400+ Câu hỏi luyện thi chứng chỉ AWS Certified Solutions Architect Associate (SAA-C03) - Phần 1

aws
aws certification
cloud computing
solutions architect
saa c03
aws exam
practice test

Question 1

A large engineering company plans to deploy a distributed application with Amazon Aurora as a database. The database should be restored with a Recovery Time objective (RTO) of one minute when there is a service degradation in the primary region. The service restoration should incur the least admin work.

What approach can be initiated to design an Aurora database to meet cross-region disaster recovery requirements?

A. Use Amazon Aurora Global Database and use the secondary region as a failover for service degradation in the primary region

B. Use Multi-AZ deployments with Aurora Replicas which will go into failover to one of the Replicas for service degradation in the primary region

C. Create DB Snapshots from the existing Amazon Aurora database and save them in the Amazon S3 bucket. Create a new database instance in a new region using these snapshots when service degradation occurs in the primary region

D. Use Amazon Aurora point-in-time recovery to automatically store backups in the Amazon S3 bucket. Restore a new database instance in a new region when service degradation occurs in the primary region using these backups

Question 2

You have hosted an application on an EC2 Instance in a public subnet in a VPC. For this application’s database layer, you are using an RDS DB instance placed in the private subnet of the same VPC, but it is not publicly accessible. As the best practice, you have been storing the DB credentials in AWS Secrets Manager instead of hardcoding them in the application code.

The Security team has reviewed the architecture and is concerned that the internet connectivity to AWS Secrets Manager is a security risk. How can you resolve this security concern?

A. Create an Interface VPC endpoint to establish a private connection between your VPC and Secrets Manager

B. Access the credentials from Secrets Manager through a Site-to-Site VPN Connection

C. Create a Gateway VPC endpoint to establish a private connection between your VPC and Secrets Manager

D. Access the credentials from Secrets Manager by using a NAT Gateway

Question 3

You are the Solutions Architect of an organization that runs 100 of modern EC2 instances in a production environment. To avoid non-compliance, you must immediately update the packages on all the production EC2 instances. There is a DevSecOps team who is in charge of security group policies used in those EC2, has the SSH access disabled in the security group policy. When you reached them to get the SSH enabled, they denied that.

Which of the below options will help you to roll out the package for all the EC2 instances despite having the above restrictions from the DevSecOps team?

A. Use AWS Config to roll out the package all at once and install it in EC2 instances

B. Get the System Manager role added to your IAM roles and use Systems Manager Run Command to roll out the package installation

C. Get the System Manager role added to your IAM roles and use System Manager Session Manager to SSH into the EC2s from browser mode to install the package

D. Get the user credentials of one of the Security members to SSH into the EC2 instance and proceed with package installation

Question 4

A finance company is using Amazon S3 to store data for all its customers. During an annual audit, it was observed that sensitive data is stored by some of the customers. Operations Head is looking for an automated tool to scan all data in Amazon S3 buckets and create a report based on the findings from all the buckets with sensitive data.

Which solution can be designed to get the required details?

A. Enable Amazon GuardDuty on the Amazon S3 buckets

B. Enable Amazon Detective on the Amazon S3 buckets

C. Enable Amazon Macie on the Amazon S3 buckets

D. Enable Amazon Inspector on the Amazon S3 buckets

Question 5

A company wants to build a chatbot to answer customer queries about their products. The chatbot should be able to understand natural language queries, provide relevant information, and initiate conversations. Which of the following AWS services can be used to build this chatbot?

A. Amazon Rekognition

B. Amazon Comprehend

C. Amazon Polly

D. Amazon Lex

Question 6

A gaming company stores large size (terabytes to petabytes) of clickstream events data

into their central S3 bucket. The company wants to analyze this clickstream data to generate business insight. Amazon Redshift, hosted securely in a private subnet of a VPC, is used for all data warehouse-related and analytical solutions. Using Amazon Redshift, the company wants to explore some solutions to securely run complex analytical queries on the clickstream data stored in S3 without transforming/copying or loading the data in the Redshift.

As a Solutions Architect, which of the following AWS services would you recommend for this requirement, knowing that security and cost are two major priorities for the company?

A. Create a VPC endpoint to establish a secure connection between Amazon Redshift and the S3 central bucket and use Amazon Athena to run the query

B. Use NAT Gateway to connect Amazon Redshift to the internet and access the S3 static website. Use Amazon Redshift Spectrum to run the query

C. Create a VPC endpoint to establish a secure connection between Amazon Redshift and the S3 central bucket and use Amazon Redshift Spectrum to run the query

D. Create Site-to-Site VPN to set up a secure connection between Amazon Redshift and the S3 central bucket and use Amazon Redshift Spectrum to run the query

Question 7

A drug research team in a Medical Company has decided to use Amazon Elastic File System (EFS) as shared file system storage for their Linux workloads. All these files are related to new drug discoveries in the field of cancer treatment and are critically important for the next six months. The customer is looking for a solution to protect the data by backing up the EFS file system and simplifying the creation, migration, restoration, and deletion of backups while providing improved reporting and auditing.

As a Solution Architect, what would be your suggestions for a centralized and easy-to-develop backup strategy for the above requirement?

A. Use Amazon S3 File Gateway to back up the Amazon EFS file system

B. Use AWS Backup to back up the Amazon EFS file systems

C. Amazon FSx File Gateway to back up the Amazon EFS file systems

D. Use Amazon S3 Transfer Acceleration to copy the files from EFS into a centralized S3 bucket and then configure Cross-Region Replication of the bucket

Question 8

You are the owner of a Microservices application that has a poor latency when it runs into the ECS cluster. Which AWS services could help you analyze the root cause by tracing different calls into the application?

A. Amazon CloudWatch

B. AWS X-Ray

C. Amazon Event Bridge

D. Amazon CloudTrail

Question 9

An IT company is using EBS volumes for storing projects related work. Some of these projects are already closed. The data for these projects should be stored long-term as per regulatory guidelines and will be rarely accessed. The operations team is looking for options to store the snapshots created from EBS volumes. The solution should be cost-effective and incur the least admin work.

What solution can be designed for storing data from EBS volumes?

A. Create EBS Snapshots from the volumes and store them in the EBS Snapshots Archive

B. Use Lambda functions to store incremental EBS snapshots to AWS S3 Glacier

C. Create EBS Snapshots from the volumes and store them in a third-party low-cost, long-term storage

D. Create EBS Snapshots from the volumes and store them in the EBS standard tier

Question 10

You are working as a solutions architect in an E-Commerce based company with users from around the globe. There was feedback coming from various users of different countries to have the website content in their local languages. So, the company has now translated the website into multiple languages and is rolling out the feature soon for its users.

Now you need to send the traffic based on the location of the user. For example, if a request comes from Japan, it should be routed to the server in the ap-northeast-1 (Tokyo) region where the application is in the Japanese language. You can do so by specifying the IP address of that particular server while configuring the records in Route 53. Which one of the following routing policies should you use in Amazon Route 53 that will fulfill the given requirement?

A. Weighted Routing Policy

B. Geoproximity Routing Policy

C. Geolocation Routing Policy

D. Multivalue Answer Routing Policy

Question 11

You have built a serverless architecture composed of Lambda Functions exposed through API Gateway for one of your client’s applications. For the database layer, you have used DynamoDB. Your team lead has reviewed the architecture and is concerned about the cost of numerous API Calls being made to the backend (Lambda Functions) for so many similar requests. Also, the client is concerned about providing as low latency as possible for the application users’ requests. You have to look for a solution where the latency and overall cost can be reduced for the current architecture without much effort.

A. Cache the computed request’s responses using the CloudFront CDN caching

B. Use the API Gateway QuickResponse feature to reduce the latency and number of calls to the backend

C. Enable API Gateway Caching to cache the computed request’s responses

D. Adjust API Gateway Throttling settings to reduce the latency and number of calls to the backend

Question 12

A customer has an instance hosted in the public subnet of the default VPC. The subnet has the default settings for the Network Access Control List. An IT Administrator needs to be provided SSH access to the underlying instance. How could this be accomplished?

A. Ensure the Network Access Control Lists allow Inbound SSH traffic from the IT Administrator’s Workstation.

B. Ensure the Network Access Control Lists allow Outbound SSH traffic from the IT Administrator’s Workstation.

C. Ensure that the Security group allows Inbound SSH traffic from the IT Administrator’s Workstation.

D. Ensure that the Security group allows Outbound SSH traffic from the IT Administrator’s Workstation.

Question 13

A new VPC with CIDR range 10.10.0.0/16 has been set up with a public and a private subnet. Internet Gateway and a custom route table have been created, and a route has been added with the ' Destination’ as ‘0.0.0.0/0’ and the ‘Target’ with Internet Gateway ( igw-id ). A new Linux EC2 instance has been launched on the public subnet with the auto-assign public IP option enabled, but the connection is getting failed when trying to SSH into the machine. What could be the reason?

A. Elastic IP is not assigned.

B. The NACL of the public subnet disallows the SSH traffic.

C. A public IP address is not assigned.

D. The Security group of the instance disallows the egress traffic on port 80.

Question 14

You are designing a website for a company that streams anime videos. You serve this content through CloudFront. The company has implemented a section for premium subscribers. This section contains more videos than the free section. You want to ensure that only premium subscribers can access this premium section. How can you achieve this easily?

A. Using bucket policies.

B. Requiring HTTPS for communication between users and CloudFront.

C. Using CloudFront origin with signed URLs.

D. Using CloudFront origin with signed cookies.

Question 15

You currently have your EC2 instances running in multiple availability zones in an AWS region. You need to create NAT gateways for your private instances to access internet. How would you set up the NAT gateways so that they are highly available?

A. Create two NAT Gateways and place them behind an ELB.

B. Create a NAT Gateway in each Availability Zone.

C. Create a NAT Gateway in another region.

D. Use Auto Scaling groups to scale the NAT Gateways.

Question 16

You are a Solutions Architect in a startup company that is releasing the first iteration of its app. Your company doesn’t have a directory service for its intended users but wants the users to sign in and use the app. Which of the following solutions is the most cost-efficient?

A. Create an IAM role for each end user and the user will assume the IAM role when he signs in the APP.

B. Create an AWS user account for each customer.

C. Invest heavily in Microsoft Active Directory as it’s the industry standard.

D. Use Cognito Identity along with a User Pool to securely save users’ profile attributes.

Question 17

A financial institution wants to improve its customer service by automating certain tasks and providing a more personalized experience. They are considering using AWS services to achieve this goal.

Which of the following AWS services can be used to enhance customer service in a financial institution? (Select all that apply)

A. Amazon Polly

B. Amazon Fraud Detector

C. Amazon Kendra

D. Amazon Lex

E. Amazon Textract

Question 18

A website is hosted on two EC2 instances that sit behind an Elastic Load Balancer. The website’s response time has been slowed down drastically, and fewer orders are placed by the customers due to the wait time. By troubleshooting, it showed that one of the EC2 instances had failed and only one instance is running now. What is the best course of action to prevent this from happening in the future?

A. Change the instance size to the maximum available to compensate for the failure.

B. Use CloudWatch to monitor the VPC Flow Logs for the VPC, the instances are deployed in.

C. Configure the ELB to perform health checks on the EC2 instances and implement auto-scaling.

D. Replicate the existing configuration in several regions for failover.

Question 19

You work in the media industry and have deployed a web application on a large EC2 instance where users can upload photos to your website. This web application must be able to call the S3 API to function properly. Where would you store your API credentials while maintaining the maximum level of security?

A. Save the API credentials to your PHP files.

B. Don’t save your API credentials. Instead, create an IAM role and assign that role to an EC2 instance.

C. Save your API credentials in a public Github repository.

D. Pass API credentials to the instance using instance user data

Question 20

A company has a media processing application deployed in a local data center. Its file storage is built on a Microsoft Windows file server. The application and file server need to be migrated to AWS. You want to set up the file server in AWS quickly. The application code should continue working to access the file systems. Which method should you choose to create the file server?

A. Create a Windows File Server from Amazon WorkSpaces.

B. Configure a high performance Windows File System in Amazon EFS.

C. Create FSx for Windows File Server.

D. Configure a secure enterprise storage through Amazon WorkDocs.

Question 21

You have an application hosted in an Auto Scaling group, and an application load balancer distributes traffic to the ASG. You want to add a scaling policy that keeps the average aggregate CPU utilization of the Auto Scaling group to be 60 percent. The capacity of the Auto Scaling group should increase or decrease based on this target value. Which scaling policy does it belong to?

A. Target tracking scaling policy.

B. Step scaling policy.

C. Simple scaling policy.

D. Scheduled scaling policy.

Question 22

A multinational logistics company is looking to modernize its tracking and auditing system for packages and shipments. They require a solution that provides immutable transaction history, real-time visibility into data changes, and seamless integration with their existing AWS infrastructure. Which AWS service would be most suitable for their use case?

A. Amazon Neptune

B. Amazon Quantum Ledger Database (Amazon QLDB)

C. Amazon ElastiCache

D. Amazon DynamoDB

Question 23

The customer data of an application is stored in an S3 bucket. Your team would like to use Amazon Athena to analyze the data using standard SQL. However, the data in the S3 bucket is encrypted via SSE-KMS. How would you create the table in Athena for the encrypted data in S3?

A. You need to provide the private KMS key to Athena.

B. Athena decrypts the data automatically, and you do not need to provide key information.

C. You need to convert SSE-KMS to SSE-S3 before creating the table in Athena.

D. You need to disable the server-side encryption in S3 before creating the Athena table

Question 24

You create several SQS queues to store different types of customer requests. Each SQS queue has a backend node that pulls messages for processing. Now you need a service to collect messages from the frontend and push them to the related queues using the publish/subscribe model. Which service would you choose?

A. Amazon MQ

B. Amazon Simple Notification Service (SNS)

C. Amazon Simple Queue Service (SQS)

D. AWS Step Functions

Question 25

You have a requirement to get a snapshot of the current configuration of resources in your AWS Account. Which service can be used for this purpose?

A. AWS CodeDeploy

B. AWS Trusted Advisor

C. AWS Config

D. AWS IAM