{"id":1015,"date":"2023-01-14T10:55:06","date_gmt":"2023-01-14T10:55:06","guid":{"rendered":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/aws-certified-developer-associate-dva-c01-question040\/"},"modified":"2023-01-14T10:55:06","modified_gmt":"2023-01-14T10:55:06","slug":"aws-certified-developer-associate-dva-c01-question040","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/aws-certified-developer-associate-dva-c01-question040\/","title":{"rendered":"AWS Certified Developer Associate DVA-C01 &#8211; Question040"},"content":{"rendered":"<div class=\"question\">A Developer is working on an application that handles 10MB documents that contain highly-sensitive data. The application will use AWS KMS to perform client-side encryption.<br \/>\nWhat steps must be followed?<br \/><strong><br \/>A.<\/strong> Invoke the Encrypt API passing the plaintext data that must be encrypted, then reference the customer managed key ARN in the KeyId parameter<br \/><strong>B.<\/strong> Invoke the GenerateRandom API to get a data encryption key, then use the data encryption key to encrypt the data<br \/><strong>C.<\/strong> Invoke the GenerateDataKey API to retrieve the encrypted version of the data encryption key to encrypt the data<br \/><strong>D.<\/strong> Invoke the GenerateDataKey API to retrieve the plaintext version of the data encryption key to encrypt the data<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Developer is working on an application that handles 10MB documents that contain highly-sensitive data. The application will use AWS KMS to perform client-side encryption. What steps must be followed?A. Invoke the Encrypt API passing the plaintext data that must be encrypted, then reference the customer managed key ARN in the KeyId parameterB. Invoke the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,43],"class_list":["post-1015","post","type-post","status-publish","format-standard","hentry","category-aws-certified-developer-associate-dva-c01","tag-aws-certified-developer-associate-dva-c01","tag-question-040"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/posts\/1015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/comments?post=1015"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/posts\/1015\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/media?parent=1015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/categories?post=1015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/aws\/Developer_Associate_DVA-C01\/wp-json\/wp\/v2\/tags?post=1015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}