...

100 Free AWS Solutions Architect (SAA-C03) Practice Test Questions to Crush the Exam

The AWS Certified Solutions Architect – Associate (SAA-C03) certification is the industry gold standard, validating your ability to design secure, highly available, and cost-optimized solutions on Amazon Web Services. Success on the scenario-based SAA-C03 exam requires deep knowledge of architectural trade-offs. The definitive path to passing this certification is rigorous preparation using a validated, high-quality, free AWS practice test like this one.

Note: The full interactive practice test is available immediately at the bottom of this post.

Free AWS Solutions Architect (SAA-C03) Practice Questions

Why This SAA-C03 Practice Test Trumps AWS SAA-C03 Exam Dumps

The official SAA-C03 exam assesses your judgment across complex design requirements. You must select the best answer, often differentiating between two correct but sub-optimal solutions. Unverified AWS SAA-C03 exam dumps fail to provide this necessary context. Our set of 88 SAA-C03 questions is carefully crafted to cover the breadth of the SAA-C03 exam domains, providing the authoritative explanations you need to master the thinking required of an AWS Solutions Architect.

Architecting for Resilience and High Availability (SAA-C03 Domain)

A major focus of the SAA-C03 is designing systems that can automatically recover from failures across Availability Zones (AZs).

Multi-AZ for RDS: Withstanding AZ Failure

If a multi-tier application needs its database to withstand the failure of an entire Availability Zone, the only Amazon RDS configuration that provides synchronous data replication and automatic failover is Multi-AZ Deployment. This configuration creates a standby replica in a different AZ, ensuring that in the event of a zone failure, the primary instance automatically fails over with minimal data loss. The SAA-C03 frequently tests this foundational concept.

Protecting Against Web Exploits

For a web application running behind an Application Load Balancer (ALB), protection against application-layer threats like SQL injection and cross-site scripting is paramount. The correct service to implement this is AWS WAF (Web Application Firewall). AWS WAF is specifically designed to filter and monitor HTTP/HTTPS traffic, shielding your web servers from common exploits, which is a key security requirement for the SAA-C03.

https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html

Cost Optimization and Storage Strategies (A Core SAA-C03 Focus)

A core duty of the Solutions Architect is to select services that meet performance requirements while minimizing cost.

The Lowest Cost Storage for Archival Data

For compliance and archival data, such as long-term audit logs that must be retained for seven years and are accessed very rarely (e.g., once a year) with acceptable retrieval times measured in hours, the architect must select the absolute lowest cost option. This option is Amazon S3 Glacier Deep Archive. It is the most economical storage class in AWS, perfectly matching the requirements of long-term retention and infrequent, delayed access, as tested on the SAA-C03.

Cost-Effective Compute for Flexible Workloads

For a stateless, fault-tolerant application where the workload is periodic and can be interrupted, the most cost-effective EC2 purchasing option is Spot Instances. The SAA-C03 emphasizes that Spot Instances offer the largest discount by leveraging unused EC2 capacity, making them ideal for flexible compute requirements where termination is not critical.

https://docs.aws.amazon.com/cost-management/latest/userguide/what-is-costmanagement.html

Identity and Access Management Best Practices for SAA-C03

Proper identity management simplifies operations and strengthens the security posture, which is essential for the SAA-C03.

Efficiently Managing Permissions with IAM Groups

When an organization has many developers, each requiring similar but slightly different permissions based on their project, managing permissions individually is inefficient. The most secure and efficient way to manage these permissions is by using IAM Groups. By defining permissions at the group level, an administrator can easily add or remove developers, and update permissions for an entire project team simultaneously, meeting the scale and efficiency requirements of the SAA-C03.

Accessing Private Subnets Securely

An EC2 instance in a private subnet needs to connect to the AWS public services (like DynamoDB or S3) without traversing the internet or requiring a NAT Gateway. The service designed for this is an AWS VPC Endpoint. Specifically, a Gateway Endpoint provides a private connection to S3 and DynamoDB from within your VPC, a crucial security component for the SAA-C03.

https://aws.amazon.com/certification/certified-solutions-architect-associate

Conclusion

The AWS SAA-C03 certification demands mastery across all AWS domains, focusing heavily on architectural best practices. Your success depends on the quality of your preparation. This free AWS SAA-C03 practice test gives you 88 expert questions and authoritative explanations to solidify your knowledge. Avoid the risk of relying on questionable AWS SAA-C03 exam dumps. Please do not forget to checkout other free Amazon Web Services Certifications on CertyBuddy.com: https://certybuddy.com/practice-tests/?vendor=aws

Take the professional step now. Master the core domains and pass the SAA-C03 exam on your first attempt!

/100
0

Free AWS Solutions Architect (SAA-C03) Practice Questions

How does AWS provide temporary, automatically rotated credentials to its compute services?

1 / 100

An application running on an EC2 instance needs to securely access an Amazon S3 bucket without storing AWS credentials on the instance. What is the most secure method to grant the required permissions?

Which EBS category is specifically designed for I/O-intensive database workloads where you can specify the exact IOPS you need?

2 / 100

A database workload on an EC2 instance requires a high number of I/O operations per second (IOPS). The performance must be consistent regardless of the size of the storage volume. Which EBS volume type is most suitable for this use case?

What RDS feature allows you to create copies of your database that are dedicated to handling read queries?

3 / 100

An Amazon RDS for PostgreSQL database is experiencing high read traffic, which is causing performance degradation. The application can tolerate slightly stale data for read queries. What is the most effective way to scale the read capacity of the database?

Which service acts like a personalized consultant for your AWS account?

4 / 100

Which AWS service would you use to find recommendations for improving security, reducing costs, and increasing the performance of your AWS environment based on AWS best practices?

Which billing and cost management tool is specifically designed for setting spending limits and receiving alerts?

5 / 100

A company wants to receive alerts when its estimated AWS charges exceed a certain amount. Which service can be used to create a budget and send notifications when the costs or usage exceed a defined threshold?

Which managed relational database service feature captures transaction logs to enable fine-grained restores?

6 / 100

A company needs to host a relational database that will be managed by AWS. The solution must support point-in-time recovery to allow restoring the database to any second during a retention period. Which AWS service and feature should be used?

To serve an S3 static site over HTTPS with a custom domain, you need a CDN to handle the SSL certificate and a DNS service to point your domain to the CDN.

7 / 100

A company is hosting a static website on Amazon S3. They want to use their own domain name (e.g., www.example.com) and provide HTTPS access to their users. Which combination of services should be used to achieve this?

Consider the pricing model that allows you to bid on spare AWS compute capacity.

8 / 100

A company has a stateless application that runs on a large fleet of EC2 instances. The workload is periodic, fault-tolerant, and can be interrupted without adverse effects. To significantly reduce compute costs, which EC2 purchasing option is the most appropriate?

Consider which part of the URL the load balancer is inspecting to make its routing decision.

9 / 100

An Application Load Balancer is configured with a listener rule that forwards requests with the path `/api/*` to one target group, and all other requests to a different target group. What type of routing is this?

Which service acts as a central hub or ‘cloud router’ to simplify VPC-to-VPC connectivity?

10 / 100

A company has several VPCs in the same region and needs to connect them all so that resources in any VPC can communicate with resources in any other VPC. The company anticipates adding more VPCs in the future and wants a scalable solution that avoids complex mesh peering. Which service should be used?

Think about the initial rules of a default security group and how it facilitates communication between instances launched within it.

11 / 100

An EC2 instance is launched into a VPC with a default security group. By default, what traffic is allowed by this security group?

Think about the two main advantages of having a live, replicated copy of your database in a different continent.

12 / 100

A company is using Amazon Aurora Global Database, with a primary cluster in us-east-1 and a secondary cluster in eu-west-1. What is the primary benefit of this architecture?

Which pricing model rewards the longest commitment and the largest upfront payment with the deepest discount?

13 / 100

A company is running an application with a consistent and predictable workload 24/7 for the next three years. They want the most significant possible discount on their EC2 compute costs. Which purchasing option should they choose?

In this type of architecture, any server can process a request because it does not rely on any locally stored information from previous interactions.

14 / 100

Which of the following describes a ‘stateless’ application architecture?

What is the term for a direct, one-to-one private network connection between two VPCs?

15 / 100

A company requires that network traffic between its VPCs does not traverse the public internet. The VPCs are in the same AWS account and region and have non-overlapping CIDR blocks. What is the simplest way to enable private communication between them?

Serverless services are those where you don’t need to provision, manage, or scale any underlying servers.

16 / 100

Which of the following services is serverless? (Choose two)

How can you send a single message that is then replicated and sent to many different destinations?

17 / 100

An application is being designed with a microservices architecture. The services are loosely coupled and communicate asynchronously. One service needs to publish an event, and multiple other services need to receive and process that same event independently. Which communication pattern and AWS service should be used?

Which service involves AWS shipping a physical hardware device to your data center?

18 / 100

A company needs to transfer 50 TB of data from its on-premises data center to Amazon S3. The company has a slow and unreliable internet connection, making an online transfer impractical. Which AWS service provides a physical appliance to securely transfer this large amount of data?

Look for a bucket-level setting that automatically handles encryption for all incoming objects.

19 / 100

A company is storing sensitive user data in an Amazon S3 bucket. They need to ensure the data is encrypted at rest. What is the simplest way to enforce that all new objects uploaded to the bucket are encrypted without any client-side action?

Look for the S3 bucket configuration that specifically requires an additional authentication factor for deletion operations.

20 / 100

A solutions architect must ensure that an Amazon S3 bucket containing confidential documents cannot be accidentally deleted. Additionally, any user who tries to delete an object from the bucket must provide a second factor of authentication. Which S3 features should be enabled on the bucket?

Look for the service designed for a ‘publish/subscribe’ (pub/sub) model for sending messages to many receivers.

21 / 100

An application needs to send notifications to a large number of subscribers through multiple protocols, such as email, SMS, and mobile push notifications. Which AWS service is best suited for this task?

Think of a service that acts like a post office for messages, holding them until the recipient is ready to pick them up.

22 / 100

A data processing application generates a large number of messages that need to be processed by a fleet of EC2 instances. The number of messages can vary significantly. To prevent overloading the consumers and losing messages, the application needs a durable buffer to store the messages. Which service should be used to decouple the message producer from the consumers?

Think about how distributing resources across physically separate data centers within one city or area protects against localized failures.

23 / 100

What is the key benefit of deploying an application across multiple Availability Zones within a single AWS Region?

Which AWS service provides a managed Network File System (NFS) for Linux instances?

24 / 100

A solutions architect needs to design a shared storage solution for a fleet of Linux-based EC2 instances that require concurrent access to the same files. The storage solution must be fully managed and scale automatically as data grows. Which service is the most appropriate?

Think about the RDS feature specifically designed for automatic failover and high availability across different physical locations within a region.

25 / 100

A company is designing a multi-tier web application that must be highly available and fault-tolerant. The web servers will run on EC2 instances and need to access a database. To ensure the database can withstand the failure of an entire Availability Zone, which Amazon RDS configuration should be implemented?

Think about how you can protect specific, important resources within a CloudFormation stack from being accidentally modified or deleted.

26 / 100

What is the function of AWS CloudFormation stack policies?

How can a database architecture handle a large volume of queries that only retrieve data, without impacting the main instance that handles data modifications?

27 / 100

An Amazon Aurora database cluster is configured with a primary writer instance and several Aurora Replicas. What is the primary purpose of the Aurora Replicas?

Look for the AWS managed file system based on a popular open-source parallel file system used in supercomputing.

28 / 100

A company needs to store frequently accessed data in a shared file system for a high-performance computing (HPC) cluster running on Linux EC2 instances. The file system must provide millions of IOPS and sub-millisecond latencies. Which AWS storage service is designed for these extreme performance requirements?

Which service is designed to be an in-memory cache, providing the fastest possible data access?

29 / 100

A solutions architect is designing a stateless web application. To improve scalability and resilience, user session data must be stored externally from the EC2 instances. The session data requires extremely low latency (sub-millisecond) for read and write operations. Which service is the best choice for storing this session data?

Think about how large enterprises manage policies and billing across many different business units, each with its own AWS account.

30 / 100

What is the primary purpose of AWS Organizations?

Which RDS option is specifically designed for customers who already own software licenses?

31 / 100

A company is migrating its on-premises Oracle database to AWS. The company has existing Oracle licenses that it wants to continue using to save costs. Which Amazon RDS licensing model should be selected?

Think about the component that acts as the gateway between a VPC and the public internet.

32 / 100

A solutions architect is creating a custom VPC. After creating the VPC and a public subnet, they launch an EC2 instance into the subnet. However, the instance cannot reach the internet. What is a likely missing component?

What AWS service provides a physical fiber-optic connection between a customer’s data center and AWS?

33 / 100

A company wants to establish a private, dedicated network connection between its on-premises data center and its AWS VPC. The connection must provide consistent, low-latency performance and cannot traverse the public internet. Which AWS service should be used?

Think about the two services designed to distribute traffic and manage the size of your compute fleet dynamically.

34 / 100

A company is launching a new web service and expects the traffic to grow rapidly. They want a solution that automatically adds or removes EC2 instances based on demand to maintain performance and minimize costs. Which AWS services should be combined to achieve this?

Look for the AWS service specifically designed to provide managed environments for popular third-party configuration management tools.

35 / 100

A company wants to use a managed Chef and Puppet configuration management service to automate the configuration of its EC2 instances. Which AWS service provides this capability?

Which AWS security service acts like an automated vulnerability scanner for your EC2 instances?

36 / 100

To improve the security posture of an AWS account, a security engineer wants to automatically assess EC2 instances for vulnerabilities and unintended network exposure. Which service should be used?

What is the AWS service that provides a managed Network File System (NFS) in the cloud?

37 / 100

An application requires access to a set of files that must be shared among multiple EC2 instances. The file system must support the NFS protocol. Which AWS storage service is the most suitable choice?

Consider the DR strategy where a small, core part of the infrastructure is always running in the recovery region, ready to be scaled up.

38 / 100

A company needs to implement a disaster recovery strategy with a Recovery Time Objective (RTO) of 15 minutes and a Recovery Point Objective (RPO) of 1 hour. The primary site runs in an AWS region. Which DR strategy is most appropriate and cost-effective for these requirements?

The term ‘immutable’ means ‘unchanging.’ How does this apply to deploying application updates?

39 / 100

An application is designed to be deployed using immutable infrastructure. When a new version of the application is released, what is the correct deployment procedure?

Think about the credentials you configure when you run `aws configure` for the first time.

40 / 100

A developer needs programmatic access to AWS services from their local machine using the AWS CLI. What type of IAM credentials are required?

Which service places a virtual appliance in your on-premises environment to connect to AWS storage?

41 / 100

A company has a requirement to use a file storage service that is accessible from both their on-premises servers and their EC2 instances. They want a single, unified view of their files. Which AWS service provides a hybrid cloud storage solution for files?

Which service is the central hub for observability and operational data in AWS?

42 / 100

A solutions architect needs to monitor the performance of an application running on EC2 instances. Specifically, they need to track CPU Utilization, Disk I/O, and Network traffic. Which AWS service provides these metrics by default?

Look for the managed AWS service specifically designed to automate the creation, retention, and deletion of EBS snapshots.

43 / 100

A company needs to implement a backup strategy for their EBS volumes. The backups should be automated, and older backups should be automatically deleted to save costs. Which combination of services provides the most automated solution?

Review the AWS support plan features, focusing on response times for critical issues and access to optimization checks.

44 / 100

A company is running a production application on EC2 instances and requires a support plan that provides a response time of less than 1 hour for production system-down events. They also need access to the full set of AWS Trusted Advisor checks. Which is the lowest-tier support plan that meets these requirements?

What is the name of the in-memory caching service that is purpose-built for DynamoDB?

45 / 100

A new gaming application requires a database with extremely low latency for its leaderboard feature. The data needs to be read very frequently. To improve read performance for the existing DynamoDB table, which feature or service should be implemented?

Consider how IAM allows for the management of permissions for a collection of users rather than on an individual basis.

46 / 100

An organization wants to provide its development team with access to AWS resources. Each developer needs a unique set of permissions based on their project. Managing permissions for each developer individually is becoming cumbersome. What is the most efficient and secure way to manage these permissions?

Look for the serverless query engine that works directly with data stored in S3.

47 / 100

An analytics workload processes large amounts of data stored in Amazon S3. The company wants to run complex SQL queries directly on the data in S3 without loading it into a traditional data warehouse. Which service allows for this serverless, interactive querying?

Consider the latest generation general-purpose SSD volume type that offers a good balance of performance and cost, and can be used as a boot volume.

48 / 100

A solutions architect needs to choose an EBS volume type for a boot volume on a general-purpose EC2 instance used for development and testing. The workload is bursty, and cost is a primary concern. A moderate baseline performance is acceptable. Which volume type is the most cost-effective choice?

Which AWS service is specifically designed to handle real-time, ordered ‘streams’ of data?

49 / 100

A solutions architect is designing a system that processes a continuous stream of real-time data from thousands of IoT devices. The data must be processed in order and be available for multiple consuming applications to read simultaneously. Which service is best suited for ingesting and processing this data stream?

Which load balancer type operates at Layer 7 and can inspect application-level content?

50 / 100

A solutions architect is selecting an Elastic Load Balancer for a new application. The application uses HTTP and HTTPS protocols and requires routing decisions to be made based on the URL path of the incoming request (e.g., sending ‘/api’ requests to one group of servers and ‘/images’ to another). Which type of load balancer should be used?

Look for the AWS service with ‘Secret’ in its name that is built for managing and rotating credentials.

51 / 100

An application running on EC2 instances needs access to database credentials that are rotated automatically every 30 days. The application should be able to retrieve these credentials securely at runtime without them being hardcoded. Which service is designed for this purpose?

Consider the AWS managed service that provides Network Address Translation for private subnets.

52 / 100

To enhance security, an organization wants to ensure that EC2 instances in a private subnet can download software updates from the internet, but the instances must not be reachable from the internet. What is the most scalable and highly available solution?

Which service functions as the audit log for your AWS account?

53 / 100

During a security audit, it was discovered that a new IAM user was created with excessive permissions. The security team needs to determine who created this user and from what IP address the action was performed. Which service provides this information?

Is there a region-wide setting in the EC2 console that can enforce encryption for all new volumes?

54 / 100

An organization is deploying a new application on AWS and has a strict requirement that all data stored in Amazon EBS volumes must be encrypted. What is the easiest way to ensure this compliance requirement is met for all future EBS volumes created in a specific region?

Think about the AWS networking feature that allows you to allocate a persistent public IP address to your account.

55 / 100

A company is migrating a legacy application to AWS that requires a static, unchanging public IP address for whitelisting by its partners. The application will run on an EC2 instance. Which AWS resource should be used to meet this requirement?

How can an instance in a private network indirectly access the internet through another device in a public network?

56 / 100

A solutions architect is designing a VPC with one public subnet and one private subnet. An EC2 instance in the private subnet needs to be able to connect to the internet to download security patches. Which of the following must be configured?

What standard protocol is used to exchange authentication and authorization data between an enterprise identity provider and a service provider like AWS?

57 / 100

A company wants to enable its on-premises users, who authenticate via Microsoft Active Directory, to access the AWS Management Console without creating separate IAM users for each person. Which service or feature should be used to enable this federated access?

Look for a service that provides static, anycast IP addresses and optimizes the network path for global applications.

58 / 100

A company wants to improve the availability and performance of its TCP-based global application by directing user traffic through the AWS global network. The solution should provide static IP addresses that act as a fixed entry point for the application. Which service is best suited for this?

Think about the AWS purpose-built NoSQL database designed for performance at scale.

59 / 100

A new application requires a database that can handle millions of requests per second with single-digit millisecond latency. The data model is a simple key-value structure, and the database must scale automatically without manual intervention. Which AWS database service is the best fit?

What two networking components connect a VPC to the internet and then direct traffic from a subnet to that connection?

60 / 100

An EC2 instance is launched in a public subnet of a VPC and needs to access the internet. What components are required for this to be possible?

Which service functions as a Content Delivery Network (CDN)?

61 / 100

A global application serves content to users across the world. To reduce latency and improve performance for users, a company wants to cache content closer to them. Which AWS service should be used?

How can Auto Scaling be configured to proactively adjust capacity based on a known time-based schedule?

62 / 100

An application’s user base has predictable traffic patterns, with high usage during business hours (9 AM – 5 PM) on weekdays and very low usage at night and on weekends. A solutions architect wants to ensure there are enough EC2 instances to handle the load during peak times but wants to reduce costs during off-peak times. What is the most effective solution?

Think of this component as the traffic director or GPS for a VPC subnet.

63 / 100

What is the primary function of a route table within an Amazon VPC?

Which VPC firewall component supports explicit ‘deny’ rules and is associated with subnets?

64 / 100

A solutions architect needs to enforce a strict firewall rule at the subnet boundary. The rule must explicitly deny all traffic from a specific malicious IP address range, while allowing all other traffic. Which AWS networking component should be used?

What feature of AWS Organizations is used to set permission guardrails across all accounts?

65 / 100

A company is using AWS Organizations to manage multiple AWS accounts. They need to apply a security policy that prevents IAM users in member accounts from disabling AWS CloudTrail, regardless of any permissions they might have. How can this be enforced from the management account?

How can a CloudFormation template be made more flexible and reusable without hardcoding values?

66 / 100

In AWS CloudFormation, what is the function of the `Parameters` section in a template?

Which service is AWS’s serverless event bus that can generate events based on a schedule?

67 / 100

A company is designing a system where an AWS Lambda function needs to be invoked once every hour to perform a cleanup task. What is the simplest way to trigger this Lambda function on a recurring schedule?

Consider how to architect for redundancy by using the isolated locations within a single AWS Region.

68 / 100

A company is deploying a critical application and must ensure that it can withstand the failure of an entire AWS Availability Zone. Which is the minimum architecture required to achieve this?

Consider how each service handles rules for blocking traffic.

69 / 100

Which of the following is a key difference between a Network Access Control List (NACL) and a Security Group?

Think about which AWS security service operates at Layer 7 of the OSI model to inspect web traffic.

70 / 100

A web application hosted on EC2 instances behind an Application Load Balancer needs a firewall to protect against common web exploits like SQL injection and cross-site scripting. Which AWS service should be used?

What is the primary responsibility of a load balancer when a backend target becomes unresponsive?

71 / 100

An Application Load Balancer (ALB) distributes traffic to a target group of EC2 instances. One of the instances has failed its health check. What action will the ALB take?

What is the name of AWS’s managed Docker image repository?

72 / 100

A developer has written an application as a Docker container. They want to store the container image in a secure, private, and managed registry on AWS. Which service should they use?

Which AWS service is considered a Platform as a Service (PaaS) for deploying web applications?

73 / 100

An organization wants a simplified way to deploy and manage a web application on AWS. They want the service to automatically handle the provisioning of resources like EC2 instances, load balancers, and auto-scaling, allowing developers to focus only on uploading their code. Which service provides this level of abstraction?

Focus on the storage class designed specifically for long-term data archiving where retrieval time is not a critical factor.

74 / 100

A financial services company needs to store long-term audit logs for 7 years to comply with regulations. The data will be accessed very rarely, perhaps once a year, but when access is needed, a retrieval time of up to 12 hours is acceptable. Which Amazon S3 storage class offers the lowest cost for this scenario?

Which AWS service is specifically designed to be an enterprise-class data warehouse?

75 / 100

A company needs to analyze terabytes of data using a business intelligence tool. The data is structured and will be queried frequently by analysts. The company requires a fully managed petabyte-scale data warehouse service. Which AWS service should be chosen?

Which service is AWS’s native Infrastructure as Code (IaC) offering?

76 / 100

A company wants to automate the deployment of its infrastructure using code. The team wants to use a declarative template in either JSON or YAML format to define all the required AWS resources (e.g., EC2, VPC, S3) as a single unit called a stack. Which AWS service enables this?

Which server-side encryption method integrates with a managed service for key administration?

77 / 100

A company needs to encrypt data in an S3 bucket and wants to have full control over the lifecycle of the encryption keys, including the ability to create, rotate, and disable them. However, they do not want to manage the underlying cryptographic hardware. Which encryption option should they use?

Which security service is specifically focused on discovering and classifying sensitive data within your S3 buckets?

78 / 100

A solutions architect wants to automatically discover and classify sensitive data, such as personally identifiable information (PII), stored in Amazon S3 buckets. Which service uses machine learning to achieve this?

Think about the pillar that covers the day-to-day running of your application, including monitoring, automation, and responding to events.

79 / 100

Which AWS Well-Architected Framework pillar focuses on the ability to run workloads effectively, gain insight into their operations, and continuously improve supporting processes and procedures?

Which AWS file storage service is specifically built for Windows-based workloads?

80 / 100

A legacy application is being migrated to an EC2 instance. The application writes data to a local file share that must be accessible to other Windows servers in the same VPC. The file share needs to support the SMB protocol and integrate with Microsoft Active Directory. Which storage service should be used?

What is the principle of ‘locking away’ the most powerful credentials and using less privileged accounts for daily work?

81 / 100

According to the AWS Well-Architected Framework, what is the best practice for managing an AWS account’s root user credentials after initial setup?

What digital asset is necessary for any web server or endpoint to establish a secure HTTPS connection?

82 / 100

An Application Load Balancer is configured with a listener for HTTPS on port 443. What is required for the ALB to terminate the SSL/TLS connection?

Which VPC feature creates a private connection to specific AWS services?

83 / 100

What is the most secure and efficient way to provide an application running in a VPC with access to AWS services like S3 and DynamoDB, without the traffic leaving the AWS network?

This DR metric is concerned with the duration of the outage.

84 / 100

In a disaster recovery scenario, what does Recovery Time Objective (RTO) refer to?

How do Auto Scaling groups and Load Balancers integrate to manage a dynamic fleet of servers?

85 / 100

An Application Load Balancer needs to distribute traffic to a set of EC2 instances that are frequently terminated and replaced by an Auto Scaling group. How can the ALB dynamically discover and route traffic to the available instances?

Which serverless service is designed for running standard SQL queries on data in S3?

86 / 100

A company needs to analyze VPC Flow Logs to identify suspicious traffic patterns. The logs are stored in Amazon S3. Which service can be used to perform complex SQL queries on these log files directly?

The model divides responsibilities into security ‘of’ the cloud (AWS) and security ‘in’ the cloud (customer).

87 / 100

What does the AWS Shared Responsibility Model state about the customer’s responsibility for an IaaS service like Amazon EC2?

Consider the flexible pricing model that provides discounts similar to Reserved Instances but is not tied to a specific instance family.

88 / 100

Which EC2 pricing model offers the most significant long-term discount in exchange for a 1- or 3-year commitment to a consistent amount of compute usage (measured in $/hour)?

Which routing policy makes decisions based on the physical location where the DNS query originates?

89 / 100

A solutions architect needs to set up DNS for a new domain. When users in Europe access the domain, they should be directed to servers in the eu-west-1 region. When users in North America access the domain, they should be directed to servers in the us-east-1 region. Which Amazon Route 53 routing policy should be used?

Which AWS DDoS protection service is enabled by default on all accounts?

90 / 100

A company is concerned about Distributed Denial of Service (DDoS) attacks against its public-facing web application. Which AWS service provides automatic protection against common, network and transport layer DDoS attacks for all AWS customers at no additional charge?

Which networking service uses a ‘hub and spoke’ model to connect multiple networks?

91 / 100

A solutions architect needs to provision an AWS resource that will act as a centralized router to simplify the network topology between hundreds of VPCs and on-premises connections. What service should be used?

Consider the stateful firewall that operates at the instance level.

92 / 100

A solutions architect is designing a network infrastructure in AWS. There is a requirement to allow web traffic on port 80 to a group of EC2 instances in a public subnet, but deny all other inbound traffic. At the same time, all outbound traffic from these instances should be allowed. Which security control is most appropriate for this requirement?

Which service allows you to create a visual state machine to coordinate the components of a distributed application?

93 / 100

Which of the following services can be used to run a serverless application defined by a collection of AWS Lambda functions?

Look for the S3 feature designed to meet regulatory requirements for immutable, WORM (Write-Once-Read-Many) storage.

94 / 100

A company is storing sensitive documents in an S3 bucket and needs to ensure that the objects cannot be deleted or overwritten by any user, including the root user, for a specified retention period. Which S3 feature should be used?

Consider the AWS service that allows you to run code without provisioning or managing servers, based on triggers from other services.

95 / 100

A developer needs to execute a piece of code in response to an object being uploaded to an S3 bucket. The execution should be event-driven, and the developer does not want to manage any servers. Which compute service is the most appropriate choice?

How can you provide a user with a special, time-limited link to access private content?

96 / 100

A media company is using Amazon CloudFront to distribute its video content globally. Some of the content is premium and should only be accessible to authenticated users. What CloudFront feature can be used to restrict access to this premium content?

Which storage service provides virtual hard disks for EC2 instances?

97 / 100

An Amazon EC2 instance needs a block storage volume that will persist independently of the instance’s lifecycle. If the instance is terminated, the data on the volume must remain. Which type of storage should be used?

How can you automate the management of an object’s storage tier over its lifetime to save costs?

98 / 100

What is the purpose of an Amazon S3 lifecycle policy?

Which compute option for containers removes the need to think about or manage servers?

99 / 100

A company wants to run a containerized application on AWS but wants to avoid managing the underlying EC2 instances for the container cluster. They need a serverless compute engine for containers. Which AWS service or feature should they use?

Consider the service that acts like an intrusion detection system (IDS) for your AWS environment.

100 / 100

An organization needs a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect their AWS accounts, workloads, and data stored in Amazon S3. Which service should they enable?

Share your love
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.