ExamGecko
Home Home / Amazon / SAA-C03

Amazon SAA-C03 Practice Test - Questions Answers, Page 92

Question list
Search
Search

List of questions

Search

Related questions











A company is planning to migrate an on-premises online transaction processing (OLTP) database that uses MySQL to an AWS managed database management system. Several reporting and analytics applications use the on-premises database heavily on weekends and at the end of each month. The cloud-based solution must be able to handle read-heavy surges during weekends and at the end of each month.

Which solution will meet these requirements?

A.

Migrate the database to an Amazon Aurora MySQL cluster. Configure Aurora Auto Scaling to use replicas to handle surges

A.

Migrate the database to an Amazon Aurora MySQL cluster. Configure Aurora Auto Scaling to use replicas to handle surges

Answers
B.

Migrate the database to an Amazon EC2 instance that runs MySQL. Use an EC2 instance type that has ephemeral storage. Attach Amazon EBS Provisioned IOPS SSD (io2) volumes to the instance.

B.

Migrate the database to an Amazon EC2 instance that runs MySQL. Use an EC2 instance type that has ephemeral storage. Attach Amazon EBS Provisioned IOPS SSD (io2) volumes to the instance.

Answers
C.

Migrate the database to an Amazon RDS for MySQL database. Configure the RDS for MySQL database for a Multi-AZ deployment, and set up auto scaling

C.

Migrate the database to an Amazon RDS for MySQL database. Configure the RDS for MySQL database for a Multi-AZ deployment, and set up auto scaling

Answers
D.

Migrate from the database to Amazon Redshift. Use Amazon Redshift as the database for both OLTP and analytics applications.

D.

Migrate from the database to Amazon Redshift. Use Amazon Redshift as the database for both OLTP and analytics applications.

Answers
Suggested answer: A

Explanation:

A. Aurora MySQL: Handles OLTP workloads efficiently with built-in replication and auto-scaling capabilities.

B. EC2 with MySQL: Requires heavy manual maintenance and does not scale seamlessly.

C. RDS for MySQL: Limited in auto-scaling compared to Aurora.

D. Redshift: Primarily for OLAP, not suitable for OLTP workloads.


A company is migrating a new application from an on-premises data center to a new VPC in the AWS Cloud. The company has multiple AWS accounts and VPCs that share many subnets and applications. The company wants to have fine-grained access control for the new application. The company wants to ensure that all network resources across accounts and VPCs that are granted permission to access the new application can access the application.

Which solution will meet these requirements?

A.

Set up a VPC peering connection for each VPC that needs access to the new application VPC. Update route tables in each VPC to enable connectivity.

A.

Set up a VPC peering connection for each VPC that needs access to the new application VPC. Update route tables in each VPC to enable connectivity.

Answers
B.

Deploy a transit gateway in the account that hosts the new application. Share the transit gateway with each account that needs to connect to the application. Update route tables in the VPC that hosts the new application and in the transit gateway to enable connectivity

B.

Deploy a transit gateway in the account that hosts the new application. Share the transit gateway with each account that needs to connect to the application. Update route tables in the VPC that hosts the new application and in the transit gateway to enable connectivity

Answers
C.

Use an AWS PrivateLink endpoint service to make the new application accessible to other VPCs. Control access to the application by using an endpoint policy

C.

Use an AWS PrivateLink endpoint service to make the new application accessible to other VPCs. Control access to the application by using an endpoint policy

Answers
D.

Use an Application Load Balancer (ALB) to expose the new application to the internet. Configure authentication and authorization processes to ensure that only specified VPCs can access the application.

D.

Use an Application Load Balancer (ALB) to expose the new application to the internet. Configure authentication and authorization processes to ensure that only specified VPCs can access the application.

Answers
Suggested answer: B

Explanation:

A. VPC peering: Creates a fully meshed architecture, which is complex to manage for multiple VPCs.

B. Transit gateway: Simplifies network management by connecting multiple VPCs and on-premises networks via a central hub.

C. PrivateLink: Restricts communication to the application endpoint but may not allow full VPC connectivity.

D. ALB with internet exposure: Not secure or specific to private network communication.


A company is creating an application. The company stores data from tests of the application in multiple on-premises locations. The company needs to connect the on-premises locations to VPCs in an AWS Region in the AWS Cloud. The number of accounts and VPCs will increase during the next year. The network architecture must simplify the administration of new connections and must provide the ability to scale.

Which solution will meet these requirements with the LEAST administrative overhead?

A.

Create a peering connection between the VPCs. Create a VPN connection between the VPCs and the on-premises locations

A.

Create a peering connection between the VPCs. Create a VPN connection between the VPCs and the on-premises locations

Answers
B.

Launch an Amazon EC2 instance. On the instance, include VPN software that uses a VPN connection to connect all VPCs and on-premises locations.

B.

Launch an Amazon EC2 instance. On the instance, include VPN software that uses a VPN connection to connect all VPCs and on-premises locations.

Answers
C.

Create a transit gateway. Create VPC attachments for the VPC connections. Create VPN attachments for the on-premises connections.

C.

Create a transit gateway. Create VPC attachments for the VPC connections. Create VPN attachments for the on-premises connections.

Answers
D.

Create an AWS Direct Connect connection between the on-premises locations and a central VPC. Connect the central VPC to other VPCs by using peering connections.

D.

Create an AWS Direct Connect connection between the on-premises locations and a central VPC. Connect the central VPC to other VPCs by using peering connections.

Answers
Suggested answer: C

Explanation:

A. VPC peering + VPN: Not scalable for multiple VPCs and accounts.

B. EC2 with VPN software: Requires manual setup and high administrative overhead.

C. Transit gateway: Simplifies connection management across VPCs and on-premises locations.

D. Direct Connect with central VPC: Limits scalability and requires additional peering connections.


A company is enhancing the security of its AWS environment, where the company stores a significant amount of sensitive customer data. The company needs a solution that automatically identifies and classifies sensitive data that is stored in multiple Amazon S3 buckets. The solution must automatically respond to data breaches and alert the company's security team through email immediately when noncompliant data is found.

Which solution will meet these requirements?

A.

Use Amazon GuardDuty. Configure an AWS Lambda function to route alerts to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the security team to the SNS topic.

A.

Use Amazon GuardDuty. Configure an AWS Lambda function to route alerts to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the security team to the SNS topic.

Answers
B.

Use Amazon GuardDuty. Configure an AWS Lambda function to route alerts to an Amazon Simple Queue Service (Amazon SQS) queue. Configure a second Lambda function to periodically poll the SQS queue and to send emails to the security team by using Amazon Simple Email Service (Amazon SES).

B.

Use Amazon GuardDuty. Configure an AWS Lambda function to route alerts to an Amazon Simple Queue Service (Amazon SQS) queue. Configure a second Lambda function to periodically poll the SQS queue and to send emails to the security team by using Amazon Simple Email Service (Amazon SES).

Answers
C.

Use Amazon Macie. Integrate Amazon EventBridge with Macie, and configure EventBridge to send alerts to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the security team to the SNS topic.

C.

Use Amazon Macie. Integrate Amazon EventBridge with Macie, and configure EventBridge to send alerts to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the security team to the SNS topic.

Answers
D.

Use Amazon Macie. Integrate Amazon EventBridge with Macie, and configure EventBridge to route alerts to an Amazon Simple Queue Service (Amazon SQS) queue. Configure an AWS Lambda function to periodically poll the SQS queue and to send alerts to the security team by using Amazon Simple Email Service (Amazon SES).

D.

Use Amazon Macie. Integrate Amazon EventBridge with Macie, and configure EventBridge to route alerts to an Amazon Simple Queue Service (Amazon SQS) queue. Configure an AWS Lambda function to periodically poll the SQS queue and to send alerts to the security team by using Amazon Simple Email Service (Amazon SES).

Answers
Suggested answer: C

Explanation:

A & B. GuardDuty: Designed for threat detection, not for identifying or classifying sensitive data in S3 buckets.

C . Macie with EventBridge + SNS: Automatically identifies sensitive data, triggers alerts, and uses SNS for immediate notification via email.

D . Macie with EventBridge + SQS: Introduces latency due to periodic polling and adds unnecessary complexity.

A gaming company is building an application that uses a database to store user data. The company wants the database to have an active-active configuration that allows data writes to a secondary AWS Region. The database must achieve a sub-second recovery point objective (RPO).

Which solution will meet these requirements?

A.

Deploy an Amazon ElastiCache (Redis OSS) cluster. Configure a global data store for disaster recovery. Configure the ElastiCache cluster to cache data from an Amazon RDS database that is deployed in the primary Region.

A.

Deploy an Amazon ElastiCache (Redis OSS) cluster. Configure a global data store for disaster recovery. Configure the ElastiCache cluster to cache data from an Amazon RDS database that is deployed in the primary Region.

Answers
B.

Deploy an Amazon DynamoDB table in the primary Region and the secondary Region. Configure Amazon DynamoDB Streams to invoke an AWS Lambda function to write changes from the table in the primary Region to the table in the secondary Region.

B.

Deploy an Amazon DynamoDB table in the primary Region and the secondary Region. Configure Amazon DynamoDB Streams to invoke an AWS Lambda function to write changes from the table in the primary Region to the table in the secondary Region.

Answers
C.

Deploy an Amazon Aurora MySQL database in the primary Region. Configure a global database for the secondary Region.

C.

Deploy an Amazon Aurora MySQL database in the primary Region. Configure a global database for the secondary Region.

Answers
D.

Deploy an Amazon DynamoDB table in the primary Region. Configure global tables for the secondary Region.

D.

Deploy an Amazon DynamoDB table in the primary Region. Configure global tables for the secondary Region.

Answers
Suggested answer: D

Explanation:

A . ElastiCache: Provides in-memory caching, not suitable for persistent, scalable databases.

B . DynamoDB Streams + Lambda: Manages replication manually, increasing latency and operational complexity.

C . Aurora Global Database: Provides high availability but does not support active-active configuration.

D . DynamoDB Global Tables: Provides active-active configuration and sub-second RPO.

A company runs an order management application on AWS. The application allows customers to place orders and pay with a credit card. The company uses an Amazon CloudFront distribution to deliver the application. A security team has set up logging for all incoming requests. The security team needs a solution to generate an alert if any user modifies the logging configuration.

Which combination of solutions will meet these requirements? (Select TWO.)

A.

Configure an Amazon EventBridge rule that is invoked when a user creates or modifies a CloudFront distribution. Add the AWS Lambda function as a target of the EventBridge rule.

A.

Configure an Amazon EventBridge rule that is invoked when a user creates or modifies a CloudFront distribution. Add the AWS Lambda function as a target of the EventBridge rule.

Answers
B.

Create an Application Load Balancer (ALB). Enable AWS WAF rules for the ALB. Configure an AWS Config rule to detect security violations.

B.

Create an Application Load Balancer (ALB). Enable AWS WAF rules for the ALB. Configure an AWS Config rule to detect security violations.

Answers
C.

Create an AWS Lambda function to detect changes in CloudFront distribution logging. Configure the Lambda function to use Amazon Simple Notification Service (Amazon SNS) to send notifications to the security team.

C.

Create an AWS Lambda function to detect changes in CloudFront distribution logging. Configure the Lambda function to use Amazon Simple Notification Service (Amazon SNS) to send notifications to the security team.

Answers
D.

Set up Amazon GuardDuty. Configure GuardDuty to monitor findings from the CloudFront distribution. Create an AWS Lambda function to address the findings.

D.

Set up Amazon GuardDuty. Configure GuardDuty to monitor findings from the CloudFront distribution. Create an AWS Lambda function to address the findings.

Answers
E.

Create a private API in Amazon API Gateway. Use AWS WAF rules to protect the private API from common security problems.

E.

Create a private API in Amazon API Gateway. Use AWS WAF rules to protect the private API from common security problems.

Answers
Suggested answer: A, C

Explanation:

A. EventBridge rule: Triggers an event whenever there is a change in CloudFront distribution, ensuring real-time monitoring.

B. ALB with WAF: Focuses on application-level security, not CloudFront logging.

C. Lambda + SNS: Provides notifications upon detection of changes in logging configuration.

D. GuardDuty: Monitors anomalies but does not specifically address CloudFront logging changes.

E. Private API + WAF: Irrelevant to CloudFront logging changes.


A company has a website that handles dynamic traffic loads. The website architecture is based on Amazon EC2 instances in an Auto Scaling group that is configured to use scheduled scaling. Each EC2 instance runs code from an Amazon Elastic File System (Amazon EFS) volume and stores shared data back to the same volume.

The company wants to optimize costs for the website.

Which solution will meet this requirement?

A.

Reconfigure the Auto Scaling group to set a desired number of instances. Turn off scheduled scaling

A.

Reconfigure the Auto Scaling group to set a desired number of instances. Turn off scheduled scaling

Answers
B.

Create a new launch template version for the Auto Scaling group that uses larger EC2 instances

B.

Create a new launch template version for the Auto Scaling group that uses larger EC2 instances

Answers
C.

Reconfigure the Auto Scaling group to use a target tracking scaling policy

C.

Reconfigure the Auto Scaling group to use a target tracking scaling policy

Answers
D.

Replace the EFS volume with instance store volumes.

D.

Replace the EFS volume with instance store volumes.

Answers
Suggested answer: C

Explanation:

A. Fixed desired instances: Does not adapt to traffic load fluctuations, leading to inefficiencies.

B. Larger EC2 instances: Increases costs unnecessarily.

C. Target tracking scaling policy: Adjusts capacity based on actual demand, optimizing costs.

D. Instance store volumes: Not persistent and unsuitable for shared data across instances.


A company wants to provide a third-party system that runs in a private data center with access to its AWS account. The company wants to call AWS APIs directly from the third-party system. The company has an existing process for managing digital certificates. The company does not want to use SAML or OpenID Connect (OIDC) capabilities and does not want to store long-term AWS credentials.

Which solution will meet these requirements?

A.

Configure mutual TLS to allow authentication of the client and server sides of the communication channel.

A.

Configure mutual TLS to allow authentication of the client and server sides of the communication channel.

Answers
B.

Configure AWS Signature Version 4 to authenticate incoming HTTPS requests to AWS APIs

B.

Configure AWS Signature Version 4 to authenticate incoming HTTPS requests to AWS APIs

Answers
C.

Configure Kerberos to exchange tickets for assertions that can be validated by AWS APIs

C.

Configure Kerberos to exchange tickets for assertions that can be validated by AWS APIs

Answers
D.

Configure AWS Identity and Access Management (IAM) Roles Anywhere to exchange X.509 certificates for AWS credentials to interact with AWS APIs.

D.

Configure AWS Identity and Access Management (IAM) Roles Anywhere to exchange X.509 certificates for AWS credentials to interact with AWS APIs.

Answers
Suggested answer: D

Explanation:

A. Mutual TLS: Provides secure communication but does not integrate with AWS credential exchange.

B. AWS Signature v4: Requires direct integration with AWS and is less secure for external systems.

C. Kerberos: Not natively supported for AWS API authentication.

D. IAM Roles Anywhere: Enables AWS API access using X.509 certificates without long-term credentials.


Total 918 questions
Go to page: of 92