Amazon AWS Certified Solutions Architect - Associate SAA-C03
Prev

There are 677 results

Next
#621 (Accuracy: 100% / 8 votes)
A media company hosts its website on AWS. The website application’s architecture includes a fleet of Amazon EC2 instances behind an Application Load Balancer (ALB) and a database that is hosted on Amazon Aurora. The company’s cybersecurity team reports that the application is vulnerable to SQL injection.

How should the company resolve this issue?
  • A. Use AWS WAF in front of the ALB. Associate the appropriate web ACLs with AWS WAF.
  • B. Create an ALB listener rule to reply to SQL injections with a fixed response.
  • C. Subscribe to AWS Shield Advanced to block all SQL injection attempts automatically.
  • D. Set up Amazon Inspector to block all SQL injection attempts automatically.
#622 (Accuracy: 94% / 5 votes)
A company recently migrated its entire IT environment to the AWS Cloud. The company discovers that users are provisioning oversized Amazon EC2 instances and modifying security group rules without using the appropriate change control process. A solutions architect must devise a strategy to track and audit these inventory and configuration changes.

Which actions should the solutions architect take to meet these requirements? (Choose two.)
  • A. Enable AWS CloudTrail and use it for auditing.
  • B. Use data lifecycle policies for the Amazon EC2 instances.
  • C. Enable AWS Trusted Advisor and reference the security dashboard.
  • D. Enable AWS Config and create rules for auditing and compliance purposes.
  • E. Restore previous resource configurations with an AWS CloudFormation template.
#623 (Accuracy: 100% / 8 votes)
A company wants to give a customer the ability to use on-premises Microsoft Active Directory to download files that are stored in Amazon S3. The customer’s application uses an SFTP client to download the files.

Which solution will meet these requirements with the LEAST operational overhead and no changes to the customer’s application?
  • A. Set up AWS Transfer Family with SFTP for Amazon S3. Configure integrated Active Directory authentication.
  • B. Set up AWS Database Migration Service (AWS DMS) to synchronize the on-premises client with Amazon S3. Configure integrated Active Directory authentication.
  • C. Set up AWS DataSync to synchronize between the on-premises location and the S3 location by using AWS IAM Identity Center (AWS Single Sign-On).
  • D. Set up a Windows Amazon EC2 instance with SFTP to connect the on-premises client with Amazon S3. Integrate AWS Identity and Access Management (IAM).
#624 (Accuracy: 100% / 5 votes)
A company uses a 100 GB Amazon RDS for Microsoft SQL Server Single-AZ DB instance in the us-east-1 Region to store customer transactions. The company needs high availability and automatic recovery for the DB instance.

The company must also run reports on the RDS database several times a year.
The report process causes transactions to take longer than usual to post to the customers’ accounts. The company needs a solution that will improve the performance of the report process.

Which combination of steps will meet these requirements? (Choose two.)
  • A. Modify the DB instance from a Single-AZ DB instance to a Multi-AZ deployment.
  • B. Take a snapshot of the current DB instance. Restore the snapshot to a new RDS deployment in another Availability Zone.
  • C. Create a read replica of the DB instance in a different Availability Zone. Point all requests for reports to the read replica.
  • D. Migrate the database to RDS Custom.
  • E. Use RDS Proxy to limit reporting requests to the maintenance window.
#625 (Accuracy: 97% / 9 votes)
A company uses a legacy application to produce data in CSV format. The legacy application stores the output data in Amazon S3. The company is deploying a new commercial off-the-shelf (COTS) application that can perform complex SQL queries to analyze data that is stored in Amazon Redshift and Amazon S3 only. However, the COTS application cannot process the .csv files that the legacy application produces.

The company cannot update the legacy application to produce data in another format.
The company needs to implement a solution so that the COTS application can use the data that the legacy application produces.

Which solution will meet these requirements with the LEAST operational overhead?
  • A. Create an AWS Glue extract, transform, and load (ETL) job that runs on a schedule. Configure the ETL job to process the .csv files and store the processed data in Amazon Redshift.
  • B. Develop a Python script that runs on Amazon EC2 instances to convert the .csv files to .sql files. Invoke the Python script on a cron schedule to store the output files in Amazon S3.
  • C. Create an AWS Lambda function and an Amazon DynamoDB table. Use an S3 event to invoke the Lambda function. Configure the Lambda function to perform an extract, transform, and load (ETL) job to process the .csv files and store the processed data in the DynamoDB table.
  • D. Use Amazon EventBridge to launch an Amazon EMR cluster on a weekly schedule. Configure the EMR cluster to perform an extract, transform, and load (ETL) job to process the .csv files and store the processed data in an Amazon Redshift table.
#626 (Accuracy: 100% / 7 votes)
A company has an on-premises MySQL database used by the global sales team with infrequent access patterns. The sales team requires the database to have minimal downtime. A database administrator wants to migrate this database to AWS without selecting a particular instance type in anticipation of more users in the future.

Which service should a solutions architect recommend?
  • A. Amazon Aurora MySQL
  • B. Amazon Aurora Serverless for MySQL
  • C. Amazon Redshift Spectrum
  • D. Amazon RDS for MySQL
#627 (Accuracy: 93% / 9 votes)
A company has an application that runs on several Amazon EC2 instances. Each EC2 instance has multiple Amazon Elastic Block Store (Amazon EBS) data volumes attached to it. The application’s EC2 instance configuration and data need to be backed up nightly. The application also needs to be recoverable in a different AWS Region.

Which solution will meet these requirements in the MOST operationally efficient way?
  • A. Write an AWS Lambda function that schedules nightly snapshots of the application’s EBS volumes and copies the snapshots to a different Region.
  • B. Create a backup plan by using AWS Backup to perform nightly backups. Copy the backups to another Region. Add the application’s EC2 instances as resources.
  • C. Create a backup plan by using AWS Backup to perform nightly backups. Copy the backups to another Region. Add the application’s EBS volumes as resources.
  • D. Write an AWS Lambda function that schedules nightly snapshots of the application's EBS volumes and copies the snapshots to a different Availability Zone.
#628 (Accuracy: 100% / 6 votes)
A company sells datasets to customers who do research in artificial intelligence and machine learning (AI/ML). The datasets are large, formatted files that are stored in an Amazon S3 bucket in the us-east-1 Region. The company hosts a web application that the customers use to purchase access to a given dataset. The web application is deployed on multiple Amazon EC2 instances behind an Application Load Balancer. After a purchase is made, customers receive an S3 signed URL that allows access to the files.

The customers are distributed across North America and Europe.
The company wants to reduce the cost that is associated with data transfers and wants to maintain or improve performance.

What should a solutions architect do to meet these requirements?
  • A. Configure S3 Transfer Acceleration on the existing S3 bucket. Direct customer requests to the S3 Transfer Acceleration endpoint. Continue to use S3 signed URLs for access control.
  • B. Deploy an Amazon CloudFront distribution with the existing S3 bucket as the origin. Direct customer requests to the CloudFront URL. Switch to CloudFront signed URLs for access control.
  • C. Set up a second S3 bucket in the eu-central-1 Region with S3 Cross-Region Replication between the buckets. Direct customer requests to the closest Region. Continue to use S3 signed URLs for access control.
  • D. Modify the web application to enable streaming of the datasets to end users. Configure the web application to read the data from the existing S3 bucket. Implement access control directly in the application.
#629 (Accuracy: 100% / 9 votes)
A company wants to run an in-memory database for a latency-sensitive application that runs on Amazon EC2 instances. The application processes more than 100,000 transactions each minute and requires high network throughput. A solutions architect needs to provide a cost-effective network design that minimizes data transfer charges.

Which solution meets these requirements?
  • A. Launch all EC2 instances in the same Availability Zone within the same AWS Region. Specify a placement group with cluster strategy when launching EC2 instances.
  • B. Launch all EC2 instances in different Availability Zones within the same AWS Region. Specify a placement group with partition strategy when launching EC2 instances.
  • C. Deploy an Auto Scaling group to launch EC2 instances in different Availability Zones based on a network utilization target.
  • D. Deploy an Auto Scaling group with a step scaling policy to launch EC2 instances in different Availability Zones.
#630 (Accuracy: 100% / 6 votes)
A company runs a web application that is deployed on Amazon EC2 instances in the private subnet of a VPC. An Application Load Balancer (ALB) that extends across the public subnets directs web traffic to the EC2 instances. The company wants to implement new security measures to restrict inbound traffic from the ALB to the EC2 instances while preventing access from any other source inside or outside the private subnet of the EC2 instances.

Which solution will meet these requirements?
  • A. Configure a route in a route table to direct traffic from the internet to the private IP addresses of the EC2 instances.
  • B. Configure the security group for the EC2 instances to only allow traffic that comes from the security group for the ALB.
  • C. Move the EC2 instances into the public subnet. Give the EC2 instances a set of Elastic IP addresses.
  • D. Configure the security group for the ALB to allow any TCP traffic on any port.