exam questions

Exam AWS Certified Developer - Associate DVA-C02 All Questions

View all questions & answers for the AWS Certified Developer - Associate DVA-C02 exam

Exam AWS Certified Developer - Associate DVA-C02 topic 1 question 31 discussion

A developer has an application that stores data in an Amazon S3 bucket. The application uses an HTTP API to store and retrieve objects. When the PutObject API operation adds objects to the S3 bucket the developer must encrypt these objects at rest by using server-side encryption with Amazon S3 managed keys (SSE-S3).
Which solution will meet this requirement?

  • A. Create an AWS Key Management Service (AWS KMS) key. Assign the KMS key to the S3 bucket.
  • B. Set the x-amz-server-side-encryption header when invoking the PutObject API operation.
  • C. Provide the encryption key in the HTTP header of every request.
  • D. Apply TLS to encrypt the traffic to the S3 bucket.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bibay
Highly Voted 1 year, 1 month ago
B. Set the x-amz-server-side-encryption header when invoking the PutObject API operation. When using the PutObject API operation to store objects in an S3 bucket, the x-amz-server-side-encryption header can be set to specify the server-side encryption algorithm used to encrypt the object. Setting this header to "AES256" or "aws:kms" enables server-side encryption with SSE-S3 or SSE-KMS respectively. Option A is incorrect because assigning a KMS key to the S3 bucket will not enable SSE-S3 encryption. Option C is incorrect because providing the encryption key in the HTTP header of every request is not a valid way to enable SSE-S3 encryption. Option D is incorrect because applying TLS encryption to the traffic to the S3 bucket only encrypts the data in transit, but does not encrypt the objects at rest in the bucket.
upvoted 15 times
jipark
11 months ago
I now got to know 'KMS key to S3 bucket will not enable S3 encryption'
upvoted 1 times
...
beekeeper0101
4 weeks ago
Thank you! Setting the x-amz-server-side-encryption header to: - AES256 => SSE-S3 - AWS:KMS => SSE-KMS
upvoted 1 times
...
...
svrnvtr
Highly Voted 1 year, 3 months ago
Selected Answer: B
B https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingServerSideEncryption.html
upvoted 10 times
...
sumanshu
Most Recent 2 weeks ago
Selected Answer: B
A) Eliminated - While AWS Key Management Service (KMS) keys can be used for encryption in S3 (SSE-KMS), this option refers to creating a custom KMS key, which is not required when using SSE-S3. B) Correct - The x-amz-server-side-encryption header is the correct way to specify the use of SSE-S3 when uploading objects to S3 via the PutObject API. C) Eliminated - Providing an encryption key in the HTTP header refers to client-side encryption or SSE-C D) Eliminated - TLS (Transport Layer Security) encrypts data in transit, not at rest.
upvoted 1 times
...
trieudo
3 weeks, 1 day ago
Selected Answer: B
==> Discard A: SSE-KMS uses AWS KMS keys, not Amazon S3-managed keys required for SSE-S3. ==> Discard C: SSE-C requires customer-provided keys, not Amazon S3-managed keys for SSE-S3. ==> Discard D: TLS encrypts data in transit, not at rest as required by SSE-S3. B is correct because setting `x-amz-server-side-encryption: AES256` ensures Amazon S3 uses SSE-S3 to encrypt objects at rest automatically.
upvoted 1 times
...
65703c1
1 month, 2 weeks ago
Selected Answer: B
B is the correct answer.
upvoted 1 times
...
badsati
2 months, 3 weeks ago
Selected Answer: B
Answer is B
upvoted 1 times
...
nderitunick
7 months, 1 week ago
Aren't objects on s3 encrypted using SSE-S3 by default? I don't understand why D is not the answer.
upvoted 1 times
nderitunick
7 months, 1 week ago
I misread the question. It's all good.
upvoted 1 times
...
...
aanataliya
10 months, 2 weeks ago
Answer for this question is changed starting January 5, 2023. Amazon S3 now applies server-side encryption with Amazon S3 managed keys (SSE-S3) as the base level of encryption for every bucket in Amazon S3. https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-encryption-faq.html
upvoted 8 times
fordiscussionstwo
9 months ago
what is correct answer then?
upvoted 2 times
cucuff
6 months, 2 weeks ago
because it takes some time for exam questions to be updated
upvoted 1 times
...
...
...
[Removed]
11 months, 3 weeks ago
Selected Answer: B
Header parameter "s3:x-amz-server-side-encryption": "AES256"
upvoted 4 times
...
tttamtttam
11 months, 3 weeks ago
Selected Answer: B
C is a way to use customer-provided keys not S3-managed keys.
upvoted 2 times
...
CisconAWSGURU
1 year ago
Selected Answer: C
C is correct and hear is the reason from AWS docs. Visit AWS Regions and Endpoints in the AWS General Reference or the AWS Region Table to see the regional availability for ACM. Certificates in ACM are regional resources. To use a certificate with Elastic Load Balancing for the same fully qualified domain name (FQDN) or set of FQDNs in more than one AWS region, you must request or import a certificate for each region. For certificates provided by ACM, this means you must revalidate each domain name in the certificate for each region. You cannot copy a certificate between regions. To use an ACM certificate with Amazon CloudFront, you must request or import the certificate in the US East (N. Virginia) region. ACM certificates in this region that are associated with a CloudFront distribution are distributed to all the geographic locations configured for that distribution.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago