Select TWO)
aws iam simulate-custom-policy
aws iam list-policies
aws iam simulate-principal-policy
aws iam get-policy
8. You have created an Amazon DynamoDB table with a Global Secondary Index. Which of the following can be used to get the latest results quickly with the least impact on Read Capacity Units (RCU)?
Scan with Eventually Consistent Read
Parallel Scan with Consistent Read
Query with Eventually Consistent Read
Query with Consistent Read
9. Your team is developing a solution that will make use of DynamoDB tables. Currently, the application is designed to perform scans on the entire table. What can be done to improve the application's performance when it interacts with the DynamoDB table? (Select TWO)
Implement global secondary indexes (GSIs)
Use query operations instead of scan operations
Increase the provisioned throughput of the table
Use parallel scans
10. A Developer has been asked to create an AWS Elastic Beanstalk environment for a production web application that needs to handle thousands of requests. Currently, the dev environment is running on a t1.micro instance. What is the best way for the developer to provision a new production environment with a m4.large instance instead of a t1.micro?
Configure the instance type in the Elastic Beanstalk environment configuration
Modify the instance type directly in the EC2 dashboard after environment creation
Create a configuration file with the desired instance type and include it in the source code
Use the Elastic Beanstalk CLI to deploy the environment with the desired instance type
11. You are creating a Lambda function that will be accessing a database. Due to compliance reasons, all database connection strings must be stored encrypted at rest. How can you accomplish this in the Lambda function? Choose 2 answers from the options given below.
Store the connection strings in AWS Systems Manager Parameter Store with encryption
Store the connection strings in a plaintext file within the Lambda package
Store the connection strings in AWS Secrets Manager
Store the connection strings in the Lambda environment variables
12. You are the team lead for an application that is already in production and using S3 buckets. Users from another country have now started actively using the objects in the S3 bucket. What can be done to reduce the latency of access to objects for the new users?
Enable S3 Event Notifications
Create an Amazon CloudFront distribution with the S3 bucket as the origin
Enable Cross-Region Replication for the S3 bucket
Enable Transfer Acceleration on the S3 bucket
13. You are developing an application that will be hosted in AWS Lambda. The function needs to make calls to a database, and there is a requirement that all database connection strings must be kept secure. Which of the following is the most secure way to implement this?
Store the connection strings in environment variables
Store the connection strings in a plain text file on an EBS volume
Store the connection strings in AWS Secrets Manager
Store the connection strings in the Lambda function code
14. As an API developer, you have configured an API with the AWS API Gateway service. During testing, you receive the following response when an action is made to an undefined API resource: { "message": "Missing Authentication Token" } You want to customize this error response to make it more user-friendly. How can you achieve this?
Modify the API Gateway stage settings
Enable CORS in API Gateway
Use AWS Lambda to handle errors
Create a custom Gateway Response for the 'MISSING_AUTHENTICATION_TOKEN' error type
15. You have an application that is hosted on an EC2 instance and is part of the custom domain www.demo.com. The application has been modified to make calls to the API Gateway, but the browser is not rendering the responses, and JavaScript errors are appearing in the developer console. What must be done to resolve this issue?
Update the DNS settings for the custom domain
Enable SSL/TLS on the custom domain
Enable CORS in API Gateway
Modify the security group of the EC2 instance
16. You are developing an application that will stream records to Amazon Simple Storage Service (S3). Your company policy mandates that all data must be encrypted at rest. How can you achieve this with Kinesis Firehose? Choose 2 answers from the options given below.
Enable server-side encryption (SSE) in the Firehose delivery stream
Use client-side encryption before sending data to Kinesis Firehose
Use AWS KMS to manage the encryption keys
Configure S3 bucket policies to deny unencrypted object uploads
17. You are developing a set of Lambda functions for your application. The company mandates that all API calls to Lambda functions be recorded. Which of the below service can help achieve this?
AWS X-Ray
Amazon CloudWatch
AWS CloudTrail
AWS Config
18. You have several Lambda functions that need to be deployed using AWS CodeDeploy. These Lambda functions have undergone multiple code revisions, and you are using versioning in Lambda to maintain these revisions. What must be done to ensure that the correct version of the function is deployed using AWS CodeDeploy?
Include the version number in the function name
Use aliases to point to the specific versions
Specify the version number in the deployment configuration
Manually update the Lambda function before deployment
19. You are using Amazon Cognito identity pools to assign authenticated SAML users temporary access for downloading data from Amazon S3 buckets. For this, you have created multiple rules for each role that gets assigned to users. Which of the following criteria is matched for evaluating these rules?
The rules are evaluated in parallel and the most restrictive one is applied
The rules are evaluated in the order in which they are created
The rules are evaluated based on the priority assigned to them
The rules are evaluated based on the alphabetical order of role names
20. Last week there was an incident in your company where critical files were deleted from the Amazon S3 bucket. Your manager has asked you to configure event notification for changes made to objects in Amazon S3. While publishing events from Amazon S3, which of the following cannot be used as the destination?
Amazon DynamoDB
AWS Lambda
Amazon SQS
Amazon SNS
21. An organization’s application needs to monitor application-specific events with a standard AWS service. The service should capture the number of logged-in users and trigger events accordingly. During peak times, monitoring frequency will occur every 10 seconds. What should be done to meet these requirements?
Use Amazon CloudWatch to create custom metrics and alarms
Use AWS CloudTrail to log and monitor application events
Use Amazon S3 to store and retrieve log data for monitoring
Use Amazon SNS to send notifications based on logged-in users
22. As a developer, you are tasked with creating an API Gateway stage that will directly interact with DynamoDB tables. Which feature of the API Gateway must be used to fulfill this requirement?
Integration Requests
Proxy Integration
Resource Policies
Method Request
23. A leading automobile dealer company expanding globally is facing problems ensuring a consistent state of provisioning and maintenance of environments. Their current architecture involves rolling out Kubernetes jobs through AWS EKS using Spot instances to create new microservices for a new environment requested by a user. However, Spot instances are deleting the underlying nodes, and jobs are getting terminated, thus disrupting the entire chain of environment creation for different business units. From the solutions proposed below, select the right options to resolve the issue. (Select TWO)
Implement Spot Instance Interruption Handling
Switch entirely to On-Demand Instances
Use a combination of On-Demand and Spot Instances
Use Amazon EC2 Auto Scaling
24. An organization is using AWS Elastic Beanstalk for a web application. The Developer needs to configure the Elastic Beanstalk environment with deployment methods to create new instances and deploy code to those instances. Which methods will deploy code ONLY to new instances? Choose 2 answers from the options given below.
Rolling deployment
Immutable deployment
Blue/Green deployment
All-at-once deployment
25. Your company currently stores its objects in S3. The current request rate is around 11000 GET requests per second. There is now a mandate for objects to be encrypted at rest, so you enable encryption using KMS. However, performance issues are now being encountered. What could be the main reason behind this?
Network bandwidth is insufficient
There is a bug in S3 causing slow performance
KMS has a quota limit for requests per second
S3 does not support encryption with KMS for high request rates
26. A developer is building a web application that uses Amazon API Gateway. A new version is released by the development team. Publishing of this new release should not impact users and production traffic should not be hampered by any bugs in the new release. What solutions will meet these requirements in a cost-effective way?
Use canary release deployment in API Gateway
Implement blue/green deployments using two separate API Gateway instances
Create a new stage in API Gateway for the new version and gradually shift traffic
Deploy the new version in a separate AWS account and switch the DNS upon successful testing
27. A developer team has deployed an application in AWS Cloud infrastructure and is using AWS Private Certificate Authority for issuing certificates. The security team is observing a private key being exposed and looking to revoke certificates issued by AWS Private Certificate Authority. While revoking certificates, a synchronous approach should be preferred instead of a memory intensive method. For security purposes, client querying for revoked certificates should use a distinct public URL. What solution will meet this requirement?
Use AWS Lambda for revocation checks
Use AWS CloudFront with S3
Use Certificate Revocation List (CRL)
Use Online Certificate Status Protocol (OCSP)
28. You have been asked to develop an application on the AWS Cloud that will store confidential documents in an S3 bucket. You need to ensure that the bucket is configured to reject any objects that are not encrypted. How can you achieve this?
Use a bucket policy that denies any put request without server-side encryption
Use an S3 Lifecycle policy to transition unencrypted objects to Glacier
Enable default encryption on the bucket
Use AWS Config rules to monitor the bucket for unencrypted objects and alert you
29. Your team has been instructed to develop a completely new solution on AWS. Currently, you have a limitation on the tools available to manage the complete lifecycle of the project. Which AWS service could help you handle all aspects of development and deployment?
AWS CodeBuild
AWS CodeStar
AWS CodeDeploy
AWS CodePipeline
30. You’re developing an AWS Lambda function that interacts with a DynamoDB table. The function was performing well, but now it is returning results with a time delay. You need to debug the code to identify the bottleneck causing the performance issue. What is the ideal way to debug the code?
Use AWS CloudWatch Logs
Increase DynamoDB read capacity
Enable AWS Lambda Dead Letter Queues
Use AWS X-Ray
31. In API Gateway, when a stage variable is used as part of an HTTP integration URL, which of the following are correct ways of defining a "subdomain" and the "path"? (Select TWO)
https://${stageVariables.example.com}/${stageVariables.subdomain}/${stageVariables.path}
https://example.${stageVariables.subdomain}.com/${stageVariables.path}
https://example.com/${stageVariables.subdomain}/${stageVariables.path}
https://${stageVariables.subdomain}.example.com/${stageVariables.path}
32. You are configuring Cross-Origin Resource Sharing (CORS) for your S3 bucket. You need to ensure that external domain sites can only issue GET requests against your bucket. Which of the following would you modify as part of the CORS configuration for this requirement?
ExposeHeaders
AllowedHeaders
AllowedMethods
AllowedOrigins
33. You are a developer for a company developing a .NET-based application to be hosted on AWS. The application requires data encryption, but the company currently lacks a key store for managing encryption keys. Which of the following services can be used in your code to encrypt data?
AWS KMS
AWS IAM
AWS Shield
AWS CloudHSM
34. Your application must write to an SQS queue. The application can be deployed using EC2, Lambda, or Elastic Beanstalk. Your corporate security policies require that AWS credentials are always encrypted and are rotated at least once a week. How can you securely provide credentials that allow your application to write to the queue?
Store credentials in AWS Secrets Manager and retrieve them dynamically
Use IAM roles with appropriate policies
Embed the credentials in the application's code and encrypt the code
Use environment variables to store the credentials and update them weekly
35. You’re developing an application on AWS based on Microservices, which will be created using AWS Lambda functions. Due to the complexity of the flow between these components, you need an efficient way to manage the workflow of execution for these Lambda functions. How can you manage this effectively now and in the future as you add more Lambda functions to the application?
AWS CloudFormation
AWS Step Functions
Amazon SQS
AWS CodePipeline
FAQs
1. What is the AWS Certified Developer Associate certification?
The AWS Certified Developer Associate validates your ability to develop, deploy, and debug cloud-based applications using AWS services.
2. Who should take the AWS Developer Associate exam?
It’s ideal for software developers with at least one year of experience developing and maintaining AWS-based applications.
3. Is AWS Certified Developer Associate worth it?
Yes, it’s highly respected in the industry and boosts your credentials as a cloud developer.
4. What are the benefits of AWS Developer Associate certification?
You gain professional recognition, better job opportunities, and validation of your AWS development skills.
5. How does the AWS Developer Associate compare to AWS Solutions Architect?
Developer Associate focuses on coding and building applications, while Solutions Architect focuses on designing infrastructure.
6. How many questions are on the AWS Developer Associate exam?
The exam consists of 65 multiple-choice and multiple-response questions.
7. What is the format of the AWS Certified Developer Associate exam?
It is an online or in-person, proctored exam with scenario-based multiple-choice questions.
8. How difficult is the AWS Certified Developer Associate exam?
It’s moderately difficult, especially if you're unfamiliar with real-world AWS development practices.
9. What is the duration of the AWS Developer Associate exam?
You have 130 minutes to complete the exam.
10. What topics are covered in the AWS Developer Associate exam?
Topics include deployment, development using AWS SDKs, monitoring, troubleshooting, and best practices.
11. How do I prepare for AWS Certified Developer Associate exam?
Use CertiMaan’s practice questions and study materials alongside AWS’s official training and documentation.
12. What are the best resources to study for AWS Developer Associate?
CertiMaan mock tests and the AWS Skill Builder platform offer quality preparation content.
13. Are there free practice tests for AWS Developer Associate certification?
Yes, CertiMaan and AWS both offer sample questions and free practice materials.
14. Can I pass AWS Developer Associate without experience?
Yes, if you commit to consistent study using trusted sources like CertiMaan and AWS official docs.
15. Does CertiMaan provide AWS Developer Associate exam dumps or mock tests?
Yes, CertiMaan provides up-to-date mock exams and practice questions aligned with the official exam.
16. What is the cost of the AWS Certified Developer Associate exam?
The exam costs $150 USD.
17. Are there any prerequisites for the AWS Developer Associate exam?
There are no formal prerequisites, but basic experience with AWS and programming is recommended.
18. How do I register for the AWS Certified Developer Associate exam?
You can register through the AWS Certification portal (https://aws.amazon.com/certification/).
19. Can I reschedule or cancel my AWS Developer Associate exam?
Yes, you can do so via the AWS Certification portal at least 24 hours before your exam.
20. Do I need a coding background for AWS Developer Associate?
Yes, familiarity with programming languages like Python, Java, or JavaScript is beneficial.
21. What is the passing score for AWS Developer Associate exam?
The passing scaled score is 720 out of 1000.
22. How is the AWS Developer Associate exam scored?
It’s scored based on a weighted system, and results are delivered within a few days.
23. How long is the AWS Developer Associate certification valid?
It’s valid for 3 years from the date of certification.
24. Can I retake the AWS Certified Developer Associate exam if I fail?
Yes, but you must wait 14 days before retaking it.
25. How long should I study for AWS Developer Associate certification?
Most candidates need 4 to 8 weeks of focused study, depending on prior AWS and coding knowledge.
26. What is the average salary of an AWS Certified Developer Associate?
On average, certified professionals earn between $105,000 to $130,000 annually.
27. What jobs can I get with AWS Certified Developer Associate certification?
You can work as a Cloud Developer, AWS Software Engineer, DevOps Developer, or Cloud Consultant.
28. Does AWS Certified Developer Associate help in getting a job?
Yes, it opens up opportunities in cloud development roles at startups and enterprise companies.
29. Do employers value AWS Developer Associate certification?
Yes, it is widely respected and shows that you can effectively build and deploy applications on AWS.
30. Is AWS Developer Associate good for beginners?
Yes, especially for developers with some programming knowledge looking to enter the cloud domain.
Comments