Amazon AWS Certified Solutions Architect - Associate SAA-C02
Prev

There are 450 results

Next
#21 (Accuracy: 100% / 3 votes)
An application runs on Amazon EC2 instances across multiple Availability Zones. The instances run in an Amazon EC2 Auto Scaling group behind an Application
Load Balancer.
The application performs best when the CPU utilization of the EC2 instances is at or near 40%.
What should a solutions architect do to maintain the desired performance across all instances in the group?
  • A. Use a simple scaling policy to dynamically scale the Auto Scaling group.
  • B. Use a target tracking policy to dynamically scale the Auto Scaling group.
  • C. Use an AWS Lambda function to update the desired Auto Scaling group capacity.
  • D. Use scheduled scaling actions to scale up and scale down the Auto Scaling group.
#22 (Accuracy: 100% / 1 votes)
A financial services company has a web application that serves users in the United States and Europe. The application consists of a database tier and a web server tier. The database tier consists of a MySQL database hosted in us-east-1. Amazon Route 53 geoproximity routing is used to direct traffic to instances in the closest Region. A performance review of the system reveals that European users are not receiving the same level of query performance as those in the United
States.
Which changes should be made to the database tier to improve performance?
  • A. Migrate the database to Amazon RDS for MySQL. Configure Multi-AZ in one of the European Regions.
  • B. Migrate the database to Amazon DynamoDB. Use DynamoDB global tables to enable replication to additional Regions.
  • C. Deploy MySQL instances in each Region. Deploy an Application Load Balancer in front of MySQL to reduce the load on the primary instance.
  • D. Migrate the database to an Amazon Aurora global database in MySQL compatibility mode. Configure read replicas in one of the European Regions.
#23 (Accuracy: 100% / 1 votes)
A company hosts a static website on-premises and wants to migrate the website to AWS. The website should load as quickly as possible for users around the world. The company also wants the most cost-effective solution.
What should a solutions architect do to accomplish this?
  • A. Copy the website content to an Amazon S3 bucket. Configure the bucket to serve static webpage content. Replicate the S3 bucket to multiple AWS Regions.
  • B. Copy the website content to an Amazon S3 bucket. Configure the bucket to serve static webpage content. Configure Amazon CloudFront with the S3 bucket as the origin.
  • C. Copy the website content to an Amazon EBS-backed Amazon EC2 instance running Apache HTTP Server. Configure Amazon Route 53 geolocation routing policies to select the closest origin.
  • D. Copy the website content to multiple Amazon EBS-backed Amazon EC2 instances running Apache HTTP Server in multiple AWS Regions. Configure Amazon CloudFront geolocation routing policies to select the closest origin.
#24 (Accuracy: 100% / 2 votes)
A solutions architect is designing storage for a high performance computing (HPC) environment based on Amazon Linux. The workload stores and processes a large amount of engineering drawings that require shared storage and heavy computing.
Which storage option would be the optimal solution?
  • A. Amazon Elastic File System (Amazon EFS)
  • B. Amazon FSx for Lustre
  • C. Amazon EC2 instance store
  • D. Amazon Elastic Block Store (Amazon EBS) Provisioned IOPS SSD (io1)
#25 (Accuracy: 100% / 2 votes)
A company is performing an AWS Well-Architected Framework review of an existing workload deployed on AWS. The review identified a public-facing website running on the same Amazon EC2 instance as a Microsoft Active Directory domain controller that was install recently to support other AWS services. A solutions architect needs to recommend a new design that would improve the security of the architecture and minimize the administrative demand on IT staff.
What should the solutions architect recommend?
  • A. Use AWS Directory Service to create a managed Active Directory. Uninstall Active Directory on the current EC2 instance.
  • B. Create another EC2 instance in the same subnet and reinstall Active Directory on it. Uninstall Active Directory.
  • C. Use AWS Directory Service to create an Active Directory connector. Proxy Active Directory requests to the Active domain controller running on the current EC2 instance.
  • D. Enable AWS Single Sign-On (AWS SSO) with Security Assertion Markup Language (SAML) 2.0 federation with the current Active Directory controller. Modify the EC2 instance's security group to deny public access to Active Directory.
#26 (Accuracy: 100% / 2 votes)
A company hosts a static website within an Amazon S3 bucket. A solutions architect needs to ensure that data can be recovered in case of accidental deletion.
Which action will accomplish this?
  • A. Enable Amazon S3 versioning.
  • B. Enable Amazon S3 Intelligent-Tiering.
  • C. Enable an Amazon S3 lifecycle policy.
  • D. Enable Amazon S3 cross-Region replication.
#27 (Accuracy: 100% / 3 votes)
A company runs an application in a branch office within a small data closet with no virtualized compute resources. The application data is stored on an NFS volume. Compliance standards require a daily offsite backup of the NFS volume.
Which solution meets these requirements?
  • A. Install an AWS Storage Gateway file gateway on premises to replicate the data to Amazon S3.
  • B. Install an AWS Storage Gateway file gateway hardware appliance on premises to replicate the data to Amazon S3.
  • C. Install an AWS Storage Gateway volume gateway with stored volumes on premises to replicate the data to Amazon S3.
  • D. Install an AWS Storage Gateway volume gateway with cached volumes on premises to replicate the data to Amazon S3.
#28 (Accuracy: 100% / 2 votes)
A security team to limit access to specific services or actions in all of the team's AWS accounts. All accounts belong to a large organization in AWS Organizations.
The solution must be scalable and there must be a single point where permissions can be maintained.

What should a solutions architect do to accomplish this?
  • A. Create an ACL to provide access to the services or actions.
  • B. Create a security group to allow accounts and attach it to user groups.
  • C. Create cross-account roles in each account to deny access to the services or actions.
  • D. Create a service control policy in the root organizational unit to deny access to the services or actions.
#29 (Accuracy: 100% / 5 votes)
A company is hosting a web application on AWS using a single Amazon EC2 instance that stores user-uploaded documents in an Amazon Elastic Block Store
(Amazon EBS) volume.
For better scalability and availability, the company duplicated the architecture and created a second EC2 instance and EBS volume in another Availability Zone, placing both behind an Application Load Balancer. After completing this change, users reported that each time they refreshed the website, they could see one subset of their documents or the other, but never all of the documents at the same time.
What should a solutions architect propose to ensure users see all of their documents at once?
  • A. Copy the data so both EBS volumes contain all the documents.
  • B. Configure the Application Load Balancer to direct a user to the server with the documents.
  • C. Copy the data from both EBS volumes to Amazon Elastic File System (Amazon EFS). Modify the application to save new documents to Amazon Elastic File System (Amazon EFS).
  • D. Configure the Application Load Balancer to send the request to both servers. Return each document from the correct server.
#30 (Accuracy: 100% / 3 votes)
A company is planning to use Amazon S3 to store images uploaded by its users. The images must be encrypted at rest in Amazon S3. The company does not want to spend time managing and rotating the keys, but it does want to control who can access those keys.
What should a solutions architect use to accomplish this?
  • A. Server-Side Encryption with keys stored in an S3 bucket
  • B. Server-Side Encryption with Customer-Provided Keys (SSE-C)
  • C. Server-Side Encryption with Amazon S3-Managed Keys (SSE-S3)
  • D. Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS)