400+ Câu hỏi luyện thi chứng chỉ AWS Certified Solutions Architect Associate (SAA-C03) - Phần 3

aws
aws certification
cloud computing
solutions architect
saa c03
aws exam
practice test

Question 1

A global beverage company is using AWS cloud infrastructure for hosting its web application. For a new beverage, the company plans to use a unique voice using Amazon Polly to help market this product to a wide range of customers.

Which feature can be used with Amazon Polly for this purpose?

A. Create custom Lexicons with Amazon Polly

B. Use a custom SSML tag with Amazon Polly

C. Build a Brand Voice using Amazon Polly

D. Use a Newscaster Speaking Style with Amazon Polly

Question 2

An airline company needs to analyze customer feedback about services provided. A large number of files are created which have texts such as Ticket returns and Flight complaints based upon customer feedback. This text should be categorized, and a label needs to be assigned for further analysis. The company is planning to use Amazon Comprehend for this purpose. The project team is looking for your suggestions for storing files that Amazon Comprehend can use for processing and saving the results.

How can a solution be implemented for this purpose?

A. Store the files in Amazon EFS volumes. Use Amazon Comprehend to read the data from the Amazon EFS volumes and write results to Amazon Redshift

B. Store the files in Amazon EBS volumes. Use Amazon Comprehend to read the data from the Amazon EBS volumes and write results to Amazon S3 buckets

C. Store the files in Amazon Redshift. Use Amazon Comprehend to read the data from the Amazon Redshift and write results to Amazon S3 buckets

D. Store the files in Amazon S3 bucket. Use Amazon Comprehend to read the data from the Amazon S3 bucket and write results to Amazon Redshift

Question 3

A stock broking company has deployed a stock trading web application on the Amazon EC2 instance. The company is looking for virtual agents to be integrated with this application to provide conversational channels to its premium customers. Real-time personalized stock recommendations should be provided for premium customers during market hours.

Which service is best suited to integrate with this application?

A. Amazon Lex

B. Amazon Translate

C. Amazon Transcribe

D. Amazon Personalize

Question 4

A Company has provisioned a website in the US West (N. California) region using Amazon EC2 instance and Amazon CloudFront. The company is using IAM to control access to these resources. The client plans to use a third-party SSL/TLS certificate to support HTTPS. As an AWS consultant, you have been engaged to advise importing the certificate and using it along with Amazon CloudFront. Certificates should be easily imported, and you should monitor the expiration dates of imported certificates.

How can certificates be provisioned to meet this requirement?

A. Import the third-party certificate in the US East (N. Virginia) region of AWS Certificate Manager and use it for Amazon CloudFront in the US West (N. California) region

B. Import the third-party certificate in the US West (N. California) region of AWS Certificate Manager and use it for Amazon CloudFront in the US West (N. California) region

C. Import the third-party certificate in the US East (N. Virginia) region of IAM Certificate Manager and use it for Amazon CloudFront in the US West (N. California) region

D. Import the third-party certificate in the US West (N. California) region of IAM Certificate Manager and use it for Amazon CloudFront in the US West (N. California) region

Question 5

The Developer Team has deployed a new application using Amazon Aurora DB cluster. This cluster has a primary instance and five Aurora Replicas. While testing this application, it was observed that the primary instance is getting overutilized with the read requests. Before going to production, the Project Manager wants you to analyze the issue and suggest changes.

Which design changes can a solution architect propose to the application?

A. Point application to the custom endpoint of the Amazon Aurora

B. Point application to cluster endpoint of the Amazon Aurora

C. Point read queries to the reader endpoint of the Amazon Aurora

D. Point application to instance endpoint of the Amazon Aurora

Question 6

A gaming company stores large size (terabytes to petabytes) of clickstream events data

into their central S3 bucket. The company wants to analyze this clickstream data to generate business insight. Amazon Redshift, hosted securely in a private subnet of a VPC, is used for all data warehouse-related and analytical solutions. Using Amazon Redshift, the company wants to explore some solutions to securely run complex analytical queries on the clickstream data stored in S3 without transforming/copying or loading the data in the Redshift.

As a Solutions Architect, which of the following AWS services would you recommend for this requirement, knowing that security and cost are two major priorities for the company?

A. Create a VPC endpoint to establish a secure connection between Amazon Redshift and the S3 central bucket and use Amazon Athena to run the query

B. Use NAT Gateway to connect Amazon Redshift to the internet and access the S3 static website. Use Amazon Redshift Spectrum to run the query

C. Create a VPC endpoint to establish a secure connection between Amazon Redshift and the S3 central bucket and use Amazon Redshift Spectrum to run the query

D. Create Site-to-Site VPN to set up a secure connection between Amazon Redshift and the S3 central bucket and use Amazon Redshift Spectrum to run the query

Question 7

The drug research team in a Pharmaceutical company produces highly sensitive data and stores them in Amazon S3. The team wants to ensure top-notch security for their data while it is stored in Amazon S3. To have better control of the security, the team wants to use their own encryption key but doesn’t want to maintain any code to perform data encryption and decryption. Also, the team wants to be responsible for storing the Secret key.

As a Solutions Architect, which of the following encryption types will suit the above requirement?

A. Server-side encryption with customer-provided encryption keys (SSE-C)

B. Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3)

C. Server-Side Encryption with KMS keys Stored in AWS Key Management Service (SSE-KMS)

D. Protect the data using Client-Side Encryption

Question 8

An online retail company stores a large number of customer data (terabytes to petabytes) into Amazon S3.The company wants to drive some business insight out of this data. They plan to securely run SQL-based complex analytical queries on the S3 data directly and process it to generate business insights and build a data visualization dashboard for the business and management review and decision-making.

You are hired as a Solutions Architect to provide a cost-effective and quick solution to this. Which of the following AWS services would you recommend?

A. Use Amazon Redshift Spectrum to run SQL-based queries on the data stored in Amazon S3 and then process it to Amazon Kinesis Data Analytics for creating a dashboard

B. Use Amazon Redshift to run SQL-based queries on the data stored in Amazon S3 and then process it on a custom web-based dashboard for data visualization

C. Use Amazon EMR to run SQL-based queries on the data stored in Amazon S3 and then process it to Amazon Quicksight for data visualization

D. Use Amazon Athena to run SQL-based queries on the data stored in Amazon S3 and then process it to Amazon Quicksight for dashboard view

Question 9

An organization has archived all their data to Amazon S3 Glacier for a long term. However, the organization needs to retrieve some portion of the archived data regularly. This retrieval process is quite random and incurs a good amount of cost for the organization. As expense is the top priority, the organization wants to set a data retrieval policy to avoid any data retrieval charges.

Which one of the following retrieval policies suits this in the best way?

A. No Retrieval Limit

B. Free Tier Only

C. Max Retrieval Rate

D. Standard Retrieval

Question 10

A gaming company planned to launch their new gaming application that will be in both web and mobile platforms. The company considers using GraphQL API to securely query or update data through a single endpoint from multiple databases, microservices, and several other API endpoints. They also want some portions of the data to be updated and accessed in real-time.

The customer prefers to build this new application mostly on serverless components of AWS.

As a Solutions Architect, which of the following AWS services would you recommend the customer to develop their GraphQL API?

A. Kinesis Data Firehose

B. Amazon Neptune

C. Amazon API Gateway

D. AWS AppSync

Question 11

A weather forecasting company comes up with the requirement of building a high-performance, highly parallel POSIX-compliant file system that stores data across multiple network file systems to serve thousands of simultaneous clients, driving millions of IOPS (Input/Output Operations per Second) with sub-millisecond latency. The company needs a cost-optimized file system storage for short-term, processing-heavy workloads that can provide burst throughput to meet this requirement.

What type of file systems storage will suit the company in the best way?

A. FSx for Lustre with Deployment Type as Scratch File System

B. FSx for Lustre with Deployment Type as Persistent file systems

C. Amazon Elastic File System (Amazon EFS)

D. Amazon FSx for Windows File Server

Question 12

saa-c03-exam-practice-questions-part-3

Which of the following statements is correct for the route table of the VPC created with the primary CIDR of 20.0.0.0/16?

A. VPC peering connection route for VPC with a 30.0.0.0/20 IP range.

B. VPN connection route for the remote network with a 30.0.0.0/20 IP range.

C. Direct Connect connection route for the remote network with a 30.0.0.0/20 IP range.

D. Secondary IP CIDR range 30.0.0.0/20 for VPC with the local route

Question 13

To comply with industry regulations, a Healthcare organization wants to keep their large volume of lab records in some durable, secure, lowest-cost AWS storage for a long period of time (say about five years). The data will be rarely accessed once per quarter but requires immediate retrieval (in milliseconds). You are a Solutions Architect in the organization and the organization wants your suggestion to select a suitable storage class here. Which of the following would you recommend for the given requirement?

A. S3 Glacier Flexible Retrieval

B. S3 Glacier Deep Archive

C. S3 Glacier Instant Retrieval

D. S3 Standard-Infrequent Access

Question 14

An online retail company recently tied up with an external audit firm.

The retail company maintains all logs and saves them to an Amazon S3 bucket and the bucket access is restricted by Service Control Policy (SCP) for all other accounts of the company except the Admin account. The audit firm maintains all their audit related application and services in their own AWS account, and needs immediate access to retail company’s S3 bucket to kick off their audit.

You are a solution architect and part of the admin team of the retail company, how should you enable the bucket access for the external audit team in the most secure manner, with no operational and management overload, and easy to deploy?

A. Create a common IAM user in the retail company’s AWS account and attach it to the IAM Role that has AmazonS3FullAccess. Share the IAM user details with the audit team

B. Allow access to the audit firm in IAM Policy, Service Control Policy (SCP), and Amazon S3 Bucket Policy in the retail company’s AWS account

C. Allow S3 access to the audit firm in the retail company’s SCP, just like the Admin account

D. Add a bucket policy on the S3 bucket granting access to the aws account of the audit firm. Add HTTPS-only calls using “aws:SecureTransport” in the bucket policy

Question 15

A customer is looking for file storage in AWS that supports Network File System version 4 (NFSv4.1 and NFSv4.0) protocol. They want a simple, serverless, set-and-forget service that can grow and shrink automatically as they add and remove files. Accessibility of these files is going to be random and infrequent. The customer is also looking for an option to save cost by transitioning the files that have not been accessed for quite some time automatically to a low-cost storage tier. As a Solution Architect, which storage service will you choose that fits the customer’s requirement perfectly?

A. Use Amazon S3 for storage as it is for better cost-saving option

B. Use Amazon S3 Glacier for the storage

C. Use Amazon Elastic File System (EFS) with lifecycle policy

D. Amazon FSx for Lustre

Question 16

Your organization had setup a VPC with CIDR range 10.10.0.0/16. There are total 100 subnets within the VPC and are being actively used by multiple application teams. An application team who is using 50 EC2 instances in subnet 10.10.55.0/24 complains there are intermittent outgoing network connection failures for around 30 random EC2 instances in a given day. How would you troubleshoot issue with minimal configuration and minimal logs written?

A. Create a flow log for the VPC and filter the logs in CloudWatch log group.

B. Create flow log for each EC2 instance network interface one by one and troubleshoot the connection issue.

C. Create a flow log for subnet 10.10.55.0/24.

D. None of the above.

Question 17

The CIO of a Start-up company is very much concerned with the performance of their DevOps team as they take a long time to detect and investigate issues using AWS resources. Sometimes this leads to a revenue loss for the company. In addition to this, the same team had several compliance issues in a recent security audit as the audit team found secure information like application configurations, custom environment variables, product keys, credentials, and sensitive AMI IDs being mentioned directly in the code.

The company has hired you as a Solution Architect, and the CIO instructed you to resolve all the challenges faced by the DevOps team on priority and get them back to their efficiency.

He has also emphasized implementing a cost-effective solution for storing secure information that does not need automated secret rotation.

What would you do to achieve the requirement? (Select TWO)

A. For quick failure analysis and investigation, use AWS Systems Manager Application Manager

B. For quick failure analysis and investigation, use AWS AppSync

C. Resolve the compliance issue by storing all the secrets in AWS Secrets Manager and changing the code to access the secrets from there

D. Resolve the compliance issue by storing all the secrets in AWS Systems Manager Parameter Store and changing the code to access the secrets from there

E. Resolve the compliance issue by storing all the secrets in a private Amazon S3 bucket. Then create a Gateway VPN Endpoint to access the secret from the bucket securely

Question 18

An organization in the banking sector has got their AWS resources distributed in multiple Availability Zones (AZ) in a region. They share one NAT gateway to connect to all their RDS instances placed in Private Subnet in different AZs to the internet. While trying to perform some Database related operations, the employee of the organization reported intermittent connectivity issues. However, on checking the logs in AWS, they found that the RDS instances were all up and running during the time when the issue was reported.

You are hired as a Solution Architect to identify the root cause of this connectivity issue and remediate it without compromising security and resiliency. How would you approach this?

A. The customer experiences a connectivity issue when the NAT gateway’s Availability Zone goes down. To remediate this, create a NAT gateway in each Availability Zone and configure your routing to ensure that resources use the NAT gateway in the same Availability Zone

B. The customer experiences a connectivity issue due to insufficient IAM Policy and Roles. Resolve this by adding the required permissions in the IAM Policy and attach them to the role used for the AWS resources

C. The customer experiences a connectivity issue due to low bandwidth in their network. Ask the customer to sign up for a higher bandwidth plan with the network provider/operator

D. The customer experiences the connectivity issue when the NAT gateway’s Availability Zone goes down. To remediate this, remove the NAT gateway and use VPC Peering to connect to the Multi-AZ RDS instances

Question 19

An online advertising company wants to build a solution in AWS that will understand the interest of the customer and provide relevant and personalized recommendations of new products to them. The company is looking for a self-managed, highly durable, and available Database engine that stores relationships between information such as customer’s interests, community networks, friend circle, likes, purchase history, etc., and quickly maps them to identify the pattern.

As a Solution Architect in the company, what would be your recommendations for the database here?

A. Amazon DocumentDB

B. Amazon DynamoDB

C. Amazon Aurora

D. Amazon Neptune

Question 20

In response to the high demand and increase in load, a customer plans to migrate his on-premises and native MongoDB to AWS Cloud. The customer is looking for a compatible Database solution in AWS for easy and fast migration with minimum operation and management overhead. The new database should also be compatible with existing MongoDB so that the applications don’t require code changes.

As a Solution Architect in the company, what would be your suggestion for this scenario?

A. Amazon DocumentDB

B. Amazon DynamoDB

C. Amazon Keyspaces

D. Amazon Neptune

Question 21

You are an engineer in charge of the FinOps department of your organization. The multi-account strategy has been created using AWS Control Tower as part of the best practices and recommendations. You want to ensure that all accounts under the ‘OU=development’ of the AWS Organizations should not create resources outside of Ireland (eu-west-1). How can you make sure that the required condition is applied using the below Policy Statement?

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "IrelandDeny",
      "Effect": "Deny",
      "Action": [
        "*"
      ],
      "Resource": "*",
      "Condition": {
        "StringNotEquals": {
          "aws:RequestedRegion": [
            "eu-west-1"
          ]
        }
      }
    }
  ]
}

A. Add the Policy Statement to a Permissions Boundary to the developer IAM role

B. Add the Policy Statement to the SCP (Service control policy) and attach it to the Organizational Unit OU=development

C. Add the Policy Statement to the SCP (Service control policy) and attach it to the Organizational Unit OU=root

D. Add the Policy Statement as a managed policy for the role

Question 22

You are working in a multimedia company and want to transfer a massive amount of data to Amazon S3. You have heard that SnowBall Edge could be the right tool for this purpose. When you are trying to transfer data using the AWS CLI, one of our biggest files of 12TB, you get an error with the client validating this transfer. What could be the main cause of the error?

A. The maximum file size that could be transferred using the AWS CLI is 150GB

B. The maximum file size that could be transferred using the AWS CLI is 5TB

C. The role that you are using to transfer files can’t transfer more than 5TB

D. Amazon S3 support files larger than 10TB

Question 23

You are a Research Scientist working on NLP (Natural Language Processing) models. You are planning to use Amazon Comprehend to do some research about multiple texts that are currently stored in your email, but you have some ownership concerns about this service. Who would retain the ownership of the content of the emails that you will analyze using Amazon Comprehend?

A. Customer

B. AWS

C. A third-party company that is in charge of managing the Amazon Comprehend service

D. Both, AWS and the Customer

Question 24

You are a DevOps Engineer specializing in Containers. You want to run your container workloads running in a Linux environment in your current Data Center for regulations with easy management of your Docker tasks using the AWS Console. You have heard about Amazon ECS Anywhere, and you would like to explore it deeply. What are the main components you should have in your current Linux Servers in an ECS Cluster?

A. AWS Systems Manager Agent, Amazon ECS container agent, and Docker must be installed on these Linux Servers

B. AWS Systems Manager Agent Docker must be installed as part of the process

C. Amazon ECS container agent and Docker must be installed on these external instances

D. The Amazon CloudWatch Agent, Amazon ECS container agent, and Docker must be installed on these external instances

Question 25

You are a DevOps Engineer for a company specializing in Container technology. You are currently running your container workloads nodes in your bare metal nodes due to regulatory compliance rules. You would like to continue running your workloads on hardware (bare metal) without any virtualization, but want to use an AWS-managed service for managing multiple clusters of nodes. What is the best solution to integrate your container workloads from your data Center using a Kubernetes ecosystem?

A. Use Amazon ECS Anywhere

B. Move all your workloads from your current Data Center to Amazon EKS

C. Deploy an Amazon EKS Anywhere technology on bare metal nodes

D. Create a VMware vSphere cluster and integrate it with Amazon EKS Anywhere

Question 26

A manufacturing company operates a network of factories globally and wants to modernize its application infrastructure by containerizing its legacy applications. However, due to regulatory requirements, some of these applications must remain on-premises. Additionally, the company aims to convert their existing on-premises instances into managed instances to simplify operations. Which AWS service would be most suitable for deploying and managing containerized applications in both on-premises and cloud environments?

A. Use Amazon Elastic Kubernetes Service (Amazon EKS) and deploy AWS Systems Manager agent onto operating systems managed by the customer, effectively transitioning the operating systems into managed instances

B. Use Amazon ECS Anywhere and deploy AWS Systems Manager agent onto operating systems managed by the customer, effectively transitioning the operating systems into managed instances

C. Use Amazon Elastic Container Registry and install docker onto operating systems managed by the customer effectively transitioning the operating systems into managed instances

D. Use Amazon EKS Distro and install docker onto operating systems managed by the customer effectively transitioning the operating systems into managed instances

Question 27

You are the owner of a Microservices application that has a poor latency when it runs into the ECS cluster. Which AWS services could help you analyze the root cause by tracing different calls into the application?

A. Amazon CloudWatch

B. AWS X-Ray

C. Amazon Event Bridge

D. Amazon CloudTrail

Question 28

A company is exploring options to modernize its infrastructure and manage Kubernetes clusters across its on-premises data center and AWS cloud environment. The company seeks a solution that provides consistent operational experience, ease of management, and seamless integration with AWS services. Which of the following options would best fulfill the company’s requirements?

A. Leveraging Amazon ECS Anywhere to manage containerized applications across both on-premises and AWS cloud environments

B. Utilizing Amazon EKS (Elastic Kubernetes Service) to manage Kubernetes clusters exclusively within the AWS cloud environment

C. Adopting Amazon EKS Anywhere to deploy and manage Kubernetes clusters both on-premises and in the AWS cloud environment

D. Deploying Kubernetes clusters on-premises using the EKS Distro and managing AWS resources with AWS CloudFormation

Question 29

You are a Cloud Database Administrator and want to enable IAM authentication on your Aurora Databases for the user ‘iam_db_user’. Which of the following is the correct method to enable the IAM authentication in your Aurora MySQL Database using AWSAuthenticationPlugin?

A. CREATE USER iam_db_user IDENTIFIED WITH AWSAuthenticationPlugin;

B. CREATE USER iam_db_user_plugin;

C. Rename IAM iam_db_user as a Database user

D. CREATE USER iam_db_user IDENTIFIED WITH AWSAuthenticationPlugin AS ‘RDS’;

Question 30

You are using AWS DataSync to migrate more than 8TB from on-prem to Amazon S3. After the first DataSync task runs, you notice that some files were not copied. After reviewing the CloudWatch logs, you noticed that the files were skipped. What could be the main cause? (Select TWO)

A. The source file was locked and couldn’t be opened by AWS DataSync

B. The source file was opened and modified while it was transferred

C. The source file’s owner has been changed after it was transferred during the VERIFYING phase

D. The source file’s permissions are changed after it was transferred and couldn’t be read during the VERIFYING phase

Question 31

A transportation company operates a fleet of delivery trucks equipped with on-board cameras to monitor road conditions and driver behavior. They need a solution to stream and analyze video data in real-time to ensure driver safety and optimize route efficiency. Which AWS service would be most suitable for their use case?

A. AWS IoT Core

B. Amazon Kinesis Video Streams

C. Amazon Kinesis Data Streams

D. Amazon Elastic Transcoder

Question 32

You are working in a start-up company, and you need to save the cost of Amazon EC2, AWS Fargate, and AWS Lambda. You are looking for a flexible pricing model. For example, you will be charged at a lower rate if you commit to $10/hour of compute usage. Which AWS service can achieve this requirement?

A. AWS Savings Plan

B. AWS Reserved Instance.

C. AWS Dedicated Host.

D. AWS Spot Instance

Question 33

You are a solutions architect working for a data analytics company that delivers analytics data to politicians that need the data to manage their campaigns. Political campaigns use your company’s analytics data to decide on where to spend their campaign money to get the best results for the efforts. Your political campaign users access your analytics data through an Angular SPA via API Gateway REST endpoints. You need to manage the access and use of your analytics platform to ensure that the individual campaign data is separate. Specifically, you need to produce logs of all user requests and responses to those requests, including request payloads, response payloads, and error traces. Which type of AWS logging service should you use to achieve your goals?

A. Use CloudWatch access logging

B. Use CloudWatch execution logging

C. Use CloudTrail logging

D. Use CloudTrail execution logging

Question 34

You are a solutions architect working for a media company that produces stock images and videos for sale via a mobile app and website. Your app and website allow users to gain access only to stock content they have purchased. Your content is stored in S3 buckets. You need to restrict access to multiple files that your users have purchased. Also, due to the nature of the stock content ( purchasable by multiple users), you don’t want to change the URLs of each stock item.

Which access control option best fits your scenario?

A. Use CloudFront signed URLs

B. Use S3 Presigned URLs

C. Use CloudFront Signed Cookies

D. Use S3 Signed Cookies

Question 35

You are a solutions architect working for a financial services firm that operates applications in a hybrid cloud model. Your applications are running on EC2 instances in your VPC, which communicate with resources in your on-premises data center. You have a workload on an EC2 network interface in one subnet and a transit gateway association in a different subnet, and these two subnets are associated with different Network Access Control Lists (NACLs) rules.

Given this setup, which of the following statements is true regarding the NACL rules for traffic from your EC2 instances to the transit gateway?

A. Outbound rules use the source IP address to evaluate traffic from the instances to the transit gateway

B. Outbound rules use the destination IP address to evaluate traffic from the instances to the transit gateway

C. Outbound rules are not evaluated for the transit gateway subnet

D. Inbound rules use the destination IP address to evaluate traffic from the transit gateway to the instances

Question 36

A start-up firm has created account A using the Amazon RDS DB instance as a database for a web application. The operations team regularly creates manual snapshots for this DB instance in unencrypted format. The Projects Team plans to create a DB instance in other accounts using these snapshots. They are looking for your suggestion for sharing this snapshot and restoring it to DB instances in other accounts. While sharing this snapshot, it must allow only specific accounts specified by the project teams to restore DB instances from the snapshot.

What actions can be initiated for this purpose?

A. From Account A, share the manual snapshot by setting the ‘DB snapshot’ visibility option as private. In other Accounts, directly restore to DB instances from the snapshot

B. From Account A, share the manual snapshot by setting the ‘DB snapshot’ visibility option as public. In other Accounts, directly restore to DB instances from the snapshot

C. From Account A, share the manual snapshot by setting the ‘DB snapshot’ visibility option as private. In other Accounts, create a copy from the snapshot and then restore it to the DB instance from that copy

D. From Account A, share the manual snapshot by setting the ‘DB snapshot’ visibility option as public. In other Accounts, create a copy from the snapshot and then restore it to the DB instance from that copy

Question 37

An electronic manufacturing company plans to deploy a web application using the Amazon Aurora database. The Management is concerned about the disk failures with DB instances and needs your advice for increasing reliability using Amazon Aurora automatic features. In the event of disk failures, data loss should be avoided, reducing additional work to perform from the point-in-time restoration.

What design suggestions can be provided to increase reliability?

A. Add Aurora Replicas to primary DB instances by placing them in different regions. Aurora’s crash recovery feature will avoid data loss post disk failure

B. Add Aurora Replicas to primary DB instances by placing them in different availability zones. Aurora storage auto-repair feature will avoid data loss post disk failure

C. Add Aurora Replicas to the primary DB instance by placing them in different regions. Aurora Survivable page cache feature will avoid data loss post disk failure

D. Add Aurora Replicas to the primary DB instance by placing them in different availability zones. Aurora’s crash recovery feature will avoid data loss post disk failure

Question 38

A financial institute has deployed a critical web application in the AWS cloud. The management team is looking for a resilient solution with RTO/RPO in 20 minutes during a disaster. They have budget concerns, and the cost of provisioning the backup infrastructure should not be very high. As a solution architect, you have been assigned to work on setting a resilient solution meeting the RTO/RPO requirements within the cost constraints.

Which strategy is suited perfectly?

A. Multi-Site Active/Active

B. Warm Standby

C. Backup & Restore

D. Pilot Light

Question 39

A critical application deployed in AWS Cloud requires maximum availability to avoid any outages. The project team has already deployed all resources in multiple regions with redundancy at all levels. They are concerned about the configuration of Amazon Route 53 for this application which should complement higher availability and reliability. Route 53 should be configured to use failover resources during a disaster.

What solution can be implemented with Amazon Route 53 for maximum availability and increased reliability?

A. Associate multiple IP endpoints in different regions to Route 53 hostname. Use a weighted route policy to change the weights of the primary and failover resources. So, all traffic is diverted to failover resources during a disaster

B. Create two sets of public-hosted zones for resources in multiple regions. During a disaster, update Route 53 public-hosted zone records to point to a healthy endpoint

C. Create two sets of private hosted zones for resources in multiple regions. During a disaster, update Route 53 private hosted zone records to point to a healthy endpoint

D. Associate multiple IP endpoints in different regions to Route 53 hostname. Using health checks, configure Route 53 to automatically failover to healthy endpoints during a disaster

Question 40

An IT company is using EBS volumes for storing projects related work. Some of these projects are already closed. The data for these projects should be stored long-term as per regulatory guidelines and will be rarely accessed. The operations team is looking for options to store the snapshots created from EBS volumes. The solution should be cost-effective and incur the least admin work.

What solution can be designed for storing data from EBS volumes?

A. Create EBS Snapshots from the volumes and store them in the EBS Snapshots Archive

B. Use Lambda functions to store incremental EBS snapshots to AWS S3 Glacier

C. Create EBS Snapshots from the volumes and store them in a third-party low-cost, long-term storage

D. Create EBS Snapshots from the volumes and store them in the EBS standard tier

Question 41

A company is sharing geospatial data with users in different AWS accounts for commercial purposes. Users from these accounts access a large amount of data stored in the Amazon S3 bucket in the us-east-1 region from different AWS regions. The company has incurred high charges for this data sharing belonging to transfer charges. The Finance Team is looking for an option to minimize these charges.

What solution can be designed to minimize this cost?

A. Configure Amazon CloudFront in front of the Amazon S3 bucket to share data from the nearest edge locations

B. Configure the Requester Pays option on the Amazon S3 bucket

C. Share pre-signed URLs with the users to access data from the Amazon S3 bucket

D. Replicate data to Amazon S3 buckets in all the regions to enable users to download data from local Amazon S3 buckets

Question 42

You are tasked with designing a solution for a media company that requires live streaming and real-time analysis of video content for audience engagement and quality monitoring. Which AWS service would you recommend for securely ingest, process, and analyze video streams from various sources, including mobile devices and webcams?

A. Deploy Amazon Kinesis Video Streams for securely ingesting, processing, and analyzing live video streams at scale

B. Use Amazon Kinesis Firehose to load streaming data into AWS for near real-time analytics and securely deliver it to various destinations, suitable for video streams

C. Utilize AWS IoT Greengrass to securely ingest video streams from various sources at the edge of the network with reduced latency

D. Implement Amazon Kinesis Data Streams for a scalable and durable platform of streaming video streams

Question 43

An IT firm is planning to store all its critical project-related documents in an Amazon S3 bucket. All these files should be encrypted at rest. As per security guidelines, firms need to manage the encryption process internally, but keys used for the encryption should not be stored locally.

How can encryption solutions be designed to meet the data encryption guidelines?

A. Use a key stored within the application for client-side encryption while uploading/downloading data from the Amazon S3 bucket

B. Use an AWS KMS key for client-side encryption while uploading/downloading data from the Amazon S3 bucket

C. Use a customer-provided key for client-side encryption while uploading/downloading data from the Amazon S3 bucket

D. Use an Amazon S3 bucket key for client-side encryption while uploading/downloading data from the Amazon S3 bucket

Question 44

A company has recently installed multiple software applications on an Amazon EC2 instance for its new web application. Recently, an incident caused a major outage for this web application, and the root cause was identified as network ports being unintentionally open and subsequently exploited. The Security Team is seeking a detailed report on the Amazon EC2 instance that gathers information on all network ports that are open unintentionally and not in use for any service. The solution should provide a list to help remediate these findings based on their criticality.

Which of the following approaches can be initiated to obtain the required reports?

A. Implement Amazon Inspector on the Amazon EC2 instance

B. Implement Amazon GuardDuty on the Amazon EC2 instance

C. Implement Amazon Detective on Amazon EC2 instance

D. Implement AWS Artifact on Amazon EC2 instance

Question 45

In your AWS account, you have configured three Application Load Balancers to route the traffic, and each ALB has its own target group. As the traffic keeps growing, the cost of the Elastic Load Balancers increases as well. Which method would you take to reduce the load balancer cost?

A. Configure the Application Load Balancers as the spot ones.

B. Use one ALB instead of three. Attach all three target groups in the ALB.

C. Move the Application Load Balancers to the US East (N.Virginia) region.

D. Install an ACM certificate in each Application Load Balancer.

Question 46

An engineering firm uses Amazon CloudTrail to record user activities across multiple accounts. Log files for this CloudTrail are stored in the Amazon S3 bucket in the us-east-1 region. Keys used for encrypting these logs should be managed by the Security team in this firm. Only specific users in the team should have permission to use this key for encrypting and decrypting log files. You have been assigned to work on this solution to suggest an efficient solution for additional security to log files from multiple accounts.

Which of the following solutions can you propose?

A. Use Server-side encryption with Amazon S3-managed encryption keys (SSE-S3) for CloudTrail log files. Use different keys for encrypting and decrypting log files for multiple accounts across different regions

B. Use Server-side encryption with AWS KMS-managed keys (SSE-KMS) for CloudTrail log files. Create a KMS key in the same region as the S3 bucket storing the log files. Use the same key for encrypting and decrypting log files for multiple accounts across different regions

C. Use Server-side encryption with Amazon S3-managed encryption keys (SSE-S3) for CloudTrail log files. Use the same keys for encrypting and decrypting log files for multiple accounts across different regions

D. Use Server-side encryption with AWS KMS-managed keys (SSE-KMS) for CloudTrail log files. Create a KMS key in a different region than the S3 bucket storing the log files. Use the different keys for encrypting and decrypting log files for multiple accounts across different regions

Question 47

An online educational platform is developing a web application that will serve millions of students accessing educational content. The platform plans to use Amazon EC2 instances for compute services and requires a high-performance shared storage solution that can handle parallel access. The storage system should support a high throughput of up to 21 GB/s for each user session accessing the file system.

Which file system can be selected to meet performance requirements?

A. FSx for NetApp ONTAP

B. FSx for Lustre

C. FSx for Windows File Server

D. FSx for OpenZFS

Question 48

A web application is hosted in AWS EC2 and serves global customers. As the application is getting more and more popular, the data transfer cost keeps increasing. You plan to use AWS CloudFront to improve the latency and reduce the cost. Which of the following services is free for CloudFront?

A. Data transfer out to the Internet from edge locations.

B. Data transfer out of Amazon CloudFront to the origin server.

C. Data transfer from origin to CloudFront edge locations (Amazon CloudFront “origin fetches”).

D. Custom SSL certificate associated with the CloudFront distribution using the Dedicated IP version of custom SSL certificate support.

Question 49

A large manufacturing company is looking to track IoT sensor data collected from thousands of equipment across multiple factory units. This is extremely high-volume traffic that needs to be collected in real time and should be efficiently visualized. The company is looking for a suitable database in the AWS cloud for storing these sensor data.

Which of the following cost-effective databases can be selected for this purpose?

A. Send sensor data to Amazon RDS (Relational Database Service) using Amazon Kinesis and visualize data using Amazon QuickSight

B. Send sensor data to Amazon Neptune using Amazon Kinesis and visualize data using Amazon QuickSight

C. Send sensor data to Amazon DynamoDB using Amazon Kinesis and visualize data using Amazon QuickSight

D. Send sensor data to Amazon Timestream using Amazon Kinesis and visualize data using Amazon QuickSight

Question 50

A start-up firm is using a JSON-based database for content management. They are planning to rehost this database to AWS Cloud from on-premises. For this, they are looking for a suitable option to deploy this database, which can handle millions of requests per second with low latency. Databases should have a flexible schema that can store any type of user data from multiple sources and should effectively process similar data stored in different formats.

Which of the following databases can be selected to meet the requirements?

A. Use Amazon DocumentDB (with MongoDB compatibility) in the AWS cloud to rehost the database from an on-premises location

B. Use Amazon Neptune in the AWS cloud to rehost the database from an on-premises location

C. Use Amazon Timestream in AWS cloud to rehost database from an on-premises location

D. Use Amazon Keyspaces in AWS cloud to rehost database from an on-premises location

Question 51

James attempts to launch a t2.micro EC2 instance using the AmazonEC2FullAccess policy. He selects the Amazon Linux 2 AMI and chooses not to associate a key pair. For the root volume, he configures an 8 GB General Purpose (gp2) EBS volume and manually encrypts it using a specific KMS key. After reviewing the configurations, he proceeds to launch the instance.

However, the instance transitions from “Pending” to “Shutting Down” and then to “Terminated” without reaching the “Running” state. The error message indicates: Client.InternalError: Client error on launch.

What is the most likely cause of this issue, and how can it be resolved?

A. The EBS Volume is encrypted with a KMS key which James has no permission for decryption. The admin should give him permission to access KMS Key

B. The mentioned policy applies to only certain instance types. James should try launching the EC2 instance with another type than t2.micro

C. James has created the instance without a key pair. He should launch the instance again by using a key pair

D. The EBS Volume limits in his account have been exceeded. He needs to submit a request to AWS to increase the limit

Question 52

You are designing an architecture for one of your client’s applications. You created a VPC within the us-east-1 region consisting of two public subnets and a private subnet. The first public subnet contains a web server. All the other VPC Networking components are also set including Internet gateway, route tables, security groups, etc. Your team lead reviewed the architecture and informed you about the client’s requirement to make the current architecture highly available with MINIMAL COST. He also specified that the client could accept a minor downtime, but the cost is the priority here.

Which options can make your current architecture highly available with minimum effort and costs?

A. Span the architecture components to a second Availability zone by creating similar resources in it as AZ-1 and then distributing the traffic using an application load balancer

B. Create a standby instance in the second public subnet. Attach a secondary ENI to the instance in the first public subnet. In case of a failure, detach this ENI and attach it to the standby instance

C. Span the architecture components to a second region by creating similar resources in it as available in US-East-1 and then distributing the traffic using an application load balancer

D. Implement dynamic scaling in this architecture by using Cloudwatch, Elastic Load Balancing, and Auto Scaling together. This solution will bring automated scaling and high availability with zero downtime

Question 53

You have launched an EC2 instance with a General Purpose EBS Volume of 16384 GB as its root volume ( /dev/xvda). After working on it for some time, you observed the need to have more storage with this instance. You found a volume (/dev/xvdf1) available in your account. Therefore this volume is attached as an additional volume with your EC2 instance.

One of your teammates informed you that this volume (/dev/xvdf1) was created from the snapshot of the root volume of another instance. Later on, upon rebooting the instance, you connect to it and observe that the instance has booted from /dev/xvdf1, whereas it was supposed to boot from /dev/xvda (original root volume). What should you do now to resolve the problem and let the instance boot from the correct volume?

A. Keep the additional volume in an Availability zone other than the one where the EC2 instance and its root volume reside, then attach it to the EC2 instance

B. Change the label of the additional volume using the e2label command

C. Unmount the additional volume and add more storage capacity to the existing General Purpose volume only

D. Change the label of the additional volume using the e2changelabel command

Question 54

You are working as a solutions architect in an E-Commerce based company with users from around the globe. There was feedback coming from various users of different countries to have the website content in their local languages. So, the company has now translated the website into multiple languages and is rolling out the feature soon for its users.

Now you need to send the traffic based on the location of the user. For example, if a request comes from Japan, it should be routed to the server in the ap-northeast-1 (Tokyo) region where the application is in the Japanese language. You can do so by specifying the IP address of that particular server while configuring the records in Route 53. Which one of the following routing policies should you use in Amazon Route 53 that will fulfill the given requirement?

A. Weighted Routing Policy

B. Geoproximity Routing Policy

C. Geolocation Routing Policy

D. Multivalue Answer Routing Policy

Question 55

You are working as a solutions architect in a team who is handling the infrastructure provisioning, scaling, load balancing and monitoring, etc for a workload. This workload is hosted on a fleet of Linux servers on-premises. You have been assigned a task to capture the application logs, percentage of total disk space that is used, the amount of memory currently in use, and the percentage of time that the CPU is idle from the Linux servers.

Using this data, your team is going to build an operational dashboard. This dashboard will help set high-resolution alarms to alert and take automated actions and understand the service and application health easily. Which one of the following options is the best solution to satisfy this requirement?

A. Use Amazon Cloudtrail standard metrics and logs to collect the required metrics and application logs

B. Use Amazon Cloudtrail unified agent to collect the required metrics and application logs

C. Use Amazon Cloudwatch Standard metrics and logs to collect the required metrics and application logs

D. Use Amazon Cloudwatch unified agent to collect the required metrics and application logs

Question 56

You are an IAM User in Account A and have created a Lambda function. One of the members of the Testing team, who is an IAM User in Account B, needs to perform some test cases and keep the code in his local system for record purposes. For the same, he needs to invoke your Lambda function in his account and should be able to download the code as well. Also, you need to make sure that the User of Account B can still perform his normal operations along with this lambda invocation requirement. Which options will allow User B to perform the required actions in his account with minimal effort?

A. Use a Resource-based policy with your lambda function and grant permissions using lambda:*

B. Create an IAM Role in Account A so that User B can assume this role and perform the required actions

C. Use a Resource-based policy with your lambda function and grant permissions using lambda: InvokeFunction and lambda:GetFunction

D. Create an IAM User for User B in Account A so that he can log in and perform the required actions

Question 57

You have designed an architecture for a highly available web application with a dynamic workload. This architecture consists of a set of EC2 instances managed by an Auto Scaling Group and a load balancer for the even distribution of traffic. Your manager has reviewed the functioning of this architecture and is concerned about the latency of the scaling out process. Whenever there is a need to scale out, it takes a few seconds to a few minutes for Auto Scaling to launch the instance, register it with the load balancer, and start serving the requests. The Manager has asked you to look for a way to reduce this latency so that instances can start serving the requests as quickly as possible. Which of the following options can satisfy the given requirement?

A. Use Warm Pool with Auto Scaling

B. Use the Desired capacity parameter to scale out quickly

C. Use Lifecycle hooks with Auto Scaling

D. Use the Scheduled scaling type to scale out quickly

Question 58

Your application is deployed in EC2 instances and uses CloudFront to deliver the content. In order to reduce the cost of requests to the origin, you plan to increase the cache duration in CloudFront for certain dynamic contents. Which of the following options is the most appropriate to achieve the requirement?

A. Modify the application to add a Cache-Control header to control how long the objects stay in the CloudFront cache.

B. In the CloudFront distribution, enlarge the default TTL in the object caching setting

C. Specify the minimum TTL to be 0 in the CloudFront object caching setting.

D. Add a Cache-Control header by configuring the metadata of the S3 objects

Question 59

You use CloudFormation to create an Auto Scaling group for a web application. The application needs to be deployed in both non-production and production AWS accounts. You want to use Spot Instances in the non-production environment to save costs. Which of the following methods would you choose?

A. In the CloudFormation template, use a variable to set the OnDemandPercentageAboveBaseCapacity property. Set the variable to be 100 in non-production and 0 in production.

B. In the CloudFormation template, use a parameter to set the OnDemandPercentageAboveBaseCapacity property. Set the parameter to be 0 in non-production and 100 in production.

C. In the CloudFormation template, use a parameter for the SpotMaxPrice property. Set the parameter to be 100 in non-production and 0 in production.

D. . In the CloudFormation template, use a parameter for the SpotMaxPrice property. Set the parameter to be 0.5 in non-production and the On-Demand price in production.

Question 60

You have built a serverless architecture composed of Lambda Functions exposed through API Gateway for one of your client’s applications. For the database layer, you have used DynamoDB. Your team lead has reviewed the architecture and is concerned about the cost of numerous API Calls being made to the backend (Lambda Functions) for so many similar requests. Also, the client is concerned about providing as low latency as possible for the application users’ requests. You have to look for a solution where the latency and overall cost can be reduced for the current architecture without much effort.

A. Cache the computed request’s responses using the CloudFront CDN caching

B. Use the API Gateway QuickResponse feature to reduce the latency and number of calls to the backend

C. Enable API Gateway Caching to cache the computed request’s responses

D. Adjust API Gateway Throttling settings to reduce the latency and number of calls to the backend

Question 61

You have designed a gaming application with game servers hosted on EC2 Instances. For the leaderboards, you have used a DynamoDB table named Scores. Your manager has instructed you to build a feature to publish a Congratulations and Rewards Message with the winner’s name on the app’s Social Media network. This message should be posted each time the HighestScore Attribute is updated in the Scores DynamoDB table. Which of the following options can satisfy the requirement in the BEST way?

A. DynamoDB Streams with AWS Lambda

B. DynamoDB Global Tables with AWS Lambda

C. DynamoDB Accelerator with AWS Lambda

D. DynamoDB Transactions with AWS Lambda

Question 62

You are working in an organization who is using a Multi-Cloud environment. They have workloads deployed and data stored in Google cloud, Microsoft Azure, and AWS Cloud as well. Your manager has informed you about the decision to migrate one of the workloads from Google Cloud to AWS. For the same, he has asked you to migrate all the data stored in Google cloud storage buckets to Amazon S3 buckets without much effort. Which of the following services can help in accomplishing this task?

A. AWS Migration Hub

B. Amazon Storage Gateway

C. AWS DataSync

D. S3 Transfer Acceleration

Question 63

Jackson handles the capacity provisioning for an E-Commerce application’s workload. A sale is starting in the coming week, and the team has predicted a huge traffic spike during the sale days. Jackson has provisioned 5 t2.large Reserved Instances for the consistent portion of the workload. As per the predictions, there will be huge spikes in traffic which will be temporary.

Jackson is looking for a way to serve this portion of the workload in the MOST cost-effective way without much effort. Note that the application is already designed to recover from any instance failures. Which of the following options satisfies the given requirement in the best way?

A. Use Savings Plans for the spiky traffic

B. Use Spot Instances for the spiky traffic

C. Use On-Demand Instances for the spiky traffic

D. Use Dedicated Hosts for the spiky traffic

Question 64

An IT Company is working on the disaster recovery strategy for one of their workloads deployed on AWS. They have begun with the recovery planning of the storage components. As of now, they have an EFS File System deployed in us-east-1 being used by hundreds of instances in this region. As a part of their recovery strategy, they also want the file system to be available in ap-south-1. For the same, they are looking for a way to bring a copy of this file system to ap-south-1 in the easiest way possible. Which of the following options can provide the BEST solution in this case?

A. Use Amazon EFS Replication to accomplish the cross-region replication

B. Bring the data in an S3 Bucket in us-east-1 and enable cross-region replication to copy the data to a bucket in ap-south-1

C. Use AWS DataSync to accomplish the cross-region replication

D. Use AWS Direct Connect to accomplish the cross-region replication

Question 65

Your organization is looking for a standalone Active Directory solution on AWS with certain features and budget constraints. The first requirement is that the users in this directory should be able to use their directory credentials to log in to AWS Management Console and manage AWS resources. Also, there’s a requirement to have daily automated snapshots. The number of users will not exceed 450. Which one of the following options can provide the required features at the lowest possible cost?

A. AWS Directory Service for Microsoft AD

B. Active Directory Connector

C. Simple Active Directory

D. Amazon Cognito