ExamGecko
Home Home / Amazon / SAA-C03

Amazon SAA-C03 Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











A company is using a fleet of Amazon EC2 instances to ingest data from on-premises data sources.

The data is in JSON format and Ingestion rates can be as high as 1 MB/s. When an EC2 instance is rebooted, the data in-flight is lost. The company's data science team wants to query Ingested data In near-real time. Which solution provides near-real -time data querying that is scalable with minimal data loss?

A.
Publish data to Amazon Kinesis Data Streams Use Kinesis data Analytics to query the data.
A.
Publish data to Amazon Kinesis Data Streams Use Kinesis data Analytics to query the data.
Answers
B.
Publish data to Amazon Kinesis Data Firehose with Amazon Redshift as the destination Use Amazon Redshift to query the data
B.
Publish data to Amazon Kinesis Data Firehose with Amazon Redshift as the destination Use Amazon Redshift to query the data
Answers
C.
Store ingested data m an EC2 Instance store Publish data to Amazon Kinesis Data Firehose with Amazon S3 as the destination. Use Amazon Athena to query the data.
C.
Store ingested data m an EC2 Instance store Publish data to Amazon Kinesis Data Firehose with Amazon S3 as the destination. Use Amazon Athena to query the data.
Answers
D.
Store ingested data m an Amazon Elastic Block Store (Amazon EBS) volume Publish data to Amazon ElastiCache tor Red Subscribe to the Redis channel to query the data
D.
Store ingested data m an Amazon Elastic Block Store (Amazon EBS) volume Publish data to Amazon ElastiCache tor Red Subscribe to the Redis channel to query the data
Answers
Suggested answer: A

Explanation:


A company recently migrated its entire IT environment to the AWS Cloud. The company discovers that users are provisioning oversized Amazon EC2 instances and modifying security group rules without using the appropriate change control process A solutions architect must devise a strategy to track and audit these inventory and configuration changes. Which actions should the solutions architect take to meet these requirements? (Select TWO )

A.
Enable AWS CloudTrail and use it for auditing
A.
Enable AWS CloudTrail and use it for auditing
Answers
B.
Use data lifecycie policies for the Amazon EC2 instances
B.
Use data lifecycie policies for the Amazon EC2 instances
Answers
C.
Enable AWS Trusted Advisor and reference the security dashboard
C.
Enable AWS Trusted Advisor and reference the security dashboard
Answers
D.
Enable AWS Config and create rules for auditing and compliance purposes
D.
Enable AWS Config and create rules for auditing and compliance purposes
Answers
E.
Restore previous resource configurations with an AWS CloudFormation template
E.
Restore previous resource configurations with an AWS CloudFormation template
Answers
Suggested answer: A, D

Explanation:

A) Enable AWS CloudTrail and use it for auditing. AWS CloudTrail provides a record of API calls and can be used to audit changes made to EC2 instances and security groups. By analyzing CloudTrail logs, the solutions architect can track who provisioned oversized instances or modified security groups without proper approval. D) Enable AWS Config and create rules for auditing and compliance purposes. AWS Config can record the configuration changes made to resources like EC2 instances and security groups. The solutions architect can create AWS Config rules to monitor for non-compliant changes, like launching certain instance types or opening security group ports without permission. AWS Config would alert on any violations of these rules.


A company's application runs on Amazon EC2 instances behind an Application Load Balancer (ALB).

The instances run in an Amazon EC2 Auto Scaling group across multiple Availability Zones. On the first day of every month at midnight. The application becomes much slower when the month-end financial calcualtion bath runs. This causes the CPU utilization of the EC2 instaces to immediately peak to 100%, which disrupts the application. What should a solution architect recommend to ensure the application is able to handle the workload and avoid downtime?

A.
Configure an Amazon CloudFront distribution in from of the ALB.
A.
Configure an Amazon CloudFront distribution in from of the ALB.
Answers
B.
Configure an EC2 Auto Scaling simple scaling policy based on CPU utilization.
B.
Configure an EC2 Auto Scaling simple scaling policy based on CPU utilization.
Answers
C.
Configure an EC2 Auto Scaling scheduled scaling policy based on the monthly schedule.
C.
Configure an EC2 Auto Scaling scheduled scaling policy based on the monthly schedule.
Answers
D.
Configure Amazon ElasticCache to remove some of the workload from tha EC2 instances.
D.
Configure Amazon ElasticCache to remove some of the workload from tha EC2 instances.
Answers
Suggested answer: C

Explanation:

Configure an EC2 Auto Scaling scheduled scaling policy based on the monthly schedule is the best option because it allows for the proactive scaling of the EC2 instances before the monthly batch run begins. This will ensure that the application is able to handle the increased workload without experiencing downtime. The scheduled scaling policy can be configured to increase the number of instances in the Auto Scaling group a few hours before the batch run and then decrease the number of instances after the batch run is complete. This will ensure that the resources are available when needed and not wasted when not needed. The most appropriate solution to handle the increased workload during the monthly batch run and avoid downtime would be to configure an EC2 Auto Scaling scheduled scaling policy based on the monthly schedule. https://docs.aws.amazon.com/autoscaling/ec2/userguide/ec2-auto-scaling-scheduled-scaling.html

s

A company stores its data objects in Amazon S3 Standard storage. A solutions architect has found that 75% of the data is rarely accessed after 30 days. The company needs all the data to remain immediately accessible with the same high availability and resiliency, but the company wants to minimize storage costs.

Which storage solution will meet these requirements?

A.
Move the data objects to S3 Glacier Deep Archive after 30 days.
A.
Move the data objects to S3 Glacier Deep Archive after 30 days.
Answers
B.
Move the data objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days.
B.
Move the data objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days.
Answers
C.
Move the data objects to S3 One Zone-Infrequent Access (S3 One Zone-IA) after 30 days.
C.
Move the data objects to S3 One Zone-Infrequent Access (S3 One Zone-IA) after 30 days.
Answers
D.
Move the data objects to S3 One Zone-Infrequent Access (S3 One Zone-IA) immediately.
D.
Move the data objects to S3 One Zone-Infrequent Access (S3 One Zone-IA) immediately.
Answers
Suggested answer: B

A solutions architect must secure a VPC network that hosts Amazon EC2 instances The EC2 ^stances contain highly sensitive data and tun n a private subnet According to company policy the EC2 instances mat run m the VPC can access only approved third-party software repositories on the internet for software product updates that use the third party's URL Other internet traffic must be blocked. Which solution meets these requirements?

A.
Update the route table for the private subnet to route the outbound traffic to an AWS Network Firewall. Configure domain list rule groups
A.
Update the route table for the private subnet to route the outbound traffic to an AWS Network Firewall. Configure domain list rule groups
Answers
B.
Set up an AWS WAF web ACL. Create a custom set of rules that filter traffic requests based on source and destination IP address range sets.
B.
Set up an AWS WAF web ACL. Create a custom set of rules that filter traffic requests based on source and destination IP address range sets.
Answers
C.
Implement strict inbound security group roles Configure an outbound rule that allows traffic only to the authorized software repositories on the internet by specifying the URLs
C.
Implement strict inbound security group roles Configure an outbound rule that allows traffic only to the authorized software repositories on the internet by specifying the URLs
Answers
D.
Configure an Application Load Balancer (ALB) in front of the EC2 instances. Direct an outbound traffic to the ALB Use a URL-based rule listener in the ALB's target group for outbound access to the internet
D.
Configure an Application Load Balancer (ALB) in front of the EC2 instances. Direct an outbound traffic to the ALB Use a URL-based rule listener in the ALB's target group for outbound access to the internet
Answers
Suggested answer: A

Explanation:

Send the outbound connection from EC2 to Network Firewall. In Network Firewall, createstateful outbound rules to allow certain domains for software patch download and deny allother domains. https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-examples.html#suricata-example-domain-filtering

A company has hundreds of Amazon EC2 Linux-based instances in the AWS Cloud. Systems administrators have used shared SSH keys to manage the instances After a recent audit, the company's security team is mandating the removal of all shared keys. A solutions architect must design a solution that provides secure access to the EC2 instances. Which solution will meet this requirement with the LEAST amount of administrative overhead?

A.
Use AWS Systems Manager Session Manager to connect to the EC2 instances.
A.
Use AWS Systems Manager Session Manager to connect to the EC2 instances.
Answers
B.
Use AWS Security Token Service (AWS STS) to generate one-time SSH keys on demand.
B.
Use AWS Security Token Service (AWS STS) to generate one-time SSH keys on demand.
Answers
C.
Allow shared SSH access to a set of bastion instances. Configure all other instances to allow only SSH access from the bastion instances
C.
Allow shared SSH access to a set of bastion instances. Configure all other instances to allow only SSH access from the bastion instances
Answers
D.
Use an Amazon Cognito custom authorizer to authenticate users. Invoke an AWS Lambda function to generate a temporary SSH key.
D.
Use an Amazon Cognito custom authorizer to authenticate users. Invoke an AWS Lambda function to generate a temporary SSH key.
Answers
Suggested answer: A

Explanation:

Session Manager is a fully managed AWS Systems Manager capability. With Session Manager, you can manage your Amazon Elastic Compute Cloud (Amazon EC2) instances, edge devices, on-premises servers, and virtual machines (VMs). You can use either an interactive one-click browser-based shell or the AWS Command Line Interface (AWS CLI). Session Manager provides secure and auditable node management without the need to open inbound ports, maintain bastion hosts, or manage SSH keys. Session Manager also allows you to comply with corporate policies that require controlled access to managed nodes, strict security practices, and fully auditable logs with node access details, while providing end users with simple one-click cross-platform access to your managed nodes. https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html


A company is building a data analysis platform on AWS by using AWS Lake Formation. The platform will ingest data from different sources such as Amazon S3 and Amazon RDS. The company needs a secure solution to prevent access to portions of the data that contain sensitive information.

A.
Create an IAM role that includes permissions to access Lake Formation tables.
A.
Create an IAM role that includes permissions to access Lake Formation tables.
Answers
B.
Create data filters to implement row-level security and cell-level security.
B.
Create data filters to implement row-level security and cell-level security.
Answers
C.
Create an AWS Lambda function that removes sensitive information before Lake Formation ingests re data.
C.
Create an AWS Lambda function that removes sensitive information before Lake Formation ingests re data.
Answers
D.
Create an AWS Lambda function that perodically Queries and removes sensitive information from Lake Formation tables.
D.
Create an AWS Lambda function that perodically Queries and removes sensitive information from Lake Formation tables.
Answers
Suggested answer: B

Explanation:


A company wants to create an application to store employee data in a hierarchical structured relationship. The company needs a minimum-latency response to high-traffic queries for the employee data and must protect any sensitive dat a. The company also need to receive monthly email messages if any financial information is present in the employee data. Which combination of steps should a solutin architect take to meet these requirement? ( Select TWO.)

A.
Use Amazon Redshift to store the employee data in hierarchies. Unload the data to Amazon S3 every month.
A.
Use Amazon Redshift to store the employee data in hierarchies. Unload the data to Amazon S3 every month.
Answers
B.
Use Amazon DynamoDB to store the employee data in hierarchies Export the data to Amazon S3 every month.
B.
Use Amazon DynamoDB to store the employee data in hierarchies Export the data to Amazon S3 every month.
Answers
C.
Configure Amazon Macie for the AWS account Integrate Macie with Amazon EventBridge to send monthly events to AWS Lambda.
C.
Configure Amazon Macie for the AWS account Integrate Macie with Amazon EventBridge to send monthly events to AWS Lambda.
Answers
D.
Use Amazon Athena to analyze the employee data in Amazon S3 integrate Athena with Amazon QuickSight to publish analysis dashboards and share the dashboards with users.
D.
Use Amazon Athena to analyze the employee data in Amazon S3 integrate Athena with Amazon QuickSight to publish analysis dashboards and share the dashboards with users.
Answers
E.
Configure Amazon Macie for the AWS account. integrate Macie with Amazon EventBridge to send monthly notifications through an Amazon Simple Notification Service (Amazon SNS) subscription.
E.
Configure Amazon Macie for the AWS account. integrate Macie with Amazon EventBridge to send monthly notifications through an Amazon Simple Notification Service (Amazon SNS) subscription.
Answers
Suggested answer: B, E

Explanation:


A solutions architect is designing a multi-tier application for a company. The application's users upload images from a mobile device. The application generates a thumbnail of each image and returns a message to the user to confirm that the image was uploaded successfully.

The thumbnail generation can take up to 60 seconds, but the company wants to provide a faster response time to its users to notify them that the original image was received. The solutions architect must design the application to asynchronously dispatch requests to the different application tiers.

What should the solutions architect do to meet these requirements?

A.
Write a custom AWS Lambda function to generate the thumbnail and alert the user. Use the image upload process as an event source to invoke the Lambda function.
A.
Write a custom AWS Lambda function to generate the thumbnail and alert the user. Use the image upload process as an event source to invoke the Lambda function.
Answers
B.
Create an AWS Step Functions workflow Configure Step Functions to handle the orchestration between the application tiers and alert the user when thumbnail generation is complete
B.
Create an AWS Step Functions workflow Configure Step Functions to handle the orchestration between the application tiers and alert the user when thumbnail generation is complete
Answers
C.
Create an Amazon Simple Queue Service (Amazon SQS) message queue. As images are uploaded, place a message on the SQS queue for thumbnail generation. Alert the user through an application message that the image was received
C.
Create an Amazon Simple Queue Service (Amazon SQS) message queue. As images are uploaded, place a message on the SQS queue for thumbnail generation. Alert the user through an application message that the image was received
Answers
D.
Create Amazon Simple Notification Service (Amazon SNS) notification topics and subscriptions Use one subscription with the application to generate the thumbnail after the image upload is complete. Use a second subscription to message the user's mobile app by way of a push notification after thumbnail generation is complete.
D.
Create Amazon Simple Notification Service (Amazon SNS) notification topics and subscriptions Use one subscription with the application to generate the thumbnail after the image upload is complete. Use a second subscription to message the user's mobile app by way of a push notification after thumbnail generation is complete.
Answers
Suggested answer: C

Explanation:

This option is the most efficient because it uses Amazon SQS, which is a fully managed message queuing service that lets you send, store, and receive messages between software components at any volume, without losing messages or requiring other services to be available1. It also uses an SQS message queue to asynchronously dispatch requests to the different application tiers, which decouples the image upload process from the thumbnail generation process and enables scalability and reliability. It also alerts the user through an application message that the image was received, which provides a faster response time to the user than waiting for the thumbnail generation to complete. Option A is less efficient because it uses a custom AWS Lambda function to generate the thumbnail and alert the user, which is a way to run code without provisioning or managing servers. However, this does not use an asynchronous dispatch mechanism to separate the image upload process from the thumbnail generation process. It also uses the image upload process as an event source to invoke the Lambda function, which could cause concurrency issues if there are many images uploaded at once. Option B is less efficient because it uses AWS Step Functions, which is a fully managed service that provides a graphical console to arrange and visualize the components of your application as a series of steps2. However, this does not use an asynchronous dispatch mechanism to separate the image upload process from the thumbnail generation process. It also uses Step Functions to handle the orchestration between the application tiers and alert the user when thumbnail generation is complete, which could introduce additional complexity and latency. Option D is less efficient because it uses Amazon SNS, which is a fully managed messaging service that enables you to send messages or notifications directly to users with SMS text messages or email3. However, this does not use an asynchronous dispatch mechanism to separate the image upload process from the thumbnail generation process. It also uses SNS notification topics and subscriptions to generate the thumbnail after the image upload is complete and message the user's mobile app by way of a push notification after thumbnail generation is complete, which could introduce additional complexity and latency.



A company uses a 100 GB Amazon RDS for Microsoft SQL Server Single-AZ DB instance in the us-east- 1 Region to store customer transactions. The company needs high availability and automate recovery for the DB instance. The companu must also run reports on the RDS database several times a year. The report process causes transactions to take longer than usual to post to the customer‘ accounts. Which combination of steps will meet these requirements? (Select TWO.)

A.
Modify the DB instance from a Single-AZ DB instance to a Multi-AZ deployment.
A.
Modify the DB instance from a Single-AZ DB instance to a Multi-AZ deployment.
Answers
B.
Take a snapshot of the current DB instance. Restore the snapshot to a new RDS deployment in another Availability Zone.
B.
Take a snapshot of the current DB instance. Restore the snapshot to a new RDS deployment in another Availability Zone.
Answers
C.
Create a read replica of the DB instance in a different Availability Zone. Point All requests for reports to the read replica.
C.
Create a read replica of the DB instance in a different Availability Zone. Point All requests for reports to the read replica.
Answers
D.
Migrate the database to RDS Custom.
D.
Migrate the database to RDS Custom.
Answers
E.
Use RDS Proxy to limit reporting requests to the maintenance window.
E.
Use RDS Proxy to limit reporting requests to the maintenance window.
Answers
Suggested answer: A, C

Explanation:

https://medium.com/awesome-cloud/aws-difference-between-multi-az-and-read-replicas-in- amazon-rds-60fe848ef53a


Total 886 questions
Go to page: of 89