Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Amazon Web Services DVA-C02 Exam With Confidence Using Practice Dumps

Exam Code:
DVA-C02
Exam Name:
AWS Certified Developer - Associate
Certification:
Questions:
519
Last Updated:
Mar 5, 2026
Exam Status:
Stable
Amazon Web Services DVA-C02

DVA-C02: AWS Certified Associate Exam 2025 Study Guide Pdf and Test Engine

Are you worried about passing the Amazon Web Services DVA-C02 (AWS Certified Developer - Associate) exam? Download the most recent Amazon Web Services DVA-C02 braindumps with answers that are 100% real. After downloading the Amazon Web Services DVA-C02 exam dumps training , you can receive 99 days of free updates, making this website one of the best options to save additional money. In order to help you prepare for the Amazon Web Services DVA-C02 exam questions and verified answers by IT certified experts, CertsTopics has put together a complete collection of dumps questions and answers. To help you prepare and pass the Amazon Web Services DVA-C02 exam on your first attempt, we have compiled actual exam questions and their answers. 

Our (AWS Certified Developer - Associate) Study Materials are designed to meet the needs of thousands of candidates globally. A free sample of the CompTIA DVA-C02 test is available at CertsTopics. Before purchasing it, you can also see the Amazon Web Services DVA-C02 practice exam demo.

AWS Certified Developer - Associate Questions and Answers

Question 1

A company has many microservices that are comprised of AWS Lambda functions. Multiple teams within the company split ownership of the microservices.

An application reads configuration values from environment variables that are contained in the Lambda functions. During a security audit, the company discovers that some of the environment variables contain sensitive information.

The company's security policy requires each team to have full control over the rotation of AWS KMS keys that the team uses for its respective microservices.

Which solution will meet these requirements?

Options:

A.

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:Decrypt permissions to the Lambda function execution roles.

B.

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:Decrypt permission to the Lambda function execution roles.

C.

Create customer managed keys for all Lambda functions. Use the new customer managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

D.

Create AWS managed keys for all Lambda functions. Use the new AWS managed keys to encrypt the environment variables. Add kms:CreateGrant permission and kms:Encrypt permission to the Lambda function execution roles.

Buy Now
Question 2

A developer is planning to migrate on-premises company data to Amazon S3. The data must be encrypted, and the encryption Keys must support automate annual rotation. The company must use AWS Key Management Service (AWS KMS) to encrypt the data.

When type of keys should the developer use to meet these requirements?

Options:

A.

Amazon S3 managed keys

B.

Symmetric customer managed keys with key material that is generated by AWS

C.

Asymmetric customer managed keys with key material that generated by AWS

D.

Symmetric customer managed keys with imported key material

Question 3

A developer is writing an application that will provide data files to an external company. The external company needs to verify that the data is not modified in transit.

How can the developer use AWS KMS to prove the integrity of the transferred data?

Options:

A.

Encrypt the data by using a symmetric key. Provide the key to the external company.

B.

Sign the data by using a symmetric key. Provide the key to the external company.

C.

Sign the data by using the private key of an asymmetric key pair. Provide the public key to the external company.

D.

Sign the data by using the public key of an asymmetric key pair. Provide the private key to the external company.