Aws Certified Solutions Architect Associate Saa c03
Aws Certified Solutions Architect Associate Saa c03
A. Turn on S3 Transfer Acceleration on the destination S3 bucket. Use multipart uploads to directly upload site
data to the destination S3 bucket.
B. Upload the data from each site to an S3 bucket in the closest Region. Use S3 Cross-Region Replication to
copy objects to the destination S3 bucket. Then remove the data from the origin S3 bucket.
C. Schedule AWS Snowball Edge Storage Optimized device jobs daily to transfer data from each site to the
closest Region. Use S3 Cross-Region Replication to copy objects to the destination S3 bucket.
D. Upload the data from each site to an Amazon EC2 instance in the closest Region. Store the data in an
Amazon Elastic Block Store (Amazon EBS) volume. At regular intervals, take an EBS snapshot and copy it to the
Region that contains the destination S3 bucket. Restore the EBS volume in that Region.
Answer: A
Explanation:
S3 Transfer Acceleration is the best solution cz it's faster , good for high speed, Transfer Acceleration is
designed to optimize transfer speeds from across the world into S3 buckets
Question: 2 CertyIQ
A company needs the ability to analyze the log files of its proprietary application. The logs are stored in JSON
format in an Amazon S3 bucket. Queries will be simple and will run on-demand. A solutions architect needs to
perform the analysis with minimal changes to the existing architecture.
What should the solutions architect do to meet these requirements with the LEAST amount of operational
overhead?
A. Use Amazon Redshift to load all the content into one place and run the SQL queries as needed.
B. Use Amazon CloudWatch Logs to store the logs. Run SQL queries as needed from the Amazon CloudWatch
console.
C. Use Amazon Athena directly with Amazon S3 to run the queries as needed.
D. Use AWS Glue to catalog the logs. Use a transient Apache Spark cluster on Amazon EMR to run the SQL
queries as needed.
Answer: C
Explanation:
Answer: C
https://docs.aws.amazon.com/athena/latest/ug/what-is.html
Amazon Athena is an interactive query service that makes it easy to analyze data directly in Amazon Simple
Storage Service (Amazon S3) using standard SQL. With a few actions in the AWS Management Console, you
can point Athena at your data stored in Amazon S3 and begin using standard SQL to run ad-hoc queries and
get results in seconds.
Question: 3 CertyIQ
A company uses AWS Organizations to manage multiple AWS accounts for different departments. The
management account has an Amazon S3 bucket that contains project reports. The company wants to limit access
to this S3 bucket to only users of accounts within the organization in AWS Organizations.
Which solution meets these requirements with the LEAST amount of operational overhead?
A. Add the aws PrincipalOrgID global condition key with a reference to the organization ID to the S3 bucket
policy.
B. Create an organizational unit (OU) for each department. Add the aws:PrincipalOrgPaths global condition key
to the S3 bucket policy.
C. Use AWS CloudTrail to monitor the CreateAccount, InviteAccountToOrganization, LeaveOrganization, and
RemoveAccountFromOrganization events. Update the S3 bucket policy accordingly.
D. Tag each user that needs access to the S3 bucket. Add the aws:PrincipalTag global condition key to the S3
bucket policy.
Answer: A
Explanation:
aws:PrincipalOrgID Validates if the principal accessing the resource belongs to an account in your
organization.
https://aws.amazon.com/blogs/security/control-access-to-aws-resources-by-using-the-aws-organization-of-
iam-principals/
Question: 4 CertyIQ
An application runs on an Amazon EC2 instance in a VPC. The application processes logs that are stored in an
Amazon S3 bucket. The EC2 instance needs to access the S3 bucket without connectivity to the internet.
Which solution will provide private network connectivity to Amazon S3?
Answer: A
Explanation:
VPC endpoint allows you to connect to AWS services using a private network instead of using the public
Internet
Question: 5 CertyIQ
A company is hosting a web application on AWS using a single Amazon EC2 instance that stores user-uploaded
documents in an Amazon EBS volume. For better scalability and availability, the company duplicated the
architecture and created a second EC2 instance and EBS volume in another Availability Zone, placing both behind
an Application Load Balancer. After completing this change, users reported that, each time they refreshed the
website, they could see one subset of their documents or the other, but never all of the documents at the same
time.
What should a solutions architect propose to ensure users see all of their documents at once?
A. Copy the data so both EBS volumes contain all the documents
B. Configure the Application Load Balancer to direct a user to the server with the documents
C. Copy the data from both EBS volumes to Amazon EFS. Modify the application to save new documents to
Amazon EFS
D. Configure the Application Load Balancer to send the request to both servers. Return each document from
the correct server
Answer: C
Explanation:
Adaptive throughput – EFS’s performance can scale in-line with its storage, operating at a higher throughput
for sudden, high-volume file dumps, reaching up to 500,000 IOPS or 10 GB per second Totally elastic – once
you’ve spun up an EFS instance, you can add add files without worrying about provisioning or disturbing your
application’s performance Additional accessibility – EFS can be mounted from different EC2 instances, but it
can also cross the AWS region boundary via the use of VPC peering
Question: 6 CertyIQ
A company uses NFS to store large video files in on-premises network attached storage. Each video file ranges in
size from 1 MB to 500 GB. The total storage is 70 TB and is no longer growing. The company decides to migrate the
video files to Amazon S3. The company must migrate the video files as soon as possible while using the least
possible network bandwidth.
Which solution will meet these requirements?
A. Create an S3 bucket. Create an IAM role that has permissions to write to the S3 bucket. Use the AWS CLI to
copy all files locally to the S3 bucket.
B. Create an AWS Snowball Edge job. Receive a Snowball Edge device on premises. Use the Snowball Edge
client to transfer data to the device. Return the device so that AWS can import the data into Amazon S3.
C. Deploy an S3 File Gateway on premises. Create a public service endpoint to connect to the S3 File Gateway.
Create an S3 bucket. Create a new NFS file share on the S3 File Gateway. Point the new file share to the S3
bucket. Transfer the data from the existing NFS file share to the S3 File Gateway.
D. Set up an AWS Direct Connect connection between the on-premises network and AWS. Deploy an S3 File
Gateway on premises. Create a public virtual interface (VIF) to connect to the S3 File Gateway. Create an S3
bucket. Create a new NFS file share on the S3 File Gateway. Point the new file share to the S3 bucket. Transfer
the data from the existing NFS file share to the S3 File Gateway.
Answer: B
Explanation:
B. On a Snowball Edge device you can copy files with a speed of up to 100Gbps. 70TB will take around 5600
seconds, so very quickly, less than 2 hours. The downside is that it'll take between 4-6 working days to receive
the device and then another 2-3 working days to send it back and for AWS to move the data onto S3 once it
reaches them. Total time: 6-9 working days. Bandwidth used: 0.
C. File Gateway uses the Internet, so maximum speed will be at most 1Gbps, so it'll take a minimum of 6.5 days
and you use 70TB of Internet bandwidth.
D. You can achieve speeds of up to 10Gbps with Direct Connect. Total time 15.5 hours and you will use 70TB of
bandwidth. However, what's interesting is that the question does not specific what type of bandwidth? Direct
Connect does not use your Internet bandwidth, as you will have a dedicate peer to peer connectivity between
your on-prem and the AWS Cloud, so technically, you're not using your "public" bandwidth.
The requirements are a bit too vague but I think that B is the most appropriate answer, although D might also
be correct if the bandwidth usage refers strictly to your public connectivity
Question: 7 CertyIQ
A company has an application that ingests incoming messages. Dozens of other applications and microservices
then quickly consume these messages. The number of messages varies drastically and sometimes increases
suddenly to 100,000 each second. The company wants to decouple the solution and increase scalability.
Which solution meets these requirements?
A. Persist the messages to Amazon Kinesis Data Analytics. Configure the consumer applications to read and
process the messages.
B. Deploy the ingestion application on Amazon EC2 instances in an Auto Scaling group to scale the number of
EC2 instances based on CPU metrics.
C. Write the messages to Amazon Kinesis Data Streams with a single shard. Use an AWS Lambda function to
preprocess messages and store them in Amazon DynamoDB. Configure the consumer applications to read from
DynamoDB to process the messages.
D. Publish the messages to an Amazon Simple Notification Service (Amazon SNS) topic with multiple Amazon
Simple Queue Service (Amazon SOS) subscriptions. Configure the consumer applications to process the
messages from the queues.
Answer: D
Explanation:
decoupling = SQS in most cases, and they did mention SNS into multiple SQS so with multiple SQS you can
handle more than 100k requests
Question: 8 CertyIQ
A company is migrating a distributed application to AWS. The application serves variable workloads. The legacy
platform consists of a primary server that coordinates jobs across multiple compute nodes. The company wants to
modernize the application with a solution that maximizes resiliency and scalability.
How should a solutions architect design the architecture to meet these requirements?
A. Configure an Amazon Simple Queue Service (Amazon SQS) queue as a destination for the jobs. Implement
the compute nodes with Amazon EC2 instances that are managed in an Auto Scaling group. Configure EC2
Auto Scaling to use scheduled scaling.
B. Configure an Amazon Simple Queue Service (Amazon SQS) queue as a destination for the jobs. Implement
the compute nodes with Amazon EC2 instances that are managed in an Auto Scaling group. Configure EC2
Auto Scaling based on the size of the queue.
C. Implement the primary server and the compute nodes with Amazon EC2 instances that are managed in an
Auto Scaling group. Configure AWS CloudTrail as a destination for the jobs. Configure EC2 Auto Scaling based
on the load on the primary server.
D. Implement the primary server and the compute nodes with Amazon EC2 instances that are managed in an
Auto Scaling group. Configure Amazon EventBridge (Amazon CloudWatch Events) as a destination for the jobs.
Configure EC2 Auto Scaling based on the load on the compute nodes.
Answer: B
Explanation:
A - incorrect: Schedule scaling policy doesn't make sense. C, D - incorrect: Primary server should not be in
same Auto Scaling group with compute nodes. B is correct
Question: 9 CertyIQ
A company is running an SMB file server in its data center. The file server stores large files that are accessed
frequently for the first few days after the files are created. After 7 days the files are rarely accessed.
The total data size is increasing and is close to the company's total storage capacity. A solutions architect must
increase the company's available storage space without losing low-latency access to the most recently accessed
files. The solutions architect must also provide file lifecycle management to avoid future storage issues.
Which solution will meet these requirements?
A. Use AWS DataSync to copy data that is older than 7 days from the SMB file server to AWS.
B. Create an Amazon S3 File Gateway to extend the company's storage space. Create an S3 Lifecycle policy to
transition the data to S3 Glacier Deep Archive after 7 days.
C. Create an Amazon FSx for Windows File Server file system to extend the company's storage space.
D. Install a utility on each user's computer to access Amazon S3. Create an S3 Lifecycle policy to transition the
data to S3 Glacier Flexible Retrieval after 7 days.
Answer: B
Explanation:
I go with B with this one,volume gateway should support SMB, and with cache volume you can cache most
recently accessed files locally for minimum latency
Question: 10 CertyIQ
A company is building an ecommerce web application on AWS. The application sends information about new
orders to an Amazon API Gateway REST API to process. The company wants to ensure that orders are processed in
the order that they are received.
Which solution will meet these requirements?
A. Use an API Gateway integration to publish a message to an Amazon Simple Notification Service (Amazon
SNS) topic when the application receives an order. Subscribe an AWS Lambda function to the topic to perform
processing.
B. Use an API Gateway integration to send a message to an Amazon Simple Queue Service (Amazon SQS) FIFO
queue when the application receives an order. Configure the SQS FIFO queue to invoke an AWS Lambda
function for processing.
C. Use an API Gateway authorizer to block any requests while the application processes an order.
D. Use an API Gateway integration to send a message to an Amazon Simple Queue Service (Amazon SQS)
standard queue when the application receives an order. Configure the SQS standard queue to invoke an AWS
Lambda function for processing.
Answer: B
Explanation:
Question: 11 CertyIQ
A company has an application that runs on Amazon EC2 instances and uses an Amazon Aurora database. The EC2
instances connect to the database by using user names and passwords that are stored locally in a file. The
company wants to minimize the operational overhead of credential management.
What should a solutions architect do to accomplish this goal?
Answer: A
Explanation:
AWS Secrets Manager is a secrets management service that helps you protect access to your applications,
services, and IT resources. This service enables you to rotate, manage, and retrieve database credentials, API
keys, and other secrets throughout their lifecycle. https://aws.amazon.com/cn/blogs/security/how-to-
connect-to-aws-secrets-manager-service-within-a-virtual-private-cloud/ y https://aws.amazon.com/secrets-
manager/?nc1=h_ls
Question: 12 CertyIQ
A global company hosts its web application on Amazon EC2 instances behind an Application Load Balancer (ALB).
The web application has static data and dynamic data. The company stores its static data in an Amazon S3 bucket.
The company wants to improve performance and reduce latency for the static data and dynamic data. The
company is using its own domain name registered with Amazon Route 53.
What should a solutions architect do to meet these requirements?
A. Create an Amazon CloudFront distribution that has the S3 bucket and the ALB as origins. Configure Route 53
to route traffic to the CloudFront distribution.
B. Create an Amazon CloudFront distribution that has the ALB as an origin. Create an AWS Global Accelerator
standard accelerator that has the S3 bucket as an endpoint Configure Route 53 to route traffic to the
CloudFront distribution.
C. Create an Amazon CloudFront distribution that has the S3 bucket as an origin. Create an AWS Global
Accelerator standard accelerator that has the ALB and the CloudFront distribution as endpoints. Create a
custom domain name that points to the accelerator DNS name. Use the custom domain name as an endpoint for
the web application.
D. Create an Amazon CloudFront distribution that has the ALB as an origin. Create an AWS Global Accelerator
standard accelerator that has the S3 bucket as an endpoint. Create two domain names. Point one domain name
to the CloudFront DNS name for dynamic content. Point the other domain name to the accelerator DNS name
for static content. Use the domain names as endpoints for the web application.
Answer: A
Explanation:
B,D is out because I don't think S3 can be an endpoint to AWS Accelerator. As for C, I'm wondring if it works
that dynamic and static resource use different domain name. So I am going with A
Question: 13 CertyIQ
A company performs monthly maintenance on its AWS infrastructure. During these maintenance activities, the
company needs to rotate the credentials for its Amazon RDS for MySQL databases across multiple AWS Regions.
Which solution will meet these requirements with the LEAST operational overhead?
A. Store the credentials as secrets in AWS Secrets Manager. Use multi-Region secret replication for the
required Regions. Configure Secrets Manager to rotate the secrets on a schedule.
B. Store the credentials as secrets in AWS Systems Manager by creating a secure string parameter. Use multi-
Region secret replication for the required Regions. Configure Systems Manager to rotate the secrets on a
schedule.
C. Store the credentials in an Amazon S3 bucket that has server-side encryption (SSE) enabled. Use Amazon
EventBridge (Amazon CloudWatch Events) to invoke an AWS Lambda function to rotate the credentials.
D. Encrypt the credentials as secrets by using AWS Key Management Service (AWS KMS) multi-Region
customer managed keys. Store the secrets in an Amazon DynamoDB global table. Use an AWS Lambda function
to retrieve the secrets from DynamoDB. Use the RDS API to rotate the secrets.
Answer: A
Explanation:
AWS Secrets Manager meant for storing secrets, Capability to force rotation of secrets every X days,
Automate generation of secrets on rotation (uses Lambda), Integration with Amazon RDS (MySQL,
PostgreSQL, Aurora).
Reference:
https://aws.amazon.com/blogs/security/how-to-replicate-secrets-aws-secrets-manager-multiple-regions/
Question: 14 CertyIQ
A company runs an ecommerce application on Amazon EC2 instances behind an Application Load Balancer. The
instances run in an Amazon EC2 Auto Scaling group across multiple Availability Zones. The Auto Scaling group
scales based on CPU utilization metrics. The ecommerce application stores the transaction data in a MySQL 8.0
database that is hosted on a large EC2 instance.
The database's performance degrades quickly as application load increases. The application handles more read
requests than write transactions. The company wants a solution that will automatically scale the database to meet
the demand of unpredictable read workloads while maintaining high availability.
Which solution will meet these requirements?
A. Use Amazon Redshift with a single node for leader and compute functionality.
B. Use Amazon RDS with a Single-AZ deployment Configure Amazon RDS to add reader instances in a different
Availability Zone.
C. Use Amazon Aurora with a Multi-AZ deployment. Configure Aurora Auto Scaling with Aurora Replicas.
D. Use Amazon ElastiCache for Memcached with EC2 Spot Instances.
Answer: C
Explanation:
C, AURORA is 5x performance improvement over MySQL on RDS and handles more read requests than write,;
maintaining high availability = Multi-AZ deployment
Question: 15 CertyIQ
A company recently migrated to AWS and wants to implement a solution to protect the traffic that flows in and out
of the production VPC. The company had an inspection server in its on-premises data center. The inspection server
performed specific operations such as traffic flow inspection and traffic filtering. The company wants to have the
same functionalities in the AWS Cloud.
Which solution will meet these requirements?
A. Use Amazon GuardDuty for traffic inspection and traffic filtering in the production VPC.
B. Use Traffic Mirroring to mirror traffic from the production VPC for traffic inspection and filtering.
C. Use AWS Network Firewall to create the required rules for traffic inspection and traffic filtering for the
production VPC.
D. Use AWS Firewall Manager to create the required rules for traffic inspection and traffic filtering for the
production VPC.
Answer: C
Explanation:
**AWS Network Firewall** is a stateful, managed network firewall and intrusion detection and prevention
service for your virtual private cloud (VPC) that you created in Amazon Virtual Private Cloud (Amazon VPC).
With Network Firewall, you can filter traffic at the perimeter of your VPC. This includes filtering traffic going
to and coming from an internet gateway, NAT gateway, or over VPN or AWS Direct Connect.
Question: 16 CertyIQ
A company hosts a data lake on AWS. The data lake consists of data in Amazon S3 and Amazon RDS for
PostgreSQL. The company needs a reporting solution that provides data visualization and includes all the data
sources within the data lake. Only the company's management team should have full access to all the
visualizations. The rest of the company should have only limited access.
Which solution will meet these requirements?
A. Create an analysis in Amazon QuickSight. Connect all the data sources and create new datasets. Publish
dashboards to visualize the data. Share the dashboards with the appropriate IAM roles.
B. Create an analysis in Amazon QuickSight. Connect all the data sources and create new datasets. Publish
dashboards to visualize the data. Share the dashboards with the appropriate users and groups.
C. Create an AWS Glue table and crawler for the data in Amazon S3. Create an AWS Glue extract, transform,
and load (ETL) job to produce reports. Publish the reports to Amazon S3. Use S3 bucket policies to limit access
to the reports.
D. Create an AWS Glue table and crawler for the data in Amazon S3. Use Amazon Athena Federated Query to
access data within Amazon RDS for PostgreSQL. Generate reports by using Amazon Athena. Publish the
reports to Amazon S3. Use S3 bucket policies to limit access to the reports.
Answer: B
Explanation:
Elimination process: QuickSight gives decision-makers the opportunity to explore and interpret information in
an interactive visual environment. QuickSight uses ML to generate accurate responses to natural language
questions about data. Get started with data visualization on AWS AWS Glue is a serverless data integration
service that makes data preparation simpler, faster, and cheaper. So AWS glue and crawler is out leaving the
two option A and B, B is the right answer because you after you publish a dashboard, you can share it with
other users or groups in your QuickSight account
Reference:
https://docs.aws.amazon.com/quicksight/latest/user/sharing-a-dashboard.html
Question: 17 CertyIQ
A company is implementing a new business application. The application runs on two Amazon EC2 instances and
uses an Amazon S3 bucket for document storage. A solutions architect needs to ensure that the EC2 instances can
access the S3 bucket.
What should the solutions architect do to meet this requirement?
A. Create an IAM role that grants access to the S3 bucket. Attach the role to the EC2 instances.
B. Create an IAM policy that grants access to the S3 bucket. Attach the policy to the EC2 instances.
C. Create an IAM group that grants access to the S3 bucket. Attach the group to the EC2 instances.
D. Create an IAM user that grants access to the S3 bucket. Attach the user account to the EC2 instances.
Answer: A
Explanation:
Always remember that you should associate IAM roles to EC2 instances
Question: 18 CertyIQ
An application development team is designing a microservice that will convert large images to smaller,
compressed images. When a user uploads an image through the web interface, the microservice should store the
image in an Amazon S3 bucket, process and compress the image with an AWS Lambda function, and store the
image in its compressed form in a different S3 bucket.
A solutions architect needs to design a solution that uses durable, stateless components to process the images
automatically.
Which combination of actions will meet these requirements? (Choose two.)
A. Create an Amazon Simple Queue Service (Amazon SQS) queue. Configure the S3 bucket to send a
notification to the SQS queue when an image is uploaded to the S3 bucket.
B. Configure the Lambda function to use the Amazon Simple Queue Service (Amazon SQS) queue as the
invocation source. When the SQS message is successfully processed, delete the message in the queue.
C. Configure the Lambda function to monitor the S3 bucket for new uploads. When an uploaded image is
detected, write the file name to a text file in memory and use the text file to keep track of the images that were
processed.
D. Launch an Amazon EC2 instance to monitor an Amazon Simple Queue Service (Amazon SQS) queue. When
items are added to the queue, log the file name in a text file on the EC2 instance and invoke the Lambda
function.
E. Configure an Amazon EventBridge (Amazon CloudWatch Events) event to monitor the S3 bucket. When an
image is uploaded, send an alert to an Amazon ample Notification Service (Amazon SNS) topic with the
application owner's email address for further processing.
Answer: AB
Explanation:
To design a solution that uses durable, stateless components to process images automatically, a solutions
architect could consider the following actions:
Option A involves creating an SQS queue and configuring the S3 bucket to send a notification to the queue
when an image is uploaded. This allows the application to decouple the image upload process from the image
processing process and ensures that the image processing process is triggered automatically when a new
image is uploaded.
Option B involves configuring the Lambda function to use the SQS queue as the invocation source. When the
SQS message is successfully processed, the message is deleted from the queue. This ensures that the
Lambda function is invoked only once per image and that the image is not processed multiple times.
Question: 19 CertyIQ
A company has a three-tier web application that is deployed on AWS. The web servers are deployed in a public
subnet in a VPC. The application servers and database servers are deployed in private subnets in the same VPC.
The company has deployed a third-party virtual firewall appliance from AWS Marketplace in an inspection VPC.
The appliance is configured with an IP interface that can accept IP packets.
A solutions architect needs to integrate the web application with the appliance to inspect all traffic to the
application before the traffic reaches the web server.
Which solution will meet these requirements with the LEAST operational overhead?
A. Create a Network Load Balancer in the public subnet of the application's VPC to route the traffic to the
appliance for packet inspection.
B. Create an Application Load Balancer in the public subnet of the application's VPC to route the traffic to the
appliance for packet inspection.
C. Deploy a transit gateway in the inspection VPConfigure route tables to route the incoming packets through
the transit gateway.
D. Deploy a Gateway Load Balancer in the inspection VPC. Create a Gateway Load Balancer endpoint to receive
the incoming packets and forward the packets to the appliance.
Answer: D
Explanation:
Reference:
https://aws.amazon.com/blogs/networking-and-content-delivery/scaling-network-traffic-inspection-using-
aws-gateway-load-balancer
Question: 20 CertyIQ
A company wants to improve its ability to clone large amounts of production data into a test environment in the
same AWS Region. The data is stored in Amazon EC2 instances on Amazon Elastic Block Store (Amazon EBS)
volumes. Modifications to the cloned data must not affect the production environment. The software that accesses
this data requires consistently high I/O performance.
A solutions architect needs to minimize the time that is required to clone the production data into the test
environment.
Which solution will meet these requirements?
A. Take EBS snapshots of the production EBS volumes. Restore the snapshots onto EC2 instance store volumes
in the test environment.
B. Configure the production EBS volumes to use the EBS Multi-Attach feature. Take EBS snapshots of the
production EBS volumes. Attach the production EBS volumes to the EC2 instances in the test environment.
C. Take EBS snapshots of the production EBS volumes. Create and initialize new EBS volumes. Attach the new
EBS volumes to EC2 instances in the test environment before restoring the volumes from the production EBS
snapshots.
D. Take EBS snapshots of the production EBS volumes. Turn on the EBS fast snapshot restore feature on the
EBS snapshots. Restore the snapshots into new EBS volumes. Attach the new EBS volumes to EC2 instances in
the test environment.
Answer: D
Explanation:
Amazon EBS fast snapshot restore (FSR) enables you to create a volume from a snapshot that is fully
initialized at creation. This eliminates the latency of I/O operations on a block when it is accessed for the first
time. Volumes that are created using fast snapshot restore instantly deliver all of their provisioned
performance
Reference:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-fast-snapshot-restore.html
Question: 21 CertyIQ
An ecommerce company wants to launch a one-deal-a-day website on AWS. Each day will feature exactly one
product on sale for a period of 24 hours. The company wants to be able to handle millions of requests each hour
with millisecond latency during peak hours.
Which solution will meet these requirements with the LEAST operational overhead?
A. Use Amazon S3 to host the full website in different S3 buckets. Add Amazon CloudFront distributions. Set
the S3 buckets as origins for the distributions. Store the order data in Amazon S3.
B. Deploy the full website on Amazon EC2 instances that run in Auto Scaling groups across multiple Availability
Zones. Add an Application Load Balancer (ALB) to distribute the website traffic. Add another ALB for the
backend APIs. Store the data in Amazon RDS for MySQL.
C. Migrate the full application to run in containers. Host the containers on Amazon Elastic Kubernetes Service
(Amazon EKS). Use the Kubernetes Cluster Autoscaler to increase and decrease the number of pods to process
bursts in traffic. Store the data in Amazon RDS for MySQL.
D. Use an Amazon S3 bucket to host the website's static content. Deploy an Amazon CloudFront distribution.
Set the S3 bucket as the origin. Use Amazon API Gateway and AWS Lambda functions for the backend APIs.
Store the data in Amazon DynamoDB.
Answer: D
Explanation:
Question: 22 CertyIQ
A solutions architect is using Amazon S3 to design the storage architecture of a new digital media application. The
media files must be resilient to the loss of an Availability Zone. Some files are accessed frequently while other
files are rarely accessed in an unpredictable pattern. The solutions architect must minimize the costs of storing
and retrieving the media files.
Which storage option meets these requirements?
A. S3 Standard
B. S3 Intelligent-Tiering
C. S3 Standard-Infrequent Access (S3 Standard-IA)
D. S3 One Zone-Infrequent Access (S3 One Zone-IA)
Answer: B
Explanation:
B "unpredictable pattern" - always go for Intelligent Tiering of S3 It also meets the resiliency requirement:
"S3 Standard, S3 Intelligent-Tiering, S3 Standard-IA, S3 Glacier Instant Retrieval, S3 Glacier Flexible
Retrieval, and S3 Glacier Deep Archive redundantly store objects on multiple devices across a minimum of
three Availability Zones in an AWS Region"
https://docs.aws.amazon.com/AmazonS3/latest/userguide/DataDurability.html
Question: 23 CertyIQ
A company is storing backup files by using Amazon S3 Standard storage. The files are accessed frequently for 1
month. However, the files are not accessed after 1 month. The company must keep the files indefinitely.
Which storage solution will meet these requirements MOST cost-effectively?
Answer: B
Explanation:
The storage solution that will meet these requirements most cost-effectively is B: Create an S3 Lifecycle
configuration to transition objects from S3 Standard to S3 Glacier Deep Archive after 1 month.
Amazon S3 Glacier Deep Archive is a secure, durable, and extremely low-cost Amazon S3 storage class for
long-term retention of data that is rarely accessed and for which retrieval times of several hours are
acceptable. It is the lowest-cost storage option in Amazon S3, making it a cost-effective choice for storing
backup files that are not accessed after 1 month.
You can use an S3 Lifecycle configuration to automatically transition objects from S3 Standard to S3 Glacier
Deep Archive after 1 month. This will minimize the storage costs for the backup files that are not accessed
frequently.
Question: 24 CertyIQ
A company observes an increase in Amazon EC2 costs in its most recent bill. The billing team notices unwanted
vertical scaling of instance types for a couple of EC2 instances. A solutions architect needs to create a graph
comparing the last 2 months of EC2 costs and perform an in-depth analysis to identify the root cause of the
vertical scaling.
How should the solutions architect generate the information with the LEAST operational overhead?
A. Use AWS Budgets to create a budget report and compare EC2 costs based on instance types.
B. Use Cost Explorer's granular filtering feature to perform an in-depth analysis of EC2 costs based on instance
types.
C. Use graphs from the AWS Billing and Cost Management dashboard to compare EC2 costs based on instance
types for the last 2 months.
D. Use AWS Cost and Usage Reports to create a report and send it to an Amazon S3 bucket. Use Amazon
QuickSight with Amazon S3 as a source to generate an interactive graph based on instance types.
Answer: B
Explanation:
AWS Cost Explorer is a tool that enables you to view and analyze your costs and usage. You can explore your
usage and costs using the main graph, the Cost Explorer cost and usage reports, or the Cost Explorer RI
reports. You can view data for up to the last 12 months, forecast how much you're likely to spend for the next
12 months, and get recommendations for what Reserved Instances to purchase. You can use Cost Explorer to
identify areas that need further inquiry and see trends that you can use to understand your costs.
Reference:
https://docs.aws.amazon.com/cost-management/latest/userguide/ce-what-is.html
Question: 25 CertyIQ
A company is designing an application. The application uses an AWS Lambda function to receive information
through Amazon API Gateway and to store the information in an Amazon Aurora PostgreSQL database.
During the proof-of-concept stage, the company has to increase the Lambda quotas significantly to handle the
high volumes of data that the company needs to load into the database. A solutions architect must recommend a
new design to improve scalability and minimize the configuration effort.
Which solution will meet these requirements?
A. Refactor the Lambda function code to Apache Tomcat code that runs on Amazon EC2 instances. Connect the
database by using native Java Database Connectivity (JDBC) drivers.
B. Change the platform from Aurora to Amazon DynamoDProvision a DynamoDB Accelerator (DAX) cluster. Use
the DAX client SDK to point the existing DynamoDB API calls at the DAX cluster.
C. Set up two Lambda functions. Configure one function to receive the information. Configure the other
function to load the information into the database. Integrate the Lambda functions by using Amazon Simple
Notification Service (Amazon SNS).
D. Set up two Lambda functions. Configure one function to receive the information. Configure the other
function to load the information into the database. Integrate the Lambda functions by using an Amazon Simple
Queue Service (Amazon SQS) queue.
Answer: D
Explanation:
A - refactoring can be a solution, BUT requires a LOT of effort - not the answer
B - DynamoDB is NoSQL and Aurora is SQL, so it requires a DB migration... again a LOT of effort, so no the
answer
C and D are similar in structure, but... C uses SNS, which would notify the 2nd Lambda function... provoking the
same bottleneck... not the solution
D uses SQS, so the 2nd lambda function can go to the queue when responsive to keep with the DB load
process.
Usually the app decoupling helps with the performance improvement by distributing load. In this case, the
bottleneck is solved by uses queues... so D is the answer
Question: 26 CertyIQ
A company needs to review its AWS Cloud deployment to ensure that its Amazon S3 buckets do not have
unauthorized configuration changes.
What should a solutions architect do to accomplish this goal?
A. Turn on AWS Config with the appropriate rules.
B. Turn on AWS Trusted Advisor with the appropriate checks.
C. Turn on Amazon Inspector with the appropriate assessment template.
D. Turn on Amazon S3 server access logging. Configure Amazon EventBridge (Amazon Cloud Watch Events).
Answer: A
Explanation:
Answer is A.
Trusted Advisor gives you a general check of your system and identifies ways to optimize your infrastructue
and improve it. While AWS config is more about specific resource. Like stated ( S3 bucket). Config lets you
select particular resource you want to evaluate .
AWS Trusted Advisor is just to analyze your AWS accounts and providers reconmendation.
Question: 27 CertyIQ
A company is launching a new application and will display application metrics on an Amazon CloudWatch
dashboard. The company's product manager needs to access this dashboard periodically. The product manager
does not have an AWS account. A solutions architect must provide access to the product manager by following the
principle of least privilege.
Which solution will meet these requirements?
A. Share the dashboard from the CloudWatch console. Enter the product manager's email address, and
complete the sharing steps. Provide a shareable link for the dashboard to the product manager.
B. Create an IAM user specifically for the product manager. Attach the CloudWatchReadOnlyAccess AWS
managed policy to the user. Share the new login credentials with the product manager. Share the browser URL
of the correct dashboard with the product manager.
C. Create an IAM user for the company's employees. Attach the ViewOnlyAccess AWS managed policy to the
IAM user. Share the new login credentials with the product manager. Ask the product manager to navigate to
the CloudWatch console and locate the dashboard by name in the Dashboards section.
D. Deploy a bastion server in a public subnet. When the product manager requires access to the dashboard,
start the server and share the RDP credentials. On the bastion server, ensure that the browser is configured to
open the dashboard URL with cached AWS credentials that have appropriate permissions to view the
dashboard.
Answer: A
Explanation:
Answer A
Share a single dashboard and designate specific email addresses of the people who can view the dashboard.
Each of these users creates their own password that they must enter to view the dashboard.
Reference:
https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/cloudwatch-dashboard-sharing.html
Question: 28 CertyIQ
A company is migrating applications to AWS. The applications are deployed in different accounts. The company
manages the accounts centrally by using AWS Organizations. The company's security team needs a single sign-on
(SSO) solution across all the company's accounts. The company must continue managing the users and groups in
its on-premises self-managed Microsoft Active Directory.
Which solution will meet these requirements?
A. Enable AWS Single Sign-On (AWS SSO) from the AWS SSO console. Create a one-way forest trust or a one-
way domain trust to connect the company's self-managed Microsoft Active Directory with AWS SSO by using
AWS Directory Service for Microsoft Active Directory.
B. Enable AWS Single Sign-On (AWS SSO) from the AWS SSO console. Create a two-way forest trust to
connect the company's self-managed Microsoft Active Directory with AWS SSO by using AWS Directory
Service for Microsoft Active Directory.
C. Use AWS Directory Service. Create a two-way trust relationship with the company's self-managed Microsoft
Active Directory.
D. Deploy an identity provider (IdP) on premises. Enable AWS Single Sign-On (AWS SSO) from the AWS SSO
console.
Answer: B
Explanation:
In this there is requirement of trust two ways - from On Prem domain to AWS domain. They both will trust each
other. One-way trust : If Domain A is trusting Domain B , users from Domain B can access resources of Domain
A but not vice-versa. So for A - its Outgoing trust and for B its incoming trust. AWS applications (Amazon
Chime, Amazon Connect, Amazon QuickSight, AWS Single Sign-On, Amazon WorkDocs, Amazon WorkMail,
Amazon WorkSpaces, AWS Client VPN, AWS Management Console, and AWS Transfer Family) need to be
able to look up objects from the on-premises domain in order for them to function. This tells you that
authentication needs to flow both ways. For Elaborate details refer.
Reference:
https://aws.amazon.com/blogs/security/everything-you-wanted-to-know-about-trusts-with-aws-managed-
microsoft-ad/
Question: 29 CertyIQ
A company provides a Voice over Internet Protocol (VoIP) service that uses UDP connections. The service consists
of Amazon EC2 instances that run in an Auto Scaling group. The company has deployments across multiple AWS
Regions.
The company needs to route users to the Region with the lowest latency. The company also needs automated
failover between Regions.
Which solution will meet these requirements?
A. Deploy a Network Load Balancer (NLB) and an associated target group. Associate the target group with the
Auto Scaling group. Use the NLB as an AWS Global Accelerator endpoint in each Region.
B. Deploy an Application Load Balancer (ALB) and an associated target group. Associate the target group with
the Auto Scaling group. Use the ALB as an AWS Global Accelerator endpoint in each Region.
C. Deploy a Network Load Balancer (NLB) and an associated target group. Associate the target group with the
Auto Scaling group. Create an Amazon Route 53 latency record that points to aliases for each NLB. Create an
Amazon CloudFront distribution that uses the latency record as an origin.
D. Deploy an Application Load Balancer (ALB) and an associated target group. Associate the target group with
the Auto Scaling group. Create an Amazon Route 53 weighted record that points to aliases for each ALB.
Deploy an Amazon CloudFront distribution that uses the weighted record as an origin.
Answer: A
Explanation:
Question: 30 CertyIQ
A development team runs monthly resource-intensive tests on its general purpose Amazon RDS for MySQL DB
instance with Performance Insights enabled. The testing lasts for 48 hours once a month and is the only process
that uses the database. The team wants to reduce the cost of running the tests without reducing the compute and
memory attributes of the DB instance.
Which solution meets these requirements MOST cost-effectively?
A. Stop the DB instance when tests are completed. Restart the DB instance when required.
B. Use an Auto Scaling policy with the DB instance to automatically scale when tests are completed.
C. Create a snapshot when tests are completed. Terminate the DB instance and restore the snapshot when
required.
D. Modify the DB instance to a low-capacity instance when tests are completed. Modify the DB instance again
when required.
Answer: C
Explanation:
C - Create a manual Snapshot of DB and shift to S3- Standard and Restore form Manual Snapshot when
required. Not A - By stopping the DB although you are not paying for DB hours you are still paying for
Provisioned IOPs , the storage for Stopped DB is more than Snapshot of underlying EBS vol. and Automated
Back ups . Not D - Is possible but not MOST cost effective, no need to run the RDS when not needed
Question: 31 CertyIQ
A company that hosts its web application on AWS wants to ensure all Amazon EC2 instances. Amazon RDS DB
instances. and Amazon Redshift clusters are configured with tags. The company wants to minimize the effort of
configuring and operating this check.
What should a solutions architect do to accomplish this?
A. Use AWS Config rules to define and detect resources that are not properly tagged.
B. Use Cost Explorer to display resources that are not properly tagged. Tag those resources manually.
C. Write API calls to check all resources for proper tag allocation. Periodically run the code on an EC2 instance.
D. Write API calls to check all resources for proper tag allocation. Schedule an AWS Lambda function through
Amazon CloudWatch to periodically run the code.
Answer: A
Explanation:
Use AWS Config rules to define and detect resources that are not properly tagged.
Question: 32 CertyIQ
A development team needs to host a website that will be accessed by other teams. The website contents consist of
HTML, CSS, client-side JavaScript, and images.
Which method is the MOST cost-effective for hosting the website?
A. Containerize the website and host it in AWS Fargate.
B. Create an Amazon S3 bucket and host the website there.
C. Deploy a web server on an Amazon EC2 instance to host the website.
D. Configure an Application Load Balancer with an AWS Lambda target that uses the Express.js framework.
Answer: B
Explanation:
Question: 33 CertyIQ
A company runs an online marketplace web application on AWS. The application serves hundreds of thousands of
users during peak hours. The company needs a scalable, near-real-time solution to share the details of millions of
financial transactions with several other internal applications. Transactions also need to be processed to remove
sensitive data before being stored in a document database for low-latency retrieval.
What should a solutions architect recommend to meet these requirements?
A. Store the transactions data into Amazon DynamoDB. Set up a rule in DynamoDB to remove sensitive data
from every transaction upon write. Use DynamoDB Streams to share the transactions data with other
applications.
B. Stream the transactions data into Amazon Kinesis Data Firehose to store data in Amazon DynamoDB and
Amazon S3. Use AWS Lambda integration with Kinesis Data Firehose to remove sensitive data. Other
applications can consume the data stored in Amazon S3.
C. Stream the transactions data into Amazon Kinesis Data Streams. Use AWS Lambda integration to remove
sensitive data from every transaction and then store the transactions data in Amazon DynamoDB. Other
applications can consume the transactions data off the Kinesis data stream.
D. Store the batched transactions data in Amazon S3 as files. Use AWS Lambda to process every file and
remove sensitive data before updating the files in Amazon S3. The Lambda function then stores the data in
Amazon DynamoDB. Other applications can consume transaction files stored in Amazon S3.
Answer: C
Explanation:
The answer is C,
because Firehose does not suppport DynamoDB and another key word is "data" Kinesis Data Streams is the
correct choice. Pay attention to key words. AWS likes to trick you up to make sure you know the services.
Question: 34 CertyIQ
A company hosts its multi-tier applications on AWS. For compliance, governance, auditing, and security, the
company must track configuration changes on its AWS resources and record a history of API calls made to these
resources.
What should a solutions architect do to meet these requirements?
A. Use AWS CloudTrail to track configuration changes and AWS Config to record API calls.
B. Use AWS Config to track configuration changes and AWS CloudTrail to record API calls.
C. Use AWS Config to track configuration changes and Amazon CloudWatch to record API calls.
D. Use AWS CloudTrail to track configuration changes and Amazon CloudWatch to record API calls.
Answer: B
Explanation:
Config - Assess, audits, and evaluates the configuration and relationships of tag resources.
Question: 35 CertyIQ
A company is preparing to launch a public-facing web application in the AWS Cloud. The architecture consists of
Amazon EC2 instances within a VPC behind an Elastic Load Balancer (ELB). A third-party service is used for the
DNS. The company's solutions architect must recommend a solution to detect and protect against large-scale
DDoS attacks.
Which solution meets these requirements?
Answer: D
Explanation:
AWS Shield Advanced provides expanded DDoS attack protection for your Amazon EC2 instances, Elastic
Load Balancing load balancers, CloudFront distributions, Route 53 hosted zones, and AWS Global Accelerator
standard accelerators
Question: 36 CertyIQ
A company is building an application in the AWS Cloud. The application will store data in Amazon S3 buckets in
two AWS Regions. The company must use an AWS Key Management Service (AWS KMS) customer managed key
to encrypt all data that is stored in the S3 buckets. The data in both S3 buckets must be encrypted and decrypted
with the same KMS key. The data and the key must be stored in each of the two Regions.
Which solution will meet these requirements with the LEAST operational overhead?
A. Create an S3 bucket in each Region. Configure the S3 buckets to use server-side encryption with Amazon S3
managed encryption keys (SSE-S3). Configure replication between the S3 buckets.
B. Create a customer managed multi-Region KMS key. Create an S3 bucket in each Region. Configure
replication between the S3 buckets. Configure the application to use the KMS key with client-side encryption.
C. Create a customer managed KMS key and an S3 bucket in each Region. Configure the S3 buckets to use
server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Configure replication between the
S3 buckets.
D. Create a customer managed KMS key and an S3 bucket in each Region. Configure the S3 buckets to use
server-side encryption with AWS KMS keys (SSE-KMS). Configure replication between the S3 buckets.
Answer: B
Explanation:
B. “The company must use an AWS Key Management Service (AWS KMS) customer managed key to encrypt
all data that is stored in the S3 buckets”. Customer managed keys can be multi-region. SSE-S3 doesn’t allow
for customer managed key, AWS S3 manages the key— server side encryption
Question: 37 CertyIQ
A company recently launched a variety of new workloads on Amazon EC2 instances in its AWS account. The
company needs to create a strategy to access and administer the instances remotely and securely. The company
needs to implement a repeatable process that works with native AWS services and follows the AWS Well-
Architected Framework.
Which solution will meet these requirements with the LEAST operational overhead?
A. Use the EC2 serial console to directly access the terminal interface of each instance for administration.
B. Attach the appropriate IAM role to each existing instance and new instance. Use AWS Systems Manager
Session Manager to establish a remote SSH session.
C. Create an administrative SSH key pair. Load the public key into each EC2 instance. Deploy a bastion host in a
public subnet to provide a tunnel for administration of each instance.
D. Establish an AWS Site-to-Site VPN connection. Instruct administrators to use their local on-premises
machines to connect directly to the instances by using SSH keys across the VPN tunnel.
Answer: B
Explanation:
Option A provides direct access to the terminal interface of each instance, but it may not be practical for
administration purposes and can be cumbersome to manage, especially for multiple instances.
Option C adds operational overhead and introduces additional infrastructure that needs to be managed,
monitored, and secured. It also requires SSH key management and maintenance.
Option D is complex and may not be necessary for remote administration. It also requires administrators to
connect from their local on-premises machines, which adds complexity and potential security risks.
Therefore, option B is the recommended solution as it provides secure, auditable, and repeatable remote
access using IAM roles and AWS Systems Manager Session Manager, with minimal operational overhead.
Question: 38 CertyIQ
A company is hosting a static website on Amazon S3 and is using Amazon Route 53 for DNS. The website is
experiencing increased demand from around the world. The company must decrease latency for users who access
the website.
Which solution meets these requirements MOST cost-effectively?
A. Replicate the S3 bucket that contains the website to all AWS Regions. Add Route 53 geolocation routing
entries.
B. Provision accelerators in AWS Global Accelerator. Associate the supplied IP addresses with the S3 bucket.
Edit the Route 53 entries to point to the IP addresses of the accelerators.
C. Add an Amazon CloudFront distribution in front of the S3 bucket. Edit the Route 53 entries to point to the
CloudFront distribution.
D. Enable S3 Transfer Acceleration on the bucket. Edit the Route 53 entries to point to the new endpoint.
Answer: C
Explanation:
Add an Amazon CloudFront distribution in front of the S3 bucket. Edit the Route 53 entries to point to the
CloudFront distribution.
Question: 39 CertyIQ
A company maintains a searchable repository of items on its website. The data is stored in an Amazon RDS for
MySQL database table that contains more than 10 million rows. The database has 2 TB of General Purpose SSD
storage. There are millions of updates against this data every day through the company's website.
The company has noticed that some insert operations are taking 10 seconds or longer. The company has
determined that the database storage performance is the problem.
Which solution addresses this performance issue?
Answer: A
Explanation:
A: IOPS Provisioned IOPS – Provisioned IOPS storage is designed to meet the needs of I/O-intensive
workloads, particularly database workloads, that require low I/O latency and consistent I/O throughput.
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html
Question: 40 CertyIQ
A company has thousands of edge devices that collectively generate 1 TB of status alerts each day. Each alert is
approximately 2 KB in size. A solutions architect needs to implement a solution to ingest and store the alerts for
future analysis.
The company wants a highly available solution. However, the company needs to minimize costs and does not want
to manage additional infrastructure. Additionally, the company wants to keep 14 days of data available for
immediate analysis and archive any data older than 14 days.
What is the MOST operationally efficient solution that meets these requirements?
A. Create an Amazon Kinesis Data Firehose delivery stream to ingest the alerts. Configure the Kinesis Data
Firehose stream to deliver the alerts to an Amazon S3 bucket. Set up an S3 Lifecycle configuration to transition
data to Amazon S3 Glacier after 14 days.
B. Launch Amazon EC2 instances across two Availability Zones and place them behind an Elastic Load Balancer
to ingest the alerts. Create a script on the EC2 instances that will store the alerts in an Amazon S3 bucket. Set
up an S3 Lifecycle configuration to transition data to Amazon S3 Glacier after 14 days.
C. Create an Amazon Kinesis Data Firehose delivery stream to ingest the alerts. Configure the Kinesis Data
Firehose stream to deliver the alerts to an Amazon OpenSearch Service (Amazon Elasticsearch Service) cluster.
Set up the Amazon OpenSearch Service (Amazon Elasticsearch Service) cluster to take manual snapshots
every day and delete data from the cluster that is older than 14 days.
D. Create an Amazon Simple Queue Service (Amazon SQS) standard queue to ingest the alerts, and set the
message retention period to 14 days. Configure consumers to poll the SQS queue, check the age of the
message, and analyze the message data as needed. If the message is 14 days old, the consumer should copy
the message to an Amazon S3 bucket and delete the message from the SQS queue.
Answer: A
Explanation:
A, it's the most operationally efficient compared to D, which requires a lot of code and infrastructure to
maintain. A is mostly managed (firehose is fully managed and S3 lifecycles are also managed)
Question: 41 CertyIQ
A company's application integrates with multiple software-as-a-service (SaaS) sources for data collection. The
company runs Amazon EC2 instances to receive the data and to upload the data to an Amazon S3 bucket for
analysis. The same EC2 instance that receives and uploads the data also sends a notification to the user when an
upload is complete. The company has noticed slow application performance and wants to improve the performance
as much as possible.
Which solution will meet these requirements with the LEAST operational overhead?
A. Create an Auto Scaling group so that EC2 instances can scale out. Configure an S3 event notification to send
events to an Amazon Simple Notification Service (Amazon SNS) topic when the upload to the S3 bucket is
complete.
B. Create an Amazon AppFlow flow to transfer data between each SaaS source and the S3 bucket. Configure
an S3 event notification to send events to an Amazon Simple Notification Service (Amazon SNS) topic when the
upload to the S3 bucket is complete.
C. Create an Amazon EventBridge (Amazon CloudWatch Events) rule for each SaaS source to send output data.
Configure the S3 bucket as the rule's target. Create a second EventBridge (Cloud Watch Events) rule to send
events when the upload to the S3 bucket is complete. Configure an Amazon Simple Notification Service
(Amazon SNS) topic as the second rule's target.
D. Create a Docker container to use instead of an EC2 instance. Host the containerized application on Amazon
Elastic Container Service (Amazon ECS). Configure Amazon CloudWatch Container Insights to send events to
an Amazon Simple Notification Service (Amazon SNS) topic when the upload to the S3 bucket is complete.
Answer: B
Explanation:
Amazon AppFlow is a fully managed integration service that enables you to securely transfer data between
Software-as-a-Service (SaaS) applications like Salesforce, SAP, Zendesk, Slack, and ServiceNow, and AWS
services like Amazon S3 and Amazon Redshift, in just a few clicks. https://aws.amazon.com/appflow/
Question: 42 CertyIQ
A company runs a highly available image-processing application on Amazon EC2 instances in a single VPC. The
EC2 instances run inside several subnets across multiple Availability Zones. The EC2 instances do not
communicate with each other. However, the EC2 instances download images from Amazon S3 and upload images
to Amazon S3 through a single NAT gateway. The company is concerned about data transfer charges.
What is the MOST cost-effective way for the company to avoid Regional data transfer charges?
Answer: C
Explanation:
Deploying a gateway VPC endpoint for Amazon S3 is the most cost-effective way for the company to avoid
Regional data transfer charges. A gateway VPC endpoint is a network gateway that allows communication
between instances in a VPC and a service, such as Amazon S3, without requiring an Internet gateway or a NAT
device. Data transfer between the VPC and the service through a gateway VPC endpoint is free of charge,
while data transfer between the VPC and the Internet through an Internet gateway or NAT device is subject to
data transfer charges. By using a gateway VPC endpoint, the company can reduce its data transfer costs by
eliminating the need to transfer data through the NAT gateway to access Amazon S3. This option would
provide the required connectivity to Amazon S3 and minimize data transfer charges.
Question: 43 CertyIQ
A company has an on-premises application that generates a large amount of time-sensitive data that is backed up
to Amazon S3. The application has grown and there are user complaints about internet bandwidth limitations. A
solutions architect needs to design a long-term solution that allows for both timely backups to Amazon S3 and
with minimal impact on internet connectivity for internal users.
Which solution meets these requirements?
A. Establish AWS VPN connections and proxy all traffic through a VPC gateway endpoint.
B. Establish a new AWS Direct Connect connection and direct backup traffic through this new connection.
C. Order daily AWS Snowball devices. Load the data onto the Snowball devices and return the devices to AWS
each day.
D. Submit a support ticket through the AWS Management Console. Request the removal of S3 service limits
from the account.
Answer: B
Explanation:
A: VPN also goes through the internet and uses the bandwidth C: daily Snowball transfer is not really a long-
term solution when it comes to cost and efficiency D: S3 limits don't change anything here
So the answer is B
Question: 44 CertyIQ
A company has an Amazon S3 bucket that contains critical data. The company must protect the data from
accidental deletion.
Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)
Answer: AB
Explanation:
Answer: BE
Explanation:
BE so that the lambda function reads the SQS queue and nothing gets lost
A, C, D options are out, since Lambda is fully managed service which provides high availability and scalability
by its own Answers are B and E
Question: 46 CertyIQ
A company has an application that provides marketing services to stores. The services are based on previous
purchases by store customers. The stores upload transaction data to the company through SFTP, and the data is
processed and analyzed to generate new marketing offers. Some of the files can exceed 200 GB in size.
Recently, the company discovered that some of the stores have uploaded files that contain personally identifiable
information (PII) that should not have been included. The company wants administrators to be alerted if PII is
shared again. The company also wants to automate remediation.
What should a solutions architect do to meet these requirements with the LEAST development effort?
A. Use an Amazon S3 bucket as a secure transfer point. Use Amazon Inspector to scan the objects in the
bucket. If objects contain PII, trigger an S3 Lifecycle policy to remove the objects that contain PII.
B. Use an Amazon S3 bucket as a secure transfer point. Use Amazon Macie to scan the objects in the bucket. If
objects contain PII, use Amazon Simple Notification Service (Amazon SNS) to trigger a notification to the
administrators to remove the objects that contain PII.
C. Implement custom scanning algorithms in an AWS Lambda function. Trigger the function when objects are
loaded into the bucket. If objects contain PII, use Amazon Simple Notification Service (Amazon SNS) to trigger a
notification to the administrators to remove the objects that contain PII.
D. Implement custom scanning algorithms in an AWS Lambda function. Trigger the function when objects are
loaded into the bucket. If objects contain PII, use Amazon Simple Email Service (Amazon SES) to trigger a
notification to the administrators and trigger an S3 Lifecycle policy to remove the meats that contain PII.
Answer: B
Explanation:
"To support integration with other services and systems, Macie publishes findings to Amazon EventBridge as
finding events.
Amazon Macie is a data security and data privacy service that uses machine learning (ML) and pattern
matching to discover and protect your sensitive data
Reference:
https://docs.aws.amazon.com/macie/latest/user/findings-monitor.html
Question: 47 CertyIQ
A company needs guaranteed Amazon EC2 capacity in three specific Availability Zones in a specific AWS Region
for an upcoming event that will last 1 week.
What should the company do to guarantee the EC2 capacity?
Answer: D
Explanation:
Reserved instances are for long term so on-demand will be the right choice - Answer D
Question: 48 CertyIQ
A company's website uses an Amazon EC2 instance store for its catalog of items. The company wants to make sure
that the catalog is highly available and that the catalog is stored in a durable location.
What should a solutions architect do to meet these requirements?
Answer: D
Explanation:
instance store is not durable, if it goes down then instance store data is lost. EFS is the only option here that
will provide high availability and durability, plus it can be accessed by multiple instances at the same time
Question: 49 CertyIQ
A company stores call transcript files on a monthly basis. Users access the files randomly within 1 year of the call,
but users access the files infrequently after 1 year. The company wants to optimize its solution by giving users the
ability to query and retrieve files that are less than 1-year-old as quickly as possible. A delay in retrieving older
files is acceptable.
Which solution will meet these requirements MOST cost-effectively?
A. Store individual files with tags in Amazon S3 Glacier Instant Retrieval. Query the tags to retrieve the files
from S3 Glacier Instant Retrieval.
B. Store individual files in Amazon S3 Intelligent-Tiering. Use S3 Lifecycle policies to move the files to S3
Glacier Flexible Retrieval after 1 year. Query and retrieve the files that are in Amazon S3 by using Amazon
Athena. Query and retrieve the files that are in S3 Glacier by using S3 Glacier Select.
C. Store individual files with tags in Amazon S3 Standard storage. Store search metadata for each archive in
Amazon S3 Standard storage. Use S3 Lifecycle policies to move the files to S3 Glacier Instant Retrieval after 1
year. Query and retrieve the files by searching for metadata from Amazon S3.
D. Store individual files in Amazon S3 Standard storage. Use S3 Lifecycle policies to move the files to S3
Glacier Deep Archive after 1 year. Store search metadata in Amazon RDS. Query the files from Amazon RDS.
Retrieve the files from S3 Glacier Deep Archive.
Answer: B
Explanation:
Users access the files randomly S3 Intelligent-Tiering is the ideal storage class for data with unknown,
changing, or unpredictable access patterns, independent of object size or retention period. You can use S3
Intelligent-Tiering as the default storage class for virtually any workload, especially data lakes, data
analytics, new applications, and user-generated content.
https://aws.amazon.com/fr/s3/storage-classes/intelligent-tiering/
Question: 50 CertyIQ
A company has a production workload that runs on 1,000 Amazon EC2 Linux instances. The workload is powered by
third-party software. The company needs to patch the third-party software on all EC2 instances as quickly as
possible to remediate a critical security vulnerability.
What should a solutions architect do to meet these requirements?
A. Create an AWS Lambda function to apply the patch to all EC2 instances.
B. Configure AWS Systems Manager Patch Manager to apply the patch to all EC2 instances.
C. Schedule an AWS Systems Manager maintenance window to apply the patch to all EC2 instances.
D. Use AWS Systems Manager Run Command to run a custom command that applies the patch to all EC2
instances.
Answer: D
Explanation:
AWS Systems Manager Run Command allows the company to run commands or scripts on multiple EC2
instances. By using Run Command, the company can quickly and easily apply the patch to all 1,000 EC2
instances to remediate the security vulnerability.
Creating an AWS Lambda function to apply the patch to all EC2 instances would not be a suitable solution, as
Lambda functions are not designed to run on EC2 instances. Configuring AWS Systems Manager Patch
Manager to apply the patch to all EC2 instances would not be a suitable solution, as Patch Manager is not
designed to apply third-party software patches. Scheduling an AWS Systems Manager maintenance window
to apply the patch to all EC2 instances would not be a suitable solution, as maintenance windows are not
designed to apply patches to third-party software
Reference:
https://docs.aws.amazon.com/systems-manager/latest/userguide/about-windows-app-patching.html
Question: 51 CertyIQ
A company is developing an application that provides order shipping statistics for retrieval by a REST API. The
company wants to extract the shipping statistics, organize the data into an easy-to-read HTML format, and send
the report to several email addresses at the same time every morning.
Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)
A. Configure the application to send the data to Amazon Kinesis Data Firehose.
B. Use Amazon Simple Email Service (Amazon SES) to format the data and to send the report by email.
C. Create an Amazon EventBridge (Amazon CloudWatch Events) scheduled event that invokes an AWS Glue job
to query the application's API for the data.
D. Create an Amazon EventBridge (Amazon CloudWatch Events) scheduled event that invokes an AWS Lambda
function to query the application's API for the data.
E. Store the application data in Amazon S3. Create an Amazon Simple Notification Service (Amazon SNS) topic
as an S3 event destination to send the report by email.
Answer: BD
Explanation:
Reference:
https://docs.aws.amazon.com/ses/latest/dg/send-email-formatted.html
Question: 52 CertyIQ
A company wants to migrate its on-premises application to AWS. The application produces output files that vary in
size from tens of gigabytes to hundreds of terabytes. The application data must be stored in a standard file system
structure. The company wants a solution that scales automatically. is highly available, and requires minimum
operational overhead.
Which solution will meet these requirements?
A. Migrate the application to run as containers on Amazon Elastic Container Service (Amazon ECS). Use Amazon
S3 for storage.
B. Migrate the application to run as containers on Amazon Elastic Kubernetes Service (Amazon EKS). Use
Amazon Elastic Block Store (Amazon EBS) for storage.
C. Migrate the application to Amazon EC2 instances in a Multi-AZ Auto Scaling group. Use Amazon Elastic File
System (Amazon EFS) for storage.
D. Migrate the application to Amazon EC2 instances in a Multi-AZ Auto Scaling group. Use Amazon Elastic
Block Store (Amazon EBS) for storage.
Answer: C
Explanation:
Question: 53 CertyIQ
A company needs to store its accounting records in Amazon S3. The records must be immediately accessible for 1
year and then must be archived for an additional 9 years. No one at the company, including administrative users
and root users, can be able to delete the records during the entire 10-year period. The records must be stored with
maximum resiliency.
Which solution will meet these requirements?
A. Store the records in S3 Glacier for the entire 10-year period. Use an access control policy to deny deletion of
the records for a period of 10 years.
B. Store the records by using S3 Intelligent-Tiering. Use an IAM policy to deny deletion of the records. After 10
years, change the IAM policy to allow deletion.
C. Use an S3 Lifecycle policy to transition the records from S3 Standard to S3 Glacier Deep Archive after 1 year.
Use S3 Object Lock in compliance mode for a period of 10 years.
D. Use an S3 Lifecycle policy to transition the records from S3 Standard to S3 One Zone-Infrequent Access (S3
One Zone-IA) after 1 year. Use S3 Object Lock in governance mode for a period of 10 years.
Answer: C
Explanation:
Use an S3 Lifecycle policy to transition the records from S3 Standard to S3 Glacier Deep Archive after 1 year.
Use S3 Object Lock in compliance mode for a period of 10 years.
Question: 54 CertyIQ
A company runs multiple Windows workloads on AWS. The company's employees use Windows file shares that are
hosted on two Amazon EC2 instances. The file shares synchronize data between themselves and maintain
duplicate copies. The company wants a highly available and durable storage solution that preserves how users
currently access the files.
What should a solutions architect do to meet these requirements?
A. Migrate all the data to Amazon S3. Set up IAM authentication for users to access files.
B. Set up an Amazon S3 File Gateway. Mount the S3 File Gateway on the existing EC2 instances.
C. Extend the file share environment to Amazon FSx for Windows File Server with a Multi-AZ configuration.
Migrate all the data to FSx for Windows File Server.
D. Extend the file share environment to Amazon Elastic File System (Amazon EFS) with a Multi-AZ
configuration. Migrate all the data to Amazon EFS.
Answer: C
Explanation:
Extend the file share environment to Amazon FSx for Windows File Server with a Multi-AZ configuration.
Migrate all the data to FSx for Windows File Server.
Question: 55 CertyIQ
A solutions architect is developing a VPC architecture that includes multiple subnets. The architecture will host
applications that use Amazon EC2 instances and Amazon RDS DB instances. The architecture consists of six
subnets in two Availability Zones. Each Availability Zone includes a public subnet, a private subnet, and a
dedicated subnet for databases. Only EC2 instances that run in the private subnets can have access to the RDS
databases.
Which solution will meet these requirements?
A. Create a new route table that excludes the route to the public subnets' CIDR blocks. Associate the route
table with the database subnets.
B. Create a security group that denies inbound traffic from the security group that is assigned to instances in
the public subnets. Attach the security group to the DB instances.
C. Create a security group that allows inbound traffic from the security group that is assigned to instances in
the private subnets. Attach the security group to the DB instances.
D. Create a new peering connection between the public subnets and the private subnets. Create a different
peering connection between the private subnets and the database subnets.
Answer: C
Explanation:
Inside a VPC, traffic locally between different subnets cannot be restricted by routing but incase they are in
different VPCs then it would be possible. This is imp Gain in VPC - So only method is Security Groups - like
EC2 also RDS also has Security Groups to restrict traffic to database instances A: doesn't fully configure the
traffic flow
Question: 56 CertyIQ
A company has registered its domain name with Amazon Route 53. The company uses Amazon API Gateway in the
ca-central-1 Region as a public interface for its backend microservice APIs. Third-party services consume the APIs
securely. The company wants to design its API Gateway URL with the company's domain name and corresponding
certificate so that the third-party services can use HTTPS.
Which solution will meet these requirements?
A. Create stage variables in API Gateway with Name="Endpoint-URL" and Value="Company Domain Name" to
overwrite the default URL. Import the public certificate associated with the company's domain name into AWS
Certificate Manager (ACM).
B. Create Route 53 DNS records with the company's domain name. Point the alias record to the Regional API
Gateway stage endpoint. Import the public certificate associated with the company's domain name into AWS
Certificate Manager (ACM) in the us-east-1 Region.
C. Create a Regional API Gateway endpoint. Associate the API Gateway endpoint with the company's domain
name. Import the public certificate associated with the company's domain name into AWS Certificate Manager
(ACM) in the same Region. Attach the certificate to the API Gateway endpoint. Configure Route 53 to route
traffic to the API Gateway endpoint.
D. Create a Regional API Gateway endpoint. Associate the API Gateway endpoint with the company's domain
name. Import the public certificate associated with the company's domain name into AWS Certificate Manager
(ACM) in the us-east-1 Region. Attach the certificate to the API Gateway APIs. Create Route 53 DNS records
with the company's domain name. Point an A record to the company's domain name.
Answer: C
Explanation:
C. we don't need to attach a certificate in us-east-1, if is not for cloudfront. In our case the target is ca-central-
1.
https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-regional-api-custom-domain-
create.html
Question: 57 CertyIQ
A company is running a popular social media website. The website gives users the ability to upload images to share
with other users. The company wants to make sure that the images do not contain inappropriate content. The
company needs a solution that minimizes development effort.
What should a solutions architect do to meet these requirements?
A. Use Amazon Comprehend to detect inappropriate content. Use human review for low-confidence predictions.
B. Use Amazon Rekognition to detect inappropriate content. Use human review for low-confidence predictions.
C. Use Amazon SageMaker to detect inappropriate content. Use ground truth to label low-confidence
predictions.
D. Use AWS Fargate to deploy a custom machine learning model to detect inappropriate content. Use ground
truth to label low-confidence predictions.
Answer: B
Explanation:
Reference:
https://docs.aws.amazon.com/rekognition/latest/dg/moderation.html?pg=ln&sec=ft
Question: 58 CertyIQ
A company wants to run its critical applications in containers to meet requirements for scalability and availability.
The company prefers to focus on maintenance of the critical applications. The company does not want to be
responsible for provisioning and managing the underlying infrastructure that runs the containerized workload.
What should a solutions architect do to meet these requirements?
Answer: C
Explanation:
AWS Fargate is a serverless, pay-as-you-go compute engine that lets you focus on building applications
without having to manage servers. AWS Fargate is compatible with Amazon Elastic Container Service (ECS)
and Amazon Elastic Kubernetes Service (EKS).
Reference:
https://aws.amazon.com/fr/fargate/
Question: 59 CertyIQ
A company hosts more than 300 global websites and applications. The company requires a platform to analyze
more than 30 TB of clickstream data each day.
What should a solutions architect do to transmit and process the clickstream data?
A. Design an AWS Data Pipeline to archive the data to an Amazon S3 bucket and run an Amazon EMR cluster
with the data to generate analytics.
B. Create an Auto Scaling group of Amazon EC2 instances to process the data and send it to an Amazon S3
data lake for Amazon Redshift to use for analysis.
C. Cache the data to Amazon CloudFront. Store the data in an Amazon S3 bucket. When an object is added to
the S3 bucket. run an AWS Lambda function to process the data for analysis.
D. Collect the data from Amazon Kinesis Data Streams. Use Amazon Kinesis Data Firehose to transmit the data
to an Amazon S3 data lake. Load the data in Amazon Redshift for analysis.
Answer: D
Explanation:
Option D is the most appropriate solution for transmitting and processing the clickstream data in this
scenario.
Amazon Kinesis Data Streams is a highly scalable and durable service that enables real-time processing of
streaming data at a high volume and high rate. You can use Kinesis Data Streams to collect and process the
clickstream data in real-time.
Amazon Kinesis Data Firehose is a fully managed service that loads streaming data into data stores and
analytics tools. You can use Kinesis Data Firehose to transmit the data from Kinesis Data Streams to an
Amazon S3 data lake.
Once the data is in the data lake, you can use Amazon Redshift to load the data and perform analysis on it.
Amazon Redshift is a fully managed, petabyte-scale data warehouse service that allows you to quickly and
efficiently analyze data using SQL and your existing business intelligence tools.
Reference:
https://aws.amazon.com/es/blogs/big-data/real-time-analytics-with-amazon-redshift-streaming-ingestion/
Question: 60 CertyIQ
A company has a website hosted on AWS. The website is behind an Application Load Balancer (ALB) that is
configured to handle HTTP and HTTPS separately. The company wants to forward all requests to the website so
that the requests will use HTTPS.
What should a solutions architect do to meet this requirement?
Answer: C
Explanation:
To meet the requirement of forwarding all requests to the website so that the requests will use HTTPS, a
solutions architect can create a listener rule on the ALB that redirects HTTP traffic to HTTPS. This can be
done by creating a rule with a condition that matches all HTTP traffic and a rule action that redirects the
traffic to the HTTPS listener. The HTTPS listener should already be configured to accept HTTPS traffic and
forward it to the target group.
Reference:
https://docs.aws.amazon.com/fr_fr/elasticloadbalancing/latest/application/create-https-listener.html
https://aws.amazon.com/fr/premiumsupport/knowledge-center/elb-redirect-http-to-https-using-alb/
Question: 61 CertyIQ
A company is developing a two-tier web application on AWS. The company's developers have deployed the
application on an Amazon EC2 instance that connects directly to a backend Amazon RDS database. The company
must not hardcode database credentials in the application. The company must also implement a solution to
automatically rotate the database credentials on a regular basis.
Which solution will meet these requirements with the LEAST operational overhead?
A. Store the database credentials in the instance metadata. Use Amazon EventBridge (Amazon CloudWatch
Events) rules to run a scheduled AWS Lambda function that updates the RDS credentials and instance
metadata at the same time.
B. Store the database credentials in a configuration file in an encrypted Amazon S3 bucket. Use Amazon
EventBridge (Amazon CloudWatch Events) rules to run a scheduled AWS Lambda function that updates the
RDS credentials and the credentials in the configuration file at the same time. Use S3 Versioning to ensure the
ability to fall back to previous values.
C. Store the database credentials as a secret in AWS Secrets Manager. Turn on automatic rotation for the
secret. Attach the required permission to the EC2 role to grant access to the secret.
D. Store the database credentials as encrypted parameters in AWS Systems Manager Parameter Store. Turn on
automatic rotation for the encrypted parameters. Attach the required permission to the EC2 role to grant
access to the encrypted parameters.
Answer: C
Explanation:
Reference:
https://docs.aws.amazon.com/secretsmanager/latest/userguide/create_database_secret.html
Question: 62 CertyIQ
A company is deploying a new public web application to AWS. The application will run behind an Application Load
Balancer (ALB). The application needs to be encrypted at the edge with an SSL/TLS certificate that is issued by an
external certificate authority (CA). The certificate must be rotated each year before the certificate expires.
What should a solutions architect do to meet these requirements?
A. Use AWS Certificate Manager (ACM) to issue an SSL/TLS certificate. Apply the certificate to the ALB. Use
the managed renewal feature to automatically rotate the certificate.
B. Use AWS Certificate Manager (ACM) to issue an SSL/TLS certificate. Import the key material from the
certificate. Apply the certificate to the ALUse the managed renewal feature to automatically rotate the
certificate.
C. Use AWS Certificate Manager (ACM) Private Certificate Authority to issue an SSL/TLS certificate from the
root CA. Apply the certificate to the ALB. Use the managed renewal feature to automatically rotate the
certificate.
D. Use AWS Certificate Manager (ACM) to import an SSL/TLS certificate. Apply the certificate to the ALB. Use
Amazon EventBridge (Amazon CloudWatch Events) to send a notification when the certificate is nearing
expiration. Rotate the certificate manually.
Answer: D
Explanation:
When you have a cert issued by external CA, you can import and monitor for its expiration. AWS issued
certificate contradicts the statement
It's a third-party certificate, hence AWS cannot manage renewal automatically. The closest thing you can do
is to send a notification to renew the 3rd party certificate. It's a third-party certificate, hence AWS cannot
manage renewal automatically. The closest thing you can do is to send a notification to renew the 3rd party
certificate.
Question: 63 CertyIQ
A company runs its infrastructure on AWS and has a registered base of 700,000 users for its document
management application. The company intends to create a product that converts large .pdf files to .jpg image files.
The .pdf files average 5 MB in size. The company needs to store the original files and the converted files. A
solutions architect must design a scalable solution to accommodate demand that will grow rapidly over time.
Which solution meets these requirements MOST cost-effectively?
A. Save the .pdf files to Amazon S3. Configure an S3 PUT event to invoke an AWS Lambda function to convert
the files to .jpg format and store them back in Amazon S3.
B. Save the .pdf files to Amazon DynamoDUse the DynamoDB Streams feature to invoke an AWS Lambda
function to convert the files to .jpg format and store them back in DynamoDB.
C. Upload the .pdf files to an AWS Elastic Beanstalk application that includes Amazon EC2 instances, Amazon
Elastic Block Store (Amazon EBS) storage, and an Auto Scaling group. Use a program in the EC2 instances to
convert the files to .jpg format. Save the .pdf files and the .jpg files in the EBS store.
D. Upload the .pdf files to an AWS Elastic Beanstalk application that includes Amazon EC2 instances, Amazon
Elastic File System (Amazon EFS) storage, and an Auto Scaling group. Use a program in the EC2 instances to
convert the file to .jpg format. Save the .pdf files and the .jpg files in the EBS store.
Answer: A
Explanation:
A. Elastic BeanStalk is expensive, and DocumentDB has a 400KB max to upload files. So Lambda and S3
should be the one
Question: 64 CertyIQ
A company has more than 5 TB of file data on Windows file servers that run on premises. Users and applications
interact with the data each day.
The company is moving its Windows workloads to AWS. As the company continues this process, the company
requires access to AWS and on-premises file storage with minimum latency. The company needs a solution that
minimizes operational overhead and requires no significant changes to the existing file access patterns. The
company uses an AWS Site-to-Site VPN connection for connectivity to AWS.
What should a solutions architect do to meet these requirements?
A. Deploy and configure Amazon FSx for Windows File Server on AWS. Move the on-premises file data to FSx
for Windows File Server. Reconfigure the workloads to use FSx for Windows File Server on AWS.
B. Deploy and configure an Amazon S3 File Gateway on premises. Move the on-premises file data to the S3 File
Gateway. Reconfigure the on-premises workloads and the cloud workloads to use the S3 File Gateway.
C. Deploy and configure an Amazon S3 File Gateway on premises. Move the on-premises file data to Amazon
S3. Reconfigure the workloads to use either Amazon S3 directly or the S3 File Gateway. depending on each
workload's location.
D. Deploy and configure Amazon FSx for Windows File Server on AWS. Deploy and configure an Amazon FSx
File Gateway on premises. Move the on-premises file data to the FSx File Gateway. Configure the cloud
workloads to use FSx for Windows File Server on AWS. Configure the on-premises workloads to use the FSx
File Gateway.
Answer: D
Explanation:
Since access from both on-prem and AWS is needed, A isn't sufficient. So D.
Reference:
https://docs.aws.amazon.com/filegateway/latest/filefsxw/what-is-file-fsxw.html
Question: 65 CertyIQ
A hospital recently deployed a RESTful API with Amazon API Gateway and AWS Lambda. The hospital uses API
Gateway and Lambda to upload reports that are in PDF format and JPEG format. The hospital needs to modify the
Lambda code to identify protected health information (PHI) in the reports.
Which solution will meet these requirements with the LEAST operational overhead?
A. Use existing Python libraries to extract the text from the reports and to identify the PHI from the extracted
text.
B. Use Amazon Textract to extract the text from the reports. Use Amazon SageMaker to identify the PHI from
the extracted text.
C. Use Amazon Textract to extract the text from the reports. Use Amazon Comprehend Medical to identify the
PHI from the extracted text.
D. Use Amazon Rekognition to extract the text from the reports. Use Amazon Comprehend Medical to identify
the PHI from the extracted text.
Answer: C
Explanation:
https://aws.amazon.com/blogs/machine-learning/amazon-textract-is-now-hipaa-eligible
Question: 66 CertyIQ
A company has an application that generates a large number of files, each approximately 5 MB in size. The files
are stored in Amazon S3. Company policy requires the files to be stored for 4 years before they can be deleted.
Immediate accessibility is always required as the files contain critical business data that is not easy to reproduce.
The files are frequently accessed in the first 30 days of the object creation but are rarely accessed after the first
30 days.
Which storage solution is MOST cost-effective?
A. Create an S3 bucket lifecycle policy to move files from S3 Standard to S3 Glacier 30 days from object
creation. Delete the files 4 years after object creation.
B. Create an S3 bucket lifecycle policy to move files from S3 Standard to S3 One Zone-Infrequent Access (S3
One Zone-IA) 30 days from object creation. Delete the files 4 years after object creation.
C. Create an S3 bucket lifecycle policy to move files from S3 Standard to S3 Standard-Infrequent Access (S3
Standard-IA) 30 days from object creation. Delete the files 4 years after object creation.
D. Create an S3 bucket lifecycle policy to move files from S3 Standard to S3 Standard-Infrequent Access (S3
Standard-IA) 30 days from object creation. Move the files to S3 Glacier 4 years after object creation.
Answer: C
Explanation:
> Immediate accessibility is always required as the files contain critical business data that is not easy to
reproduce
If they do not explicitly mention that they are using Glacier Instant Retrieval, we should assume that Glacier ->
takes more time to retrieve and may not meet the requirements
Question: 67 CertyIQ
A company hosts an application on multiple Amazon EC2 instances. The application processes messages from an
Amazon SQS queue, writes to an Amazon RDS table, and deletes the message from the queue. Occasional
duplicate records are found in the RDS table. The SQS queue does not contain any duplicate messages.
What should a solutions architect do to ensure messages are being processed once only?
Answer: D
Explanation:
In case of SQS - multi-consumers if one consumer has already picked the message and is processing, in
meantime other consumer can pick it up and process the message there by two copies are added at the end.
To avoid this the message is made invisible from the time its picked and deleted after processing. This
visibility timeout is increased according to max time taken to process the message
Reference:
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-visibility-
timeout.html
Question: 68 CertyIQ
A solutions architect is designing a new hybrid architecture to extend a company's on-premises infrastructure to
AWS. The company requires a highly available connection with consistent low latency to an AWS Region. The
company needs to minimize costs and is willing to accept slower traffic if the primary connection fails.
What should the solutions architect do to meet these requirements?
A. Provision an AWS Direct Connect connection to a Region. Provision a VPN connection as a backup if the
primary Direct Connect connection fails.
B. Provision a VPN tunnel connection to a Region for private connectivity. Provision a second VPN tunnel for
private connectivity and as a backup if the primary VPN connection fails.
C. Provision an AWS Direct Connect connection to a Region. Provision a second Direct Connect connection to
the same Region as a backup if the primary Direct Connect connection fails.
D. Provision an AWS Direct Connect connection to a Region. Use the Direct Connect failover attribute from the
AWS CLI to automatically create a backup connection if the primary Direct Connect connection fails.
Answer: A
Explanation:
Question: 69 CertyIQ
A company is running a business-critical web application on Amazon EC2 instances behind an Application Load
Balancer. The EC2 instances are in an Auto Scaling group. The application uses an Amazon Aurora PostgreSQL
database that is deployed in a single Availability Zone. The company wants the application to be highly available
with minimum downtime and minimum loss of data.
Which solution will meet these requirements with the LEAST operational effort?
A. Place the EC2 instances in different AWS Regions. Use Amazon Route 53 health checks to redirect traffic.
Use Aurora PostgreSQL Cross-Region Replication.
B. Configure the Auto Scaling group to use multiple Availability Zones. Configure the database as Multi-AZ.
Configure an Amazon RDS Proxy instance for the database.
C. Configure the Auto Scaling group to use one Availability Zone. Generate hourly snapshots of the database.
Recover the database from the snapshots in the event of a failure.
D. Configure the Auto Scaling group to use multiple AWS Regions. Write the data from the application to
Amazon S3. Use S3 Event Notifications to launch an AWS Lambda function to write the data to the database.
Answer: B
Explanation:
By configuring the Auto Scaling group to use multiple Availability Zones, the application will be able to
continue running even if one Availability Zone goes down. Configuring the database as Multi-AZ will also
ensure that the database remains available in the event of a failure in one Availability Zone. Using an Amazon
RDS Proxy instance for the database will allow the application to automatically route traffic to healthy
database instances, further increasing the availability of the application. This solution will meet the
requirements for high availability with minimal operational effort.
Question: 70 CertyIQ
A company's HTTP application is behind a Network Load Balancer (NLB). The NLB's target group is configured to
use an Amazon EC2 Auto Scaling group with multiple EC2 instances that run the web service.
The company notices that the NLB is not detecting HTTP errors for the application. These errors require a manual
restart of the EC2 instances that run the web service. The company needs to improve the application's availability
without writing custom scripts or code.
What should a solutions architect do to meet these requirements?
A. Enable HTTP health checks on the NLB, supplying the URL of the company's application.
B. Add a cron job to the EC2 instances to check the local application's logs once each minute. If HTTP errors are
detected. the application will restart.
C. Replace the NLB with an Application Load Balancer. Enable HTTP health checks by supplying the URL of the
company's application. Configure an Auto Scaling action to replace unhealthy instances.
D. Create an Amazon Cloud Watch alarm that monitors the UnhealthyHostCount metric for the NLB. Configure
an Auto Scaling action to replace unhealthy instances when the alarm is in the ALARM state.
Answer: C
Explanation:
I would choose A, as NLB supports HTTP and HTTPS Health Checks, BUT you can't put any URL (as proposed),
only the node IP addresses.
Question: 71 CertyIQ
A company runs a shopping application that uses Amazon DynamoDB to store customer information. In case of
data corruption, a solutions architect needs to design a solution that meets a recovery point objective (RPO) of 15
minutes and a recovery time objective (RTO) of 1 hour.
What should the solutions architect recommend to meet these requirements?
A. Configure DynamoDB global tables. For RPO recovery, point the application to a different AWS Region.
B. Configure DynamoDB point-in-time recovery. For RPO recovery, restore to the desired point in time.
C. Export the DynamoDB data to Amazon S3 Glacier on a daily basis. For RPO recovery, import the data from S3
Glacier to DynamoDB.
D. Schedule Amazon Elastic Block Store (Amazon EBS) snapshots for the DynamoDB table every 15 minutes.
For RPO recovery, restore the DynamoDB table by using the EBS snapshot.
Answer: B
Explanation:
A - DynamoDB global tables provides multi-Region, and multi-active database, but it not valid "in case of data
corruption". In this case, you need a backup. This solutions isn't valid.
**B** - Point in Time Recovery is designed as a continuous backup juts to recover it fast. It covers perfectly the
RPO, and probably the RTO.
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/PointInTimeRecovery.html
Question: 72 CertyIQ
A company runs a photo processing application that needs to frequently upload and download pictures from
Amazon S3 buckets that are located in the same AWS Region. A solutions architect has noticed an increased cost
in data transfer fees and needs to implement a solution to reduce these costs.
How can the solutions architect meet this requirement?
A. Deploy Amazon API Gateway into a public subnet and adjust the route table to route S3 calls through it.
B. Deploy a NAT gateway into a public subnet and attach an endpoint policy that allows access to the S3
buckets.
C. Deploy the application into a public subnet and allow it to route through an internet gateway to access the
S3 buckets.
D. Deploy an S3 VPC gateway endpoint into the VPC and attach an endpoint policy that allows access to the S3
buckets.
Answer: D
Explanation:
The correct answer is Option D. Deploy an S3 VPC gateway endpoint into the VPC and attach an endpoint
policy that allows access to the S3 buckets.
By deploying an S3 VPC gateway endpoint, the application can access the S3 buckets over a private network
connection within the VPC, eliminating the need for data transfer over the internet. This can help reduce data
transfer fees as well as improve the performance of the application. The endpoint policy can be used to
specify which S3 buckets the application has access to.
Question: 73 CertyIQ
A company recently launched Linux-based application instances on Amazon EC2 in a private subnet and launched
a Linux-based bastion host on an Amazon EC2 instance in a public subnet of a VPC. A solutions architect needs to
connect from the on-premises network, through the company's internet connection, to the bastion host, and to the
application servers. The solutions architect must make sure that the security groups of all the EC2 instances will
allow that access.
Which combination of steps should the solutions architect take to meet these requirements? (Choose two.)
A. Replace the current security group of the bastion host with one that only allows inbound access from the
application instances.
B. Replace the current security group of the bastion host with one that only allows inbound access from the
internal IP range for the company.
C. Replace the current security group of the bastion host with one that only allows inbound access from the
external IP range for the company.
D. Replace the current security group of the application instances with one that allows inbound SSH access
from only the private IP address of the bastion host.
E. Replace the current security group of the application instances with one that allows inbound SSH access
from only the public IP address of the bastion host.
Answer: CD
Explanation:
C because from on-prem network to bastion through internet (using on-prem resource's public IP),
D because bastion and ec2 is in same VPC, meaning bastion can communicate to EC2 via it's private IP
address
Question: 74 CertyIQ
A solutions architect is designing a two-tier web application. The application consists of a public-facing web tier
hosted on Amazon EC2 in public subnets. The database tier consists of Microsoft SQL Server running on Amazon
EC2 in a private subnet. Security is a high priority for the company.
How should security groups be configured in this situation? (Choose two.)
A. Configure the security group for the web tier to allow inbound traffic on port 443 from 0.0.0.0/0.
B. Configure the security group for the web tier to allow outbound traffic on port 443 from 0.0.0.0/0.
C. Configure the security group for the database tier to allow inbound traffic on port 1433 from the security
group for the web tier.
D. Configure the security group for the database tier to allow outbound traffic on ports 443 and 1433 to the
security group for the web tier.
E. Configure the security group for the database tier to allow inbound traffic on ports 443 and 1433 from the
security group for the web tier.
Answer: AC
Explanation:
EC2 web on public subnets + EC2 SQL on private subnet + security is high priority. So, Option A to allow
HTTPS from everywhere. Plus option C to allow SQL connection from the web instance.
Question: 75 CertyIQ
A company wants to move a multi-tiered application from on premises to the AWS Cloud to improve the
application's performance. The application consists of application tiers that communicate with each other by way
of RESTful services. Transactions are dropped when one tier becomes overloaded. A solutions architect must
design a solution that resolves these issues and modernizes the application.
Which solution meets these requirements and is the MOST operationally efficient?
A. Use Amazon API Gateway and direct transactions to the AWS Lambda functions as the application layer. Use
Amazon Simple Queue Service (Amazon SQS) as the communication layer between application services.
B. Use Amazon CloudWatch metrics to analyze the application performance history to determine the servers'
peak utilization during the performance failures. Increase the size of the application server's Amazon EC2
instances to meet the peak requirements.
C. Use Amazon Simple Notification Service (Amazon SNS) to handle the messaging between application servers
running on Amazon EC2 in an Auto Scaling group. Use Amazon CloudWatch to monitor the SNS queue length
and scale up and down as required.
D. Use Amazon Simple Queue Service (Amazon SQS) to handle the messaging between application servers
running on Amazon EC2 in an Auto Scaling group. Use Amazon CloudWatch to monitor the SQS queue length
and scale up when communication failures are detected.
Answer: A
Explanation:
Agree with A>>> Lambda = serverless + autoscale (modernize), SQS= decouple (no more drops)
Question: 76 CertyIQ
A company receives 10 TB of instrumentation data each day from several machines located at a single factory. The
data consists of JSON files stored on a storage area network (SAN) in an on-premises data center located within
the factory. The company wants to send this data to Amazon S3 where it can be accessed by several additional
systems that provide critical near-real-time analytics. A secure transfer is important because the data is
considered sensitive.
Which solution offers the MOST reliable data transfer?
Answer: B
Explanation:
B - A SAN presents storage devices to a host such that the storage appears to be locally attached.
DMS is for databases and here refers to “JSON files”. Public internet is not reliable. So best option is B.
Reference:
https://docs.aws.amazon.com/directconnect/latest/UserGuide/encryption-in-transit.html
Question: 77 CertyIQ
A company needs to configure a real-time data ingestion architecture for its application. The company needs an
API, a process that transforms data as the data is streamed, and a storage solution for the data.
Which solution will meet these requirements with the LEAST operational overhead?
A. Deploy an Amazon EC2 instance to host an API that sends data to an Amazon Kinesis data stream. Create an
Amazon Kinesis Data Firehose delivery stream that uses the Kinesis data stream as a data source. Use AWS
Lambda functions to transform the data. Use the Kinesis Data Firehose delivery stream to send the data to
Amazon S3.
B. Deploy an Amazon EC2 instance to host an API that sends data to AWS Glue. Stop source/destination
checking on the EC2 instance. Use AWS Glue to transform the data and to send the data to Amazon S3.
C. Configure an Amazon API Gateway API to send data to an Amazon Kinesis data stream. Create an Amazon
Kinesis Data Firehose delivery stream that uses the Kinesis data stream as a data source. Use AWS Lambda
functions to transform the data. Use the Kinesis Data Firehose delivery stream to send the data to Amazon S3.
D. Configure an Amazon API Gateway API to send data to AWS Glue. Use AWS Lambda functions to transform
the data. Use AWS Glue to send the data to Amazon S3.
Answer: C
Explanation:
A) - You don't need to deploy an EC2 instance to host an API - Operational overhead
(B) - Same as A
(D) - AWS Glue gets data from S3, not from API GW. AWS Glue could do ETL by itself, so don't need lambda.
https://aws.amazon.com/glue/
Question: 78 CertyIQ
A company needs to keep user transaction data in an Amazon DynamoDB table. The company must retain the data
for 7 years.
What is the MOST operationally efficient solution that meets these requirements?
Answer: B
Explanation:
B "Amazon DynamoDB offers two types of backups: point-in-time recovery (PITR) and on-demand backups.
(==> D is not the answer) PITR is used to recover your table to any point in time in a rolling 35 day window,
which is used to help customers mitigate accidental deletes or writes to their tables from bad code, malicious
access, or user error. (==> A isn't the answer) On demand backups are designed for long-term archiving and
retention, which is typically used to help customers meet compliance and regulatory requirements. This is the
second of a series of two blog posts about using AWS Backup to set up scheduled on-demand backups for
Amazon DynamoDB. Part 1 presents the steps to set up a scheduled backup for DynamoDB tables from the
AWS Management Console." (==> Not the DynamoBD console and C isn't the answer either)
https://aws.amazon.com/blogs/database/part-2-set-up-scheduled-backups-for-amazon-dynamodb-using-
aws-backup/
Question: 79 CertyIQ
A company is planning to use an Amazon DynamoDB table for data storage. The company is concerned about cost
optimization. The table will not be used on most mornings. In the evenings, the read and write traffic will often be
unpredictable. When traffic spikes occur, they will happen very quickly.
What should a solutions architect recommend?
Answer: A
Explanation:
On-demand mode is a good option if any of the following are true: - You create new tables with unknown
workloads. - You have unpredictable application traffic. - You prefer the ease of paying for only what you use.
C - provisioned capacity is recommended for known patterns. Not the case here.
D - same as C
Question: 80 CertyIQ
A company recently signed a contract with an AWS Managed Service Provider (MSP) Partner for help with an
application migration initiative. A solutions architect needs ta share an Amazon Machine Image (AMI) from an
existing AWS account with the MSP Partner's AWS account. The AMI is backed by Amazon Elastic Block Store
(Amazon EBS) and uses an AWS Key Management Service (AWS KMS) customer managed key to encrypt EBS
volume snapshots.
What is the MOST secure way for the solutions architect to share the AMI with the MSP Partner's AWS account?
A. Make the encrypted AMI and snapshots publicly available. Modify the key policy to allow the MSP Partner's
AWS account to use the key.
B. Modify the launchPermission property of the AMI. Share the AMI with the MSP Partner's AWS account only.
Modify the key policy to allow the MSP Partner's AWS account to use the key.
C. Modify the launchPermission property of the AMI. Share the AMI with the MSP Partner's AWS account only.
Modify the key policy to trust a new KMS key that is owned by the MSP Partner for encryption.
D. Export the AMI from the source account to an Amazon S3 bucket in the MSP Partner's AWS account, Encrypt
the S3 bucket with a new KMS key that is owned by the MSP Partner. Copy and launch the AMI in the MSP
Partner's AWS account.
Answer: B
Explanation:
Share the existing KMS key with the MSP external account because it has already been used to encrypt the
AMI snapshot.
Reference:
https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-modifying-external-accounts.html
Question: 81 CertyIQ
A solutions architect is designing the cloud architecture for a new application being deployed on AWS. The
process should run in parallel while adding and removing application nodes as needed based on the number of jobs
to be processed. The processor application is stateless. The solutions architect must ensure that the application is
loosely coupled and the job items are durably stored.
Which design should the solutions architect use?
A. Create an Amazon SNS topic to send the jobs that need to be processed. Create an Amazon Machine Image
(AMI) that consists of the processor application. Create a launch configuration that uses the AMI. Create an
Auto Scaling group using the launch configuration. Set the scaling policy for the Auto Scaling group to add and
remove nodes based on CPU usage.
B. Create an Amazon SQS queue to hold the jobs that need to be processed. Create an Amazon Machine Image
(AMI) that consists of the processor application. Create a launch configuration that uses the AMI. Create an
Auto Scaling group using the launch configuration. Set the scaling policy for the Auto Scaling group to add and
remove nodes based on network usage.
C. Create an Amazon SQS queue to hold the jobs that need to be processed. Create an Amazon Machine Image
(AMI) that consists of the processor application. Create a launch template that uses the AMI. Create an Auto
Scaling group using the launch template. Set the scaling policy for the Auto Scaling group to add and remove
nodes based on the number of items in the SQS queue.
D. Create an Amazon SNS topic to send the jobs that need to be processed. Create an Amazon Machine Image
(AMI) that consists of the processor application. Create a launch template that uses the AMI. Create an Auto
Scaling group using the launch template. Set the scaling policy for the Auto Scaling group to add and remove
nodes based on the number of messages published to the SNS topic.
Answer: C
Explanation:
decoupled = SQS
Question: 82 CertyIQ
A company hosts its web applications in the AWS Cloud. The company configures Elastic Load Balancers to use
certificates that are imported into AWS Certificate Manager (ACM). The company's security team must be notified
30 days before the expiration of each certificate.
What should a solutions architect recommend to meet this requirement?
A. Add a rule in ACM to publish a custom message to an Amazon Simple Notification Service (Amazon SNS)
topic every day, beginning 30 days before any certificate will expire.
B. Create an AWS Config rule that checks for certificates that will expire within 30 days. Configure Amazon
EventBridge (Amazon CloudWatch Events) to invoke a custom alert by way of Amazon Simple Notification
Service (Amazon SNS) when AWS Config reports a noncompliant resource.
C. Use AWS Trusted Advisor to check for certificates that will expire within 30 days. Create an Amazon
CloudWatch alarm that is based on Trusted Advisor metrics for check status changes. Configure the alarm to
send a custom alert by way of Amazon Simple Notification Service (Amazon SNS).
D. Create an Amazon EventBridge (Amazon CloudWatch Events) rule to detect any certificates that will expire
within 30 days. Configure the rule to invoke an AWS Lambda function. Configure the Lambda function to send a
custom alert by way of Amazon Simple Notification Service (Amazon SNS).
Answer: B
Explanation:
named acm-certificate-expiration-check
AWS Config has a managed rule named acm-certificate-expiration-check to check for expiring certificates
(configurable number of days)
Reference:
https://aws.amazon.com/premiumsupport/knowledge-center/acm-certificate-expiration/
Question: 83 CertyIQ
A company's dynamic website is hosted using on-premises servers in the United States. The company is launching
its product in Europe, and it wants to optimize site loading times for new European users. The site's backend must
remain in the United States. The product is being launched in a few days, and an immediate solution is needed.
What should the solutions architect recommend?
A. Launch an Amazon EC2 instance in us-east-1 and migrate the site to it.
B. Move the website to Amazon S3. Use Cross-Region Replication between Regions.
C. Use Amazon CloudFront with a custom origin pointing to the on-premises servers.
D. Use an Amazon Route 53 geoproximity routing policy pointing to on-premises servers.
Answer: C
Explanation:
Use Amazon CloudFront with a custom origin pointing to the on-premises servers.
Question: 84 CertyIQ
A company wants to reduce the cost of its existing three-tier web architecture. The web, application, and database
servers are running on Amazon EC2 instances for the development, test, and production environments. The EC2
instances average 30% CPU utilization during peak hours and 10% CPU utilization during non-peak hours.
The production EC2 instances run 24 hours a day. The development and test EC2 instances run for at least 8 hours
each day. The company plans to implement automation to stop the development and test EC2 instances when they
are not in use.
Which EC2 instance purchasing solution will meet the company's requirements MOST cost-effectively?
A. Use Spot Instances for the production EC2 instances. Use Reserved Instances for the development and test
EC2 instances.
B. Use Reserved Instances for the production EC2 instances. Use On-Demand Instances for the development
and test EC2 instances.
C. Use Spot blocks for the production EC2 instances. Use Reserved Instances for the development and test EC2
instances.
D. Use On-Demand Instances for the production EC2 instances. Use Spot blocks for the development and test
EC2 instances.
Answer: B
Explanation:
Spot blocks are not longer available, and you can't use spot instances on Prod machines 24x7, so option B
should be valid.
Question: 85 CertyIQ
A company has a production web application in which users upload documents through a web interface or a mobile
app. According to a new regulatory requirement. new documents cannot be modified or deleted after they are
stored.
What should a solutions architect do to meet this requirement?
A. Store the uploaded documents in an Amazon S3 bucket with S3 Versioning and S3 Object Lock enabled.
B. Store the uploaded documents in an Amazon S3 bucket. Configure an S3 Lifecycle policy to archive the
documents periodically.
C. Store the uploaded documents in an Amazon S3 bucket with S3 Versioning enabled. Configure an ACL to
restrict all access to read-only.
D. Store the uploaded documents on an Amazon Elastic File System (Amazon EFS) volume. Access the data by
mounting the volume in read-only mode.
Answer: A
Explanation:
You can use S3 Object Lock to store objects using a write-once-read-many (WORM) model. Object Lock can
help prevent objects from being deleted or overwritten for a fixed amount of time or indefinitely. You can use
S3 Object Lock to meet regulatory requirements that require WORM storage, or add an extra layer of
protection against object changes and deletion. Versioning is required and automatically activated as Object
Lock is enabled.
https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-overview.html
Question: 86 CertyIQ
A company has several web servers that need to frequently access a common Amazon RDS MySQL Multi-AZ DB
instance. The company wants a secure method for the web servers to connect to the database while meeting a
security requirement to rotate user credentials frequently.
Which solution meets these requirements?
A. Store the database user credentials in AWS Secrets Manager. Grant the necessary IAM permissions to allow
the web servers to access AWS Secrets Manager.
B. Store the database user credentials in AWS Systems Manager OpsCenter. Grant the necessary IAM
permissions to allow the web servers to access OpsCenter.
C. Store the database user credentials in a secure Amazon S3 bucket. Grant the necessary IAM permissions to
allow the web servers to retrieve credentials and access the database.
D. Store the database user credentials in files encrypted with AWS Key Management Service (AWS KMS) on
the web server file system. The web server should be able to decrypt the files and access the database.
Answer: A
Explanation:
Secrets Manager enables you to replace hardcoded credentials in your code, including passwords, with an API
call to Secrets Manager to retrieve the secret programmatically. This helps ensure the secret can't be
compromised by someone examining your code, because the secret no longer exists in the code. Also, you can
configure Secrets Manager to automatically rotate the secret for you according to a specified schedule. This
enables you to replace long-term secrets with short-term ones, significantly reducing the risk of compromise.
https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html
Question: 87 CertyIQ
A company hosts an application on AWS Lambda functions that are invoked by an Amazon API Gateway API. The
Lambda functions save customer data to an Amazon Aurora MySQL database. Whenever the company upgrades
the database, the Lambda functions fail to establish database connections until the upgrade is complete. The
result is that customer data is not recorded for some of the event.
A solutions architect needs to design a solution that stores customer data that is created during database
upgrades.
Which solution will meet these requirements?
A. Provision an Amazon RDS proxy to sit between the Lambda functions and the database. Configure the
Lambda functions to connect to the RDS proxy.
B. Increase the run time of the Lambda functions to the maximum. Create a retry mechanism in the code that
stores the customer data in the database.
C. Persist the customer data to Lambda local storage. Configure new Lambda functions to scan the local
storage to save the customer data to the database.
D. Store the customer data in an Amazon Simple Queue Service (Amazon SQS) FIFO queue. Create a new
Lambda function that polls the queue and stores the customer data in the database.
Answer: D
Explanation:
For database proxy, there is no storage available. only compute and memory capabilities are available. So,
SQS will be right choice.
https://aws.amazon.com/rds/proxy/
This will enable solution to hold data till the time DB comes back to normal. RDS proxy is to optimally utilize
the connection between Lambda and DB. Lambda can open multiple connection concurrently which can be
taxing on DB compute resources, hence RDS proxy was introduced to manage and leverage these
connections efficiently.
Question: 88 CertyIQ
A survey company has gathered data for several years from areas in the United States. The company hosts the
data in an Amazon S3 bucket that is 3 TB in size and growing. The company has started to share the data with a
European marketing firm that has S3 buckets. The company wants to ensure that its data transfer costs remain as
low as possible.
Which solution will meet these requirements?
Answer: A
Explanation:
A"Typically, you configure buckets to be Requester Pays buckets when you want to share data but not incur
charges associated with others accessing the data. For example, you might use Requester Pays buckets when
making available large datasets, such as zip code directories, reference data, geospatial information, or web
crawling data."
https://docs.aws.amazon.com/AmazonS3/latest/userguide/RequesterPaysBuckets.html
Question: 89 CertyIQ
A company uses Amazon S3 to store its confidential audit documents. The S3 bucket uses bucket policies to
restrict access to audit team IAM user credentials according to the principle of least privilege. Company managers
are worried about accidental deletion of documents in the S3 bucket and want a more secure solution.
What should a solutions architect do to secure the audit documents?
Answer: A
Explanation:
Question: 90 CertyIQ
A company is using a SQL database to store movie data that is publicly accessible. The database runs on an
Amazon RDS Single-AZ DB instance. A script runs queries at random intervals each day to record the number of
new movies that have been added to the database. The script must report a final total during business hours.
The company's development team notices that the database performance is inadequate for development tasks
when the script is running. A solutions architect must recommend a solution to resolve this issue.
Which solution will meet this requirement with the LEAST operational overhead?
Answer: B
Explanation:
the script only reads the data to produce a report and the slowdown only occurs when the script is running,
thus having a read replica solves the issue with the least overhead
Question: 91 CertyIQ
A company has applications that run on Amazon EC2 instances in a VPC. One of the applications needs to call the
Amazon S3 API to store and read objects. According to the company's security regulations, no traffic from the
applications is allowed to travel across the internet.
Which solution will meet these requirements?
Answer: A
Explanation:
Gateway endpoints provide reliable connectivity to Amazon S3 and DynamoDB without requiring an internet
gateway or a NAT device for your VPC. It should be option A.
https://docs.aws.amazon.com/vpc/latest/privatelink/gateway-endpoints.html
Question: 92 CertyIQ
A company is storing sensitive user information in an Amazon S3 bucket. The company wants to provide secure
access to this bucket from the application tier running on Amazon EC2 instances inside a VPC.
Which combination of steps should a solutions architect take to accomplish this? (Choose two.)
Answer: AC
Explanation:
Reference:
https://aws.amazon.com/premiumsupport/knowledge-center/s3-private-connection-no-authentication/
Question: 93 CertyIQ
A company runs an on-premises application that is powered by a MySQL database. The company is migrating the
application to AWS to increase the application's elasticity and availability.
The current architecture shows heavy read activity on the database during times of normal operation. Every 4
hours, the company's development team pulls a full export of the production database to populate a database in
the staging environment. During this period, users experience unacceptable application latency. The development
team is unable to use the staging environment until the procedure completes.
A solutions architect must recommend replacement architecture that alleviates the application latency issue. The
replacement architecture also must give the development team the ability to continue using the staging
environment without delay.
Which solution meets these requirements?
A. Use Amazon Aurora MySQL with Multi-AZ Aurora Replicas for production. Populate the staging database by
implementing a backup and restore process that uses the mysqldump utility.
B. Use Amazon Aurora MySQL with Multi-AZ Aurora Replicas for production. Use database cloning to create the
staging database on-demand.
C. Use Amazon RDS for MySQL with a Multi-AZ deployment and read replicas for production. Use the standby
instance for the staging database.
D. Use Amazon RDS for MySQL with a Multi-AZ deployment and read replicas for production. Populate the
staging database by implementing a backup and restore process that uses the mysqldump utility.
Answer: B
Explanation:
Use Amazon Aurora MySQL with Multi-AZ Aurora Replicas for production. Use database cloning to create the
staging database on-demand.
Question: 94 CertyIQ
A company is designing an application where users upload small files into Amazon S3. After a user uploads a file,
the file requires one-time simple processing to transform the data and save the data in JSON format for later
analysis.
Each file must be processed as quickly as possible after it is uploaded. Demand will vary. On some days, users will
upload a high number of files. On other days, users will upload a few files or no files.
Which solution meets these requirements with the LEAST operational overhead?
A. Configure Amazon EMR to read text files from Amazon S3. Run processing scripts to transform the data.
Store the resulting JSON file in an Amazon Aurora DB cluster.
B. Configure Amazon S3 to send an event notification to an Amazon Simple Queue Service (Amazon SQS)
queue. Use Amazon EC2 instances to read from the queue and process the data. Store the resulting JSON file in
Amazon DynamoDB.
C. Configure Amazon S3 to send an event notification to an Amazon Simple Queue Service (Amazon SQS)
queue. Use an AWS Lambda function to read from the queue and process the data. Store the resulting JSON file
in Amazon DynamoDB.
D. Configure Amazon EventBridge (Amazon CloudWatch Events) to send an event to Amazon Kinesis Data
Streams when a new file is uploaded. Use an AWS Lambda function to consume the event from the stream and
process the data. Store the resulting JSON file in an Amazon Aurora DB cluster.
Answer: C
Explanation:
Option C, Configuring Amazon S3 to send an event notification to an Amazon Simple Queue Service (SQS)
queue and using an AWS Lambda function to read from the queue and process the data, would likely be the
solution with the least operational overhead.
AWS Lambda is a serverless computing service that allows you to run code without the need to provision or
manage infrastructure. When a new file is uploaded to Amazon S3, it can trigger an event notification which
sends a message to an SQS queue. The Lambda function can then be set up to be triggered by messages in
the queue, and it can process the data and store the resulting JSON file in Amazon DynamoDB.
Question: 95 CertyIQ
An application allows users at a company's headquarters to access product data. The product data is stored in an
Amazon RDS MySQL DB instance. The operations team has isolated an application performance slowdown and
wants to separate read traffic from write traffic. A solutions architect needs to optimize the application's
performance quickly.
What should the solutions architect recommend?
A. Change the existing database to a Multi-AZ deployment. Serve the read requests from the primary
Availability Zone.
B. Change the existing database to a Multi-AZ deployment. Serve the read requests from the secondary
Availability Zone.
C. Create read replicas for the database. Configure the read replicas with half of the compute and storage
resources as the source database.
D. Create read replicas for the database. Configure the read replicas with the same compute and storage
resources as the source database.
Answer: D
Explanation:
If you scale the source DB instance, also scale the read replicas.
Question: 96 CertyIQ
An Amazon EC2 administrator created the following policy associated with an IAM group containing several users:
What is the effect of this policy?
A.Users can terminate an EC2 instance in any AWS Region except us-east-1.
B.Users can terminate an EC2 instance with the IP address 10.100.100.1 in the us-east-1 Region.
C.Users can terminate an EC2 instance in the us-east-1 Region when the user's source IP is 10.100.100.254.
D.Users cannot terminate an EC2 instance in the us-east-1 Region when the user's source IP is 10.100.100.254.
Answer: C
Explanation:
C is correct.0.0/24 , the following five IP addresses are reserved:0.0: Network address.0.1: Reserved by AWS
for the VPC router.0.2: Reserved by AWS. The IP address of the DNS server is the base of the VPC network
range plus two. ...0.3: Reserved by AWS for future use.0.255: Network broadcast address.
Question: 97 CertyIQ
A company has a large Microsoft SharePoint deployment running on-premises that requires Microsoft Windows
shared file storage. The company wants to migrate this workload to the AWS Cloud and is considering various
storage options. The storage solution must be highly available and integrated with Active Directory for access
control.
Which solution will satisfy these requirements?
A. Configure Amazon EFS storage and set the Active Directory domain for authentication.
B. Create an SMB file share on an AWS Storage Gateway file gateway in two Availability Zones.
C. Create an Amazon S3 bucket and configure Microsoft Windows Server to mount it as a volume.
D. Create an Amazon FSx for Windows File Server file system on AWS and set the Active Directory domain for
authentication.
Answer: D
Explanation:
D. Create an Amazon FSx for Windows File Server file system on AWS and set the Active Directory domain for
authentication.
Amazon FSx for Windows File Server is a fully managed file storage service that is designed to be used with
Microsoft Windows workloads. It is integrated with Active Directory for access control and is highly available,
as it stores data across multiple availability zones. Additionally, FSx can be used to migrate data from on-
premises Microsoft Windows file servers to the AWS Cloud. This makes it a good fit for the requirements
described in the question.
Question: 98 CertyIQ
An image-processing company has a web application that users use to upload images. The application uploads the
images into an Amazon S3 bucket. The company has set up S3 event notifications to publish the object creation
events to an Amazon Simple Queue Service (Amazon SQS) standard queue. The SQS queue serves as the event
source for an AWS Lambda function that processes the images and sends the results to users through email.
Users report that they are receiving multiple email messages for every uploaded image. A solutions architect
determines that SQS messages are invoking the Lambda function more than once, resulting in multiple email
messages.
What should the solutions architect do to resolve this issue with the LEAST operational overhead?
A. Set up long polling in the SQS queue by increasing the ReceiveMessage wait time to 30 seconds.
B. Change the SQS standard queue to an SQS FIFO queue. Use the message deduplication ID to discard
duplicate messages.
C. Increase the visibility timeout in the SQS queue to a value that is greater than the total of the function
timeout and the batch window timeout.
D. Modify the Lambda function to delete each message from the SQS queue immediately after the message is
read before processing.
Answer: C
Explanation:
users get duplicated messages because -> lambda polls the message, and starts processing the message.
However, before the first lambda can finish processing the message, the visibility timeout runs out on SQS,
and SQS returns the message to the poll, causing another Lambda node to process that same message. By
increasing the visibility timeout, it should prevent SQS from returning a message back to the poll before
Lambda can finish processing the message
Question: 99 CertyIQ
A company is implementing a shared storage solution for a gaming application that is hosted in an on-premises
data center. The company needs the ability to use Lustre clients to access data. The solution must be fully
managed.
Which solution meets these requirements?
A. Create an AWS Storage Gateway file gateway. Create a file share that uses the required client protocol.
Connect the application server to the file share.
B. Create an Amazon EC2 Windows instance. Install and configure a Windows file share role on the instance.
Connect the application server to the file share.
C. Create an Amazon Elastic File System (Amazon EFS) file system, and configure it to support Lustre. Attach
the file system to the origin server. Connect the application server to the file system.
D. Create an Amazon FSx for Lustre file system. Attach the file system to the origin server. Connect the
application server to the file system.
Answer: D
Explanation:
Reference:
https://aws.amazon.com/fsx/lustre/
A. Create AWS Secrets Manager secrets for encrypted certificates. Manually update the certificates as
needed. Control access to the data by using fine-grained IAM access.
B. Create an AWS Lambda function that uses the Python cryptography library to receive and perform
encryption operations. Store the function in an Amazon S3 bucket.
C. Create an AWS Key Management Service (AWS KMS) customer managed key. Allow the EC2 role to use the
KMS key for encryption operations. Store the encrypted data on Amazon S3.
D. Create an AWS Key Management Service (AWS KMS) customer managed key. Allow the EC2 role to use the
KMS key for encryption operations. Store the encrypted data on Amazon Elastic Block Store (Amazon EBS)
volumes.
Answer: C
Explanation:
C makes a better sense. Between C (S3) and D (EBS), S3 is highly available with LEAST operational overhead
A. Create three NAT gateways, one for each public subnet in each AZ. Create a private route table for each AZ
that forwards non-VPC traffic to the NAT gateway in its AZ.
B. Create three NAT instances, one for each private subnet in each AZ. Create a private route table for each AZ
that forwards non-VPC traffic to the NAT instance in its AZ.
C. Create a second internet gateway on one of the private subnets. Update the route table for the private
subnets that forward non-VPC traffic to the private internet gateway.
D. Create an egress-only internet gateway on one of the public subnets. Update the route table for the private
subnets that forward non-VPC traffic to the egress-only Internet gateway.
Answer: A
Explanation:
However, given that A provides the newer option of NAT Gateway, then A is the correct answer.
A. Launch the EC2 instance into the same Availability Zone as the EFS file system.
B. Install an AWS DataSync agent in the on-premises data center.
C. Create a secondary Amazon Elastic Block Store (Amazon EBS) volume on the EC2 instance for the data.
D. Manually use an operating system copy command to push the data to the EC2 instance.
E. Use AWS DataSync to create a suitable location configuration for the on-premises SFTP server.
Answer: BE
Explanation:
E. Use AWS DataSync to create a suitable location configuration for the on-premises SFTP server.
To automate the process of transferring the data from the on-premises SFTP server to an EC2 instance with
an EFS file system, you can use AWS DataSync. AWS DataSync is a fully managed data transfer service that
simplifies, automates, and accelerates transferring data between on-premises storage systems and Amazon
S3, Amazon EFS, or Amazon FSx for Windows File Server.
To use AWS DataSync for this task, you should first install an AWS DataSync agent in the on-premises data
center. This agent is a lightweight software application that you install on your on-premises data source. The
agent communicates with the AWS DataSync service to transfer data between the data source and target
locations.
Answer: A
Explanation:
This is the purpose of bookmarks: "AWS Glue tracks data that has already been processed during a previous
run of an ETL job by persisting state information from the job run. This persisted state information is called a
job bookmark. Job bookmarks help AWS Glue maintain state information and prevent the reprocessing of old
data." https://docs.aws.amazon.com/glue/latest/dg/monitor-continuations.html
Answer: AC
Explanation:
AC, reason is they require a solution that is highly available. AWS Shield can handle the DDoS attacks. To
make the solution HA you can use cloud front. AC seems to be the best answer imo. AB seem like redundant
answers.
A. Add an execution role to the function with lambda:InvokeFunction as the action and * as the principal.
B. Add an execution role to the function with lambda:InvokeFunction as the action and Service:
lambda.amazonaws.com as the principal.
C. Add a resource-based policy to the function with lambda:* as the action and Service: events.amazonaws.com
as the principal.
D. Add a resource-based policy to the function with lambda:InvokeFunction as the action and Service:
events.amazonaws.com as the principal.
Answer: D
Explanation:
The correct solution is D. Add a resource-based policy to the function with lambda:InvokeFunction as the
action and Service: events.amazonaws.com as the principal.
The principle of least privilege requires that permissions are granted only to the minimum necessary to
perform a task. In this case, the Lambda function needs to be able to be invoked by Amazon EventBridge
(Amazon CloudWatch Events). To meet these requirements, you can add a resource-based policy to the
function that allows the InvokeFunction action to be performed by the Service: events.amazonaws.com
principal. This will allow Amazon EventBridge to invoke the function, but will not grant any additional
permissions to the function.
Reference:
https://docs.aws.amazon.com/eventbridge/latest/userguide/eb-use-resource-based.html#eb-lambda-
permissions
Answer: D
Explanation:
Just to confirm, the A and B options don't allow automate the rotation as explained here:
https://aws.amazon.com/kms/faqs/#:~:text=You%20can%20choose%20to%20have%20AWS%20KMS%
20automatically%20rotate%
20KMS,KMS%20custom%20key%20store%20feature
Answer: B
Explanation:
API Gateway is needed to get the data so option A and C are out. “The company wants to use these data
points in its existing analytics platform” so there is no need to add Kynesis. Option D is also out. This leaves us
with option B as the correct one
A. Create an AWS Lambda function triggered when the database on Amazon RDS is updated to send the
information to an Amazon Simple Queue Service (Amazon SQS) queue for the targets to consume.
B. Create an AWS Lambda function triggered when the database on Amazon RDS is updated to send the
information to an Amazon Simple Queue Service (Amazon SQS) FIFO queue for the targets to consume.
C. Subscribe to an RDS event notification and send an Amazon Simple Queue Service (Amazon SQS) queue
fanned out to multiple Amazon Simple Notification Service (Amazon SNS) topics. Use AWS Lambda functions
to update the targets.
D. Subscribe to an RDS event notification and send an Amazon Simple Notification Service (Amazon SNS) topic
fanned out to multiple Amazon Simple Queue Service (Amazon SQS) queues. Use AWS Lambda functions to
update the targets.
Answer: D
Explanation:
answer should be D
A. Create an S3 Glacier vault. Apply a write-once, read-many (WORM) vault lock policy to the objects.
B. Create an S3 bucket with S3 Object Lock enabled. Enable versioning. Set a retention period of 100 years. Use
governance mode as the S3 bucket’s default retention mode for new objects.
C. Create an S3 bucket. Use AWS CloudTrail to track any S3 API events that modify the objects. Upon
notification, restore the modified objects from any backup versions that the company has.
D. Create an S3 bucket with S3 Object Lock enabled. Enable versioning. Add a legal hold to the objects. Add the
s3:PutObjectLegalHold permission to the IAM policies of users who need to delete the objects.
Answer: D
Explanation:
D - The answer: "The Object Lock legal hold operation enables you to place a legal hold on an object version.
Like setting a retention period, a legal hold prevents an object version from being overwritten or deleted.
However, a legal hold doesn't have an associated retention period and remains in effect until removed."
Reference:
https://docs.aws.amazon.com/AmazonS3/latest/userguide/batch-ops-legal-hold.html
Answer: BD
Explanation:
B. Configure the web server to upload the original images to Amazon S3.
D. Configure S3 Event Notifications to invoke an AWS Lambda function when an image is uploaded. Use the
function to resize the image.
A. Add a second ActiveMQ server to another Availability Zone. Add an additional consumer EC2 instance in
another Availability Zone. Replicate the MySQL database to another Availability Zone.
B. Use Amazon MQ with active/standby brokers configured across two Availability Zones. Add an additional
consumer EC2 instance in another Availability Zone. Replicate the MySQL database to another Availability
Zone.
C. Use Amazon MQ with active/standby brokers configured across two Availability Zones. Add an additional
consumer EC2 instance in another Availability Zone. Use Amazon RDS for MySQL with Multi-AZ enabled.
D. Use Amazon MQ with active/standby brokers configured across two Availability Zones. Add an Auto Scaling
group for the consumer EC2 instances across two Availability Zones. Use Amazon RDS for MySQL with Multi-
AZ enabled.
Answer: D
Explanation:
D as the "HIGHEST available" and less "operational complex" The "Amazon RDS for MySQL with Multi-AZ
enabled" option excludes A and B The "Auto Scaling group" is more available and reduces operational
complexity in case of incidents (as remediation it is automated) than just adding one more instance.
A. Use AWS Fargate on Amazon Elastic Container Service (Amazon ECS) to run the containerized web
application with Service Auto Scaling. Use an Application Load Balancer to distribute the incoming requests.
B. Use two Amazon EC2 instances to host the containerized web application. Use an Application Load Balancer
to distribute the incoming requests.
C. Use AWS Lambda with a new code that uses one of the supported languages. Create multiple Lambda
functions to support the load. Use Amazon API Gateway as an entry point to the Lambda functions.
D. Use a high performance computing (HPC) solution such as AWS ParallelCluster to establish an HPC cluster
that can process the incoming requests at the appropriate scale.
Answer: A
Explanation:
A: Fargate (no EC2), move the containers on ECS, autoscaling for growth and ALB to balance consumption.
D - seems like the most complex approach, like re-architecting the app to take advantage of an HPC platform
A. Use AWS DataSync to move the data. Create a custom transformation job by using AWS Glue.
B. Order an AWS Snowcone device to move the data. Deploy the transformation application to the device.
C. Order an AWS Snowball Edge Storage Optimized device. Copy the data to the device. Create a custom
transformation job by using AWS Glue.
D. Order an AWS Snowball Edge Storage Optimized device that includes Amazon EC2 compute. Copy the data
to the device. Create a new EC2 instance on AWS to run the transformation application.
Answer: C
Explanation:
A. Use AWS DataSync to move the data. Create a custom transformation job by using AWS Glue. - No BW
available for DataSync, so "asap" will be weeks/months (?)
B. Order an AWS Snowcone device to move the data. Deploy the transformation application to the device. -
Snowcone will just store 14TB (SSD configuration).
**C**. Order an AWS Snowball Edge Storage Optimized device. Copy the data to the device. Create a custom
transformation job by using AWS Glue. - SnowBall can store 80TB (ok), takes around 1 week to move the
device (faster than A), and AWS Glue allows to do ETL jobs. This is the answer.
D. Order an AWS Snowball Edge Storage Optimized device that includes Amazon EC2 compute. Copy the data
to the device. Create a new EC2 instance on AWS to run the transformation application.
- Same as C, but the ETL job requires the deployment/configuration/maintenance of an EC2 instance, while
Glue is serverless.
A. Use AWS Lambda to process the photos. Store the photos and metadata in DynamoDB.
B. Use Amazon Kinesis Data Firehose to process the photos and to store the photos and metadata.
C. Use AWS Lambda to process the photos. Store the photos in Amazon S3. Retain DynamoDB to store the
metadata.
D. Increase the number of EC2 instances to three. Use Provisioned IOPS SSD (io2) Amazon Elastic Block Store
(Amazon EBS) volumes to store the photos and metadata.
Answer: C
Explanation:
Storing image in DB wont be very scalable compared to S3 metadata does not take up much space and is
more efficiently stored in DB
A. Create a NAT gateway. Configure the route table for the public subnets to send traffic to Amazon S3 through
the NAT gateway.
B. Configure the security group for the EC2 instances to restrict outbound traffic so that only traffic to the S3
prefix list is permitted.
C. Move the EC2 instances to private subnets. Create a VPC endpoint for Amazon S3, and link the endpoint to
the route table for the private subnets.
D. Remove the internet gateway from the VPC. Set up an AWS Direct Connect connection, and route traffic to
Amazon S3 over the Direct Connect connection.
Answer: C
Explanation:
Move the EC2 instances to private subnets. Create a VPC endpoint for Amazon S3, and link the endpoint to the
route table for the private subnets.
Answer: AD
Explanation:
A -> We can configure CloudFront to require HTTPS from clients (enhanced security)
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-viewers-to-
cloudfront.html
D -> storing static website on S3 provides scalability and less operational overhead, then configuration of
Application LB and EC2 instances (hence E is out) B is out since AWS WAF Web ACL does not to provide
HTTPS functionality, but to protect HTTPS only.
Question: 117 CertyIQ
A company stores its application logs in an Amazon CloudWatch Logs log group. A new policy requires the
company to store all application logs in Amazon OpenSearch Service (Amazon Elasticsearch Service) in near-real
time.
Which solution will meet this requirement with the LEAST operational overhead?
A. Configure a CloudWatch Logs subscription to stream the logs to Amazon OpenSearch Service (Amazon
Elasticsearch Service).
B. Create an AWS Lambda function. Use the log group to invoke the function to write the logs to Amazon
OpenSearch Service (Amazon Elasticsearch Service).
C. Create an Amazon Kinesis Data Firehose delivery stream. Configure the log group as the delivery streams
sources. Configure Amazon OpenSearch Service (Amazon Elasticsearch Service) as the delivery stream's
destination.
D. Install and configure Amazon Kinesis Agent on each application server to deliver the logs to Amazon Kinesis
Data Streams. Configure Kinesis Data Streams to deliver the logs to Amazon OpenSearch Service (Amazon
Elasticsearch Service).
Answer: A
Explanation:
You can configure a CloudWatch Logs log group to stream data it receives to your Amazon OpenSearch
Service cluster in NEAR REAL-TIME through a CloudWatch Logs subscription
Reference:
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CWL_OpenSearch_Stream.html >
Answer: D
Explanation:
A. Set up AWS WAF in both Regions. Associate Regional web ACLs with an API stage.
B. Set up AWS Firewall Manager in both Regions. Centrally configure AWS WAF rules.
C. Set up AWS Shield in bath Regions. Associate Regional web ACLs with an API stage.
D. Set up AWS Shield in one of the Regions. Associate Regional web ACLs with an API stage.
Answer: B
Explanation:
If you want to use AWS WAF across accounts, accelerate WAF configuration, automate the protection of new
resources, use Firewall Manager with AWS WAF
A. Create an Amazon Route 53 geolocation routing policy to route requests to one of the two NLBs. Create an
Amazon CloudFront distribution. Use the Route 53 record as the distribution’s origin.
B. Create a standard accelerator in AWS Global Accelerator. Create endpoint groups in us-west-2 and eu-west-
1. Add the two NLBs as endpoints for the endpoint groups.
C. Attach Elastic IP addresses to the six EC2 instances. Create an Amazon Route 53 geolocation routing policy
to route requests to one of the six EC2 instances. Create an Amazon CloudFront distribution. Use the Route 53
record as the distribution's origin.
D. Replace the two NLBs with two Application Load Balancers (ALBs). Create an Amazon Route 53 latency
routing policy to route requests to one of the two ALBs. Create an Amazon CloudFront distribution. Use the
Route 53 record as the distribution’s origin.
Answer: B
Explanation:
If need to use Route53, ALB (layar 7 ) needs to be used as end points for 2 reginal x 3 EC2s, if it the case
answer would be the option 4
Answer: A
Explanation:
You can enable encryption for an Amazon RDS DB instance when you create it, but not after it's created.
However, you can add encryption to an unencrypted DB instance by creating a snapshot of your DB instance,
and then creating an encrypted copy of that snapshot. You can then restore a DB instance from the encrypted
snapshot to get an encrypted copy of your original DB instance.
" https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/encrypt-an-existing-amazon-rds-for-
postgresql-db-instance.html
Answer: B
Explanation:
If you are a developer who needs to digitally sign or verify data using asymmetric keys, you should use the
service to create and manage the private keys you’ll need. If you’re looking for a scalable key management
infrastructure to support your developers and their growing number of applications, you should use it to
reduce your licensing costs and operational burden...
https://aws.amazon.com/kms/faqs/#:~:text=If%20you%20are%20a%20developer%20who%20needs%20to%20digitally
%20broad%20set%20of%20industry%20and%20regional%20compliance%20regimes
A. Create a new SSL certificate using AWS Certificate Manager (ACM). Install the ACM certificate on each
instance.
B. Create an Amazon S3 bucket Migrate the SSL certificate to the S3 bucket. Configure the EC2 instances to
reference the bucket for SSL termination.
C. Create another EC2 instance as a proxy server. Migrate the SSL certificate to the new instance and configure
it to direct connections to the existing EC2 instances.
D. Import the SSL certificate into AWS Certificate Manager (ACM). Create an Application Load Balancer with an
HTTPS listener that uses the SSL certificate from ACM.
Answer: D
Explanation:
This issue is solved by SSL offloading, i.e. by moving the SSL termination task to the ALB.
https://aws.amazon.com/blogs/aws/elastic-load-balancer-support-for-ssl-termination/
Answer: A
Explanation:
A. Use an Auto Scaling group to launch the EC2 instances in private subnets. Deploy an RDS Multi-AZ DB
instance in private subnets.
B. Configure a VPC with two private subnets and two NAT gateways across two Availability Zones. Deploy an
Application Load Balancer in the private subnets.
C. Use an Auto Scaling group to launch the EC2 instances in public subnets across two Availability Zones.
Deploy an RDS Multi-AZ DB instance in private subnets.
D. Configure a VPC with one public subnet, one private subnet, and two NAT gateways across two Availability
Zones. Deploy an Application Load Balancer in the public subnet.
D. Configure a VPC with two public subnets, two private subnets, and two NAT gateways across two Availability
Zones. Deploy an Application Load Balancer in the public subnets.
Answer: AE
Explanation:
A and E! (There are two D's, last option we can mark as E = correct answer)
Application has to be highly available while the instance and database should not be exposed to the public
internet, but the instances still requires access to the internet. NAT gateway has to be deployed in public
subnets in this case while instances and database remain in private subnets in the VPC, therefore answer is
(A) and (E).
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html
If the instances did not require access to the internet, then the answer could have been
(B) to use a private NAT gateway and keep it in the private subnets to communicate only to the VPCs.
https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Scenario2.html
Answer: B
Explanation:
Set up an S3 Lifecycle policy to transition objects to S3 Glacier Deep Archive after 2 years.
A. Amazon EBS for maximum performance, Amazon S3 for durable data storage, and Amazon S3 Glacier for
archival storage
B. Amazon EBS for maximum performance, Amazon EFS for durable data storage, and Amazon S3 Glacier for
archival storage
C. Amazon EC2 instance store for maximum performance, Amazon EFS for durable data storage, and Amazon
S3 for archival storage
D. Amazon EC2 instance store for maximum performance, Amazon S3 for durable data storage, and Amazon S3
Glacier for archival storage
Answer: D
Explanation:
Max instance store possible at this time is 30TB for NVMe which has the higher I/O compared to EBS.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html#instance-store-volumes
i3.16xlarge Instance Store offers 15TB and is the best option for performance.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html
A. Use Spot Instances in an Amazon EC2 Auto Scaling group to run the application containers.
B. Use Spot Instances in an Amazon Elastic Kubernetes Service (Amazon EKS) managed node group.
C. Use On-Demand Instances in an Amazon EC2 Auto Scaling group to run the application containers.
D. Use On-Demand Instances in an Amazon Elastic Kubernetes Service (Amazon EKS) managed node group.
Answer: B
Explanation:
https://aws.amazon.com/about-aws/whats-new/2020/12/amazon-eks-support-ec2-spot-instances-managed-
node-groups/
Answer: AE
Explanation:
The correct answers are A and E. To improve the application's infrastructure, the solutions architect should
migrate the PostgreSQL database to Amazon Aurora and migrate the web application to be hosted on AWS
Fargate with Amazon Elastic Container Service (Amazon ECS).
Amazon Aurora is a fully managed, scalable, and highly available relational database service that is
compatible with PostgreSQL. Migrating the database to Amazon Aurora would reduce the operational
overhead of maintaining the database infrastructure and allow the company to focus on building and scaling
the application.
AWS Fargate is a fully managed container orchestration service that enables users to run containers without
the need to manage the underlying EC2 instances. By using AWS Fargate with Amazon Elastic Container
Service (Amazon ECS), the solutions architect can improve the scalability and efficiency of the web
application and reduce the operational overhead of maintaining the underlying infrastructure.
A. Use a simple scaling policy to dynamically scale the Auto Scaling group.
B. Use a target tracking policy to dynamically scale the Auto Scaling group.
C. Use an AWS Lambda function ta update the desired Auto Scaling group capacity.
D. Use scheduled scaling actions to scale up and scale down the Auto Scaling group.
Answer: B
Explanation:
The correct answer is B. To maintain the desired performance across all instances in the Amazon EC2 Auto
Scaling group, the solutions architect should use a target tracking policy to dynamically scale the Auto
Scaling group.
A target tracking policy allows the Auto Scaling group to automatically adjust the number of EC2 instances in
the group based on a target value for a metric. In this case, the target value for the CPU utilization metric
could be set to 40% to maintain the desired performance of the application. The Auto Scaling group would
then automatically scale the number of instances up or down as needed to maintain the target value for the
metric.
https://docs.aws.amazon.com/autoscaling/ec2/userguide/as-scaling-simple-step.html
A. Write individual policies for each S3 bucket to grant read permission for only CloudFront access.
B. Create an IAM user. Grant the user read permission to objects in the S3 bucket. Assign the user to
CloudFront.
C. Write an S3 bucket policy that assigns the CloudFront distribution ID as the Principal and assigns the target
S3 bucket as the Amazon Resource Name (ARN).
D. Create an origin access identity (OAI). Assign the OAI to the CloudFront distribution. Configure the S3 bucket
permissions so that only the OAI has read permission.
Answer: D
Explanation:
Max instance store possible at this time is 30TB for NVMe which has the higher I/O compared to EBS.
is4gen.8xlarge 4 x 7,500 GB (30 TB) NVMe SSD
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html#instance-store-volumes/
Answer: A
Explanation:
A. Migrate the Oracle database to an Amazon EC2 instance. Set up database replication to a different AWS
Region.
B. Migrate the Oracle database to Amazon RDS for Oracle. Activate Cross-Region automated backups to
replicate the snapshots to another AWS Region.
C. Migrate the Oracle database to Amazon RDS Custom for Oracle. Create a read replica for the database in
another AWS Region.
D. Migrate the Oracle database to Amazon RDS for Oracle. Create a standby database in another Availability
Zone.
Answer: C
Explanation:
C
> The company also needs to maintain access to the database's underlying operating system
Amazon RDS Custom for Oracle provides that but not regular RDS
> https://aws.amazon.com/about-aws/whats-new/2021/10/amazon-rds-custom-oracle/
A. Create a new S3 bucket. Load the data into the new S3 bucket. Use S3 Cross-Region Replication (CRR) to
replicate encrypted objects to an S3 bucket in another Region. Use server-side encryption with AWS KMS
multi-Region kays (SSE-KMS). Use Amazon Athena to query the data.
B. Create a new S3 bucket. Load the data into the new S3 bucket. Use S3 Cross-Region Replication (CRR) to
replicate encrypted objects to an S3 bucket in another Region. Use server-side encryption with AWS KMS
multi-Region keys (SSE-KMS). Use Amazon RDS to query the data.
C. Load the data into the existing S3 bucket. Use S3 Cross-Region Replication (CRR) to replicate encrypted
objects to an S3 bucket in another Region. Use server-side encryption with Amazon S3 managed encryption
keys (SSE-S3). Use Amazon Athena to query the data.
D. Load the data into the existing S3 bucket. Use S3 Cross-Region Replication (CRR) to replicate encrypted
objects to an S3 bucket in another Region. Use server-side encryption with Amazon S3 managed encryption
keys (SSE-S3). Use Amazon RDS to query the data.
Answer: A
Explanation:
Answer is A: Amazon S3 Bucket Keys reduce the cost of Amazon S3 server-side encryption using AWS Key
Management Service (SSE-KMS). This new bucket-level key for SSE can reduce AWS KMS request costs by
up to 99 percent by decreasing the request traffic from Amazon S3 to AWS KMS. With a few clicks in the
AWS Management Console, and without any changes to your client applications, you can configure your
bucket to use an S3 Bucket Key for AWS KMS-based encryption on new objects. The Existing S3 bucket
might have uncrypted data - encryption will apply new data received after the applying of encryption on the
new bucket.
This solution meets the requirements of a serverless solution, encryption, replication, and SQL analysis with
the least operational overhead. Amazon Athena is a serverless interactive query service that can analyze data
in S3 using standard SQL. S3 Cross-Region Replication (CRR) can replicate encrypted objects to an S3 bucket
in another Region automatically. Server-side encryption with AWS KMS multi-Region keys (SSE-KMS) can
encrypt the data at rest using keys that are replicated across multiple Regions. Creating a new S3 bucket can
avoid potential conflicts with existing data or configurations.
Option B is incorrect because Amazon RDS is not a serverless solution and it cannot query data in S3 directly.
Option C is incorrect because server-side encryption with Amazon S3 managed encryption keys (SSE-S3)
does not use KMS keys and it does not support multi-Region replication. Option D is incorrect because
Amazon RDS is not a serverless solution and it cannot query data in S3 directly. It is also incorrect for the
same reason as option C.
References:
https://docs.aws.amazon.com/AmazonS3/latest/userguide/replication-walkthrough-4.html
https://aws.amazon.com/blogs/storage/considering-four-different-replication-options-for-data-in-amazon-s3/
https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingEncryption.html
https://aws.amazon.com/athena/
A. Create a VPC peering connection between the company's VPC and the provider's VPC. Update the route
table to connect to the target service.
B. Ask the provider to create a virtual private gateway in its VPC. Use AWS PrivateLink to connect to the target
service.
C. Create a NAT gateway in a public subnet of the company’s VPUpdate the route table to connect to the target
service.
D. Ask the provider to create a VPC endpoint for the target service. Use AWS PrivateLink to connect to the
target service.
Answer: D
Explanation:
**AWS PrivateLink provides private connectivity between VPCs, AWS services, and your on-premises
networks, without exposing your traffic to the public internet**. AWS PrivateLink makes it easy to connect
services across different accounts and VPCs to significantly simplify your network architecture. Interface
**VPC endpoints**, powered by AWS PrivateLink, connect you to services hosted by AWS Partners and
supported solutions available in AWS Marketplace.
https://aws.amazon.com/privatelink/
Answer: AC
Explanation:
AWS Database Migration Service (AWS DMS) helps you migrate databases to AWS quickly and securely. The
source database remains fully operational during the migration, minimizing downtime to applications that rely
on the database. ... With AWS Database Migration Service, you can also continuously replicate data with low
latency from any supported source to any supported target.
https://aws.amazon.com/dms/
A. Configure the company’s email server to forward notification email messages that are sent to the AWS
account root user email address to all users in the organization.
B. Configure all AWS account root user email addresses as distribution lists that go to a few administrators who
can respond to alerts. Configure AWS account alternate contacts in the AWS Organizations console or
programmatically.
C. Configure all AWS account root user email messages to be sent to one administrator who is responsible for
monitoring alerts and forwarding those alerts to the appropriate groups.
D. Configure all existing AWS accounts and all newly created accounts to use the same root user email
address. Configure AWS account alternate contacts in the AWS Organizations console or programmatically.
Answer: B
Explanation:
Use a group email address for the management account's root user
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_best-practices_mgmt-acct.html#best-
practices_mgmt-acct_email-address
A. Migrate the queue to a redundant pair (active/standby) of RabbitMQ instances on Amazon MQ. Create a
Multi-AZ Auto Scaling group for EC2 instances that host the application. Create another Multi-AZ Auto Scaling
group for EC2 instances that host the PostgreSQL database.
B. Migrate the queue to a redundant pair (active/standby) of RabbitMQ instances on Amazon MQ. Create a
Multi-AZ Auto Scaling group for EC2 instances that host the application. Migrate the database to run on a
Multi-AZ deployment of Amazon RDS for PostgreSQL.
C. Create a Multi-AZ Auto Scaling group for EC2 instances that host the RabbitMQ queue. Create another
Multi-AZ Auto Scaling group for EC2 instances that host the application. Migrate the database to run on a
Multi-AZ deployment of Amazon RDS for PostgreSQL.
D. Create a Multi-AZ Auto Scaling group for EC2 instances that host the RabbitMQ queue. Create another
Multi-AZ Auto Scaling group for EC2 instances that host the application. Create a third Multi-AZ Auto Scaling
group for EC2 instances that host the PostgreSQL database
Answer: B
Explanation:
Migrating to Amazon MQ reduces the overhead on the queue management. C and D are dismissed. Deciding
between A and B means deciding to go for an AutoScaling group for EC2 or an RDS for Postgress (both multi-
AZ). The RDS option has less operational impact, as provide as a service the tools and software required.
Consider for instance, the effort to add an additional node like a read replica, to the DB.
https://docs.aws.amazon.com/amazon-mq/latest/developer-guide/active-standby-broker-deployment.html
https://aws.amazon.com/rds/postgresql/
A. Create a Lambda function to copy the files to the analysis S3 bucket. Create an S3 event notification for the
analysis S3 bucket. Configure Lambda and SageMaker Pipelines as destinations of the event notification.
Configure s3:ObjectCreated:Put as the event type.
B. Create a Lambda function to copy the files to the analysis S3 bucket. Configure the analysis S3 bucket to
send event notifications to Amazon EventBridge (Amazon CloudWatch Events). Configure an ObjectCreated
rule in EventBridge (CloudWatch Events). Configure Lambda and SageMaker Pipelines as targets for the rule.
C. Configure S3 replication between the S3 buckets. Create an S3 event notification for the analysis S3 bucket.
Configure Lambda and SageMaker Pipelines as destinations of the event notification. Configure
s3:ObjectCreated:Put as the event type.
D. Configure S3 replication between the S3 buckets. Configure the analysis S3 bucket to send event
notifications to Amazon EventBridge (Amazon CloudWatch Events). Configure an ObjectCreated rule in
EventBridge (CloudWatch Events). Configure Lambda and SageMaker Pipelines as targets for the rule.
Answer: D
Explanation:
A and B are ruled out as it requires an extra Lambda job to do the copy while S3 replication will take care of it
with little to no overhead.
Answer: AC
Explanation:
EC2 instance Savings Plan saves 72% while Compute Savings Plans saves 66%. But according to link, it says
"Compute Savings Plans provide the most flexibility and help to reduce your costs by up to 66%. These plans
automatically apply to EC2 instance usage regardless of instance family, size, AZ, region, OS or tenancy, and
also apply to Fargate and Lambda usage." EC2 instance Savings Plans are not applied to Fargate or Lambda
A. Deploy the application stack in a single AWS Region. Use Amazon CloudFront to serve all static and dynamic
content by specifying the ALB as an origin.
B. Deploy the application stack in two AWS Regions. Use an Amazon Route 53 latency routing policy to serve all
content from the ALB in the closest Region.
C. Deploy the application stack in a single AWS Region. Use Amazon CloudFront to serve the static content.
Serve the dynamic content directly from the ALB.
D. Deploy the application stack in two AWS Regions. Use an Amazon Route 53 geolocation routing policy to
serve all content from the ALB in the closest Region.
Answer: A
Explanation:
Answer is A.
Amazon CloudFront is a web service that speeds up distribution of your static and dynamic web content
https://www.certyiq.com/discussions/amazon/view/81081-exam-aws-certified-solutions-architect-associate-
saa-c02/
Answer: C
Explanation:
Correct Answer: C
AWS Global Accelerator and Amazon CloudFront are separate services that use the AWS global network and
its edge locations around the world. CloudFront improves performance for both cacheable content (such as
images and videos) and dynamic content (such as API acceleration and dynamic site delivery). Global
Accelerator improves performance for a wide range of applications over TCP or UDP by proxying packets at
the edge to applications running in one or more AWS Regions. Global Accelerator is a good fit for non-HTTP
use cases, such as gaming (UDP), IoT (MQTT), or Voice over IP, as well as for HTTP use cases that specifically
require static IP addresses or deterministic, fast regional failover. Both services integrate with AWS Shield for
DDoS protection.
A. Host the application on AWS Lambda. Integrate the application with Amazon API Gateway.
B. Host the application with AWS Amplify. Connect the application to an Amazon API Gateway API that is
integrated with AWS Lambda.
C. Host the application on Amazon EC2 instances. Set up an Application Load Balancer with EC2 instances in an
Auto Scaling group as targets.
D. Host the application on Amazon Elastic Container Service (Amazon ECS). Set up an Application Load
Balancer with Amazon ECS as the target.
Answer: D
Explanation:
D is organic pattern, lift and shift, decompose to containers, first making most use of existing code, whilst new
features can be added over time with lambda+api gw later.
Answer: B
Explanation:
The most cost-effective solution for addressing high ReadIOPS and CPU utilization when running large
reports would be to migrate the monthly reporting to an Aurora Replica. An Aurora Replica is a read-only copy
of an Aurora database that is updated in real-time with the primary database. By using an Aurora Replica for
running large reports, the primary database will be relieved of the additional read load, improving
performance for the ecommerce application.
Option B, "Migrate the monthly reporting to an Aurora Replica," is the correct answer.
A. Migrate the database to an Amazon RDS for MySQL DB instance. Create an AMI of the web application. Use
the AMI to launch a second EC2 On-Demand Instance. Use an Application Load Balancer to distribute the load
to each EC2 instance.
B. Migrate the database to an Amazon RDS for MySQL DB instance. Create an AMI of the web application. Use
the AMI to launch a second EC2 On-Demand Instance. Use Amazon Route 53 weighted routing to distribute the
load across the two EC2 instances.
C. Migrate the database to an Amazon Aurora MySQL DB instance. Create an AWS Lambda function to stop the
EC2 instance and change the instance type. Create an Amazon CloudWatch alarm to invoke the Lambda
function when CPU utilization surpasses 75%.
D. Migrate the database to an Amazon Aurora MySQL DB instance. Create an AMI of the web application. Apply
the AMI to a launch template. Create an Auto Scaling group with the launch template Configure the launch
template to use a Spot Fleet. Attach an Application Load Balancer to the Auto Scaling group.
Answer: D
Explanation:
Using an Auto Scaling group with a launch template and a Spot Fleet allows the company to scale the
application seamlessly and cost-effectively, by automatically adding or removing instances based on the
demand, and using Spot instances which are spare compute capacity available in the AWS region at a lower
price than On-Demand instances. And also by migrating the database to Amazon Aurora MySQL DB instance,
it provides higher scalability, availability, and performance than traditional MySQL databases.
Answer: B
Explanation:
Answer is B: Reserved is cheaper than on demand the company has. And it's meet the availabilty (HA)
requirement as to spot instance that can be disrupted at any time.
PRICING BELOW.
On-Demand: 0% There’s no commitment from you. You pay the most with this option.
Reserved : 40%-60%1-year or 3-year commitment from you. You save money from that commitment.
Spot 50%-90% Ridiculously inexpensive because there’s no commitment from the AWS side.
A. Store the logs in Amazon S3. Use AWS Backup to move logs more than 1 month old to S3 Glacier Deep
Archive.
B. Store the logs in Amazon S3. Use S3 Lifecycle policies to move logs more than 1 month old to S3 Glacier
Deep Archive.
C. Store the logs in Amazon CloudWatch Logs. Use AWS Backup to move logs more than 1 month old to S3
Glacier Deep Archive.
D. Store the logs in Amazon CloudWatch Logs. Use Amazon S3 Lifecycle policies to move logs more than 1
month old to S3 Glacier Deep Archive.
Answer: B
Explanation:
Option B
(Store the logs in Amazon S3. Use S3 Lifecycle policies to move logs more than 1-month-old to S3 Glacier
Deep Archive) would meet these requirements in the most cost-effective manner. This solution would allow
the application team to quickly access the logs from the past month for troubleshooting, while also providing
a cost-effective storage solution for the logs that are rarely accessed and need to be retained for 10 years.
Question: 148 CertyIQ
A company has a data ingestion workflow that includes the following components:
An Amazon Simple Notification Service (Amazon SNS) topic that receives notifications about new data deliveries
An AWS Lambda function that processes and stores the data
The ingestion workflow occasionally fails because of network connectivity issues. When failure occurs, the
corresponding data is not ingested unless the company manually reruns the job.
What should a solutions architect do to ensure that all notifications are eventually processed?
A. Configure the Lambda function for deployment across multiple Availability Zones.
B. Modify the Lambda function's configuration to increase the CPU and memory allocations for the function.
C. Configure the SNS topic’s retry strategy to increase both the number of retries and the wait time between
retries.
D. Configure an Amazon Simple Queue Service (Amazon SQS) queue as the on-failure destination. Modify the
Lambda function to process messages in the queue.
Answer: D
Explanation:
A. Create an Amazon Simple Queue Service (Amazon SQS) FIFO queue to hold messages. Set up an AWS
Lambda function to process messages from the queue.
B. Create an Amazon Simple Notification Service (Amazon SNS) topic to deliver notifications containing
payloads to process. Configure an AWS Lambda function as a subscriber.
C. Create an Amazon Simple Queue Service (Amazon SQS) standard queue to hold messages. Set up an AWS
Lambda function to process messages from the queue independently.
D. Create an Amazon Simple Notification Service (Amazon SNS) topic to deliver notifications containing
payloads to process. Configure an Amazon Simple Queue Service (Amazon SQS) queue as a subscriber.
Answer: A
Explanation:
The correct solution is Option A. Creating an Amazon Simple Queue Service (Amazon SQS) FIFO queue to hold
messages and setting up an AWS Lambda function to process messages from the queue will ensure that the
event data is processed in the correct order and minimize operational overhead.
Option B is incorrect because using Amazon Simple Notification Service (Amazon SNS) does not guarantee
the order in which messages are delivered.
Option C is incorrect because using an Amazon SQS standard queue does not guarantee the order in which
messages are processed.
Option D is incorrect because using an Amazon SQS queue as a subscriber to an Amazon SNS topic does not
guarantee the order in which messages are processed.
Question: 150 CertyIQ
A company is migrating an application from on-premises servers to Amazon EC2 instances. As part of the
migration design requirements, a solutions architect must implement infrastructure metric alarms. The company
does not need to take action if CPU utilization increases to more than 50% for a short burst of time. However, if the
CPU utilization increases to more than 50% and read IOPS on the disk are high at the same time, the company
needs to act as soon as possible. The solutions architect also must reduce false alarms.
What should the solutions architect do to meet these requirements?
Answer: A
Explanation:
Composite alarms determine their states by monitoring the states of other alarms. You can **use composite
alarms to reduce alarm noise**. For example, you can create a composite alarm where the underlying metric
alarms go into ALARM when they meet specific conditions. You then can set up your composite alarm to go
into ALARM and send you notifications when the underlying metric alarms go into ALARM by configuring the
underlying metric alarms never to take actions. Currently, composite alarms can take the following actions:
https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Create_Composite_Alarm.html
A. Use AWS Control Tower to implement data residency guardrails to deny internet access and deny access to
all AWS Regions except ap-northeast-3.
B. Use rules in AWS WAF to prevent internet access. Deny access to all AWS Regions except ap-northeast-3 in
the AWS account settings.
C. Use AWS Organizations to configure service control policies (SCPS) that prevent VPCs from gaining internet
access. Deny access to all AWS Regions except ap-northeast-3.
D. Create an outbound rule for the network ACL in each VPC to deny all traffic from 0.0.0.0/0. Create an IAM
policy for each user to prevent the use of any AWS Region other than ap-northeast-3.
E. Use AWS Config to activate managed rules to detect and alert for internet gateways and to detect and alert
for new resources deployed outside of ap-northeast-3.
Answer: AC
Explanation:
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples_vpc.html#exampl
A. Configure an IAM policy for AWS Systems Manager Session Manager. Create an IAM role for the policy.
Update the trust relationship of the role. Set up automatic start and stop for the DB instance.
B. Create an Amazon ElastiCache for Redis cache cluster that gives users the ability to access the data from
the cache when the DB instance is stopped. Invalidate the cache after the DB instance is started.
C. Launch an Amazon EC2 instance. Create an IAM role that grants access to Amazon RDS. Attach the role to
the EC2 instance. Configure a cron job to start and stop the EC2 instance on the desired schedule.
D. Create AWS Lambda functions to start and stop the DB instance. Create Amazon EventBridge (Amazon
CloudWatch Events) scheduled rules to invoke the Lambda functions. Configure the Lambda functions as event
targets for the rules.
Answer: D
Explanation:
The correct answer is D. Creating AWS Lambda functions to start and stop the DB instance and using Amazon
EventBridge (Amazon CloudWatch Events) scheduled rules to invoke the Lambda functions is the most cost-
effective way to meet the requirements. The Lambda functions can be configured as event targets for the
scheduled rules, which will allow the DB instance to be started and stopped on the desired schedule.
A. Configure S3 Standard-Infrequent Access (S3 Standard-IA) storage for the initial storage tier of the objects.
B. Move the files to S3 Intelligent-Tiering and configure it to move objects to a less expensive storage tier after
90 days.
C. Configure S3 inventory to manage objects and move them to S3 Standard-Infrequent Access (S3 Standard-
1A) after 90 days.
D. Implement an S3 Lifecycle policy that moves the objects from S3 Standard to S3 Standard-Infrequent
Access (S3 Standard-1A) after 90 days.
Answer: D
Explanation:
The Question talks about downloads are infrequent older than 90 days which means files less than 90 days
are accessed frequently. Standard-Infrequent Access (S3 Standard-IA) needs a minimum 30 days if accessed
before, it costs more.
So to access the files frequently you need a S3 Standard . After 90 days you can move it to Standard-
Infrequent Access (S3 Standard-IA) as its going to be less frequently accessed
Answer: B
Explanation:
Answer: C
Explanation:
A. Use Amazon Athena for one-time queries. Use Amazon QuickSight to create dashboards for KPIs.
B. Use Amazon Kinesis Data Analytics for one-time queries. Use Amazon QuickSight to create dashboards for
KPIs.
C. Create custom AWS Lambda functions to move the individual records from the databases to an Amazon
Redshift cluster.
D. Use an AWS Glue extract, transform, and load (ETL) job to convert the data into JSON format. Load the data
into multiple Amazon OpenSearch Service (Amazon Elasticsearch Service) clusters.
E. Use blueprints in AWS Lake Formation to identify the data that can be ingested into a data lake. Use AWS
Glue to crawl the source, extract the data, and load the data into Amazon S3 in Apache Parquet format.
Answer: AE
Explanation:
AE makes sense, only E is working with S3 here and questions wants them to be in S3
Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)
Answer: DE
Explanation:
D and E...
E - Partially manual but only option that achieves the 5 year goal
Which service will improve the performance of both the real-time and on-demand streaming?
A. Amazon CloudFront
B. AWS Global Accelerator
C. Amazon Route 53
D. Amazon S3 Transfer Acceleration
Answer: A
Explanation:
A is right
You can use CloudFront to deliver video on demand (VOD) or live streaming video using any HTTP origin
Global Accelerator is a good fit for non-HTTP use cases, such as gaming (UDP), IoT (MQTT), or Voice over IP,
as well as for HTTP use cases that specifically require static IP addresses
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
A. Create a usage plan with an API key that is shared with genuine users only.
B. Integrate logic within the Lambda function to ignore the requests from fraudulent IP addresses.
C. Implement an AWS WAF rule to target malicious requests and trigger actions to filter them out.
D. Convert the existing public API to a private API. Update the DNS records to redirect users to the new API
endpoint.
E. Create an IAM role for each user attempting to access the API. A user will assume the role when making the
API call.
Answer: AC
Explanation:
https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-api-usage-plans.html
Answer: C
Explanation:
A. Place the JSON documents in an Amazon S3 bucket. Run the Python code on multiple Amazon EC2 instances
to process the documents. Store the results in an Amazon Aurora DB cluster.
B. Place the JSON documents in an Amazon S3 bucket. Create an AWS Lambda function that runs the Python
code to process the documents as they arrive in the S3 bucket. Store the results in an Amazon Aurora DB
cluster.
C. Place the JSON documents in an Amazon Elastic Block Store (Amazon EBS) volume. Use the EBS Multi-
Attach feature to attach the volume to multiple Amazon EC2 instances. Run the Python code on the EC2
instances to process the documents. Store the results on an Amazon RDS DB instance.
D. Place the JSON documents in an Amazon Simple Queue Service (Amazon SQS) queue as messages. Deploy
the Python code as a container on an Amazon Elastic Container Service (Amazon ECS) cluster that is configured
with the Amazon EC2 launch type. Use the container to process the SQS messages. Store the results on an
Amazon RDS DB instance.
Answer: B
Explanation:
By placing the JSON documents in an S3 bucket, the documents will be stored in a highly durable and
scalable object storage service. The use of AWS Lambda allows the company to run their Python code to
process the documents as they arrive in the S3 bucket without having to worry about the underlying
infrastructure. This also allows for horizontal scalability, as AWS Lambda will automatically scale the number
of instances of the function based on the incoming rate of requests. The results can be stored in an Amazon
Aurora DB cluster, which is a fully-managed, high-performance database service that is compatible with
MySQL and PostgreSQL. This will provide the necessary durability and scalability for the results of the
processing.
The company seeks a cloud storage solution that permits the copying of on-premises data to long-term persistent
storage to make data available for processing by all EC2 instances. The solution should also be a high performance
file system that is integrated with persistent storage to read and write datasets and output files.
Answer: A
Explanation:
If you see HPC and Linux both in the question.. Pick Amazon FSx for Lustre
Question: 163 CertyIQ
A company is building a containerized application on premises and decides to move the application to AWS. The
application will have thousands of users soon after it is deployed. The company is unsure how to manage the
deployment of containers at scale. The company needs to deploy the containerized application in a highly available
architecture that minimizes operational overhead.
A. Store container images in an Amazon Elastic Container Registry (Amazon ECR) repository. Use an Amazon
Elastic Container Service (Amazon ECS) cluster with the AWS Fargate launch type to run the containers. Use
target tracking to scale automatically based on demand.
B. Store container images in an Amazon Elastic Container Registry (Amazon ECR) repository. Use an Amazon
Elastic Container Service (Amazon ECS) cluster with the Amazon EC2 launch type to run the containers. Use
target tracking to scale automatically based on demand.
C. Store container images in a repository that runs on an Amazon EC2 instance. Run the containers on EC2
instances that are spread across multiple Availability Zones. Monitor the average CPU utilization in Amazon
CloudWatch. Launch new EC2 instances as needed.
D. Create an Amazon EC2 Amazon Machine Image (AMI) that contains the container image. Launch EC2
instances in an Auto Scaling group across multiple Availability Zones. Use an Amazon CloudWatch alarm to
scale out EC2 instances when the average CPU utilization threshold is breached.
Answer: A
Explanation:
Store container images in an Amazon Elastic Container Registry (Amazon ECR) repository. Use an Amazon
Elastic Container Service (Amazon ECS) cluster with the AWS Fargate launch type to run the containers. Use
target tracking to scale automatically based on demand.
Which solution meets these requirements and is the MOST operationally efficient?
A. Set up an Amazon EC2 instance running a Redis database. Configure both applications to use the instance.
Store, process, and delete the messages, respectively.
B. Use an Amazon Kinesis data stream to receive the messages from the sender application. Integrate the
processing application with the Kinesis Client Library (KCL).
C. Integrate the sender and processor applications with an Amazon Simple Queue Service (Amazon SQS) queue.
Configure a dead-letter queue to collect the messages that failed to process.
D. Subscribe the processing application to an Amazon Simple Notification Service (Amazon SNS) topic to
receive notifications to process. Integrate the sender application to write to the SNS topic.
Answer: C
Explanation:
Amazon SQS supports dead-letter queues (DLQ), which other queues (source queues) can target for
messages that can't be processed (consumed) successfully.
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-dead-letter-
queues.html
A. Configure an S3 bucket policy to accept requests coming from the AWS WAF Amazon Resource Name (ARN)
only.
B. Configure Amazon CloudFront to forward all incoming requests to AWS WAF before requesting content from
the S3 origin.
C. Configure a security group that allows Amazon CloudFront IP addresses to access Amazon S3 only.
Associate AWS WAF to CloudFront.
D. Configure Amazon CloudFront and Amazon S3 to use an origin access identity (OAI) to restrict access to the
S3 bucket. Enable AWS WAF on the distribution.
Answer: D
Explanation:
Configure Amazon CloudFront and Amazon S3 to use an origin access identity (OAI) to restrict access to the
S3 bucket. Enable AWS WAF on the distribution.
Answer: D
Explanation:
Answer: D
Explanation:
Use Reserved Instances for the baseline capacity and use On-Demand Instances to handle additional capacity.
Answer: D
Explanation:
D. Service control policies (SCPs) are one type of policy that you can use to manage your organization. SCPs
offer central control over the maximum available permissions for all accounts in your organization, allowing
you to ensure your accounts stay within your organization's access control guidelines. See
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scp.html.
Answer: C
Explanation:
AWS Shield Advanced provides expanded DDoS attack protection for your Amazon EC2 instances, Elastic
Load Balancing load balancers, CloudFront distributions, Route 53 hosted zones, and AWS Global Accelerator
standard accelerators.
https://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html
Answer: C
Explanation:
Geographic (Geo) Match Conditions in AWS WAF. This new condition type allows you to use AWS WAF to
restrict application access based on the geographic location of your viewers. With geo match conditions you
can choose the countries from which AWS WAF should allow access.
https://aws.amazon.com/about-aws/whats-new/2017/10/aws-waf-now-supports-geographic-match/
A. Provide an API hosted on an Amazon EC2 instance. The EC2 instance performs the required computations
when the API request is made.
B. Design a REST API using Amazon API Gateway that accepts the item names. API Gateway passes item names
to AWS Lambda for tax computations.
C. Create an Application Load Balancer that has two Amazon EC2 instances behind it. The EC2 instances will
compute the tax on the received item names.
D. Design a REST API using Amazon API Gateway that connects with an API hosted on an Amazon EC2 instance.
API Gateway accepts and passes the item names to the EC2 instance for tax computations.
Answer: B
Explanation:
Option D is similar to option B in that it uses Amazon API Gateway to handle the API requests, but it also
includes an EC2 instance to perform the tax computations. However, using an EC2 instance in this way is less
scalable and less elastic than using AWS Lambda to perform the computations. An EC2 instance is a fixed
resource and requires manual scaling and management, while Lambda is an event-driven, serverless compute
service that automatically scales with the number of requests, making it more suitable for handling variable
workloads and reducing response times during high traffic periods. Additionally, Lambda is more cost-
efficient than EC2 instances, as you only pay for the compute time consumed by your functions, making it a
more cost-effective solution.
Answer: C
Explanation:
Field-level encryption allows you to enable your users to securely upload sensitive information to your web
servers. The sensitive information provided by your users is encrypted at the edge, close to the user, and
remains encrypted throughout your entire application stack. This encryption ensures that only applications
that need the data—and have the credentials to decrypt it—are able to do so.
The application has increased in popularity, and millions of users worldwide accessing these media files. The
company wants to provide the files to the users while reducing the load on the origin.
Answer: B
Explanation:
B. Cloud front is best for content delivery. Global Accelerator is best for non-HTTP (TCP/UDP) cases and
supports HTTP cases as well but with static IP (elastic IP) or anycast IP address only.
Question: 174 CertyIQ
A company has a multi-tier application that runs six front-end web servers in an Amazon EC2 Auto Scaling group in
a single Availability Zone behind an Application Load Balancer (ALB). A solutions architect needs to modify the
infrastructure to be highly available without modifying the application.
Which architecture should the solutions architect choose that provides high availability?
A. Create an Auto Scaling group that uses three instances across each of two Regions.
B. Modify the Auto Scaling group to use three instances across each of two Availability Zones.
C. Create an Auto Scaling template that can be used to quickly create more instances in another Region.
D. Change the ALB in front of the Amazon EC2 instances in a round-robin configuration to balance traffic to the
web tier.
Answer: B
Explanation:
Modify the Auto Scaling group to use three instances across each of two Availability Zones.
A solutions architect determined that the CPU utilization and memory utilization were high on the database
because of a large number of open connections. The solutions architect needs to prevent the timeout errors while
making the least possible changes to the application.
A. Configure provisioned concurrency for the Lambda function. Modify the database to be a global database in
multiple AWS Regions.
B. Use Amazon RDS Proxy to create a proxy for the database. Modify the Lambda function to use the RDS Proxy
endpoint instead of the database endpoint.
C. Create a read replica for the database in a different AWS Region. Use query string parameters in API
Gateway to route traffic to the read replica.
D. Migrate the data from Aurora PostgreSQL to Amazon DynamoDB by using AWS Database Migration Service
(AWS DMS). Modify the Lambda function to use the DynamoDB table.
Answer: B
Explanation:
Many applications, including those built on modern serverless architectures, can have a large number of open
connections to the database server and may open and close database connections at a high rate, exhausting
database memory and compute resources. Amazon RDS Proxy allows applications to pool and share
connections established with the database, improving database efficiency and application scalability.
https://aws.amazon.com/id/rds/proxy/
What is the MOST secure way to access the table while ensuring that the traffic does not leave the AWS network?
Answer: A
Explanation:
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/vpc-endpoints-dynamodb.html
Answer: B
Explanation:
DAX stands for DynamoDB Accelerator, and it's like a turbo boost for your DynamoDB tables. It's a fully
managed, in-memory cache that speeds up the read and write performance of your DynamoDB tables, so you
can get your data faster than ever before.
Which solution will meet these requirements with the LEAST operational overhead?
A. Use AWS Backup to copy EC2 backups and RDS backups to the separate Region.
B. Use Amazon Data Lifecycle Manager (Amazon DLM) to copy EC2 backups and RDS backups to the separate
Region.
C. Create Amazon Machine Images (AMIs) of the EC2 instances. Copy the AMIs to the separate Region. Create a
read replica for the RDS DB instance in the separate Region.
D. Create Amazon Elastic Block Store (Amazon EBS) snapshots. Copy the EBS snapshots to the separate
Region. Create RDS snapshots. Export the RDS snapshots to Amazon S3. Configure S3 Cross-Region
Replication (CRR) to the separate Region.
Answer: A
Explanation:
Using AWS Backup to copy EC2 and RDS backups to the separate Region is the solution that meets the
requirements with the least operational overhead. AWS Backup simplifies the backup process and automates
the copying of backups to another Region, reducing the manual effort and operational complexity involved in
managing separate backup processes for EC2 instances and RDS databases.
Option B is incorrect because Amazon Data Lifecycle Manager (Amazon DLM) is not designed for directly
copying RDS backups to a separate region.
Option C is incorrect because creating Amazon Machine Images (AMIs) and read replicas adds complexity and
operational overhead compared to a dedicated backup solution.
Option D is incorrect because using Amazon EBS snapshots, RDS snapshots, and S3 Cross-Region Replication
(CRR) involves multiple manual steps and additional configuration, increasing complexity.
A. Create an IAM role that has read access to the Parameter Store parameter. Allow Decrypt access to an AWS
Key Management Service (AWS KMS) key that is used to encrypt the parameter. Assign this IAM role to the
EC2 instance.
B. Create an IAM policy that allows read access to the Parameter Store parameter. Allow Decrypt access to an
AWS Key Management Service (AWS KMS) key that is used to encrypt the parameter. Assign this IAM policy to
the EC2 instance.
C. Create an IAM trust relationship between the Parameter Store parameter and the EC2 instance. Specify
Amazon RDS as a principal in the trust policy.
D. Create an IAM trust relationship between the DB instance and the EC2 instance. Specify Systems Manager
as a principal in the trust policy.
Answer: A
Explanation:
To securely store a database user name and password in AWS Systems Manager Parameter Store and allow
an application running on an EC2 instance to access it, the solutions architect should create an IAM role that
has read access to the Parameter Store parameter and allow Decrypt access to an AWS KMS key that is used
to encrypt the parameter. The solutions architect should then assign this IAM role to the EC2 instance.
This approach allows the EC2 instance to access the parameter in the Parameter Store and decrypt it using
the specified KMS key while enforcing the necessary security controls to ensure that the parameter is only
accessible to authorized parties.
Answer: BC
Explanation:
The company’s developers have decided to rewrite the application to use a microservices architecture on Amazon
Elastic Container Service (Amazon ECS).
What should a solutions architect recommend for communication between the microservices?
A. Create an Amazon Simple Queue Service (Amazon SQS) queue. Add code to the data producers, and send
data to the queue. Add code to the data consumers to process data from the queue.
B. Create an Amazon Simple Notification Service (Amazon SNS) topic. Add code to the data producers, and
publish notifications to the topic. Add code to the data consumers to subscribe to the topic.
C. Create an AWS Lambda function to pass messages. Add code to the data producers to call the Lambda
function with a data object. Add code to the data consumers to receive a data object that is passed from the
Lambda function.
D. Create an Amazon DynamoDB table. Enable DynamoDB Streams. Add code to the data producers to insert
data into the table. Add code to the data consumers to use the DynamoDB Streams API to detect new table
entries and retrieve the data.
Answer: A
Explanation:
Option B, using Amazon Simple Notification Service (SNS), would not be suitable for this use case, as SNS is a
pub/sub messaging service that is designed for one-to-many communication, rather than point-to-point
communication between specific microservices.
Option C, using an AWS Lambda function to pass messages, would not be suitable for this use case, as it
would require the data producers and data consumers to have a direct connection and invoke the Lambda
function, rather than being decoupled through a message queue.
Option D, using an Amazon DynamoDB table with DynamoDB Streams, would not be suitable for this use case,
as it would require the data consumers to continuously poll the DynamoDB Streams API to detect new table
entries, rather than being notified of new data through a message queue.
Question: 182 CertyIQ
A company wants to migrate its MySQL database from on premises to AWS. The company recently experienced a
database outage that significantly impacted the business. To ensure this does not happen again, the company
wants a reliable database solution on AWS that minimizes data loss and stores every transaction on at least two
nodes.
A. Create an Amazon RDS DB instance with synchronous replication to three nodes in three Availability Zones.
B. Create an Amazon RDS MySQL DB instance with Multi-AZ functionality enabled to synchronously replicate
the data.
C. Create an Amazon RDS MySQL DB instance and then create a read replica in a separate AWS Region that
synchronously replicates the data.
D. Create an Amazon EC2 instance with a MySQL engine installed that triggers an AWS Lambda function to
synchronously replicate the data to an Amazon RDS MySQL DB instance.
Answer: B
Explanation:
A. Host static content in Amazon S3. Host dynamic content by using Amazon API Gateway and AWS Lambda.
Use Amazon DynamoDB with on-demand capacity for the database. Configure Amazon CloudFront to deliver
the website content.
B. Host static content in Amazon S3. Host dynamic content by using Amazon API Gateway and AWS Lambda.
Use Amazon Aurora with Aurora Auto Scaling for the database. Configure Amazon CloudFront to deliver the
website content.
C. Host all the website content on Amazon EC2 instances. Create an Auto Scaling group to scale the EC2
instances. Use an Application Load Balancer to distribute traffic. Use Amazon DynamoDB with provisioned write
capacity for the database.
D. Host all the website content on Amazon EC2 instances. Create an Auto Scaling group to scale the EC2
instances. Use an Application Load Balancer to distribute traffic. Use Amazon Aurora with Aurora Auto Scaling
for the database.
Answer: A
Explanation:
A development team recently created an AWS Lambda function through the console. The development team
needs to allow the function to access a database that runs in a private subnet in the company’s data center.
A. Configure the Lambda function to run in the VPC with the appropriate security group.
B. Set up a VPN connection from AWS to the data center. Route the traffic from the Lambda function through
the VPN.
C. Update the route tables in the VPC to allow the Lambda function to access the on-premises data center
through Direct Connect.
D. Create an Elastic IP address. Configure the Lambda function to send traffic through the Elastic IP address
without an elastic network interface.
Answer: A
Explanation:
2. Choose a function.
5. Choose a VPC, subnets, and security groups. <-- **That's why I believe the answer is A**
If your function needs internet access, use network address translation (NAT). Connecting a function to a
public subnet doesn't give it internet access or a public IP address.
How can a solutions architect ensure that the application has permission to access Amazon S3?
A. Update the S3 role in AWS IAM to allow read/write access from Amazon ECS, and then relaunch the
container.
B. Create an IAM role with S3 permissions, and then specify that role as the taskRoleArn in the task definition.
C. Create a security group that allows access from Amazon ECS to Amazon S3, and update the launch
configuration used by the ECS cluster.
D. Create an IAM user with S3 permissions, and then relaunch the Amazon EC2 instances for the ECS cluster
while logged in as this account.
Answer: B
Explanation:
To ensure that an Amazon Elastic Container Service (ECS) application has permission to access Amazon
Simple Storage Service (S3), the correct solution is to create an AWS Identity and Access Management (IAM)
role with the necessary S3 permissions and specify that role as the taskRoleArn in the task definition for the
ECS application.
Option B, creating an IAM role with S3 permissions and specifying that role as the taskRoleArn in the task
definition, is the correct solution to meet the requirement.
A. Configure AWS Storage Gateway in volume gateway mode. Mount the volume to each Windows instance.
B. Configure Amazon FSx for Windows File Server. Mount the Amazon FSx file system to each Windows
instance.
C. Configure a file system by using Amazon Elastic File System (Amazon EFS). Mount the EFS file system to
each Windows instance.
D. Configure an Amazon Elastic Block Store (Amazon EBS) volume with the required size. Attach each EC2
instance to the volume. Mount the file system within the volume to each Windows instance.
Answer: B
Explanation:
Configure Amazon FSx for Windows File Server. Mount the Amazon FSx file system to each Windows
instance.
Answer: AD
Explanation:
https://containersonaws.com/introduction/ec2-or-aws-fargate/
You can promote a read replica into a standalone DB instance. When you promote a read replica, the DB
instance is rebooted before it becomes available.
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ReadRepl.html
C.(X) use Amazon ECS instead of EC2-based docker for little human intervention
D.(O) Amazon ECS on AWS Fargate : AWS Fargate is a technology that you can use with Amazon ECS to run
containers without having to manage servers or clusters of Amazon EC2 instances.
The EC2 launch type can be used to run your containerized applications on Amazon EC2 instances that you
register to your Amazon ECS cluster and manage yourself.
A. Use AWS Transfer Family to configure an SFTP-enabled server with a publicly accessible endpoint. Choose
the S3 data lake as the destination.
B. Use Amazon S3 File Gateway as an SFTP server. Expose the S3 File Gateway endpoint URL to the new
partner. Share the S3 File Gateway endpoint with the new partner.
C. Launch an Amazon EC2 instance in a private subnet in a VPInstruct the new partner to upload files to the EC2
instance by using a VPN. Run a cron job script, on the EC2 instance to upload files to the S3 data lake.
D. Launch Amazon EC2 instances in a private subnet in a VPC. Place a Network Load Balancer (NLB) in front of
the EC2 instances. Create an SFTP listener port for the NLB. Share the NLB hostname with the new partner.
Run a cron job script on the EC2 instances to upload files to the S3 data lake.
Answer: A
Explanation:
Answer is A
AWS Transfer Family securely scales your recurring business-to-business file transfers to AWS Storage
services using SFTP, FTPS, FTP, and AS2 protocols.
https://aws.amazon.com/aws-transfer-family/
Which combination of steps should a solutions architect take to meet these requirements with the LEAST
operational overhead? (Choose two.)
A. Store the documents in Amazon S3. Use S3 Object Lock in governance mode.
B. Store the documents in Amazon S3. Use S3 Object Lock in compliance mode.
C. Use server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Configure key rotation.
D. Use server-side encryption with AWS Key Management Service (AWS KMS) customer managed keys.
Configure key rotation.
E. Use server-side encryption with AWS Key Management Service (AWS KMS) customer provided (imported)
keys. Configure key rotation.
Answer: BD
Explanation:
B. By using S3 Object Lock in compliance mode, it enforces a strict retention policy on the objects, preventing
any modifications or deletions.
D. By using server-side encryption with AWS KMS customer managed keys, the documents are encrypted
with a customer-controlled key. Enabling key rotation ensures that a new encryption key is generated
automatically at the defined rotation interval, enhancing security.
Option A: S3 Object Lock in governance mode does not provide the required immutability for the documents,
allowing potential modifications or deletions.
Option C: Server-side encryption with SSE-S3 alone does not fulfill the requirement of encryption key
rotation, which is explicitly specified.
Option E: Server-side encryption with customer-provided (imported) keys (SSE-C) is not necessary when AWS
KMS customer managed keys (Option D) can be used, which provide a more integrated and manageable
solution.
A. Create an Amazon S3 bucket. Enable static web hosting on the S3 bucket. Upload the static content to the
S3 bucket. Use AWS Lambda to process all dynamic content.
B. Deploy the web application to an AWS Elastic Beanstalk environment. Use URL swapping to switch between
multiple Elastic Beanstalk environments for feature testing.
C. Deploy the web application to Amazon EC2 instances that are configured with Java and PHP. Use Auto
Scaling groups and an Application Load Balancer to manage the website’s availability.
D. Containerize the web application. Deploy the web application to Amazon EC2 instances. Use the AWS Load
Balancer Controller to dynamically route traffic between containers that contain the new site features for
testing.
Answer: B
Explanation:
Elastic Beanstalk is a fully managed service that makes it easy to deploy and run applications in the AWS; To
enable frequent testing of new site features, you can use URL swapping to switch between multiple Elastic
Beanstalk environments.
Question: 191 CertyIQ
A company has an ordering application that stores customer information in Amazon RDS for MySQL. During
regular business hours, employees run one-time queries for reporting purposes. Timeouts are occurring during
order processing because the reporting queries are taking a long time to run. The company needs to eliminate the
timeouts without preventing employees from performing queries.
Answer: A
Explanation:
A solutions architect must implement a solution to analyze the documents, extract the medical information, and
store the documents so that an application can run SQL queries on the data. The solution must maximize
scalability and operational efficiency.
Which combination of steps should the solutions architect take to meet these requirements? (Choose two.)
A. Write the document information to an Amazon EC2 instance that runs a MySQL database.
B. Write the document information to an Amazon S3 bucket. Use Amazon Athena to query the data.
C. Create an Auto Scaling group of Amazon EC2 instances to run a custom application that processes the
scanned files and extracts the medical information.
D. Create an AWS Lambda function that runs when new documents are uploaded. Use Amazon Rekognition to
convert the documents to raw text. Use Amazon Transcribe Medical to detect and extract relevant medical
information from the text.
E. Create an AWS Lambda function that runs when new documents are uploaded. Use Amazon Textract to
convert the documents to raw text. Use Amazon Comprehend Medical to detect and extract relevant medical
information from the text.
Answer: BE
Explanation:
B is correct because it suggests writing the document information to an Amazon S3 bucket, which provides
scalable and durable object storage. Using Amazon Athena, the data can be queried using SQL, enabling
efficient analysis.
E is correct because it involves creating an AWS Lambda function triggered by new document uploads.
Amazon Textract is used to convert the documents to raw text, and Amazon Comprehend Medical extracts
relevant medical information from the text.
A is incorrect because writing the document information to an Amazon EC2 instance with a MySQL database
is not a scalable or efficient solution for analysis.
C is incorrect because creating an Auto Scaling group of Amazon EC2 instances for processing scanned files
and extracting information would introduce unnecessary complexity and management overhead.
D is incorrect because using an EC2 instance with a MySQL database for storing document information is not
the optimal solution for scalability and efficient analysis.
Answer: A
Explanation:
A. Launch two EC2 instances, each in a different Availability Zone in the same AWS Region. Install the database
on both EC2 instances. Configure the EC2 instances as a cluster. Set up database replication.
B. Launch an EC2 instance in an Availability Zone. Install the database on the EC2 instance. Use an Amazon
Machine Image (AMI) to back up the data. Use AWS CloudFormation to automate provisioning of the EC2
instance if a disruptive event occurs.
C. Launch two EC2 instances, each in a different AWS Region. Install the database on both EC2 instances. Set
up database replication. Fail over the database to a second Region.
D. Launch an EC2 instance in an Availability Zone. Install the database on the EC2 instance. Use an Amazon
Machine Image (AMI) to back up the data. Use EC2 automatic recovery to recover the instance if a disruptive
event occurs.
Answer: A
Explanation:
A. Move the EC2 instances into an Auto Scaling group. Create an Amazon EventBridge (Amazon CloudWatch
Events) rule to target an Amazon Elastic Container Service (Amazon ECS) task.
B. Move the EC2 instances into an Auto Scaling group behind an Application Load Balancer (ALB). Update the
order system to send messages to the ALB endpoint.
C. Move the EC2 instances into an Auto Scaling group. Configure the order system to send messages to an
Amazon Simple Queue Service (Amazon SQS) queue. Configure the EC2 instances to consume messages from
the queue.
D. Create an Amazon Simple Notification Service (Amazon SNS) topic. Create an AWS Lambda function, and
subscribe the function to the SNS topic. Configure the order system to send messages to the SNS topic. Send a
command to the EC2 instances to process the messages by using AWS Systems Manager Run Command.
Answer: C
Explanation:
By moving the EC2 into an ASG and configuring them to consume messages from an SQS, the system can
decouple the order processing from the order system itself. This allows the system to handle failures and
automatically process orders even if the order system or EC2 experience outages.
A. Using an ASG with an EventBridge rule targeting an ECS task does not provide the necessary decoupling
and message queueing for automatic order processing during outages.
ALB does not address the need for message queuing and automatic processing during outages.
D. Using SNS and Lambda can provide notifications and orchestration capabilities, but it does not provide the
necessary message queueing and consumption for automatic order processing during outages. Additionally,
using Systems Manager Run Command to send commands for order processing adds complexity and does not
provide the desired level of automation.
A. Use an AWS CloudFormation template to deploy the complete solution. Redeploy the CloudFormation stack
every 30 days, and delete the original stack.
B. Use an EC2 instance that runs a monitoring application from AWS Marketplace. Configure the monitoring
application to use Amazon DynamoDB Streams to store the timestamp when a new item is created in the table.
Use a script that runs on the EC2 instance to delete items that have a timestamp that is older than 30 days.
C. Configure Amazon DynamoDB Streams to invoke an AWS Lambda function when a new item is created in the
table. Configure the Lambda function to delete items in the table that are older than 30 days.
D. Extend the application to add an attribute that has a value of the current timestamp plus 30 days to each
new item that is created in the table. Configure DynamoDB to use the attribute as the TTL attribute.
Answer: D
Explanation:
The DynamoDB TTL feature allows you to define a per-item timestamp to determine when an item is no longer
needed. Shortly after the date and time of the specified timestamp, DynamoDB deletes the item from your
table without consuming any write throughput.
Which combination of actions should the company take to meet these requirements? (Choose two.)
A. Refactor the application as serverless with AWS Lambda functions running .NET Core.
B. Rehost the application in AWS Elastic Beanstalk with the .NET platform in a Multi-AZ deployment.
C. Replatform the application to run on Amazon EC2 with the Amazon Linux Amazon Machine Image (AMI).
D. Use AWS Database Migration Service (AWS DMS) to migrate from the Oracle database to Amazon
DynamoDB in a Multi-AZ deployment.
E. Use AWS Database Migration Service (AWS DMS) to migrate from the Oracle database to Oracle on Amazon
RDS in a Multi-AZ deployment.
Answer: BE
Explanation:
B. Rehost the application in AWS Elastic Beanstalk with the .NET platform in a Multi-AZ deployment.
E. Use AWS Database Migration Service (AWS DMS) to migrate from the Oracle database to Oracle on
Amazon RDS in a Multi-AZ deployment.
Rehosting the application in Elastic Beanstalk with the .NET platform can minimize development changes.
Multi-AZ deployment of Elastic Beanstalk will increase the availability of application, so it meets the
requirement of high availability.
Using AWS Database Migration Service (DMS) to migrate the database to Amazon RDS Oracle will ensure
compatibility, so the application can continue to use the same database technology, and the development
team can use their existing skills. It also migrates to a managed service, which will handle the availability, so
the team do not have to worry about it. Multi-AZ deployment will increase the availability of the database.
A. Use Amazon Elastic Container Service (Amazon ECS) with Amazon EC2 worker nodes for compute and
MongoDB on EC2 for data storage.
B. Use Amazon Elastic Container Service (Amazon ECS) with AWS Fargate for compute and Amazon DynamoDB
for data storage
C. Use Amazon Elastic Kubernetes Service (Amazon EKS) with Amazon EC2 worker nodes for compute and
Amazon DynamoDB for data storage.
D. Use Amazon Elastic Kubernetes Service (Amazon EKS) with AWS Fargate for compute and Amazon
DocumentDB (with MongoDB compatibility) for data storage.
Answer: D
Explanation:
To minimize operational overhead and avoid making any code or deployment method changes, the company
can use Amazon Elastic Kubernetes Service (EKS) with AWS Fargate for computing and Amazon DocumentDB
(with MongoDB compatibility) for data storage. This solution allows the company to run the containerized
application on EKS without having to manage the underlying infrastructure or make any changes to the
application code.
AWS Fargate is a fully-managed container execution environment that allows you to run containerized
applications without the need to manage the underlying EC2 instances.
Amazon DocumentDB is a fully-managed document database service that supports MongoDB workloads,
allowing the company to use the same database platform as in their on-premises environment without having
to make any code changes.
A. Use Amazon Rekognition for multiple speaker recognition. Store the transcript files in Amazon S3. Use
machine learning models for transcript file analysis.
B. Use Amazon Transcribe for multiple speaker recognition. Use Amazon Athena for transcript file analysis.
C. Use Amazon Translate for multiple speaker recognition. Store the transcript files in Amazon Redshift. Use
SQL queries for transcript file analysis.
D. Use Amazon Rekognition for multiple speaker recognition. Store the transcript files in Amazon S3. Use
Amazon Textract for transcript file analysis.
Answer: B
Explanation:
The correct answer is B: Use Amazon Transcribe for multiple speaker recognition. Use Amazon Athena for
transcript file analysis.
Amazon Transcribe is a service that automatically transcribes spoken language into written text. It can handle
multiple speakers and can generate transcript files in real-time or asynchronously. These transcript files can
be stored in Amazon S3 for long-term storage.
Amazon Athena is a query service that allows you to analyze data stored in Amazon S3 using SQL. You can
use it to analyze the transcript files and identify patterns in the data.
Option A is incorrect because Amazon Rekognition is a service for analyzing images and videos, not
transcribing spoken language.
Option C is incorrect because Amazon Translate is a service for translating text from one language to another,
not transcribing spoken language.
Option D is incorrect because Amazon Textract is a service for extracting text and data from documents and
images, not transcribing spoken language.
Which solution will meet these requirements with the LEAST operational overhead?
A. Configure an AWS Lambda function to be an authorizer in API Gateway to validate which user made the
request.
B. For each user, create and assign an API key that must be sent with each request. Validate the key by using an
AWS Lambda function.
C. Send the user’s email address in the header with every request. Invoke an AWS Lambda function to validate
that the user with that email address has proper access.
D. Configure an Amazon Cognito user pool authorizer in API Gateway to allow Amazon Cognito to validate each
request.
Answer: D
Explanation:
To control access to the REST API and reduce development efforts, the company can use an Amazon Cognito
user pool authorizer in API Gateway. This will allow Amazon Cognito to validate each request and ensure that
only authenticated users can access the API. This solution has the LEAST operational overhead, as it does not
require the company to develop and maintain any additional infrastructure or code.
Option D. Configure an Amazon Cognito user pool authorizer in API Gateway to allow Amazon Cognito to
validate each request.
A. Create an Amazon Connect contact flow to send the SMS messages. Use AWS Lambda to process the
responses.
B. Build an Amazon Pinpoint journey. Configure Amazon Pinpoint to send events to an Amazon Kinesis data
stream for analysis and archiving.
C. Use Amazon Simple Queue Service (Amazon SQS) to distribute the SMS messages. Use AWS Lambda to
process the responses.
D. Create an Amazon Simple Notification Service (Amazon SNS) FIFO topic. Subscribe an Amazon Kinesis data
stream to the SNS topic for analysis and archiving.
Answer: B
Explanation:
To send SMS messages and store the responses for a year for analysis, the company can use Amazon
Pinpoint. Amazon Pinpoint is a fully-managed service that allows you to send targeted and personalized SMS
messages to your users and track the results.
To meet the requirements of the company, a solutions architect can build an Amazon Pinpoint journey and
configure Amazon Pinpoint to send events to an Amazon Kinesis data stream for analysis and archiving. The
Kinesis data stream can be configured to store the data for a year, allowing the company to analyze the
responses over time.
Option B. Build an Amazon Pinpoint journey. Configure Amazon Pinpoint to send events to an Amazon Kinesis
data stream for analysis and archiving.
Which solution will meet these requirements with the LEAST operational overhead?
A. Move the data to the S3 bucket. Use server-side encryption with Amazon S3 managed encryption keys (SSE-
S3). Use the built-in key rotation behavior of SSE-S3 encryption keys.
B. Create an AWS Key Management Service (AWS KMS) customer managed key. Enable automatic key rotation.
Set the S3 bucket’s default encryption behavior to use the customer managed KMS key. Move the data to the
S3 bucket.
C. Create an AWS Key Management Service (AWS KMS) customer managed key. Set the S3 bucket’s default
encryption behavior to use the customer managed KMS key. Move the data to the S3 bucket. Manually rotate
the KMS key every year.
D. Encrypt the data with customer key material before moving the data to the S3 bucket. Create an AWS Key
Management Service (AWS KMS) key without key material. Import the customer key material into the KMS key.
Enable automatic key rotation.
Answer: B
Explanation:
SSE-S3 - is free and uses AWS owned CMKs (CMK = Customer Master Key). The encryption key is owned and
managed by AWS, and is shared among many accounts. Its rotation is automatic with time that varies as
shown in the table here. The time is not explicitly defined.
AWS managed CMK. This is free CMK generated only for your account. You can only view it policies and audit
usage, but not manage it. Rotation is automatic - once per 1095 days (3 years),
Customer managed CMK. This uses your own key that you create and can manage. Rotation is not enabled by
default. But if you enable it, it will be automatically rotated every 1 year. This variant can also use an imported
key material by you. If you create such key with an imported material, there is no automated rotation. Only
manual rotation.
SSE-C - customer provided key. The encryption key is fully managed by you outside of AWS. AWS will not
rotate it.
As the company expands, customers report that their meeting invitations are taking longer to arrive.
Answer: D
Explanation:
Option D. Add an Auto Scaling group for the application that sends meeting invitations. Configure the Auto
Scaling group to scale based on the depth of the SQS queue.
To resolve the issue of longer delivery times for meeting invitations, the solutions architect can recommend
adding an Auto Scaling group for the application that sends meeting invitations and configuring the Auto
Scaling group to scale based on the depth of the SQS queue. This will allow the application to scale up as the
number of appointment requests increases, improving the performance and delivery times of the meeting
invitations.
The company wants to make all the data available to various teams so that the teams can perform analytics. The
solution must provide the ability to manage fine-grained permissions for the data and must minimize operational
overhead.
Answer: C
Explanation:
https://aws.amazon.com/blogs/big-data/manage-fine-grained-access-control-using-aws-lake-formation/
The company decides to host its website on AWS and to use Amazon CloudFront. The company’s solutions
architect creates a CloudFront distribution. The solutions architect must design the most cost-effective and
resilient architecture for website hosting to serve as the CloudFront origin.
A. Create a virtual server by using Amazon Lightsail. Configure the web server in the Lightsail instance. Upload
website content by using an SFTP client.
B. Create an AWS Auto Scaling group for Amazon EC2 instances. Use an Application Load Balancer. Upload
website content by using an SFTP client.
C. Create a private Amazon S3 bucket. Use an S3 bucket policy to allow access from a CloudFront origin access
identity (OAI). Upload website content by using the AWS CLI.
D. Create a public Amazon S3 bucket. Configure AWS Transfer for SFTP. Configure the S3 bucket for website
hosting. Upload website content by using the SFTP client.
Answer: C
Explanation:
https://aws.amazon.com/aws-transfer-family/pricing/
Which solution will meet these requirements with the LEAST operational overhead?
A. Create an AWS Lambda function to query AWS CloudTrail logs and to send an alert when a CreateImage API
call is detected.
B. Configure AWS CloudTrail with an Amazon Simple Notification Service (Amazon SNS) notification that
occurs when updated logs are sent to Amazon S3. Use Amazon Athena to create a new table and to query on
CreateImage when an API call is detected.
C. Create an Amazon EventBridge (Amazon CloudWatch Events) rule for the CreateImage API call. Configure
the target as an Amazon Simple Notification Service (Amazon SNS) topic to send an alert when a CreateImage
API call is detected.
D. Configure an Amazon Simple Queue Service (Amazon SQS) FIFO queue as a target for AWS CloudTrail logs.
Create an AWS Lambda function to send an alert to an Amazon Simple Notification Service (Amazon SNS) topic
when a CreateImage API call is detected.
Answer: C
Explanation:
The correct solution is Option C. Creating an Amazon EventBridge (Amazon CloudWatch Events) rule for the
CreateImage API call and configuring the target as an Amazon Simple Notification Service (Amazon SNS)
topic to send an alert when a CreateImage API call is detected will meet the requirements with the least
operational overhead.
Amazon EventBridge is a serverless event bus that makes it easy to connect applications together using data
from your own applications, integrated Software as a Service (SaaS) applications, and AWS services. By
creating an EventBridge rule for the CreateImage API call, the company can set up alerts whenever this
operation is called within their account. The alert can be sent to an SNS topic, which can then be configured to
send notifications to the company's email or other desired destination.
This solution does not require the company to create a Lambda function or query CloudTrail logs, which
makes it the most cost-effective and efficient option.
The company provisioned as much DynamoDB throughput as its budget allows, but the company is still
experiencing availability issues and is losing user requests.
What should a solutions architect do to address this issue without impacting existing users?
Answer: D
Explanation:
To address the issue of lost user requests and improve the availability of the API, the solutions architect
should use the Amazon Simple Queue Service (Amazon SQS) queue and Lambda to buffer writes to
DynamoDB. Option D (correct answer)
By using an SQS queue and Lambda, the solutions architect can decouple the API front end from the
processing microservices and improve the overall scalability and availability of the system. The SQS queue
acts as a buffer, allowing the API front end to continue accepting user requests even if the processing
microservices are experiencing high workloads or are temporarily unavailable. The Lambda function can then
retrieve requests from the SQS queue and write them to DynamoDB, ensuring that all user requests are
stored and processed. This approach allows the company to scale the processing microservices
independently from the API front end, ensuring that the API remains available to users even during periods of
high demand.
A. Create an interface VPC endpoint for Amazon S3 in the subnet where the EC2 instance is located. Attach a
resource policy to the S3 bucket to only allow the EC2 instance’s IAM role for access.
B. Create a gateway VPC endpoint for Amazon S3 in the Availability Zone where the EC2 instance is located.
Attach appropriate security groups to the endpoint. Attach a resource policy to the S3 bucket to only allow the
EC2 instance’s IAM role for access.
C. Run the nslookup tool from inside the EC2 instance to obtain the private IP address of the S3 bucket’s
service API endpoint. Create a route in the VPC route table to provide the EC2 instance with access to the S3
bucket. Attach a resource policy to the S3 bucket to only allow the EC2 instance’s IAM role for access.
D. Use the AWS provided, publicly available ip-ranges.json file to obtain the private IP address of the S3
bucket’s service API endpoint. Create a route in the VPC route table to provide the EC2 instance with access to
the S3 bucket. Attach a resource policy to the S3 bucket to only allow the EC2 instance’s IAM role for access.
Answer: A
Explanation:
The correct answer is A. Create an interface VPC endpoint for Amazon S3 in the subnet where the EC2
instance is located. Attach a resource policy to the S3 bucket to only allow the EC2 instance’s IAM role for
access.
A VPC endpoint allows you to create a private connection between your VPC and another service without
requiring access over the internet, a NAT device, or a VPN connection. An interface VPC endpoint is a network
interface that you can create in your VPC that serves as an entry point for incoming traffic. You can use an
interface VPC endpoint to access resources in the service, such as an Amazon S3 bucket.
What should the solutions architect do to ensure that the architecture supports distributed session data
management?
Answer: A
Explanation:
The correct answer is A. Use Amazon ElastiCache to manage and store session data.
In order to support distributed session data management in this scenario, it is necessary to use a distributed
data store such as Amazon ElastiCache. This will allow the session data to be stored and accessed by multiple
EC2 instances across multiple Availability Zones, which is necessary for a scalable and highly available
architecture.
Option B, using session affinity (sticky sessions) of the ALB, would not be sufficient because this would only
allow the session data to be stored on a single EC2 instance, which would not be able to scale across multiple
Availability Zones.
Options C and D, using Session Manager and the GetSessionToken API operation in AWS STS, are not related
to session data management and would not be appropriate solutions for this scenario.
• A group of Amazon EC2 instances that run in an Amazon EC2 Auto Scaling group to collect orders from the
application
• Another group of EC2 instances that run in an Amazon EC2 Auto Scaling group to fulfill orders
The order collection process occurs quickly, but the order fulfillment process can take longer. Data must not be
lost because of a scaling event.
A solutions architect must ensure that the order collection process and the order fulfillment process can both
scale properly during peak traffic hours. The solution must optimize utilization of the company’s AWS resources.
A. Use Amazon CloudWatch metrics to monitor the CPU of each instance in the Auto Scaling groups. Configure
each Auto Scaling group’s minimum capacity according to peak workload values.
B. Use Amazon CloudWatch metrics to monitor the CPU of each instance in the Auto Scaling groups. Configure
a CloudWatch alarm to invoke an Amazon Simple Notification Service (Amazon SNS) topic that creates
additional Auto Scaling groups on demand.
C. Provision two Amazon Simple Queue Service (Amazon SQS) queues: one for order collection and another for
order fulfillment. Configure the EC2 instances to poll their respective queue. Scale the Auto Scaling groups
based on notifications that the queues send.
D. Provision two Amazon Simple Queue Service (Amazon SQS) queues: one for order collection and another for
order fulfillment. Configure the EC2 instances to poll their respective queue. Create a metric based on a
backlog per instance calculation. Scale the Auto Scaling groups based on this metric.
Answer: D
Explanation:
When the backlog per instance reaches the target value, a scale-out event will happen. Because the backlog
per instance is already 150 messages (1500 messages / 10 instances), your group scales out, and it scales out
by five instances to maintain proportion to the target value.
Backlog per instance: To calculate your backlog per instance, start with the ApproximateNumberOfMessages
queue attribute to determine the length of the SQS queue (number of messages available for retrieval from
the queue). Divide that number by the fleet's running capacity, which for an Auto Scaling group is the number
of instances in the InService state, to get the backlog per instance.
https://docs.aws.amazon.com/autoscaling/ec2/userguide/as-using-sqs-queue.html
A. Use AWS CloudTrail to generate a list of resources with the application tag.
B. Use the AWS CLI to query each service across all Regions to report the tagged components.
C. Run a query in Amazon CloudWatch Logs Insights to report on the components with the application tag.
D. Run a query with the AWS Resource Groups Tag Editor to report on the resources globally with the
application tag.
Answer: D
Explanation:
A solutions architect can provide the quickest solution for identifying all of the tagged components by
running running a query with the AWS Resource Groups Tag Editor to report on the resources globally with
the application tag, hence the option D is right answer.
Which S3 storage class should the company use to meet these requirements?
A. S3 Intelligent-Tiering
B. S3 Glacier Instant Retrieval
C. S3 Standard
D. S3 Standard-Infrequent Access (S3 Standard-IA)
Answer: A
Explanation:
S3 Intelligent-Tiering monitors access patterns and moves objects that have not been accessed for 30
consecutive days to the Infrequent Access tier and after 90 days of no access to the Archive Instant Access
tier.
Question: 213 CertyIQ
A company is developing a new mobile app. The company must implement proper traffic filtering to protect its
Application Load Balancer (ALB) against common application-level attacks, such as cross-site scripting or SQL
injection. The company has minimal infrastructure and operational staff. The company needs to reduce its share of
the responsibility in managing, updating, and securing servers for its AWS environment.
A. Configure AWS WAF rules and associate them with the ALB.
B. Deploy the application using Amazon S3 with public hosting enabled.
C. Deploy AWS Shield Advanced and add the ALB as a protected resource.
D. Create a new ALB that directs traffic to an Amazon EC2 instance running a third-party firewall, which then
passes the traffic to the current ALB.
Answer: A
Explanation:
Configure AWS WAF rules and associate them with the ALB.
Which solution will meet these requirements with the LEAST development effort?
A. Create an Amazon EMR cluster with Apache Spark installed. Write a Spark application to transform the data.
Use EMR File System (EMRFS) to write files to the transformed data bucket.
B. Create an AWS Glue crawler to discover the data. Create an AWS Glue extract, transform, and load (ETL) job
to transform the data. Specify the transformed data bucket in the output step.
C. Use AWS Batch to create a job definition with Bash syntax to transform the data and output the data to the
transformed data bucket. Use the job definition to submit a job. Specify an array job as the job type.
D. Create an AWS Lambda function to transform the data and output the data to the transformed data bucket.
Configure an event notification for the S3 bucket. Specify the Lambda function as the destination for the event
notification.
Answer: B
Explanation:
It looks like AWS Glue allows fully managed CSV to Parquet conversion jobs:
https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/three-aws-glue-etl-job-types-for-
converting-data-to-apache-parquet.html
A. Order AWS Snowball devices to transfer the data. Use a lifecycle policy to transition the files to Amazon S3
Glacier Deep Archive.
B. Deploy a VPN connection between the data center and Amazon VPC. Use the AWS CLI to copy the data from
on premises to Amazon S3 Glacier.
C. Provision a 500 Mbps AWS Direct Connect connection and transfer the data to Amazon S3. Use a lifecycle
policy to transition the files to Amazon S3 Glacier Deep Archive.
D. Use AWS DataSync to transfer the data and deploy a DataSync agent on premises. Use the DataSync task to
copy files from the on-premises NAS storage to Amazon S3 Glacier.
Answer: A
Explanation:
Order AWS Snowball devices to transfer the data. Use a lifecycle policy to transition the files to Amazon S3
Glacier Deep Archive.
Which solution will meet these requirements with the LEAST amount of effort?
A. Create a new S3 bucket. Turn on the default encryption settings for the new S3 bucket. Download all
existing objects to temporary local storage. Upload the objects to the new S3 bucket.
B. Turn on the default encryption settings for the S3 bucket. Use the S3 Inventory feature to create a .csv file
that lists the unencrypted objects. Run an S3 Batch Operations job that uses the copy command to encrypt
those objects.
C. Create a new encryption key by using AWS Key Management Service (AWS KMS). Change the settings on
the S3 bucket to use server-side encryption with AWS KMS managed encryption keys (SSE-KMS). Turn on
versioning for the S3 bucket.
D. Navigate to Amazon S3 in the AWS Management Console. Browse the S3 bucket’s objects. Sort by the
encryption field. Select each unencrypted object. Use the Modify button to apply default encryption settings to
every unencrypted object in the S3 bucket.
Answer: B
Explanation:
A. Deploy the application with the required infrastructure elements in place. Use Amazon Route 53 to configure
active-passive failover. Create an Aurora Replica in a second AWS Region.
B. Host a scaled-down deployment of the application in a second AWS Region. Use Amazon Route 53 to
configure active-active failover. Create an Aurora Replica in the second Region.
C. Replicate the primary infrastructure in a second AWS Region. Use Amazon Route 53 to configure active-
active failover. Create an Aurora database that is restored from the latest snapshot.
D. Back up data with AWS Backup. Use the backup to create the required infrastructure in a second AWS
Region. Use Amazon Route 53 to configure active-passive failover. Create an Aurora second primary instance in
the second Region.
Answer: A
Explanation:
A is correct.
- "The solution does not need to handle the load when the primary infrastructure is healthy." => Should use
Route 53 Active-Passive ==> Exclude B, C
- D is incorrect because "Create an Aurora second primary instance in the second Region.", we need to create
an Aurora Replica enough.
A. Create a security group with a rule to allow TCP port 443 from source 0.0.0.0/0.
B. Create a security group with a rule to allow TCP port 443 to destination 0.0.0.0/0.
C. Update the network ACL to allow TCP port 443 from source 0.0.0.0/0.
D. Update the network ACL to allow inbound/outbound TCP port 443 from source 0.0.0.0/0 and to destination
0.0.0.0/0.
E. Update the network ACL to allow inbound TCP port 443 from source 0.0.0.0/0 and outbound TCP port 32768-
65535 to destination 0.0.0.0/0.
Answer: AE
Explanation:
A, E is perfect the combination. To be more precise, We should add outbound with "outbound TCP port 32768-
65535 to destination 0.0.0.0/0." as an ephemeral port due to the stateless of NACL.
Which solution will resolve these issues in the MOST operationally efficient way?
A. Replace the EC2 instances with T3 EC2 instances that run in an Auto Scaling group. Make the changes by
using the AWS Management Console.
B. Modify the CloudFormation templates to run the EC2 instances in an Auto Scaling group. Increase the
desired capacity and the maximum capacity of the Auto Scaling group manually when an increase is necessary.
C. Modify the CloudFormation templates. Replace the EC2 instances with R5 EC2 instances. Use Amazon
CloudWatch built-in EC2 memory metrics to track the application performance for future capacity planning.
D. Modify the CloudFormation templates. Replace the EC2 instances with R5 EC2 instances. Deploy the
Amazon CloudWatch agent on the EC2 instances to generate custom application latency metrics for future
capacity planning.
Answer: D
Explanation:
"in-memory tasks" => need the "R" EC2 instance type to archive memory optimization. So we are concerned
about C & D. Because EC2 instances don't have built-in memory metrics to CW by default. As a result, we have
to install the CW agent to archive the purpose.
Which compute service should the solutions architect have the API invoke to deliver the requirements at the
lowest cost?
Answer: B
Explanation:
API Gateway + Lambda is the perfect solution for modern applications with serverless architecture.
Answer: D
Explanation:
Amazon S3 -
Requests to Amazon S3 can be authenticated or anonymous. Authenticated access requires credentials that
AWS can use to authenticate your requests. When making REST API calls directly from your code, you create
a signature using valid credentials and include the signature in your request. Amazon Simple Storage
Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability,
security, and performance. This means customers of all sizes and industries can use it to store and protect any
amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive,
enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management
features so you can organize your data and configure finely-tuned access controls to meet your specific
business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999%
(11 9's) of durability, and stores data for millions of applications for companies all around the world.
Reference:
https://aws.amazon.com/s3/
A. Create an IAM role in the company’s account to delegate access to the vendor’s IAM role. Attach the
appropriate IAM policies to the role for the permissions that the vendor requires.
B. Create an IAM user in the company’s account with a password that meets the password complexity
requirements. Attach the appropriate IAM policies to the user for the permissions that the vendor requires.
C. Create an IAM group in the company’s account. Add the tool’s IAM user from the vendor account to the
group. Attach the appropriate IAM policies to the group for the permissions that the vendor requires.
D. Create a new identity provider by choosing “AWS account” as the provider type in the IAM console. Supply
the vendor’s AWS account ID and user name. Attach the appropriate IAM policies to the new provider for the
permissions that the vendor requires.
Answer: A
Explanation:
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_third-party.html
Which combination of steps should the solutions architect take to accomplish this goal? (Choose two.)
A. Attach an IAM role that has sufficient privileges to the EKS pod.
B. Attach an IAM user that has sufficient privileges to the EKS pod.
C. Allow outbound connectivity to the DynamoDB table through the private subnets’ network ACLs.
D. Create a VPC endpoint for DynamoDB.
E. Embed the access keys in the Java Spring Boot code.
Answer: AD
Explanation:
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/vpc-endpoints-dynamodb.html
https://aws.amazon.com/about-aws/whats-new/2019/09/amazon-eks-adds-support-to-assign-iam-
permissions-to-kubernetes-service-accounts/
Which combination of steps should the company take to meet these requirements? (Choose two.)
Answer: CE
Explanation:
E. Launch four EC2 instances: two instances in one Availability Zone and two instances in another Availability
Zone.
A. Send activity data to an Amazon Kinesis data stream. Configure the stream to deliver the data to an Amazon
S3 bucket.
B. Send activity data to an Amazon Kinesis Data Firehose delivery stream. Configure the stream to deliver the
data to an Amazon Redshift cluster.
C. Place activity data in an Amazon S3 bucket. Configure Amazon S3 to run an AWS Lambda function on the
data as the data arrives in the S3 bucket.
D. Create an ingestion service on Amazon EC2 instances that are spread across multiple Availability Zones.
Configure the service to forward data to an Amazon RDS Multi-AZ database.
Answer: B
Explanation:
Data ingestion through Kinesis data streams will require manual intervention to provide more shards as data
size grows. Kinesis firehose will ingest data with the least operational overhead.
Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)
Answer: AE
Explanation:
"RESTful web services" => API Gateway. "EC2 instance receives the raw data, transforms the raw data, and
stores all the data in an Amazon S3 bucket" => GLUE with (Extract - Transform - Load)
After the fourth year of use of the S3 bucket, the S3 bucket metrics show that the number of objects has
continued to rise. However, the number of new CloudTrail logs that are delivered to the S3 bucket has remained
consistent.
Which solution will delete objects that are older than 3 years in the MOST cost-effective manner?
A. Configure the organization’s centralized CloudTrail trail to expire objects after 3 years.
B. Configure the S3 Lifecycle policy to delete previous versions as well as current versions.
C. Create an AWS Lambda function to enumerate and delete objects from Amazon S3 that are older than 3
years.
D. Configure the parent account as the owner of all objects that are delivered to the S3 bucket.
Answer: B
Explanation:
The question clearly says "An S3 Lifecycle policy is in place to delete current objects after 3 years". This
implies that previous versions are not deleted, since this is a separate setting, and since logs are constantly
changed, it would seem to make sense to delete previous versions so, so B. D is wrong, since the parent
account (the management account) will already be the owner of all objects delivered to the S3 bucket, "All
accounts in the organization can see MyOrganizationTrail in their list of trails, but member accounts cannot
remove or modify the organization trail. Only the management account or delegated administrator account
can change or delete the trail for the organization.", see
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html
After an inspection of the logs, the company determines that the database is not capable of processing the volume
of write traffic that comes from the API. A solutions architect must minimize the number of connections to the
database and must ensure that data is not lost during periods of heavy traffic.
A. Increase the size of the DB instance to an instance type that has more available memory.
B. Modify the DB instance to be a Multi-AZ DB instance. Configure the application to write to all active RDS DB
instances.
C. Modify the API to write incoming data to an Amazon Simple Queue Service (Amazon SQS) queue. Use an
AWS Lambda function that Amazon SQS invokes to write data from the queue to the database.
D. Modify the API to write incoming data to an Amazon Simple Notification Service (Amazon SNS) topic. Use an
AWS Lambda function that Amazon SNS invokes to write data from the topic to the database.
Answer: C
Explanation:
Modify the API to write incoming data to an Amazon Simple Queue Service (Amazon SQS) queue. Use an AWS
Lambda function that Amazon SQS invokes to write data from the queue to the database.
Answer: A
Explanation:
Migrating the databases to Aurora Serverless provides automated scaling and replication capabilities. Aurora
Serverless automatically scales the capacity based on the workload, allowing for seamless addition or
removal of compute capacity as needed. It also offers improved performance, durability, and high availability
without requiring manual management of replication and scaling.
B. Incorrect because it suggests migrating to a different database engine, which may introduce compatibility
issues and require significant code modifications.
C. Incorrect because consolidating into a larger MySQL database on larger EC2 instances does not provide
the desired scalability and automation.
D. Incorrect because using EC2 Auto Scaling groups for the database tier still requires manual management
of replication and scaling.
A. Remove the two NAT instances and replace them with two NAT gateways in the same Availability Zone.
B. Use Auto Scaling groups with Network Load Balancers for the NAT instances in different Availability Zones.
C. Remove the two NAT instances and replace them with two NAT gateways in different Availability Zones.
D. Replace the two NAT instances with Spot Instances in different Availability Zones and deploy a Network
Load Balancer.
Answer: C
Explanation:
This recommendation ensures high availability and fault tolerance by distributing the NAT gateways across
multiple AZs. NAT gateways are managed AWS services that provide scalable and highly available outbound
NAT functionality. By deploying NAT gateways in differentAZs, the company can achieve redundancy and
avoid a single point of failure. This solution also provides automatic scaling to handle increasing traffic
without manual intervention.
Option A is incorrect because placing both NAT gateways in the same Availability Zone does not provide fault
tolerance.
Option B is incorrect because using Auto Scaling groups with Network Load Balancers is not the
recommended approach for NAT instances.
Option D is incorrect because Spot Instances are not suitable for critical infrastructure components like NAT
instances.
A. Create a DB instance security group that allows all traffic from the public IP address of the application
server in VPC A.
B. Configure a VPC peering connection between VPC A and VPC B.
C. Make the DB instance publicly accessible. Assign a public IP address to the DB instance.
D. Launch an EC2 instance with an Elastic IP address into VPC B. Proxy all requests through the new EC2
instance.
Answer: B
Explanation:
https://aws.amazon.com/premiumsupport/knowledge-center/rds-connectivity-instance-subnet-vpc/ My DB
instance can't be accessed by an Amazon EC2 instance from a different VPC Create a VPC peering connection
between the VPCs. A VPC peering connection allows two VPCs to communicate with each other using private
IP addresses. 1. Create and accept a VPC peering connection. Important: If the VPCs are in the same AWS
account, be sure that the IPv4 CIDR blocks don't overlap. For more information, see VPC peering limitations.
5. On the Amazon Elastic Compute Cloud (Amazon EC2) instance, test the VPC peering connection by using a
networking utility. See the following example:
A.Configure Amazon CloudWatch Application Insights to create AWS Systems Manager OpsItems when RDP or
SSH access is detected.
B.Configure the EC2 instances with an IAM instance profile that has an IAM role with the
AmazonSSMManagedInstanceCore policy attached.
C.Publish VPC flow logs to Amazon CloudWatch Logs. Create required metric filters. Create an Amazon
CloudWatch metric alarm with a notification action for when the alarm is in the ALARM state.
D.Configure an Amazon EventBridge rule to listen for events of type EC2 Instance State-change Notification.
Configure an Amazon Simple Notification Service (Amazon SNS) topic as a target. Subscribe the operations
team to the topic.
Answer: C
Explanation:
EC2 Instance State-change Notifications are not the same as RDP or SSH established connection
notifications. Use Amazon CloudWatch Logs to monitor SSH access to your Amazon EC2 Linux instances so
that you can monitor rejected (or established) SSH connection requests and take action.
Answer: AB
Explanation:
https://docs.aws.amazon.com/accounts/latest/reference/best-practices-root-user.html
* Enable AWS multi-factor authentication (MFA) on your AWS account root user. For more information, see
Using multi-factor authentication (MFA) in AWS in the IAM User Guide.
* Never share your AWS account root user password or access keys with anyone.
* Use a strong password to help protect access to the AWS Management Console. For information about
managing your AWS account root user password, see Changing the password for the root user.
A. Use AWS Key Management Service (AWS KMS) certificates on the ALB to encrypt data in transit. Use AWS
Certificate Manager (ACM) to encrypt the EBS volumes and Aurora database storage at rest.
B. Use the AWS root account to log in to the AWS Management Console. Upload the company’s encryption
certificates. While in the root account, select the option to turn on encryption for all data at rest and in transit
for the account.
C. Use AWS Key Management Service (AWS KMS) to encrypt the EBS volumes and Aurora database storage at
rest. Attach an AWS Certificate Manager (ACM) certificate to the ALB to encrypt data in transit.
D. Use BitLocker to encrypt all data at rest. Import the company’s TLS certificate keys to AWS Key
Management Service (AWS KMS) Attach the KMS keys to the ALB to encrypt data in transit.
Answer: C
Explanation:
A. Use AWS DataSync for the initial migration. Use AWS Database Migration Service (AWS DMS) to create a
change data capture (CDC) replication task and a table mapping to select all tables.
B. Use AWS DataSync for the initial migration. Use AWS Database Migration Service (AWS DMS) to create a full
load plus change data capture (CDC) replication task and a table mapping to select all tables.
C. Use the AWS Schema Conversion Tool with AWS Database Migration Service (AWS DMS) using a memory
optimized replication instance. Create a full load plus change data capture (CDC) replication task and a table
mapping to select all tables.
D. Use the AWS Schema Conversion Tool with AWS Database Migration Service (AWS DMS) using a compute
optimized replication instance. Create a full load plus change data capture (CDC) replication task and a table
mapping to select the largest tables.
Answer: C
Explanation:
C : because we need SCT to convert from Oracle to PostgreSQL, and we need memory optimized machine for
databases not compute optimized.
A. Use Amazon S3 to host the front-end layer. Use AWS Lambda functions for the application layer. Move the
database to an Amazon DynamoDB table. Use Amazon S3 to store and serve users’ images.
B. Use load-balanced Multi-AZ AWS Elastic Beanstalk environments for the front-end layer and the application
layer. Move the database to an Amazon RDS DB instance with multiple read replicas to serve users’ images.
C. Use Amazon S3 to host the front-end layer. Use a fleet of EC2 instances in an Auto Scaling group for the
application layer. Move the database to a memory optimized instance type to store and serve users’ images.
D. Use load-balanced Multi-AZ AWS Elastic Beanstalk environments for the front-end layer and the application
layer. Move the database to an Amazon RDS Multi-AZ DB instance. Use Amazon S3 to store and serve users’
images.
Answer: D
Explanation:
Use load-balanced Multi-AZ AWS Elastic Beanstalk environments for the front-end layer and the application
layer. Move the database to an Amazon RDS Multi-AZ DB instance. Use Amazon S3 to store and serve users’
images.
Question: 237 CertyIQ
An application running on an Amazon EC2 instance in VPC-A needs to access files in another EC2 instance in VPC-
B. Both VPCs are in separate AWS accounts. The network administrator needs to design a solution to configure
secure access to EC2 instance in VPC-B from VPC-A. The connectivity should not have a single point of failure or
bandwidth concerns.
Answer: A
Explanation:
AWS uses the existing infrastructure of a VPC to create a VPC peering connection; it is neither a gateway nor
a VPN connection, and does not rely on a separate piece of physical hardware. There is no single point of
failure for communication or a bandwidth bottleneck.
https://docs.aws.amazon.com/vpc/latest/peering/what-is-vpc-peering.html
A. Use Cost Explorer to create a daily report of costs by service. Filter the report by EC2 instances. Configure
Cost Explorer to send an Amazon Simple Email Service (Amazon SES) notification when a threshold is
exceeded.
B. Use Cost Explorer to create a monthly report of costs by service. Filter the report by EC2 instances.
Configure Cost Explorer to send an Amazon Simple Email Service (Amazon SES) notification when a threshold
is exceeded.
C. Use AWS Budgets to create a cost budget for each account. Set the period to monthly. Set the scope to EC2
instances. Set an alert threshold for the budget. Configure an Amazon Simple Notification Service (Amazon
SNS) topic to receive a notification when a threshold is exceeded.
D. Use AWS Cost and Usage Reports to create a report with hourly granularity. Integrate the report data with
Amazon Athena. Use Amazon EventBridge to schedule an Athena query. Configure an Amazon Simple
Notification Service (Amazon SNS) topic to receive a notification when a threshold is exceeded.
Answer: C
Explanation:
AWS Budgets allows you to create budgets for your AWS accounts and set alerts when usage exceeds a
certain threshold. By creating a budget for each account, specifying the period as monthly and the scope as
EC2 instances, you can effectively track the EC2 usage for each account and be notified when a threshold is
exceeded. This solution is the most cost-effective option as it does not require additional resources such as
Amazon Athena or Amazon EventBridge.
Question: 239 CertyIQ
A solutions architect needs to design a new microservice for a company’s application. Clients must be able to call
an HTTPS endpoint to reach the microservice. The microservice also must use AWS Identity and Access
Management (IAM) to authenticate calls. The solutions architect will write the logic for this microservice by using a
single AWS Lambda function that is written in Go 1.x.
Which solution will deploy the function in the MOST operationally efficient way?
A. Create an Amazon API Gateway REST API. Configure the method to use the Lambda function. Enable IAM
authentication on the API.
B. Create a Lambda function URL for the function. Specify AWS_IAM as the authentication type.
C. Create an Amazon CloudFront distribution. Deploy the function to [email protected] Integrate IAM
authentication logic into the [email protected] function.
D. Create an Amazon CloudFront distribution. Deploy the function to CloudFront Functions. Specify AWS_IAM
as the authentication type.
Answer: A
Explanation:
A. Create an Amazon API Gateway REST API. Configure the method to use the Lambda function. Enable IAM
authentication on the API.
This option is the most operationally efficient as it allows you to use API Gateway to handle the HTTPS
endpoint and also allows you to use IAM to authenticate the calls to the microservice. API Gateway also
provides many additional features such as caching, throttling, and monitoring, which can be useful for a
microservice
Which solution provides the LOWEST data transfer egress cost for the company?
A. Host the visualization tool on premises and query the data warehouse directly over the internet.
B. Host the visualization tool in the same AWS Region as the data warehouse. Access it over the internet.
C. Host the visualization tool on premises and query the data warehouse directly over a Direct Connect
connection at a location in the same AWS Region.
D. Host the visualization tool in the same AWS Region as the data warehouse and access it over a Direct
Connect connection at a location in the same Region.
Answer: D
Explanation:
Host the visualization tool in the same AWS Region as the data warehouse and access it over a Direct
Connect connection at a location in the same Region.D: Direct Connect connection at a location in the same
Region will provide the lowest data transfer egress cost, improved performance, and lower complexity
Why it is not C is because the visualization tool is hosted on-premises, as it's not hosted in the same region as
the data warehouse the data transfer between them would occur over the internet, thus, would incur in egress
data transfer costs.
Which solution will meet these requirements with the LEAST amount of operational overhead?
Answer: C
Explanation:
Question says " online across multiple AWS Regions at all times".
Currently only Read Replica supports cross-regions , Multi-AZ does not support cross-region (it works only in
same region)
https://aws.amazon.com/about-aws/whats-new/2018/01/amazon-rds-read-replicas-now-support-multi-az-
deployments/
Answer: C
Explanation:
Use a multivalue answer routing policy to help distribute DNS responses across multiple resources. For
example, use multivalue answer routing when you want to associate your routing records with a Route 53
health check. For example, use multivalue answer routing when you need to return multiple values for a DNS
query and route traffic to multiple IP addresses.
https://aws.amazon.com/premiumsupport/knowledge-center/multivalue-versus-simple-policies/
A. Deploy an AWS Storage Gateway file gateway as a virtual machine (VM) on premises at each clinic
B. Migrate the files to each clinic’s on-premises applications by using AWS DataSync for processing.
C. Deploy an AWS Storage Gateway volume gateway as a virtual machine (VM) on premises at each clinic.
D. Attach an Amazon Elastic File System (Amazon EFS) file system to each clinic’s on-premises servers.
Answer: A
Explanation:
A. Deploy an AWS Storage Gateway file gateway as a virtual machine (VM) on premises at each clinic
AWS Storage Gateway is a service that connects an on-premises software appliance with cloud-based
storage to provide seamless and secure integration between an organization's on-premises IT environment
and AWS's storage infrastructure. By deploying a file gateway as a virtual machine on each clinic's premises,
the medical research lab can provide low-latency access to the data stored in the S3 bucket while maintaining
read-only permissions for each clinic. This solution allows the clinics to access the data files directly from
their on-premises file-based applications without the need for data transfer or migration.
A. Move the database to Amazon RDS, and enable automatic backups. Manually launch another EC2 instance in
the same Availability Zone. Configure an Application Load Balancer in the Availability Zone, and set the two
instances as targets.
B. Migrate the database to an Amazon Aurora instance with a read replica in the same Availability Zone as the
existing EC2 instance. Manually launch another EC2 instance in the same Availability Zone. Configure an
Application Load Balancer, and set the two EC2 instances as targets.
C. Move the database to Amazon Aurora with a read replica in another Availability Zone. Create an Amazon
Machine Image (AMI) from the EC2 instance. Configure an Application Load Balancer in two Availability Zones.
Attach an Auto Scaling group that uses the AMI across two Availability Zones.
D. Move the database to a separate EC2 instance, and schedule backups to Amazon S3. Create an Amazon
Machine Image (AMI) from the original EC2 instance. Configure an Application Load Balancer in two Availability
Zones. Attach an Auto Scaling group that uses the AMI across two Availability Zones.
Answer: C
Explanation:
C. Move the database to Amazon Aurora with a read replica in another Availability Zone. Create an Amazon
Machine Image (AMI) from the EC2 instance. Configure an Application Load Balancer in two Availability Zones.
Attach an Auto Scaling group that uses the AMI across two Availability Zones.
This approach will provide both high availability and scalability for the website platform. By moving the
database to Amazon Aurora with a read replica in another availability zone, it will provide a failover option for
the database. The use of an Application Load Balancer and an Auto Scaling group across two availability
zones allows for automatic scaling of the website to meet increased user demand. Additionally, creating an
AMI from the original EC2 instance allows for easy replication of the instance in case of failure.
A. Reconfigure the target group in the development environment to have only one EC2 instance as a target.
B. Change the ALB balancing algorithm to least outstanding requests.
C. Reduce the size of the EC2 instances in both environments.
D. Reduce the maximum number of EC2 instances in the development environment’s Auto Scaling group.
Answer: A
Explanation:
Reconfigure the target group in the development environment to have only one EC2 instance as a target.
How should the solutions architect reconfigure the architecture to resolve this issue?
A. Replace the ALB with a Network Load Balancer. Configure a NAT gateway in a public subnet to allow
internet traffic.
B. Move the EC2 instances to public subnets. Add a rule to the EC2 instances’ security groups to allow
outbound traffic to 0.0.0.0/0.
C. Update the route tables for the EC2 instances’ subnets to send 0.0.0.0/0 traffic through the internet gateway
route. Add a rule to the EC2 instances’ security groups to allow outbound traffic to 0.0.0.0/0.
D. Create public subnets in each Availability Zone. Associate the public subnets with the ALB. Update the route
tables for the public subnets with a route to the private subnets.
Answer: D
Explanation:
D. Create public subnets in each Availability Zone. Associate the public subnets with the ALB. Update the
route tables for the public subnets with a route to the private subnets.
This solution will resolve the issue by allowing the internet traffic to reach the EC2 instances. By creating
public subnets in each availability zone and associating them with the ALB, the internet traffic will be directed
to the ALB. Updating the route tables for the public subnets with a route to the private subnets will allow the
traffic to be routed to the private subnets where the EC2 instances reside. This ensures that the traffic
reaches the correct target group, and the security group of the instances allows inbound traffic from the
internet.
Which combination of actions should a solutions architect take before implementing this change? (Choose two.)
Answer: CE
Explanation:
C,E
"An active, long-running transaction can slow the process of creating the read replica. We recommend that
you wait for long-running transactions to complete before creating a read replica. If you create multiple read
replicas in parallel from the same source DB instance, Amazon RDS takes only one snapshot at the start of the
first create action.
When creating a read replica, there are a few things to consider. First, you must enable automatic backups on
the source DB instance by setting the backup retention period to a value other than 0. This requirement also
applies to a read replica that is the source DB instance for another read replica"
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ReadRepl.html
A. Create a copy of the instance. Place all instances behind an Application Load Balancer.
B. Create an S3 VPC endpoint for Amazon S3. Update the software to reference the endpoint.
C. Stop the EC2 instances. Modify the instance type to one with a more powerful CPU and more memory.
Restart the instances.
D. Route incoming requests to Amazon Simple Queue Service (Amazon SQS). Configure an EC2 Auto Scaling
group based on queue size. Update the software to read from the queue.
Answer: D
Explanation:
D. Route incoming requests to Amazon Simple Queue Service (Amazon SQS). Configure an EC2 Auto Scaling
group based on queue size. Update the software to read from the queue. By routing incoming requests to
Amazon SQS, the company can decouple the job requests from the processing instances. This allows them to
scale the number of instances based on the size of the queue, providing more resources when needed.
Additionally, using an Auto Scaling group based on the queue size will automatically scale the number of
instances up or down depending on the workload. Updating the software to read from the queue will allow it
to process the job requests in a more efficient manner, improving the performance of the system.
A. Create an AWS Storage Gateway volume gateway. Create a file share that uses the required client protocol.
Connect the application server to the file share.
B. Create an AWS Storage Gateway tape gateway. Configure tapes to use Amazon S3. Connect the application
server to the tape gateway.
C. Create an Amazon EC2 Windows instance. Install and configure a Windows file share role on the instance.
Connect the application server to the file share.
D. Create an Amazon FSx for Windows File Server file system. Attach the file system to the origin server.
Connect the application server to the file system.
Answer: D
Explanation:
Create an Amazon FSx for Windows File Server file system. Attach the file system to the origin server.
Connect the application server to the file system.
What should a solutions architect do to meet these requirements when configuring the logs?
A. Use Amazon CloudWatch as the target. Set the CloudWatch log group with an expiration of 90 days
B. Use Amazon Kinesis as the target. Configure the Kinesis stream to always retain the logs for 90 days.
C. Use AWS CloudTrail as the target. Configure CloudTrail to save to an Amazon S3 bucket, and enable S3
Intelligent-Tiering.
D. Use Amazon S3 as the target. Enable an S3 Lifecycle policy to transition the logs to S3 Standard-Infrequent
Access (S3 Standard-IA) after 90 days.
Answer: D
Explanation:
D. Use Amazon S3 as the target. Enable an S3 Lifecycle policy to transition the logs to S3 Standard-
Infrequent Access (S3 Standard-IA) after 90 days.
By using Amazon S3 as the target for the VPC Flow Logs, the logs can be easily stored and accessed by the
security team. Enabling an S3 Lifecycle policy to transition the logs to S3 Standard-Infrequent Access (S3
Standard-IA) after 90 days will automatically move the logs to a storage class that is optimized for infrequent
access, reducing the storage costs for the company. The security team will still be able to access the logs as
needed, even after they have been transitioned to S3 Standard-IA, but the storage cost will be optimized.
A. Create an internet gateway, and attach it to the VPC. Configure the private subnet route table to use the
internet gateway as the default route.
B. Create a NAT gateway, and place it in a public subnet. Configure the private subnet route table to use the
NAT gateway as the default route.
C. Create a NAT instance, and place it in the same subnet where the EC2 instance is located. Configure the
private subnet route table to use the NAT instance as the default route.
D. Create an internet gateway, and attach it to the VPC. Create a NAT instance, and place it in the same subnet
where the EC2 instance is located. Configure the private subnet route table to use the internet gateway as the
default route.
Answer: B
Explanation:
B. Create a NAT gateway, and place it in a public subnet. Configure the private subnet route table to use the
NAT gateway as the default route.
This approach will allow the EC2 instance to access the internet and download the monthly security updates
while still being located in a private subnet. By creating a NAT gateway and placing it in a public subnet, it will
allow the instances in the private subnet to access the internet through the NAT gateway. And then, configure
the private subnet route table to use the NAT gateway as the default route. This will ensure that all outbound
traffic is directed through the NAT gateway, allowing the EC2 instance to access the internet while still
maintaining the security of the private subnet.
The files must be simultaneously accessible from multiple application servers that run on Amazon EC2 instances.
The solution must have built-in redundancy.
Explanation:
EFS Amazon Elastic File System (EFS) automatically grows and shrinks as you add and remove files with no
need for management or provisioning.
Answer: C
Explanation:
The policy only grants get and list permission on IAM users, so not A ds:Delete deny denies delete-directory,
The policy only grants get and describe permission on logs, so not D
A. Create security group rules using the instance ID as the source or destination.
B. Create security group rules using the security group ID as the source or destination.
C. Create security group rules using the VPC CIDR blocks as the source or destination.
D. Create security group rules using the subnet CIDR blocks as the source or destination.
Answer: B
Explanation:
B. Create security group rules using the security group ID as the source or destination.
This way, the security team can ensure that the least privileged access is given to the application tiers by
allowing only the necessary communication between the security groups. For example, the web tier security
group should only allow incoming traffic from the load balancer security group and outgoing traffic to the
application tier security group. This approach provides a more granular and secure way to control traffic
between the different tiers of the application and also allows for easy modification of access if needed.
It's also worth noting that it's good practice to minimize the number of open ports and protocols, and use
security groups as a first line of defense, in addition to network access control lists (ACLs) to control traffic
between subnets.
How should a solutions architect refactor this workflow to prevent the creation of multiple orders?
A. Configure the web application to send an order message to Amazon Kinesis Data Firehose. Set the payment
service to retrieve the message from Kinesis Data Firehose and process the order.
B. Create a rule in AWS CloudTrail to invoke an AWS Lambda function based on the logged application path
request. Use Lambda to query the database, call the payment service, and pass in the order information.
C. Store the order in the database. Send a message that includes the order number to Amazon Simple
Notification Service (Amazon SNS). Set the payment service to poll Amazon SNS, retrieve the message, and
process the order.
D. Store the order in the database. Send a message that includes the order number to an Amazon Simple Queue
Service (Amazon SQS) FIFO queue. Set the payment service to retrieve the message and process the order.
Delete the message from the queue.
Answer: D
Explanation:
D. Store the order in the database. Send a message that includes the order number to an Amazon Simple
Queue Service (Amazon SQS) FIFO queue. Set the payment service to retrieve the message and process the
order. Delete the message from the queue. This approach ensures that the order creation and payment
processing steps are separate and atomic. By sending the order information to an SQS FIFO queue, the
payment service can process the order one at a time and in the order they were received. If the payment
service is unable to process an order, it can be retried later, preventing the creation of multiple orders. The
deletion of the message from the queue after it is processed will prevent the same message from being
processed multiple times. It's worth noting that FIFO queues guarantee that messages are processed in the
order they are received, and prevent duplicates.
Which combination of actions should be taken to meet these requirements? (Choose two.)
Answer: BD
Explanation:
Reference:
https://www.certyiq.com/discussions/amazon/view/21969-exam-aws-certified-solutions-architect-associate-
saa-c02/
How should the company move the data to Amazon S3 to meet these requirements?
A. Use an Amazon CloudWatch metric stream to send the EC2 Auto Scaling status data to Amazon Kinesis Data
Firehose. Store the data in Amazon S3.
B. Launch an Amazon EMR cluster to collect the EC2 Auto Scaling status data and send the data to Amazon
Kinesis Data Firehose. Store the data in Amazon S3.
C. Create an Amazon EventBridge rule to invoke an AWS Lambda function on a schedule. Configure the Lambda
function to send the EC2 Auto Scaling status data directly to Amazon S3.
D. Use a bootstrap script during the launch of an EC2 instance to install Amazon Kinesis Agent. Configure
Kinesis Agent to collect the EC2 Auto Scaling status data and send the data to Amazon Kinesis Data Firehose.
Store the data in Amazon S3.
Answer: A
Explanation:
You can use metric streams to continually stream CloudWatch metrics to a destination of your choice, with
near-real-time delivery and low latency. One of the use cases is Data Lake: create a metric stream and direct it
to an Amazon Kinesis Data Firehose delivery stream that delivers your CloudWatch metrics to a data lake such
as Amazon S3. https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Metric-
Streams.html
Which solution will meet these requirements with the LEAST operational overhead?
A. Create an AWS Lambda function to download the .csv files, convert the files to Parquet format, and place the
output files in an S3 bucket. Invoke the Lambda function for each S3 PUT event.
B. Create an Apache Spark job to read the .csv files, convert the files to Parquet format, and place the output
files in an S3 bucket. Create an AWS Lambda function for each S3 PUT event to invoke the Spark job.
C. Create an AWS Glue table and an AWS Glue crawler for the S3 bucket where the application places the .csv
files. Schedule an AWS Lambda function to periodically use Amazon Athena to query the AWS Glue table,
convert the query results into Parquet format, and place the output files into an S3 bucket.
D. Create an AWS Glue extract, transform, and load (ETL) job to convert the .csv files to Parquet format and
place the output files into an S3 bucket. Create an AWS Lambda function for each S3 PUT event to invoke the
ETL job.
Answer: D
Explanation:
D should be correct. "LEAST operational overhead" => Should you fully manage service like Glue instead of
manually like the answer A.
A. Create a backup vault in AWS Backup to retain RDS backups. Create a new backup plan with a daily
schedule and an expiration period of 2 years after creation. Assign the RDS DB instances to the backup plan.
B. Configure a backup window for the RDS DB instances for daily snapshots. Assign a snapshot retention policy
of 2 years to each RDS DB instance. Use Amazon Data Lifecycle Manager (Amazon DLM) to schedule snapshot
deletions.
C. Configure database transaction logs to be automatically backed up to Amazon CloudWatch Logs with an
expiration period of 2 years.
D. Configure an AWS Database Migration Service (AWS DMS) replication task. Deploy a replication instance,
and configure a change data capture (CDC) task to stream database changes to Amazon S3 as the target.
Configure S3 Lifecycle policies to delete the snapshots after 2 years.
Answer: A
Explanation:
Create a backup vault in AWS Backup to retain RDS backups. Create a new backup plan with a daily schedule
and an expiration period of 2 years after creation. Assign the RDS DB instances to the backup plan.
The company wants to use Amazon FSx for Windows File Server as part of the solution. The company must ensure
that the on-premises Active Directory groups restrict access to the FSx for Windows File Server SMB compliance
shares, folders, and files after the move to AWS. The company has created an FSx for Windows File Server file
system.
A.Create an Active Directory Connector to connect to the Active Directory. Map the Active Directory groups to
IAM groups to restrict access.
B.Assign a tag with a Restrict tag key and a Compliance tag value. Map the Active Directory groups to IAM
groups to restrict access.
C.Create an IAM service-linked role that is linked directly to FSx for Windows File Server to restrict access.
D.Join the file system to the Active Directory to restrict access.
Answer: D
Explanation:
D. Join the file system to the Active Directory to restrict access.Joining the FSx for Windows File Server file
system to the on-premises Active Directory will allow the company to use the existing Active Directory groups
to restrict access to the file shares, folders, and files after the move to AWS. This option allows the company
to continue using their existing access controls and management structure, making the transition to AWS
more seamless.
The company wants to provide its customers with different versions of content based on the devices that the
customers use to access the website.
Which combination of actions should a solutions architect take to meet these requirements? (Choose two.)
Answer: AC
Explanation:
A, C is correct.
NLB lister rule only supports Protocol & Port (Not host/based routing like ALB) => D, E is incorrect.
NLB just works layer 4 (TCP/UDP) instead of Layer 7 (HTTP) => B is incorrect.
The solutions architect must implement a solution to provide the application’s EC2 instances with access to the
ElastiCache cluster.
Which solution will meet these requirements MOST cost-effectively?
A. Create a peering connection between the VPCs. Add a route table entry for the peering connection in both
VPCs. Configure an inbound rule for the ElastiCache cluster’s security group to allow inbound connection from
the application’s security group.
B. Create a Transit VPC. Update the VPC route tables in the Cache VPC and the App VPC to route traffic
through the Transit VPC. Configure an inbound rule for the ElastiCache cluster's security group to allow
inbound connection from the application’s security group.
C. Create a peering connection between the VPCs. Add a route table entry for the peering connection in both
VPCs. Configure an inbound rule for the peering connection’s security group to allow inbound connection from
the application’s security group.
D. Create a Transit VPC. Update the VPC route tables in the Cache VPC and the App VPC to route traffic
through the Transit VPC. Configure an inbound rule for the Transit VPC’s security group to allow inbound
connection from the application’s security group.
Answer: A
Explanation:
A. Create a peering connection between the VPCs. Add a route table entry for the peering connection in both
VPCs. Configure an inbound rule for the ElastiCache cluster’s security group to allow inbound connection
from the application’s security group. Creating a peering connection between the VPCs allows the
application's EC2 instances to communicate with the ElastiCache cluster directly and efficiently. This is the
most cost-effective solution as it does not involve creating additional resources such as a Transit VPC, and it
does not incur additional costs for traffic passing through the Transit VPC. Additionally, it is also more secure
as it allows you to configure a more restrictive security group rule to allow inbound connection from only the
application's security group.
Which combination of actions should a solutions architect take to meet these requirements? (Choose two.)
Answer: AD
Explanation:
AWS Fargate is a technology that you can use with Amazon ECS to run containers without having to manage
servers or clusters of Amazon EC2 instances. With Fargate, you no longer have to provision, configure, or
scale clusters of virtual machines to run containers.
Reference:
https://docs.aws.amazon.com/AmazonECS/latest/userguide/what-is-fargate.html
A. Create a Route 53 simple routing policy record for each EC2 instance. Associate a health check with each
record.
B. Create a Route 53 failover routing policy record for each EC2 instance. Associate a health check with each
record.
C. Create an Amazon CloudFront distribution with EC2 instances as its origin. Associate a health check with the
EC2 instances.
D. Create an Application Load Balancer (ALB) with a health check in front of the EC2 instances. Route to the
ALB from Route 53.
Answer: D
Explanation:
D. Create an Application Load Balancer (ALB) with a health check in front of the EC2 instances. Route to the
ALB from Route 53.
An Application Load Balancer (ALB) allows you to distribute incoming traffic across multiple backend
instances, and can automatically route traffic to healthy instances while removing traffic from unhealthy
instances. By using an ALB in front of the EC2 instances and routing traffic to it from Route 53, the load
balancer can perform health checks on the instances and only route traffic to healthy instances, which should
help to reduce or eliminate timeout errors caused by unhealthy instances.
A. Configure a public Application Load Balancer (ALB) with multiple redundant Amazon EC2 instances in public
subnets. Configure Amazon CloudFront to deliver HTTPS content using the public ALB as the origin.
B. Configure a public Application Load Balancer with multiple redundant Amazon EC2 instances in private
subnets. Configure Amazon CloudFront to deliver HTTPS content using the EC2 instances as the origin.
C. Configure a public Application Load Balancer (ALB) with multiple redundant Amazon EC2 instances in private
subnets. Configure Amazon CloudFront to deliver HTTPS content using the public ALB as the origin.
D. Configure a public Application Load Balancer with multiple redundant Amazon EC2 instances in public
subnets. Configure Amazon CloudFront to deliver HTTPS content using the EC2 instances as the origin.
Answer: C
Explanation:
C. Configure a public Application Load Balancer (ALB) with multiple redundant Amazon EC2 instances in
private subnets. Configure Amazon CloudFront to deliver HTTPS content using the public ALB as the origin.
This solution meets the requirements for a highly available application with web, application, and database
tiers, as well as providing edge-based content delivery. Additionally, it maximizes security by having the ALB
in a private subnet, which limits direct access to the web servers, while still being able to serve traffic over the
Internet via the public ALB. This will ensure that the web servers are not exposed to the public Internet, which
reduces the attack surface and provides a secure way to access the application.
A. Configure an accelerator in AWS Global Accelerator. Add a listener for the port that the application listens
on, and attach it to a Regional endpoint in each Region. Add the ALB as the endpoint.
B. Create an Amazon CloudFront distribution and specify the ALB as the origin server. Configure the cache
behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic.
C. Create an Amazon CloudFront distribution and specify Amazon S3 as the origin server. Configure the cache
behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic.
D. Configure an Amazon DynamoDB database to serve as the data store for the application. Create a DynamoDB
Accelerator (DAX) cluster to act as the in-memory cache for DynamoDB hosting the application data.
Answer: A
Explanation:
A. Configure an accelerator in AWS Global Accelerator. Add a listener for the port that the application listens
on, and attach it to a Regional endpoint in each Region. Add the ALB as the endpoint.
AWS Global Accelerator directs traffic to the optimal healthy endpoint based on health checks, it can also
route traffic to the closest healthy endpoint based on geographic location of the client. By configuring an
accelerator and attaching it to a Regional endpoint in each Region, and adding the ALB as the endpoint, the
solution will redirect traffic to healthy endpoints, improving the user experience by reducing latency and
ensuring that the application is running optimally. This solution will ensure that traffic is directed to the
closest healthy endpoint and will help to improve the overall user experience.
Which solution will meet these requirements with the LEAST operational overhead?
A. Create an Amazon Kinesis data stream to store the data in Amazon S3. Create an Amazon Kinesis Data
Analytics application to analyze the data. Invoke an AWS Lambda function to send the data to the Kinesis Data
Analytics application.
B. Create an Amazon Kinesis data stream to store the data in Amazon S3. Create an Amazon EMR cluster to
analyze the data. Invoke an AWS Lambda function to send the data to the EMR cluster.
C. Create an Amazon Kinesis Data Firehose delivery stream to store the data in Amazon S3. Create an Amazon
EMR cluster to analyze the data.
D. Create an Amazon Kinesis Data Firehose delivery stream to store the data in Amazon S3. Create an Amazon
Kinesis Data Analytics application to analyze the data.
Answer: D
Explanation:
D. Create an Amazon Kinesis Data Firehose delivery stream to store the data in Amazon S3. Create an Amazon
Kinesis Data Analytics application to analyze the data.
This solution will meet the requirements with the least operational overhead as it uses Amazon Kinesis Data
Firehose, which is a fully managed service that can automatically handle the data collection, data
transformation, encryption, and data storage in near-real time. Kinesis Data Firehose can automatically store
the data in Amazon S3 in Apache Parquet format for further processing. Additionally, it allows you to create
an Amazon Kinesis Data Analytics application to analyze the data in near real-time, with no need to manage
any infrastructure or invoke any Lambda function. This way you can process a large amount of data with the
least operational overhead.
Answer: B
Explanation:
RDS Proxy is a fully managed database proxy that allows applications to pool and share connections to an
RDS database instance, reducing the number of connections made to the database and improving the
performance of read-heavy workloads. RDS Proxy also provides features like connection pooling, query
logging, and automatic failover, which can help to improve the availability and performance of the database.
By using RDS Proxy between the application and the database, the gaming company can improve the
performance of the application without making significant changes to the application's architecture. RDS
Proxy can help to reduce the number of connections made to the database, optimize query execution, and
provide automatic failover in case of a database failure.
Answer: C
Explanation:
C. Create a read replica of the primary database and have the business analysts run their queries.
Creating a read replica of the primary RDS database will offload the read-only SQL queries from the primary
database, which will help to improve the performance of the web application. Read replicas are exact copies
of the primary database that can be used to handle read-only traffic, which will reduce the load on the primary
database and improve the performance of the web application. This solution can be implemented with minimal
changes to the existing web application, as the business analysts can continue to run their queries on the read
replica without modifying the code.
A. Use client-side encryption to encrypt the data that is being uploaded to the S3 buckets.
B. Use server-side encryption to encrypt the data that is being uploaded to the S3 buckets.
C. Create bucket policies that require the use of server-side encryption with S3 managed encryption keys (SSE-
S3) for S3 uploads.
D. Enable the security option to encrypt the S3 buckets through the use of a default AWS Key Management
Service (AWS KMS) key.
Answer: A
Explanation:
here keyword is "before" "the data is encrypted at rest before the data is uploaded to the S3 buckets."
Answer: C
Explanation:
C. Configure scheduled scaling to scale up to the desired compute level. By configuring scheduled scaling,
the solutions architect can set the Auto Scaling group to automatically scale up to the desired compute level
at a specific time (1AM) when the batch job starts and then automatically scale down after the job is complete.
This will allow the desired EC2 capacity to be reached quickly and also help in reducing the cost.
The website needs to serve requests quickly and efficiently regardless of a user’s location. However, the company
does not want to recreate the existing architecture across multiple Regions.
A. Replace the existing architecture with a website that is served from an Amazon S3 bucket. Configure an
Amazon CloudFront distribution with the S3 bucket as the origin. Set the cache behavior settings to cache
based on the Accept-Language request header.
B. Configure an Amazon CloudFront distribution with the ALB as the origin. Set the cache behavior settings to
cache based on the Accept-Language request header.
C. Create an Amazon API Gateway API that is integrated with the ALB. Configure the API to use the HTTP
integration type. Set up an API Gateway stage to enable the API cache based on the Accept-Language request
header.
D. Launch an EC2 instance in each additional Region and configure NGINX to act as a cache server for that
Region. Put all the EC2 instances and the ALB behind an Amazon Route 53 record set with a geolocation
routing policy.
Answer: B
Explanation:
Configuring caching based on the language of the viewer If you want CloudFront to cache different versions
of your objects based on the language specified in the request, configure CloudFront to forward the Accept-
Language header to your origin.
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/header-caching.html
Which solution will meet these requirements with the LOWEST recovery time objective (RTO)?
A. Use an Amazon Aurora global database with a pilot light deployment.
B. Use an Amazon Aurora global database with a warm standby deployment.
C. Use an Amazon RDS Multi-AZ DB instance with a pilot light deployment.
D. Use an Amazon RDS Multi-AZ DB instance with a warm standby deployment.
Answer: B
Explanation:
Option A is incorrect because while Amazon Aurora global database is a good solution for disaster recovery,
pilot light deployment provides only a minimalistic setup and would require manual intervention to make the
DR Region fully operational, which increases the recovery time.
Option B is a better choice than Option A as it provides a warm standby deployment, which is an automated
and more scalable setup than pilot light deployment. In this setup, the database is replicated to the DR
Region, and the standby instance can be brought up quickly in case of a disaster.
Option C is incorrect because Multi-AZ DB instances provide high availability, not disaster recovery.
Option D is a good choice for high availability, but it does not meet the requirement for DR in a different region
with the least possible latency.
Which solution will meet these requirements in the MOST operationally efficient way?
A. Create Amazon Machine Images (AMIs) to back up the EC2 instances. Copy the AMIs to a secondary AWS
Region. Automate infrastructure deployment in the secondary Region by using AWS Lambda and custom
scripts.
B. Create Amazon Machine Images (AMIs) to back up the EC2 instances. Copy the AMIs to a secondary AWS
Region. Automate infrastructure deployment in the secondary Region by using AWS CloudFormation.
C. Launch EC2 instances in a secondary AWS Region. Keep the EC2 instances in the secondary Region active at
all times.
D. Launch EC2 instances in a secondary Availability Zone. Keep the EC2 instances in the secondary Availability
Zone active at all times.
Answer: B
Explanation:
B "Create Amazon Machine Images (AMIs) to back up the EC2 instances. Copy the AMIs to a secondary AWS
Region. Automate infrastructure deployment in the secondary Region by using AWS CloudFormation," would
likely be the most suitable solution for the given requirements. This option allows for the creation of Amazon
Machine Images (AMIs) to back up the EC2 instances, which can then be copied to a secondary AWS region to
provide disaster recovery capabilities. The infrastructure deployment in the secondary region can be
automated using AWS CloudFormation, which can help to reduce the amount of time and resources needed
for deployment and management.
Question: 275 CertyIQ
A company runs an internal browser-based application. The application runs on Amazon EC2 instances behind an
Application Load Balancer. The instances run in an Amazon EC2 Auto Scaling group across multiple Availability
Zones. The Auto Scaling group scales up to 20 instances during work hours, but scales down to 2 instances
overnight. Staff are complaining that the application is very slow when the day begins, although it runs well by
mid-morning.
How should the scaling be changed to address the staff complaints and keep costs to a minimum?
A. Implement a scheduled action that sets the desired capacity to 20 shortly before the office opens.
B. Implement a step scaling action triggered at a lower CPU threshold, and decrease the cooldown period.
C. Implement a target tracking action triggered at a lower CPU threshold, and decrease the cooldown period.
D. Implement a scheduled action that sets the minimum and maximum capacity to 20 shortly before the office
opens.
Answer: C
Explanation:
C, Implementing a target tracking scaling policy would allow the Auto Scaling group to adjust its capacity in
response to changes in demand while keeping the specified metric at the target value
What should a solutions architect do to ensure the system can automatically scale for the increased traffic?
(Choose two.)
Answer: AD
Explanation:
= Makes sense. With RDS Storage Auto Scaling, you simply set your desired maximum storage limit, and Auto
Scaling takes care of the rest.
B) Migrate the database to Amazon Aurora to use Auto Scaling storage.
= Scenario specifies application's data layer uses Oracle-specific PL/SQL functions. This rules out migration
to Aurora.
C) Configure an alarm on the RDS for Oracle instance for low free storage space.
= You could do this but what does it fix? Nothing. The CW notification isn't going to trigger anything.
D) Configure the Auto Scaling group to use the average CPU as the scaling metric.
= Makes sense. The CPU utilization is the precursor to the storage outage. When the ec2 instances are
overloaded, the RDS instance storage hits its limits, too.
A. Use AWS Storage Gateway for files to store and process the video content.
B. Use AWS Storage Gateway for volumes to store and process the video content.
C. Use Amazon EFS for storing the video content. Once processing is complete, transfer the files to Amazon
Elastic Block Store (Amazon EBS).
D. Use Amazon S3 for storing the video content. Move the files temporarily over to an Amazon Elastic Block
Store (Amazon EBS) volume attached to the server for processing.
Answer: D
Explanation:
Storage gateway is not used for storing content - only to transfer to the Cloud
Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)
A. Use Amazon Redshift to store the employee data in hierarchies. Unload the data to Amazon S3 every month.
B. Use Amazon DynamoDB to store the employee data in hierarchies. Export the data to Amazon S3 every
month.
C. Configure Amazon Macie for the AWS account. Integrate Macie with Amazon EventBridge to send monthly
events to AWS Lambda.
D. Use Amazon Athena to analyze the employee data in Amazon S3. Integrate Athena with Amazon QuickSight
to publish analysis dashboards and share the dashboards with users.
E. Configure Amazon Macie for the AWS account. Integrate Macie with Amazon EventBridge to send monthly
notifications through an Amazon Simple Notification Service (Amazon SNS) subscription.
Answer: BE
Explanation:
B. Use Amazon DynamoDB to store the employee data in hierarchies. Export the data to Amazon S3 every
month.
E. Configure Amazon Macie for the AWS account. Integrate Macie with Amazon EventBridge to send monthly
notifications through an Amazon Simple Notification Service (Amazon SNS) subscription.
A. Create an AWS Backup plan to back up the DynamoDB table on the first day of each month. Specify a
lifecycle policy that transitions the backup to cold storage after 6 months. Set the retention period for each
backup to 7 years.
B. Create a DynamoDB on-demand backup of the DynamoDB table on the first day of each month. Transition the
backup to Amazon S3 Glacier Flexible Retrieval after 6 months. Create an S3 Lifecycle policy to delete
backups that are older than 7 years.
C. Use the AWS SDK to develop a script that creates an on-demand backup of the DynamoDB table. Set up an
Amazon EventBridge rule that runs the script on the first day of each month. Create a second script that will run
on the second day of each month to transition DynamoDB backups that are older than 6 months to cold storage
and to delete backups that are older than 7 years.
D. Use the AWS CLI to create an on-demand backup of the DynamoDB table. Set up an Amazon EventBridge
rule that runs the command on the first day of each month with a cron expression. Specify in the command to
transition the backups to cold storage after 6 months and to delete the backups after 7 years.
Answer: A
Explanation:
A. Create an AWS Backup plan to back up the DynamoDB table on the first day of each month. Specify a
lifecycle policy that transitions the backup to cold storage after 6 months. Set the retention period for each
backup to 7 years.
A. Use standard SQL queries in Amazon Athena to analyze the CloudFront logs in the S3 bucket. Visualize the
results with AWS Glue.
B. Use standard SQL queries in Amazon Athena to analyze the CloudFront logs in the S3 bucket. Visualize the
results with Amazon QuickSight.
C. Use standard SQL queries in Amazon DynamoDB to analyze the CloudFront logs in the S3 bucket. Visualize
the results with AWS Glue.
D. Use standard SQL queries in Amazon DynamoDB to analyze the CloudFront logs in the S3 bucket. Visualize
the results with Amazon QuickSight.
Answer: B
Explanation:
https://docs.aws.amazon.com/quicksight/latest/user/welcome.html
Answer: A
Explanation:
A. Configure a route in a route table to direct traffic from the internet to the private IP addresses of the EC2
instances.
B. Configure the security group for the EC2 instances to only allow traffic that comes from the security group
for the ALB.
C. Move the EC2 instances into the public subnet. Give the EC2 instances a set of Elastic IP addresses.
D. Configure the security group for the ALB to allow any TCP traffic on any port.
Answer: B
Explanation:
B. Configure the security group for the EC2 instances to only allow traffic that comes from the security group
for the ALB.
The company maintains two synchronized file systems. This strategy is causing data duplication and inefficient
resource usage. The company needs to migrate the applications to AWS without making code changes to either
application.
A. Migrate both applications to AWS Lambda. Create an Amazon S3 bucket to exchange data between the
applications.
B. Migrate both applications to Amazon Elastic Container Service (Amazon ECS). Configure Amazon FSx File
Gateway for storage.
C. Migrate the simulation application to Linux Amazon EC2 instances. Migrate the visualization application to
Windows EC2 instances. Configure Amazon Simple Queue Service (Amazon SQS) to exchange data between
the applications.
D. Migrate the simulation application to Linux Amazon EC2 instances. Migrate the visualization application to
Windows EC2 instances. Configure Amazon FSx for NetApp ONTAP for storage.
Answer: D
Explanation:
Migrate the simulation application to Linux Amazon EC2 instances. Migrate the visualization application to
Windows EC2 instances. Configure Amazon FSx for NetApp ONTAP for storage.
Answer: B
Explanation:
A. Host a dynamic contact form page in Amazon Elastic Container Service (Amazon ECS). Set up Amazon
Simple Email Service (Amazon SES) to connect to any third-party email provider.
B. Create an Amazon API Gateway endpoint with an AWS Lambda backend that makes a call to Amazon Simple
Email Service (Amazon SES).
C. Convert the static webpage to dynamic by deploying Amazon Lightsail. Use client-side scripting to build the
contact form. Integrate the form with Amazon WorkMail.
D. Create a t2.micro Amazon EC2 instance. Deploy a LAMP (Linux, Apache, MySQL, PHP/Perl/Python) stack to
host the webpage. Use client-side scripting to build the contact form. Integrate the form with Amazon
WorkMail.
Answer: B
Explanation:
Correct answer is B.
https://aws.amazon.com/blogs/architecture/create-dynamic-contact-forms-for-s3-static-websites-using-
aws-lambda-amazon-api-gateway-and-amazon-ses/
A solutions architect needs to implement a solution that displays the updates on the website.
Answer: C
Explanation:
Invalidate the CloudFront cache: The solutions architect should invalidate the CloudFront cache to ensure
that the latest version of the website is being served to users.
How should a solutions architect design the architecture to meet these requirements?
A. Host all three tiers on Amazon EC2 instances. Use Amazon FSx File Gateway for file sharing between the
tiers.
B. Host all three tiers on Amazon EC2 instances. Use Amazon FSx for Windows File Server for file sharing
between the tiers.
C. Host the application tier and the business tier on Amazon EC2 instances. Host the database tier on Amazon
RDS. Use Amazon Elastic File System (Amazon EFS) for file sharing between the tiers.
D. Host the application tier and the business tier on Amazon EC2 instances. Host the database tier on Amazon
RDS. Use a Provisioned IOPS SSD (io2) Amazon Elastic Block Store (Amazon EBS) volume for file sharing
between the tiers.
Answer: B
Explanation:
It is B
A: Incorrect> FSx file Gateway designed for low latency and efficient access to in-cloud FSx for Windows File
Server file shares from your on-premises facility.
B: Correct> This solution will allow the company to host all three tiers on Amazon EC2 instances while using
Amazon FSx for Windows File Server to provide Windows-based file sharing between the tiers. This will allow
the company to use specific features of SQL Server, such as native backups and Data Quality Services, while
sharing files for processing between the tiers.
C: Incorrect> Currently, Amazon EFS supports the NFSv4.1 protocol and does not natively support the SMB
protocol, and can't be used in Windows instances yet.
D: Incorrect> Amazon EBS is a block-level storage solution that is typically used to store data at the operating
system level, rather than for file sharing between servers.
Answer: C
Explanation:
Since no code change is permitted, below choice makes sense for the unix server's file sharing: C. Create an
Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system on all web servers.
Question: 289 CertyIQ
A company has an AWS Lambda function that needs read access to an Amazon S3 bucket that is located in the
same AWS account.
Which solution will meet these requirements in the MOST secure manner?
Answer: B
Explanation:
This is the most secure and recommended way to provide an AWS Lambda function with access to an S3
bucket. It involves creating an IAM role that the Lambda function assumes, and attaching an IAM policy to the
role that grants the necessary permissions to read from the S3 bucket.
Which EC2 instance purchasing option should a solutions architect recommend to meet these requirements?
Answer: C
Explanation:
Autoscaling with ALB / scale up on demand using on demand and spot instance combination makes sense.
Reserved will not fit the no-long term commitment clause.
Which services or methods will meet these requirements with the LEAST impact to the users? (Choose two.)
A. Signed cookies
B. Signed URLs
C. AWS AppSync
D. JSON Web Token (JWT)
E. AWS Secrets Manager
Answer: AB
Explanation:
Signed URLs are URLs that grant temporary access to an S3 object. They include a signature that verifies the
authenticity of the request, as well as an expiration date that limits the time during which the URL is valid. This
solution will work for users who are using custom HTTP clients that do not support cookies.
Signed cookies are similar to signed URLs, but they use cookies to grant temporary access to S3 objects. This
solution will work for users who are unable to change the hardcoded URLs that they are using for access.
A. Use Amazon Kinesis Data Streams to stream the data. Use Amazon Kinesis Data Analytics to transform the
data. Use Amazon Kinesis Data Firehose to write the data to Amazon S3. Use Amazon Athena to query the
transformed data from Amazon S3.
B. Use Amazon Managed Streaming for Apache Kafka (Amazon MSK) to stream the data. Use AWS Glue to
transform the data and to write the data to Amazon S3. Use Amazon Athena to query the transformed data
from Amazon S3.
C. Use AWS Database Migration Service (AWS DMS) to ingest the data. Use Amazon EMR to transform the data
and to write the data to Amazon S3. Use Amazon Athena to query the transformed data from Amazon S3.
D. Use Amazon Managed Streaming for Apache Kafka (Amazon MSK) to stream the data. Use Amazon Kinesis
Data Analytics to transform the data and to write the data to Amazon S3. Use the Amazon RDS query editor to
query the transformed data from Amazon S3.
E. Use Amazon Kinesis Data Streams to stream the data. Use AWS Glue to transform the data. Use Amazon
Kinesis Data Firehose to write the data to Amazon S3. Use the Amazon RDS query editor to query the
transformed data from Amazon S3.
Answer: AB
Explanation:
"You can create streaming extract, transform, and load (ETL) jobs that run continuously, consume data from
streaming sources like Amazon Kinesis Data Streams, Apache Kafka, and Amazon Managed Streaming for
Apache Kafka (Amazon MSK). The jobs cleanse and transform the data, and then load the results into Amazon
S3 data lakes or JDBC data stores."
Reference:
https://docs.aws.amazon.com/glue/latest/dg/add-job-streaming.html
A. Use AWS Snowball to migrate data out of the on-premises solution to Amazon S3. Configure on-premises
systems to mount the Snowball S3 endpoint to provide local access to the data.
B. Use AWS Snowball Edge to migrate data out of the on-premises solution to Amazon S3. Use the Snowball
Edge file interface to provide on-premises systems with local access to the data.
C. Use AWS Storage Gateway and configure a cached volume gateway. Run the Storage Gateway software
appliance on premises and configure a percentage of data to cache locally. Mount the gateway storage
volumes to provide local access to the data.
D. Use AWS Storage Gateway and configure a stored volume gateway. Run the Storage Gateway software
appliance on premises and map the gateway storage volumes to on-premises storage. Mount the gateway
storage volumes to provide local access to the data.
Answer: D
Explanation:
1. The company wants to maintain local access to all the data. Only stored volumes keep the complete dataset
on-premises, providing low-latency access. Cached volumes only cache a subset locally.
2. The company wants the data backed up on AWS. With stored volumes, periodic backups (snapshots) of the
on-premises data are sent to S3, providing durable and scalable backup storage.
3. The company wants the data transfer to AWS to be automatic and secure. Storage Gateway provides an
encrypted connection between the on-premises gateway and AWS storage. Backups to S3 are sent
asynchronously and automatically based on the backup schedule configured.
Answer: B
Explanation:
B is the correct answer. AWS S3 and DynamoDB are are the only AWS services which use VPC gateway
endpoints.
Which solution will meet these requirements with the LEAST operational overhead?
A. Store the data in an Amazon DynamoDB table. Create a proxy application layer to intercept and process the
data that each application requests.
B. Store the data in an Amazon S3 bucket. Process and transform the data by using S3 Object Lambda before
returning the data to the requesting application.
C. Process the data and store the transformed data in three separate Amazon S3 buckets so that each
application has its own custom dataset. Point each application to its respective S3 bucket.
D. Process the data and store the transformed data in three separate Amazon DynamoDB tables so that each
application has its own custom dataset. Point each application to its respective DynamoDB table.
Answer: B
Explanation:
Amazon S3 Object Lambda allows you to add custom code to S3 GET requests, which means that you can
modify the data before it is returned to the requesting application. In this case, you can use S3 Object Lambda
to remove the PII before the data is returned to the two applications that do not need to process PII. This
approach has the least operational overhead because it does not require creating separate datasets or proxy
application layers, and it allows you to maintain a single copy of the data in an S3 bucket.
A. 10.0.1.0/32
B. 192.168.0.0/24
C. 192.168.1.0/32
D. 10.0.1.0/24
Answer: D
Explanation:
10.0.1.0/32 and 192.168.1.0/32 are too small for VPC, and /32 network is only 1 host
A solutions architect needs to implement a solution to automate the scalability of the application. The solution
must optimize the cost of the architecture and must ensure that the application has enough CPU resources when
surges occur.
A. Create an Amazon CloudWatch alarm that enters the ALARM state when the CPUUtilization metric is less
than 20%. Create an AWS Lambda function that the CloudWatch alarm invokes to terminate one of the EC2
instances in the ALB target group.
B. Create an EC2 Auto Scaling group. Select the existing ALB as the load balancer and the existing target
group as the target group. Set a target tracking scaling policy that is based on the ASGAverageCPUUtilization
metric. Set the minimum instances to 2, the desired capacity to 3, the maximum instances to 6, and the target
value to 50%. Add the EC2 instances to the Auto Scaling group.
C. Create an EC2 Auto Scaling group. Select the existing ALB as the load balancer and the existing target
group as the target group. Set the minimum instances to 2, the desired capacity to 3, and the maximum
instances to 6. Add the EC2 instances to the Auto Scaling group.
D. Create two Amazon CloudWatch alarms. Configure the first CloudWatch alarm to enter the ALARM state
when the average CPUUtilization metric is below 20%. Configure the second CloudWatch alarm to enter the
ALARM state when the average CPUUtilization matric is above 50%. Configure the alarms to publish to an
Amazon Simple Notification Service (Amazon SNS) topic to send an email message. After receiving the
message, log in to decrease or increase the number of EC2 instances that are running.
Answer: B
Explanation:
Option B leverages EC2 Auto Scaling, which is designed to automatically adjust the number of instances
based on specified metrics. By setting a target tracking scaling policy based on average CPU utilization, the
Auto Scaling group can dynamically scale the number of instances to maintain the desired level of CPU
resources. The minimum instances of 2 ensure a minimum baseline capacity, while the desired capacity of 3
ensures at least three instances are running even during normal traffic. The maximum instances of 6 cap the
upper limit to control costs.
The design did not pass an operational review because the EC2 instances and the DB instance are all located in a
single Availability Zone. A solutions architect must update the design to use a second Availability Zone.
A. Provision a subnet in each Availability Zone. Configure the Auto Scaling group to distribute the EC2
instances across both Availability Zones. Configure the DB instance with connections to each network.
B. Provision two subnets that extend across both Availability Zones. Configure the Auto Scaling group to
distribute the EC2 instances across both Availability Zones. Configure the DB instance with connections to each
network.
C. Provision a subnet in each Availability Zone. Configure the Auto Scaling group to distribute the EC2
instances across both Availability Zones. Configure the DB instance for Multi-AZ deployment.
D. Provision a subnet that extends across both Availability Zones. Configure the Auto Scaling group to
distribute the EC2 instances across both Availability Zones. Configure the DB instance for Multi-AZ
deployment.
Answer: C
Explanation:
A. Create an Amazon FSx for NetApp ONTAP file system. Sat each volume’ tiering policy to ALL. Import the raw
data into the file system. Mount the fila system on the EC2 instances.
B. Create an Amazon S3 bucket to store the raw data. Create an Amazon FSx for Lustre file system that uses
persistent SSD storage. Select the option to import data from and export data to Amazon S3. Mount the file
system on the EC2 instances.
C. Create an Amazon S3 bucket to store the raw data. Create an Amazon FSx for Lustre file system that uses
persistent HDD storage. Select the option to import data from and export data to Amazon S3. Mount the file
system on the EC2 instances.
D. Create an Amazon FSx for NetApp ONTAP file system. Set each volume’s tiering policy to NONE. Import the
raw data into the file system. Mount the file system on the EC2 instances.
Answer: B
Explanation:
Keyword here is a minimum throughput of 6 GBps. Only the FSx for Lustre with SSD option gives the sub-milli
response and throughput of 6 GBps or more.
B. Create an Amazon S3 bucket to store the raw data. Create an Amazon FSx for Lustre file system that uses
persistent SSD storage. Select the option to import data from and export data to Amazon S3. Mount the file
system on the EC2 instances.
Refrences:
https://aws.amazon.com/fsx/when-to-choose-fsx/
A. Migrate the application layer to Amazon EC2 Spot Instances. Migrate the data storage layer to Amazon S3.
B. Migrate the application layer to Amazon EC2 Reserved Instances. Migrate the data storage layer to Amazon
RDS On-Demand Instances.
C. Migrate the application layer to Amazon EC2 Reserved Instances. Migrate the data storage layer to Amazon
Aurora Reserved Instances.
D. Migrate the application layer to Amazon EC2 On-Demand Instances. Migrate the data storage layer to
Amazon RDS Reserved Instances.
Answer: C
Explanation:
Amazon EC2 Reserved Instances allow for significant cost savings compared to On-Demand instances for
long-running, steady-state workloads like this one. Reserved Instances provide a capacity reservation, so the
instances are guaranteed to be available for the duration of the reservation period.
Amazon Aurora is a highly scalable, cloud-native relational database service that is designed to be compatible
with MySQL and PostgreSQL. It can automatically scale up to meet growing storage requirements, so it can
accommodate the application's database storage needs over time. By using Reserved Instances for Aurora,
the cost savings will be significant over the long term.
The laboratory wants to implement a data migration service that will maximize the performance of the data
transfer. However, the laboratory needs to be able to control the amount of bandwidth that the service uses to
minimize the impact on other departments. The data migration must take place within the next 5 days.
A. AWS Snowcone
B. Amazon FSx File Gateway
C. AWS DataSync
D. AWS Transfer Family
Answer: C
Explanation:
AWS DataSync is a data transfer service that can copy large amounts of data between on-premises storage
and Amazon FSx for Windows File Server at high speeds. It allows you to control the amount of bandwidth
used during data transfer.
• DataSync uses agents at the source and destination to automatically copy files and file metadata over the
network. This optimizes the data transfer and minimizes the impact on your network bandwidth.
• DataSync allows you to schedule data transfers and configure transfer rates to suit your needs. You can
transfer 30 TB within 5 days while controlling bandwidth usage.
• DataSync can resume interrupted transfers and validate data to ensure integrity. It provides detailed
monitoring and reporting on the progress and performance of data transfers.
Users are experiencing issues with buffering and playback on mobile devices. The company wants to implement
solutions to maximize the performance and scalability of the app while minimizing operational overhead.
Which combination of solutions will meet these requirements? (Choose two.)
Answer: AC
Explanation:
A: Deploy Amazon Cloud Front for content delivery and caching: Amazon Cloud Front is a content delivery
network (CDN) that can help improve the performance and scalability of the app by caching content at edge
locations, reducing latency, and improving the delivery of video clips to users. Cloud Front can also provide
features such as DDoS protection, SSL/TLS encryption, and content compression to optimize the delivery of
video clips.
C: Use Amazon Elastic Transcoder to convert the video files to more appropriate formats: Amazon Elastic
Transcoder is a service that can help optimize the video format for mobile devices, reducing the size of the
video files, and improving the playback performance. Elastic Transcoder can also convert videos into multiple
formats to support different devices and platforms.
A. Use Amazon EC2 Auto Scaling to scale at certain periods based on previous traffic patterns.
B. Use an AWS Lambda function to scale Amazon ECS based on metric breaches that trigger an Amazon
CloudWatch alarm.
C. Use Amazon EC2 Auto Scaling with simple scaling policies to scale when ECS metric breaches trigger an
Amazon CloudWatch alarm.
D. Use AWS Application Auto Scaling with target tracking policies to scale when ECS metric breaches trigger
an Amazon CloudWatch alarm.
Answer: D
Explanation:
Which solution will meet these requirements with the LEAST operational overhead?
A. Use AWS DataSync.
B. Use AWS Snowball devices.
C. Set up an SFTP server on Amazon EC2.
D. Use AWS Database Migration Service (AWS DMS).
Answer: A
Explanation:
AWS DataSync is a fully managed data transfer service that simplifies moving large amounts of data between
on-premises storage systems and AWS services. It can also transfer data between different AWS services,
including different AWS Regions. DataSync provides a simple, scalable, and automated solution to transfer
data, and it minimizes the operational overhead because it is fully managed by AWS.
A. Create an AWS DataSync task that shares the data as a mountable file system. Mount the file system to the
application server.
B. Create an Amazon EC2 Windows instance. Install and configure a Windows file share role on the instance.
Connect the application server to the file share.
C. Create an Amazon FSx for Windows File Server file system. Attach the file system to the origin server.
Connect the application server to the file system.
D. Create an Amazon S3 bucket. Assign an IAM role to the application to grant access to the S3 bucket. Mount
the S3 bucket to the application server.
Answer: C
Explanation:
A. Launch all EC2 instances in the same Availability Zone within the same AWS Region. Specify a placement
group with cluster strategy when launching EC2 instances.
B. Launch all EC2 instances in different Availability Zones within the same AWS Region. Specify a placement
group with partition strategy when launching EC2 instances.
C. Deploy an Auto Scaling group to launch EC2 instances in different Availability Zones based on a network
utilization target.
D. Deploy an Auto Scaling group with a step scaling policy to launch EC2 instances in different Availability
Zones.
Answer: A
Explanation:
• Launching instances within a single AZ and using a cluster placement group provides the lowest network
latency and highest bandwidth between instances. This maximizes performance for an in-memory database
and high-throughput application.
• Communications between instances in the same AZ and placement group are free, minimizing data transfer
charges. Inter-AZ and public IP traffic can incur charges.
• A cluster placement group enables the instances to be placed close together within the AZ, allowing the
high network throughput required. Partition groups span AZs, reducing bandwidth.
• Auto Scaling across zones could launch instances in AZs that increase data transfer charges. It may reduce
network throughput, impacting performance.
Which AWS solution should the company use to meet these requirements?
Answer: D
Explanation:
https://docs.amazonaws.cn/en_us/storagegateway/latest/vgw/StorageGatewayConcepts.html#storage-
gateway-cached-concepts
The finance team needs to use the appropriate AWS account to access the Trusted Advisor check
recommendations for RDS. The finance team must review the appropriate Trusted Advisor check to reduce RDS
costs.
Which combination of steps should the finance team take to meet these requirements? (Choose two.)
A. Use the Trusted Advisor recommendations from the account where the RDS instances are running.
B. Use the Trusted Advisor recommendations from the consolidated billing account to see all RDS instance
checks at the same time.
C. Review the Trusted Advisor check for Amazon RDS Reserved Instance Optimization.
D. Review the Trusted Advisor check for Amazon RDS Idle DB Instances.
E. Review the Trusted Advisor check for Amazon Redshift Reserved Node Optimization.
Answer: BD
Explanation:
https://aws.amazon.com/premiumsupport/knowledge-center/trusted-advisor-cost-optimization/
Which solution will accomplish this goal with the LEAST operational overhead?
A. Analyze bucket access patterns by using the S3 Storage Lens dashboard for advanced activity metrics.
B. Analyze bucket access patterns by using the S3 dashboard in the AWS Management Console.
C. Turn on the Amazon CloudWatch BucketSizeBytes metric for buckets. Analyze bucket access patterns by
using the metrics data with Amazon Athena.
D. Turn on AWS CloudTrail for S3 object monitoring. Analyze bucket access patterns by using CloudTrail logs
that are integrated with Amazon CloudWatch Logs.
Answer: A
Explanation:
S3 Storage Lens is a fully managed S3 storage analytics solution that provides a comprehensive view of
object storage usage, activity trends, and recommendations to optimize costs. Storage Lens allows you to
analyze object access patterns across all of your S3 buckets and generate detailed metrics and reports.
The customers are distributed across North America and Europe. The company wants to reduce the cost that is
associated with data transfers and wants to maintain or improve performance.
A. Configure S3 Transfer Acceleration on the existing S3 bucket. Direct customer requests to the S3 Transfer
Acceleration endpoint. Continue to use S3 signed URLs for access control.
B. Deploy an Amazon CloudFront distribution with the existing S3 bucket as the origin. Direct customer
requests to the CloudFront URL. Switch to CloudFront signed URLs for access control.
C. Set up a second S3 bucket in the eu-central-1 Region with S3 Cross-Region Replication between the
buckets. Direct customer requests to the closest Region. Continue to use S3 signed URLs for access control.
D. Modify the web application to enable streaming of the datasets to end users. Configure the web application
to read the data from the existing S3 bucket. Implement access control directly in the application.
Answer: B
Explanation:
To reduce the cost associated with data transfers and maintain or improve performance, a solutions architect
should use Amazon CloudFront, a content delivery network (CDN) service that securely delivers data, videos,
applications, and APIs to customers globally with low latency and high transfer speeds.
Deploying a CloudFront distribution with the existing S3 bucket as the origin will allow the company to serve
the data to customers from edge locations that are closer to them, reducing data transfer costs and improving
performance.
Directing customer requests to the CloudFront URL and switching to CloudFront signed URLs for access
control will enable customers to access the data securely and efficiently.
A.Create multiple Amazon Kinesis data streams based on the quote type. Configure the web application to send
messages to the proper data stream. Configure each backend group of application servers to use the Kinesis
Client Library (KCL) to pool messages from its own data stream.
B.Create an AWS Lambda function and an Amazon Simple Notification Service (Amazon SNS) topic for each
quote type. Subscribe the Lambda function to its associated SNS topic. Configure the application to publish
requests for quotes to the appropriate SNS topic.
C.Create a single Amazon Simple Notification Service (Amazon SNS) topic. Subscribe Amazon Simple Queue
Service (Amazon SQS) queues to the SNS topic. Configure SNS message filtering to publish messages to the
proper SQS queue based on the quote type. Configure each backend application server to use its own SQS
queue.
D.Create multiple Amazon Kinesis Data Firehose delivery streams based on the quote type to deliver data
streams to an Amazon OpenSearch Service cluster. Configure the application to send messages to the proper
delivery stream. Configure each backend group of application servers to search for the messages from
OpenSearch Service and process them accordingly.
Answer: C
Explanation:
Quote types need to be separated: SNS message filtering can be used to publish messages to the appropriate
SQS queue based on the quote type, ensuring that quotes are separated by type.Quotes must be responded
to within 24 hours and must not get lost: SQS provides reliable and scalable queuing for messages, ensuring
that quotes will not get lost and can be processed in a timely manner. Additionally, each backend application
server can use its own SQS queue, ensuring that quotes are processed efficiently without any
delay.Operational efficiency and minimizing maintenance: Using a single SNS topic and multiple SQS queues
is a scalable and cost-effective approach, which can help to maximize operational efficiency and minimize
maintenance. Additionally, SNS and SQS are fully managed services, which means that the company will not
need to worry about maintenance tasks such as software updates, hardware upgrades, or scaling the
infrastructure.
https://aws.amazon.com/getting-started/hands-on/filter-messages-published-to-topics/
Question: 312 CertyIQ
A company has an application that runs on several Amazon EC2 instances. Each EC2 instance has multiple Amazon
Elastic Block Store (Amazon EBS) data volumes attached to it. The application’s EC2 instance configuration and
data need to be backed up nightly. The application also needs to be recoverable in a different AWS Region.
Which solution will meet these requirements in the MOST operationally efficient way?
A. Write an AWS Lambda function that schedules nightly snapshots of the application’s EBS volumes and
copies the snapshots to a different Region.
B. Create a backup plan by using AWS Backup to perform nightly backups. Copy the backups to another
Region. Add the application’s EC2 instances as resources.
C. Create a backup plan by using AWS Backup to perform nightly backups. Copy the backups to another
Region. Add the application’s EBS volumes as resources.
D. Write an AWS Lambda function that schedules nightly snapshots of the application's EBS volumes and
copies the snapshots to a different Availability Zone.
Answer: B
Explanation:
https://aws.amazon.com/vi/blogs/aws/aws-backup-ec2-instances-efs-single-file-restore-and-cross-region-
backup/
When you back up an EC2 instance, AWS Backup will protect all EBS volumes attached to the instance, and it
will attach them to an AMI that stores all parameters from the original EC2 instance except for two
A. Publish content to a public Amazon S3 bucket. Use AWS Key Management Service (AWS KMS) keys to
stream content.
B. Set up IPsec VPN between the mobile app and the AWS environment to stream content.
C. Use Amazon CloudFront. Provide signed URLs to stream content.
D. Set up AWS Client VPN between the mobile app and the AWS environment to stream content.
Answer: C
Explanation:
Amazon CloudFront is a content delivery network (CDN) that securely delivers data, videos, applications, and
APIs to customers globally with low latency and high transfer speeds. CloudFront supports signed URLs that
provide authorized access to your content. This feature allows the company to control who can access their
content and for how long, providing a secure and scalable solution for millions of users.
Answer: B
Explanation:
Amazon Aurora Serverless for MySQL is a fully managed, auto-scaling relational database service that scales
up or down automatically based on the application demand. This service provides all the capabilities of
Amazon Aurora, such as high availability, durability, and security, without requiring the customer to provision
any database instances.With Amazon Aurora Serverless for MySQL, the sales team can enjoy minimal
downtime since the database is designed to automatically scale to accommodate the increased traffic.
Additionally, the service allows the customer to pay only for the capacity used, making it cost-effective for
infrequent access patterns.Amazon RDS for MySQL could also be an option, but it requires the customer to
select an instance type, and the database administrator would need to monitor and adjust the instance size
manually to accommodate the increasing traffic.
A. Deploy AWS Shield to scan the EC2 instances for vulnerabilities. Create an AWS Lambda function to log any
findings to AWS CloudTrail.
B. Deploy Amazon Macie and AWS Lambda functions to scan the EC2 instances for vulnerabilities. Log any
findings to AWS CloudTrail.
C. Turn on Amazon GuardDuty. Deploy the GuardDuty agents to the EC2 instances. Configure an AWS Lambda
function to automate the generation and distribution of reports that detail the findings.
D. Turn on Amazon Inspector. Deploy the Amazon Inspector agent to the EC2 instances. Configure an AWS
Lambda function to automate the generation and distribution of reports that detail the findings.
Answer: D
Explanation:
Amazon Inspector is a security assessment service that helps to identify security vulnerabilities and
compliance issues in applications deployed on Amazon EC2 instances. It can be used to assess the security of
applications that are deployed on Amazon EC2 instances, including those that are custom-built. To use
Amazon Inspector, the Amazon Inspector agent must be installed on the EC2 instances that need to be
assessed. The agent collects data about the instances and sends it to Amazon Inspector for analysis. Amazon
Inspector then generates a report that details any security vulnerabilities that were found and provides
guidance on how to remediate them. By configuring an AWS Lambda function, the company can automate the
generation and distribution of reports that detail the findings. This means that reports can be generated and
distributed as soon as vulnerabilities are detected, allowing the company to take action quickly.
Answer: C
Explanation:
AWS Lambda is a serverless compute service that allows you to run your code without provisioning or
managing servers. By migrating the script to an AWS Lambda function, you can eliminate the need to maintain
an EC2 instance, reducing operational costs. Additionally, Lambda automatically scales to handle the
increasing number of messages in the SQS queue.
The company cannot update the legacy application to produce data in another format. The company needs to
implement a solution so that the COTS application can use the data that the legacy application produces.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an AWS Glue extract, transform, and load (ETL) job that runs on a schedule. Configure the ETL job to
process the .csv files and store the processed data in Amazon Redshift.
B.Develop a Python script that runs on Amazon EC2 instances to convert the .csv files to .sql files. Invoke the
Python script on a cron schedule to store the output files in Amazon S3.
C.Create an AWS Lambda function and an Amazon DynamoDB table. Use an S3 event to invoke the Lambda
function. Configure the Lambda function to perform an extract, transform, and load (ETL) job to process the .csv
files and store the processed data in the DynamoDB table.
D.Use Amazon EventBridge to launch an Amazon EMR cluster on a weekly schedule. Configure the EMR cluster
to perform an extract, transform, and load (ETL) job to process the .csv files and store the processed data in an
Amazon Redshift table.
Answer: A
Explanation:
A, AWS Glue is a fully managed ETL service that can extract data from various sources, transform it into the
required format, and load it into a target data store. In this case, the ETL job can be configured to read the
CSV files from Amazon S3, transform the data into a format that can be loaded into Amazon Redshift, and
load it into an Amazon Redshift table.B requires the development of a custom script to convert the CSV files
to SQL files, which could be time-consuming and introduce additional operational overhead. C, while using
serverless technology, requires the additional use of DynamoDB to store the processed data, which may not
be necessary if the data is only needed in Amazon Redshift. D, while an option, is not the most efficient
solution as it requires the creation of an EMR cluster, which can be costly and complex to manage.
Which actions should the solutions architect take to meet these requirements? (Choose two.)
Answer: AD
Explanation:
A. Enable AWS CloudTrail and use it for auditing. CloudTrail provides event history of your AWS account
activity, including actions taken through the AWS Management Console, AWS Command Line Interface (CLI),
and AWS SDKs and APIs. By enabling CloudTrail, the company can track user activity and changes to AWS
resources, and monitor compliance with internal policies and external regulations.
D. Enable AWS Config and create rules for auditing and compliance purposes. AWS Config provides a
detailed inventory of the AWS resources in your account, and continuously records changes to the
configurations of those resources. By creating rules in AWS Config, the company can automate the evaluation
of resource configurations against desired state, and receive alerts when configurations drift from
compliance. Options B, C, and E are not directly relevant to the requirement of tracking and auditing inventory
and configuration changes.
Which solution will meet this requirement with the LEAST amount of administrative overhead?
A. Use AWS Systems Manager Session Manager to connect to the EC2 instances.
B. Use AWS Security Token Service (AWS STS) to generate one-time SSH keys on demand.
C. Allow shared SSH access to a set of bastion instances. Configure all other instances to allow only SSH
access from the bastion instances.
D. Use an Amazon Cognito custom authorizer to authenticate users. Invoke an AWS Lambda function to
generate a temporary SSH key.
Answer: A
Explanation:
Answer is A
Using AWS Systems Manager Session Manager to connect to the EC2 instances is a secure option as it
eliminates the need for inbound SSH ports and removes the requirement to manage SSH keys manually. It
also provides a complete audit trail of user activity. This solution requires no additional software to be
installed on the EC2 instances..
Which solution provides near-real-time data querying that is scalable with minimal data loss?
A. Publish data to Amazon Kinesis Data Streams, Use Kinesis Data Analytics to query the data.
B. Publish data to Amazon Kinesis Data Firehose with Amazon Redshift as the destination. Use Amazon Redshift
to query the data.
C. Store ingested data in an EC2 instance store. Publish data to Amazon Kinesis Data Firehose with Amazon S3
as the destination. Use Amazon Athena to query the data.
D. Store ingested data in an Amazon Elastic Block Store (Amazon EBS) volume. Publish data to Amazon
ElastiCache for Redis. Subscribe to the Redis channel to query the data.
Answer: A
Explanation:
A: is the solution for the company's requirements. Publishing data to Amazon Kinesis Data Streams can
support ingestion rates as high as 1 MB/s and provide real-time data processing. Kinesis Data Analytics can
query the ingested data in real-time with low latency, and the solution can scale as needed to accommodate
increases in ingestion rates or querying needs. This solution also ensures minimal data loss in the event of an
EC2 instance reboot since Kinesis Data Streams has a persistent data store for up to 7 days by default.
A.Update the bucket policy to deny if the PutObject does not have an s3:x-amz-acl header set.
B.Update the bucket policy to deny if the PutObject does not have an s3:x-amz-acl header set to private.
C.Update the bucket policy to deny if the PutObject does not have an aws:SecureTransport header set to true.
D.Update the bucket policy to deny if the PutObject does not have an x-amz-server-side-encryption header set.
Answer: D
Explanation:
To ensure that all objects uploaded to an Amazon S3 bucket are encrypted, the solutions architect should
update the bucket policy to deny any PutObject requests that do not have an x-amz-server-side-encryption
header set. This will prevent any objects from being uploaded to the bucket unless they are encrypted using
server-side encryption.
Reference:
https://docs.aws.amazon.com/AmazonS3/latest/userguide/amazon-s3-policy-keys.html
The thumbnail generation can take up to 60 seconds, but the company wants to provide a faster response time to
its users to notify them that the original image was received. The solutions architect must design the application to
asynchronously dispatch requests to the different application tiers.
A. Write a custom AWS Lambda function to generate the thumbnail and alert the user. Use the image upload
process as an event source to invoke the Lambda function.
B. Create an AWS Step Functions workflow. Configure Step Functions to handle the orchestration between the
application tiers and alert the user when thumbnail generation is complete.
C. Create an Amazon Simple Queue Service (Amazon SQS) message queue. As images are uploaded, place a
message on the SQS queue for thumbnail generation. Alert the user through an application message that the
image was received.
D. Create Amazon Simple Notification Service (Amazon SNS) notification topics and subscriptions. Use one
subscription with the application to generate the thumbnail after the image upload is complete. Use a second
subscription to message the user's mobile app by way of a push notification after thumbnail generation is
complete.
Answer: C
Explanation:
The solutions architect can use Amazon Simple Queue Service (SQS) to manage the messages and dispatch
the requests in a scalable and decoupled manner. Therefore, the correct answer is C.
A solutions architect must design a system to process these messages from the sensors. The solution must be
highly available, and the results must be made available for the company’s security team to analyze.
A. Launch an Amazon EC2 instance to serve as the HTTPS endpoint and to process the messages. Configure the
EC2 instance to save the results to an Amazon S3 bucket.
B. Create an HTTPS endpoint in Amazon API Gateway. Configure the API Gateway endpoint to invoke an AWS
Lambda function to process the messages and save the results to an Amazon DynamoDB table.
C. Use Amazon Route 53 to direct incoming sensor messages to an AWS Lambda function. Configure the
Lambda function to process the messages and save the results to an Amazon DynamoDB table.
D. Create a gateway VPC endpoint for Amazon S3. Configure a Site-to-Site VPN connection from the facility
network to the VPC so that sensor data can be written directly to an S3 bucket by way of the VPC endpoint.
Answer: B
Explanation:
Deploy Amazon API Gateway as an HTTPS endpoint and AWS Lambda to process and save the messages to
an Amazon DynamoDB table. This option provides a highly available and scalable solution that can easily
handle large amounts of data. It also integrates with other AWS services, making it easier to analyze and
visualize the data for the security team.
The company wants to ensure that end users retain immediate access to all file types from the on-premises
systems without experiencing latency.
Which solution will meet these requirements with the LEAST amount of change to the company's existing
infrastructure?
A. Provision an Amazon S3 File Gateway as a virtual machine (VM) that is hosted on premises. Set the local
cache to 10 TB. Modify existing applications to access the files through the NFS protocol. To recover from a
disaster, provision an Amazon EC2 instance and mount the S3 bucket that contains the files.
B. Provision an AWS Storage Gateway tape gateway. Use a data backup solution to back up all existing data to
a virtual tape library. Configure the data backup solution to run nightly after the initial backup is complete. To
recover from a disaster, provision an Amazon EC2 instance and restore the data to an Amazon Elastic Block
Store (Amazon EBS) volume from the volumes in the virtual tape library.
C. Provision an AWS Storage Gateway Volume Gateway cached volume. Set the local cache to 10 TB. Mount the
Volume Gateway cached volume to the existing file server by using iSCSI, and copy all files to the storage
volume. Configure scheduled snapshots of the storage volume. To recover from a disaster, restore a snapshot
to an Amazon Elastic Block Store (Amazon EBS) volume and attach the EBS volume to an Amazon EC2 instance.
D. Provision an AWS Storage Gateway Volume Gateway stored volume with the same amount of disk space as
the existing file storage volume. Mount the Volume Gateway stored volume to the existing file server by using
iSCSI, and copy all files to the storage volume. Configure scheduled snapshots of the storage volume. To
recover from a disaster, restore a snapshot to an Amazon Elastic Block Store (Amazon EBS) volume and attach
the EBS volume to an Amazon EC2 instance.
Answer: D
Explanation:
Stored Volume Gateway will retain ALL data locally whereas Cached Volume Gateway retains frequently
accessed data locally
Upon deployment of the application, users report errors and are unable to access the protected content. A
solutions architect must resolve this issue by providing proper permissions so that users can access the protected
content.
A. Update the Amazon Cognito identity pool to assume the proper IAM role for access to the protected content.
B. Update the S3 ACL to allow the application to access the protected content.
C. Redeploy the application to Amazon S3 to prevent eventually consistent reads in the S3 bucket from
affecting the ability of users to access the protected content.
D. Update the Amazon Cognito pool to use custom attribute mappings within the identity pool and grant users
the proper permissions to access the protected content.
Answer: A
Explanation:
A is the best solution as it directly addresses the issue of permissions and grants authenticated users the
necessary IAM role to access the protected content. A suggests updating the Amazon Cognito identity pool to
assume the proper IAM role for access to the protected content. This is a valid solution, as it would grant
authenticated users the necessary permissions to access the protected content
Which combination of actions should a solutions architect recommend to meet these requirements? (Choose two.)
Answer: AB
Explanation:
AB: The company can optimize its S3 storage costs while maintaining high availability and resiliency of stored
assets by taking the following actions:
A. Move assets to S3 Intelligent-Tiering after 30 days to automatically move infrequently accessed objects to
the infrequent access tier and minimize storage costs. This storage class is designed to optimize costs by
automatically moving data to the most cost-effective access tier without any performance impact or
operational overhead. It provides automatic cost savings by moving data between two access tiers (frequent
and infrequent) when access patterns change, without any performance impact or operational overhead.
B. Configure an S3 Lifecycle policy to clean up incomplete multipart uploads. This will help prevent storage
costs from increasing due to incomplete multipart uploads and minimize storage costs. Therefore, the
recommended actions are A and B.
Question: 327 CertyIQ
A solutions architect must secure a VPC network that hosts Amazon EC2 instances. The EC2 instances contain
highly sensitive data and run in a private subnet. According to company policy, the EC2 instances that run in the
VPC can access only approved third-party software repositories on the internet for software product updates that
use the third party’s URL. Other internet traffic must be blocked.
A.Update the route table for the private subnet to route the outbound traffic to an AWS Network Firewall
firewall. Configure domain list rule groups.
B.Set up an AWS WAF web ACL. Create a custom set of rules that filter traffic requests based on source and
destination IP address range sets.
C.Implement strict inbound security group rules. Configure an outbound rule that allows traffic only to the
authorized software repositories on the internet by specifying the URLs.
D.Configure an Application Load Balancer (ALB) in front of the EC2 instances. Direct all outbound traffic to the
ALB. Use a URL-based rule listener in the ALB’s target group for outbound access to the internet.
Answer: A
Explanation:
Correct Answer A. Send the outbound connection from EC2 to Network Firewall. In Network Firewall, create
stateful outbound rules to allow certain domains for software patch download and deny all other domains.
https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-examples.html#suricata-
example-domain-filtering
The company is expecting a significant and sudden increase in the number of sales requests during events for the
launch of new products.
What should a solutions architect recommend to ensure that all the requests are processed successfully?
A. Add an Amazon CloudFront distribution for the dynamic content. Increase the number of EC2 instances to
handle the increase in traffic.
B. Add an Amazon CloudFront distribution for the static content. Place the EC2 instances in an Auto Scaling
group to launch new instances based on network traffic.
C. Add an Amazon CloudFront distribution for the dynamic content. Add an Amazon ElastiCache instance in
front of the ALB to reduce traffic for the API to handle.
D. Add an Amazon CloudFront distribution for the static content. Add an Amazon Simple Queue Service
(Amazon SQS) queue to receive requests from the website for later processing by the EC2 instances.
Answer: D
Explanation:
Static content can include images and style sheets that are the same across all users and are best cached at
the edges of the content distribution network (CDN). Dynamic content includes information that changes
frequently or is personalized based on user preferences, behavior, location or other factors - all content is
sales requests
Question: 329 CertyIQ
A security audit reveals that Amazon EC2 instances are not being patched regularly. A solutions architect needs to
provide a solution that will run regular security scans across a large fleet of EC2 instances. The solution should
also patch the EC2 instances on a regular schedule and provide a report of each instance’s patch status.
A. Set up Amazon Macie to scan the EC2 instances for software vulnerabilities. Set up a cron job on each EC2
instance to patch the instance on a regular schedule.
B. Turn on Amazon GuardDuty in the account. Configure GuardDuty to scan the EC2 instances for software
vulnerabilities. Set up AWS Systems Manager Session Manager to patch the EC2 instances on a regular
schedule.
C. Set up Amazon Detective to scan the EC2 instances for software vulnerabilities. Set up an Amazon
EventBridge scheduled rule to patch the EC2 instances on a regular schedule.
D. Turn on Amazon Inspector in the account. Configure Amazon Inspector to scan the EC2 instances for
software vulnerabilities. Set up AWS Systems Manager Patch Manager to patch the EC2 instances on a regular
schedule.
Answer: D
Explanation:
Amazon Inspector is a security assessment service that helps improve the security and compliance of
applications deployed on Amazon Web Services (AWS). It automatically assesses applications for
vulnerabilities or deviations from best practices. Amazon Inspector can be used to identify security issues and
recommend fixes for them. It is an ideal solution for running regular security scans across a large fleet of EC2
instances. AWS Systems Manager Patch Manager is a service that helps you automate the process of
patching Windows and Linux instances. It provides a simple, automated way to patch your instances with the
latest security patches and updates. Patch Manager helps you maintain compliance with security policies and
regulations by providing detailed reports on the patch status of your instances.
A. Create a key in AWS Key Management Service (AWS KMS). Enable encryption for the DB instances.
B. Create an encryption key. Store the key in AWS Secrets Manager. Use the key to encrypt the DB instances.
C. Generate a certificate in AWS Certificate Manager (ACM). Enable SSL/TLS on the DB instances by using the
certificate.
D. Generate a certificate in AWS Identity and Access Management (IAM). Enable SSL/TLS on the DB instances
by using the certificate.
Answer: A
Explanation:
A is the correct solution to meet the requirement of encrypting the data at rest. To encrypt data at rest in
Amazon RDS, you can use the encryption feature of Amazon RDS, which uses AWS Key Management Service
(AWS KMS). With this feature, Amazon RDS encrypts each database instance with a unique key. This key is
stored securely by AWS KMS. You can manage your own keys or use the default AWS-managed keys. When
you enable encryption for a DB instance, Amazon RDS encrypts the underlying storage, including the
automated backups, read replicas, and snapshots.
Answer: A
Explanation:
The files are stored in an on-premises Windows file server. However, due to an increase in remote usage, the file
server is running out of capacity.
.
Which solution will meet these requirements?
A. Migrate the file server to an Amazon EC2 instance in a public subnet. Configure the security group to limit
inbound traffic to the employees’ IP addresses.
B. Migrate the files to an Amazon FSx for Windows File Server file system. Integrate the Amazon FSx file
system with the on-premises Active Directory. Configure AWS Client VPN.
C. Migrate the files to Amazon S3, and create a private VPC endpoint. Create a signed URL to allow download.
D. Migrate the files to Amazon S3, and create a public VPC endpoint. Allow employees to sign on with AWS IAM
Identity Center (AWS Single Sign-On).
Answer: B
Explanation:
B is the best solution for the given requirements. It provides a secure way for employees to access
confidential and sensitive files from anywhere using AWS Client VPN. The Amazon FSx for Windows File
Server file system is designed to provide native support for Windows file system features such as NTFS
permissions, Active Directory integration, and Distributed File System (DFS). This means that the company can
continue to use their on-premises Active Directory to manage user access to files.
Question: 333 CertyIQ
A company’s application runs on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances
run in an Amazon EC2 Auto Scaling group across multiple Availability Zones. On the first day of every month at
midnight, the application becomes much slower when the month-end financial calculation batch runs. This causes
the CPU utilization of the EC2 instances to immediately peak to 100%, which disrupts the application.
What should a solutions architect recommend to ensure the application is able to handle the workload and avoid
downtime?
Answer: C
Explanation:
C: Configure an EC2 Auto Scaling scheduled scaling policy based on the monthly schedule is the best option
because it allows for the proactive scaling of the EC2 instances before the monthly batch run begins. This will
ensure that the application is able to handle the increased workload without experiencing downtime. The
scheduled scaling policy can be configured to increase the number of instances in the Auto Scaling group a
few hours before the batch run and then decrease the number of instances after the batch run is complete.
This will ensure that the resources are available when needed and not wasted when not needed.
The most appropriate solution to handle the increased workload during the monthly batch run and avoid
downtime would be to configure an EC2 Auto Scaling scheduled scaling policy based on the monthly
schedule.
Which solution will meet these requirements with the LEAST operational overhead and no changes to the
customer’s application?
A. Set up AWS Transfer Family with SFTP for Amazon S3. Configure integrated Active Directory authentication.
B. Set up AWS Database Migration Service (AWS DMS) to synchronize the on-premises client with Amazon S3.
Configure integrated Active Directory authentication.
C. Set up AWS DataSync to synchronize between the on-premises location and the S3 location by using AWS
IAM Identity Center (AWS Single Sign-On).
D. Set up a Windows Amazon EC2 instance with SFTP to connect the on-premises client with Amazon S3.
Integrate AWS Identity and Access Management (IAM).
Answer: A
Explanation:
using AWS Batch to LEAST operational overhead and have SFTP to no changes to the customer’s application
https://aws.amazon.com/vi/blogs/architecture/managed-file-transfer-using-aws-transfer-family-and-amazon-
s3/
Question: 335 CertyIQ
A company is experiencing sudden increases in demand. The company needs to provision large Amazon EC2
instances from an Amazon Machine Image (AMI). The instances will run in an Auto Scaling group. The company
needs a solution that provides minimum initialization latency to meet the demand.
A. Use the aws ec2 register-image command to create an AMI from a snapshot. Use AWS Step Functions to
replace the AMI in the Auto Scaling group.
B. Enable Amazon Elastic Block Store (Amazon EBS) fast snapshot restore on a snapshot. Provision an AMI by
using the snapshot. Replace the AMI in the Auto Scaling group with the new AMI.
C. Enable AMI creation and define lifecycle rules in Amazon Data Lifecycle Manager (Amazon DLM). Create an
AWS Lambda function that modifies the AMI in the Auto Scaling group.
D. Use Amazon EventBridge to invoke AWS Backup lifecycle policies that provision AMIs. Configure Auto
Scaling group capacity limits as an event source in EventBridge.
Answer: B
Explanation:
Enabling Amazon Elastic Block Store (Amazon EBS) fast snapshot restore on a snapshot allows you to quickly
create a new Amazon Machine Image (AMI) from a snapshot, which can help reduce the initialization latency
when provisioning new instances. Once the AMI is provisioned, you can replace the AMI in the Auto Scaling
group with the new AMI. This will ensure that new instances are launched from the updated AMI and are able
to meet the increased demand quickly.
What should a solutions architect do to meet this requirement with the LEAST operational effort?
A. Create a new AWS Key Management Service (AWS KMS) encryption key. Use AWS Secrets Manager to
create a new secret that uses the KMS key with the appropriate credentials. Associate the secret with the
Aurora DB cluster. Configure a custom rotation period of 14 days.
B. Create two parameters in AWS Systems Manager Parameter Store: one for the user name as a string
parameter and one that uses the SecureString type for the password. Select AWS Key Management Service
(AWS KMS) encryption for the password parameter, and load these parameters in the application tier.
Implement an AWS Lambda function that rotates the password every 14 days.
C. Store a file that contains the credentials in an AWS Key Management Service (AWS KMS) encrypted Amazon
Elastic File System (Amazon EFS) file system. Mount the EFS file system in all EC2 instances of the application
tier. Restrict the access to the file on the file system so that the application can read the file and that only
super users can modify the file. Implement an AWS Lambda function that rotates the key in Aurora every 14
days and writes new credentials into the file.
D. Store a file that contains the credentials in an AWS Key Management Service (AWS KMS) encrypted Amazon
S3 bucket that the application uses to load the credentials. Download the file to the application regularly to
ensure that the correct credentials are used. Implement an AWS Lambda function that rotates the Aurora
credentials every 14 days and uploads these credentials to the file in the S3 bucket.
Answer: A
Explanation:
A proposes to create a new AWS KMS encryption key and use AWS Secrets Manager to create a new secret
that uses the KMS key with the appropriate credentials. Then, the secret will be associated with the Aurora
DB cluster, and a custom rotation period of 14 days will be configured. AWS Secrets Manager will automate
the process of rotating the database credentials, which will reduce the operational effort required to meet the
IT security guidelines.
As traffic on the website increases, the replicas experience additional lag during periods of peak load. A solutions
architect must reduce the replication lag as much as possible. The solutions architect must minimize changes to
the application code and must minimize ongoing operational overhead.
A.Migrate the database to Amazon Aurora MySQL. Replace the read replicas with Aurora Replicas, and
configure Aurora Auto Scaling. Replace the stored procedures with Aurora MySQL native functions.
B.Deploy an Amazon ElastiCache for Redis cluster in front of the database. Modify the application to check the
cache before the application queries the database. Replace the stored procedures with AWS Lambda functions.
C.Migrate the database to a MySQL database that runs on Amazon EC2 instances. Choose large, compute
optimized EC2 instances for all replica nodes. Maintain the stored procedures on the EC2 instances.
D.Migrate the database to Amazon DynamoDB. Provision a large number of read capacity units (RCUs) to
support the required throughput, and configure on-demand capacity scaling. Replace the stored procedures
with DynamoDB streams.
Answer: A
Explanation:
Answer - A You can scale reads for your Amazon RDS for PostgreSQL DB instance by adding read replicas to
the instance. As with other Amazon RDS database engines, RDS for PostgreSQL uses the native replication
mechanisms of PostgreSQL to keep read replicas up to date with changes on the source DB. For general
information about read replicas and Amazon RDS, see Working with read replicas.
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_PostgreSQL.Replication.ReadReplicas.html
A.Use MySQL binary log replication to an Aurora cluster in the secondary Region. Provision one DB instance for
the Aurora cluster in the secondary Region.
B.Set up an Aurora global database for the DB cluster. When setup is complete, remove the DB instance from
the secondary Region.
C.Use AWS Database Migration Service (AWS DMS) to continuously replicate data to an Aurora cluster in the
secondary Region. Remove the DB instance from the secondary Region.
D.Set up an Aurora global database for the DB cluster. Specify a minimum of one DB instance in the secondary
Region.
Answer: D
Explanation:
D: With Amazon Aurora Global Database, you pay for replicated write I/Os between the primary Region and
each secondary Region (in this case 1). Not A because it achieves the same, would be equally costly and adds
overhead.
A. Use AWS Key Management Service (AWS KMS) to create keys. Configure the application to load the
database credentials from AWS KMS. Enable automatic key rotation.
B. Create credentials on the RDS for MySQL database for the application user and store the credentials in AWS
Secrets Manager. Configure the application to load the database credentials from Secrets Manager. Create an
AWS Lambda function that rotates the credentials in Secret Manager.
C. Create credentials on the RDS for MySQL database for the application user and store the credentials in AWS
Secrets Manager. Configure the application to load the database credentials from Secrets Manager. Set up a
credentials rotation schedule for the application user in the RDS for MySQL database using Secrets Manager.
D. Create credentials on the RDS for MySQL database for the application user and store the credentials in AWS
Systems Manager Parameter Store. Configure the application to load the database credentials from Parameter
Store. Set up a credentials rotation schedule for the application user in the RDS for MySQL database using
Parameter Store.
Answer: C
Explanation:
C. Create credentials on the RDS for MySQL database for the application user and store the credentials in
AWS Secrets Manager. Configure the application to load the database credentials from Secrets Manager. Set
up a credentials rotation schedule for the application user in the RDS for MySQL database using Secrets
Manager.https://www.certyiq.com/discussions/amazon/view/46483-exam-aws-certified-solutions-architect-
associate-saa-c02/
https://aws.amazon.com/blogs/security/rotate-amazon-rds-database-credentials-automatically-with-aws-
secrets-manager/
A. Use AWS WAF in front of the ALB. Associate the appropriate web ACLs with AWS WAF.
B. Create an ALB listener rule to reply to SQL injections with a fixed response.
C. Subscribe to AWS Shield Advanced to block all SQL injection attempts automatically.
D. Set up Amazon Inspector to block all SQL injection attempts automatically.
Answer: A
Explanation:
AWS WAF is a managed service that protects web applications from common web exploits that could affect
application availability, compromise security, or consume excessive resources. AWS WAF enables customers
to create custom rules that block common attack patterns, such as SQL injection attacks. By using AWS WAF
in front of the ALB and associating the appropriate web ACLs with AWS WAF, the company can protect its
website application from SQL injection attacks. AWS WAF will inspect incoming traffic to the website
application and block requests that match the defined SQL injection patterns in the web ACLs. This will help
to prevent SQL injection attacks from reaching the application, thereby improving the overall security posture
of the application.
Which solution will meet these requirements with the LEAST operational overhead?
A. Use Amazon EMR to ingest the data directly from the database to the QuickSight SPICE engine. Include only
the required columns.
B. Use AWS Glue Studio to ingest the data from the database to the S3 data lake. Attach an IAM policy to the
QuickSight users to enforce column-level access control. Use Amazon S3 as the data source in QuickSight.
C. Use AWS Glue Elastic Views to create a materialized view for the database in Amazon S3. Create an S3
bucket policy to enforce column-level access control for the QuickSight users. Use Amazon S3 as the data
source in QuickSight.
D. Use a Lake Formation blueprint to ingest the data from the database to the S3 data lake. Use Lake Formation
to enforce column-level access control for the QuickSight users. Use Amazon Athena as the data source in
QuickSight.
Answer: D
Explanation:
This solution leverages AWS Lake Formation to ingest data from the Aurora MySQL database into the S3 data
lake, while enforcing column-level access control for QuickSight users. Lake Formation can be used to create
and manage the data lake's metadata and enforce security and governance policies, including column-level
access control. This solution then uses Amazon Athena as the data source in QuickSight to query the data in
the S3 data lake. This solution minimizes operational overhead by leveraging AWS services to manage and
secure the data, and by using a standard query service (Amazon Athena) to provide a SQL interface to the
data.
Currently, engineers complete this task by manually modifying the Auto Scaling group parameters. The company
does not have the resources to analyze the required capacity trends for the Auto Scaling group counts. The
company needs an automated way to modify the Auto Scaling group’s desired capacity.
Which solution will meet these requirements with the LEAST operational overhead?
A. Create a dynamic scaling policy for the Auto Scaling group. Configure the policy to scale based on the CPU
utilization metric. Set the target value for the metric to 60%.
B. Create a scheduled scaling policy for the Auto Scaling group. Set the appropriate desired capacity, minimum
capacity, and maximum capacity. Set the recurrence to weekly. Set the start time to 30 minutes before the
batch jobs run.
C. Create a predictive scaling policy for the Auto Scaling group. Configure the policy to scale based on forecast.
Set the scaling metric to CPU utilization. Set the target value for the metric to 60%. In the policy, set the
instances to pre-launch 30 minutes before the jobs run.
D. Create an Amazon EventBridge event to invoke an AWS Lambda function when the CPU utilization metric
value for the Auto Scaling group reaches 60%. Configure the Lambda function to increase the Auto Scaling
group’s desired capacity and maximum capacity by 20%.
Answer: C
Explanation:
B is NOT correct. the question said "The company does not have the resources to analyze the required
capacity trends for the Auto Scaling group counts.".
answer B said "Set the appropriate desired capacity, minimum capacity, and maximum capacity".
how can someone set desired capacity if he has no resources to analyze the required capacity.
Which solution will meet these requirements with the LEAST operational overhead?
A. Migrate the MySQL database to multiple EC2 instances. Configure a standby EC2 instance in the DR Region.
Turn on replication.
B. Migrate the MySQL database to Amazon RDS. Use a Multi-AZ deployment. Turn on read replication for the
primary DB instance in the different Availability Zones.
C. Migrate the MySQL database to an Amazon Aurora global database. Host the primary DB cluster in the
primary Region. Host the secondary DB cluster in the DR Region.
D. Store the scheduled backup of the MySQL database in an Amazon S3 bucket that is configured for S3 Cross-
Region Replication (CRR). Use the data backup to restore the database in the DR Region.
Answer: C
Explanation:
Amazon Aurora global database can span and replicate DB Servers between multiple AWS Regions. And also
compatible with MySQL.
Question: 344 CertyIQ
A company has a Java application that uses Amazon Simple Queue Service (Amazon SQS) to parse messages. The
application cannot parse messages that are larger than 256 KB in size. The company wants to implement a
solution to give the application the ability to parse messages as large as 50 MB.
Which solution will meet these requirements with the FEWEST changes to the code?
A. Use the Amazon SQS Extended Client Library for Java to host messages that are larger than 256 KB in
Amazon S3.
B. Use Amazon EventBridge to post large messages from the application instead of Amazon SQS.
C. Change the limit in Amazon SQS to handle messages that are larger than 256 KB.
D. Store messages that are larger than 256 KB in Amazon Elastic File System (Amazon EFS). Configure Amazon
SQS to reference this location in the messages.
Answer: A
Explanation:
A. Use the Amazon SQS Extended Client Library for Java to host messages that are larger than 256 KB in
Amazon S3.
Amazon SQS has a limit of 256 KB for the size of messages. To handle messages larger than 256 KB, the
Amazon SQS Extended Client Library for Java can be used. This library allows messages larger than 256 KB to
be stored in Amazon S3 and provides a way to retrieve and process them. Using this solution, the application
code can remain largely unchanged while still being able to process messages up to 50 MB in size.
A. Use Amazon Cognito for authentication. Use [email protected] for authorization. Use Amazon CloudFront to
serve the web application globally.
B. Use AWS Directory Service for Microsoft Active Directory for authentication. Use AWS Lambda for
authorization. Use an Application Load Balancer to serve the web application globally.
C. Use Amazon Cognito for authentication. Use AWS Lambda for authorization. Use Amazon S3 Transfer
Acceleration to serve the web application globally.
D. Use AWS Directory Service for Microsoft Active Directory for authentication. Use [email protected] for
authorization. Use AWS Elastic Beanstalk to serve the web application globally.
Answer: A
Explanation:
CloudFront=globally
A solutions architect needs to implement a solution that migrates the data to Amazon S3, uses S3 Lifecycle
policies, and maintains the same look and feel for the client workstations. The solutions architect has identified
AWS Storage Gateway as part of the solution.
Which type of storage gateway should the solutions architect provision to meet these requirements?
A. Volume Gateway
B. Tape Gateway
C. Amazon FSx File Gateway
D. Amazon S3 File Gateway
Answer: D
Explanation:
using NFS and SMB file interfaces. It seamlessly moves frequently accessed data to a low-latency cache
while storing colder data in Amazon S3, using S3 Lifecycle policies to transition data between storage classes
over time. In this case, the company's aging NAS array can be replaced with an Amazon S3 File Gateway that
presents the same NFS and SMB shares to the client workstations. The data can then be migrated to Amazon
S3 and managed using S3 Lifecycle policies
The company wants to maximize cost savings for the application over the next 3 years. The company needs to be
able to change the instance family and sizes in the next 6 months based on application popularity and usage.
Answer: A
Explanation:
EC2 Instance Savings Plans provide savings up to 72 percent off On-Demand, in exchange for a commitment
to a specific instance family in a chosen AWS Region (for example, M5 in Virginia). These plans automatically
apply to usage regardless of size (for example, m5.xlarge, m5.2xlarge, etc.), OS (for example, Windows, Linux,
etc.), and tenancy (Host, Dedicated, Default) within the specified family in a Region.
Question: 348 CertyIQ
A company collects data from a large number of participants who use wearable devices. The company stores the
data in an Amazon DynamoDB table and uses applications to analyze the data. The data workload is constant and
predictable. The company wants to stay at or below its forecasted budget for DynamoDB.
A. Use provisioned mode and DynamoDB Standard-Infrequent Access (DynamoDB Standard-IA). Reserve
capacity for the forecasted workload.
B. Use provisioned mode. Specify the read capacity units (RCUs) and write capacity units (WCUs).
C. Use on-demand mode. Set the read capacity units (RCUs) and write capacity units (WCUs) high enough to
accommodate changes in the workload.
D. Use on-demand mode. Specify the read capacity units (RCUs) and write capacity units (WCUs) with reserved
capacity.
Answer: B
Explanation:
A. Create a database snapshot. Copy the snapshot to a new unencrypted snapshot. Share the new snapshot
with the acquiring company’s AWS account.
B. Create a database snapshot. Add the acquiring company’s AWS account to the KMS key policy. Share the
snapshot with the acquiring company’s AWS account.
C. Create a database snapshot that uses a different AWS managed KMS key. Add the acquiring company’s
AWS account to the KMS key alias. Share the snapshot with the acquiring company's AWS account.
D. Create a database snapshot. Download the database snapshot. Upload the database snapshot to an Amazon
S3 bucket. Update the S3 bucket policy to allow access from the acquiring company’s AWS account.
Answer: B
Explanation:
https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-modifying-external-accounts.html
The company must also run reports on the RDS database several times a year. The report process causes
transactions to take longer than usual to post to the customers’ accounts. The company needs a solution that will
improve the performance of the report process.
Which combination of steps will meet these requirements? (Choose two.)
Answer: AC
Explanation:
D. Migrating to RDS Custom does not address the issue of high availability and automatic recovery.
E. RDS Proxy can help with scalability and high availability but it does not address the issue of performance
for the report process. Limiting the reporting requests to the maintenance window will not provide the
required availability and recovery for the DB instance.
A. Build out the workflow in AWS Glue. Use AWS Glue to invoke AWS Lambda functions to process the
workflow steps.
B. Build out the workflow in AWS Step Functions. Deploy the application on Amazon EC2 instances. Use Step
Functions to invoke the workflow steps on the EC2 instances.
C. Build out the workflow in Amazon EventBridge. Use EventBridge to invoke AWS Lambda functions on a
schedule to process the workflow steps.
D. Build out the workflow in AWS Step Functions. Use Step Functions to create a state machine. Use the state
machine to invoke AWS Lambda functions to process the workflow steps.
Answer: D
Explanation:
Use the Step Functions console to create a state machine that invokes the Lambda function that you created
earlier in Step 1.
https://docs.aws.amazon.com/step-functions/latest/dg/tutorial-creating-lambda-state-machine.html
In Step Functions, a workflow is called a state machine, which is a series of event-driven steps. Each step in a
workflow is called a state.
Question: 352 CertyIQ
A company is designing the network for an online multi-player game. The game uses the UDP networking protocol
and will be deployed in eight AWS Regions. The network architecture needs to minimize latency and packet loss to
give end users a high-quality gaming experience.
A. Setup a transit gateway in each Region. Create inter-Region peering attachments between each transit
gateway.
B. Set up AWS Global Accelerator with UDP listeners and endpoint groups in each Region.
C. Set up Amazon CloudFront with UDP turned on. Configure an origin in each Region.
D. Set up a VPC peering mesh between each Region. Turn on UDP for each VPC.
Answer: B
Explanation:
AWS Global Accelerator is a service that improves the availability and performance of applications with local
or global users. Global Accelerator improves performance for a wide range of applications over TCP or UDP by
proxying packets at the edge to applications running in one or more AWS Regions. Global Accelerator is a
good fit for non-HTTP use cases, such as gaming (UDP), IoT (MQTT), or Voice over IP, as well as for HTTP use
cases that specifically require static IP addresses or deterministic, fast regional failover. Both services
integrate with AWS Shield for DDoS protection
The company wants to minimize any disruptions, stabilize performance, and reduce costs while retaining the
capacity for double the IOPS. The company wants to move the database tier to a fully managed solution that is
highly available and fault tolerant.
A.Use a Multi-AZ deployment of an Amazon RDS for MySQL DB instance with an io2 Block Express EBS volume.
B.Use a Multi-AZ deployment of an Amazon RDS for MySQL DB instance with a General Purpose SSD (gp2) EBS
volume.
C.Use Amazon S3 Intelligent-Tiering access tiers.
D.Use two large EC2 instances to host the database in active-passive mode.
Answer: B
Explanation:
RDS does not support IO2 or IO2express . GP2 can do the required IOPS RDS supported Storage >
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.htmlGP2 max IOPS >
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/general-purpose.html#gp2-performance
Answer: B
Explanation:
To reduce application failures resulting from database connection timeouts, the best solution is to enable RDS
Proxy on the RDS DB instance
Which solution will run the batch job within 15 minutes with the LEAST operational overhead?
Answer: D
Explanation:
AWS Batch is a fully-managed service that can launch and manage the compute resources needed to execute
batch jobs. It can scale the compute environment based on the size and timing of the batch jobs.
AWS Batch
Explanation:
Option B - Move the data objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days - will meet
the requirements of keeping the data immediately accessible with high availability and resiliency, while
minimizing storage costs. S3 Standard-IA is designed for infrequently accessed data, and it provides a lower
storage cost than S3 Standard, while still offering the same low latency, high throughput, and high durability
as S3 Standard.
Which combination of steps should a solutions architect take to meet these requirements? (Choose two.)
A. Store the static files on Amazon S3. Use Amazon CloudFront to cache objects at the edge.
B. Store the static files on Amazon S3. Use Amazon ElastiCache to cache objects at the edge.
C. Store the server-side code on Amazon Elastic File System (Amazon EFS). Mount the EFS volume on each EC2
instance to share the files.
D. Store the server-side code on Amazon FSx for Windows File Server. Mount the FSx for Windows File Server
volume on each EC2 instance to share the files.
E. Store the server-side code on a General Purpose SSD (gp2) Amazon Elastic Block Store (Amazon EBS)
volume. Mount the EBS volume on each EC2 instance to share the files.
Answer: AD
Explanation:
A because Elasticache, despite being ideal for leaderboards per Amazon, doesn't cache at edge locations. D
because FSx has higher performance for low latency needs.
https://www.techtarget.com/searchaws/tip/Amazon-FSx-vs-EFS-Compare-the-AWS-file-services
"FSx is built for high performance and submillisecond latency using solid-state drive storage volumes. This
design enables users to select storage capacity and latency independently. Thus, even a subterabyte file
system can have 256 Mbps or higher throughput and support volumes up to 64 TB."
Which solution will meet these requirements with the LEAST operational overhead?
A. Install an external image management library on an EC2 instance. Use the image management library to
process the images.
B. Create a CloudFront origin request policy. Use the policy to automatically resize images and to serve the
appropriate format based on the User-Agent HTTP header in the request.
C. Use a [email protected] function with an external image management library. Associate the [email protected]
function with the CloudFront behaviors that serve the images.
D. Create a CloudFront response headers policy. Use the policy to automatically resize images and to serve the
appropriate format based on the User-Agent HTTP header in the request.
Answer: C
Explanation:
https://aws.amazon.com/cn/blogs/networking-and-content-delivery/resizing-images-with-amazon-cloudfront-
lambdaedge-aws-cdn-blog/
A.Create a public SSL/TLS certificate in AWS Certificate Manager (ACM). Associate the certificate with
Amazon S3. Configure default encryption for each S3 bucket to use server-side encryption with AWS KMS keys
(SSE-KMS). Assign the compliance team to manage the KMS keys.
B.Use the aws:SecureTransport condition on S3 bucket policies to allow only encrypted connections over
HTTPS (TLS). Configure default encryption for each S3 bucket to use server-side encryption with S3 managed
encryption keys (SSE-S3). Assign the compliance team to manage the SSE-S3 keys.
C.Use the aws:SecureTransport condition on S3 bucket policies to allow only encrypted connections over
HTTPS (TLS). Configure default encryption for each S3 bucket to use server-side encryption with AWS KMS
keys (SSE-KMS). Assign the compliance team to manage the KMS keys.
D.Use the aws:SecureTransport condition on S3 bucket policies to allow only encrypted connections over
HTTPS (TLS). Use Amazon Macie to protect the sensitive data that is stored in Amazon S3. Assign the
compliance team to manage Macie.
Answer: C
Explanation:
Correct Answer is "C"“D” is not correct because Amazon Macie securely stores your data at rest using AWS
encryption solutions. Macie encrypts data, such as findings, using an AWS managed key from AWS Key
Management Service (AWS KMS). However, in the question there is a requirement that the compliance team
must administer the encryption key for data at rest.https://docs.aws.amazon.com/macie/latest/user/data-
protection.html
Which solution will meet these requirements with the FEWEST changes to the code?
A.Add an X-API-Key header in the HTTP header for authorization.
B.Use an interface endpoint.
C.Use a gateway endpoint.
D.Add an Amazon Simple Queue Service (Amazon SQS) queue between the two REST APIs.
Answer: B
Explanation:
an interface endpoint is a horizontally scaled, redundant VPC endpoint that provides private connectivity to a
service. It is an elastic network interface with a private IP address that serves as an entry point for traffic
destined to the AWS service. Interface endpoints are used to connect VPCs with AWS services
Which solution will meet these requirements with the LEAST operational overhead?
A. Use Amazon RDS for data that is frequently accessed. Run a periodic custom script to export the data to an
Amazon S3 bucket.
B. Store the data directly in an Amazon S3 bucket. Implement an S3 Lifecycle policy to move older data to S3
Glacier Deep Archive for long-term storage. Run one-time queries on the data in Amazon S3 by using Amazon
Athena.
C. Use Amazon DynamoDB with DynamoDB Accelerator (DAX) for data that is frequently accessed. Export the
data to an Amazon S3 bucket by using DynamoDB table export. Run one-time queries on the data in Amazon S3
by using Amazon Athena.
D. Use Amazon DynamoDB for data that is frequently accessed. Turn on streaming to Amazon Kinesis Data
Streams. Use Amazon Kinesis Data Firehose to read the data from Kinesis Data Streams. Store the records in an
Amazon S3 bucket.
Answer: C
Explanation:
As they would like to retrieve the data with sub-millisecond, DynamoDB with DAX is the answer.
DynamoDB supports some of the world's largest scale applications by providing consistent, single-digit
millisecond response times at any scale. You can build applications with virtually unlimited throughput and
storage.
Which actions should a solutions architect take to meet this requirement? (Choose two.)
A. Write the messages to an Amazon DynamoDB table with the payment ID as the partition key.
B. Write the messages to an Amazon Kinesis data stream with the payment ID as the partition key.
C. Write the messages to an Amazon ElastiCache for Memcached cluster with the payment ID as the key.
D. Write the messages to an Amazon Simple Queue Service (Amazon SQS) queue. Set the message attribute to
use the payment ID.
E. Write the messages to an Amazon Simple Queue Service (Amazon SQS) FIFO queue. Set the message group
to use the payment ID.
Answer: BE
Explanation:
Option B is preferred over A because Amazon Kinesis Data Streams inherently maintain the order of records
within a shard, which is crucial for the given requirement of preserving the order of messages for a particular
payment ID. When you use the payment ID as the partition key, all messages for that payment ID will be sent
to the same shard, ensuring that the order of messages is maintained.On the other hand, Amazon DynamoDB
is a NoSQL database service that provides fast and predictable performance with seamless scalability. While
it can store data with partition keys, it does not guarantee the order of records within a partition, which is
essential for the given use case. Hence, using Kinesis Data Streams is more suitable for this requirement.As
DynamoDB does not keep the order, I think BE is the correct answer here.
I don´t unsderstand A, How you can guaratee the order with DynamoDB?? The order is guarantee with SQS
FIFO and Kinesis Data Stream in 1 shard...
Answer: B
Explanation:
Amazon SNS is a highly available and durable publish-subscribe messaging service that allows applications to
send messages to multiple subscribers through a topic. SNS FIFO topics are designed to ensure that
messages are delivered in the order in which they are sent. This makes them ideal for situations where
message order is important, such as in the case of the company's game system.
Option A, Amazon EventBridge event bus, is a serverless event bus service that makes it easy to build event-
driven applications. While it supports ordering of events, it does not provide guarantees on the order of
delivery.
A solutions architect is reviewing the infrastructure design. Data must be encrypted at rest and in transit. Only
authorized personnel of the hospital should be able to access the data.
Which combination of steps should the solutions architect take to meet these requirements? (Choose two.)
A. Turn on server-side encryption on the SQS components. Update the default key policy to restrict key usage
to a set of authorized principals.
B. Turn on server-side encryption on the SNS components by using an AWS Key Management Service (AWS
KMS) customer managed key. Apply a key policy to restrict key usage to a set of authorized principals.
C. Turn on encryption on the SNS components. Update the default key policy to restrict key usage to a set of
authorized principals. Set a condition in the topic policy to allow only encrypted connections over TLS.
D. Turn on server-side encryption on the SQS components by using an AWS Key Management Service (AWS
KMS) customer managed key. Apply a key policy to restrict key usage to a set of authorized principals. Set a
condition in the queue policy to allow only encrypted connections over TLS.
E. Turn on server-side encryption on the SQS components by using an AWS Key Management Service (AWS
KMS) customer managed key. Apply an IAM policy to restrict key usage to a set of authorized principals. Set a
condition in the queue policy to allow only encrypted connections over TLS.
Answer: BD
Explanation:
1. read this:https://docs.aws.amazon.com/sns/latest/dg/sns-server-side-
encryption.htmlhttps://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-
server-side-encryption.html
2. For a customer managed KMS key, you must configure the key policy to add permissions for each queue
producer and consumer.
https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-key-
management.html
Which feature should the solutions architect include in the design to meet this requirement?
A.Read replicas
B.Manual snapshots
C.Automated backups
D.Multi-AZ deployments
Answer: C
Explanation:
Option C, Automated backups, will meet the requirement. Amazon RDS allows you to automatically create
backups of your DB instance. Automated backups enable point-in-time recovery (PITR) for your DB instance
down to a specific second within the retention period, which can be up to 35 days. By setting the retention
period to 30 days, the company can restore the database to its state from up to 5 minutes before any change
within the last 30 days.
Which solution will meet this requirement with the LEAST operational overhead?
Answer: D
Explanation:
The solution that will meet the requirement with the least operational overhead is to implement API Gateway
usage plans and API keys to limit access to premium content for users who do not have a subscription.Option
A is incorrect because API caching and throttling are not designed for authentication or authorization
purposes, and it does not provide access control.Option B is incorrect because although AWS WAF is a useful
tool to protect web applications from common web exploits, it is not designed for authorization purposes, and
it might require additional configuration, which increases the operational overhead.Option C is incorrect
because although IAM permissions can restrict access to data stored in a DynamoDB table, it does not provide
a mechanism for limiting access to specific content based on the user subscription. Moreover, it might require
a significant amount of additional IAM permissions configuration, which increases the operational overhead.
To meet the requirement with the least operational overhead, you can implement API usage plans and API
keys to limit the access of users who do not have a subscription. This way, you can control access to your API
Gateway APIs by requiring clients to submit valid API keys with requests. You can associate usage plans with
API keys to configure throttling and quota limits on individual client accounts.
A. Configure three Network Load Balancers (NLBs) in the three AWS Regions to address the on-premises
endpoints. Create an accelerator by using AWS Global Accelerator, and register the NLBs as its endpoints.
Provide access to the application by using a CNAME that points to the accelerator DNS.
B. Configure three Application Load Balancers (ALBs) in the three AWS Regions to address the on-premises
endpoints. Create an accelerator by using AWS Global Accelerator, and register the ALBs as its endpoints.
Provide access to the application by using a CNAME that points to the accelerator DNS.
C. Configure three Network Load Balancers (NLBs) in the three AWS Regions to address the on-premises
endpoints. In Route 53, create a latency-based record that points to the three NLBs, and use it as an origin for
an Amazon CloudFront distribution. Provide access to the application by using a CNAME that points to the
CloudFront DNS.
D. Configure three Application Load Balancers (ALBs) in the three AWS Regions to address the on-premises
endpoints. In Route 53, create a latency-based record that points to the three ALBs, and use it as an origin for
an Amazon CloudFront distribution. Provide access to the application by using a CNAME that points to the
CloudFront DNS.
Answer: A
Explanation:
Uses the AWS global network to optimize the path from users to applications, improving the performance of
TCP and UDP traffic
Answer: A
Explanation:
To accomplish this, the solutions architect should set an overall password policy for the entire AWS account.
This policy will apply to all IAM users in the account, including new users.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use AWS Batch to run the tasks as jobs. Schedule the jobs by using Amazon EventBridge (Amazon
CloudWatch Events).
B.Convert the EC2 instance to a container. Use AWS App Runner to create the container on demand to run the
tasks as jobs.
C.Copy the tasks into AWS Lambda functions. Schedule the Lambda functions by using Amazon EventBridge
(Amazon CloudWatch Events).
D.Create an Amazon Machine Image (AMI) of the EC2 instance that runs the tasks. Create an Auto Scaling
group with the AMI to run multiple copies of the instance.
Answer: A
Explanation:
A not CThe maximum AWS Lambda function run time is 15 minutes. If a Lambda function runs for longer than
15 minutes, it will be terminated by AWS Lambda. This limit is in place to prevent the Lambda environment
from becoming stale and to ensure that resources are available for other functions. If a task requires more
than 15 minutes to complete, a different AWS service or architecture may be better suited for the use case.
Question: 370 CertyIQ
A company runs a public three-tier web application in a VPC. The application runs on Amazon EC2 instances across
multiple Availability Zones. The EC2 instances that run in private subnets need to communicate with a license
server over the internet. The company needs a managed solution that minimizes operational maintenance.
A. Provision a NAT instance in a public subnet. Modify each private subnet's route table with a default route
that points to the NAT instance.
B. Provision a NAT instance in a private subnet. Modify each private subnet's route table with a default route
that points to the NAT instance.
C. Provision a NAT gateway in a public subnet. Modify each private subnet's route table with a default route
that points to the NAT gateway.
D. Provision a NAT gateway in a private subnet. Modify each private subnet's route table with a default route
that points to the NAT gateway.
Answer: C
Explanation:
As the company needs a managed solution that minimizes operational maintenance - NAT Gateway is a public
subnet is the answer.
Which combination of actions will meet this requirement with the LEAST operational overhead? (Choose two.)
A. Use a Kubernetes plugin that uses the customer managed key to perform data encryption.
B. After creation of the EKS cluster, locate the EBS volumes. Enable encryption by using the customer
managed key.
C. Enable EBS encryption by default in the AWS Region where the EKS cluster will be created. Select the
customer managed key as the default key.
D. Create the EKS cluster. Create an IAM role that has a policy that grants permission to the customer managed
key. Associate the role with the EKS cluster.
E. Store the customer managed key as a Kubernetes secret in the EKS cluster. Use the customer managed key
to encrypt the EBS volumes.
Answer: CD
Explanation:
https://docs.aws.amazon.com/eks/latest/userguide/managed-node-
groups.html#:~:text=encrypted%20Amazon%20EBS%20volumes%20without%20using%20a%20launch%
20template%2C%20encrypt%20all%20new%20Amazon%20EBS%20volumes%20created%20in%20your%20account.
Question: 372 CertyIQ
A company wants to migrate an Oracle database to AWS. The database consists of a single table that contains
millions of geographic information systems (GIS) images that are high resolution and are identified by a
geographic code.
When a natural disaster occurs, tens of thousands of images get updated every few minutes. Each geographic
code has a single image or row that is associated with it. The company wants a solution that is highly available and
scalable during such events.
A. Store the images and geographic codes in a database table. Use Oracle running on an Amazon RDS Multi-AZ
DB instance.
B. Store the images in Amazon S3 buckets. Use Amazon DynamoDB with the geographic code as the key and
the image S3 URL as the value.
C. Store the images and geographic codes in an Amazon DynamoDB table. Configure DynamoDB Accelerator
(DAX) during times of high load.
D. Store the images in Amazon S3 buckets. Store geographic codes and image S3 URLs in a database table.
Use Oracle running on an Amazon RDS Multi-AZ DB instance.
Answer: D
Explanation:
Four times each year, the company uses the data from the previous 12 months to perform analysis and train other
ML models. The data must be available with minimal delay for up to 1 year. After 1 year, the data must be retained
for archival purposes.
A. Use the S3 Intelligent-Tiering storage class. Create an S3 Lifecycle policy to transition objects to S3 Glacier
Deep Archive after 1 year.
B. Use the S3 Intelligent-Tiering storage class. Configure S3 Intelligent-Tiering to automatically move objects
to S3 Glacier Deep Archive after 1 year.
C. Use the S3 Standard-Infrequent Access (S3 Standard-IA) storage class. Create an S3 Lifecycle policy to
transition objects to S3 Glacier Deep Archive after 1 year.
D. Use the S3 Standard storage class. Create an S3 Lifecycle policy to transition objects to S3 Standard-
Infrequent Access (S3 Standard-IA) after 30 days, and then to S3 Glacier Deep Archive after 1 year.
Answer: D
Explanation:
Access patterns is given, therefore D is the most logical answer.Intelligent tiering is for random,
unpredictable access.
Question: 374 CertyIQ
A company is running several business applications in three separate VPCs within the us-east-1 Region. The
applications must be able to communicate between VPCs. The applications also must be able to consistently send
hundreds of gigabytes of data each day to a latency-sensitive application that runs in a single on-premises data
center.
A solutions architect needs to design a network connectivity solution that maximizes cost-effectiveness.
A. Configure three AWS Site-to-Site VPN connections from the data center to AWS. Establish connectivity by
configuring one VPN connection for each VPC.
B. Launch a third-party virtual network appliance in each VPC. Establish an IPsec VPN tunnel between the data
center and each virtual appliance.
C. Set up three AWS Direct Connect connections from the data center to a Direct Connect gateway in us-east-1.
Establish connectivity by configuring each VPC to use one of the Direct Connect connections.
D. Set up one AWS Direct Connect connection from the data center to AWS. Create a transit gateway, and
attach each VPC to the transit gateway. Establish connectivity between the Direct Connect connection and the
transit gateway.
Answer: D
Explanation:
Which solution will meet these requirements with the LEAST operational overhead?
Answer: A
Explanation:
Approval is explicit for the solution. -> "A common use case for AWS Step Functions is a task that requires
human intervention (for example, an approval process). Step Functions makes it easy to coordinate the
components of distributed applications as a series of steps in a visual workflow called a state machine. You
can quickly build and run state machines to execute the steps of your application in a reliable and scalable
fashion. (https://aws.amazon.com/pt/blogs/compute/implementing-serverless-manual-approval-steps-in-aws-
step-functions-and-amazon-api-gateway/)"
AWS Step Functions is a fully managed service that makes it easy to build applications by coordinating the
components of distributed applications and microservices using visual workflows. With Step Functions, you
can combine multiple AWS Lambda functions into responsive serverless applications and orchestrate data
and services that run on Amazon EC2 instances, containers, or on-premises servers. Step Functions also
allows for manual approvals as part of the workflow. This solution meets all the requirements with the least
operational overhead.
Which solution will resolve this issue with the LEAST operational overhead?
A. Create a proxy in RDS Proxy. Configure the users’ applications to use the DB instance through RDS Proxy.
B. Deploy Amazon ElastiCache for Memcached between the users’ applications and the DB instance.
C. Migrate the DB instance to a different instance class that has higher I/O capacity. Configure the users’
applications to use the new DB instance.
D. Configure Multi-AZ for the DB instance. Configure the users’ applications to switch between the DB
instances.
Answer: A
Explanation:
The correct solution for this scenario would be to create a proxy in RDS Proxy. RDS Proxy allows for managing
thousands of concurrent database connections, which can help reduce connection errors. RDS Proxy also
provides features such as connection pooling, read/write splitting, and retries. This solution requires the least
operational overhead as it does not involve migrating to a different instance class or setting up a new cache
layer. Therefore, option A is the correct answer.
A. Use a scheduled AWS Lambda function and run a script remotely on all EC2 instances to send data to the
audit system.
B. Use EC2 Auto Scaling lifecycle hooks to run a custom script to send data to the audit system when instances
are launched and terminated.
C. Use an EC2 Auto Scaling launch configuration to run a custom script through user data to send data to the
audit system when instances are launched and terminated.
D. Run a custom script on the instance operating system to send data to the audit system. Configure the script
to be invoked by the EC2 Auto Scaling group when the instance starts and is terminated.
Answer: B
Explanation:
Amazon EC2 Auto Scaling offers the ability to add lifecycle hooks to your Auto Scaling groups. These hooks
let you create solutions that are aware of events in the Auto Scaling instance lifecycle, and then perform a
custom action on instances when the corresponding lifecycle event occurs.
(https://docs.aws.amazon.com/autoscaling/ec2/userguide/lifecycle-hooks.html)
A.Use Amazon Route 53 for traffic distribution and Amazon Aurora Serverless for data storage.
B.Use a Network Load Balancer for traffic distribution and Amazon DynamoDB on-demand for data storage.
C.Use a Network Load Balancer for traffic distribution and Amazon Aurora Global Database for data storage.
D.Use an Application Load Balancer for traffic distribution and Amazon DynamoDB global tables for data
storage.
Answer: B
Explanation:
key words - UDP, non-relational dataanswers - NLB for UDP application, DynamoDB for non-relational data
A.Establish a connection between the frontend application and the database to make queries faster by
bypassing the API.
B.Configure provisioned concurrency for the Lambda function that handles the requests.
C.Cache the results of the queries in Amazon S3 for faster retrieval of similar datasets.
D.Increase the size of the database to increase the number of connections Lambda can establish at one time.
Answer: B
Explanation:
Key: the Lambda function loads many librariesConfiguring provisioned concurrency would get rid of the "cold
start" of the function therefore speeding up the proccess.
Answer B is correcthttps://docs.aws.amazon.com/lambda/latest/dg/provisioned-concurrency.htmlAnswer C:
need to modify the application
A. Scale the EC2 instances by using elastic resize. Scale the DB instances to zero outside of business hours.
B. Explore AWS Marketplace for partner solutions that will automatically start and stop the EC2 instances and
DB instances on a schedule.
C. Launch another EC2 instance. Configure a crontab schedule to run shell scripts that will start and stop the
existing EC2 instances and DB instances on a schedule.
D. Create an AWS Lambda function that will start and stop the EC2 instances and DB instances. Configure
Amazon EventBridge to invoke the Lambda function on a schedule.
Answer: D
Explanation:
The most efficient solution for automatically starting and stopping EC2 instances and DB instances on a
schedule while minimizing cost and infrastructure maintenance is to create an AWS Lambda function and
configure Amazon EventBridge to invoke the function on a schedule.Option A, scaling EC2 instances by using
elastic resize and scaling DB instances to zero outside of business hours, is not feasible as DB instances
cannot be scaled to zero.Option B, exploring AWS Marketplace for partner solutions, may be an option, but it
may not be the most efficient solution and could potentially add additional costs.Option C, launching another
EC2 instance and configuring a crontab schedule to run shell scripts that will start and stop the existing EC2
instances and DB instances on a schedule, adds unnecessary infrastructure and maintenance.
The reporting process takes a few hours with the use of relational queries. The reporting process must not prevent
any document modifications or the addition of new documents. A solutions architect needs to implement a solution
to speed up the reporting process.
Which solution will meet these requirements with the LEAST amount of change to the application code?
A. Set up a new Amazon DocumentDB (with MongoDB compatibility) cluster that includes a read replica. Scale
the read replica to generate the reports.
B. Set up a new Amazon Aurora PostgreSQL DB cluster that includes an Aurora Replica. Issue queries to the
Aurora Replica to generate the reports.
C. Set up a new Amazon RDS for PostgreSQL Multi-AZ DB instance. Configure the reporting module to query
the secondary RDS node so that the reporting module does not affect the primary node.
D. Set up a new Amazon DynamoDB table to store the documents. Use a fixed write capacity to support new
document entries. Automatically scale the read capacity to support the reports.
Answer: B
Explanation:
Option B (Set up a new Amazon Aurora PostgreSQL DB cluster that includes an Aurora Replica. Issue queries
to the Aurora Replica to generate the reports) is the best option for speeding up the reporting process for a
three-tier web application that includes a PostgreSQL database storing metadata from documents, while not
impacting document modifications or additions, with the least amount of change to the application code.
What should a solutions architect do to improve the security of the data in transit?
Answer: A
Explanation:
Network Load Balancers now support TLS protocol. With this launch, you can now offload resource intensive
decryption/encryption from your application servers to a high throughput, and low latency Network Load
Balancer. Network Load Balancer is now able to terminate TLS traffic and set up connections with your
targets either over TCP or TLS
protocol.https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-tls-
listener.htmlhttps://exampleloadbalancer.com/nlbtls_demo.html
Answer: A
Explanation:
Dedicated Host Reservations provide a billing discount compared to running On-Demand Dedicated Hosts.
Reservations are available in three payment options.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/dedicated-hosts-overview.html
A.Use the Amazon S3 Standard storage class. Create an S3 Lifecycle policy to move infrequently accessed
data to S3 Glacier.
B.Use the Amazon S3 Standard storage class. Create an S3 Lifecycle policy to move infrequently accessed
data to S3 Standard-Infrequent Access (S3 Standard-IA).
C.Use the Amazon Elastic File System (Amazon EFS) Standard storage class. Create a lifecycle management
policy to move infrequently accessed data to EFS Standard-Infrequent Access (EFS Standard-IA).
D.Use the Amazon Elastic File System (Amazon EFS) One Zone storage class. Create a lifecycle management
policy to move infrequently accessed data to EFS One Zone-Infrequent Access (EFS One Zone-IA).
Answer: C
Explanation:
POSIX + sharable across EC2 instances --> EFS --> A, B out Instances run across multiple AZ -> C is needed.
Linux based system points to EFS plus POSIX-compliant is also EFS related.
Which additional configuration strategy should the solutions architect use to meet these requirements?
A. Create a security group for the web servers and allow port 443 from 0.0.0.0/0. Create a security group for
the MySQL servers and allow port 3306 from the web servers security group.
B. Create a network ACL for the web servers and allow port 443 from 0.0.0.0/0. Create a network ACL for the
MySQL servers and allow port 3306 from the web servers security group.
C. Create a security group for the web servers and allow port 443 from the load balancer. Create a security
group for the MySQL servers and allow port 3306 from the web servers security group.
D. Create a network ACL for the web servers and allow port 443 from the load balancer. Create a network ACL
for the MySQL servers and allow port 3306 from the web servers security group.
Answer: C
Explanation:
Load balancer is public facing accepting all traffic coming towards the VPC (0.0.0.0/0). The web server needs
to trust traffic originating from the ALB. The DB will only trust traffic originating from the Web server on port
3306 for Mysql
Answer: B
Explanation:
The best solution is to implement Amazon ElastiCache to cache the large datasets, which will store the
frequently accessed data in memory, allowing for faster retrieval times. This can help to alleviate the frequent
calls to the database, reduce latency, and improve the overall performance of the backend tier.
Which combination of actions should the solutions architect take to accomplish this goal? (Choose two.)
A.Have the deployment engineer use AWS account root user credentials for performing AWS CloudFormation
stack operations.
B.Create a new IAM user for the deployment engineer and add the IAM user to a group that has the PowerUsers
IAM policy attached.
C.Create a new IAM user for the deployment engineer and add the IAM user to a group that has the
AdministratorAccess IAM policy attached.
D.Create a new IAM user for the deployment engineer and add the IAM user to a group that has an IAM policy
that allows AWS CloudFormation actions only.
E.Create an IAM role for the deployment engineer to explicitly define the permissions specific to the AWS
CloudFormation stack and launch stacks using that IAM role.
Answer: DE
Explanation:
https://www.certyiq.com/discussions/amazon/view/46428-exam-aws-certified-solutions-architect-associate-
saa-c02/
The web application is not working as intended. The web application reports that it cannot connect to the
database. The database is confirmed to be up and running. All configurations for the network ACLs, security
groups, and route tables are still in their default states.
What should a solutions architect recommend to fix the application?
A.Add an explicit rule to the private subnet’s network ACL to allow traffic from the web tier’s EC2 instances.
B.Add a route in the VPC route table to allow traffic between the web tier’s EC2 instances and the database
tier.
C.Deploy the web tier's EC2 instances and the database tier’s RDS instance into two separate VPCs, and
configure VPC peering.
D.Add an inbound rule to the security group of the database tier’s RDS instance to allow traffic from the web
tiers security group.
Answer: D
Explanation:
By default, all inbound traffic to an RDS instance is blocked. Therefore, an inbound rule needs to be added to
the security group of the RDS instance to allow traffic from the security group of the web tier's EC2 instances.
Answer: A
Explanation:
1. Option "A" is the right answer . Read replica use cases - You have a production database that is taking on
normal load & You want to run a reporting application to run some analytics • You create a Read Replica to run
the new workload there • The production application is unaffected • Read replicas are used for SELECT (=read)
only kind of statements (not INSERT, UPDATE, DELETE)
The company wants to optimize customer session management during transactions. The application must store
session data durably.
Answer: AD
Explanation:
optimize customer session management during transactions. Since the session store will be during the
transaction and we have another DB for pre/post transaction storage(Maria DB).
The backup strategy must maximize scalability and optimize resource utilization for this environment.
A. Take snapshots of Amazon Elastic Block Store (Amazon EBS) volumes of the EC2 instances and database
every 2 hours to meet the RPO.
B. Configure a snapshot lifecycle policy to take Amazon Elastic Block Store (Amazon EBS) snapshots. Enable
automated backups in Amazon RDS to meet the RPO.
C. Retain the latest Amazon Machine Images (AMIs) of the web and application tiers. Enable automated
backups in Amazon RDS and use point-in-time recovery to meet the RPO.
D. Take snapshots of Amazon Elastic Block Store (Amazon EBS) volumes of the EC2 instances every 2 hours.
Enable automated backups in Amazon RDS and use point-in-time recovery to meet the RPO.
Answer: C
Explanation:
that if there is no temporary local storage on the EC2 instances, then snapshots of EBS volumes are not
necessary. Therefore, if your application does not require temporary storage on EC2 instances, using AMIs to
back up the web and application tiers is sufficient to restore the system after a failure.Snapshots of EBS
volumes would be necessary if you want to back up the entire EC2 instance, including any applications and
temporary data stored on the EBS volumes attached to the instances. When you take a snapshot of an EBS
volume, it backs up the entire contents of that volume. This ensures that you can restore the entire EC2
instance to a specific point in time more quickly. However, if there is no temporary data stored on the EBS
volumes, then snapshots of EBS volumes are not necessary.
The application must be secure and accessible for global customers that have dynamic IP addresses.
How should a solutions architect configure the security groups to meet these requirements?
A.Configure the security group for the web servers to allow inbound traffic on port 443 from 0.0.0.0/0.
Configure the security group for the DB instance to allow inbound traffic on port 3306 from the security group
of the web servers.
B.Configure the security group for the web servers to allow inbound traffic on port 443 from the IP addresses
of the customers. Configure the security group for the DB instance to allow inbound traffic on port 3306 from
the security group of the web servers.
C.Configure the security group for the web servers to allow inbound traffic on port 443 from the IP addresses
of the customers. Configure the security group for the DB instance to allow inbound traffic on port 3306 from
the IP addresses of the customers.
D.Configure the security group for the web servers to allow inbound traffic on port 443 from 0.0.0.0/0.
Configure the security group for the DB instance to allow inbound traffic on port 3306 from 0.0.0.0/0.
Answer: A
Explanation:
If the customers have dynamic IP addresses, option A would be the most appropriate solution for allowing
global access while maintaining security.
A. Process the audio files by using Amazon Kinesis Video Streams. Use an AWS Lambda function to scan for
known PII patterns.
B. When an audio file is uploaded to the S3 bucket, invoke an AWS Lambda function to start an Amazon
Textract task to analyze the call recordings.
C. Configure an Amazon Transcribe transcription job with PII redaction turned on. When an audio file is
uploaded to the S3 bucket, invoke an AWS Lambda function to start the transcription job. Store the output in a
separate S3 bucket.
D. Create an Amazon Connect contact flow that ingests the audio files with transcription turned on. Embed an
AWS Lambda function to scan for known PII patterns. Use Amazon EventBridge to start the contact flow when
an audio file is uploaded to the S3 bucket.
Answer: C
Explanation:
Option C is the most suitable solution as it suggests using Amazon Transcribe with PII redaction turned on.
When an audio file is uploaded to the S3 bucket, an AWS Lambda function can be used to start the
transcription job. The output can be stored in a separate S3 bucket to ensure that the PII redaction is applied
to the transcript. Amazon Transcribe can redact PII such as credit card numbers, social security numbers, and
phone numbers.
Answer: D
Explanation:
A - Magnetic Max IOPS 200 - WrongB - gp3 Max IOPS 16000 per volume - WrongC - RDS not supported io2 -
WrongD - Correct; 2 gp3 volume with 16 000 each 2*16000 = 32 000 IOPS
To improve the application performance, you can replace the 2,000 GB gp3 volume with two 1,000 GB gp3
volumes. This will increase the number of IOPS available to the database and improve performance.
Which service should the solutions architect use to find the desired information?
A. Amazon GuardDuty
B. Amazon Inspector
C. AWS CloudTrail
D. AWS Config
Answer: C
Explanation:
C. AWS CloudTrailThe best option is to use AWS CloudTrail to find the desired information. AWS CloudTrail is
a service that enables governance, compliance, operational auditing, and risk auditing of AWS account
activities. CloudTrail can be used to log all changes made to resources in an AWS account, including changes
made by IAM users, EC2 instances, AWS management console, and other AWS services. By using CloudTrail,
the solutions architect can identify the IAM user who made the configuration changes to the security group
rules.
AWS CloudTrail
Answer: A
Explanation:
AWS Shield is a managed service that provides protection against Distributed Denial of Service (DDoS)
attacks for applications running on AWS. AWS Shield Standard is automatically enabled to all AWS
customers at no additional cost. AWS Shield Advanced is an optional paid service. AWS Shield Advanced
provides additional protections against more sophisticated and larger attacks for your applications running on
Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing (ELB), Amazon CloudFront, AWS Global
Accelerator, and Route 53.
A solutions architect needs to minimize the amount of operational effort that is needed for the job to run.
A.Create an AWS Lambda function that has an Amazon EventBridge notification. Schedule the EventBridge
event to run once a day.
B.Create an AWS Lambda function. Create an Amazon API Gateway HTTP API, and integrate the API with the
function. Create an Amazon EventBridge scheduled event that calls the API and invokes the function.
C.Create an Amazon Elastic Container Service (Amazon ECS) cluster with an AWS Fargate launch type. Create
an Amazon EventBridge scheduled event that launches an ECS task on the cluster to run the job.
D.Create an Amazon Elastic Container Service (Amazon ECS) cluster with an Amazon EC2 launch type and an
Auto Scaling group with at least one EC2 instance. Create an Amazon EventBridge scheduled event that
launches an ECS task on the cluster to run the job.
Answer: C
Explanation:
The requirement is to run a daily scheduled job to aggregate and filter sales records for analytics in the most
efficient way possible. Based on the requirement, we can eliminate option A and B since they use AWS
Lambda which has a limit of 15 minutes of execution time, which may not be sufficient for a job that can take
up to an hour to complete.Between options C and D, option C is the better choice since it uses AWS Fargate
which is a serverless compute engine for containers that eliminates the need to manage the underlying EC2
instances, making it a low operational effort solution. Additionally, Fargate also provides instant scale-up and
scale-down capabilities to run the scheduled job as per the requirement.Therefore, the correct answer is:C.
Create an Amazon Elastic Container Service (Amazon ECS) cluster with an AWS Fargate launch type. Create
an Amazon EventBridge scheduled event that launches an ECS task on the cluster to run the job.
Question: 398 CertyIQ
A company needs to transfer 600 TB of data from its on-premises network-attached storage (NAS) system to the
AWS Cloud. The data transfer must be complete within 2 weeks. The data is sensitive and must be encrypted in
transit. The company’s internet connection can support an upload speed of 100 Mbps.
A.Use Amazon S3 multi-part upload functionality to transfer the files over HTTPS.
B.Create a VPN connection between the on-premises NAS system and the nearest AWS Region. Transfer the
data over the VPN connection.
C.Use the AWS Snow Family console to order several AWS Snowball Edge Storage Optimized devices. Use the
devices to transfer the data to Amazon S3.
D.Set up a 10 Gbps AWS Direct Connect connection between the company location and the nearest AWS
Region. Transfer the data over a VPN connection into the Region to store the data in Amazon S3.
Answer: C
Explanation:
C. Use the AWS Snow Family console to order several AWS Snowball Edge Storage Optimized devices. Use
the devices to transfer the data to Amazon S3.The best option is to use the AWS Snow Family console to
order several AWS Snowball Edge Storage Optimized devices and use the devices to transfer the data to
Amazon S3. Snowball Edge is a petabyte-scale data transfer device that can help transfer large amounts of
data securely and quickly. Using Snowball Edge can be the most cost-effective solution for transferring large
amounts of data over long distances and can help meet the requirement of transferring 600 TB of data within
two weeks.
A solutions architect must design a solution to protect the application from this type of attack.
Which solution meets these requirements with the LEAST operational overhead?
A. Create an Amazon CloudFront distribution in front of the API Gateway Regional API endpoint with a
maximum TTL of 24 hours.
B. Create a Regional AWS WAF web ACL with a rate-based rule. Associate the web ACL with the API Gateway
stage.
C. Use Amazon CloudWatch metrics to monitor the Count metric and alert the security team when the
predefined rate is reached.
D. Create an Amazon CloudFront distribution with [email protected] in front of the API Gateway Regional API
endpoint. Create an AWS Lambda function to block requests from IP addresses that exceed the predefined
rate.
Answer: B
Explanation:
A rate-based rule in AWS WAF allows the security team to configure thresholds that trigger rate-based rules,
which enable AWS WAF to track the rate of requests for a specified time period and then block them
automatically when the threshold is exceeded. This provides the ability to prevent HTTP flood attacks with
minimal operational overhead.
What should a solutions architect do to meet these requirements with the LEAST amount of operational overhead?
A. Use DynamoDB transactions to write new event data to the table. Configure the transactions to notify
internal teams.
B. Have the current application publish a message to four Amazon Simple Notification Service (Amazon SNS)
topics. Have each team subscribe to one topic.
C. Enable Amazon DynamoDB Streams on the table. Use triggers to write to a single Amazon Simple
Notification Service (Amazon SNS) topic to which the teams can subscribe.
D. Add a custom attribute to each record to flag new items. Write a cron job that scans the table every minute
for items that are new and notifies an Amazon Simple Queue Service (Amazon SQS) queue to which the teams
can subscribe.
Answer: C
Explanation:
The best solution to meet these requirements with the least amount of operational overhead is to enable
Amazon DynamoDB Streams on the table and use triggers to write to a single Amazon Simple Notification
Service (Amazon SNS) topic to which the teams can subscribe. This solution requires minimal configuration
and infrastructure setup, and Amazon DynamoDB Streams provide a low-latency way to capture changes to
the DynamoDB table. The triggers automatically capture the changes and publish them to the SNS topic,
which notifies the internal teams.
The company needs a solution that avoids any single points of failure. The solution must give the application the
ability to scale to meet user demand.
A.Deploy the application servers by using Amazon EC2 instances in an Auto Scaling group across multiple
Availability Zones. Use an Amazon RDS DB instance in a Multi-AZ configuration.
B.Deploy the application servers by using Amazon EC2 instances in an Auto Scaling group in a single
Availability Zone. Deploy the database on an EC2 instance. Enable EC2 Auto Recovery.
C.Deploy the application servers by using Amazon EC2 instances in an Auto Scaling group across multiple
Availability Zones. Use an Amazon RDS DB instance with a read replica in a single Availability Zone. Promote
the read replica to replace the primary DB instance if the primary DB instance fails.
D.Deploy the application servers by using Amazon EC2 instances in an Auto Scaling group across multiple
Availability Zones. Deploy the primary and secondary database servers on EC2 instances across multiple
Availability Zones. Use Amazon Elastic Block Store (Amazon EBS) Multi-Attach to create shared storage
between the instances.
Answer: A
Explanation:
The correct answer is A. Deploy the application servers by using Amazon EC2 instances in an Auto Scaling
group across multiple Availability Zones. Use an Amazon RDS DB instance in a Multi-AZ configuration.To
make an existing application highly available and resilient while avoiding any single points of failure and
giving the application the ability to scale to meet user demand, the best solution would be to deploy the
application servers using Amazon EC2 instances in an Auto Scaling group across multiple Availability Zones
and use an Amazon RDS DB instance in a Multi-AZ configuration.By using an Amazon RDS DB instance in a
Multi-AZ configuration, the database is automatically replicated across multiple Availability Zones, ensuring
that the database is highly available and can withstand the failure of a single Availability Zone. This provides
fault tolerance and avoids any single points of failure.
A. Update the Kinesis Data Streams default settings by modifying the data retention period.
B. Update the application to use the Kinesis Producer Library (KPL) to send the data to Kinesis Data Streams.
C. Update the number of Kinesis shards to handle the throughput of the data that is sent to Kinesis Data
Streams.
D. Turn on S3 Versioning within the S3 bucket to preserve every version of every object that is ingested in the
S3 bucket.
Answer: A
Explanation:
A Kinesis data stream stores records from 24 hours by default, up to 8760 hours (365 days)."
https://docs.aws.amazon.com/streams/latest/dev/kinesis-extended-retention.html
The question mentioned Kinesis data stream default settings and "every other day". After 24hrs, the data isn't
in the Data stream if the default settings is not modified to store data more than 24hrs.
A.Add required IAM permissions in the resource policy of the Lambda function.
B.Create a signed request using the existing IAM credentials in the Lambda function.
C.Create a new IAM user and use the existing IAM credentials in the Lambda function.
D.Create an IAM execution role with the required permissions and attach the IAM role to the Lambda function.
Answer: D
Explanation:
Create Lambda execution role and attach existing S3 IAM role to the lambda function
Answer: D
Explanation:
To improve the architecture of this application, the best solution would be to use Amazon Simple Queue
Service (Amazon SQS) to buffer the requests and decouple the S3 bucket from the Lambda function. This will
ensure that the documents are not lost and can be processed at a later time if the Lambda function is not
available.
This will ensure that the documents are not lost and can be processed at a later time if the Lambda function is
not available. By using Amazon SQS, the architecture is decoupled and the Lambda function can process the
documents in a scalable and fault-tolerant manner.
Which combination of actions should the solutions architect take to ensure that the system can scale to meet
demand? (Choose two.)
A. Use AWS Auto Scaling to adjust the ALB capacity based on request rate.
B. Use AWS Auto Scaling to scale the capacity of the VPC internet gateway.
C. Launch the EC2 instances in multiple AWS Regions to distribute the load across Regions.
D. Use a target tracking scaling policy to scale the Auto Scaling group based on instance CPU utilization.
E. Use scheduled scaling to change the Auto Scaling group minimum, maximum, and desired capacity to zero
for weekends. Revert to the default values at the start of the week.
Answer: DE
Explanation:
Scaling should be at the ASG not ALB. So, not sure about "Use AWS Auto Scaling to adjust the ALB capacity
based on request rate"
Which combination of steps should the solutions architect take to meet these requirements? (Choose two.)
A.Create a network ACL for the public subnet. Add a rule to deny outbound traffic to 0.0.0.0/0 on port 3306.
B.Create a security group for the DB instance. Add a rule to allow traffic from the public subnet CIDR block on
port 3306.
C.Create a security group for the web servers in the public subnet. Add a rule to allow traffic from 0.0.0.0/0 on
port 443.
D.Create a security group for the DB instance. Add a rule to allow traffic from the web servers’ security group
on port 3306.
E.Create a security group for the DB instance. Add a rule to deny all traffic except traffic from the web servers’
security group on port 3306.
Answer: CD
Explanation:
To meet the requirements of allowing access to the web servers in the public subnet on port 443 and the
Amazon RDS for MySQL DB instance in the database subnet on port 3306, the best solution would be to
create a security group for the web servers and another security group for the DB instance, and then define
the appropriate inbound and outbound rules for each security group.1. Create a security group for the web
servers in the public subnet. Add a rule to allow traffic from 0.0.0.0/0 on port 443.2. Create a security group
for the DB instance. Add a rule to allow traffic from the web servers' security group on port 3306.This will
allow the web servers in the public subnet to receive traffic from the internet on port 443, and the Amazon
RDS for MySQL DB instance in the database subnet to receive traffic only from the web servers on port 3306.
A.Create an AWS DataSync task that shares the data as a mountable file system. Mount the file system to the
application server.
B.Create an AWS Storage Gateway file gateway. Create a file share that uses the required client protocol.
Connect the application server to the file share.
C.Create an Amazon Elastic File System (Amazon EFS) file system, and configure it to support Lustre. Attach
the file system to the origin server. Connect the application server to the file system.
D.Create an Amazon FSx for Lustre file system. Attach the file system to the origin server. Connect the
application server to the file system.
Answer: D
Explanation:
To meet the requirements of a shared storage solution for a gaming application that can be accessed using
Lustre clients and is fully managed, the best solution would be to use Amazon FSx for Lustre.Amazon FSx for
Lustre is a fully managed file system that is optimized for compute-intensive workloads, such as high-
performance computing, machine learning, and gaming. It provides a POSIX-compliant file system that can be
accessed using Lustre clients and offers high performance, scalability, and data durability.This solution
provides a highly available, scalable, and fully managed shared storage solution that can be accessed using
Lustre clients. Amazon FSx for Lustre is optimized for compute-intensive workloads and provides high
performance and durability.
The company needs a solution that minimizes latency for the data transmission from the devices. The solution also
must provide rapid failover to another AWS Region.
A. Configure an Amazon Route 53 failover routing policy. Create a Network Load Balancer (NLB) in each of the
two Regions. Configure the NLB to invoke an AWS Lambda function to process the data.
B. Use AWS Global Accelerator. Create a Network Load Balancer (NLB) in each of the two Regions as an
endpoint. Create an Amazon Elastic Container Service (Amazon ECS) cluster with the Fargate launch type.
Create an ECS service on the cluster. Set the ECS service as the target for the NLProcess the data in Amazon
ECS.
C. Use AWS Global Accelerator. Create an Application Load Balancer (ALB) in each of the two Regions as an
endpoint. Create an Amazon Elastic Container Service (Amazon ECS) cluster with the Fargate launch type.
Create an ECS service on the cluster. Set the ECS service as the target for the ALB. Process the data in Amazon
ECS.
D. Configure an Amazon Route 53 failover routing policy. Create an Application Load Balancer (ALB) in each of
the two Regions. Create an Amazon Elastic Container Service (Amazon ECS) cluster with the Fargate launch
type. Create an ECS service on the cluster. Set the ECS service as the target for the ALB. Process the data in
Amazon ECS.
Answer: B
Explanation:
To meet the requirements of minimizing latency for data transmission from the devices and providing rapid
failover to another AWS Region, the best solution would be to use AWS Global Accelerator in combination
with a Network Load Balancer (NLB) and Amazon Elastic Container Service (Amazon ECS).
AWS Global Accelerator is a service that improves the availability and performance of applications by using
static IP addresses (Anycast) to route traffic to optimal AWS endpoints. With Global Accelerator, you can
direct traffic to multiple Regions and endpoints, and provide automatic failover to another AWS Region.
Which replacement to the on-premises file share is MOST resilient and durable?
Answer: C
Explanation:
A) RDS is a database serviceB) Storage Gateway is a hybrid cloud storage service that connects on-premises
applications to AWS storage services.D) provides shared file storage for Linux-based workloads, but it does
not natively support Windows-based workloads.
The most resilient and durable replacement for the on-premises file share in this scenario would be Amazon
FSx for Windows File Server.Amazon FSx is a fully managed Windows file system service that is built on
Windows Server and provides native support for the SMB protocol. It is designed to be highly available and
durable, with built-in backup and restore capabilities. It is also fully integrated with AWS security services,
providing encryption at rest and in transit, and it can be configured to meet compliance standards.
A.Create an IAM role that specifies EBS encryption. Attach the role to the EC2 instances.
B.Create the EBS volumes as encrypted volumes. Attach the EBS volumes to the EC2 instances.
C.Create an EC2 instance tag that has a key of Encrypt and a value of True. Tag all instances that require
encryption at the EBS level.
D.Create an AWS Key Management Service (AWS KMS) key policy that enforces EBS encryption in the account.
Ensure that the key policy is active.
Answer: B
Explanation:
Create encrypted EBS volumes and attach encrypted EBS volumes to EC2 instances..
A.Amazon DynamoDB
B.Amazon RDS for MySQL
C.MySQL-compatible Amazon Aurora Serverless
D.MySQL deployed on Amazon EC2 in an Auto Scaling group
Answer: C
Explanation:
C: Aurora Serverless is a MySQL-compatible relational database engine that automatically scales compute
and memory resources based on application usage. no upfront costs or commitments required. A: DynamoDB
is a NoSQLB: Fixed cost on RDS classD: More operation requires
A. Use Amazon GuardDuty to monitor S3 bucket policies. Create an automatic remediation action rule that uses
an AWS Lambda function to remediate any change that makes the objects public.
B. Use AWS Trusted Advisor to find publicly accessible S3 buckets. Configure email notifications in Trusted
Advisor when a change is detected. Manually change the S3 bucket policy if it allows public access.
C. Use AWS Resource Access Manager to find publicly accessible S3 buckets. Use Amazon Simple Notification
Service (Amazon SNS) to invoke an AWS Lambda function when a change is detected. Deploy a Lambda
function that programmatically remediates the change.
D. Use the S3 Block Public Access feature on the account level. Use AWS Organizations to create a service
control policy (SCP) that prevents IAM users from changing the setting. Apply the SCP to the account.
Answer: D
Explanation:
Answer D is the correct solution that meets the requirements. The S3 Block Public Access feature allows you
to restrict public access to S3 buckets and objects within the account. You can enable this feature at the
account level to prevent any S3 bucket from being made public, regardless of the bucket policy settings.
AWS Organizations can be used to apply a Service Control Policy (SCP) to the account to prevent IAM users
from changing this setting, ensuring that all S3 objects remain private. This is a straightforward and effective
solution that requires minimal operational overhead.
A. Create a separate application tier using EC2 instances dedicated to email processing.
B. Configure the web instance to send email through Amazon Simple Email Service (Amazon SES).
C. Configure the web instance to send email through Amazon Simple Notification Service (Amazon SNS).
D. Create a separate application tier using EC2 instances dedicated to email processing. Place the instances in
an Auto Scaling group.
Answer: B
Explanation:
Amazon SES is a cost-effective and scalable email service that enables businesses to send and receive email
using their own email addresses and domains. Configuring the web instance to send email through Amazon
SES is a simple and effective solution that can reduce the time spent resolving complex email delivery issues
and minimize operational overhead.
Which solution will meet these requirements with the LEAST administrative overhead?
A. Use AWS DataSync to transfer the files to Amazon S3. Create a scheduled task that runs at the end of each
day.
B. Create an Amazon S3 File Gateway. Update the business system to use a new network share from the S3 File
Gateway.
C. Use AWS DataSync to transfer the files to Amazon S3. Create an application that uses the DataSync API in
the automation workflow.
D. Deploy an AWS Transfer for SFTP endpoint. Create a script that checks for new files on the network share
and uploads the new files by using SFTP.
Answer: B
Explanation:
1. Key words: 1. near-real-time (A is out)2. LEAST administrative (C n D is out)
2. A - creating a scheduled task is not near-real time.B - The S3 File Gateway caches frequently accessed
data locally and automatically uploads it to Amazon S3, providing near-real-time access to the data.C -
creating an application that uses the DataSync API in the automation workflow may provide near-real-time
data access, but it requires additional development effort.D - it requires additional development effort.
Which solution will meet these requirements with the MOST operational efficiency?
A. Create an S3 Lifecycle configuration with a rule to transition the objects in the S3 bucket to S3 Intelligent-
Tiering.
B. Use the S3 storage class analysis tool to determine the correct tier for each object in the S3 bucket. Move
each object to the identified storage tier.
C. Create an S3 Lifecycle configuration with a rule to transition the objects in the S3 bucket to S3 Glacier
Instant Retrieval.
D. Create an S3 Lifecycle configuration with a rule to transition the objects in the S3 bucket to S3 One Zone-
Infrequent Access (S3 One Zone-IA).
Answer: A
Explanation:
Creating an S3 Lifecycle configuration with a rule to transition the objects in the S3 bucket to S3 Intelligent-
Tiering would be the most efficient solution to optimize the cost of S3 usage. S3 Intelligent-Tiering is a
storage class that automatically moves objects between two access tiers (frequent and infrequent) based on
changing access patterns. It is a cost-effective solution that does not require any manual intervention to move
data to different storage classes, unlike the other options.
Which combination of actions should a solutions architect take to resolve this issue? (Choose two.)
Answer: BD
Explanation:
To resolve the issue of slow page loads for a rapidly growing e-commerce website hosted on AWS, a solutions
architect can take the following two actions:1. Set up an Amazon CloudFront distribution2. Create a read
replica for the RDS DB instanceConfiguring an Amazon Redshift cluster is not relevant to this issue since
Redshift is a data warehousing service and is typically used for the analytical processing of large amounts of
data.Hosting the dynamic web content in Amazon S3 may not necessarily improve performance since S3 is an
object storage service, not a web application server. While S3 can be used to host static web content, it may
not be suitable for hosting dynamic web content since S3 doesn't support server-side scripting or
processing.Configuring a Multi-AZ deployment for the RDS DB instance will improve high availability but may
not necessarily improve performance.
The application will run for at least 1 year. The company expects the number of Lambda functions that the
application uses to increase during that time. The company wants to maximize its savings on all application
resources and to keep network latency between the services low.
Which solution will meet these requirements?
A.Purchase an EC2 Instance Savings Plan Optimize the Lambda functions’ duration and memory usage and the
number of invocations. Connect the Lambda functions to the private subnet that contains the EC2 instances.
B.Purchase an EC2 Instance Savings Plan Optimize the Lambda functions' duration and memory usage, the
number of invocations, and the amount of data that is transferred. Connect the Lambda functions to a public
subnet in the same VPC where the EC2 instances run.
C.Purchase a Compute Savings Plan. Optimize the Lambda functions’ duration and memory usage, the number
of invocations, and the amount of data that is transferred. Connect the Lambda functions to the private subnet
that contains the EC2 instances.
D.Purchase a Compute Savings Plan. Optimize the Lambda functions’ duration and memory usage, the number
of invocations, and the amount of data that is transferred. Keep the Lambda functions in the Lambda service
VPC.
Answer: C
Explanation:
Answer C is the best solution that meets the company’s requirements.By purchasing a Compute Savings Plan,
the company can save on the costs of running both EC2 instances and Lambda functions. The Lambda
functions can be connected to the private subnet that contains the EC2 instances through a VPC endpoint for
AWS services or a VPC peering connection. This provides direct network access to the EC2 instances while
keeping the traffic within the private network, which helps to minimize network latency.Optimizing the
Lambda functions’ duration, memory usage, number of invocations, and amount of data transferred can help
to further minimize costs and improve performance. Additionally, using a private subnet helps to ensure that
the EC2 instances are not directly accessible from the public internet, which is a security best practice.
The solutions architect has created an IAM role in the production account. The role has a policy that grants access
to an S3 bucket in the production account.
Which solution will meet these requirements while complying with the principle of least privilege?
Answer: B
Explanation:
The solution that will meet these requirements while complying with the principle of least privilege is to add
the development account as a principal in the trust policy of the role in the production account. This will allow
team members to access Amazon S3 buckets in two different AWS accounts while complying with the
principle of least privilege.
Option A is not recommended because it grants too much access to development account users. Option C is
not relevant to this scenario. Option D is not recommended because it does not comply with the principle of
least privilege.
An audit discovers that employees have created Amazon Elastic Block Store (Amazon EBS) volumes for EC2
instances without encrypting the volumes. The company wants any new EC2 instances that any IAM user or root
user launches in ap-southeast-2 to use encrypted EBS volumes. The company wants a solution that will have
minimal effect on employees who create EBS volumes.
A.In the Amazon EC2 console, select the EBS encryption account attribute and define a default encryption key.
B.Create an IAM permission boundary. Attach the permission boundary to the root organizational unit (OU).
Define the boundary to deny the ec2:CreateVolume action when the ec2:Encrypted condition equals false.
C.Create an SCP. Attach the SCP to the root organizational unit (OU). Define the SCP to deny the
ec2:CreateVolume action whenthe ec2:Encrypted condition equals false.
D.Update the IAM policies for each account to deny the ec2:CreateVolume action when the ec2:Encrypted
condition equals false.
E.In the Organizations management account, specify the Default EBS volume encryption setting.
Answer: CE
Explanation:
SCP that denies the ec2:CreateVolume action when the ec2:Encrypted condition equals false. This will
prevent users and service accounts in member accounts from creating unencrypted EBS volumes in the ap-
southeast-2 Region.
A.Use an Amazon RDS Multi-AZ DB instance deployment. Create one read replica and point the read workload
to the read replica.
B.Use an Amazon RDS Multi-AZ DB duster deployment Create two read replicas and point the read workload to
the read replicas.
C.Use an Amazon RDS Multi-AZ DB instance deployment. Point the read workload to the secondary instances in
the Multi-AZ pair.
D.Use an Amazon RDS Multi-AZ DB cluster deployment Point the read workload to the reader endpoint.
Answer: D
Explanation:
The company wants high availability, automatic failover support in less than 40 seconds, read offloading from
the primary instance, and cost-effectiveness.
1. Amazon RDS Multi-AZ deployments provide high availability and automatic failover support.
2. In a Multi-AZ DB cluster, Amazon RDS automatically provisions and maintains a standby in a different
Availability Zone. If a failure occurs, Amazon RDS performs an automatic failover to the standby, minimizing
downtime.
3. The "Reader endpoint" for an Amazon RDS DB cluster provides load-balancing support for read-only
connections to the DB cluster. Directing read traffic to the reader endpoint helps in offloading read operations
from the primary instance.
The company wants a serverless option that provides high IOPS performance and highly configurable security. The
company also wants to maintain control over user permissions.
A.Create an encrypted Amazon Elastic Block Store (Amazon EBS) volume. Create an AWS Transfer Family SFTP
service with a public endpoint that allows only trusted IP addresses. Attach the EBS volume to the SFTP service
endpoint. Grant users access to the SFTP service.
B.Create an encrypted Amazon Elastic File System (Amazon EFS) volume. Create an AWS Transfer Family SFTP
service with elastic IP addresses and a VPC endpoint that has internet-facing access. Attach a security group to
the endpoint that allows only trusted IP addresses. Attach the EFS volume to the SFTP service endpoint. Grant
users access to the SFTP service.
C.Create an Amazon S3 bucket with default encryption enabled. Create an AWS Transfer Family SFTP service
with a public endpoint that allows only trusted IP addresses. Attach the S3 bucket to the SFTP service
endpoint. Grant users access to the SFTP service.
D.Create an Amazon S3 bucket with default encryption enabled. Create an AWS Transfer Family SFTP service
with a VPC endpoint that has internal access in a private subnet. Attach a security group that allows only
trusted IP addresses. Attach the S3 bucket to the SFTP service endpoint. Grant users access to the SFTP
service.
Answer: B
Explanation:
The question is requiring highly configurable security --> that excludes default S3 encryption, which is SSE-
S3 (is not configurable)
The company provides models to hundreds of users. The usage patterns for the models are irregular. Some models
could be unused for days or weeks. Other models could receive batches of thousands of requests at a time.
A.Direct the requests from the API to a Network Load Balancer (NLB). Deploy the models as AWS Lambda
functions that are invoked by the NLB.
B.Direct the requests from the API to an Application Load Balancer (ALB). Deploy the models as Amazon Elastic
Container Service (Amazon ECS) services that read from an Amazon Simple Queue Service (Amazon SQS)
queue. Use AWS App Mesh to scale the instances of the ECS cluster based on the SQS queue size.
C.Direct the requests from the API into an Amazon Simple Queue Service (Amazon SQS) queue. Deploy the
models as AWS Lambda functions that are invoked by SQS events. Use AWS Auto Scaling to increase the
number of vCPUs for the Lambda functions based on the SQS queue size.
D.Direct the requests from the API into an Amazon Simple Queue Service (Amazon SQS) queue. Deploy the
models as Amazon Elastic Container Service (Amazon ECS) services that read from the queue. Enable AWS
Auto Scaling on Amazon ECS for both the cluster and copies of the service based on the queue size.
Answer: D
Explanation:
because it is scalable, reliable, and efficient.C does not scale the models automatically
Which IAM principals can the solutions architect attach this policy to? (Choose two.)
A.Role
B.Group
C.Organization
D.Amazon Elastic Container Service (Amazon ECS) resource
E.Amazon EC2 resource
Answer: AB
Explanation:
identity-based policy used for role and group
The company needs to scale out and scale in more instances based on workload.
A.Use Reserved Instances for the frontend nodes. Use AWS Fargate for the backend nodes.
B.Use Reserved Instances for the frontend nodes. Use Spot Instances for the backend nodes.
C.Use Spot Instances for the frontend nodes. Use Reserved Instances for the backend nodes.
D.Use Spot Instances for the frontend nodes. Use AWS Fargate for the backend nodes.
Answer: B
Explanation:
Which Amazon Elastic Block Store (Amazon EBS) volume type will meet these requirements MOST cost-
effectively?
Answer: C
Explanation:
Both GP2 and GP3 has max IOPS 16000 but GP3 is cost
effective.https://aws.amazon.com/blogs/storage/migrate-your-amazon-ebs-volumes-from-gp2-to-gp3-and-
save-up-to-20-on-costs/
The company hosts the application on an on-premises infrastructure that is running out of storage capacity. A
solutions architect must securely migrate the existing data to AWS while satisfying the new regulation.
Which solution will meet these requirements?
A.Use AWS DataSync to move the existing data to Amazon S3. Use AWS CloudTrail to log data events.
B.Use AWS Snowcone to move the existing data to Amazon S3. Use AWS CloudTrail to log management events.
C.Use Amazon S3 Transfer Acceleration to move the existing data to Amazon S3. Use AWS CloudTrail to log
data events.
D.Use AWS Storage Gateway to move the existing data to Amazon S3. Use AWS CloudTrail to log management
events.
Answer: A
Explanation:
1. https://docs.aws.amazon.com/ja_jp/datasync/latest/userguide/encryption-in-transit.html
2. One time synch, its Data Sync. Dont bother for greyrose answers, they are usually wrong
A.Deploy the application in AWS Lambda. Configure an Amazon API Gateway API to connect with the Lambda
functions.
B.Deploy the application by using AWS Elastic Beanstalk. Configure a load-balanced environment and a rolling
deployment policy.
C.Migrate the database to Amazon ElastiCache. Configure the ElastiCache security group to allow access from
the application.
D.Launch an Amazon EC2 instance. Install a MySQL server on the EC2 instance. Configure the application on
the server. Create an AMI. Use the AMI to create a launch template with an Auto Scaling group.
Answer: B
Explanation:
Deploy the application by using AWS Elastic Beanstalk. Configure a load-balanced environment and a rolling
deployment policy.
Which solution will give the Lambda function access to the DynamoDB table MOST securely?
A.Create an IAM user with programmatic access to the Lambda function. Attach a policy to the user that allows
read and write access to the DynamoDB table. Store the access_key_id and secret_access_key parameters as
part of the Lambda environment variables. Ensure that other AWS users do not have read and write access to
the Lambda function configuration.
B.Create an IAM role that includes Lambda as a trusted service. Attach a policy to the role that allows read and
write access to the DynamoDB table. Update the configuration of the Lambda function to use the new role as
the execution role.
C.Create an IAM user with programmatic access to the Lambda function. Attach a policy to the user that allows
read and write access to the DynamoDB table. Store the access_key_id and secret_access_key parameters in
AWS Systems Manager Parameter Store as secure string parameters. Update the Lambda function code to
retrieve the secure string parameters before connecting to the DynamoDB table.
D.Create an IAM role that includes DynamoDB as a trusted service. Attach a policy to the role that allows read
and write access from the Lambda function. Update the code of the Lambda function to attach to the new role
as an execution role.
Answer: B
Explanation:
What are the effective IAM permissions of this policy for group members?
A.Group members are permitted any Amazon EC2 action within the us-east-1 Region. Statements after the
Allow permission are not applied.
B.Group members are denied any Amazon EC2 permissions in the us-east-1 Region unless they are logged in
with multi-factor authentication (MFA).
C.Group members are allowed the ec2:StopInstances and ec2:TerminateInstances permissions for all Regions
when logged in with multi-factor authentication (MFA). Group members are permitted any other Amazon EC2
action.
D.Group members are allowed the ec2:StopInstances and ec2:TerminateInstances permissions for the us-east-1
Region only when logged in with multi-factor authentication (MFA). Group members are permitted any other
Amazon EC2 action within the us-east-1 Region.
Answer: D
Explanation:
Group members are allowed the ec2:StopInstances and ec2:TerminateInstances permissions for the us-east-1
Region only when logged in with multi-factor authentication (MFA). Group members are permitted any other
Amazon EC2 action within the us-east-1 Region.
The images become irrelevant after 1 month, but the .csv files must be kept to train machine learning (ML) models
twice a year. The ML trainings and audits are planned weeks in advance.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
A.Launch an Amazon EC2 Spot Instance that downloads the .csv files every hour, generates the image files, and
uploads the images to the S3 bucket.
B.Design an AWS Lambda function that converts the .csv files into images and stores the images in the S3
bucket. Invoke the Lambda function when a .csv file is uploaded.
C.Create S3 Lifecycle rules for .csv files and image files in the S3 bucket. Transition the .csv files from S3
Standard to S3 Glacier 1 day after they are uploaded. Expire the image files after 30 days.
D.Create S3 Lifecycle rules for .csv files and image files in the S3 bucket. Transition the .csv files from S3
Standard to S3 One Zone-Infrequent Access (S3 One Zone-IA) 1 day after they are uploaded. Expire the image
files after 30 days.
E.Create S3 Lifecycle rules for .csv files and image files in the S3 bucket. Transition the .csv files from S3
Standard to S3 Standard-Infrequent Access (S3 Standard-IA) 1 day after they are uploaded. Keep the image
files in Reduced Redundancy Storage (RRS).
Answer: BC
Explanation:
Answer: B
Explanation:
https://aws.amazon.com/jp/blogs/news/building-a-real-time-gaming-leaderboard-with-amazon-elasticache-
for-redis/
Which solution will meet these requirements with the LEAST operational overhead?
A.Use AWS Glue to create an ML transform to build and train models. Use Amazon OpenSearch Service to
visualize the data.
B.Use Amazon SageMaker to build and train models. Use Amazon QuickSight to visualize the data.
C.Use a pre-built ML Amazon Machine Image (AMI) from the AWS Marketplace to build and train models. Use
Amazon OpenSearch Service to visualize the data.
D.Use Amazon QuickSight to build and train models by using calculated fields. Use Amazon QuickSight to
visualize the data.
Answer: B
Explanation:
A.Create a custom AWS Config rule to prevent tag modification except by authorized principals.
B.Create a custom trail in AWS CloudTrail to prevent tag modification.
C.Create a service control policy (SCP) to prevent tag modification except by authorized principals.
D.Create custom Amazon CloudWatch logs to prevent tag modification.
Answer: C
Explanation:
Service control policies (SCPs) are a type of organization policy that you can use to manage permissions in
your organization.
What should a solutions architect do to meet these requirements with the LEAST amount of downtime?
A.Create an Auto Scaling group and a load balancer in the disaster recovery Region. Configure the DynamoDB
table as a global table. Configure DNS failover to point to the new disaster recovery Region's load balancer.
B.Create an AWS CloudFormation template to create EC2 instances, load balancers, and DynamoDB tables to
be launched when needed Configure DNS failover to point to the new disaster recovery Region's load balancer.
C.Create an AWS CloudFormation template to create EC2 instances and a load balancer to be launched when
needed. Configure the DynamoDB table as a global table. Configure DNS failover to point to the new disaster
recovery Region's load balancer.
D.Create an Auto Scaling group and load balancer in the disaster recovery Region. Configure the DynamoDB
table as a global table. Create an Amazon CloudWatch alarm to trigger an AWS Lambda function that updates
Amazon Route 53 pointing to the disaster recovery load balancer.
Answer: A
Explanation:
.Create an Auto Scaling group and a load balancer in the disaster recovery Region. Configure the DynamoDB
table as a global table. Configure DNS failover to point to the new disaster recovery Region's load balancer.
A.Order an AWS Snowball Edge Storage Optimized device. Use AWS Database Migration Service (AWS DMS)
with AWS Schema Conversion Tool (AWS SCT) to migrate the database with replication of ongoing changes.
Send the Snowball Edge device to AWS to finish the migration and continue the ongoing replication.
B.Order an AWS Snowmobile vehicle. Use AWS Database Migration Service (AWS DMS) with AWS Schema
Conversion Tool (AWS SCT) to migrate the database with ongoing changes. Send the Snowmobile vehicle back
to AWS to finish the migration and continue the ongoing replication.
C.Order an AWS Snowball Edge Compute Optimized with GPU device. Use AWS Database Migration Service
(AWS DMS) with AWS Schema Conversion Tool (AWS SCT) to migrate the database with ongoing changes.
Send the Snowball device to AWS to finish the migration and continue the ongoing replication
D.Order a 1 GB dedicated AWS Direct Connect connection to establish a connection with the data center. Use
AWS Database Migration Service (AWS DMS) with AWS Schema Conversion Tool (AWS SCT) to migrate the
database with replication of ongoing changes.
Answer: A
Explanation:
D - Direct Connect takes atleast a month to setup! Requirement is for within 2 weeks.
https://docs.aws.amazon.com/ja_jp/snowball/latest/developer-guide/device-differences.html#device-
optionsAです。
A.Buy reserved DB instances for the total workload. Make the Amazon RDS for PostgreSQL DB instance larger.
B.Make the Amazon RDS for PostgreSQL DB instance a Multi-AZ DB instance.
C.Buy reserved DB instances for the total workload. Add another Amazon RDS for PostgreSQL DB instance.
D.Make the Amazon RDS for PostgreSQL DB instance an on-demand DB instance.
Answer: A
Explanation:
A.
"without adding infrastructure" means scaling vertically and choosing larger instance.
Answer: B
Explanation:
Deploy AWS WAF, associate it with the ALB, and configure a rate-limiting rule.
What is the MOST secure way for the company to share the database with the auditor?
A.Create a read replica of the database. Configure IAM standard database authentication to grant the auditor
access.
B.Export the database contents to text files. Store the files in an Amazon S3 bucket. Create a new IAM user for
the auditor. Grant the user access to the S3 bucket.
C.Copy a snapshot of the database to an Amazon S3 bucket. Create an IAM user. Share the user's keys with the
auditor to grant access to the object in the S3 bucket.
D.Create an encrypted snapshot of the database. Share the snapshot with the auditor. Allow access to the AWS
Key Management Service (AWS KMS) encryption key.
Answer: D
Explanation:
Create an encrypted snapshot of the database. Share the snapshot with the auditor. Allow access to the AWS
Key Management Service (AWS KMS) encryption key.
Which solution resolves this issue with the LEAST operational overhead?
A.Add an additional IPv4 CIDR block to increase the number of IP addresses and create additional subnets in
the VPC. Create new resources in the new subnets by using the new CIDR.
B.Create a second VPC with additional subnets. Use a peering connection to connect the second VPC with the
first VPC Update the routes and create new resources in the subnets of the second VPC.
C.Use AWS Transit Gateway to add a transit gateway and connect a second VPC with the first VPUpdate the
routes of the transit gateway and VPCs. Create new resources in the subnets of the second VPC.
D.Create a second VPC. Create a Site-to-Site VPN connection between the first VPC and the second VPC by
using a VPN-hosted solution on Amazon EC2 and a virtual private gateway. Update the route between VPCs to
the traffic through the VPN. Create new resources in the subnets of the second VPC.
Answer: A
Explanation:
Add an additional IPv4 CIDR block to increase the number of IP addresses and create additional subnets in the
VPC. Create new resources in the new subnets by using the new CIDR.
The company is now planning for a new test cycle and wants to create a new DB instance from the most recent
backup. The company has chosen a MySQL-compatible edition ofAmazon Aurora to host the DB instance.
Which solutions will create the new DB instance? (Choose two.)
Answer: AC
Explanation:
1. A,CA because the snapshot is already stored in AWS. C because you dont need a migration tool going from
MySQL to MySQL. You would use the MySQL utility.
A.Update the Auto Scaling group to use Reserved Instances instead of On-Demand Instances.
B.Update the Auto Scaling group to scale by launching Spot Instances instead of On-Demand Instances.
C.Create an Amazon CloudFront distribution to host the static web contents from an Amazon S3 bucket.
D.Create an AWS Lambda function behind an Amazon API Gateway API to host the static website contents.
Answer: C
Explanation:
.Create an Amazon CloudFront distribution to host the static web contents from an Amazon S3 bucket.
Which solution will meet these requirements with the LEAST operational overhead?
A.Copy the required data to a common account. Create an IAM access role in that account. Grant access by
specifying a permission policy that includes users from the engineering team accounts as trusted entities.
B.Use the Lake Formation permissions Grant command in each account where the data is stored to allow the
required engineering team users to access the data.
C.Use AWS Data Exchange to privately publish the required data to the required engineering team accounts.
D.Use Lake Formation tag-based access control to authorize and grant cross-account permissions for the
required data to the engineering team accounts.
Answer: D
Explanation:
By utilizing Lake Formation's tag-based access control, you can define tags and tag-based policies to grant
selective access to the required data for the engineering team accounts. This approach allows you to control
access at a granular level without the need to copy or move the data to a common account or manage
permissions individually in each account. It provides a centralized and scalable solution for securely sharing
data across accounts with minimal operational overhead.
Answer: A
Explanation:
https://docs.aws.amazon.com/ja_jp/AmazonS3/latest/userguide/transfer-acceleration.html
An employee recently deleted the DB instance, and the application was unavailable for 24 hours as a result. The
company is concerned with the overall reliability of its environment.
What should the solutions architect do to maximize reliability of the application's infrastructure?
A.Delete one EC2 instance and enable termination protection on the other EC2 instance. Update the DB
instance to be Multi-AZ, and enable deletion protection.
B.Update the DB instance to be Multi-AZ, and enable deletion protection. Place the EC2 instances behind an
Application Load Balancer, and run them in an EC2 Auto Scaling group across multiple Availability Zones.
C.Create an additional DB instance along with an Amazon API Gateway and an AWS Lambda function.
Configure the application to invoke the Lambda function through API Gateway. Have the Lambda function write
the data to the two DB instances.
D.Place the EC2 instances in an EC2 Auto Scaling group that has multiple subnets located in multiple
Availability Zones. Use Spot Instances instead of On-Demand Instances. Set up Amazon CloudWatch alarms to
monitor the health of the instances Update the DB instance to be Multi-AZ, and enable deletion protection.
Answer: B
Explanation:
B is correct. HA ensured by DB in Mutli-AZ and EC2 in AG
After an audit from a regulator, the company has 90 days to move the data to the cloud. The company needs to
move the data efficiently and without disruption. The company still needs to be able to access and update the data
during the transfer window.
A.Create an AWS DataSync agent in the corporate data center. Create a data transfer task Start the transfer to
an Amazon S3 bucket.
B.Back up the data to AWS Snowball Edge Storage Optimized devices. Ship the devices to an AWS data center.
Mount a target Amazon S3 bucket on the on-premises file system.
C.Use rsync to copy the data directly from local storage to a designated Amazon S3 bucket over the Direct
Connect connection.
D.Back up the data on tapes. Ship the tapes to an AWS data center. Mount a target Amazon S3 bucket on the
on-premises file system.
Answer: A
Explanation:
By leveraging AWS DataSync in combination with AWS Direct Connect, the company can efficiently and
securely transfer its 700 terabytes of data to an Amazon S3 bucket without disruption. The solution allows
continued access and updates to the data during the transfer window, ensuring business continuity
throughout the migration process.
Which solution will meet these requirements with the LEAST operational overhead?
A.Turn on the S3 Versioning feature for the S3 bucket. Configure S3 Lifecycle to delete the data after 7 years.
Configure multi-factor authentication (MFA) delete for all S3 objects.
B.Turn on S3 Object Lock with governance retention mode for the S3 bucket. Set the retention period to expire
after 7 years. Recopy all existing objects to bring the existing data into compliance.
C.Turn on S3 Object Lock with compliance retention mode for the S3 bucket. Set the retention period to expire
after 7 years. Recopy all existing objects to bring the existing data into compliance.
D.Turn on S3 Object Lock with compliance retention mode for the S3 bucket. Set the retention period to expire
after 7 years. Use S3 Batch Operations to bring the existing data into compliance.
Answer: D
Explanation:
You need AWS Batch to re-apply certain config to files that were already in S3, like encryption
A.Create Amazon Route 53 health checks for each Region. Use an active-active failover configuration.
B.Create an Amazon CloudFront distribution with an origin for each Region. Use CloudFront health checks to
route traffic.
C.Create a transit gateway. Attach the transit gateway to the API Gateway endpoint in each Region. Configure
the transit gateway to route requests.
D.Create an Application Load Balancer in the primary Region. Set the target group to point to the API Gateway
endpoint hostnames in each Region.
Answer: B
Explanation:
This approach leverages the capabilities of CloudFront's intelligent routing and health checks to
automatically distribute traffic across multiple AWS Regions and provide failover capabilities in case of
Regional disruptions or unavailability.
What should a solutions architect do to mitigate any single point of failure in this architecture?
Answer: C
Explanation:
Redundant VPN connections: Instead of relying on a single device in the data center, the Management VPC
should have redundant VPN connections established through multiple customer gateways. This will ensure
high availability and fault tolerance in case one of the VPN connections or customer gateways fails.
Which solution will help the company migrate the database to AWS MOST cost-effectively?
A.Migrate the database to Amazon RDS for Oracle. Replace third-party features with cloud services.
B.Migrate the database to Amazon RDS Custom for Oracle. Customize the database settings to support third-
party features.
C.Migrate the database to an Amazon EC2 Amazon Machine Image (AMI) for Oracle. Customize the database
settings to support third-party features.
D.Migrate the database to Amazon RDS for PostgreSQL by rewriting the application code to remove
dependency on Oracle APEX.
Answer: B
Explanation:
https://aws.amazon.com/about-aws/whats-new/2021/10/amazon-rds-custom-oracle/
https://docs.aws.amazon.com/ja_jp/AmazonRDS/latest/UserGuide/Oracle.Resources.html
A.Create a VPC across two Availability Zones with the application's existing architecture. Host the application
with existing architecture on an Amazon EC2 instance in a private subnet in each Availability Zone with EC2
Auto Scaling groups. Secure the EC2 instance with security groups and network access control lists (network
ACLs).
B.Set up security groups and network access control lists (network ACLs) to control access to the database
layer. Set up a single Amazon RDS database in a private subnet.
C.Create a VPC across two Availability Zones. Refactor the application to host the web tier, application tier, and
database tier. Host each tier on its own private subnet with Auto Scaling groups for the web tier and application
tier.
D.Use a single Amazon RDS database. Allow database access only from the application tier security group.
E.Use Elastic Load Balancers in front of the web tier. Control access by using security groups containing
references to each layer's security groups.
F.Use an Amazon RDS database Multi-AZ cluster deployment in private subnets. Allow database access only
from application tier security groups.
Answer: CEF
Explanation:
Which activities will be managed by the company's operational team? (Choose three.)
A.Management of the Amazon RDS infrastructure layer, operating system, and platforms
B.Creation of an Amazon RDS DB instance and configuring the scheduled maintenance window
C.Configuration of additional software components on Amazon ECS for monitoring, patch management, log
management, and host intrusion detection
D.Installation of patches for all minor and major database versions for Amazon RDS
E.Ensure the physical security of the Amazon RDS infrastructure in the data center
F.Encryption of the data that moves in transit through Direct Connect
Answer: BCF
Explanation:
A.Use AWS App2Container (A2C) to containerize the job. Run the job as an Amazon Elastic Container Service
(Amazon ECS) task on AWS Fargate with 0.5 virtual CPU (vCPU) and 1 GB of memory.
B.Copy the code into an AWS Lambda function that has 1 GB of memory. Create an Amazon EventBridge
scheduled rule to run the code each hour.
C.Use AWS App2Container (A2C) to containerize the job. Install the container in the existing Amazon Machine
Image (AMI). Ensure that the schedule stops the container when the task finishes.
D.Configure the existing schedule to stop the EC2 instance at the completion of the job and restart the EC2
instance when the next job starts.
Answer: B
Explanation:
A.Use AWS Backup to create a backup vault that has a vault lock in governance mode. Create the required
backup plan.
B.Use Amazon Data Lifecycle Manager to create the required automated snapshot policy.
C.Use Amazon S3 File Gateway to create the backup. Configure the appropriate S3 Lifecycle management.
D.Use AWS Backup to create a backup vault that has a vault lock in compliance mode. Create the required
backup plan.
Answer: D
Explanation:
Compliance mode
Which solution will meet these requirements in the MOST operationally efficient way?
A.Use AWS Systems Manager Inventory to generate a map view from the detailed view report.
B.Use AWS Step Functions to collect workload details. Build architecture diagrams of the workloads manually.
C.Use Workload Discovery on AWS to generate architecture diagrams of the workloads.
D.Use AWS X-Ray to view the workload details. Build architecture diagrams with relationships.
Answer: C
Explanation:
Option A: AWS SSM offers "Software inventory": Collect software catalog and configuration for your
instances.Option C: Workload Discovery on AWS: is a tool for maintaining an inventory of the AWS resources
across your accounts and various Regions and mapping relationships between them, and displaying them in a
web UI.
AWS Workload Discovery - create diagram, map and visualise AWS resources across AWS accounts and
Regions
A.Use AWS Budgets to create a budget. Set the budget amount under the Cost and Usage Reports section of
the required AWS accounts.
B.Use AWS Budgets to create a budget. Set the budget amount under the Billing dashboards of the required
AWS accounts.
C.Create an IAM user for AWS Budgets to run budget actions with the required permissions.
D.Create an IAM role for AWS Budgets to run budget actions with the required permissions.
E.Add an alert to notify the company when each account meets its budget threshold. Add a budget action that
selects the IAM identity created with the appropriate config rule to prevent provisioning of additional
resources.
F.Add an alert to notify the company when each account meets its budget threshold. Add a budget action that
selects the IAM identity created with the appropriate service control policy (SCP) to prevent provisioning of
additional resources.
Answer: BDF
Explanation:
https://docs.aws.amazon.com/ja_jp/awsaccountbilling/latest/aboutv2/view-billing-dashboard.html
A.Create a disaster recovery (DR) plan that has a similar number of EC2 instances in the second Region.
Configure data replication.
B.Create point-in-time Amazon Elastic Block Store (Amazon EBS) snapshots of the EC2 instances. Copy the
snapshots to the second Region periodically.
C.Create a backup plan by using AWS Backup. Configure cross-Region backup to the second Region for the
EC2 instances.
D.Deploy a similar number of EC2 instances in the second Region. Use AWS DataSync to transfer the data from
the source Region to the second Region.
Answer: C
Explanation:
Using AWS Backup, you can create backup plans that automate the backup process for your EC2 instances.
By configuring cross-Region backup, you can ensure that backups are replicated to the second Region,
providing a disaster recovery capability. This solution is cost-effective as it leverages AWS Backup's built-in
features and eliminates the need for manual snapshot management or deploying and managing additional
EC2 instances in the second Region.
A.Use AWS DataSync to transfer the data. Create an AWS Lambda function for IdP authentication.
B.Use Amazon AppFlow flows to transfer the data. Create an Amazon Elastic Container Service (Amazon ECS)
task for IdP authentication.
C.Use AWS Transfer Family to transfer the data. Create an AWS Lambda function for IdP authentication.
D.Use AWS Storage Gateway to transfer the data. Create an Amazon Cognito identity pool for IdP
authentication.
Answer: C
Explanation:
Use AWS Transfer Family to transfer the data. Create an AWS Lambda function for IdP authentication.
Question: 458 CertyIQ
A solutions architect is designing a RESTAPI in Amazon API Gateway for a cash payback service. The application
requires 1 GB of memory and 2 GB of storage for its computation resources. The application will require that the
data is in a relational format.
Which additional combination ofAWS services will meet these requirements with the LEAST administrative effort?
(Choose two.)
A.Amazon EC2
B.AWS Lambda
C.Amazon RDS
D.Amazon DynamoDB
E.Amazon Elastic Kubernetes Services (Amazon EKS)
Answer: BC
Explanation:
The application will require that the data is in a relational format" so DynamoDB is out. RDS is the choice.
Lambda is severless.
An accounting team needs to determine spending on Amazon EC2 consumption. The accounting team must
determine which departments are responsible for the costs regardless ofAWS account. The accounting team has
access to AWS Cost Explorer for all AWS accounts within the organization and needs to access all reports from
Cost Explorer.
Which solution meets these requirements in the MOST operationally efficient way?
A.From the Organizations management account billing console, activate a user-defined cost allocation tag
named department. Create one cost report in Cost Explorer grouping by tag name, and filter by EC2.
B.From the Organizations management account billing console, activate an AWS-defined cost allocation tag
named department. Create one cost report in Cost Explorer grouping by tag name, and filter by EC2.
C.From the Organizations member account billing console, activate a user-defined cost allocation tag named
department. Create one cost report in Cost Explorer grouping by the tag name, and filter by EC2.
D.From the Organizations member account billing console, activate an AWS-defined cost allocation tag named
department. Create one cost report in Cost Explorer grouping by tag name, and filter by EC2.
Answer: A
Explanation:
From the Organizations management account billing console, activate a user-defined cost allocation tag
named department. Create one cost report in Cost Explorer grouping by tag name, and filter by EC2.
By activating a user-defined cost allocation tag named "department" and creating a cost report in Cost
Explorer that groups by the tag name and filters by EC2, the accounting team will be able to track and
attribute costs to specific departments across all AWS accounts within the organization. This approach allows
for consistent cost allocation and reporting regardless of the AWS account structure.
https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/custom-tags.html
A.Create AWS Lambda functions to transfer the data securely from Salesforce to Amazon S3.
B.Create an AWS Step Functions workflow. Define the task to transfer the data securely from Salesforce to
Amazon S3.
C.Create Amazon AppFlow flows to transfer the data securely from Salesforce to Amazon S3.
D.Create a custom connector for Salesforce to transfer the data securely from Salesforce to Amazon S3.
Answer: C
Explanation:
Amazon AppFlow is a fully managed integration service that allows you to securely transfer data between
different SaaS applications and AWS services. It provides built-in encryption options and supports encryption
in transit using SSL/TLS protocols. With AppFlow, you can configure the data transfer flow from Salesforce to
Amazon S3, ensuring data encryption at rest by utilizing AWS KMS CMKs.
A.Use AWS Global Accelerator to create an accelerator. Create an Application Load Balancer (ALB) behind an
accelerator endpoint that uses Global Accelerator integration and listening on the TCP and UDP ports. Update
the Auto Scaling group to register instances on the ALB.
B.Use AWS Global Accelerator to create an accelerator. Create a Network Load Balancer (NLB) behind an
accelerator endpoint that uses Global Accelerator integration and listening on the TCP and UDP ports. Update
the Auto Scaling group to register instances on the NLB.
C.Create an Amazon CloudFront content delivery network (CDN) endpoint. Create a Network Load Balancer
(NLB) behind the endpoint and listening on the TCP and UDP ports. Update the Auto Scaling group to register
instances on the NLB. Update CloudFront to use the NLB as the origin.
D.Create an Amazon CloudFront content delivery network (CDN) endpoint. Create an Application Load Balancer
(ALB) behind the endpoint and listening on the TCP and UDP ports. Update the Auto Scaling group to register
instances on the ALB. Update CloudFront to use the ALB as the origin.
Answer: B
Explanation:
NLB + Accelerator
AWS Global Accelerator is a better solution for the mobile gaming app than CloudFront
Question: 462 CertyIQ
A company has an application that processes customer orders. The company hosts the application on an Amazon
EC2 instance that saves the orders to an Amazon Aurora database. Occasionally when traffic is high the workload
does not process orders fast enough.
What should a solutions architect do to write the orders reliably to the database as quickly as possible?
A.Increase the instance size of the EC2 instance when traffic is high. Write orders to Amazon Simple
Notification Service (Amazon SNS). Subscribe the database endpoint to the SNS topic.
B.Write orders to an Amazon Simple Queue Service (Amazon SQS) queue. Use EC2 instances in an Auto Scaling
group behind an Application Load Balancer to read from the SQS queue and process orders into the database.
C.Write orders to Amazon Simple Notification Service (Amazon SNS). Subscribe the database endpoint to the
SNS topic. Use EC2 instances in an Auto Scaling group behind an Application Load Balancer to read from the
SNS topic.
D.Write orders to an Amazon Simple Queue Service (Amazon SQS) queue when the EC2 instance reaches CPU
threshold limits. Use scheduled scaling of EC2 instances in an Auto Scaling group behind an Application Load
Balancer to read from the SQS queue and process orders into the database.
Answer: B
Explanation:
By decoupling the write operation from the processing operation using SQS, you ensure that the orders are
reliably stored in the queue, regardless of the processing capacity of the EC2 instances. This allows the
processing to be performed at a scalable rate based on the available EC2 instances, improving the overall
reliability and speed of order processing.
Answer: C
Explanation:
AWS Lambda charges you based on the number of invocations and the execution time of your function. Since
the data processing job is relatively small (2 MB of data), Lambda is a cost-effective choice. You only pay for
the actual usage without the need to provision and maintain infrastructure.
Question: 464 CertyIQ
A company hosts an online shopping application that stores all orders in an Amazon RDS for PostgreSQL Single-
AZ DB instance. Management wants to eliminate single points of failure and has asked a solutions architect to
recommend an approach to minimize database downtime without requiring any changes to the application code.
A.Convert the existing database instance to a Multi-AZ deployment by modifying the database instance and
specifying the Multi-AZ option.
B.Create a new RDS Multi-AZ deployment. Take a snapshot of the current RDS instance and restore the new
Multi-AZ deployment with the snapshot.
C.Create a read-only replica of the PostgreSQL database in another Availability Zone. Use Amazon Route 53
weighted record sets to distribute requests across the databases.
D.Place the RDS for PostgreSQL database in an Amazon EC2 Auto Scaling group with a minimum group size of
two. Use Amazon Route 53 weighted record sets to distribute requests across instances.
Answer: A
Explanation:
Compared to other solutions that involve creating new instances, restoring snapshots, or setting up
replication manually, converting to a Multi-AZ deployment is a simpler and more streamlined approach with
lower overhead.Overall, option A offers a cost-effective and efficient way to minimize database downtime
without requiring significant changes or additional complexities.
A.Use General Purpose SSD (gp3) EBS volumes with Amazon Elastic Block Store (Amazon EBS) Multi-Attach
B.Use Throughput Optimized HDD (st1) EBS volumes with Amazon Elastic Block Store (Amazon EBS) Multi-
Attach
C.Use Provisioned IOPS SSD (io2) EBS volumes with Amazon Elastic Block Store (Amazon EBS) Multi-Attach
D.Use General Purpose SSD (gp2) EBS volumes with Amazon Elastic Block Store (Amazon EBS) Multi-Attach
Answer: C
Explanation:
C is right Amazon EBS Multi-Attach enables you to attach a single Provisioned IOPS SSD (io1 or io2) volume to
multiple instances that are in the same Availability Zone.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volumes-multi.htmlnothing about gp
A.Configure the application to use Multi-AZ EC2 Auto Scaling and create an Application Load Balancer
B.Configure the application to take snapshots of the EC2 instances and send them to a different AWS Region
C.Configure the application to use Amazon Route 53 latency-based routing to feed requests to the application
D.Configure Amazon Route 53 rules to handle incoming requests and create a Multi-AZ Application Load
Balancer
Answer: A
Explanation:
By combining Multi-AZ EC2 Auto Scaling and an Application Load Balancer, you achieve high availability for
the EC2 instances hosting your stateless two-tier application.
A.Turn on discount sharing from the Billing Preferences section of the account console in the member account
that purchased the Compute Savings Plan.
B.Turn on discount sharing from the Billing Preferences section of the account console in the company's
Organizations management account.
C.Migrate additional compute workloads from another AWS account to the account that has the Compute
Savings Plan.
D.Sell the excess Savings Plan commitment in the Reserved Instance Marketplace.
Answer: B
Explanation:
To summarize, option C (Migrate additional compute workloads from another AWS account to the account
that has the Compute Savings Plan) is a valid solution to address the underutilization of the Compute Savings
Plan. However, it involves workload migration and may require careful planning and coordination. Consider the
feasibility and impact of migrating workloads before implementing this solution.
A.Design a WebSocket API by using Amazon API Gateway. Host the application in Amazon Elastic Container
Service (Amazon ECS) in a private subnet. Create a private VPC link for API Gateway to access Amazon ECS.
B.Design a REST API by using Amazon API Gateway. Host the application in Amazon Elastic Container Service
(Amazon ECS) in a private subnet. Create a private VPC link for API Gateway to access Amazon ECS.
C.Design a WebSocket API by using Amazon API Gateway. Host the application in Amazon Elastic Container
Service (Amazon ECS) in a private subnet. Create a security group for API Gateway to access Amazon ECS.
D.Design a REST API by using Amazon API Gateway. Host the application in Amazon Elastic Container Service
(Amazon ECS) in a private subnet. Create a security group for API Gateway to access Amazon ECS.
Answer: B
Explanation:
REST API with Amazon API Gateway: REST APIs are the appropriate choice for providing the frontend of the
microservices application. Amazon API Gateway allows you to design, deploy, and manage REST APIs at
scale.Amazon ECS in a Private Subnet: Hosting the application in Amazon ECS in a private subnet ensures that
the containers are securely deployed within the VPC and not directly exposed to the public internet.Private
VPC Link: To enable the REST API in API Gateway to access the backend services hosted in Amazon ECS, you
can create a private VPC link. This establishes a private network connection between the API Gateway and
ECS containers, allowing secure communication without traversing the public internet.
The company cannot predict or control the access pattern. The company wants to reduce its S3 costs.
Answer: C
Explanation:
A.Create a NAT gateway and make it the destination of the subnet's route table
B.Create an internet gateway and make it the destination of the subnet's route table
C.Create a virtual private gateway and make it the destination of the subnet's route table
D.Create an egress-only internet gateway and make it the destination of the subnet's route table
Answer: D
Explanation:
An egress-only internet gateway (EIGW) is specifically designed for IPv6-only VPCs and provides outbound
IPv6 internet access while blocking inbound IPv6 traffic. It satisfies the requirement of preventing external
services from initiating connections to the EC2 instances while allowing the instances to initiate outbound
communications.
Answer: C
Explanation:
Gateway VPC Endpoint: A gateway VPC endpoint enables private connectivity between a VPC and Amazon S3.
It allows direct access to Amazon S3 without the need for internet gateways, NAT devices, VPN connections,
or AWS Direct Connect.Minimize Internet Traffic: By creating a gateway VPC endpoint for Amazon S3 and
associating it with all route tables in the VPC, the traffic between the VPC and Amazon S3 will be kept within
the AWS network. This helps in minimizing data transfer costs and prevents the need for traffic to traverse
the internet.Cost-Effective: With a gateway VPC endpoint, the data transfer between the application running
in the VPC and the S3 bucket stays within the AWS network, reducing the need for data transfer across the
internet. This can result in cost savings, especially when dealing with large amounts of data.
A.Configure Amazon DynamoDB Accelerator (DAX) for the new messages table. Update the code to use the
DAX endpoint.
B.Add DynamoDB read replicas to handle the increased read load. Update the application to point to the read
endpoint for the read replicas.
C.Double the number of read capacity units for the new messages table in DynamoDB. Continue to use the
existing DynamoDB endpoint.
D.Add an Amazon ElastiCache for Redis cache to the application stack. Update the application to point to the
Redis cache endpoint instead of DynamoDB.
Answer: A
Explanation:
Amazon DynamoDB Accelerator (DAX): DAX is an in-memory cache for DynamoDB that provides low-latency
access to frequently accessed data. By configuring DAX for the new messages table, read requests for the
table will be served from the DAX cache, significantly reducing the latency.Minimal Application Changes: With
DAX, the application code can be updated to use the DAX endpoint instead of the standard DynamoDB
endpoint. This change is relatively minimal and does not require extensive modifications to the application's
data access logic.Low Latency: DAX caches frequently accessed data in memory, allowing subsequent read
requests for the same data to be served with minimal latency. This ensures that new messages can be read by
users with minimal delay.
Answer: A
Explanation:
Amazon CloudFront: CloudFront is a content delivery network (CDN) service that caches content at edge
locations worldwide. By creating a CloudFront distribution, static content from the website can be cached at
edge locations, reducing the load on the EC2 instances and improving the overall performance. Caching Static
Files: Since the website serves static content, caching these files at CloudFront edge locations can
significantly reduce the number of requests forwarded to the EC2 instances. This helps to lower the overall
cost by offloading traffic from the instances and reducing the data transfer costs.
Which solution will meet these requirements with the LEAST amount of administrative effort?
A.Use VPC peering to manage VPC communication in a single Region. Use VPC peering across Regions to
manage VPC communications.
B.Use AWS Direct Connect gateways across all Regions to connect VPCs across regions and manage VPC
communications.
C.Use AWS Transit Gateway to manage VPC communication in a single Region and Transit Gateway peering
across Regions to manage VPC communications.
D.Use AWS PrivateLink across all Regions to connect VPCs across Regions and manage VPC communications
Answer: C
Explanation:
AWS Transit Gateway: Transit Gateway is a highly scalable service that simplifies network connectivity
between VPCs and on-premises networks. By using a Transit Gateway in a single Region, you can centralize
VPC communication management and reduce administrative effort.Transit Gateway Peering: Transit Gateway
supports peering connections across AWS Regions, allowing you to establish connectivity between VPCs in
different Regions without the need for complex VPC peering configurations. This simplifies the management
of VPC communications across Regions.
A solutions architect wants to use AWS Backup to manage the replication to another Region.
Answer: C
Explanation:
EFS Replication can replicate your file system data to another Region or within the same Region without
requiring additional infrastructure or a custom process. Amazon EFS Replication automatically and
transparently replicates your data to a second file system in a Region or AZ of your choice. You can use the
Amazon EFS console, AWS CLI, and APIs to activate replication on an existing file system. EFS Replication is
continual and provides a recovery point objective (RPO) and a recovery time objective (RTO) of minutes,
helping you meet your compliance and business continuity goals.
Which additional action is the MOST secure way to grant permissions to the new users?
Answer: C
Explanation:
Option B is incorrect because IAM roles are not directly attached to IAM groups.
Which statement should a solutions architect add to the policy to correct bucket access?
A.
B.
C.
D.
Answer: D
Explanation:
D for sure
Which solution will meet these requirements in the MOST secure way?
A.Upload all files to an Amazon S3 bucket that is configured for static website hosting. Grant read-only IAM
permissions to any AWS principals that access the S3 bucket until the designated date.
B.Create a new Amazon S3 bucket with S3 Versioning enabled. Use S3 Object Lock with a retention period in
accordance with the designated date. Configure the S3 bucket for static website hosting. Set an S3 bucket
policy to allow read-only access to the objects.
C.Create a new Amazon S3 bucket with S3 Versioning enabled. Configure an event trigger to run an AWS
Lambda function in case of object modification or deletion. Configure the Lambda function to replace the
objects with the original versions from a private S3 bucket.
D.Upload all files to an Amazon S3 bucket that is configured for static website hosting. Select the folder that
contains the files. Use S3 Object Lock with a retention period in accordance with the designated date. Grant
read-only IAM permissions to any AWS principals that access the S3 bucket.
Answer: B
Explanation:
Option A allows the files to be modified or deleted by anyone with read-only IAM permissions. Option C allows
the files to be modified or deleted by anyone who can trigger the AWS Lambda function.Option D allows the
files to be modified or deleted by anyone with read-only IAM permissions to the S3 bucket
A.Use AWS Systems Manager to replicate and provision the prototype infrastructure in two Availability Zones
B.Define the infrastructure as a template by using the prototype infrastructure as a guide. Deploy the
infrastructure with AWS CloudFormation.
C.Use AWS Config to record the inventory of resources that are used in the prototype infrastructure. Use AWS
Config to deploy the prototype infrastructure into two Availability Zones.
D.Use AWS Elastic Beanstalk and configure it to use an automated reference to the prototype infrastructure to
automatically deploy new environments in two Availability Zones.
Answer: B
Explanation:
Define the infrastructure as a template by using the prototype infrastructure as a guide. Deploy the
infrastructure with AWS CloudFormation.
Which capability should the solutions architect use to meet the compliance requirements?
Answer: B
Explanation:
A VPC endpoint enables you to privately access AWS services without requiring internet gateways, NAT
gateways, VPN connections, or AWS Direct Connect connections. It allows you to connect your VPC directly to
supported AWS services, such as Amazon S3, over a private connection within the AWS network.By creating a
VPC endpoint for Amazon S3, the traffic between your EC2 instances and S3 will stay within the AWS
network and won't traverse the public internet. This provides a more secure and compliant solution, as the
data transfer remains within the private network boundaries.
Answer: B
Explanation:
In the write-through caching strategy, when a customer adds or updates an item in the database, the
application first writes the data to the database and then updates the cache with the same data. This ensures
that the cache is always synchronized with the database, as every write operation triggers an update to the
cache.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use the s3 sync command in the AWS CLI to move the data directly to an S3 bucket
B.Use AWS DataSync to migrate the data from the on-premises location to an S3 bucket
C.Use AWS Snowball to move the data to an S3 bucket
D.Set up an IPsec VPN from the on-premises location to AWS. Use the s3 cp command in the AWS CLI to move
the data directly to an S3 bucket
Answer: B
Explanation:
AWS DataSync is a fully managed data transfer service that simplifies and automates the process of moving
data between on-premises storage and Amazon S3. It provides secure and efficient data transfer with built-in
encryption, ensuring that the data is encrypted in transit.By using AWS DataSync, the company can easily
migrate the 100 GB of historical data from their on-premises location to an S3 bucket. DataSync will handle
the encryption of data in transit and ensure secure transfer.
A.Create an AWS Lambda function based on the container image of the job. Configure Amazon EventBridge to
invoke the function every 10 minutes.
B.Use AWS Batch to create a job that uses AWS Fargate resources. Configure the job scheduling to run every
10 minutes.
C.Use Amazon Elastic Container Service (Amazon ECS) on AWS Fargate to run the job. Create a scheduled task
based on the container image of the job to run every 10 minutes.
D.Use Amazon Elastic Container Service (Amazon ECS) on AWS Fargate to run the job. Create a standalone task
based on the container image of the job. Use Windows task scheduler to run the job every
10 minutes.
Answer: C
Explanation:
By using Amazon ECS on AWS Fargate, you can run the job in a containerized environment while benefiting
from the serverless nature of Fargate, where you only pay for the resources used during the job's execution.
Creating a scheduled task based on the container image of the job ensures that it runs every 10 minutes,
meeting the required schedule. This solution provides flexibility, scalability, and cost-effectiveness.
Which combination of actions should a solutions architect recommend to meet these requirements? (Choose two.)
A.Create a new organization in AWS Organizations with all features turned on. Create the new AWS accounts in
the organization.
B.Set up an Amazon Cognito identity pool. Configure AWS IAM Identity Center (AWS Single Sign-On) to accept
Amazon Cognito authentication.
C.Configure a service control policy (SCP) to manage the AWS accounts. Add AWS IAM Identity Center (AWS
Single Sign-On) to AWS Directory Service.
D.Create a new organization in AWS Organizations. Configure the organization's authentication mechanism to
use AWS Directory Service directly.
E.Set up AWS IAM Identity Center (AWS Single Sign-On) in the organization. Configure IAM Identity Center, and
integrate it with the company's corporate directory service.
Answer: AE
Explanation:
A. By creating a new organization in AWS Organizations, you can establish a consolidated multi-account
architecture. This allows you to create and manage multiple AWS accounts for different business units under
a single organization.E. Setting up AWS IAM Identity Center (AWS Single Sign-On) within the organization
enables you to integrate it with the company's corporate directory service. This integration allows for
centralized authentication, where users can sign in using their corporate credentials and access the AWS
accounts within the organization.Together, these actions create a centralized, multi-account architecture that
leverages AWS Organizations for account management and AWS IAM Identity Center (AWS Single Sign-On)
for authentication and access control.
A.Store the video archives in Amazon S3 Glacier and use Expedited retrievals.
B.Store the video archives in Amazon S3 Glacier and use Standard retrievals.
C.Store the video archives in Amazon S3 Standard-Infrequent Access (S3 Standard-IA).
D.Store the video archives in Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA).
Answer: A
Explanation:
By choosing Expedited retrievals in Amazon S3 Glacier, you can reduce the retrieval time to minutes, making
it suitable for scenarios where quick access is required. Expedited retrievals come with a higher cost per
retrieval compared to standard retrievals but provide faster access to your archived data.
Expedited retrieval typically takes 1-5 minutes to retrieve data, making it suitable for the company's
requirement of having the files available in a maximum of five minutes.
A.Use Amazon S3 to host static content. Use Amazon Elastic Container Service (Amazon ECS) with AWS
Fargate for compute power. Use a managed Amazon RDS cluster for the database.
B.Use Amazon CloudFront to host static content. Use Amazon Elastic Container Service (Amazon ECS) with
Amazon EC2 for compute power. Use a managed Amazon RDS cluster for the database.
C.Use Amazon S3 to host static content. Use Amazon Elastic Kubernetes Service (Amazon EKS) with AWS
Fargate for compute power. Use a managed Amazon RDS cluster for the database.
D.Use Amazon EC2 Reserved Instances to host static content. Use Amazon Elastic Kubernetes Service (Amazon
EKS) with Amazon EC2 for compute power. Use a managed Amazon RDS cluster for the database.
Answer: A
Explanation:
Amazon S3 is a highly scalable and cost-effective storage service that can be used to host static website
content. It provides durability, high availability, and low latency access to the static files.Amazon ECS with
AWS Fargate eliminates the need to manage the underlying infrastructure. It allows you to run containerized
applications without provisioning or managing EC2 instances. This reduces operational overhead and provides
scalability.By using a managed Amazon RDS cluster for the database, you can offload the management tasks
such as backups, patching, and monitoring to AWS. This reduces the operational burden and ensures high
availability and durability of the database.
Answer: C
Explanation:
Amazon EFS is a fully managed file system service that provides scalable, shared storage for Amazon EC2
instances. It supports the Network File System version 4 (NFSv4) protocol, which is a native protocol for
Linux-based systems. EFS is designed to be highly available, durable, and scalable.
A.Add all finance team users to an IAM group. Attach an AWS managed policy named Billing to the group.
B.Attach an identity-based policy to deny access to the billing information to all users, including the root user.
C.Create a service control policy (SCP) to deny access to the billing information. Attach the SCP to the root
organizational unit (OU).
D.Convert from the Organizations all features feature set to the Organizations consolidated billing feature set.
Answer: C
Explanation:
Service Control Policies (SCP): SCPs are an integral part of AWS Organizations and allow you to set fine-
grained permissions on the organizational units (OUs) within your AWS Organization. SCPs provide central
control over the maximum permissions that can be granted to member accounts, including the root
user.Denying Access to Billing Information: By creating an SCP and attaching it to the root OU, you can
explicitly deny access to billing information for all accounts within the organization. SCPs can be used to
restrict access to various AWS services and actions, including billing-related services.Granular Control: SCPs
enable you to define specific permissions and restrictions at the organizational unit level. By denying access
to billing information at the root OU, you can ensure that no member accounts, including root users, have
access to the billing information.
A solutions architect needs to retain messages that are not delivered and analyze the messages for up to 14 days.
Which solution will meet these requirements with the LEAST development effort?
A.Configure an Amazon SNS dead letter queue that has an Amazon Kinesis Data Stream target with a retention
period of 14 days.
B.Add an Amazon Simple Queue Service (Amazon SQS) queue with a retention period of 14 days between the
application and Amazon SNS.
C.Configure an Amazon SNS dead letter queue that has an Amazon Simple Queue Service (Amazon SQS) target
with a retention period of 14 days.
D.Configure an Amazon SNS dead letter queue that has an Amazon DynamoDB target with a TTL attribute set
for a retention period of 14 days.
Answer: C
Explanation:
The message retention period in Amazon SQS can be set between 1 minute and 14 days (the default is 4 days).
Therefore, you can configure your SQS DLQ to retain undelivered SNS messages for 14 days. This will enable
you to analyze undelivered messages with the least development effort.
A.Use an Amazon EMR cluster. Create an Apache Hive job to back up the data to Amazon S3.
B.Export the data directly from DynamoDB to Amazon S3 with continuous backups. Turn on point-in-time
recovery for the table.
C.Configure Amazon DynamoDB Streams. Create an AWS Lambda function to consume the stream and export
the data to an Amazon S3 bucket.
D.Create an AWS Lambda function to export the data from the database tables to Amazon S3 on a regular
basis. Turn on point-in-time recovery for the table.
Answer: B
Explanation:
Continuous Backups: DynamoDB provides a feature called continuous backups, which automatically backs up
your table data. Enabling continuous backups ensures that your table data is continuously backed up without
the need for additional coding or manual interventions.Export to Amazon S3: With continuous backups
enabled, DynamoDB can directly export the backups to an Amazon S3 bucket. This eliminates the need for
custom coding to export the data.Minimal Coding: Option B requires the least amount of coding effort as
continuous backups and the export to Amazon S3 functionality are built-in features of DynamoDB.No Impact
on Availability and RCUs: Enabling continuous backups and exporting data to Amazon S3 does not affect the
availability of your application or the read capacity units (RCUs) defined for the table. These operations
happen in the background and do not impact the table's performance or consume additional RCUs.
A.Use AWS Lambda event source mapping. Set Amazon Simple Queue Service (Amazon SQS) standard queues
as the event source. Use AWS Key Management Service (SSE-KMS) for encryption. Add the kms:Decrypt
permission for the Lambda execution role.
B.Use AWS Lambda event source mapping. Use Amazon Simple Queue Service (Amazon SQS) FIFO queues as
the event source. Use SQS managed encryption keys (SSE-SQS) for encryption. Add the encryption key
invocation permission for the Lambda function.
C.Use the AWS Lambda event source mapping. Set Amazon Simple Queue Service (Amazon SQS) FIFO queues
as the event source. Use AWS KMS keys (SSE-KMS). Add the kms:Decrypt permission for the Lambda
execution role.
D.Use the AWS Lambda event source mapping. Set Amazon Simple Queue Service (Amazon SQS) standard
queues as the event source. Use AWS KMS keys (SSE-KMS) for encryption. Add the encryption key invocation
permission for the Lambda function.
Answer: A
Explanation:
SQS FIFO is slightly more expensive than standard queuehttps://calculator.aws/#/addService/SQSI would still
go with the standard because of the keyword "at least once" because FIFO process "exactly once". That
leaves us with A and D, I believe that lambda function only needs to decrypt so I would choose A
Which solution will meet these requirements with the LEAST development effort?
A.Develop AWS Systems Manager templates that use an approved EC2 creation process. Use the approved
Systems Manager templates to provision EC2 instances.
B.Use AWS Organizations to organize the accounts into organizational units (OUs). Define and attach a service
control policy (SCP) to control the usage of EC2 instance types.
C.Configure an Amazon EventBridge rule that invokes an AWS Lambda function when an EC2 instance is
created. Stop disallowed EC2 instance types.
D.Set up AWS Service Catalog products for the staff to create the allowed EC2 instance types. Ensure that
staff can deploy EC2 instances only by using the Service Catalog products.
Answer: B
Explanation:
AWS Organizations: AWS Organizations is a service that helps you centrally manage multiple AWS accounts.
It enables you to group accounts into organizational units (OUs) and apply policies across those
accounts.Service Control Policies (SCPs): SCPs in AWS Organizations allow you to define fine-grained
permissions and restrictions at the account or OU level. By attaching an SCP to the development accounts,
you can control the creation and usage of EC2 instance types.Least Development Effort: Option B requires
minimal development effort as it leverages the built-in features of AWS Organizations and SCPs. You can
define the SCP to restrict the use of oversized EC2 instance types and apply it to the appropriate OUs or
accounts.
The company needs to create written sentiment analysis reports from the customer service call recordings. The
customer service call recording text must be translated into English.
Answer: DEF
Explanation:
Amazon Transcribe will convert the audio recordings into text, Amazon Translate will translate the text into
English, and Amazon Comprehend will perform sentiment analysis on the translated text to generate
sentiment analysis reports.
The administrator is using an IAM role that has the following IAM policy attached:
What is the cause of the unsuccessful request?
Answer: D
Explanation:
The request to terminate the EC2 instance does not originate from the CIDR blocks 192.0.2.0/24 or
203.0.113.0/24.
A.Configure AWS Audit Manager on the account. Select the Payment Card Industry Data Security Standards
(PCI DSS) for auditing.
B.Configure Amazon S3 Inventory on the S3 bucket Configure Amazon Athena to query the inventory.
C.Configure Amazon Macie to run a data discovery job that uses managed identifiers for the required data
types.
D.Use Amazon S3 Select to run a report across the S3 bucket.
Answer: C
Explanation:
Amazon Macie is a service that helps discover, classify, and protect sensitive data stored in AWS. It uses
machine learning algorithms and managed identifiers to detect various types of sensitive information,
including personally identifiable information (PII) and financial information. By configuring Amazon Macie to
run a data discovery job with the appropriate managed identifiers for the required data types (such as
passport numbers and credit card numbers), the company can identify and classify any sensitive data present
in the S3 bucket.
Which combination of actions should a solutions architect take to meet these requirements? (Choose two.)
Answer: BD
Explanation:
By combining the deployment of an AWS Storage Gateway file gateway and an AWS Storage Gateway
volume gateway, the company can address both its block storage and NFS storage needs, while leveraging
local caching capabilities for improved performance.
A.Provision a dedicated EC2 NAT instance in the public subnet. Configure the route table for the private subnet
to use the elastic network interface of this instance as the destination for all S3 traffic.
B.Provision a dedicated EC2 NAT instance in the private subnet. Configure the route table for the public subnet
to use the elastic network interface of this instance as the destination for all S3 traffic.
C.Provision a VPC gateway endpoint. Configure the route table for the private subnet to use the gateway
endpoint as the route for all S3 traffic.
D.Provision a second NAT gateway. Configure the route table for the private subnet to use this NAT gateway as
the destination for all S3 traffic.
Answer: C
Explanation:
A VPC gateway endpoint allows you to privately access Amazon S3 from within your VPC without using a NAT
gateway or NAT instance. By provisioning a VPC gateway endpoint for S3, the service in the private subnet
can directly communicate with S3 without incurring data transfer costs for traffic going through a NAT
gateway.
The company wants to reduce costs. The company has identified the S3 bucket as a large expense.
Which solution will reduce the S3 costs with the LEAST operational overhead?
A.Use S3 Lifecycle to delete expired object versions and retain the two most recent versions.
B.Use an AWS Lambda function to check for older versions and delete all but the two most recent versions.
C.Use S3 Batch Operations to delete noncurrent object versions and retain only the two most recent versions.
D.Deactivate versioning on the S3 bucket and retain the two most recent versions.
Answer: A
Explanation:
S3 Lifecycle policies allow you to define rules that automatically transition or expire objects based on their
age or other criteria. By configuring an S3 Lifecycle policy to delete expired object versions and retain only
the two most recent versions, you can effectively manage the storage costs while maintaining the desired
retention policy. This solution is highly automated and requires minimal operational overhead as the lifecycle
management is handled by S3 itself.
Answer: D
Explanation:
1. D For Dedicated Connections, 1 Gbps, 10 Gbps, and 100 Gbps ports are available. For Hosted Connections,
connection speeds of 50 Mbps, 100 Mbps, 200 Mbps, 300 Mbps, 400 Mbps, 500 Mbps, 1 Gbps, 2 Gbps, 5 Gbps
and 10 Gbps may be ordered from approved AWS Direct Connect Partners. See AWS Direct Connect Partners
for more information.
2. A hosted connection is a lower-cost option that is offered by AWS Direct Connect Partners
A.Deploy AWS DataSync agents on premises. Schedule DataSync tasks to transfer the data to the FSx for
Windows File Server file system.
B.Copy the shares on each file server into Amazon S3 buckets by using the AWS CLI. Schedule AWS DataSync
tasks to transfer the data to the FSx for Windows File Server file system.
C.Remove the drives from each file server. Ship the drives to AWS for import into Amazon S3. Schedule AWS
DataSync tasks to transfer the data to the FSx for Windows File Server file system.
D.Order an AWS Snowcone device. Connect the device to the on-premises network. Launch AWS DataSync
agents on the device. Schedule DataSync tasks to transfer the data to the FSx for Windows File Server file
system.
E.Order an AWS Snowball Edge Storage Optimized device. Connect the device to the on-premises network.
Copy data to the device by using the AWS CLI. Ship the device back to AWS for import into Amazon S3.
Schedule AWS DataSync tasks to transfer the data to the FSx for Windows File Server file system.
Answer: AD
Explanation:
A This option involves deploying DataSync agents on your on-premises file servers and using DataSync to
transfer the data directly to the FSx for Windows File Server. DataSync ensures that file permissions are
preserved during the migration process.DThis option involves using an AWS Snowcone device, a portable data
transfer device. You would connect the Snowcone device to your on-premises network, launch DataSync
agents on the device, and schedule DataSync tasks to transfer the data to FSx for Windows File Server.
DataSync handles the migration process while preserving file permissions.
Which solution will meet these requirements with the MOST operational efficiency?
A.Use Amazon Kinesis Data Streams to ingest data. Use AWS Lambda to analyze the data in real time.
B.Use AWS Glue to ingest data. Use Amazon Kinesis Data Analytics to analyze the data in real time.
C.Use Amazon Kinesis Data Firehose to ingest data. Use Amazon Kinesis Data Analytics to analyze the data in
real time.
D.Use Amazon API Gateway to ingest data. Use AWS Lambda to analyze the data in real time.
Answer: C
Explanation:
By leveraging the combination of Amazon Kinesis Data Firehose and Amazon Kinesis Data Analytics, you can
efficiently ingest and analyze the payment data in real time without the need for manual processing or
additional infrastructure management. This solution provides a streamlined and scalable approach to handle
continuous data ingestion and analysis requirements.
Which combination of actions should a solutions architect take to improve the performance and resilience of the
website? (Choose two.)
A.Move the website images into an Amazon S3 bucket that is mounted on every EC2 instance
B.Share the website images by using an NFS share from the primary EC2 instance. Mount this share on the
other EC2 instances.
C.Move the website images onto an Amazon Elastic File System (Amazon EFS) file system that is mounted on
every EC2 instance.
D.Create an Amazon Machine Image (AMI) from the existing EC2 instance. Use the AMI to provision new
instances behind an Application Load Balancer as part of an Auto Scaling group. Configure the Auto Scaling
group to maintain a minimum of two instances. Configure an accelerator in AWS Global Accelerator for the
website
E.Create an Amazon Machine Image (AMI) from the existing EC2 instance. Use the AMI to provision new
instances behind an Application Load Balancer as part of an Auto Scaling group. Configure the Auto Scaling
group to maintain a minimum of two instances. Configure an Amazon CloudFront distribution for the website.
Answer: CE
Explanation:
By combining the use of Amazon EFS for shared file storage and Amazon CloudFront for content delivery, you
can achieve improved performance and resilience for the website.
What should the company do to obtain access to customer accounts in the MOST secure way?
A.Ensure that the customers create an IAM role in their account with read-only EC2 and CloudWatch
permissions and a trust policy to the company’s account.
B.Create a serverless API that implements a token vending machine to provide temporary AWS credentials for a
role with read-only EC2 and CloudWatch permissions.
C.Ensure that the customers create an IAM user in their account with read-only EC2 and CloudWatch
permissions. Encrypt and store customer access and secret keys in a secrets management system.
D.Ensure that the customers create an Amazon Cognito user in their account to use an IAM role with read-only
EC2 and CloudWatch permissions. Encrypt and store the Amazon Cognito user and password in a secrets
management system.
Answer: A
Explanation:
By having customers create an IAM role with the necessary permissions in their own accounts, the company
can use AWS Identity and Access Management (IAM) to establish cross-account access. The trust policy
allows the company's AWS account to assume the customer's IAM role temporarily, granting access to the
specified resources (EC2 instances and CloudWatch metrics) within the customer's account. This approach
follows the principle of least privilege, as the company only requests the necessary permissions and does not
require long-term access keys or user credentials from the customers.
A.Set up VPC peering connections between each VPC. Update each associated subnet’s route table
B.Configure a NAT gateway and an internet gateway in each VPC to connect each VPC through the internet
C.Create an AWS Transit Gateway in the networking team’s AWS account. Configure static routes from each
VPC.
D.Deploy VPN gateways in each VPC. Create a transit VPC in the networking team’s AWS account to connect to
each VPC.
Answer: C
Explanation:
AWS Transit Gateway is a highly scalable and centralized hub for connecting multiple VPCs, on-premises
networks, and remote networks. It simplifies network connectivity by providing a single entry point and
reducing the number of connections required. In this scenario, deploying an AWS Transit Gateway in the
networking team's AWS account allows for efficient management and control over the network connectivity
across multiple VPCs.
Which solution will provide EC2 instances to meet these requirements MOST cost-effectively?
A.Purchase a 1-year Savings Plan for Amazon EC2 that covers the instance family of the Auto Scaling group
that the batch job uses.
B.Purchase a 1-year Reserved Instance for the specific instance type and operating system of the instances in
the Auto Scaling group that the batch job uses.
C.Create a new launch template for the Auto Scaling group. Set the instances to Spot Instances. Set a policy to
scale out based on CPU usage.
D.Create a new launch template for the Auto Scaling group. Increase the instance size. Set a policy to scale out
based on CPU usage.
Answer: C
Explanation:
Purchasing a 1-year Savings Plan (option A) or a 1-year Reserved Instance (option B) may provide cost savings,
but they are more suitable for long-running, steady-state workloads. Since your batch jobs run for a specific
period each day, using Spot Instances with the ability to scale out based on CPU usage is a more cost-
effective choice.
A.Upload files from the user's browser to the application servers. Transfer the files to an Amazon S3 bucket.
B.Provision an AWS Storage Gateway file gateway. Upload files directly from the user's browser to the file
gateway.
C.Generate Amazon S3 presigned URLs in the application. Upload files directly from the user's browser into an
S3 bucket.
D.Provision an Amazon Elastic File System (Amazon EFS) file system. Upload files directly from the user's
browser to the file system.
Answer: C
Explanation:
This approach allows users to upload files directly to S3 without passing through the application servers,
reducing the load on the application and improving scalability. It leverages the client-side capabilities to
handle the file uploads and offloads the processing to S3.
The company wants to have separate deployments of its web platform across multiple Regions. However, the
company must maintain a single primary reservation database that is globally consistent.
Answer: A
Explanation:
Using DynamoDB's global tables feature, you can achieve a globally consistent reservation database with low
latency on updates, making it suitable for serving a global user base. The automatic replication provided by
DynamoDB eliminates the need for manual synchronization between Regions.
A. Convert the application to use Amazon DynamoDB. Use a global table for the center reservation table. Use
the correct Regional endpoint in each Regional deployment.
In the event of a natural disaster in the us-west-1 Region, the company wants to recover workloads quickly in the
us-west-2 Region. The company wants no more than 24 hours of data loss on the EC2 instances. The company also
wants to automate any backups of the EC2 instances.
Which solutions will meet these requirements with the LEAST administrative effort? (Choose two.)
A.Create an Amazon EC2-backed Amazon Machine Image (AMI) lifecycle policy to create a backup based on
tags. Schedule the backup to run twice daily. Copy the image on demand.
B.Create an Amazon EC2-backed Amazon Machine Image (AMI) lifecycle policy to create a backup based on
tags. Schedule the backup to run twice daily. Configure the copy to the us-west-2 Region.
C.Create backup vaults in us-west-1 and in us-west-2 by using AWS Backup. Create a backup plan for the EC2
instances based on tag values. Create an AWS Lambda function to run as a scheduled job to copy the backup
data to us-west-2.
D.Create a backup vault by using AWS Backup. Use AWS Backup to create a backup plan for the EC2 instances
based on tag values. Define the destination for the copy as us-west-2. Specify the backup schedule to run twice
daily.
E.Create a backup vault by using AWS Backup. Use AWS Backup to create a backup plan for the EC2 instances
based on tag values. Specify the backup schedule to run twice daily. Copy on demand to us-west-2.
Answer: BD
Explanation:
Option B suggests using an EC2-backed Amazon Machine Image (AMI) lifecycle policy to automate the
backup process. By configuring the policy to run twice daily and specifying the copy to the us-west-2 Region,
the company can ensure regular backups are created and copied to the alternate region.Option D proposes
using AWS Backup, which provides a centralized backup management solution. By creating a backup vault
and backup plan based on tag values, the company can automate the backup process for the EC2 instances.
The backup schedule can be set to run twice daily, and the destination for the copy can be defined as the us-
west-2 Region.
solutions are both automated and require no manual intervention to create or copy backups
Users report that the application is running more slowly than expected. A security audit of the web server log files
shows that the application is receiving millions of illegitimate requests from a small number of IP addresses. A
solutions architect needs to resolve the immediate performance problem while the company investigates a more
permanent solution.
A.Modify the inbound security group for the web tier. Add a deny rule for the IP addresses that are consuming
resources.
B.Modify the network ACL for the web tier subnets. Add an inbound deny rule for the IP addresses that are
consuming resources.
C.Modify the inbound security group for the application tier. Add a deny rule for the IP addresses that are
consuming resources.
D.Modify the network ACL for the application tier subnets. Add an inbound deny rule for the IP addresses that
are consuming resources.
Answer: B
Explanation:
In this scenario, the security audit reveals that the application is receiving millions of illegitimate requests
from a small number of IP addresses. To address this issue, it is recommended to modify the network ACL
(Access Control List) for the web tier subnets.By adding an inbound deny rule specifically targeting the IP
addresses that are consuming resources, the network ACL can block the illegitimate traffic at the subnet
level before it reaches the web servers. This will help alleviate the excessive load on the web tier and improve
the application's performance.
A.Create a VPC peering connection between the eu-west-1 VPC and the ap-southeast-2 VPC. Create an inbound
rule in the eu-west-1 application security group that allows traffic from the database server IP addresses in the
ap-southeast-2 security group.
B.Configure a VPC peering connection between the ap-southeast-2 VPC and the eu-west-1 VPC. Update the
subnet route tables. Create an inbound rule in the ap-southeast-2 database security group that references the
security group ID of the application servers in eu-west-1.
C.Configure a VPC peering connection between the ap-southeast-2 VPC and the eu-west-1 VPUpdate the
subnet route tables. Create an inbound rule in the ap-southeast-2 database security group that allows traffic
from the eu-west-1 application server IP addresses.
D.Create a transit gateway with a peering attachment between the eu-west-1 VPC and the ap-southeast-2 VPC.
After the transit gateways are properly peered and routing is configured, create an inbound rule in the
database security group that references the security group ID of the application servers in eu-west-1.
Answer: C
Explanation:
Answer: C -->"You cannot reference the security group of a peer VPC that's in a different Region. Instead, use
the CIDR block of the peer VPC."
https://docs.aws.amazon.com/vpc/latest/peering/vpc-peering-security-groups.html
A.Configure each development environment with its own Amazon Aurora PostgreSQL database
B.Configure each development environment with its own Amazon RDS for PostgreSQL Single-AZ DB instances
C.Configure each development environment with its own Amazon Aurora On-Demand PostgreSQL-Compatible
database
D.Configure each development environment with its own Amazon S3 bucket by using Amazon S3 Object Select
Answer: C
Explanation:
Option C suggests using Amazon Aurora On-Demand PostgreSQL-Compatible databases for each
development environment. This option provides the benefits of Amazon Aurora, which is a high-performance
and scalable database engine, while allowing you to pay for usage on an on-demand basis. Amazon Aurora
On-Demand instances are typically more cost-effective for individual development environments compared to
the provisioned capacity options.
C cost effectively
Which solution will meet these requirements with the LEAST operational overhead?
A.Use AWS Config to identify all untagged resources. Tag the identified resources programmatically. Use tags
in the backup plan.
B.Use AWS Config to identify all resources that are not running. Add those resources to the backup vault.
C.Require all AWS account owners to review their resources to identify the resources that need to be backed
up.
D.Use Amazon Inspector to identify all noncompliant resources.
Answer: A
Explanation:
This solution allows you to leverage AWS Config to identify any untagged resources within your AWS
Organizations accounts. Once identified, you can programmatically apply the necessary tags to indicate the
backup requirements for each resource. By using tags in the backup plan configuration, you can ensure that
only the tagged resources are included in the backup process, reducing operational overhead and ensuring all
necessary resources are backed up.
A.Create a static website hosted in Amazon S3 that invokes AWS Lambda functions to resize the images and
store the images in an Amazon S3 bucket.
B.Create a static website hosted in Amazon CloudFront that invokes AWS Step Functions to resize the images
and store the images in an Amazon RDS database.
C.Create a dynamic website hosted on a web server that runs on an Amazon EC2 instance. Configure a process
that runs on the EC2 instance to resize the images and store the images in an Amazon S3 bucket.
D.Create a dynamic website hosted on an automatically scaling Amazon Elastic Container Service (Amazon
ECS) cluster that creates a resize job in Amazon Simple Queue Service (Amazon SQS). Set up an image-resizing
program that runs on an Amazon EC2 instance to process the resize jobs.
Answer: A
Explanation:
By using Amazon S3 and AWS Lambda together, you can create a serverless architecture that provides highly
scalable and available image resizing capabilities. Here's how the solution would work:Set up an Amazon S3
bucket to store the original images uploaded by users.Configure an event trigger on the S3 bucket to invoke
an AWS Lambda function whenever a new image is uploaded.The Lambda function can be designed to
retrieve the uploaded image, perform the necessary resizing operations based on device requirements, and
store the resized images back in the S3 bucket or a different bucket designated for resized images.Configure
the Amazon S3 bucket to make the resized images publicly accessible for serving to users.
A.Grant the required permission in AWS Identity and Access Management (IAM) to the AmazonEKSNodeRole
IAM role.
B.Create interface VPC endpoints to allow nodes to access the control plane.
C.Recreate nodes in the public subnet. Restrict security groups for EC2 nodes.
D.Allow outbound traffic in the security group of the nodes.
Answer: B
Explanation:
By creating interface VPC endpoints, you can enable the necessary communication between the Amazon EKS
control plane and the nodes in private subnets. This solution ensures that the control plane maintains
endpoint private access (set to true) and endpoint public access (set to false) for security compliance.
Which use cases are suitable for Amazon Redshift in this scenario? (Choose three.)
A.Supporting data APIs to access data with traditional, containerized, and event-driven applications
B.Supporting client-side and server-side encryption
C.Building analytics workloads during specified hours and when the application is not active
D.Caching data to reduce the pressure on the backend database
E.Scaling globally to support petabytes of data and tens of millions of requests per minute
F.Creating a secondary replica of the cluster by using the AWS Management Console
Answer: BCE
Explanation:
B. Supporting client-side and server-side encryption: Amazon Redshift supports both client-side and server-
side encryption for improved data security.C. Building analytics workloads during specified hours and when
the application is not active: Amazon Redshift is optimized for running complex analytic queries against very
large datasets, making it a good choice for this use case.E. Scaling globally to support petabytes of data and
tens of millions of requests per minute: Amazon Redshift is designed to handle petabytes of data, and to
deliver fast query and I/O performance for virtually any size dataset.
The company requires the API to respond consistently with low latency to ensure customer satisfaction. The
company needs to provide a compute host for the API.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use an Application Load Balancer and Amazon Elastic Container Service (Amazon ECS).
B.Use Amazon API Gateway and AWS Lambda functions with provisioned concurrency.
C.Use an Application Load Balancer and an Amazon Elastic Kubernetes Service (Amazon EKS) cluster.
D.Use Amazon API Gateway and AWS Lambda functions with reserved concurrency.
Answer: B
Explanation:
In the context of the given scenario, where the company wants low latency and consistent performance for
their API during peak usage times, it would be more suitable to use provisioned concurrency. By allocating a
specific number of concurrent executions, the company can ensure that there are enough function instances
available to handle the expected load and minimize the impact of cold starts. This will result in lower latency
and improved performance for the API.
Which solution will meet this requirement with the MOST operational efficiency?
A.Enable S3 logging in the Systems Manager console. Choose an S3 bucket to send the session data to.
B.Install the Amazon CloudWatch agent. Push all logs to a CloudWatch log group. Export the logs to an S3
bucket from the group for archival purposes.
C.Create a Systems Manager document to upload all server logs to a central S3 bucket. Use Amazon
EventBridge to run the Systems Manager document against all servers that are in the account daily.
D.Install an Amazon CloudWatch agent. Push all logs to a CloudWatch log group. Create a CloudWatch logs
subscription that pushes any incoming log events to an Amazon Kinesis Data Firehose delivery stream. Set
Amazon S3 as the destination.
Answer: A
Explanation:
1. It have menu to Enable S3 Logging.https://docs.aws.amazon.com/systems-
manager/latest/userguide/session-manager-logging.html#session-manager-logging-s3
2. option A does not involve CloudWatch, while option D does. Therefore, in terms of operational overhead,
option A would generally have less complexity and operational overhead compared to option D.Option A
simply enables S3 logging in the Systems Manager console, allowing you to directly send session logs to an
S3 bucket. This approach is straightforward and requires minimal configuration.On the other hand, option D
involves installing and configuring the Amazon CloudWatch agent, creating a CloudWatch log group, setting
up a CloudWatch Logs subscription, and configuring an Amazon Kinesis Data Firehose delivery stream to
store logs in an S3 bucket. This requires additional setup and management compared to option A.So, if
minimizing operational overhead is a priority, option A would be a simpler and more straightforward choice.
Which solution meets these requirements with the LEAST amount of effort?
Answer: A
Explanation:
Enabling storage autoscaling allows RDS to automatically adjust the storage capacity based on the
application's needs. When the storage usage exceeds a predefined threshold, RDS will automatically increase
the allocated storage without requiring manual intervention or causing downtime. This ensures that the RDS
database has sufficient disk space to handle the increasing storage requirements.
Answer: B
Explanation:
AWS Service Catalog allows you to create and manage catalogs of IT services that can be deployed within
your organization. With Service Catalog, you can define a standardized set of products (solutions and tools in
this case) that customers can self-service provision. By creating Service Catalog products, you can control
and enforce the deployment of approved and validated solutions and tools.
Which DynamoDB table configuration will meet these requirements MOST cost-effectively?
A.Configure DynamoDB with provisioned read and write by using the DynamoDB Standard table class. Set
DynamoDB auto scaling to a maximum defined capacity.
B.Configure DynamoDB in on-demand mode by using the DynamoDB Standard table class.
C.Configure DynamoDB with provisioned read and write by using the DynamoDB Standard Infrequent Access
(DynamoDB Standard-IA) table class. Set DynamoDB auto scaling to a maximum defined capacity.
D.Configure DynamoDB in on-demand mode by using the DynamoDB Standard Infrequent Access (DynamoDB
Standard-IA) table class.
Answer: B
Explanation:
AWS Service Catalog allows you to create and manage catalogs of IT services that can be deployed within
your organization. With Service Catalog, you can define a standardized set of products (solutions and tools in
this case) that customers can self-service provision. By creating Service Catalog products, you can control
and enforce the deployment of approved and validated solutions and tools.
Question: 521 CertyIQ
A retail company has several businesses. The IT team for each business manages its own AWS account. Each team
account is part of an organization in AWS Organizations. Each team monitors its product inventory levels in an
Amazon DynamoDB table in the team's own AWS account.
The company is deploying a central inventory reporting application into a shared AWS account. The application
must be able to read items from all the teams' DynamoDB tables.
A.Integrate DynamoDB with AWS Secrets Manager in the inventory application account. Configure the
application to use the correct secret from Secrets Manager to authenticate and read the DynamoDB table.
Schedule secret rotation for every 30 days.
B.In every business account, create an IAM user that has programmatic access. Configure the application to use
the correct IAM user access key ID and secret access key to authenticate and read the DynamoDB table.
Manually rotate IAM access keys every 30 days.
C.In every business account, create an IAM role named BU_ROLE with a policy that gives the role access to the
DynamoDB table and a trust policy to trust a specific role in the inventory application account. In the inventory
account, create a role named APP_ROLE that allows access to the STS AssumeRole API operation. Configure
the application to use APP_ROLE and assume the crossaccount role BU_ROLE to read the DynamoDB table.
D.Integrate DynamoDB with AWS Certificate Manager (ACM). Generate identity certificates to authenticate
DynamoDB. Configure the application to use the correct certificate to authenticate and read the DynamoDB
table.
Answer: C
Explanation:
IAM Roles: IAM roles provide a secure way to grant permissions to entities within AWS. By creating an IAM
role in each business account named BU_ROLE with the necessary permissions to access the DynamoDB
table, the access can be controlled at the IAM role level.Cross-Account Access: By configuring a trust policy
in the BU_ROLE that trusts a specific role in the inventory application account (APP_ROLE), you establish a
trusted relationship between the two accounts.Least Privilege: By creating a specific IAM role (BU_ROLE) in
each business account and granting it access only to the required DynamoDB table, you can ensure that each
team's table is accessed with the least privilege principle.Security Token Service (STS): The use of STS
AssumeRole API operation in the inventory application account allows the application to assume the cross-
account role (BU_ROLE) in each business account.
Which combination of steps will meet these requirements with the LEAST operational overhead? (Choose two.)
Answer: BC
Explanation:
By combining the Kubernetes Cluster Autoscaler (option C) to manage the number of nodes in the cluster and
enabling horizontal pod autoscaling (option B) with the Kubernetes Metrics Server, you can achieve automatic
scaling of your EKS cluster and container applications based on workload demand. This approach minimizes
operational overhead as it leverages built-in Kubernetes functionality and automation mechanisms.
Which solution will meet these requirements in the MOST operationally efficient way?
Answer: B
Explanation:
1. By using CloudFront with [email protected], you can benefit from the distributed CDN infrastructure, reduce
the load on DynamoDB, and retrieve data with low latency. The use of caching also helps to minimize the
impact on baseline performance and improve the overall efficiency of data retrieval in your application.
Which solution will meet these requirements with the LEAST effort?
A.Use AWS Glue and write custom scripts to query CloudTrail logs for the errors.
B.Use AWS Batch and write custom scripts to query CloudTrail logs for the errors.
C.Search CloudTrail logs with Amazon Athena queries to identify the errors.
D.Search CloudTrail logs with Amazon QuickSight. Create a dashboard to identify the errors.
Answer: C
Explanation:
"Using Athena with CloudTrail logs is a powerful way to enhance your analysis of AWS service
activity."https://docs.aws.amazon.com/athena/latest/ug/cloudtrail-logs.html
Which solution will meet these requirements with the LEAST operational overhead?
A.Access usage cost-related data by using the AWS Cost Explorer API with pagination.
B.Access usage cost-related data by using downloadable AWS Cost Explorer report .csv files.
C.Configure AWS Budgets actions to send usage cost data to the company through FTP.
D.Create AWS Budgets reports for usage cost data. Send the data to the company through SMTP.
Answer: A
Explanation:
1. Answer is: Asays dashboard = Cost Explorer, therefor C & D are eliminated.also says programmatically,
means non manual intervention therefor API.
2. least operational overhead = API access
Which solution will reduce the downtime for scaling exercises with the LEAST operational overhead?
A.Create more Aurora PostgreSQL read replicas in the cluster to handle the load during failover.
B.Set up a secondary Aurora PostgreSQL cluster in the same AWS Region. During failover, update the
application to use the secondary cluster's writer endpoint.
C.Create an Amazon ElastiCache for Memcached cluster to handle the load during failover.
D.Set up an Amazon RDS proxy for the database. Update the application to use the proxy endpoint.
Answer: D
Explanation:
D is the correct answer.It is talking about the write database. Not reader.Amazon RDS proxy allows you to
automatically route write request to the healthy writer, minimizing downtime.
The company wants to expand globally and to ensure that its application has minimal downtime.
A.Extend the Auto Scaling groups for the web tier and the application tier to deploy instances in Availability
Zones in a second Region. Use an Aurora global database to deploy the database in the primary Region and the
second Region. Use Amazon Route 53 health checks with a failover routing policy to the second Region.
B.Deploy the web tier and the application tier to a second Region. Add an Aurora PostgreSQL cross-Region
Aurora Replica in the second Region. Use Amazon Route 53 health checks with a failover routing policy to the
second Region. Promote the secondary to primary as needed.
C.Deploy the web tier and the application tier to a second Region. Create an Aurora PostgreSQL database in the
second Region. Use AWS Database Migration Service (AWS DMS) to replicate the primary database to the
second Region. Use Amazon Route 53 health checks with a failover routing policy to the second Region.
D.Deploy the web tier and the application tier to a second Region. Use an Amazon Aurora global database to
deploy the database in the primary Region and the second Region. Use Amazon Route 53 health checks with a
failover routing policy to the second Region. Promote the secondary to primary as needed.
Answer: D
Explanation:
B&C are discarted.The answer is between A and D. I would go with D because it explicitley created this web /
app tier in second region, instead A just autoscales into a secondary region, rather then always having
resources in this second region.
The company wants the AWS solution to process incoming data files as soon as possible with minimal changes to
the FTP clients that send the files. The solution must delete the incoming data files after the files have been
processed successfully. Processing for each file needs to take 3-8 minutes.
Which solution will meet these requirements in the MOST operationally efficient way?
A.Use an Amazon EC2 instance that runs an FTP server to store incoming files as objects in Amazon S3 Glacier
Flexible Retrieval. Configure a job queue in AWS Batch. Use Amazon EventBridge rules to invoke the job to
process the objects nightly from S3 Glacier Flexible Retrieval. Delete the objects after the job has processed
the objects.
B.Use an Amazon EC2 instance that runs an FTP server to store incoming files on an Amazon Elastic Block
Store (Amazon EBS) volume. Configure a job queue in AWS Batch. Use Amazon EventBridge rules to invoke the
job to process the files nightly from the EBS volume. Delete the files after the job has processed the files.
C.Use AWS Transfer Family to create an FTP server to store incoming files on an Amazon Elastic Block Store
(Amazon EBS) volume. Configure a job queue in AWS Batch. Use an Amazon S3 event notification when each
file arrives to invoke the job in AWS Batch. Delete the files after the job has processed the files.
D.Use AWS Transfer Family to create an FTP server to store incoming files in Amazon S3 Standard. Create an
AWS Lambda function to process the files and to delete the files after they are processed. Use an S3 event
notification to invoke the Lambda function when the files arrive.
Answer: D
Explanation:
1. Most likely D.
2. You cannot setup AWS Transfer Family to save files into EBS.
A.Migrate the databases to Amazon EC2. Use an AWS Key Management Service (AWS KMS) AWS managed key
for encryption.
B.Migrate the databases to Amazon RDS Configure encryption at rest.
C.Migrate the data to Amazon S3 Use Amazon Macie for data security and protection
D.Migrate the database to Amazon RDS. Use Amazon CloudWatch Logs for data security and protection.
Answer: B
Explanation:
1. B for sure.First the correct is Amazon RDS, then encryption at rest makes the database secure.
2. B. Migrate the databases to Amazon RDS Configure encryption at rest.Looks like best option
A.Add an Amazon CloudFront distribution in front of the NLBs. Increase the Cache-Control max-age parameter.
B.Replace the NLBs with Application Load Balancers (ALBs). Configure Route 53 to use latency-based routing.
C.Add AWS Global Accelerator in front of the NLBs. Configure a Global Accelerator endpoint to use the correct
listener ports.
D.Add an Amazon API Gateway endpoint behind the NLBs. Enable API caching. Override method caching for the
different stages.
Answer: C
Explanation:
only b and c handle TCP/UDP, and C comes with accelerator to enhance performance
UDP and TCP is AWS Global accelarator as it works in the Transportation layer.Now this with NLB is perfect.
Which solution will meet these requirements with the MOST operational efficiency?
A.Create a function URL for the Lambda function. Provide the Lambda function URL to the third party for the
webhook.
B.Deploy an Application Load Balancer (ALB) in front of the Lambda function. Provide the ALB URL to the third
party for the webhook.
C.Create an Amazon Simple Notification Service (Amazon SNS) topic. Attach the topic to the Lambda function.
Provide the public hostname of the SNS topic to the third party for the webhook.
D.Create an Amazon Simple Queue Service (Amazon SQS) queue. Attach the queue to the Lambda function.
Provide the public hostname of the SQS queue to the third party for the webhook.
Answer: A
Explanation:
1. key word: Lambda function URLs
2. https://docs.aws.amazon.com/lambda/latest/dg/lambda-urls.html
Which combination of steps will meet these requirements with the MOST operational efficiency? (Choose three.)
A.Register the required domain in a registrar. Create a wildcard custom domain name in a Route 53 hosted zone
and record in the zone that points to the API Gateway endpoint.
B.Request a wildcard certificate that matches the domains in AWS Certificate Manager (ACM) in a different
Region.
C.Create hosted zones for each customer as required in Route 53. Create zone records that point to the API
Gateway endpoint.
D.Request a wildcard certificate that matches the custom domain name in AWS Certificate Manager (ACM) in
the same Region.
E.Create multiple API endpoints for each customer in API Gateway.
F.Create a custom domain name in API Gateway for the REST API. Import the certificate from AWS Certificate
Manager (ACM).
Answer: ADF
Explanation:
It's ADF
ADF - One to create the custom domain in Route 53 (Amazon DNS)Second to request wildcard certificate
from ADMThirds to import the certificate from ACM.
A.Use Amazon Macie. Create an Amazon EventBridge rule to filter the SensitiveData event type from Macie
findings and to send an Amazon Simple Notification Service (Amazon SNS) notification to the security team.
B.Use Amazon GuardDuty. Create an Amazon EventBridge rule to filter the CRITICAL event type from
GuardDuty findings and to send an Amazon Simple Notification Service (Amazon SNS) notification to the
security team.
C.Use Amazon Macie. Create an Amazon EventBridge rule to filter the SensitiveData:S3Object/Personal event
type from Macie findings and to send an Amazon Simple Queue Service (Amazon SQS) notification to the
security team.
D.Use Amazon GuardDuty. Create an Amazon EventBridge rule to filter the CRITICAL event type from
GuardDuty findings and to send an Amazon Simple Queue Service (Amazon SQS) notification to the security
team.
Answer: A
Explanation:
B and D are discarted as Macie is to identify PII. Now that we have between A and C.SNS is more suitable for
this option as a pub/sub service, we subscribe the security team and then they will receive the notifications.
A.Transition objects to the S3 Standard storage class 30 days after creation. Write an expiration action that
directs Amazon S3 to delete objects after 90 days.
B.Transition objects to the S3 Standard-Infrequent Access (S3 Standard-IA) storage class 30 days after
creation. Move all objects to the S3 Glacier Flexible Retrieval storage class after 90 days. Write an expiration
action that directs Amazon S3 to delete objects after 90 days.
C.Transition objects to the S3 Glacier Flexible Retrieval storage class 30 days after creation. Write an
expiration action that directs Amazon S3 to delete objects after 90 days.
D.Transition objects to the S3 One Zone-Infrequent Access (S3 One Zone-IA) storage class 30 days after
creation. Move all objects to the S3 Glacier Flexible Retrieval storage class after 90 days. Write an expiration
action that directs Amazon S3 to delete objects after 90 days.
Answer: C
Explanation:
C seems the most sutiable. Is the lowest cost. After 30 days is backup only, doesn't specify frequent access.
Therefor we must transition the items after 30 days to Glacier Flexible Retrieval.Also it says deletion after 90
days, so all answers specifying a transition after 90 days makes no sense.
A.Create a new AWS Key Management Service (AWS KMS) key. Use AWS Secrets Manager to manage, rotate,
and store all secrets in Amazon EKS.
B.Create a new AWS Key Management Service (AWS KMS) key. Enable Amazon EKS KMS secrets encryption
on the Amazon EKS cluster.
C.Create the Amazon EKS cluster with default options. Use the Amazon Elastic Block Store (Amazon EBS)
Container Storage Interface (CSI) driver as an add-on.
D.Create a new AWS Key Management Service (AWS KMS) key with the alias/aws/ebs alias. Enable default
Amazon Elastic Block Store (Amazon EBS) volume encryption for the account.
Answer: B
Explanation:
It is B, because we need to encrypt inside of the EKS cluster, not outside.AWS KMS is to encrypt at rest.
Question: 536 CertyIQ
A company wants to provide data scientists with near real-time read-only access to the company's production
Amazon RDS for PostgreSQL database. The database is currently configured as a Single-AZ database. The data
scientists use complex queries that will not affect the production database. The company needs a solution that is
highly available.
A.Scale the existing production database in a maintenance window to provide enough power for the data
scientists.
B.Change the setup from a Single-AZ to a Multi-AZ instance deployment with a larger secondary standby
instance. Provide the data scientists access to the secondary instance.
C.Change the setup from a Single-AZ to a Multi-AZ instance deployment. Provide two additional read replicas
for the data scientists.
D.Change the setup from a Single-AZ to a Multi-AZ cluster deployment with two readable standby instances.
Provide read endpoints to the data scientists.
Answer: C
Explanation:
C.The question says highly available therefor Multi Az deployment.Also mentions cost consideration. database
instance is cheaper then cluster (D).Also read replicas is a must since the queries are complex and can slow
down the database (question has not complex queries but is a mistake must have been complex queries)
A.Migrate the MySQL database to Amazon RDS for MySQL with a Multi-AZ DB cluster deployment. Use Amazon
ElastiCache for Redis with high availability to store session data and to cache reads. Migrate the web server to
an Auto Scaling group that is in three Availability Zones.
B.Migrate the MySQL database to Amazon RDS for MySQL with a Multi-AZ DB cluster deployment. Use Amazon
ElastiCache for Memcached with high availability to store session data and to cache reads. Migrate the web
server to an Auto Scaling group that is in three Availability Zones.
C.Migrate the MySQL database to Amazon DynamoDB Use DynamoDB Accelerator (DAX) to cache reads. Store
the session data in DynamoDB. Migrate the web server to an Auto Scaling group that is in three Availability
Zones.
D.Migrate the MySQL database to Amazon RDS for MySQL in a single Availability Zone. Use Amazon
ElastiCache for Redis with high availability to store session data and to cache reads. Migrate the web server to
an Auto Scaling group that is in three Availability Zones.
Answer: A
Explanation:
Memcached is best suited for caching data, while Redis is better for storing data that needs to be persisted. If
you need to store data that needs to be accessed frequently, such as user profiles, session data, and
application settings, then Redis is the better choice
Question: 538 CertyIQ
A global video streaming company uses Amazon CloudFront as a content distribution network (CDN). The company
wants to roll out content in a phased manner across multiple countries. The company needs to ensure that viewers
who are outside the countries to which the company rolls out content are not able to view the content.
A.Add geographic restrictions to the content in CloudFront by using an allow list. Set up a custom error
message.
B.Set up a new URL tor restricted content. Authorize access by using a signed URL and cookies. Set up a
custom error message.
C.Encrypt the data for the content that the company distributes. Set up a custom error message.
D.Create a new URL for restricted content. Set up a time-restricted access policy for signed URLs.
Answer: A
Explanation:
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/georestrictions.html
A.Configure a multi-site active/active setup between the on-premises server and AWS by using Microsoft SQL
Server Enterprise with Always On availability groups.
B.Configure a warm standby Amazon RDS for SQL Server database on AWS. Configure AWS Database
Migration Service (AWS DMS) to use change data capture (CDC).
C.Use AWS Elastic Disaster Recovery configured to replicate disk changes to AWS as a pilot light.
D.Use third-party backup software to capture backups every night. Store a secondary set of backups in Amazon
S3.
Answer: B
Explanation:
B is the correct one.C and D are discarted as makes no sense.Between A and B is because B is RDS which is a
manged service, we can use even to pay only for used resources when needed. Leveraging AWS DMS it
replicates / syncs the data.
A.Use AWS Database Migration Service (AWS DMS) to create an Amazon RDS DB instance in multiple AWS
Regions. Point the reporting functions toward a separate DB instance from the primary DB instance.
B.Use Amazon RDS in a Single-AZ deployment to create an Oracle database. Create a read replica in the same
zone as the primary DB instance. Direct the reporting functions to the read replica.
C.Use Amazon RDS deployed in a Multi-AZ cluster deployment to create an Oracle database. Direct the
reporting functions to use the reader instance in the cluster deployment.
D.Use Amazon RDS deployed in a Multi-AZ instance deployment to create an Amazon Aurora database. Direct
the reporting functions to the reader instances.
Answer: C
Explanation:
C. Use Amazon RDS deployed in a Multi-AZ cluster deployment to create an Oracle database. Direct the
reporting functions to use the reader instance in the cluster deployment.A and B discarted. The answer is
between C and DD says use an Amazon RDS to build an Amazon Aurora, makes no sense.C is the correct one,
high availability in multi az deployment.Also point the reporting to the reader replica.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose three.)
A.Create an AWS Lambda function to retrieve user information from Amazon DynamoDB. Create an Amazon API
Gateway endpoint to accept RESTful APIs. Send the API calls to the Lambda function.
B.Create an Amazon Elastic Container Service (Amazon ECS) service behind an Application Load Balancer to
retrieve user information from Amazon RDS. Create an Amazon API Gateway endpoint to accept RESTful APIs.
Send the API calls to the Lambda function.
C.Create an Amazon Cognito user pool to authenticate users.
D.Create an Amazon Cognito identity pool to authenticate users.
E.Use AWS Amplify to serve the frontend web content with HTML, CSS, and JS. Use an integrated Amazon
CloudFront configuration.
F.Use Amazon S3 static web hosting with PHP, CSS, and JS. Use Amazon CloudFront to serve the frontend web
content.
Answer: ACE
Explanation:
Option B (Amazon ECS) is not the best option since the website "can be idle for a long time", so Lambda
(Option A) is a more cost-effective choice.Option D is incorrect because User pools are for authentication
(identity verification) while Identity pools are for authorization (access control). Option F is wrong because S3
web hosting only supports static web files like HTML/CSS, and does not support PHP or JavaScript.
Answer: B
Explanation:
Signed URLshttps://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/PrivateContent.html
A.From the AWS Account Management Console of the management account, turn on discount sharing from the
billing preferences section.
B.From the AWS Account Management Console of the account that purchased the existing Savings Plan, turn
on discount sharing from the billing preferences section. Include all accounts.
C.From the AWS Organizations management account, use AWS Resource Access Manager (AWS RAM) to share
the Savings Plan with other accounts.
D.Create an organization in AWS Organizations in a new payer account. Invite the other AWS accounts to join
the organization from the management account.
E.Create an organization in AWS Organizations in the existing AWS account with the existing EC2 instances and
Savings Plan. Invite the other AWS accounts to join the organization from the management account.
Answer: AE
Explanation:
From the AWS Account Management Console of the management account, turn on discount sharing from the
billing preferences section.
.From the AWS Organizations management account, use AWS Resource Access Manager (AWS RAM) to share
the Savings Plan with other accounts.
Answer: A
Explanation:
A. Create a canary release deployment stage for API Gateway. Deploy the latest API version. Point an
appropriate percentage of traffic to the canary stage. After API verification, promote the canary stage to the
production stage.Canary release meaning only certain percentage of the users.
A.Update the Route 53 records to use a latency routing policy. Add a static error page that is hosted in an
Amazon S3 bucket to the records so that the traffic is sent to the most responsive endpoints.
B.Set up a Route 53 active-passive failover configuration. Direct traffic to a static error page that is hosted in
an Amazon S3 bucket when Route 53 health checks determine that the ALB endpoint is unhealthy.
C.Set up a Route 53 active-active configuration with the ALB and an Amazon EC2 instance that hosts a static
error page as endpoints. Configure Route 53 to send requests to the instance only if the health checks fail for
the ALB.
D.Update the Route 53 records to use a multivalue answer routing policy. Create a health check. Direct traffic
to the website if the health check passes. Direct traffic to a static error page that is hosted in Amazon S3 if the
health check does not pass.
Answer: B
Explanation:
B is correct..https://repost.aws/knowledge-center/fail-over-s3-r53
A.Set up AWS Storage Gateway to connect with the backup applications using the NFS interface.
B.Set up an Amazon EFS file system that connects with the backup applications using the NFS interface.
C.Set up an Amazon EFS file system that connects with the backup applications using the iSCSI interface.
D.Set up AWS Storage Gateway to connect with the backup applications using the iSCSI-virtual tape library
(VTL) interface.
Answer: D
Explanation:
https://aws.amazon.com/storagegateway/vtl/?nc1=h_ls
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon Kinesis Data Firehose to deliver streaming data to Amazon S3.
B.Use AWS Glue to deliver streaming data to Amazon S3.
C.Use AWS Lambda to deliver streaming data and store the data to Amazon S3.
D.Use AWS Database Migration Service (AWS DMS) to deliver streaming data to Amazon S3.
Answer: A
Explanation:
Which solution will meet these requirements with the LEAST operational overhead?
A.Use AWS Systems Manager templates to control which AWS services each department can use.
B.Create organization units (OUs) for each department in AWS Organizations. Attach service control policies
(SCPs) to the OUs.
C.Use AWS CloudFormation to automatically provision only the AWS services that each department can use.
D.Set up a list of products in AWS Service Catalog in the AWS accounts to manage and control the usage of
specific AWS services.
Answer: B
Explanation:
A.Deploy a NAT instance in the VPC. Route all the internet-based traffic through the NAT instance.
B.Deploy a NAT gateway in the public subnets. Modify the private subnet route table to direct all internet-
bound traffic to the NAT gateway.
C.Configure an internet gateway and attach it to the VPModify the private subnet route table to direct internet-
bound traffic to the internet gateway.
D.Configure a virtual private gateway and attach it to the VPC. Modify the private subnet route table to direct
internet-bound traffic to the virtual private gateway.
Answer: B
Explanation:
Which steps must the solutions architect take to implement the correct permissions? (Choose two.)
Answer: BD
Explanation:
D. Allow the Lambda execution role in the AWS KMS key policy.
A.Use S3 Standard. Use an S3 Lifecycle rule to transition the reports to S3 Glacier after 7 days.
B.Use S3 Standard. Use an S3 Lifecycle rule to transition the reports to S3 Standard-Infrequent Access (S3
Standard-IA) after 7 days.
C.Use S3 Intelligent-Tiering. Configure S3 Intelligent-Tiering to transition the reports to S3 Standard-
Infrequent Access (S3 Standard-IA) and S3 Glacier.
D.Use S3 Standard. Use an S3 Lifecycle rule to transition the reports to S3 Glacier Deep Archive after 7 days.
Answer: A
Explanation:
For me its A because S3 glacier Flexible retrieval standard can retrieve files in 3 to 5 hours D is incorrect
because S3 glacier deep archive needs 12 hours minimum to retrieve files B and C are more expensive
comparing to A and D
Answer: B
Explanation:
1. The key considerations are:The company needs flexibility to change EC2 instance types and families every
2-3 months. This rules out Reserved Instances which lock you into an instance type and family for 1-3 years.A
Compute Savings Plan allows switching instance types and families freely within the term as needed. No
Upfront is more flexible than All Upfront.A 1-year term balances commitment and flexibility better than a 3-
year term given the company's changing needs.With No Upfront, the company only pays for usage monthly
without an upfront payment. This optimizes cost.
2. " needs to change the type and family of its EC2 instances". that means B I think.
Which solution will meet these requirements with the LEAST operational overhead?
A.Configure Amazon Macie in each Region. Create a job to analyze the data that is in Amazon S3.
B.Configure AWS Security Hub for all Regions. Create an AWS Config rule to analyze the data that is in Amazon
S3.
C.Configure Amazon Inspector to analyze the data that is in Amazon S3.
D.Configure Amazon GuardDuty to analyze the data that is in Amazon S3.
Answer: A
Explanation:
A.Use the compute optimized instance family for the application. Use the memory optimized instance family for
the database.
B.Use the storage optimized instance family for both the application and the database.
C.Use the memory optimized instance family for both the application and the database.
D.Use the high performance computing (HPC) optimized instance family for the application. Use the memory
optimized instance family for the database.
Answer: C
Explanation:
Use the memory optimized instance family for both the application and the database.
A solutions architect needs to design a secure solution to establish a connection between the EC2 instances and
the SQS queue.
A.Implement an interface VPC endpoint for Amazon SQS. Configure the endpoint to use the private subnets.
Add to the endpoint a security group that has an inbound access rule that allows traffic from the EC2 instances
that are in the private subnets.
B.Implement an interface VPC endpoint for Amazon SQS. Configure the endpoint to use the public subnets.
Attach to the interface endpoint a VPC endpoint policy that allows access from the EC2 instances that are in
the private subnets.
C.Implement an interface VPC endpoint for Amazon SQS. Configure the endpoint to use the public subnets.
Attach an Amazon SQS access policy to the interface VPC endpoint that allows requests from only a specified
VPC endpoint.
D.Implement a gateway endpoint for Amazon SQS. Add a NAT gateway to the private subnets. Attach an IAM
role to the EC2 instances that allows access to the SQS queue.
Answer: A
Explanation:
A is correct .B,C: 'Configuring endpoints to use public subnets' --> Invalid D: No Gateway Endpoint for SQS.
Question: 556 CertyIQ
A solutions architect is using an AWS CloudFormation template to deploy a three-tier web application. The web
application consists of a web tier and an application tier that stores and retrieves user data in Amazon DynamoDB
tables. The web and application tiers are hosted on Amazon EC2 instances, and the database tier is not publicly
accessible. The application EC2 instances need to access the DynamoDB tables without exposing API credentials
in the template.
A.Create an IAM role to read the DynamoDB tables. Associate the role with the application instances by
referencing an instance profile.
B.Create an IAM role that has the required permissions to read and write from the DynamoDB tables. Add the
role to the EC2 instance profile, and associate the instance profile with the application instances.
C.Use the parameter section in the AWS CloudFormation template to have the user input access and secret
keys from an already-created IAM user that has the required permissions to read and write from the DynamoDB
tables.
D.Create an IAM user in the AWS CloudFormation template that has the required permissions to read and write
from the DynamoDB tables. Use the GetAtt function to retrieve the access and secret keys, and pass them to
the application instances through the user data.
Answer: B
Explanation:
Create an IAM role that has the required permissions to read and write from the DynamoDB tables. Add the
role to the EC2 instance profile, and associate the instance profile with the application instances.
A.Use Amazon Athena to process the S3 data. Use AWS Glue with the Amazon Redshift data to enrich the S3
data.
B.Use Amazon EMR to process the S3 data. Use Amazon EMR with the Amazon Redshift data to enrich the S3
data.
C.Use Amazon EMR to process the S3 data. Use Amazon Kinesis Data Streams to move the S3 data into
Amazon Redshift so that the data can be enriched.
D.Use AWS Glue to process the S3 data. Use AWS Lake Formation with the Amazon Redshift data to enrich the
S3 data.
Answer: A
Explanation:
https://aws.amazon.com/blogs/architecture/reduce-archive-cost-with-serverless-data-archiving/
A.Implement AWS Transit Gateway to connect the VPCs. Update the route tables of each VPC to use the transit
gateway for inter-VPC communication.
B.Implement an AWS Site-to-Site VPN tunnel between the VPCs. Update the route tables of each VPC to use
the VPN tunnel for inter-VPC communication.
C.Set up a VPC peering connection between the VPCs. Update the route tables of each VPC to use the VPC
peering connection for inter-VPC communication.
D.Set up a 1 GB AWS Direct Connect connection between the VPCs. Update the route tables of each VPC to use
the Direct Connect connection for inter-VPC communication.
Answer: C
Explanation:
C is the correct answer. VPC peering is the most cost-effective way to connect two VPCs within the same
region and AWS account. There are no additional charges for VPC peering beyond standard data transfer
rates. Transit Gateway and VPN add additional hourly and data processing charges that are not necessary for
simple VPC peering. Direct Connect provides dedicated network connectivity, but is overkill for the relatively
low inter-VPC data transfer needs described here. It has high fixed costs plus data transfer rates .For
occasional inter-VPC communication of moderate data volumes within the same region and account, VPC
peering is the most cost-effective solution. It provides simple private connectivity without transfer charges or
network appliances.
The company wants more details about the cost for each product line from the consolidated billing feature in
Organizations.
Answer: BE
Explanation:
"Only a management account in an organization and single accounts that aren't members of an organization
have access to the cost allocation tags manager in the Billing and Cost Management console.
"https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/custom-tags.html
Question: 560 CertyIQ
A company's solutions architect is designing an AWS multi-account solution that uses AWS Organizations. The
solutions architect has organized the company's accounts into organizational units (OUs).
The solutions architect needs a solution that will identify any changes to the OU hierarchy. The solution also needs
to notify the company's operations team of any changes.
Which solution will meet these requirements with the LEAST operational overhead?
A.Provision the AWS accounts by using AWS Control Tower. Use account drift notifications to identify the
changes to the OU hierarchy.
B.Provision the AWS accounts by using AWS Control Tower. Use AWS Config aggregated rules to identify the
changes to the OU hierarchy.
C.Use AWS Service Catalog to create accounts in Organizations. Use an AWS CloudTrail organization trail to
identify the changes to the OU hierarchy.
D.Use AWS CloudFormation templates to create accounts in Organizations. Use the drift detection operation on
a stack to identify the changes to the OU hierarchy.
Answer: A
Explanation:
The key advantages you highlight of Control Tower are convincing:Fully managed service simplifies multi-
account setup.Built-in account drift notifications detect OU changes automatically.More scalable and less
complex than Config rules or CloudTrail.Better security and compliance guardrails than custom options.Lower
operational overhead compared to other solution
Which solution will meet these requirements with the LEAST amount of operational overhead?
A.Set up a DynamoDB Accelerator (DAX) cluster. Route all read requests through DAX.
B.Set up Amazon ElastiCache for Redis between the DynamoDB table and the web application. Route all read
requests through Redis.
C.Set up Amazon ElastiCache for Memcached between the DynamoDB table and the web application. Route all
read requests through Memcached.
D.Set up Amazon DynamoDB Streams on the table, and have AWS Lambda read from the table and populate
Amazon ElastiCache. Route all read requests through ElastiCache.
Answer: A
Explanation:
A , because B,C and D contains Elastic ache which required a heavy code changes, so more operational
overhead
Which combination of steps should the solutions architect take to meet this requirement? (Choose two.)
Answer: AB
Explanation:
You can access Amazon DynamoDB from your VPC using gateway VPC endpoints. After you create the
gateway endpoint, you can add it as a target in your route table for traffic destined from your VPC to
DynamoDB.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon CloudWatch Container Insights to collect and group the cluster information.
B.Use Amazon EKS Connector to register and connect all Kubernetes clusters.
C.Use AWS Systems Manager to collect and view the cluster information.
D.Use Amazon EKS Anywhere as the primary cluster to view the other clusters with native Kubernetes
commands.
Answer: B
Explanation:
You can use Amazon EKS Connector to register and connect any conformant Kubernetes cluster to AWS and
visualize it in the Amazon EKS console. After a cluster is connected, you can see the status, configuration, and
workloads for that cluster in the Amazon EKS console. You can use this feature to view connected clusters in
Amazon EKS console, but you can't manage them
A.Store sensitive data in an Amazon Elastic Block Store (Amazon EBS) volume. Use EBS encryption to encrypt
the data. Use an IAM instance role to restrict access.
B.Store sensitive data in Amazon RDS for MySQL. Use AWS Key Management Service (AWS KMS) client-side
encryption to encrypt the data.
C.Store sensitive data in Amazon S3. Use AWS Key Management Service (AWS KMS) server-side encryption to
encrypt the data. Use S3 bucket policies to restrict access.
D.Store sensitive data in Amazon FSx for Windows Server. Mount the file share on application servers. Use
Windows file permissions to restrict access.
Answer: B
Explanation:
Using client-side encryption we can protect specific fields and guarantee only decryption if the client has
access to an API key, we can protect specific fields even from database admins.
A.Use native MySQL tools to migrate the database to Amazon RDS for MySQL. Configure elastic storage
scaling.
B.Migrate the database to Amazon Redshift by using the mysqldump utility. Turn on Auto Scaling for the
Amazon Redshift cluster.
C.Use AWS Database Migration Service (AWS DMS) to migrate the database to Amazon Aurora. Turn on Aurora
Auto Scaling.
D.Use AWS Database Migration Service (AWS DMS) to migrate the database to Amazon DynamoDB. Configure
an Auto Scaling policy.
Answer: C
Explanation:
C is correct A is incorrect. RDS for MySQL does not scale automatically during periods of increased demand. B
is incorrect. Redshift is used for data sharing purposes. D is incorrect. you muse change application codes.
A.Create an Amazon S3 bucket. Allow access from all the EC2 instances in the VPC.
B.Create an Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system from each EC2
instance.
C.Create a file system on a Provisioned IOPS SSD (io2) Amazon Elastic Block Store (Amazon EBS) volume.
Attach the EBS volume to all the EC2 instances.
D.Create file systems on Amazon Elastic Block Store (Amazon EBS) volumes that are attached to each EC2
instance. Synchronize the EBS volumes across the different EC2 instances.
Answer: B
Explanation:
1. The key reasons:EFS provides a scalable, high performance NFS file system that can be concurrently
accessed from multiple EC2 instances.It supports the hierarchical directory structure needed by the
applications.EFS is elastic, growing and shrinking automatically as needed.It can be accessed from instances
across AZs, meeting the shared storage requirement.S3 object storage (option A) lacks the file system
semantics needed by the apps.EBS volumes (options C and D) are attached to a single instance and would
require replication and syncing to share across instances.EFS is purpose-built for this use case of a shared file
system across Linux instances and aligns best with the performance, concurrency, and availability needs.
2. Going with b
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon API Gateway with AWS Lambda functions to receive the data from the sensors, process the data,
and store the data in an Amazon DynamoDB table.
B.Use an Elastic Load Balancer that is supported by an Auto Scaling group of Amazon EC2 instances to receive
and process the data from the sensors. Use an Amazon S3 bucket to store the processed data.
C.Use Amazon API Gateway with AWS Lambda functions to receive the data from the sensors, process the data,
and store the data in a Microsoft SQL Server Express database on an Amazon EC2 instance.
D.Use an Elastic Load Balancer that is supported by an Auto Scaling group of Amazon EC2 instances to receive
and process the data from the sensors. Use an Amazon Elastic File System (Amazon EFS) shared file system to
store the processed data.
Answer: A
Explanation:
The key reasons are: ° API Gateway removes the need to manage servers to receive the HTTP requests from
sensors ° Lambda functions provide a serverless compute layer to process data as needed ° DynamoDB is a
fully managed NoSQL database that scales automatically ° This serverless architecture has minimal
operational overhead to manage ° Options B, C, and D all require managing EC2 instances which increases ops
workload ° Option C also adds SQL Server admin tasks and licensing costs ° Option D uses EFS file storage
which requires capacity planning and management
The application design must support caching to minimize the amount of time that users wait for the engineering
drawings to load. The application must be able to store petabytes of data.
Which combination of storage and caching should the solutions architect use?
Explanation:
The answer seems A: B : Glacier for archiving C : i don t think EBS scale to petabytes (I am not sure about
that)D : it incorrect because All application components will be deployed on the AWS infrastructure
Answer: A
Explanation:
Option A is the most appropriate solution because Amazon Event Bridge publishes metrics to Amazon
CloudWatch. You can find relevant metrics in the "AWS/Events" namespace, which allows you to monitor the
number of events matched by the rule and the number of invocations to the rule's target.
Which solution will meet these requirements with the LEAST operational overhead?
Answer: B
Explanation:
1. The key reasons:Auto Scaling scheduled actions allow defining specific dates/times to scale out or in. This
can be used to scale to 6 instances every Friday evening automatically.Scheduled scaling removes the need
for manual intervention to scale up/down for the workload.EventBridge reminders and manual scaling require
human involvement each week adding overhead.Automatic scaling responds to demand and may not align
perfectly to scale out every Friday without additional tuning.Scheduled Auto Scaling actions provide the
automation needed to scale for the weekly workload without ongoing operational overhead.
2. Predicted period.. So schedule the instance
Question: 571 CertyIQ
A company is creating a REST API. The company has strict requirements for the use of TLS. The company requires
TLSv1.3 on the API endpoints. The company also requires a specific public third-party certificate authority (CA) to
sign the TLS certificate.
A.Use a local machine to create a certificate that is signed by the third-party CImport the certificate into AWS
Certificate Manager (ACM). Create an HTTP API in Amazon API Gateway with a custom domain. Configure the
custom domain to use the certificate.
B.Create a certificate in AWS Certificate Manager (ACM) that is signed by the third-party CA. Create an HTTP
API in Amazon API Gateway with a custom domain. Configure the custom domain to use the certificate.
C.Use AWS Certificate Manager (ACM) to create a certificate that is signed by the third-party CA. Import the
certificate into AWS Certificate Manager (ACM). Create an AWS Lambda function with a Lambda function URL.
Configure the Lambda function URL to use the certificate.
D.Create a certificate in AWS Certificate Manager (ACM) that is signed by the third-party CA. Create an AWS
Lambda function with a Lambda function URL. Configure the Lambda function URL to use the certificate.
Answer: B
Explanation:
AWS Certificate Manager (ACM) is a service that lets you easily provision, manage, and deploy SSL/TLS
certificates for use with AWS services and your internal resources. By creating a certificate in ACM that is
signed by the third-party CA, the company can meet its requirement for a specific public third-party CA to
sign the TLS certificate.
The company wants to migrate the on-premises database to a managed AWS service. The company wants to use
auto scaling capabilities to manage unexpected workload increases.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Provision an Amazon DynamoDB database with default read and write capacity settings.
B.Provision an Amazon Aurora database with a minimum capacity of 1 Aurora capacity unit (ACU).
C.Provision an Amazon Aurora Serverless v2 database with a minimum capacity of 1 Aurora capacity unit (ACU).
D.Provision an Amazon RDS for MySQL database with 2 GiB of memory.
Answer: C
Explanation:
C seems to be the right answer Instead of provisioning and managing database servers, you specify Aurora
capacity units (ACUs). Each ACU is a combination of approximately 2 gigabytes (GB) of memory,
corresponding CPU, and networking. Database storage automatically scales from 10 gibibytes (GiB) to 128
tebibytes (TiB), the same as storage in a standard Aurora DB
clusterhttps://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/aurora-serverless-v1.how-it-
works.htmlhttps://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/aurora-serverless-v2.html
Question: 573 CertyIQ
A company wants to use an event-driven programming model with AWS Lambda. The company wants to reduce
startup latency for Lambda functions that run on Java 11. The company does not have strict latency requirements
for the applications. The company wants to reduce cold starts and outlier latencies when a function scales up.
Answer: D
Explanation:
1. https://docs.aws.amazon.com/lambda/latest/dg/snapstart.html
2. D is correctLambda SnapStart for Java can improve startup performance for latency-sensitive applications
by up to 10x at no extra cost, typically with no changes to your function code. The largest contributor to
startup latency (often referred to as cold start time) is the time that Lambda spends initializing the function,
which includes loading the function's code, starting the runtime, and initializing the function code.With
SnapStart, Lambda initializes your function when you publish a function version. Lambda takes a Firecracker
microVM snapshot of the memory and disk state of the initialized execution environment, encrypts the
snapshot, and caches it for low-latency access. When you invoke the function version for the first time, and as
the invocations scale up, Lambda resumes new execution environments from the cached snapshot instead of
initializing them from scratch, improving startup latency.
A.Migrate the existing RDS for MySQL database to an Aurora Serverless v2 MySQL database cluster.
B.Migrate the existing RDS for MySQL database to an Aurora MySQL database cluster.
C.Migrate the existing RDS for MySQL database to an Amazon EC2 instance that runs MySQL. Purchase an
instance reservation for the EC2 instance.
D.Migrate the existing RDS for MySQL database to an Amazon Elastic Container Service (Amazon ECS) cluster
that uses MySQL container images to run tasks.
Answer: B
Explanation:
B seems to be the correct answer, because if we have a predictable workload Aurora database seems to be
most cost effective however if we have unpredictable workload aurora serverless seems to be more cost
effective because our database will scale up and down for more informations please read this article .
https://medium.com/trackit/aurora-or-aurora-serverless-v2-which-is-more-cost-effective-bcd12e172dcf
Question: 575 CertyIQ
A company deploys its applications on Amazon Elastic Kubernetes Service (Amazon EKS) behind an Application
Load Balancer in an AWS Region. The application needs to store data in a PostgreSQL database engine. The
company wants the data in the database to be highly available. The company also needs increased capacity for
read workloads.
Which solution will meet these requirements with the MOST operational efficiency?
Answer: C
Explanation:
1. RDS Multi-AZ DB cluster deployments provide high availability, automatic failover, and increased read
capacity.A multi-AZ cluster automatically handles replicating data across AZs in a single region.This
maintains operational efficiency as it is natively managed by RDS without needing external
replication.DynamoDB global tables involve complex provisioning and requires app changes.RDS read replicas
require manual setup and management of replication.RDS Multi-AZ clustering is purpose-built by AWS for HA
PostgreSQL deployments and balancing read workloads.
2. Multi-AZ DB clusters provide high availability, increased capacity for read workloads, and lower write
latency when compared to Multi-AZ DB instance deployments.
Which type of endpoint should a solutions architect use to meet these requirements?
A.Private endpoint
B.Regional endpoint
C.Interface VPC endpoint
D.Edge-optimized endpoint
Answer: D
Explanation:
The correct answer is D API Gateway - Endpoint Types • Edge-Optimized (default): For global clients •
Requests are routed through the CloudFront Edge locations (improves latency) • The API Gateway still lives in
only one region• Regional: • For clients within the same region • Could manually combine with CloudFront
(more control over the caching strategies and the distribution)• Private: • Can only be accessed from your VPC
using an interface VPC endpoint (ENI) • Use a resource policy to define access
Which solution will meet these requirements with the MOST operational efficiency?
Answer: C
Explanation:
C seems to be correct
Which solution will meet these requirements with the LEAST operational overhead?
Answer: A
Explanation:
Amazon DynamoDB Accelerator (DAX) is a fully managed, highly available, in-memory cache for Amazon
DynamoDB that delivers up to a 10 times performance improvement—from milliseconds to microseconds—
even at millions of requests per second.
https://aws.amazon.com/dynamodb/dax/#:~:text=Amazon%20DynamoDB%20Accelerator%20(DAX)%20is,millions%20o
A.Use the Instance Scheduler on AWS to configure start and stop schedules.
B.Turn off automatic backups. Create weekly manual snapshots of the database.
C.Create a custom AWS Lambda function to start and stop the database based on minimum CPU utilization.
D.Purchase All Upfront reserved DB instances.
Answer: A
Explanation:
1. A https://aws.amazon.com/solutions/implementations/instance-scheduler-on-aws/
2. Scheduler do the job
A.Configure an Auto Scaling group with an Amazon EC2 instance. Use an Amazon FSx for Lustre file system to
run the application.
B.Host the application on an Amazon EC2 instance. Use an Amazon Elastic Block Store (Amazon EBS) GP2
volume to run the application.
C.Configure an Auto Scaling group with an Amazon EC2 instance. Use an Amazon FSx for OpenZFS file system
to run the application.
D.Host the application on an Amazon EC2 instance. Use an Amazon Elastic Block Store (Amazon EBS) GP3
volume to run the application.
Answer: D
Explanation:
Migrate your Amazon EBS volumes from gp2 to gp3 and save up to 20% on costs.
My rational: Options A y C are based on autoscaling-group and no make sense for me on this scenary.Then,
use Amazon EBS is the solution and GP2 or GP3 is the question. Requirement requires the most COST
effective solution, then, I choose GP3
A solutions architect needs to design a highly available and fault-tolerant architecture for the application. The
solutions architect creates an Auto Scaling group of EC2 instances.
Which set of additional steps should the solutions architect take to meet these requirements?
A.Set the Auto Scaling group's minimum capacity to two. Deploy one On-Demand Instance in one Availability
Zone and one On-Demand Instance in a second Availability Zone.
B.Set the Auto Scaling group's minimum capacity to four. Deploy two On-Demand Instances in one Availability
Zone and two On-Demand Instances in a second Availability Zone.
C.Set the Auto Scaling group's minimum capacity to two. Deploy four Spot Instances in one Availability Zone.
D.Set the Auto Scaling group's minimum capacity to four. Deploy two On-Demand Instances in one Availability
Zone and two Spot Instances in a second Availability Zone.
Answer: B
Explanation:
1. By setting the Auto Scaling group's minimum capacity to four, the architect ensures that there are always at
least two running instances. Deploying two On-Demand Instances in each of two Availability Zones ensures
that the application is highly available and fault-tolerant. If one Availability Zone becomes unavailable, the
application can still run in the other Availability Zone.
2. While Spot Instances can be used to reduce costs, they might not provide the same level of availability and
guaranteed uptime that On-Demand Instances offer. So I will go with B and not D.
A.Set up a geolocation routing policy. Send the traffic that is near us-west-1 to the on-premises data center.
Send the traffic that is near eu-central-1 to eu-central-1.
B.Set up a simple routing policy that routes all traffic that is near eu-central-1 to eu-central-1 and routes all
traffic that is near the on-premises datacenter to the on-premises data center.
C.Set up a latency routing policy. Associate the policy with us-west-1.
D.Set up a weighted routing policy. Split the traffic evenly between eu-central-1 and the on-premises data
center.
Answer: A
Explanation:
The key reasons are:Geolocation routing allows you to route users to the closest endpoint based on their
geographic location. This will provide the lowest latency.Routing us-west-1 traffic to the on-premises data
center minimizes latency for those users since it is also located near there.Routing eu-central-1 traffic to the
eu-central-1 AWS region minimizes latency for users nearby.This achieves routing users to the closest
endpoint on a geographic basis to optimize for low latency.
A.Read the data from the tapes on premises. Stage the data in a local NFS storage. Use AWS DataSync to
migrate the data to Amazon S3 Glacier Flexible Retrieval.
B.Use an on-premises backup application to read the data from the tapes and to write directly to Amazon S3
Glacier Deep Archive.
C.Order multiple AWS Snowball devices that have Tape Gateway. Copy the physical tapes to virtual tapes in
Snowball. Ship the Snowball devices to AWS. Create a lifecycle policy to move the tapes to Amazon S3 Glacier
Deep Archive.
D.Configure an on-premises Tape Gateway. Create virtual tapes in the AWS Cloud. Use backup software to
copy the physical tape to the virtual tape.
Answer: C
Explanation:
Option C is likely the most cost-effective solution given the large data size and limited internet bandwidth.
The physical data transfer and integration with the existing tape infrastructure provides efficiency benefits
that can optimize the cost.
Answer: A
Explanation:
A spread placement group is a group of instances that are each placed on distinct hardware.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/placement-groups.html
Answer: D
Explanation:
1. A regional Reserved Instance does not reserve
capacityhttps://docs.aws.amazon.com/AWSEC2/latest/UserGuide/reserved-instances-scope.html
2. reserved instances for price discount. need capacity reservation.
What should the solutions architect do next in the new management account?
A.Have the R&D AWS account be part of both organizations during the transition.
B.Invite the R&D AWS account to be part of the new organization after the R&D AWS account has left the prior
organization.
C.Create a new R&D AWS account in the new organization. Migrate resources from the prior R&D AWS account
to the new R&D AWS account.
D.Have the R&D AWS account join the new organization. Make the new management account a member of the
prior organization.
Answer: B
Explanation:
1. account can leave current organization and then join new organization.
A.Configure a Gateway Load Balancer (GWLB) in front of an Amazon Elastic Container Service (Amazon ECS)
container instance that stores the information that the company receives in an Amazon Elastic File System
(Amazon EFS) file system. Authorization is resolved at the GWLB.
B.Configure an Amazon API Gateway endpoint in front of an Amazon Kinesis data stream that stores the
information that the company receives in an Amazon S3 bucket. Use an AWS Lambda function to resolve
authorization.
C.Configure an Amazon API Gateway endpoint in front of an Amazon Kinesis Data Firehose that stores the
information that the company receives in an Amazon S3 bucket. Use an API Gateway Lambda authorizer to
resolve authorization.
D.Configure a Gateway Load Balancer (GWLB) in front of an Amazon Elastic Container Service (Amazon ECS)
container instance that stores the information that the company receives on an Amazon Elastic File System
(Amazon EFS) file system. Use an AWS Lambda function to resolve authorization.
Answer: C
Explanation:
1. https://docs.aws.amazon.com/lambda/latest/dg/services-kinesisfirehose.html
2. lambda authoriser seems to be logical solution.
A.Create a cross-Region read replica and promote the read replica to the primary instance.
B.Use AWS Database Migration Service (AWS DMS) to create RDS cross-Region replication.
C.Use cross-Region replication every 24 hours to copy native backups to an Amazon S3 bucket.
D.Copy automatic snapshots to another Region every 24 hours.
Answer: D
Explanation:
1. This is the most cost-effective solution because it does not require any additional AWS services. Amazon
RDS automatically creates snapshots of your DB instances every hour. You can copy these snapshots to
another Region every 24 hours to meet your RPO and RTO requirements.The other solutions are more
expensive because they require additional AWS services. For example, AWS DMS is a more expensive service
than AWS RDS.
2. Snapshots are always a cost-efficience way to have a DR plan.
A.Use an Amazon ElastiCache for Memcached instance to store the session data. Update the application to use
ElastiCache for Memcached to store the session state.
B.Use Amazon ElastiCache for Redis to store the session state. Update the application to use ElastiCache for
Redis to store the session state.
C.Use an AWS Storage Gateway cached volume to store session data. Update the application to use AWS
Storage Gateway cached volume to store the session state.
D.Use Amazon RDS to store the session state. Update the application to use Amazon RDS to store the session
state.
Answer: B
Explanation:
1. redis is correct since it provides high availability and data persistance
2. B is the correct answer. It suggests using Amazon ElastiCache for Redis to store the session state. Update
the application to use ElastiCache for Redis to store the session state. This solution is cost-effective and
requires minimal development effort.
A.Create a read replica of the database. Direct the queries to the read replica.
B.Create a backup of the database. Restore the backup to another DB instance. Direct the queries to the new
database.
C.Export the data to Amazon S3. Use Amazon Athena to query the S3 bucket.
D.Resize the DB instance to accommodate the additional workload.
Answer: A
Explanation:
This is the most cost-effective solution because it does not require any additional AWS services. A read
replica is a copy of a database that is synchronized with the primary database. You can direct the queries for
the report to the read replica, which will not affect the performance of the daily workloads
A.Use the AWS Load Balancer Controller to provision a Network Load Balancer.
B.Use the AWS Load Balancer Controller to provision an Application Load Balancer.
C.Use an AWS Lambda function to connect the requests to Amazon EKS.
D.Use Amazon API Gateway to connect the requests to Amazon EKS.
Answer: D
Explanation:
1. API Gateway is a fully managed service that makes it easy for you to create, publish, maintain, monitor, and
secure APIs at any scale. API Gateway provides an entry point to your microservices.
2. https://aws.amazon.com/blogs/containers/microservices-development-using-aws-controllers-for-
kubernetes-ack-and-amazon-eks-blueprints/
A.Use Amazon S3 to store the images. Turn on multi-factor authentication (MFA) and public bucket access.
Provide customers with a link to the S3 bucket.
B.Use Amazon S3 to store the images. Create an IAM user for each customer. Add the users to a group that has
permission to access the S3 bucket.
C.Use Amazon EC2 instances that are behind Application Load Balancers (ALBs) to store the images. Deploy
the instances only in the countries the company services. Provide customers with links to the ALBs for their
specific country's instances.
D.Use Amazon S3 to store the images. Use Amazon CloudFront to distribute the images with geographic
restrictions. Provide a signed URL for each customer to access the data in CloudFront.
Answer: D
Explanation:
1. answer is D
2. https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/georestrictions.html
A.Use Multi-AZ Redis replication groups with shards that contain multiple nodes.
B.Use Redis shards that contain multiple nodes with Redis append only files (AOF) turned on.
C.Use a Multi-AZ Redis cluster with more than one read replica in the replication group.
D.Use Redis shards that contain multiple nodes with Auto Scaling turned on.
Answer: A
Explanation:
A tooI would go with A, Using AOF can't protect you from all failure scenarios.For example, if a node fails due
to a hardware fault in an underlying physical server, ElastiCache will provision a new node on a different
server. In this case, the AOF is not available and can't be used to recover the data.
Which solution will reduce the launch time of the application during the next testing phase?
A.Launch two or more EC2 On-Demand Instances. Turn on auto scaling features and make the EC2 On-Demand
Instances available during the next testing phase.
B.Launch EC2 Spot Instances to support the application and to scale the application so it is available during the
next testing phase.
C.Launch the EC2 On-Demand Instances with hibernation turned on. Configure EC2 Auto Scaling warm pools
during the next testing phase.
D.Launch EC2 On-Demand Instances with Capacity Reservations. Start additional EC2 instances during the next
testing phase.
Answer: C
Explanation:
Launch the EC2 On-Demand Instances with hibernation turned on. Configure EC2 Auto Scaling warm pools
during the next testing phase.
A.Use manual scaling to change the size of the Auto Scaling group.
B.Use predictive scaling to change the size of the Auto Scaling group.
C.Use dynamic scaling to change the size of the Auto Scaling group.
D.Use schedule scaling to change the size of the Auto Scaling group.
Answer: C
Explanation:
Dynamic Scaling – This is yet another type of Auto Scaling in which the number of EC2 instances is changed
automatically depending on the signals received. Dynamic Scaling is a good choice when there is a high
volume of unpredictable traffic.
https://www.developer.com/web-services/aws-auto-scaling-types-best-
practices/#:~:text=Dynamic%20Scaling%20%E2%80%93%20This%20is%20yet,high%20volume%20of%20unpredicta
Answer: A
Explanation:
1. A to autoscaling
2. The correct answer is A
Answer: B
Explanation:
Provisioned Concurrency incurs additional costs, so it is cost-efficient to use it only when necessary. For
example, early in the morning when activity starts, or to handle recurring peak usage.
Question: 598 CertyIQ
A research company uses on-premises devices to generate data for analysis. The company wants to use the AWS
Cloud to analyze the data. The devices generate .csv files and support writing the data to an SMB file share.
Company analysts must be able to use SQL commands to query the data. The analysts will run queries periodically
throughout the day.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose three.)
Answer: ACF
Explanation:
1. https://docs.aws.amazon.com/glue/latest/dg/aws-glue-programming-etl-format-csv-
home.htmlhttps://aws.amazon.com/blogs/aws/amazon-athena-interactive-sql-queries-for-data-in-amazon-
s3/https://aws.amazon.com/storagegateway/faqs/
2. It should be ACF
A solutions architect wants to use AWS Outposts as part of the solution. The solutions architect is working with the
company's operational team to build the application.
Which activities are the responsibility of the company's operational team? (Choose three.)
Answer: ACE
Explanation:
A.Deploy a Network Load Balancer (NLB). Configure the NLB to be publicly accessible over the TCP port that
the application requires.
B.Deploy an Application Load Balancer (ALB). Configure the ALB to be publicly accessible over the TCP port
that the application requires.
C.Deploy an Amazon CloudFront distribution that listens on the TCP port that the application requires. Use an
Application Load Balancer as the origin.
D.Deploy an Amazon API Gateway API that is configured with the TCP port that the application requires.
Configure AWS Lambda functions with provisioned concurrency to process the requests.
Answer: A
Explanation:
Deploy a Network Load Balancer (NLB). Configure the NLB to be publicly accessible over the TCP port that
the application requires.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create a DB snapshot of the RDS for PostgreSQL DB instance to populate a new Aurora PostgreSQL DB
cluster.
B.Create an Aurora read replica of the RDS for PostgreSQL DB instance. Promote the Aurora read replicate to a
new Aurora PostgreSQL DB cluster.
C.Use data import from Amazon S3 to migrate the database to an Aurora PostgreSQL DB cluster.
D.Use the pg_dump utility to back up the RDS for PostgreSQL database. Restore the backup to a new Aurora
PostgreSQL DB cluster.
Answer: B
Explanation:
Create an Aurora read replica of the RDS for PostgreSQL DB instance. Promote the Aurora read replicate to a
new Aurora PostgreSQL DB cluster.
A.Take a snapshot of the EBS storage that is attached to each EC2 instance. Create an AWS CloudFormation
template to launch new EC2 instances from the EBS storage.
B.Take a snapshot of the EBS storage that is attached to each EC2 instance. Use AWS Elastic Beanstalk to set
the environment based on the EC2 template and attach the EBS storage.
C.Use AWS Backup to set up a backup plan for the entire group of EC2 instances. Use the AWS Backup API or
the AWS CLI to speed up the restore process for multiple EC2 instances.
D.Create an AWS Lambda function to take a snapshot of the EBS storage that is attached to each EC2 instance
and copy the Amazon Machine Images (AMIs). Create another Lambda function to perform the restores with the
copied AMIs and attach the EBS storage.
Answer: C
Explanation:
The key reasons are: AWS Backup automates backup of resources like EBS volumes. It allows defining
backup policies for groups of resources. This removes the need to manually create backups for each resource.
The AWS Backup API and CLI allow programmatic control of backup plans and restores. This enables
restoring hundreds of EC2 instances programmatically after a disaster instead of manually. AWS Backup
handles clean up of old backups based on policies to minimize storage costs.
Which solution will meet these requirements with the MOST operational efficiency?
A.Use the AWS Step Functions Map state in Inline mode to process the data in parallel.
B.Use the AWS Step Functions Map state in Distributed mode to process the data in parallel.
C.Use AWS Glue to process the data in parallel.
D.Use several AWS Lambda functions to process the data in parallel.
Answer: B
Explanation:
With Step Functions, you can orchestrate large-scale parallel workloads to perform tasks, such as on-demand
processing of semi-structured data. These parallel workloads let you concurrently process large-scale data
sources stored in Amazon S3.
https://docs.aws.amazon.com/step-functions/latest/dg/concepts-orchestrate-large-scale-parallel-
workloads.html
Answer: D
Explanation:
1. D. Order multiple AWS Snowball devices. Copy the data to the devices. Send the devices to AWS to copy the
data to Amazon S3.
2. 10 PB = It's Snowballs.
Answer: D
Explanation:
1. The key reasons are:The Storage Gateway volume gateway provides iSCSI block storage using cached
volumes. This allows replacing the on-premises iSCSI servers with minimal changes.Cached volumes store
frequently accessed data locally for low latency access, while storing less frequently accessed data in
S3.This reduces the number of on-premises servers while still providing low latency access to hot data.EBS
does not provide iSCSI support to replace the existing servers.S3 File Gateway is for file storage, not block
storage.Stored volumes would store all data on-premises, not in S3.
2. ISCI=Volume Gateway. low-latency access to frequently used data = cached volumes
A.Store all the objects in S3 Standard with an S3 Lifecycle rule to transition the objects to S3 Glacier after 30
days.
B.Store all the objects in S3 Standard with an S3 Lifecycle rule to transition the objects to S3 Standard-
Infrequent Access (S3 Standard-IA) after 30 days.
C.Store all the objects in S3 Standard with an S3 Lifecycle rule to transition the objects to S3 One Zone-
Infrequent Access (S3 One Zone-IA) after 30 days.
D.Store all the objects in S3 Intelligent-Tiering with an S3 Lifecycle rule to transition the objects to S3
Standard-Infrequent Access (S3 Standard-IA) after 30 days.
Answer: B
Explanation:
Minimum Days for Transition to S3 Standard-IA or S3 One Zone-IA Before you transition objects to S3
Standard-IA or S3 One Zone-IA, you must store them for at least 30 days in Amazon S3. For example, you
cannot create a Lifecycle rule to transition objects to the S3 Standard-IA storage class one day after you
create them. Amazon S3 doesn't support this transition within the first 30 days because newer objects are
often accessed more frequently or deleted sooner than is suitable for S3 Standard-IA or S3 One Zone-IA
storage. Similarly, if you are transitioning noncurrent objects (in versioned buckets), you can transition only
objects that are at least 30 days noncurrent to S3 Standard-IA or S3 One Zone-IA storage.
https://docs.aws.amazon.com/AmazonS3/latest/userguide/lifecycle-transition-general-considerations.html
The database size has grown over time, reducing the performance and increasing the cost of storage. The company
must improve the database performance and needs a solution that is highly available and resilient.
A.Reduce the RDS DB instance size. Increase the storage capacity to 24 TiB. Change the storage type to
Magnetic.
B.Increase the RDS DB instance size. Increase the storage capacity to 24 TiChange the storage type to
Provisioned IOPS.
C.Create an Amazon S3 bucket. Update the application to store documents in the S3 bucket. Store the object
metadata in the existing database.
D.Create an Amazon DynamoDB table. Update the application to use DynamoDB. Use AWS Database Migration
Service (AWS DMS) to migrate data from the Oracle database to DynamoDB.
Answer: C
Explanation:
C. Create an Amazon S3 bucket. Update the application to store documents in the S3 bucket. Store the object
metadata in the existing database.
The company's security team recommends to increase the security of the application endpoint by restricting
access to only the IP addresses registered by the retail locations.
What should a solutions architect do to meet these requirements?
A.Associate an AWS WAF web ACL with the ALB. Use IP rule sets on the ALB to filter traffic. Update the IP
addresses in the rule to include the registered IP addresses.
B.Deploy AWS Firewall Manager to manage the ALConfigure firewall rules to restrict traffic to the ALModify
the firewall rules to include the registered IP addresses.
C.Store the IP addresses in an Amazon DynamoDB table. Configure an AWS Lambda authorization function on
the ALB to validate that incoming requests are from the registered IP addresses.
D.Configure the network ACL on the subnet that contains the public interface of the ALB. Update the ingress
rules on the network ACL with entries for each of the registered IP addresses.
Answer: A
Explanation:
A. Associate an AWS WAF web ACL with the ALB. Use IP rule sets on the ALB to filter traffic. Update the IP
addresses in the rule to include the registered IP addresses.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an IAM role that includes permissions to access Lake Formation tables.
B.Create data filters to implement row-level security and cell-level security.
C.Create an AWS Lambda function that removes sensitive information before Lake Formation ingests the data.
D.Create an AWS Lambda function that periodically queries and removes sensitive information from Lake
Formation tables.
Answer: B
Explanation:
1. The key reasons are:Lake Formation data filters allow restricting access to rows or cells in data tables
based on conditions. This allows preventing access to sensitive data.Data filters are implemented within Lake
Formation and do not require additional coding or Lambda functions.Lambda functions to pre-process data or
purge tables would require ongoing development and maintenance.IAM roles only provide user-level
permissions, not row or cell level security.Data filters give granular access control over Lake Formation data
with minimal configuration, avoiding complex custom code.
2. You can create data filters based on the values of columns in a Lake Formation table. Easy. Lowest
operational overhead.
A.Deploy an interface VPC endpoint for Amazon EC2. Create an AWS Site-to-Site VPN connection between the
company and the VPC.
B.Deploy a gateway VPC endpoint for Amazon S3. Set up an AWS Direct Connect connection between the on-
premises network and the VPC.
C.Set up an AWS Transit Gateway connection from the VPC to the S3 buckets. Create an AWS Site-to-Site VPN
connection between the company and the VPC.
D.Set up proxy EC2 instances that have routes to NAT gateways. Configure the proxy EC2 instances to fetch S3
data and feed the application instances.
Answer: B
Explanation:
Gateway VPC Endpoint = no internet to access S3. Direct Connect = secure access to VPC.
The third-party vendor has received many 503 Service Unavailable Errors when sending data to the application.
When the data volume spikes, the compute capacity reaches its maximum limit and the application is unable to
process all requests.
Which design should a solutions architect recommend to provide a more scalable solution?
A.Use Amazon Kinesis Data Streams to ingest the data. Process the data using AWS Lambda functions.
B.Use Amazon API Gateway on top of the existing application. Create a usage plan with a quota limit for the
third-party vendor.
C.Use Amazon Simple Notification Service (Amazon SNS) to ingest the data. Put the EC2 instances in an Auto
Scaling group behind an Application Load Balancer.
D.Repackage the application as a container. Deploy the application using Amazon Elastic Container Service
(Amazon ECS) using the EC2 launch type with an Auto Scaling group.
Answer: A
Explanation:
The key reasons are: Kinesis Data Streams provides an auto-scaling stream that can handle large amounts of
streaming data ingestion and throughput. This removes the bottlenecks around receiving the data. AWS
Lambda can process and store the data in a scalable serverless manner, avoiding EC2 capacity limits. API
Gateway adds API management capabilities but does not improve the underlying scalability of the EC2
application .SNS is for event publishing/notifications, not large scale data ingestion. ECS still relies on EC2
capacity.
A.Configure an internet gateway. Update the S3 bucket policy to allow access from the internet gateway.
Update the application to use the new internet gateway.
B.Configure a VPN connection. Update the S3 bucket policy to allow access from the VPN connection. Update
the application to use the new VPN connection.
C.Configure a NAT gateway. Update the S3 bucket policy to allow access from the NAT gateway. Update the
application to use the new NAT gateway.
D.Configure a VPC endpoint. Update the S3 bucket policy to allow access from the VPC endpoint. Update the
application to use the new VPC endpoint.
Answer: D
Explanation:
1. The solution that will meet these requirements is to:Configure a VPC endpoint for Amazon S3Update the S3
bucket policy to allow access from the VPC endpointUpdate the application to use the new VPC endpointThe
key reasons are:VPC endpoints allow private connectivity from VPCs to AWS services like S3 without using an
internet gateway.The application can connect to S3 through the VPC endpoint while remaining in the private
subnet, without internet access.
2. VPC Endpoint for S3.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use the container application to encrypt the information by using AWS Key Management Service (AWS KMS).
B.Enable secrets encryption in the EKS cluster by using AWS Key Management Service (AWS KMS).
C.Implement an AWS Lambda function to encrypt the information by using AWS Key Management Service
(AWS KMS).
D.Use AWS Systems Manager Parameter Store to encrypt the information by using AWS Key Management
Service (AWS KMS).
Answer: B
Explanation:
Enabling secrets encryption in the EKS cluster by using AWS Key Management Service (AWS KMS) is the
least operationally overhead way to encrypt the sensitive information in the Kubernetes secrets object .When
you enable secrets encryption in the EKS cluster, AWS KMS encrypts the secrets before they are stored in
the EKS cluster. You do not need to make any changes to your container application or implement any
additional Lambda functions.
•Web and application servers that run on Amazon EC2 instances as part of Auto Scaling groups
•An Amazon RDS DB instance for data storage
A solutions architect needs to limit access to the application servers so that only the web servers can access them.
Answer: D
Explanation:
1. The key reasons are:An Application Load Balancer (ALB) allows directing traffic to the application servers
and provides access control via security groups.Security groups act as a firewall at the instance level and can
control access to the application servers from the web servers.Network ACLs work at the subnet level and are
less flexible for security groups for instance-level access control.VPC endpoints are used to provide private
access to AWS services, not for access between EC2 instances.AWS PrivateLink provides private connectivity
between VPCs, which is not required in this single VPC scenario.
2. ALB with Security Group is simplest solution.
A.Run the Amazon CloudWatch agent in the existing EKS cluster. View the metrics and logs in the CloudWatch
console.
B.Run AWS App Mesh in the existing EKS cluster. View the metrics and logs in the App Mesh console.
C.Configure AWS CloudTrail to capture data events. Query CloudTrail by using Amazon OpenSearch Service.
D.Configure Amazon CloudWatch Container Insights in the existing EKS cluster. View the metrics and logs in
the CloudWatch console.
Answer: D
Explanation:
1. The key reasons are:CloudWatch Container Insights automatically collects metrics and logs from containers
running in EKS clusters. This provides visibility into resource utilization, application performance, and
microservice interactions.The metrics and logs are stored in CloudWatch Logs and CloudWatch metrics for
central access.The CloudWatch console allows querying, filtering, and visualizing the metrics and logs in one
centralized place.
2. What Cloudwatch Container Insights is for.
The company recently experienced malicious attacks against its systems. The company needs a solution that
continuously monitors for malicious activity in the AWS account, workloads, and access patterns to the S3 bucket.
The solution must also report suspicious activity and display the information on a dashboard.
Which solution will meet these requirements?
Answer: C
Explanation:
The key reasons are: Amazon Guard Duty is a threat detection service that continuously monitors for malicious
activity and unauthorized behaviour. It analyzes AWS Cloud Trail, VPC Flow Logs, and DNS logs. GuardDuty
can detect threats like instance or S3 bucket compromise, malicious IP addresses, or unusual API
calls.Findings can be sent to AWS Security Hub which provides a centralized security dashboard and alerts.
Amazon Macie and Amazon Inspector do not monitor the breadth of activity that Guard Duty does. They focus
more on data security and application vulnerabilities respectively. AWS Config monitors for resource
configuration changes, not malicious activity.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
Answer: BE
Explanation:
1. Amazon EFS provides a scalable, high performance NFS file system that can be accessed from multiple
resources in AWS.AWS DataSync can perform the migration from the on-prem NFS server to EFS without
interruption to existing services.This avoids having to manually move the data which could cause downtime.
DataSync incrementally syncs changed data.EFS and DataSync together provide a cost-optimized approach
compared to using S3 or FSx, while still meeting the requirements.Manually copying 200 GB of data to AWS
would be slow and risky compared to using DataSync.
2. NFS file system = EFS, Use DataSync for the migration with NFS support.
A.Create an FSx for Windows File Server file system in us-east-1 that has a Single-AZ 2 deployment type. Use
AWS Backup to create a daily backup plan that includes a backup rule that copies the backup to us-west-2.
Configure AWS Backup Vault Lock in compliance mode for a target vault in us-west-2. Configure a minimum
duration of 5 years.
B.Create an FSx for Windows File Server file system in us-east-1 that has a Multi-AZ deployment type. Use
AWS Backup to create a daily backup plan that includes a backup rule that copies the backup to us-west-2.
Configure AWS Backup Vault Lock in governance mode for a target vault in us-west-2. Configure a minimum
duration of 5 years.
C.Create an FSx for Windows File Server file system in us-east-1 that has a Multi-AZ deployment type. Use
AWS Backup to create a daily backup plan that includes a backup rule that copies the backup to us-west-2.
Configure AWS Backup Vault Lock in compliance mode for a target vault in us-west-2. Configure a minimum
duration of 5 years.
D.Create an FSx for Windows File Server file system in us-east-1 that has a Single-AZ 2 deployment type. Use
AWS Backup to create a daily backup plan that includes a backup rule that copies the backup to us-west-2.
Configure AWS Backup Vault Lock in governance mode for a target vault in us-west-2. Configure a minimum
duration of 5 years.
Answer: C
Explanation:
Create an FSx for Windows File Server file system in us-east-1 that has a Multi-AZ deployment type. Use AWS
Backup to create a daily backup plan that includes a backup rule that copies the backup to us-west-2.
Configure AWS Backup Vault Lock in compliance mode for a target vault in us-west-2. Configure a minimum
duration of 5 years.
A.Create an IAM policy that prohibits changes to CloudTrail. and attach it to the root user.
B.Create a new trail in CloudTrail from within the developer accounts with the organization trails option
enabled.
C.Create a service control policy (SCP) that prohibits changes to CloudTrail, and attach it the developer
accounts.
D.Create a service-linked role for CloudTrail with a policy condition that allows changes only from an Amazon
Resource Name (ARN) in the management account.
Answer: C
Explanation:
Which type of storage should a solutions architect recommend to meet these requirements?
Answer: C
Explanation:
Which solution will meet this requirement with the LEAST operational effort?
A.Create a second S3 bucket in us-east-1. Use S3 Cross-Region Replication to copy photos from the existing S3
bucket to the second S3 bucket.
B.Create a cross-origin resource sharing (CORS) configuration of the existing S3 bucket. Specify us-east-1 in
the CORS rule's AllowedOrigin element.
C.Create a second S3 bucket in us-east-1 across multiple Availability Zones. Create an S3 Lifecycle rule to save
photos into the second S3 bucket.
D.Create a second S3 bucket in us-east-1. Configure S3 event notifications on object creation and update
events to invoke an AWS Lambda function to copy photos from the existing S3 bucket to the second S3 bucket.
Answer: A
Explanation:
S3 Cross-Region Replication handles automatically copying new objects added to the source bucket to the
destination bucket in a different region. It continuously replicates new photos without needing to manually
copy files or set up Lambda triggers. CORS only enables cross-origin access, it does not copy objects. Using
Lifecycle rules or Lambda functions requires custom code and logic to handle the copying.S3 Cross-Region
Replication provides automated replication that minimizes operational overhead.
Which solutions will meet these requirements and provide the MOST scalability? (Choose two.)
Answer: CD
Explanation:
The key reasons are: DynamoDB auto scaling allows the database to scale up and down dynamically based on
traffic patterns. This handles the large spike in traffic in the mornings and lower traffic later in the day.S3
combined with Cloud Front provides a highly scalable infrastructure for the static content. Cloud Front
caching improves performance. Aurora serverless could be an option but may not scale as seamlessly as
DynamoDB to the very high spike in users.EC2 Auto Scaling groups add complexity compared to S3/Cloud
Front for static content hosting.
What is the MOST operationally efficient solution that meets these requirements?
Answer: B
Explanation:
1. B. Configure AWS WAF.
2. SQL Injection and Cross-Site Scripting = WAF so Either B or D. Both B and D are valid options but the
question doesn't indicate a real need for CloudFront, so just use WAF with the API Gateway. Answer is B.
A.Create an IAM user for each user in the company. Attach the appropriate policies to each user.
B.Use Amazon Cognito with an Active Directory user pool. Create roles with the appropriate policies attached.
C.Define cross-account roles with the appropriate policies attached. Map the roles to the Active Directory
groups.
D.Configure Security Assertion Markup Language (SAML) 2 0-based federation. Create roles with the
appropriate policies attached Map the roles to the Active Directory groups.
Answer: D
Explanation:
Configure Security Assertion Markup Language (SAML) 2 0-based federation. Create roles with the
appropriate policies attached Map the roles to the Active Directory groups.
Which configuration should the solutions architect choose to meet these requirements?
Answer: C
Explanation:
Reference:
https://aws.amazon.com/about-aws/whats-new/2014/07/31/amazon-route-53-announces-domain-name-
registration-geo-routing-and-lower-pricing/
The company wants to migrate its data from the on-premises location to an Amazon S3 bucket. The company
needs a solution that will automatically validate the integrity of the data after the transfer.
A.Order an AWS Snowball Edge device. Configure the Snowball Edge device to perform the online data transfer
to an S3 bucket
B.Deploy an AWS DataSync agent on premises. Configure the DataSync agent to perform the online data
transfer to an S3 bucket.
C.Create an Amazon S3 File Gateway on premises Configure the S3 File Gateway to perform the online data
transfer to an S3 bucket
D.Configure an accelerator in Amazon S3 Transfer Acceleration on premises. Configure the accelerator to
perform the online data transfer to an S3 bucket.
Answer: B
Explanation:
Deploy an AWS DataSync agent on premises. Configure the DataSync agent to perform the online data
transfer to an S3 bucket.
Question: 627 CertyIQ
A company wants to migrate two DNS servers to AWS. The servers host a total of approximately 200 zones and
receive 1 million requests each day on average. The company wants to maximize availability while minimizing the
operational overhead that is related to the management of the two servers.
A.Create 200 new hosted zones in the Amazon Route 53 console Import zone files.
B.Launch a single large Amazon EC2 instance Import zone tiles. Configure Amazon CloudWatch alarms and
notifications to alert the company about any downtime.
C.Migrate the servers to AWS by using AWS Server Migration Service (AWS SMS). Configure Amazon
CloudWatch alarms and notifications to alert the company about any downtime.
D.Launch an Amazon EC2 instance in an Auto Scaling group across two Availability Zones. Import zone files. Set
the desired capacity to 1 and the maximum capacity to 3 for the Auto Scaling group. Configure scaling alarms
to scale based on CPU utilization.
Answer: A
Explanation:
Create 200 new hosted zones in the Amazon Route 53 console Import zone files.
Reference:
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/migrate-dns-domain-in-use.html
Which solution will meet these requirements with the LEAST operational overhead?
A.Configure AWS Config with a rule to report the incomplete multipart upload object count.
B.Create a service control policy (SCP) to report the incomplete multipart upload object count.
C.Configure S3 Storage Lens to report the incomplete multipart upload object count.
D.Create an S3 Multi-Region Access Point to report the incomplete multipart upload object count.
Answer: C
Explanation:
Configure S3 Storage Lens to report the incomplete multipart upload object count.
Reference:
https://aws.amazon.com/blogs/aws-cloud-financial-management/discovering-and-deleting-incomplete-
multipart-uploads-to-lower-amazon-s3-costs/
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an RDS manual snapshot. Upgrade to the new version of Amazon RDS for MySQL.
B.Use native backup and restore. Restore the data to the upgraded new version of Amazon RDS for MySQL.
C.Use AWS Database Migration Service (AWS DMS) to replicate the data to the upgraded new version of
Amazon RDS for MySQL.
D.Use Amazon RDS Blue/Green Deployments to deploy and test production changes.
Answer: D
Explanation:
Use Amazon RDS Blue/Green Deployments to deploy and test production changes.
How should the solutions architect address this issue in the MOST cost-effective manner?
A.Create a script that runs locally on an Amazon EC2 Reserved Instance that is triggered by a cron job.
B.Create an AWS Lambda function triggered by an Amazon EventBridge scheduled event.
C.Use an Amazon Elastic Container Service (Amazon ECS) Fargate task triggered by an Amazon EventBridge
scheduled event.
D.Use an Amazon Elastic Container Service (Amazon ECS) task running on Amazon EC2 triggered by an Amazon
EventBridge scheduled event.
Answer: C
Explanation:
Use an Amazon Elastic Container Service (Amazon ECS) Fargate task triggered by an Amazon EventBridge
scheduled event.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon Neptune to store the information. Use Amazon Kinesis Data Streams to process changes in the
database.
B.Use Amazon Neptune to store the information. Use Neptune Streams to process changes in the database.
C.Use Amazon Quantum Ledger Database (Amazon QLDB) to store the information. Use Amazon Kinesis Data
Streams to process changes in the database.
D.Use Amazon Quantum Ledger Database (Amazon QLDB) to store the information. Use Neptune Streams to
process changes in the database.
Answer: B
Explanation:
Use Amazon Neptune to store the information. Use Neptune Streams to process changes in the database.
Which storage solution should a solutions architect recommend to meet these requirements?
A.Store the data in Amazon S3 Glacier. Update the S3 Glacier vault policy to allow access to the application
instances.
B.Store the data in an Amazon Elastic Block Store (Amazon EBS) volume. Mount the EBS volume on the
application instances.
C.Store the data in an Amazon Elastic File System (Amazon EFS) file system. Mount the file system on the
application instances.
D.Store the data in an Amazon Elastic Block Store (Amazon EBS) Provisioned IOPS volume shared between the
application instances.
Answer: C
Explanation:
Store the data in an Amazon Elastic File System (Amazon EFS) file system. Mount the file system on the
application instances.
Answer: C
Explanation:
Create a read replica from the source DB instance. Serve read traffic from the read replica.
Reference:
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ReadRepl.html
Question: 634 CertyIQ
A company collects 10 GB of telemetry data daily from various machines. The company stores the data in an
Amazon S3 bucket in a source data account.
The company has hired several consulting agencies to use this data for analysis. Each agency needs read access to
the data for its analysts. The company must share the data from the source data account by choosing a solution
that maximizes security and operational efficiency.
Answer: C
Explanation:
Configure cross-account access for the S3 bucket to the accounts that the agencies own.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an AWS Lambda function to copy the data to an Amazon S3 bucket. Replicate the S3 bucket to the
secondary Region.
B.Create a backup of the FSx for ONTAP volumes by using AWS Backup. Copy the volumes to the secondary
Region. Create a new FSx for ONTAP instance from the backup.
C.Create an FSx for ONTAP instance in the secondary Region. Use NetApp SnapMirror to replicate data from
the primary Region to the secondary Region.
D.Create an Amazon Elastic File System (Amazon EFS) volume. Migrate the current data to the volume.
Replicate the volume to the secondary Region.
Answer: C
Explanation:
Create an FSx for ONTAP instance in the secondary Region. Use NetApp SnapMirror to replicate data from
the primary Region to the secondary Region.
A.Create an SNS subscription that processes the event in Amazon Elastic Container Service (Amazon ECS)
before the event runs in Lambda.
B.Create an SNS subscription that processes the event in Amazon Elastic Kubernetes Service (Amazon EKS)
before the event runs in Lambda
C.Create an SNS subscription that sends the event to Amazon Simple Queue Service (Amazon SQS). Configure
the SOS queue to trigger a Lambda function.
D.Create an SNS subscription that sends the event to AWS Server Migration Service (AWS SMS). Configure the
Lambda function to poll from the SMS event.
Answer: C
Explanation:
Create an SNS subscription that sends the event to Amazon Simple Queue Service (Amazon SQS). Configure
the SOS queue to trigger a Lambda function.
Which combination ofAWS services would meet these requirements? (Choose two.)
A.AWS Fargate
B.AWS Lambda
C.Amazon DynamoDB
D.Amazon EC2 Auto Scaling
E.MySQL-compatible Amazon Aurora
Answer: BC
Explanation:
B.AWS Lambda.
C. Amazon DynamoDB.
A.Use an AWS Lambda function to create an S3 presigned URL. Instruct employees to use the URL.
B.Create an IAM user for each employee. Create an IAM policy for each employee to allow S3 access. Instruct
employees to use the AWS Management Console.
C.Create an S3 File Gateway. Create a share for uploading and a share for downloading. Allow employees to
mount shares on their local computers to use S3 File Gateway.
D.Configure AWS Transfer Family SFTP endpoints. Select the custom identity provider options. Use AWS
Secrets Manager to manage the user credentials Instruct employees to use Transfer Family.
Answer: A
Explanation:
Use an AWS Lambda function to create an S3 presigned URL. Instruct employees to use the URL.
A solutions architect has observed that incoming traffic seems to favor one EC2 instance, resulting in latency for
some requests.
Answer: A
Explanation:
Reference:
https://repost.aws/knowledge-center/elb-fix-unequal-traffic-routing
Answer: BE
Explanation:
B. Grant the decrypt permission for the Lambda IAM role in the KMS key's policy.
E. Create a new IAM role with the kms: decrypt permission and attach the execution role to the Lambda
function.
Which solution is the MOST scalable and cost-effective way to meet these requirements?
A.Enable Cost and Usage Reports in the management account. Deliver reports to Amazon Kinesis. Use Amazon
EMR for analysis.
B.Enable Cost and Usage Reports in the management account. Deliver the reports to Amazon S3 Use Amazon
Athena for analysis.
C.Enable Cost and Usage Reports for member accounts. Deliver the reports to Amazon S3 Use Amazon
Redshift for analysis.
D.Enable Cost and Usage Reports for member accounts. Deliver the reports to Amazon Kinesis. Use Amazon
QuickSight tor analysis.
Answer: B
Explanation:
Enable Cost and Usage Reports in the management account. Deliver the reports to Amazon S3 Use Amazon
Athena for analysis.
Reference:
https://aws.amazon.com/blogs/big-data/analyze-amazon-s3-storage-costs-using-aws-cost-and-usage-
reports-amazon-s3-inventory-and-amazon-athena/
Answer: A
Explanation:
https://docs.aws.amazon.com/autoscaling/ec2/userguide/autoscaling-load-balancer.html
Question: 643 CertyIQ
A company runs several websites on AWS for its different brands. Each website generates tens of gigabytes of
web traffic logs each day. A solutions architect needs to design a scalable solution to give the company's
developers the ability to analyze traffic patterns across all the company's websites. This analysis by the
developers will occur on demand once a week over the course of several months. The solution must support
queries with standard SQL.
A.Store the logs in Amazon S3. Use Amazon Athena tor analysis.
B.Store the logs in Amazon RDS. Use a database client for analysis.
C.Store the logs in Amazon OpenSearch Service. Use OpenSearch Service for analysis.
D.Store the logs in an Amazon EMR cluster Use a supported open-source framework for SQL-based analysis.
Answer: A
Explanation:
Store the logs in Amazon S3. Use Amazon Athena tor analysis.
A.Use the AWS Certificate Manager (ACM) console to request a public certificate for the apex top domain
example com and a wildcard certificate for *.example.com.
B.Use the AWS Certificate Manager (ACM) console to request a private certificate for the apex top domain
example.com and a wildcard certificate for *.example.com.
C.Use the AWS Certificate Manager (ACM) console to request a public and private certificate for the apex top
domain example.com.
D.Validate domain ownership by email address. Switch to DNS validation by adding the required DNS records to
the DNS provider.
E.Validate domain ownership for the domain by adding the required DNS records to the DNS provider.
Answer: AE
Explanation:
A. Use the AWS Certificate Manager (ACM) console to request a public certificate for the apex top domain
example com and a wildcard certificate for *.example.com.
E. Validate domain ownership for the domain by adding the required DNS records to the DNS provider.
Which solution will meet these requirements with the LEAST operational overhead?
Answer: B
Explanation:
Use an AWS Key Management Service (AWS KMS) external key store backed by an external key manager.
Reference:
https://docs.aws.amazon.com/kms/latest/developerguide/keystore-external.html
A.Use Amazon Elastic File System (Amazon EFS) as a shared file system. Access the dataset from Amazon EFS.
B.Mount an Amazon S3 bucket to serve as the shared file system. Perform postprocessing directly from the S3
bucket.
C.Use Amazon FSx for Lustre as a shared file system. Link the file system to an Amazon S3 bucket for
postprocessing.
D.Configure AWS Resource Access Manager to share an Amazon S3 bucket so that it can be mounted to all
instances for processing and postprocessing.
Answer: C
Explanation:
Amazon FSx for Lustre is a fully managed, high-performance file system optimized for HPC workloads. It is
designed to deliver sub-millisecond latencies and high throughput, making it ideal for applications that
require parallel access to shared storage, such as simulations and data analytics.
Answer: C
Explanation:
A solutions architect must identify a highly available cloud storage solution that can handle large amounts of
sustained throughput. Files that are stored in the solution should be accessible to thousands of compute instances
that will simultaneously access and process the entire dataset.
Answer: B
Explanation:
A.Configure the General Purpose SSD (gp2) EBS volume storage type and provision 15,000 IOPS.
B.Configure the Provisioned IOPS SSD (io1) EBS volume storage type and provision 15,000 IOPS.
C.Configure the General Purpose SSD (gp3) EBS volume storage type and provision 15,000 IOPS.
D.Configure the EBS magnetic volume type to achieve maximum IOPS.
Answer: C
Explanation:
Configure the General Purpose SSD (gp3) EBS volume storage type and provision 15,000 IOPS.
Question: 650 CertyIQ
A company wants to migrate its on-premises Microsoft SQL Server Enterprise edition database to AWS. The
company's online application uses the database to process transactions. The data analysis team uses the same
production database to run reports for analytical processing. The company wants to reduce operational overhead
by moving to managed services wherever possible.
Which solution will meet these requirements with the LEAST operational overhead?
A.Migrate to Amazon RDS for Microsoft SOL Server. Use read replicas for reporting purposes
B.Migrate to Microsoft SQL Server on Amazon EC2. Use Always On read replicas for reporting purposes
C.Migrate to Amazon DynamoDB. Use DynamoDB on-demand replicas for reporting purposes
D.Migrate to Amazon Aurora MySQL. Use Aurora read replicas for reporting purposes
Answer: A
Explanation:
Migrate to Amazon RDS for Microsoft SOL Server. Use read replicas for reporting purposes.
A developer will use S3 Standard storage for the first 180 days. The developer needs to configure an S3 Lifecycle
rule.
A.Transition the objects to S3 One Zone-Infrequent Access (S3 One Zone-IA) after 180 days. S3 Glacier Instant
Retrieval after 360 days, and S3 Glacier Deep Archive after 5 years.
B.Transition the objects to S3 One Zone-Infrequent Access (S3 One Zone-IA) after 180 days. S3 Glacier Flexible
Retrieval after 360 days, and S3 Glacier Deep Archive after 5 years.
C.Transition the objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 180 days, S3 Glacier Instant
Retrieval after 360 days, and S3 Glacier Deep Archive after 5 years.
D.Transition the objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 180 days, S3 Glacier Flexible
Retrieval after 360 days, and S3 Glacier Deep Archive after 5 years.
Answer: C
Explanation:
Transition the objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 180 days, S3 Glacier Instant
Retrieval after 360 days, and S3 Glacier Deep Archive after 5 years.
Reference:
https://aws.amazon.com/s3/storage-classes/glacier/
Question: 652 CertyIQ
A company has a large data workload that runs for 6 hours each day. The company cannot lose any data while the
process is running. A solutions architect is designing an Amazon EMR cluster configuration to support this critical
data workload.
A.Configure a long-running cluster that runs the primary node and core nodes on On-Demand Instances and the
task nodes on Spot Instances.
B.Configure a transient cluster that runs the primary node and core nodes on On-Demand Instances and the
task nodes on Spot Instances.
C.Configure a transient cluster that runs the primary node on an On-Demand Instance and the core nodes and
task nodes on Spot Instances.
D.Configure a long-running cluster that runs the primary node on an On-Demand Instance, the core nodes on
Spot Instances, and the task nodes on Spot Instances.
Answer: B
Explanation:
A transient cluster provides cost savings because it runs only during the computation time, and it provides
scalability and flexibility in a cloud environment. Option C (transient cluster with On-Demand primary node
and Spot core and task nodes) exposes the core nodes to Spot Instance interruptions, which may not be
acceptable for a workload that cannot lose any data.
A.Move the specific AWS account to a new organizational unit (OU) in Organizations from the management
account. Create a service control policy (SCP) that requires all existing resources to have the correct cost
center tag before the resources are created. Apply the SCP to the new OU.
B.Create an AWS Lambda function to tag the resources after the Lambda function looks up the appropriate
cost center from the RDS database. Configure an Amazon EventBridge rule that reacts to AWS CloudTrail
events to invoke the Lambda function.
C.Create an AWS CloudFormation stack to deploy an AWS Lambda function. Configure the Lambda function to
look up the appropriate cost center from the RDS database and to tag resources. Create an Amazon
EventBridge scheduled rule to invoke the CloudFormation stack.
D.Create an AWS Lambda function to tag the resources with a default value. Configure an Amazon EventBridge
rule that reacts to AWS CloudTrail events to invoke the Lambda function when a resource is missing the cost
center tag.
Answer: B
Explanation:
This solution utilizes AWS Lambda and Amazon EventBridge to automate the tagging process based on
information from the RDS database and CloudTrail events.AWS Lambda Function: Create a Lambda function
that can look up the cost center information from the RDS database and tag resources accordingly.Amazon
EventBridge Rule: Set up an EventBridge rule to react to AWS CloudTrail events. The rule triggers the Lambda
function whenever a resource is created, allowing dynamic tagging based on the cost center associated with
the user in the RDS database.This solution provides automation, ensuring that resources are tagged
appropriately with the cost center ID of the user who created the resource. It also allows for flexibility in
updating cost center information without modifying the infrastructure.
The company wants to redesign the architecture to be highly available and to use AWS managed solutions.
A.Use AWS Elastic Beanstalk to host the static content and the PHP application. Configure Elastic Beanstalk to
deploy its EC2 instance into a public subnet. Assign a public IP address.
B.Use AWS Lambda to host the static content and the PHP application. Use an Amazon API Gateway REST API
to proxy requests to the Lambda function. Set the API Gateway CORS configuration to respond to the domain
name. Configure Amazon ElastiCache for Redis to handle session information.
C.Keep the backend code on the EC2 instance. Create an Amazon ElastiCache for Redis cluster that has Multi-
AZ enabled. Configure the ElastiCache for Redis cluster in cluster mode. Copy the frontend resources to
Amazon S3. Configure the backend code to reference the EC2 instance.
D.Configure an Amazon CloudFront distribution with an Amazon S3 endpoint to an S3 bucket that is configured
to host the static content. Configure an Application Load Balancer that targets an Amazon Elastic Container
Service (Amazon ECS) service that runs AWS Fargate tasks for the PHP application. Configure the PHP
application to use an Amazon ElastiCache for Redis cluster that runs in multiple Availability Zones.
Answer: D
Explanation:
Configure an Amazon CloudFront distribution with an Amazon S3 endpoint to an S3 bucket that is configured
to host the static content. Configure an Application Load Balancer that targets an Amazon Elastic Container
Service (Amazon ECS) service that runs AWS Fargate tasks for the PHP application. Configure the PHP
application to use an Amazon ElastiCache for Redis cluster that runs in multiple Availability Zones
The application must be available publicly over the internet as an endpoint. A WAF must be applied to the endpoint
for additional security. Session affinity (sticky sessions) must be configured on the endpoint.
A.Create a public Network Load Balancer. Specify the application target group.
B.Create a Gateway Load Balancer. Specify the application target group.
C.Create a public Application Load Balancer. Specify the application target group.
D.Create a second target group. Add Elastic IP addresses to the EC2 instances.
E.Create a web ACL in AWS WAF. Associate the web ACL with the endpoint
Answer: CE
Explanation:
C. Create a public Application Load Balancer. Specify the application target group.
E. Create a web ACL in AWS WAF. Associate the web ACL with the endpoint.
A.Store images in Amazon Elastic Block Store (Amazon EBS). Use a web server that runs on Amazon EC2.
B.Store images in Amazon Elastic File System (Amazon EFS). Use a web server that runs on Amazon EC2.
C.Store images in Amazon S3 Standard. Use S3 Standard to directly deliver images by using a static website.
D.Store images in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Use S3 Standard-IA to directly
deliver images by using a static website.
Answer: D
Explanation:
Store images in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Use S3 Standard-IA to directly
deliver images by using a static website.
A.Create VPC security groups in the organization's management account. Update the security groups when a
CIDR range update is necessary.
B.Create a VPC customer managed prefix list that contains the list of CIDRs. Use AWS Resource Access
Manager (AWS RAM) to share the prefix list across the organization. Use the prefix list in the security groups
across the organization.
C.Create an AWS managed prefix list. Use an AWS Security Hub policy to enforce the security group update
across the organization. Use an AWS Lambda function to update the prefix list automatically when the CIDR
ranges change.
D.Create security groups in a central administrative AWS account. Create an AWS Firewall Manager common
security group policy for the whole organization. Select the previously created security groups as primary
groups in the policy.
Answer: B
Explanation:
Create a VPC customer managed prefix list that contains the list of CIDRs. Use AWS Resource Access
Manager (AWS RAM) to share the prefix list across the organization. Use the prefix list in the security groups
across the organization.
Reference:
https://docs.aws.amazon.com/vpc/latest/userguide/managed-prefix-lists.html
Which solution will meet these requirements with the LEAST latency? (Choose two.)
Answer: AE
Explanation:
https://aws.amazon.com/fsx/netapp-
ontap/features/#:~:text=Amazon%20FSx%20for%20NetApp%20ONTAP%20provides%20access%20to%20shared%20
"Amazon FSx for NetApp ONTAP provides access to shared file storage over all versions of the Network File
System (NFS) and Server Message Block (SMB) protocols, and also supports multi-protocol access (i.e.
concurrent NFS and SMB access) to the same data."
Which AWS service should a solutions architect use to meet these requirements?
Answer: C
Explanation:
Answer: D
Explanation:
Configure a scheduled scaling policy for the Auto Scaling group to launch new instances before peak hours.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon DynamoDB with connection pooling with a target group configuration for the database. Change
the applications to use the DynamoDB endpoint.
B.Use Amazon RDS Proxy with a target group for the database. Change the applications to use the RDS Proxy
endpoint.
C.Use a custom proxy that runs on Amazon EC2 as an intermediary to the database. Change the applications to
use the custom proxy endpoint.
D.Use an AWS Lambda function to provide connection pooling with a target group configuration for the
database. Change the applications to use the Lambda function.
Answer: B
Explanation:
Amazon RDS Proxy is a fully managed, highly available database proxy for Amazon Relational Database
Service (RDS) that makes applications more resilient to database failures. Many applications, including those
built on modern serverless architectures, can have a large number of open connections to the database server
and may open and close database connections at a high rate, exhausting database memory and compute
resources. Amazon RDS Proxy allows applications to pool and share connections established with the
database, improving database efficiency and application scalability. With RDS Proxy, failover times for Aurora
and RDS databases are reduced by up to 66%
Which solution will meet these requirements with the LEAST operational overhead?
A.Use logs in Amazon CloudWatch Logs to monitor the storage utilization of Amazon EBS. Use Amazon EBS
Elastic Volumes to reduce the size of the EBS volumes.
B.Use a custom script to monitor space usage. Use Amazon EBS Elastic Volumes to reduce the size of the EBS
volumes.
C.Delete all expired and unused snapshots to reduce snapshot costs.
D.Delete all nonessential snapshots. Use Amazon Data Lifecycle Manager to create and manage the snapshots
according to the company's snapshot policy requirements.
Answer: D
Explanation:
This option involves managing snapshots efficiently to optimize costs with minimal operational
overhead.Delete all nonessential snapshots: This reduces costs by eliminating unnecessary snapshot
storage.Use Amazon Data Lifecycle Manager (DLM): DLM can automate the creation and deletion of
snapshots based on defined policies. This reduces operational overhead by automating snapshot management
according to the company's snapshot policy requirements.
A.Create a new AWS Key Management Service (AWS KMS) customer managed key to encrypt both the S3
bucket and the RDS for MySQL database. Ensure that the KMS key policy includes encrypt and decrypt
permissions for the ECS task execution role.
B.Create an AWS Key Management Service (AWS KMS) AWS managed key to encrypt both the S3 bucket and
the RDS for MySQL database. Ensure that the S3 bucket policy specifies the ECS task execution role as a user.
C.Create an S3 bucket policy that restricts bucket access to the ECS task execution role. Create a VPC
endpoint for Amazon RDS for MySQL. Update the RDS for MySQL security group to allow access from only the
subnets that the ECS cluster will generate tasks in.
D.Create a VPC endpoint for Amazon RDS for MySQL. Update the RDS for MySQL security group to allow
access from only the subnets that the ECS cluster will generate tasks in. Create a VPC endpoint for Amazon S3.
Update the S3 bucket policy to allow access from only the S3 VPC endpoint.
Answer: D
Explanation:
1. Option D is the most comprehensive solution as it leverages VPC endpoints for both Amazon RDS and
Amazon S3, along with proper network-level controls to restrict access to only the necessary resources from
the ECS cluster.
2. Create a VPC endpoint for Amazon RDS for MySQL: This ensures that the ECS cluster can access the RDS
database directly within the same Virtual Private Cloud (VPC), without having to go over the internet. By
updating the security group to allow access only from the specific subnets that the ECS cluster will generate
tasks in, you limit access to only the authorized entities.Create a VPC endpoint for Amazon S3: This allows the
ECS cluster to access the S3 bucket directly within the same VPC. By updating the S3 bucket policy to allow
access only from the S3 VPC endpoint, you restrict access to the designated VPC, ensuring that only
authorized resources can access the S3 bucket.
The company wants to migrate the application to AWS to improve latency. The company also wants to scale the
application automatically when application demand increases. The company will use AWS Elastic Beanstalk for
application deployment.
A.Configure an Elastic Beanstalk environment to use burstable performance instances in unlimited mode.
Configure the environment to scale based on requests.
B.Configure an Elastic Beanstalk environment to use compute optimized instances. Configure the environment
to scale based on requests.
C.Configure an Elastic Beanstalk environment to use compute optimized instances. Configure the environment
to scale on a schedule.
D.Configure an Elastic Beanstalk environment to use burstable performance instances in unlimited mode.
Configure the environment to scale on predictive metrics.
Answer: D
Explanation:
In this scenario, the application experiences latency issues during peak hours with a sudden increase in CPU
utilization. Using burstable performance instances in unlimited mode allows the application to burst beyond
the baseline performance when needed. Configuring the environment to scale on predictive metrics enables
proactive scaling based on anticipated increases in demand.
A.Use AWS Organizations to set up the infrastructure. Use AWS Config to track changes.
B.Use AWS CloudFormation to set up the infrastructure. Use AWS Config to track changes.
C.Use AWS Organizations to set up the infrastructure. Use AWS Service Catalog to track changes.
D.Use AWS CloudFormation to set up the infrastructure. Use AWS Service Catalog to track changes.
Answer: B
Explanation:
Use AWS Cloud Formation to set up the infrastructure. Use AWS Config to track changes.
Question: 666 CertyIQ
A startup company is hosting a website for its customers on an Amazon EC2 instance. The website consists of a
stateless Python application and a MySQL database. The website serves only a small amount of traffic. The
company is concerned about the reliability of the instance and needs to migrate to a highly available architecture.
The company cannot modify the application code.
Which combination of actions should a solutions architect take to achieve high availability for the website?
(Choose two.)
Answer: BE
Explanation:
E. Create an Application Load Balancer to distribute traffic to an Auto Scaling group of EC2 instances that are
distributed across two Availability Zones.
A.Create gateway endpoints for Amazon S3. Use the gateway endpoints to securely access the data from the
Region and the on-premises location.
B.Create a gateway in AWS Transit Gateway to access Amazon S3 securely from the Region and the on-
premises location.
C.Create interface endpoints for Amazon S3. Use the interface endpoints to securely access the data from the
Region and the on-premises location.
D.Use an AWS Key Management Service (AWS KMS) key to access the data securely from the Region and the
on-premises location.
Answer: C
Explanation:
A solutions architect needs to design a solution that gives the development team the ability to create resources
only if the application name tag has an approved value.
A.Create an IAM group that has a conditional Allow policy that requires the application name tag to be specified
for resources to be created.
B.Create a cross-account role that has a Deny policy for any resource that has the application name tag.
C.Create a resource group in AWS Resource Groups to validate that the tags are applied to all resources in all
accounts.
D.Create a tag policy in Organizations that has a list of allowed application names.
Answer: D
Explanation:
Create a tag policy in Organizations that has a list of allowed application names.
Reference:
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_tag-policies.html
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon EventBridge to schedule a custom AWS Lambda function to rotate the password every 30 days.
B.Use the modify-db-instance command in the AWS CLI to change the password.
C.Integrate AWS Secrets Manager with Amazon RDS for PostgreSQL to automate password rotation.
D.Integrate AWS Systems Manager Parameter Store with Amazon RDS for PostgreSQL to automate password
rotation.
Answer: C
Explanation:
Integrate AWS Secrets Manager with Amazon RDS for PostgreSQL to automate password rotation.
Reference:
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html
A.Choose on-demand mode. Update the read and write capacity units appropriately.
B.Choose provisioned mode. Update the read and write capacity units appropriately.
C.Purchase DynamoDB reserved capacity for a 1-year term.
D.Purchase DynamoDB reserved capacity for a 3-year term.
Answer: B
Explanation:
Provisioned Mode (Option B): Provisioned mode allows you to specify the desired read and write capacity
units. Since the workload occurs once a week for 4 hours, you can provision the read and write capacity units
accordingly to handle the expected load during that time. This can be a more cost-effective option than on-
demand pricing for predictable workloads.
The company needs a solution to prevent unusual spending. The solution must monitor costs and notify
responsible stakeholders in the event of unusual spending.
Answer: B
Explanation:
AWS Cost Anomaly Detection (Option B): AWS Cost Anomaly Detection is designed to automatically detect
unusual spending patterns based on machine learning algorithms. It can identify anomalies and send
notifications when it detects unexpected changes in spending. This aligns well with the requirement to
prevent unusual spending and notify stakeholders.
Reference:
https://aws.amazon.com/aws-cost-management/aws-cost-anomaly-detection/
Which solution will meet these requirements with the LEAST operational overhead?
A.Create external tables in a Spark catalog. Configure jobs in AWS Glue to query the data.
B.Configure an AWS Glue crawler to crawl the data. Configure Amazon Athena to query the data.
C.Create external tables in a Hive metastore. Configure Spark jobs in Amazon EMR to query the data.
D.Configure an AWS Glue crawler to crawl the data. Configure Amazon Kinesis Data Analytics to use SQL to
query the data.
Answer: B
Explanation:
AWS Glue with Athena (Option B): AWS Glue is a fully managed extract, transform, and load (ETL) service, and
Athena is a serverless query service that allows you to analyze data directly in Amazon S3 using SQL queries.
By configuring an AWS Glue crawler to crawl the data, you can create a schema for the data, and then use
Athena to query the data directly without the need to load it into a separate database. This minimizes
operational overhead.
A.Use AWS DataSync to copy data that is older than 7 days from the SMB file server to AWS.
B.Create an Amazon S3 File Gateway to increase the company's storage space. Create an S3 Lifecycle policy to
transition the data to S3 Glacier Deep Archive after 7 days.
C.Create an Amazon FSx File Gateway to increase the company's storage space. Create an Amazon S3
Lifecycle policy to transition the data after 7 days.
D.Configure access to Amazon S3 for each user. Create an S3 Lifecycle policy to transition the data to S3
Glacier Flexible Retrieval after 7 days.
Answer: B
Explanation:
Create an Amazon S3 File Gateway to increase the company's storage space. Create an S3 Lifecycle policy to
transition the data to S3 Glacier Deep Archive after 7 days.
Reference:
https://docs.aws.amazon.com/filegateway/latest/files3/file-gateway-concepts.html
Question: 674 CertyIQ
A company runs a web application on Amazon EC2 instances in an Auto Scaling group. The application uses a
database that runs on an Amazon RDS for PostgreSQL DB instance. The application performs slowly when traffic
increases. The database experiences a heavy read load during periods of high traffic.
Which actions should a solutions architect take to resolve these performance issues? (Choose two.)
Answer: BD
Explanation:
B. Create a read replica for the DB instance. Configure the application to send read traffic to the read replica.
By creating a read replica, you offload read traffic from the primary DB instance to the replica, distributing the
load and improving overall performance during periods of heavy read traffic. D. Create an Amazon Elasti
Cache cluster. Configure the application to cache query results in the ElastiCache cluster.Amazon
ElastiCache can be used to cache frequently accessed data, reducing the load on the database. This is
particularly effective for read-heavy workloads, as it allows the application to retrieve data from the cache
rather than making repeated database queries.
Which solution will meet these requirements with the LEAST administrative effort?
A.Create an IAM role that has permission to delete snapshots. Attach the role to a new EC2 instance. Use the
AWS CLI from the new EC2 instance to delete snapshots.
B.Create an IAM policy that denies snapshot deletion. Attach the policy to the storage administrator user.
C.Add tags to the snapshots. Create retention rules in Recycle Bin for EBS snapshots that have the tags.
D.Lock the EBS snapshots to prevent deletion.
Answer: D
Explanation:
Locking EBS Snapshots (Option D): The "lock" feature in AWS allows you to prevent accidental deletion of
resources, including EBS snapshots. This can be set at the snapshot level, providing a straightforward and
effective way to meet the requirements without changing the administrative rights of the storage
administrator user.
Question: 676 CertyIQ
A company's application uses Network Load Balancers, Auto Scaling groups, Amazon EC2 instances, and
databases that are deployed in an Amazon VPC. The company wants to capture information about traffic to and
from the network interfaces in near real time in its Amazon VPC. The company wants to send the information to
Amazon OpenSearch Service for analysis.
A.Create a log group in Amazon CloudWatch Logs. Configure VPC Flow Logs to send the log data to the log
group. Use Amazon Kinesis Data Streams to stream the logs from the log group to OpenSearch Service.
B.Create a log group in Amazon CloudWatch Logs. Configure VPC Flow Logs to send the log data to the log
group. Use Amazon Kinesis Data Firehose to stream the logs from the log group to OpenSearch Service.
C.Create a trail in AWS CloudTrail. Configure VPC Flow Logs to send the log data to the trail. Use Amazon
Kinesis Data Streams to stream the logs from the trail to OpenSearch Service.
D.Create a trail in AWS CloudTrail. Configure VPC Flow Logs to send the log data to the trail. Use Amazon
Kinesis Data Firehose to stream the logs from the trail to OpenSearch Service.
Answer: B
Explanation:
Amazon CloudWatch Logs and VPC Flow Logs (Option B): VPC Flow Logs capture information about the IP
traffic going to and from network interfaces in a VPC. By configuring VPC Flow Logs to send the log data to a
log group in Amazon CloudWatch Logs, you can then use Amazon Kinesis Data Firehose to stream the logs
from the log group to Amazon OpenSearch Service for analysis. This approach provides near real-time
streaming of logs to the analytics service.
The company needs a dedicated EKS cluster for development work. The company will use the development cluster
infrequently to test the resiliency of the application. The EKS cluster must manage all the nodes.
Answer: A
Explanation:
A.Use default server-side encryption with Amazon S3 managed encryption keys (SSE-S3) to store the sensitive
data.
B.Create a customer managed key by using AWS Key Management Service (AWS KMS). Use the new key to
encrypt the S3 objects by using server-side encryption with AWS KMS keys (SSE-KMS).
C.Create an AWS managed key by using AWS Key Management Service (AWS KMS). Use the new key to
encrypt the S3 objects by using server-side encryption with AWS KMS keys (SSE-KMS).
D.Download S3 objects to an Amazon EC2 instance. Encrypt the objects by using customer managed keys.
Upload the encrypted objects back into Amazon S3.
Answer: B
Explanation:
SSE-KMS with Customer Managed Key (Option B): This option allows you to create a customer managed key
using AWS KMS. With a customer managed key, you have full control over key lifecycle management,
including the ability to create, rotate, and disable keys with minimal effort. SSE-KMS also integrates with
AWS Identity and Access Management (IAM) for fine-grained access control.
Answer: ACE
Explanation:
A.Create an AWS DataSync location for both the destination S3 bucket and the EFS file system. Create a task
for the destination S3 bucket and the EFS file system. Set the transfer mode to transfer only data that has
changed.
B.Create an AWS Lambda function. Mount the file system to the function. Set up an S3 event notification to
invoke the function when files are created and changed in Amazon S3. Configure the function to copy files to
the file system and the destination S3 bucket.
C.Create an AWS DataSync location for both the destination S3 bucket and the EFS file system. Create a task
for the destination S3 bucket and the EFS file system. Set the transfer mode to transfer all data.
D.Launch an Amazon EC2 instance in the same VPC as the file system. Mount the file system. Create a script to
routinely synchronize all objects that changed in the origin S3 bucket to the destination S3 bucket and the
mounted file system.
Answer: A
Explanation:
AWS DataSync (Option A): AWS DataSync is designed for efficient and reliable copying of data between
different storage solutions. By setting up an AWS DataSync task with the transfer mode set to transfer only
data that has changed, you ensure that only the new or modified files are copied. This minimizes data transfer
and operational overhead. Transfer only data that has changed – DataSync copies only the data and metadata
that differs between the source and destination location.Transfer all data – DataSync copies everything in the
source to the destination without comparing differences between the locations.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create a customer managed key. Use the key to encrypt the EBS volumes.
B.Use an AWS managed key to encrypt the EBS volumes. Use the key to configure automatic key rotation.
C.Create an external KMS key with imported key material. Use the key to encrypt the EBS volumes.
D.Use an AWS owned key to encrypt the EBS volumes.
Answer: A
Explanation:
Create a customer managed key. Use the key to encrypt the EBS volumes.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Use an IAM policy that allows users to create only encrypted Amazon Elastic Block Store (Amazon EBS)
volumes. Use AWS Config and AWS Systems Manager to automate the detection and remediation of
unencrypted EBS volumes.
B.Use AWS Key Management Service (AWS KMS) to manage access to encrypted Amazon Elastic Block Store
(Amazon EBS) volumes. Use AWS Lambda and Amazon EventBridge to automate the detection and remediation
of unencrypted EBS volumes.
C.Use Amazon Macie to detect unencrypted Amazon Elastic Block Store (Amazon EBS) volumes. Use AWS
Systems Manager Automation rules to automatically encrypt existing and new EBS volumes.
D.Use Amazon inspector to detect unencrypted Amazon Elastic Block Store (Amazon EBS) volumes. Use AWS
Systems Manager Automation rules to automatically encrypt existing and new EBS volumes.
Answer: A
Explanation:
IAM Policy and AWS Config (Option A): By creating an IAM policy that allows users to create only encrypted
EBS volumes, you proactively prevent the creation of unencrypted volumes. Using AWS Config, you can set up
rules to detect noncompliant resources, and AWS Systems Manager Automation can be used for automated
remediation. This approach provides a proactive and automated solution.
A.Migrate the web tier to Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer.
B.Migrate the database to Amazon EC2 instances in an Auto Scaling group behind a Network Load Balancer.
C.Migrate the database to an Amazon RDS Multi-AZ deployment.
D.Migrate the web tier to an AWS Lambda function.
E.Migrate the database to an Amazon DynamoDB table.
Answer: AC
Explanation:
Web Tier Migration (Option A): Migrating the web tier to Amazon EC2 instances in an Auto Scaling group
behind an Application Load Balancer (ALB) provides horizontal scalability, automatic scaling, and improved
resiliency. Auto Scaling helps in managing and maintaining the desired number of EC2 instances based on
demand, and the ALB distributes incoming traffic across multiple instances.Database Migration to Amazon
RDS Multi-AZ (Option C): Migrating the database to Amazon RDS in a Multi-AZ deployment provides high
availability and automatic failover. In a Multi-AZ deployment, Amazon RDS maintains a standby replica in a
different Availability Zone, and in the event of a failure, it automatically promotes the replica to the primary
instance. This enhances the resiliency of the database.
A.Deploy the applications in eu-central-1. Extend the company’s VPC from eu-central-1 to an edge location in
Amazon CloudFront.
B.Deploy the applications in AWS Local Zones by extending the company's VPC from eu-central-1 to the chosen
Local Zone.
C.Deploy the applications in eu-central-1. Extend the company’s VPC from eu-central-1 to the regional edge
caches in Amazon CloudFront.
D.Deploy the applications in AWS Wavelength Zones by extending the company’s VPC from eu-central-1 to the
chosen Wavelength Zone.
Answer: B
Explanation:
Option B - AWS Local Zones place AWS compute, storage, database, and other select services closer to end-
users. This would allow the company to deploy applications within geographic proximity to eu-central-1
without being directly in the region, potentially meeting regulatory requirements and achieving low
latency.Whereas Option D - AWS Wavelength Zones are designed to provide developers the ability to build
applications that deliver single-digit millisecond latencies to MOBILE and connected devices. And it's more
focused on 5G Apps and may not be directly relevant to Web Apps hosting.
A.Point the client driver at an RDS custom endpoint. Deploy the Lambda functions inside a VPC.
B.Point the client driver at an RDS proxy endpoint. Deploy the Lambda functions inside a VPC.
C.Point the client driver at an RDS custom endpoint. Deploy the Lambda functions outside a VPC.
D.Point the client driver at an RDS proxy endpoint. Deploy the Lambda functions outside a VPC.
Answer: B
Explanation:
Point the client driver at an RDS proxy endpoint. Deploy the Lambda functions inside a VPC.
The company needs to connect the on-premises locations to VPCs in an AWS Region in the AWS Cloud. The
number of accounts and VPCs will increase during the next year. The network architecture must simplify the
administration of new connections and must provide the ability to scale.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Create a peering connection between the VPCs. Create a VPN connection between the VPCs and the on-
premises locations.
B.Launch an Amazon EC2 instance. On the instance, include VPN software that uses a VPN connection to
connect all VPCs and on-premises locations.
C.Create a transit gateway. Create VPC attachments for the VPC connections. Create VPN attachments for the
on-premises connections.
D.Create an AWS Direct Connect connection between the on-premises locations and a central VPC. Connect
the central VPC to other VPCs by using peering connections.
Answer: C
Explanation:
Create a transit gateway. Create VPC attachments for the VPC connections. Create VPN attachments for the
on-premises connections.
Answer: BD
Explanation:
B.Use Amazon SageMaker to train a model by using the historical data in the S3 bucket.
D.Configure an AWS Lambda function with a function URL that uses an Amazon Forecast predictor to create a
prediction based on the inputs.
The permissions will be used by multiple IAM users and must be split between the developer and administrator
teams. Each team requires different permissions. The company wants a solution that includes new users that are
hired on both teams.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create individual users in IAM Identity Center for each account. Create separate developer and administrator
groups in IAM Identity Center. Assign the users to the appropriate groups. Create a custom IAM policy for each
group to set fine-grained permissions.
B.Create individual users in IAM Identity Center for each account. Create separate developer and administrator
groups in IAM Identity Center. Assign the users to the appropriate groups. Attach AWS managed IAM policies
to each user as needed for fine-grained permissions.
C.Create individual users in IAM Identity Center. Create new developer and administrator groups in IAM Identity
Center. Create new permission sets that include the appropriate IAM policies for each group. Assign the new
groups to the appropriate accounts. Assign the new permission sets to the new groups. When new users are
hired, add them to the appropriate group.
D.Create individual users in IAM Identity Center. Create new permission sets that include the appropriate IAM
policies for each user. Assign the users to the appropriate accounts. Grant additional IAM permissions to the
users from within specific accounts. When new users are hired, add them to IAM Identity Center and assign
them to the accounts.
Answer: C
Explanation:
Reference:
https://docs.aws.amazon.com/controltower/latest/userguide/sso.html
A.Write API calls to describe the EBS volumes and to confirm the EBS volumes are encrypted. Use Amazon
EventBridge to schedule an AWS Lambda function to run the API calls.
B.Write API calls to describe the EBS volumes and to confirm the EBS volumes are encrypted. Run the API calls
on an AWS Fargate task.
C.Create an AWS Identity and Access Management (IAM) policy that requires the use of tags on EBS volumes.
Use AWS Cost Explorer to display resources that are not properly tagged. Encrypt the untagged resources
manually.
D.Create an AWS Config rule for Amazon EBS to evaluate if a volume is encrypted and to flag the volume if it is
not encrypted.
Answer: D
Explanation:
AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS
resources. It can check whether your resources comply with certain conditions (such as being encrypted), and
it can flag or take action on resources that do not comply.
A.Use the S3 bucket access point instead of accessing the S3 bucket directly.
B.Upload the files into multiple S3 buckets.
C.Use S3 multipart uploads.
D.Fetch multiple byte-ranges of an object in parallel.
E.Add a random prefix to each object when uploading the files.
Answer: CD
Explanation:
A.Use AWS Storage Gateway Volume Gateway Internet Small Computer Systems Interface (iSCSI) block
storage that is mounted to the individual EC2 instances.
B.Create an Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system on the individual
EC2 instances.
C.Create a shared Amazon Elastic Block Store (Amazon EBS) volume. Mount the EBS volume on the individual
EC2 instances.
D.Use AWS DataSync to perform continuous synchronization of data between EC2 hosts in the Auto Scaling
group.
E.Create an Amazon S3 bucket to store the web content. Set the metadata for the Cache-Control header to no-
cache. Use Amazon CloudFront to deliver the content.
Answer: BE
Explanation:
B.Create an Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system on the
individual EC2 instances.
E.Create an Amazon S3 bucket to store the web content. Set the metadata for the Cache-Control header to
no-cache. Use Amazon CloudFront to deliver the content.
Which Route 53 configuration should a solutions architect use to provide the MOST high-performing experience?
Answer: B
Explanation:
A recent increase in traffic requires the application to be highly available and for the database to be eventually
consistent.
Which solution will meet these requirements with the LEAST operational overhead?
A.Replace the ALB with a Network Load Balancer. Maintain the embedded NoSQL database with its replication
service on the EC2 instances.
B.Replace the ALB with a Network Load Balancer. Migrate the embedded NoSQL database to Amazon
DynamoDB by using AWS Database Migration Service (AWS DMS).
C.Modify the Auto Scaling group to use EC2 instances across three Availability Zones. Maintain the embedded
NoSQL database with its replication service on the EC2 instances.
D.Modify the Auto Scaling group to use EC2 instances across three Availability Zones. Migrate the embedded
NoSQL database to Amazon DynamoDB by using AWS Database Migration Service (AWS DMS).
Answer: D
Explanation:
Modify the Auto Scaling group to use EC2 instances across three Availability Zones. Migrate the embedded
NoSQL database to Amazon DynamoDB by using AWS Database Migration Service (AWS DMS).
What should a solutions architect do to ensure that the shopping cart data is preserved at all times?
A.Configure an Application Load Balancer to enable the sticky sessions feature (session affinity) for access to
the catalog in Amazon Aurora.
B.Configure Amazon ElastiCache for Redis to cache catalog data from Amazon DynamoDB and shopping cart
data from the user's session.
C.Configure Amazon OpenSearch Service to cache catalog data from Amazon DynamoDB and shopping cart
data from the user's session.
D.Configure an Amazon EC2 instance with Amazon Elastic Block Store (Amazon EBS) storage for the catalog
and shopping cart. Configure automated snapshots.
Answer: B
Explanation:
Configure Amazon ElastiCache for Redis to cache catalog data from Amazon DynamoDB and shopping cart
data from the user's session.
Question: 695 CertyIQ
A company is building a microservices-based application that will be deployed on Amazon Elastic Kubernetes
Service (Amazon EKS). The microservices will interact with each other. The company wants to ensure that the
application is observable to identify performance issues in the future.
A.Configure the application to use Amazon ElastiCache to reduce the number of requests that are sent to the
microservices.
B.Configure Amazon CloudWatch Container Insights to collect metrics from the EKS clusters. Configure AWS
X-Ray to trace the requests between the microservices.
C.Configure AWS CloudTrail to review the API calls. Build an Amazon QuickSight dashboard to observe the
microservice interactions.
D.Use AWS Trusted Advisor to understand the performance of the application.
Answer: B
Explanation:
Option B Amazon CloudWatch Container Insights: This service provides monitoring and troubleshooting
capabilities for containerized applications. It collects and aggregates metrics, logs, and events from Amazon
EKS clusters and containers. This helps in monitoring the performance and health of microservices.
All the data is subject to strong regulations and security requirements. The data must be encrypted at rest. Each
customer must be able to access only their data from their AWS account. Company employees must not be able to
access the data.
A.Provision an AWS Certificate Manager (ACM) certificate for each customer. Encrypt the data client-side. In
the private certificate policy, deny access to the certificate for all principals except an IAM role that the
customer provides.
B.Provision a separate AWS Key Management Service (AWS KMS) key for each customer. Encrypt the data
server-side. In the S3 bucket policy, deny decryption of data for all principals except an IAM role that the
customer provides.
C.Provision a separate AWS Key Management Service (AWS KMS) key for each customer. Encrypt the data
server-side. In each KMS key policy, deny decryption of data for all principals except an IAM role that the
customer provides.
D.Provision an AWS Certificate Manager (ACM) certificate for each customer. Encrypt the data client-side. In
the public certificate policy, deny access to the certificate for all principals except an IAM role that the
customer provides.
Answer: C
Explanation:
Provision a separate AWS Key Management Service (AWS KMS) key for each customer. Encrypt the data
server-side. In each KMS key policy, deny decryption of data for all principals except an IAM role that the
customer provides.
A.Attach the EC2 instance to an Auto Scaling group in a private subnet. Ensure that the DNS record for the
website resolves to the Auto Scaling group identifier.
B.Provision an internet-facing Application Load Balancer (ALB) in a public subnet. Add the EC2 instance to the
target group that is associated with the ALEnsure that the DNS record for the website resolves to the ALB.
C.Launch a NAT gateway in a private subnet. Update the route table for the private subnets to add a default
route to the NAT gateway. Attach a public Elastic IP address to the NAT gateway.
D.Ensure that the security group that is attached to the EC2 instance allows HTTP traffic on port 80 and HTTPS
traffic on port 443. Ensure that the DNS record for the website resolves to the public IP address of the EC2
instance.
Answer: B
Explanation:
Provision an internet-facing Application Load Balancer (ALB) in a public subnet. Add the EC2 instance to the
target group that is associated with the ALEnsure that the DNS record for the website resolves to the ALB.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create Amazon Elastic Block Store (Amazon EBS) volumes in the same Availability Zones where EKS worker
nodes are placed. Register the volumes in a StorageClass object on an EKS cluster. Use EBS Multi-Attach to
share the data between containers.
B.Create an Amazon Elastic File System (Amazon EFS) file system. Register the file system in a StorageClass
object on an EKS cluster. Use the same file system for all containers.
C.Create an Amazon Elastic Block Store (Amazon EBS) volume. Register the volume in a StorageClass object on
an EKS cluster. Use the same volume for all containers.
D.Create Amazon Elastic File System (Amazon EFS) file systems in the same Availability Zones where EKS
worker nodes are placed. Register the file systems in a StorageClass object on an EKS cluster. Create an AWS
Lambda function to synchronize the data between file systems.
Answer: B
Explanation:
Create an Amazon Elastic File System (Amazon EFS) file system. Register the file system in a StorageClass
object on an EKS cluster. Use the same file system for all containers.
Question: 699 CertyIQ
A company has an application that uses Docker containers in its local data center. The application runs on a
container host that stores persistent data in a volume on the host. The container instances use the stored
persistent data.
The company wants to move the application to a fully managed service because the company does not want to
manage any servers or storage infrastructure.
A.Use Amazon Elastic Kubernetes Service (Amazon EKS) with self-managed nodes. Create an Amazon Elastic
Block Store (Amazon EBS) volume attached to an Amazon EC2 instance. Use the EBS volume as a persistent
volume mounted in the containers.
B.Use Amazon Elastic Container Service (Amazon ECS) with an AWS Fargate launch type. Create an Amazon
Elastic File System (Amazon EFS) volume. Add the EFS volume as a persistent storage volume mounted in the
containers.
C.Use Amazon Elastic Container Service (Amazon ECS) with an AWS Fargate launch type. Create an Amazon S3
bucket. Map the S3 bucket as a persistent storage volume mounted in the containers.
D.Use Amazon Elastic Container Service (Amazon ECS) with an Amazon EC2 launch type. Create an Amazon
Elastic File System (Amazon EFS) volume. Add the EFS volume as a persistent storage volume mounted in the
containers.
Answer: B
Explanation:
Use Amazon Elastic Container Service (Amazon ECS) with an AWS Fargate launch type. Create an Amazon
Elastic File System (Amazon EFS) volume. Add the EFS volume as a persistent storage volume mounted in the
containers.
Which combination of actions should a solutions architect take to meet these requirements? (Choose two.)
A.Create internal Network Load Balancers in front of the application in each Region.
B.Create external Application Load Balancers in front of the application in each Region.
C.Create an AWS Global Accelerator accelerator to route traffic to the load balancers in each Region.
D.Configure Amazon Route 53 to use a geolocation routing policy to distribute the traffic.
E.Configure Amazon CloudFront to handle the traffic and route requests to the application in each Region
Answer: AC
Explanation:
A.Create internal Network Load Balancers in front of the application in each Region.
C.Create an AWS Global Accelerator accelerator to route traffic to the load balancers in each Region.
Question: 701 CertyIQ
A city has deployed a web application running on Amazon EC2 instances behind an Application Load Balancer
(ALB). The application's users have reported sporadic performance, which appears to be related to DDoS attacks
originating from random IP addresses. The city needs a solution that requires minimal configuration changes and
provides an audit trail for the DDoS sources.
A.Enable an AWS WAF web ACL on the ALB, and configure rules to block traffic from unknown sources.
B.Subscribe to Amazon Inspector. Engage the AWS DDoS Response Team (DRT) to integrate mitigating
controls into the service.
C.Subscribe to AWS Shield Advanced. Engage the AWS DDoS Response Team (DRT) to integrate mitigating
controls into the service.
D.Create an Amazon CloudFront distribution for the application, and set the ALB as the origin. Enable an AWS
WAF web ACL on the distribution, and configure rules to block traffic from unknown sources
Answer: C
Explanation:
Subscribe to AWS Shield Advanced. Engage the AWS DDoS Response Team (DRT) to integrate mitigating
controls into the service.
A.Create an Amazon S3 bucket. Import the data into the S3 bucket. Configure an AWS Storage Gateway file
gateway to use the S3 bucket. Access the file gateway from the HPC cluster instances.
B.Create an Amazon S3 bucket. Import the data into the S3 bucket. Configure an Amazon FSx for Lustre file
system, and integrate it with the S3 bucket. Access the FSx for Lustre file system from the HPC cluster
instances.
C.Create an Amazon S3 bucket and an Amazon Elastic File System (Amazon EFS) file system. Import the data
into the S3 bucket. Copy the data from the S3 bucket to the EFS file system. Access the EFS file system from
the HPC cluster instances.
D.Create an Amazon FSx for Lustre file system. Import the data directly into the FSx for Lustre file system.
Access the FSx for Lustre file system from the HPC cluster instances.
Answer: D
Explanation:
Create an Amazon FSx for Lustre file system. Import the data directly into the FSx for Lustre file system.
Access the FSx for Lustre file system from the HPC cluster instances.
A.Set up AWS Glue to copy the data from the on-premises servers to Amazon S3.
B.Set up an AWS DataSync agent on the on-premises servers, and sync the data to Amazon S3.
C.Set up an SFTP sync using AWS Transfer for SFTP to sync data from on premises to Amazon S3.
D.Set up an AWS Direct Connect connection between the on-premises data center and a VPC, and copy the
data to Amazon S3.
Answer: B
Explanation:
Set up an AWS DataSync agent on the on-premises servers, and sync the data to Amazon S3.
A.Configure an Application Load Balancer with the required protocol and ports for the internet traffic. Specify
the EC2 instances as the targets.
B.Configure a Gateway Load Balancer for the internet traffic. Specify the EC2 instances as the targets.
C.Configure a Network Load Balancer with the required protocol and ports for the internet traffic. Specify the
EC2 instances as the targets.
D.Launch an identical set of game servers on EC2 instances in separate AWS Regions. Route internet traffic to
both sets of EC2 instances.
Answer: C
Explanation:
Configure a Network Load Balancer with the required protocol and ports for the internet traffic. Specify the
EC2 instances as the targets.
Reference:
https://docs.aws.amazon.com/elasticloadbalancing/latest/network/introduction.html
The company plans to migrate the RDS for MySQL DB instance to an Amazon Aurora PostgreSQL DB cluster. The
company needs a solution that replicates the data changes that happen during the migration to the new database.
A.Use AWS Database Migration Service (AWS DMS) Schema Conversion to transform the database objects.
B.Use AWS Database Migration Service (AWS DMS) Schema Conversion to create an Aurora PostgreSQL read
replica on the RDS for MySQL DB instance.
C.Configure an Aurora MySQL read replica for the RDS for MySQL DB instance.
D.Define an AWS Database Migration Service (AWS DMS) task with change data capture (CDC) to migrate the
data.
E.Promote the Aurora PostgreSQL read replica to a standalone Aurora PostgreSQL DB cluster when the replica
lag is zero.
Answer: AD
Explanation:
A.Use AWS Database Migration Service (AWS DMS) Schema Conversion to transform the database objects.
D.Define an AWS Database Migration Service (AWS DMS) task with change data capture (CDC) to migrate the
data.
Which solution will meet these requirements with the LEAST operational overhead?
A.Add functionality to the script to identify the instance that has the fewest active connections. Configure the
script to read from that instance to report the total new entries.
B.Create a read replica of the database. Configure the script to query only the read replica to report the total
new entries.
C.Instruct the development team to manually export the new entries for the day in the database at the end of
each day.
D.Use Amazon ElastiCache to cache the common queries that the script runs against the database.
Answer: B
Explanation:
Create a read replica of the database. Configure the script to query only the read replica to report the total
new entries.
What is the MOST operationally efficient solution that meets these requirements?
A.Create a table in Amazon Athena for AWS CloudTrail logs. Create a query for the relevant information.
B.Enable ALB access logging to Amazon S3. Create a table in Amazon Athena, and query the logs.
C.Enable ALB access logging to Amazon S3. Open each file in a text editor, and search each line for the
relevant information.
D.Use Amazon EMR on a dedicated Amazon EC2 instance to directly query the ALB to acquire traffic access log
information.
Answer: B
Explanation:
Enable ALB access logging to Amazon S3. Create a table in Amazon Athena, and query the logs.
A.Create public NAT gateways in the same private subnets as the EC2 instances.
B.Create private NAT gateways in the same private subnets as the EC2 instances.
C.Create public NAT gateways in public subnets in the same VPCs as the EC2 instances.
D.Create private NAT gateways in public subnets in the same VPCs as the EC2 instances.
Answer: C
Explanation:
C.Public NAT GW in Public Subnet to have access to internet. Private NAT GW is used for VPC or on-prem
the correct is C, because D would require more than just private NAT gateway.Private – Instances in private
subnets can connect to other VPCs or your on-premises network through a private NAT gateway. You can
route traffic from the NAT gateway through a transit gateway or a virtual private gateway. You cannot
associate an elastic IP address with a private NAT gateway. You can attach an internet gateway to a VPC with
a private NAT gateway, but if you route traffic from the private NAT gateway to the internet gateway, the
internet gateway drops the traffic.
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html
Which solutions to deploy the SCP will meet these requirements? (Choose two.)
Answer: BE
Explanation:
B.Attach the SCP to the three nonproduction Organizations member accounts.
E.Create an OU for the required accounts. Attach the SCP to the OU. Move the nonproduction member
accounts into the new OU.
Answer: A
Explanation:
A solutions architect needs to make the application architecture more scalable and highly available.
Which solution will meet these requirements with the LEAST downtime?
A.Create an Amazon EventBridge rule that has the Aurora cluster as a source. Create an AWS Lambda function
to log the state change events of the Aurora cluster. Add the Lambda function as a target for the EventBridge
rule. Add additional reader nodes to fail over to.
B.Modify the Aurora cluster and activate the zero-downtime restart (ZDR) feature. Use Database Activity
Streams on the cluster to track the cluster status.
C.Add additional reader instances to the Aurora cluster. Create an Amazon RDS Proxy target group for the
Aurora cluster.
D.Create an Amazon ElastiCache for Redis cache. Replicate data from the Aurora cluster to Redis by using AWS
Database Migration Service (AWS DMS) with a write-around approach.
Answer: C
Explanation:
Add additional reader instances to the Aurora cluster. Create an Amazon RDS Proxy target group for the
Aurora cluster.
Question: 712 CertyIQ
A company is designing a web application on AWS. The application will use a VPN connection between the
company’s existing data centers and the company's VPCs.
The company uses Amazon Route 53 as its DNS service. The application must use private DNS records to
communicate with the on-premises services from a VPC.
Which solution will meet these requirements in the MOST secure manner?
A.Create a Route 53 Resolver outbound endpoint. Create a resolver rule. Associate the resolver rule with the
VPC.
B.Create a Route 53 Resolver inbound endpoint. Create a resolver rule. Associate the resolver rule with the
VPC.
C.Create a Route 53 private hosted zone. Associate the private hosted zone with the VPC.
D.Create a Route 53 public hosted zone. Create a record for each service to allow service communication
Answer: A
Explanation:
Create a Route 53 Resolver outbound endpoint. Create a resolver rule. Associate the resolver rule with the
VPC.
A.Store the photos in Amazon DynamoDB. Turn on DynamoDB Accelerator (DAX) to cache frequently viewed
items.
B.Store the photos in the Amazon S3 Intelligent-Tiering storage class. Store the photo metadata and its S3
location in DynamoDB.
C.Store the photos in the Amazon S3 Standard storage class. Set up an S3 Lifecycle policy to move photos
older than 30 days to the S3 Standard-Infrequent Access (S3 Standard-IA) storage class. Use the object tags
to keep track of metadata.
D.Store the photos in the Amazon S3 Glacier storage class. Set up an S3 Lifecycle policy to move photos older
than 30 days to the S3 Glacier Deep Archive storage class. Store the photo metadata and its S3 location in
Amazon OpenSearch Service.
Answer: B
Explanation:
Store the photos in the Amazon S3 Intelligent-Tiering storage class. Store the photo metadata and its S3
location in DynamoDB.
A.Use the round robin routing algorithm based on the RequestCountPerTarget and ActiveConnectionCount
CloudWatch metrics.
B.Use the least outstanding requests algorithm based on the RequestCountPerTarget and
ActiveConnectionCount CloudWatch metrics.
C.Use the round robin routing algorithm based on the RequestCount and TargetResponseTime CloudWatch
metrics.
D.Use the least outstanding requests algorithm based on the RequestCount and TargetResponseTime
CloudWatch metrics.
Answer: B
Explanation:
Use the least outstanding requests algorithm based on the RequestCountPerTarget and
ActiveConnectionCount CloudWatch metrics.
Which solution will meet these requirements with the MOST operational efficiency?
A.Create a daily budget for the Savings Plans by using AWS Budgets. Configure the budget with a coverage
threshold to send notifications to the appropriate email message recipients.
B.Create a Lambda function that runs a coverage report against the Savings Plans. Use Amazon Simple Email
Service (Amazon SES) to email the report to the appropriate email message recipients.
C.Create an AWS Budgets report for the Savings Plans budget. Set the frequency to daily.
D.Create a Savings Plans alert subscription. Enable all notification options. Enter an email address to receive
notifications.
Answer: A
Explanation:
Create a daily budget for the Savings Plans by using AWS Budgets. Configure the budget with a coverage
threshold to send notifications to the appropriate email message recipients.
Reference:
https://docs.aws.amazon.com/savingsplans/latest/userguide/sp-usingBudgets.html
A solutions architect needs to redesign the data ingestion solution to be publicly available over the internet. The
data in transit must also be encrypted.
Which solution will meet these requirements with the MOST operational efficiency?
A.Configure public subnets in the existing VPC. Deploy an MSK cluster in the public subnets. Update the MSK
cluster security settings to enable mutual TLS authentication.
B.Create a new VPC that has public subnets. Deploy an MSK cluster in the public subnets. Update the MSK
cluster security settings to enable mutual TLS authentication.
C.Deploy an Application Load Balancer (ALB) that uses private subnets. Configure an ALB security group
inbound rule to allow inbound traffic from the VPC CIDR block for HTTPS protocol.
D.Deploy a Network Load Balancer (NLB) that uses private subnets. Configure an NLB listener for HTTPS
communication over the internet.
Answer: A
Explanation:
Configure public subnets in the existing VPC. Deploy an MSK cluster in the public subnets. Update the MSK
cluster security settings to enable mutual TLS authentication.
The company already has an AWS account that has connectivity to the on-premises network. The new application
on AWS must support integration with the existing ERP system. The new application must be secure and resilient
and must use the SFTP protocol to process orders from the ERP system immediately.
A.Create an AWS Transfer Family SFTP internet-facing server in two Availability Zones. Use Amazon S3
storage. Create an AWS Lambda function to process order files. Use S3 Event Notifications to send
s3:ObjectCreated:* events to the Lambda function.
B.Create an AWS Transfer Family SFTP internet-facing server in one Availability Zone. Use Amazon Elastic File
System (Amazon EFS) storage. Create an AWS Lambda function to process order files. Use a Transfer Family
managed workflow to invoke the Lambda function.
C.Create an AWS Transfer Family SFTP internal server in two Availability Zones. Use Amazon Elastic File
System (Amazon EFS) storage. Create an AWS Step Functions state machine to process order files. Use
Amazon EventBridge Scheduler to invoke the state machine to periodically check Amazon EFS for order files.
D.Create an AWS Transfer Family SFTP internal server in two Availability Zones. Use Amazon S3 storage.
Create an AWS Lambda function to process order files. Use a Transfer Family managed workflow to invoke the
Lambda function.
Answer: D
Explanation:
D looks more secure over existing on-prem to AWS connection-Transfer Family SFTP internal server in two
Availability Zones.-Use Amazon S3 storage. -Use a Transfer Family managed workflow to invoke the Lambda
function"
Question: 718 CertyIQ
A company’s applications use Apache Hadoop and Apache Spark to process data on premises. The existing
infrastructure is not scalable and is complex to manage.
A solutions architect must design a scalable solution that reduces operational complexity. The solution must keep
the data processing on premises.
A.Use AWS Site-to-Site VPN to access the on-premises Hadoop Distributed File System (HDFS) data and
application. Use an Amazon EMR cluster to process the data.
B.Use AWS DataSync to connect to the on-premises Hadoop Distributed File System (HDFS) cluster. Create an
Amazon EMR cluster to process the data.
C.Migrate the Apache Hadoop application and the Apache Spark application to Amazon EMR clusters on AWS
Outposts. Use the EMR clusters to process the data.
D.Use an AWS Snowball device to migrate the data to an Amazon S3 bucket. Create an Amazon EMR cluster to
process the data.
Answer: C
Explanation:
Migrate the Apache Hadoop application and the Apache Spark application to Amazon EMR clusters on AWS
Outposts. Use the EMR clusters to process the data.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an Amazon Elastic File System (Amazon EFS) volume that uses EFS Intelligent-Tiering. Use AWS
DataSync to migrate the data to the EFS volume.
B.Create an Amazon FSx for ONTAP instance. Create an FSx for ONTAP file system with a root volume that
uses the auto tiering policy. Migrate the data to the FSx for ONTAP volume.
C.Create an Amazon S3 bucket that uses S3 Intelligent-Tiering. Migrate the data to the S3 bucket by using an
AWS Storage Gateway Amazon S3 File Gateway.
D.Create an Amazon FSx for OpenZFS file system. Migrate the data to the new volume.
Answer: C
Explanation:
Create an Amazon S3 bucket that uses S3 Intelligent-Tiering. Migrate the data to the S3 bucket by using an
AWS Storage Gateway Amazon S3 File Gateway.
Each time the company patches a software module, the application experiences downtime. Report generation
must restart from the beginning after any interruptions. The company wants to redesign the application so that the
application can be flexible, scalable, and gradually improved. The company wants to minimize application
downtime.
A.Run the application on AWS Lambda as a single function with maximum provisioned concurrency.
B.Run the application on Amazon EC2 Spot Instances as microservices with a Spot Fleet default allocation
strategy.
C.Run the application on Amazon Elastic Container Service (Amazon ECS) as microservices with service auto
scaling.
D.Run the application on AWS Elastic Beanstalk as a single application environment with an all-at-once
deployment strategy.
Answer: C
Explanation:
Run the application on Amazon Elastic Container Service (Amazon ECS) as microservices with service auto
scaling.
The company selected one component of the web application to test as a microservice. The component supports
hundreds of requests each second. The company wants to create and test the microservice on an AWS solution
that supports Python. The solution must also scale automatically and require minimal infrastructure and minimal
operational support.
A.Use a Spot Fleet with auto scaling of EC2 instances that run the most recent Amazon Linux operating system.
B.Use an AWS Elastic Beanstalk web server environment that has high availability configured.
C.Use Amazon Elastic Kubernetes Service (Amazon EKS). Launch Auto Scaling groups of self-managed EC2
instances.
D.Use an AWS Lambda function that runs custom developed code.
Answer: C
Explanation:
Use Amazon Elastic Kubernetes Service (Amazon EKS). Launch Auto Scaling groups of self-managed EC2
instances.
Which solution will meet these requirements with the LEAST amount of operational overhead?
A.Create a transit gateway, and associate the Direct Connect connection with a new transit VIF. Turn on the
transit gateway's route propagation feature.
B.Create a Direct Connect gateway. Recreate the private VIFs to use the new gateway. Associate each VPC by
creating new virtual private gateways.
C.Create a transit VPConnect the Direct Connect connection to the transit VPCreate a peering connection
between all other VPCs in the Region. Update the route tables.
D.Create AWS Site-to-Site VPN connections from on premises to each VPC. Ensure that both VPN tunnels are
UP for each connection. Turn on the route propagation feature.
Answer: A
Explanation:
Create a transit gateway, and associate the Direct Connect connection with a new transit VIF. Turn on the
transit gateway's route propagation feature.
A.Create a new IAM role. Attach the AmazonSSMManagedInstanceCore policy to the new IAM role. Attach the
new IAM role to the EC2 instances and the existing IAM role.
B.Create an IAM user. Attach the AmazonSSMManagedInstanceCore policy to the IAM user. Configure Systems
Manager to use the IAM user to manage the EC2 instances.
C.Enable Default Host Configuration Management in Systems Manager to manage the EC2 instances.
D.Remove the existing policies from the existing IAM role. Add the AmazonSSMManagedInstanceCore policy to
the existing IAM role.
Answer: A
Explanation:
Create a new IAM role. Attach the AmazonSSMManagedInstanceCore policy to the new IAM role. Attach the
new IAM role to the EC2 instances and the existing IAM role.
Which solution will resolve this issue with the LEAST administrative overhead?
Answer: B
Explanation:
Use the Kubernetes Cluster Autoscaler to manage the number of nodes in the cluster.
Answer: B
Explanation:
The game uses an Amazon RDS for PostgreSQL DB instance with read replicas to store the location data. During
peak usage periods, the database is unable to maintain the performance that is needed for reading and writing
updates. The game's user base is increasing rapidly.
What should a solutions architect do to improve the performance of the data tier?
A.Take a snapshot of the existing DB instance. Restore the snapshot with Multi-AZ enabled.
B.Migrate from Amazon RDS to Amazon OpenSearch Service with OpenSearch Dashboards.
C.Deploy Amazon DynamoDB Accelerator (DAX) in front of the existing DB instance. Modify the game to use
DAX.
D.Deploy an Amazon ElastiCache for Redis cluster in front of the existing DB instance. Modify the game to use
Redis.
Answer: D
Explanation:
Deploy an Amazon ElastiCache for Redis cluster in front of the existing DB instance. Modify the game to use
Redis.
Question: 727 CertyIQ
A company stores critical data in Amazon DynamoDB tables in the company's AWS account. An IT administrator
accidentally deleted a DynamoDB table. The deletion caused a significant loss of data and disrupted the
company's operations. The company wants to prevent this type of disruption in the future.
Which solution will meet this requirement with the LEAST operational overhead?
A.Configure a trail in AWS CloudTrail. Create an Amazon EventBridge rule for delete actions. Create an AWS
Lambda function to automatically restore deleted DynamoDB tables.
B.Create a backup and restore plan for the DynamoDB tables. Recover the DynamoDB tables manually.
C.Configure deletion protection on the DynamoDB tables.
D.Enable point-in-time recovery on the DynamoDB tables.
Answer: C
Explanation:
A.Deploy Amazon S3 Glacier Vault and enable expedited retrieval. Enable provisioned retrieval capacity for the
workload.
B.Deploy AWS Storage Gateway using cached volumes. Use Storage Gateway to store data in Amazon S3 while
retaining copies of frequently accessed data subsets locally.
C.Deploy AWS Storage Gateway using stored volumes to store data locally. Use Storage Gateway to
asynchronously back up point-in-time snapshots of the data to Amazon S3.
D.Deploy AWS Direct Connect to connect with the on-premises data center. Configure AWS Storage Gateway
to store data locally. Use Storage Gateway to asynchronously back up point-in-time snapshots of the data to
Amazon S3.
Answer: C
Explanation:
Deploy AWS Storage Gateway using stored volumes to store data locally. Use Storage Gateway to
asynchronously back up point-in-time snapshots of the data to Amazon S3.
The company needs to make an automated scaling plan that will analyze each resource's daily and weekly
historical workload trends. The configuration must scale resources appropriately according to both the forecast
and live changes in utilization.
Which scaling strategy should a solutions architect recommend to meet these requirements?
A.Implement dynamic scaling with step scaling based on average CPU utilization from the EC2 instances.
B.Enable predictive scaling to forecast and scale. Configure dynamic scaling with target tracking
C.Create an automated scheduled scaling action based on the traffic patterns of the web application.
D.Set up a simple scaling policy. Increase the cooldown period based on the EC2 instance startup time.
Answer: B
Explanation:
Enable predictive scaling to forecast and scale. Configure dynamic scaling with target tracking.
The company adds a read replica, which reduces the DB cluster usage for a short period of time. However, the load
continues to increase. The operations that cause the increase in DB cluster usage are all repeated read statements
that are related to delivery details. The company needs to alleviate the effect of repeated reads on the DB cluster.
A.Implement an Amazon ElastiCache for Redis cluster between the application and the DB cluster.
B.Add an additional read replica to the DB cluster.
C.Configure Aurora Auto Scaling for the Aurora read replicas.
D.Modify the DB cluster to have multiple writer instances.
Answer: A
Explanation:
Implement an Amazon ElastiCache for Redis cluster between the application and the DB cluster.
Answer: C
Explanation:
Which solution will meet these requirements with the LEAST operational overhead?
A.Use security groups and network ACLs to secure the database and application servers.
B.Use AWS WAF to protect the application. Use RDS parameter groups to configure the security settings.
C.Use AWS Network Firewall to protect the application and the database.
D.Use different database accounts in the application code for different functions. Avoid granting excessive
privileges to the database users.
Answer: B
Explanation:
Use AWS WAF to protect the application. Use RDS parameter groups to configure the security settings.
Which solution will meet these requirements in the MOST operationally efficient way?
A.Attach service control policies (SCPs) to the root of the organization to identity the failed login attempts.
B.Enable the Amazon RDS Protection feature in Amazon GuardDuty for the member accounts of the
organization.
C.Publish the Aurora general logs to a log group in Amazon CloudWatch Logs. Export the log data to a central
Amazon S3 bucket.
D.Publish all the Aurora PostgreSQL database events in AWS CloudTrail to a central Amazon S3 bucket.
Answer: B
Explanation:
Enable the Amazon RDS Protection feature in Amazon GuardDuty for the member accounts of the
organization.
A.Set up inter-Region VPC peering between the VPC in us-east-1 and the VPCs in eu-west-2.
B.Create private virtual interfaces from the Direct Connect connection in us-east-1 to the VPCs in eu-west-2.
C.Establish VPN appliances in a fully meshed VPN network hosted by Amazon EC2. Use AWS VPN CloudHub to
send and receive data between the data centers and each VPC.
D.Connect the existing Direct Connect connection to a Direct Connect gateway. Route traffic from the virtual
private gateways of the VPCs in each Region to the Direct Connect gateway.
Answer: D
Explanation:
Connect the existing Direct Connect connection to a Direct Connect gateway. Route traffic from the virtual
private gateways of the VPCs in each Region to the Direct Connect gateway.
A.Push score updates to Amazon Kinesis Data Streams. Process the updates in Kinesis Data Streams with AWS
Lambda. Store the processed updates in Amazon DynamoDB.
B.Push score updates to Amazon Kinesis Data Streams. Process the updates with a fleet of Amazon EC2
instances set up for Auto Scaling. Store the processed updates in Amazon Redshift.
C.Push score updates to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe an AWS
Lambda function to the SNS topic to process the updates. Store the processed updates in a SQL database
running on Amazon EC2.
D.Push score updates to an Amazon Simple Queue Service (Amazon SQS) queue. Use a fleet of Amazon EC2
instances with Auto Scaling to process the updates in the SQS queue. Store the processed updates in an
Amazon RDS Multi-AZ DB instance.
Answer: A
Explanation:
Push score updates to Amazon Kinesis Data Streams. Process the updates in Kinesis Data Streams with AWS
Lambda. Store the processed updates in Amazon DynamoDB.
A.Create an S3 Lifecycle policy that copies the objects from one of the application S3 buckets to the
centralized S3 bucket.
B.Use S3 Same-Region Replication to replicate logs from the S3 buckets to another S3 bucket in us-west-2.
Use this S3 bucket for log analysis.
C.Write a script that uses the PutObject API operation every day to copy the entire contents of the buckets to
another S3 bucket in us-west-2. Use this S3 bucket for log analysis.
D.Write AWS Lambda functions in these accounts that are triggered every time logs are delivered to the S3
buckets (s3:ObjectCreated:* event). Copy the logs to another S3 bucket in us-west-2. Use this S3 bucket for log
analysis.
Answer: B
Explanation:
Use S3 Same-Region Replication to replicate logs from the S3 buckets to another S3 bucket in us-west-2.
Use this S3 bucket for log analysis.
The company has created an S3 bucket in the eu-west-2 Region and an S3 bucket in the ap-southeast-1 Region.
The company wants to replicate the data to the new S3 buckets. The company needs to minimize latency for
developers who upload videos and students who stream videos near eu-west-2 and ap-southeast-1.
Which combination of steps will meet these requirements with the FEWEST changes to the application? (Choose
two.)
A.Configure one-way replication from the us-east-2 S3 bucket to the eu-west-2 S3 bucket. Configure one-way
replication from the us-east-2 S3 bucket to the ap-southeast-1 S3 bucket.
B.Configure one-way replication from the us-east-2 S3 bucket to the eu-west-2 S3 bucket. Configure one-way
replication from the eu-west-2 S3 bucket to the ap-southeast-1 S3 bucket.
C.Configure two-way (bidirectional) replication among the S3 buckets that are in all three Regions.
D.Create an S3 Multi-Region Access Point. Modify the application to use the Amazon Resource Name (ARN) of
the Multi-Region Access Point for video streaming. Do not modify the application for video uploads.
E.Create an S3 Multi-Region Access Point. Modify the application to use the Amazon Resource Name (ARN) of
the Multi-Region Access Point for video streaming and uploads.
Answer: CE
Explanation:
C.Configure two-way (bidirectional) replication among the S3 buckets that are in all three Regions.
E.Create an S3 Multi-Region Access Point. Modify the application to use the Amazon Resource Name (ARN) of
the Multi-Region Access Point for video streaming and uploads.
Users access content often in the first minutes after the content is posted. New content quickly replaces older
content, and then the older content disappears. The local nature of the news means that users consume 90% of
the content within the AWS Region where it is uploaded.
Which solution will optimize the user experience by providing the LOWEST latency for content uploads?
A.Upload and store content in Amazon S3. Use Amazon CloudFront for the uploads.
B.Upload and store content in Amazon S3. Use S3 Transfer Acceleration for the uploads.
C.Upload content to Amazon EC2 instances in the Region that is closest to the user. Copy the data to Amazon
S3.
D.Upload and store content in Amazon S3 in the Region that is closest to the user. Use multiple distributions of
Amazon CloudFront.
Answer: B
Explanation:
Upload and store content in Amazon S3. Use S3 Transfer Acceleration for the uploads.
The company wants to add a service that can send messages received from the API Gateway REST API to multiple
target Lambda functions for processing. The service must offer message filtering that gives the target Lambda
functions the ability to receive only the messages the functions need.
Which solution will meet these requirements with the LEAST operational overhead?
A.Send the requests from the API Gateway REST API to an Amazon Simple Notification Service (Amazon SNS)
topic. Subscribe Amazon Simple Queue Service (Amazon SQS) queues to the SNS topic. Configure the target
Lambda functions to poll the different SQS queues.
B.Send the requests from the API Gateway REST API to Amazon EventBridge. Configure EventBridge to invoke
the target Lambda functions.
C.Send the requests from the API Gateway REST API to Amazon Managed Streaming for Apache Kafka
(Amazon MSK). Configure Amazon MSK to publish the messages to the target Lambda functions.
D.Send the requests from the API Gateway REST API to multiple Amazon Simple Queue Service (Amazon SQS)
queues. Configure the target Lambda functions to poll the different SQS queues.
Answer: A
Explanation:
Send the requests from the API Gateway REST API to an Amazon Simple Notification Service (Amazon SNS)
topic. Subscribe Amazon Simple Queue Service (Amazon SQS) queues to the SNS topic. Configure the target
Lambda functions to poll the different SQS queues.
A.Create a list of unencrypted objects by filtering an Amazon S3 Inventory report. Configure an S3 Batch
Operations job to encrypt the objects from the list with a server-side encryption with a customer-provided key
(SSE-C). Configure the S3 default encryption feature to use a server-side encryption with a customer-provided
key (SSE-C).
B.Use S3 Storage Lens metrics to identify unencrypted S3 buckets. Configure the S3 default encryption
feature to use a server-side encryption with AWS KMS keys (SSE-KMS).
C.Create a list of unencrypted objects by filtering the AWS usage report for Amazon S3. Configure an AWS
Batch job to encrypt the objects from the list with a server-side encryption with AWS KMS keys (SSE-KMS).
Configure the S3 default encryption feature to use a server-side encryption with AWS KMS keys (SSE-KMS).
D.Create a list of unencrypted objects by filtering the AWS usage report for Amazon S3. Configure the S3
default encryption feature to use a server-side encryption with a customer-provided key (SSE-C).
Answer: A
Explanation:
Create a list of unencrypted objects by filtering an Amazon S3 Inventory report. Configure an S3 Batch
Operations job to encrypt the objects from the list with a server-side encryption with a customer-provided key
(SSE-C). Configure the S3 default encryption feature to use a server-side encryption with a customer-
provided key (SSE-C).
Reference:
https://aws.amazon.com/blogs/storage/encrypting-objects-with-amazon-s3-batch-operations/
What should a solutions architect do to rapidly migrate the DNS hosting service?
A.Create an Amazon Route 53 public hosted zone for the domain name. Import the zone file containing the
domain records hosted by the previous provider.
B.Create an Amazon Route 53 private hosted zone for the domain name. Import the zone file containing the
domain records hosted by the previous provider.
C.Create a Simple AD directory in AWS. Enable zone transfer between the DNS provider and AWS Directory
Service for Microsoft Active Directory for the domain records.
D.Create an Amazon Route 53 Resolver inbound endpoint in the VPC. Specify the IP addresses that the
provider's DNS will forward DNS queries to. Configure the provider's DNS to forward DNS queries for the
domain to the IP addresses that are specified in the inbound endpoint.
Answer: A
Explanation:
Create an Amazon Route 53 public hosted zone for the domain name. Import the zone file containing the
domain records hosted by the previous provider.
A.Use AWS AppConfig to store and manage the application configuration. Use AWS Secrets Manager to store
and retrieve the credentials.
B.Use AWS Lambda to store and manage the application configuration. Use AWS Systems Manager Parameter
Store to store and retrieve the credentials.
C.Use an encrypted application configuration file. Store the file in Amazon S3 for the application configuration.
Create another S3 file to store and retrieve the credentials.
D.Use AWS AppConfig to store and manage the application configuration. Use Amazon RDS to store and
retrieve the credentials.
Answer: A
Explanation:
Use AWS AppConfig to store and manage the application configuration. Use AWS Secrets Manager to store
and retrieve the credentials.
Answer: D
Explanation:
Download AWS-provided root certificates. Provide the certificates in all connections to the RDS instance.
Answer: C
Explanation:
An A record in an Amazon Route 53 hosted zone pointing to an Elastic IP address.
A.Create IAM users for daily administrative tasks. Disable the root user.
B.Create IAM users for daily administrative tasks. Enable multi-factor authentication on the root user.
C.Generate an access key for the root user. Use the access key for daily administration tasks instead of the
AWS Management Console.
D.Provide the root user credentials to the most senior solutions architect. Have the solutions architect use the
root user for daily administration tasks.
Answer: B
Explanation:
Create IAM users for daily administrative tasks. Enable multi-factor authentication on the root user.
Which combination of network solutions will meet these requirements? (Choose two.)
Answer: AC
Explanation:
A. Enable and configure enhanced networking on each EC2 instance. Enhanced networking provides higher
bandwidth, higher packet per second (PPS) performance, and consistently lower inter-instance latencies.
C. Run the EC2 instances in a cluster placement group. A cluster placement group is a logical grouping of
instances within a single Availability Zone. This configuration is recommended for applications that need low
network latency, high network throughput, or both.
What should a solutions architect do to meet these requirements with the LEAST operational overhead?
Answer: C
Explanation:
Use AWS DataSync to migrate the data to Amazon FSx for Windows File Server.
A.Enable CloudWatch cross-account observability for the monitoring account. Deploy an AWS CloudFormation
template provided by the monitoring account in each AWS account to share the data with the monitoring
account.
B.Set up service control policies (SCPs) to provide access to CloudWatch in the monitoring account under the
Organizations root organizational unit (OU).
C.Configure a new IAM user in the monitoring account. In each AWS account, configure an IAM policy to have
access to query and visualize the CloudWatch data in the account. Attach the new IAM policy to the new IAM
user.
D.Create a new IAM user in the monitoring account. Create cross-account IAM policies in each AWS account.
Attach the IAM policies to the new IAM user.
Answer: A
Explanation:
Enable CloudWatch cross-account observability for the monitoring account. Deploy an AWS CloudFormation
template provided by the monitoring account in each AWS account to share the data with the monitoring
account.
A.Modify the network ACL on the CloudFront distribution to add a deny rule for the malicious IP address.
B.Modify the configuration of AWS WAF to add an IP match condition to block the malicious IP address.
C.Modify the network ACL for the EC2 instances in the target groups behind the ALB to deny the malicious IP
address.
D.Modify the security groups for the EC2 instances in the target groups behind the ALB to deny the malicious IP
address.
Answer: B
Explanation:
Modify the configuration of AWS WAF to add an IP match condition to block the malicious IP address.
A.Create IAM users for the employees in the required AWS accounts. Connect IAM users to the existing IdP.
Configure federated authentication for the IAM users.
B.Set up AWS account root users with user email addresses and passwords that are synchronized from the
existing IdP.
C.Configure AWS IAM Identity Center (AWS Single Sign-On). Connect IAM Identity Center to the existing IdP.
Provision users and groups from the existing IdP.
D.Use AWS Resource Access Manager (AWS RAM) to share access to the AWS accounts with the users in the
existing IdP.
Answer: C
Explanation:
Configure AWS IAM Identity Center (AWS Single Sign-On). Connect IAM Identity Center to the existing IdP.
Provision users and groups from the existing IdP.
The solutions architect has created an IAM user for each of the five designated employees and has created an IAM
user group.
A.Attach the AdministratorAccess resource-based policy to the IAM user group. Place each of the five
designated employee IAM users in the IAM user group.
B.Attach the SystemAdministrator identity-based policy to the IAM user group. Place each of the five
designated employee IAM users in the IAM user group.
C.Attach the AdministratorAccess identity-based policy to the IAM user group. Place each of the five
designated employee IAM users in the IAM user group.
D.Attach the SystemAdministrator resource-based policy to the IAM user group. Place each of the five
designated employee IAM users in the IAM user group.
Answer: C
Explanation:
Attach the AdministratorAccess identity-based policy to the IAM user group. Place each of the five
designated employee IAM users in the IAM user group.
The company needs a solution that requires the least amount of infrastructure management. The solution must
guarantee exactly-once delivery for application messaging.
Answer: AD
Explanation:
D.Use Amazon Simple Queue Service (Amazon SQS) FIFO queues as the messaging component between the
compute layers.
A.Deploy AWS Transfer for SFTP and an Amazon Elastic File System (Amazon EFS) file system for storage. Use
an Amazon EC2 instance in an Auto Scaling group with a scheduled scaling policy to run the batch operation.
B.Deploy an Amazon EC2 instance that runs Linux and an SFTP service. Use an Amazon Elastic Block Store
(Amazon EBS) volume for storage. Use an Auto Scaling group with the minimum number of instances and
desired number of instances set to 1.
C.Deploy an Amazon EC2 instance that runs Linux and an SFTP service. Use an Amazon Elastic File System
(Amazon EFS) file system for storage. Use an Auto Scaling group with the minimum number of instances and
desired number of instances set to 1.
D.Deploy AWS Transfer for SFTP and an Amazon S3 bucket for storage. Modify the application to pull the batch
files from Amazon S3 to an Amazon EC2 instance for processing. Use an EC2 instance in an Auto Scaling group
with a scheduled scaling policy to run the batch operation.
Answer: D
Explanation:
Deploy AWS Transfer for SFTP and an Amazon S3 bucket for storage. Modify the application to pull the batch
files from Amazon S3 to an Amazon EC2 instance for processing. Use an EC2 instance in an Auto Scaling
group with a scheduled scaling policy to run the batch operation.
A.Put the EC2 instances behind Network Load Balancers (NLBs) in each Region. Deploy AWS WAF on the NLBs.
Create an accelerator using AWS Global Accelerator and register the NLBs as endpoints.
B.Put the EC2 instances behind Application Load Balancers (ALBs) in each Region. Deploy AWS WAF on the
ALBs. Create an accelerator using AWS Global Accelerator and register the ALBs as endpoints.
C.Put the EC2 instances behind Network Load Balancers (NLBs) in each Region. Deploy AWS WAF on the NLBs.
Create an Amazon CloudFront distribution with an origin that uses Amazon Route 53 latency-based routing to
route requests to the NLBs.
D.Put the EC2 instances behind Application Load Balancers (ALBs) in each Region. Create an Amazon
CloudFront distribution with an origin that uses Amazon Route 53 latency-based routing to route requests to
the ALBs. Deploy AWS WAF on the CloudFront distribution.
Answer: D
Explanation:
Put the EC2 instances behind Application Load Balancers (ALBs) in each Region. Create an Amazon
CloudFront distribution with an origin that uses Amazon Route 53 latency-based routing to route requests to
the ALBs. Deploy AWS WAF on the CloudFront distribution.
Answer: B
Explanation:
The company needs a solution to provide samples of the conversations to an external service provider for quality
control. The external service provider needs to randomly pick sample conversations up to the most recent
conversation. The company must not share the customer PII with the external service provider. The solution must
scale when the number of customer conversations increases.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an Object Lambda Access Point. Create an AWS Lambda function that redacts the PII when the
function reads the file. Instruct the external service provider to access the Object Lambda Access Point.
B.Create a batch process on an Amazon EC2 instance that regularly reads all new files, redacts the PII from the
files, and writes the redacted files to a different S3 bucket. Instruct the external service provider to access the
bucket that does not contain the PII.
B. Create a web application on an Amazon EC2 instance that presents a list of the files, redacts the PII from the
files, and allows the external service provider to download new versions of the files that have the PII redacted.
D.Create an Amazon DynamoDB table. Create an AWS Lambda function that reads only the data in the files that
does not contain PII. Configure the Lambda function to store the non-PII data in the DynamoDB table when a
new file is written to Amazon S3. Grant the external service provider access to the DynamoDB table.
Answer: A
Explanation:
Create an Object Lambda Access Point. Create an AWS Lambda function that redacts the PII when the
function reads the file. Instruct the external service provider to access the Object Lambda Access Point.
Answer: C
Explanation:
Create an Amazon CloudWatch alarm to recover the EC2 instance in case of failure.
Question: 758 CertyIQ
A company wants to deploy its containerized application workloads to a VPC across three Availability Zones. The
company needs a solution that is highly available across Availability Zones. The solution must require minimal
changes to the application.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon Elastic Container Service (Amazon ECS). Configure Amazon ECS Service Auto Scaling to use
target tracking scaling. Set the minimum capacity to 3. Set the task placement strategy type to spread with an
Availability Zone attribute.
B.Use Amazon Elastic Kubernetes Service (Amazon EKS) self-managed nodes. Configure Application Auto
Scaling to use target tracking scaling. Set the minimum capacity to 3.
C.Use Amazon EC2 Reserved Instances. Launch three EC2 instances in a spread placement group. Configure an
Auto Scaling group to use target tracking scaling. Set the minimum capacity to 3.
D.Use an AWS Lambda function. Configure the Lambda function to connect to a VPC. Configure Application
Auto Scaling to use Lambda as a scalable target. Set the minimum capacity to 3.
Answer: A
Explanation:
Use Amazon Elastic Container Service (Amazon ECS). Configure Amazon ECS Service Auto Scaling to use
target tracking scaling. Set the minimum capacity to 3. Set the task placement strategy type to spread with
an Availability Zone attribute.
The company must be able to provide the streaming content of a movie within 5 minutes of a user purchase. There
is higher demand for movies that are less than 20 years old than for movies that are more than 20 years old. The
company wants to minimize hosting service costs based on demand.
A.Store all media content in Amazon S3. Use S3 Lifecycle policies to move media data into the Infrequent
Access tier when the demand for a movie decreases.
B.Store newer movie video files in S3 Standard. Store older movie video files in S3 Standard-infrequent Access
(S3 Standard-IA). When a user orders an older movie, retrieve the video file by using standard retrieval.
C.Store newer movie video files in S3 Intelligent-Tiering. Store older movie video files in S3 Glacier Flexible
Retrieval. When a user orders an older movie, retrieve the video file by using expedited retrieval.
D.Store newer movie video files in S3 Standard. Store older movie video files in S3 Glacier Flexible Retrieval.
When a user orders an older movie, retrieve the video file by using bulk retrieval.
Answer: C
Explanation:
Store newer movie video files in S3 Intelligent-Tiering. Store older movie video files in S3 Glacier Flexible
Retrieval. When a user orders an older movie, retrieve the video file by using expedited retrieval.
Which solution meets these requirements with the LEAST operational overhead?
A.Create an AWS Lambda function that uses the Docker container image with an Amazon S3 mounted volume
that has more than 50 GB of space.
B.Create an AWS Lambda function that uses the Docker container image with an Amazon Elastic Block Store
(Amazon EBS) volume that has more than 50 GB of space.
C.Create an Amazon Elastic Container Service (Amazon ECS) cluster that uses the AWS Fargate launch type.
Create a task definition for the container image with an Amazon Elastic File System (Amazon EFS) volume.
Create a service with that task definition.
D.Create an Amazon Elastic Container Service (Amazon ECS) cluster that uses the Amazon EC2 launch type
with an Amazon Elastic Block Store (Amazon EBS) volume that has more than 50 GB of space. Create a task
definition for the container image. Create a service with that task definition.
Answer: C
Explanation:
Create an Amazon Elastic Container Service (Amazon ECS) cluster that uses the AWS Fargate launch type.
Create a task definition for the container image with an Amazon Elastic File System (Amazon EFS) volume.
Create a service with that task definition.
A.Enable AWS IAM Identity Center (AWS Single Sign-On) between AWS and the on-premises LDAP.
B.Create an IAM policy that uses AWS credentials, and integrate the policy into LDAP.
C.Set up a process that rotates the IAM credentials whenever LDAP credentials are updated.
D.Develop an on-premises custom identity broker application or process that uses AWS Security Token Service
(AWS STS) to get short-lived credentials.
Answer: D
Explanation:
Develop an on-premises custom identity broker application or process that uses AWS Security Token Service
(AWS STS) to get short-lived credentials.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create Amazon Elastic Block Store (Amazon EBS) snapshots of the AMIs. Store the snapshots in a separate
AWS account.
B.Copy all AMIs to another AWS account periodically.
C.Create a retention rule in Recycle Bin.
D.Upload the AMIs to an Amazon S3 bucket that has Cross-Region Replication.
Answer: C
Explanation:
Reference:
https://aws.amazon.com/about-aws/whats-new/2022/02/amazon-ec2-recycle-bin-machine-images/
What is the MOST cost-effective mechanism to move this data and meet the migration deadline?
Answer: B
Explanation:
The company needs to migrate the application by making the fewest possible changes to the architecture. The
company also needs a database solution that can restore data to a specific point in time.
Which solution will meet these requirements with the LEAST operational overhead?
A.Migrate the web tier and the application tier to Amazon EC2 instances in private subnets. Migrate the
database tier to Amazon RDS for MySQL in private subnets.
B.Migrate the web tier to Amazon EC2 instances in public subnets. Migrate the application tier to EC2 instances
in private subnets. Migrate the database tier to Amazon Aurora MySQL in private subnets.
C.Migrate the web tier to Amazon EC2 instances in public subnets. Migrate the application tier to EC2 instances
in private subnets. Migrate the database tier to Amazon RDS for MySQL in private subnets.
D.Migrate the web tier and the application tier to Amazon EC2 instances in public subnets. Migrate the
database tier to Amazon Aurora MySQL in public subnets.
Answer: A
Explanation:
Migrate the web tier and the application tier to Amazon EC2 instances in private subnets. Migrate the
database tier to Amazon RDS for MySQL in private subnets.
A.Create an instance profile that provides the other company access to the SQS queue.
B.Create an IAM policy that provides the other company access to the SQS queue.
C.Create an SQS access policy that provides the other company access to the SQS queue.
D.Create an Amazon Simple Notification Service (Amazon SNS) access policy that provides the other company
access to the SQS queue.
Answer: C
Explanation:
Create an SQS access policy that provides the other company access to the SQS queue.
The company wants to use AWS services as a part of the solution. The EC2 instances are hosted in a VPC private
subnet and access the internet through a NAT gateway that is deployed in a public subnet.
A.Create a bastion host in the same subnet as the EC2 instances. Grant the ec2:CreateVpnConnection IAM
permission to the developers. Install EC2 Instance Connect so that the developers can connect to the EC2
instances.
B.Create an AWS Site-to-Site VPN connection between the corporate network and the VPC. Instruct the
developers to use the Site-to-Site VPN connection to access the EC2 instances when the developers are on the
corporate network. Instruct the developers to set up another VPN connection for access when they work
remotely.
C.Create a bastion host in the public subnet of the VPConfigure the security groups and SSH keys of the
bastion host to only allow connections and SSH authentication from the developers’ corporate and remote
networks. Instruct the developers to connect through the bastion host by using SSH to reach the EC2
instances.
D.Attach the AmazonSSMManagedInstanceCore IAM policy to an IAM role that is associated with the EC2
instances. Instruct the developers to use AWS Systems Manager Session Manager to access the EC2 instances.
Answer: D
Explanation:
Attach the AmazonSSMManagedInstanceCore IAM policy to an IAM role that is associated with the EC2
instances. Instruct the developers to use AWS Systems Manager Session Manager to access the EC2
instances.
Which storage solution should a solutions architect recommend to meet these requirements?
A.Run AWS DataSync as a scheduled cron job to migrate the data to an Amazon S3 bucket on an ongoing basis.
B.Deploy an AWS Storage Gateway file gateway with an Amazon S3 bucket as the target storage. Migrate the
data to the Storage Gateway appliance.
C.Deploy an AWS Storage Gateway volume gateway with cached volumes with an Amazon S3 bucket as the
target storage. Migrate the data to the Storage Gateway appliance.
D.Configure an AWS Site-to-Site VPN connection from the on-premises environment to AWS. Migrate data to
an Amazon Elastic File System (Amazon EFS) file system.
Answer: C
Explanation:
Deploy an AWS Storage Gateway volume gateway with cached volumes with an Amazon S3 bucket as the
target storage. Migrate the data to the Storage Gateway appliance.
Which solution meets these requirements with the LEAST operational overhead?
Answer: A
Explanation:
A.Configure AWS CloudTrail trails to log S3 API calls. Use AWS AppSync to process the files.
B.Configure an object-created event notification within the S3 bucket to invoke an AWS Lambda function to
process the files.
C.Configure Amazon Kinesis Data Streams to process and send data to Amazon S3. Invoke an AWS Lambda
function to process the files.
D.Configure an Amazon Simple Notification Service (Amazon SNS) topic to process the files uploaded to
Amazon S3. Invoke an AWS Lambda function to process the files.
Answer: B
Explanation:
Configure an object-created event notification within the S3 bucket to invoke an AWS Lambda function to
process the files.
The production instances show constant usage because of customers in different time zones. The company uses
nonproduction instances only during business hours on weekdays. The company does not use the nonproduction
instances on the weekends. The company wants to optimize the costs to run its application on AWS.
A.Use On-Demand Instances for the production instances. Use Dedicated Hosts for the nonproduction
instances on weekends only.
B.Use Reserved Instances for the production instances and the nonproduction instances. Shut down the
nonproduction instances when not in use.
C.Use Compute Savings Plans for the production instances. Use On-Demand Instances for the nonproduction
instances. Shut down the nonproduction instances when not in use.
D.Use Dedicated Hosts for the production instances. Use EC2 Instance Savings Plans for the nonproduction
instances.
Answer: C
Explanation:
Use Compute Savings Plans for the production instances. Use On-Demand Instances for the nonproduction
instances. Shut down the nonproduction instances when not in use.
The company must capture the changes that occur to the source database during the migration to Aurora
PostgreSQL.
Which solution will meet these requirements?
A.Use the AWS Schema Conversion Tool (AWS SCT) to convert the Oracle schema to Aurora PostgreSQL
schema. Use the AWS Database Migration Service (AWS DMS) full-load migration task to migrate the data.
B.Use AWS DataSync to migrate the data to an Amazon S3 bucket. Import the S3 data to Aurora PostgreSQL
by using the Aurora PostgreSQL aws_s3 extension.
C.Use the AWS Schema Conversion Tool (AWS SCT) to convert the Oracle schema to Aurora PostgreSQL
schema. Use AWS Database Migration Service (AWS DMS) to migrate the existing data and replicate the
ongoing changes.
D.Use an AWS Snowball device to migrate the data to an Amazon S3 bucket. Import the S3 data to Aurora
PostgreSQL by using the Aurora PostgreSQL aws_s3 extension.
Answer: C
Explanation:
Use the AWS Schema Conversion Tool (AWS SCT) to convert the Oracle schema to Aurora PostgreSQL
schema. Use AWS Database Migration Service (AWS DMS) to migrate the existing data and replicate the
ongoing changes.
The solution must scale in and out appropriately according to demand on the individual container services. The
solution also must not result in additional operational overhead or infrastructure to manage.
A.Use Amazon Elastic Container Service (Amazon ECS) with AWS Fargate.
B.Use Amazon Elastic Kubernetes Service (Amazon EKS) with AWS Fargate.
C.Provision an Amazon API Gateway API. Connect the API to AWS Lambda to run the containers.
D.Use Amazon Elastic Container Service (Amazon ECS) with Amazon EC2 worker nodes.
E.Use Amazon Elastic Kubernetes Service (Amazon EKS) with Amazon EC2 worker nodes.
Answer: AB
Explanation:
A.Use Amazon Elastic Container Service (Amazon ECS) with AWS Fargate.
B.Use Amazon Elastic Kubernetes Service (Amazon EKS) with AWS Fargate.
A.Create an Auto Scaling group that is large enough to handle peak traffic load. Stop half of the Amazon EC2
instances. Configure the Auto Scaling group to use the stopped instances to scale out when traffic increases.
B.Create an Auto Scaling group for the website. Set the minimum size of the Auto Scaling group so that it can
handle high traffic volumes without the need to scale out.
C.Use Amazon CloudFront and Amazon ElastiCache to cache dynamic content with an Auto Scaling group set
as the origin. Configure the Auto Scaling group with the instances necessary to populate CloudFront and
ElastiCache. Scale in after the cache is fully populated.
D.Configure an Auto Scaling group to scale out as traffic increases. Create a launch template to start new
instances from a preconfigured Amazon Machine Image (AMI).
Answer: D
Explanation:
Configure an Auto Scaling group to scale out as traffic increases. Create a launch template to start new
instances from a preconfigured Amazon Machine Image (AMI).
What should the solutions architect do to meet these requirements with the LEAST operational overhead?
A.Write an AWS Lambda script that monitors security groups for SSH being open to 0.0.0.0/0 addresses and
creates a notification every time it finds one.
B.Enable the restricted-ssh AWS Config managed rule and generate an Amazon Simple Notification Service
(Amazon SNS) notification when a noncompliant rule is created.
C.Create an IAM role with permissions to globally open security groups and network ACLs. Create an Amazon
Simple Notification Service (Amazon SNS) topic to generate a notification every time the role is assumed by a
user.
D.Configure a service control policy (SCP) that prevents non-administrative users from creating or editing
security groups. Create a notification in the ticketing system when a user requests a rule that needs
administrator permissions.
Answer: B
Explanation:
Enable the restricted-ssh AWS Config managed rule and generate an Amazon Simple Notification Service
(Amazon SNS) notification when a noncompliant rule is created.
A company has deployed an application in an AWS account. The application consists of microservices that run on
AWS Lambda and Amazon Elastic Kubernetes Service (Amazon EKS). A separate team supports each microservice.
The company has multiple AWS accounts and wants to give each team its own account for its microservices.
A solutions architect needs to design a solution that will provide service-to-service communication over HTTPS
(port 443). The solution also must provide a service registry for service discovery.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Create an inspection VPC. Deploy an AWS Network Firewall firewall to the inspection VPC. Attach the
inspection VPC to a new transit gateway. Route VPC-to-VPC traffic to the inspection VPC. Apply firewall rules
to allow only HTTPS communication.
B.Create a VPC Lattice service network. Associate the microservices with the service network. Define HTTPS
listeners for each service. Register microservice compute resources as targets. Identify VPCs that need to
communicate with the services. Associate those VPCs with the service network.
C.Create a Network Load Balancer (NLB) with an HTTPS listener and target groups for each microservice.
Create an AWS PrivateLink endpoint service for each microservice. Create an interface VPC endpoint in each
VPC that needs to consume that microservice.
D.Create peering connections between VPCs that contain microservices. Create a prefix list for each service
that requires a connection to a client. Create route tables to route traffic to the appropriate VPC. Create
security groups to allow only HTTPS communication.
Answer: B
Explanation:
Create a VPC Lattice service network. Associate the microservices with the service network. Define HTTPS
listeners for each service. Register microservice compute resources as targets. Identify VPCs that need to
communicate with the services. Associate those VPCs with the service network.
Answer: C
Explanation:
A.Add the development team's OU Amazon Resource Name (ARN) to the launch permission list for the AMIs.
B.Add the Organizations root Amazon Resource Name (ARN) to the launch permission list for the AMIs.
C.Update the key policy to allow the development team's OU to use the AWS KMS keys that are used to
decrypt the snapshots.
D.Add the development team’s account Amazon Resource Name (ARN) to the launch permission list for the
AMIs.
E.Recreate the AWS KMS key. Add a key policy to allow the Organizations root Amazon Resource Name (ARN)
to use the AWS KMS key.
Answer: AC
Explanation:
A.Add the development team's OU Amazon Resource Name (ARN) to the launch permission list for the AMIs.
C.Update the key policy to allow the development team's OU to use the AWS KMS keys that are used to
decrypt the snapshots.
The company needs to perform a one-time migration of a large amount of data from its offices to Amazon S3. The
company must complete the migration within 4 weeks.
A.Establish a new 10 Gbps AWS Direct Connect connection to each office. Transfer the data to Amazon S3.
B.Use multiple AWS Snowball Edge storage-optimized devices to store and transfer the data to Amazon S3.
C.Use an AWS Snowmobile to store and transfer the data to Amazon S3.
D.Set up an AWS Storage Gateway Volume Gateway to transfer the data to Amazon S3.
Answer: B
Explanation:
Use multiple AWS Snowball Edge storage-optimized devices to store and transfer the data to Amazon S3.
A.Mount the EFS file system in read-only mode from within the EC2 instances.
B.Create a resource policy for the EFS file system that denies the elasticfilesystem:ClientWrite action to the
IAM roles that are attached to the EC2 instances.
C.Create an identity policy for the EFS file system that denies the elasticfilesystem:ClientWrite action on the
EFS file system.
D.Create an EFS access point for each application. Use Portable Operating System Interface (POSIX) file
permissions to allow read-only access to files in the root directory.
Answer: B
Explanation:
Create a resource policy for the EFS file system that denies the elasticfilesystem:ClientWrite action to the
IAM roles that are attached to the EC2 instances.
A.Create an IAM role in the company’s account to delegate access to the vendor’s IAM role. Attach the
appropriate IAM policies to the role for the permissions that the vendor requires.
B.Create an IAM user in the company’s account with a password that meets the password complexity
requirements. Attach the appropriate IAM policies to the user for the permissions that the vendor requires.
C.Create an IAM group in the company’s account. Add the automated tool’s IAM user from the vendor account
to the group. Attach the appropriate IAM policies to the group for the permissions that the vendor requires.
D.Create an IAM user in the company’s account that has a permission boundary that allows the vendor’s
account. Attach the appropriate IAM policies to the user for the permissions that the vendor requires.
Answer: A
Explanation:
Create an IAM role in the company’s account to delegate access to the vendor’s IAM role. Attach the
appropriate IAM policies to the role for the permissions that the vendor requires.
A.Use cost allocation tags on AWS resources to label owners. Create usage budgets in AWS Budgets. Add an
alert threshold to receive notification when spending exceeds 60% of the budget.
B.Use AWS Cost Explorer forecasts to determine resource owners. Use AWS Cost Anomaly Detection to create
alert threshold notifications when spending exceeds 60% of the budget.
C.Use cost allocation tags on AWS resources to label owners. Use AWS Support API on AWS Trusted Advisor to
create alert threshold notifications when spending exceeds 60% of the budget.
D.Use AWS Cost Explorer forecasts to determine resource owners. Create usage budgets in AWS Budgets. Add
an alert threshold to receive notification when spending exceeds 60% of the budget.
Answer: A
Explanation:
Use cost allocation tags on AWS resources to label owners. Create usage budgets in AWS Budgets. Add an
alert threshold to receive notification when spending exceeds 60% of the budget.
The company has created a VPC and has configured an AWS Site-to-Site VPN connection to the company's office.
A solutions architect must design a secure architecture for the web application.
A.Deploy the web application on Amazon EC2 instances in public subnets behind a public Application Load
Balancer (ALB). Attach an internet gateway to the VPC. Set the inbound source of the ALB's security group to
0.0.0.0/0.
B.Deploy the web application on Amazon EC2 instances in private subnets behind an internal Application Load
Balancer (ALB). Deploy NAT gateways in public subnets. Attach an internet gateway to the VPC. Set the
inbound source of the ALB's security group to the company's office network CIDR block.
C.Deploy the web application on Amazon EC2 instances in public subnets behind an internal Application Load
Balancer (ALB). Deploy NAT gateways in private subnets. Attach an internet gateway to the VPSet the
outbound destination of the ALB’s security group to the company's office network CIDR block.
D.Deploy the web application on Amazon EC2 instances in private subnets behind a public Application Load
Balancer (ALB). Attach an internet gateway to the VPC. Set the outbound destination of the ALB’s security
group to 0.0.0.0/0.
Answer: B
Explanation:
Deploy the web application on Amazon EC2 instances in private subnets behind an internal Application Load
Balancer (ALB). Deploy NAT gateways in public subnets. Attach an internet gateway to the VPC. Set the
inbound source of the ALB's security group to the company's office network CIDR block.
A.Copy the records from the application into an Amazon Redshift cluster.
B.Copy the records from the application into an Amazon Neptune cluster.
C.Copy the records from the application into an Amazon Timestream database.
D.Copy the records from the application into an Amazon Quantum Ledger Database (Amazon QLDB) ledger.
Answer: D
Explanation:
Copy the records from the application into an Amazon Quantum Ledger Database (Amazon QLDB) ledger.
A.Use an AWS Lambda function to process the data as soon as the data is uploaded to the S3 bucket. Invoke
other Lambda functions at regularly scheduled intervals.
B.Use Amazon Athena to process the data. Use Amazon EventBridge Scheduler to invoke Athena on a regular
internal.
C.Use AWS Glue DataBrew to process the data. Use an AWS Step Functions state machine to run the DataBrew
data preparation jobs.
D.Use AWS Data Pipeline to process the data. Schedule Data Pipeline to process the data once at midnight.
Answer: C
Explanation:
Use AWS Glue DataBrew to process the data. Use an AWS Step Functions state machine to run the DataBrew
data preparation jobs.
The architecture must ensure that the application does not process duplicate payments.
A.Use Lambda to retrieve all due payments. Publish the due payments to an Amazon S3 bucket. Configure the
S3 bucket with an event notification to invoke another Lambda function to process the due payments.
B.Use Lambda to retrieve all due payments. Publish the due payments to an Amazon Simple Queue Service
(Amazon SQS) queue. Configure another Lambda function to poll the SQS queue and to process the due
payments.
C.Use Lambda to retrieve all due payments. Publish the due payments to an Amazon Simple Queue Service
(Amazon SQS) FIFO queue. Configure another Lambda function to poll the FIFO queue and to process the due
payments.
D.Use Lambda to retrieve all due payments. Store the due payments in an Amazon DynamoDB table. Configure
streams on the DynamoDB table to invoke another Lambda function to process the due payments.
Answer: C
Explanation:
Use Lambda to retrieve all due payments. Publish the due payments to an Amazon Simple Queue Service
(Amazon SQS) FIFO queue. Configure another Lambda function to poll the FIFO queue and to process the due
payments.
Answer: B
Explanation:
Set the home AWS Region in AWS Migration Hub. Use AWS Application Discovery Service to collect data
about the on-premises servers.
Which solution will meet these requirements with the LEAST operational overhead?
A.Deploy an AWS Control Tower environment in the Organizations management account. Enable AWS Security
Hub and AWS Control Tower Account Factory in the environment.
B.Deploy an AWS Control Tower environment in a dedicated Organizations member account. Enable AWS
Security Hub and AWS Control Tower Account Factory in the environment.
C.Use AWS Managed Services (AMS) Accelerate to build a multi-account landing zone (MALZ). Submit an RFC
to self-service provision Amazon GuardDuty in the MALZ.
D.Use AWS Managed Services (AMS) Accelerate to build a multi-account landing zone (MALZ). Submit an RFC
to self-service provision AWS Security Hub in the MALZ.
Answer: A
Explanation:
Deploy an AWS Control Tower environment in the Organizations management account. Enable AWS Security
Hub and AWS Control Tower Account Factory in the environment.
A.Create an Amazon Aurora MySQL database. Migrate the data from the S3 bucket into Aurora by using AWS
Database Migration Service (AWS DMS). Issue SQL statements to the Aurora database.
B.Create an Amazon Redshift cluster. Use Redshift Spectrum to run SQL statements directly on the data in the
S3 bucket.
C.Create an AWS Glue crawler to store and retrieve table metadata from the S3 bucket. Use Amazon Athena to
run SQL statements directly on the data in the S3 bucket.
D.Create an Amazon EMR cluster. Use Apache Spark SQL to run SQL statements directly on the data in the S3
bucket.
Answer: C
Explanation:
Create an AWS Glue crawler to store and retrieve table metadata from the S3 bucket. Use Amazon Athena to
run SQL statements directly on the data in the S3 bucket.
A.Use AWS Control Tower proactive controls to block deployment of EC2 instances with public IP addresses
and inline policies with elevated access or “*”.
B.Use AWS Control Tower detective controls to block deployment of EC2 instances with public IP addresses
and inline policies with elevated access or “*”.
C.Use AWS Config to create rules for EC2 and IAM compliance. Configure the rules to run an AWS Systems
Manager Session Manager automation to delete a resource when it is not compliant.
D.Use a service control policy (SCP) to block actions for the EC2 instances and IAM resources if the actions lead
to noncompliance.
Answer: D
Explanation:
Use a service control policy (SCP) to block actions for the EC2 instances and IAM resources if the actions lead
to noncompliance.
The company needs a solution that will provide high availability and scalability to meet the increased user demand
without rewriting the web application.
Answer: BE
Explanation:
B.Configure Amazon EC2 Auto Scaling with multiple Availability Zones in private subnets.
Answer: D
Explanation:
Create an AWS Key Management Service (AWS KMS) key. Enable encryption helpers on the Lambda
functions to use the KMS key to store and encrypt the environment variables.
Which solution will meet these requirements with the MOST operational efficiency?
A.Configure an Amazon Cognito user pool for user authentication. Implement Amazon API Gateway REST APIs
with a Cognito authorizer.
B.Configure an Amazon Cognito identity pool for user authentication. Implement Amazon API Gateway HTTP
APIs with a Cognito authorizer.
C.Configure an AWS Lambda function to handle user authentication. Implement Amazon API Gateway REST
APIs with a Lambda authorizer.
D.Configure an IAM user to handle user authentication. Implement Amazon API Gateway HTTP APIs with an IAM
authorizer.
Answer: A
Explanation:
Configure an Amazon Cognito user pool for user authentication. Implement Amazon API Gateway REST APIs
with a Cognito authorizer.
Question: 793 CertyIQ
A company has a mobile app for customers. The app’s data is sensitive and must be encrypted at rest. The
company uses AWS Key Management Service (AWS KMS).
The company needs a solution that prevents the accidental deletion of KMS keys. The solution must use Amazon
Simple Notification Service (Amazon SNS) to send an email notification to administrators when a user attempts to
delete a KMS key.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an Amazon EventBridge rule that reacts when a user tries to delete a KMS key. Configure an AWS
Config rule that cancels any deletion of a KMS key. Add the AWS Config rule as a target of the EventBridge
rule. Create an SNS topic that notifies the administrators.
B.Create an AWS Lambda function that has custom logic to prevent KMS key deletion. Create an Amazon
CloudWatch alarm that is activated when a user tries to delete a KMS key. Create an Amazon EventBridge rule
that invokes the Lambda function when the DeleteKey operation is performed. Create an SNS topic. Configure
the EventBridge rule to publish an SNS message that notifies the administrators.
C.Create an Amazon EventBridge rule that reacts when the KMS DeleteKey operation is performed. Configure
the rule to initiate an AWS Systems Manager Automation runbook. Configure the runbook to cancel the
deletion of the KMS key. Create an SNS topic. Configure the EventBridge rule to publish an SNS message that
notifies the administrators.
D.Create an AWS CloudTrail trail. Configure the trail to deliver logs to a new Amazon CloudWatch log group.
Create a CloudWatch alarm based on the metric filter for the CloudWatch log group. Configure the alarm to use
Amazon SNS to notify the administrators when the KMS DeleteKey operation is performed.
Answer: C
Explanation:
Reference:
https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/monitor-and-remediate-scheduled-
deletion-of-aws-kms-keys.html
The program generates multiple reports during the last week of each month. The program takes less than 10
minutes to produce each report. The company rarely uses the program to generate reports outside of the last
week of each month The company wants to generate reports in the least amount of time when the reports are
requested.
A.Run the program by using Amazon EC2 On-Demand Instances. Create an Amazon EventBridge rule to start
the EC2 instances when reports are requested. Run the EC2 instances continuously during the last week of
each month.
B.Run the program in AWS Lambda. Create an Amazon EventBridge rule to run a Lambda function when reports
are requested.
C.Run the program in Amazon Elastic Container Service (Amazon ECS). Schedule Amazon ECS to run the
program when reports are requested.
D.Run the program by using Amazon EC2 Spot Instances. Create an Amazon EventBndge rule to start the EC2
instances when reports are requested. Run the EC2 instances continuously during the last week of each month.
Answer: B
Explanation:
Run the program in AWS Lambda. Create an Amazon EventBridge rule to run a Lambda function when reports
are requested.
A.Create an accelerator in AWS Global Accelerator. Configure custom routing for the accelerator.
B.Create an Amazon FSx for Lustre file system. Configure the file system with scratch storage.
C.Create an Amazon CloudFront distribution. Configure the viewer protocol policy to be HTTP and HTTPS.
D.Launch Amazon EC2 instances. Attach an Elastic Fabric Adapter (EFA) to the instances.
E.Create an AWS Elastic Beanstalk deployment to manage the environment.
Answer: BD
Explanation:
B.Create an Amazon FSx for Lustre file system. Configure the file system with scratch storage.
D.Launch Amazon EC2 instances. Attach an Elastic Fabric Adapter (EFA) to the instances.
A.Create and deploy a model by using Amazon SageMaker Autopilot. Create a real-time endpoint that the web
application invokes when new photos are uploaded.
B.Create an AWS Lambda function that uses Amazon Rekognition to detect unwanted content. Create a
Lambda function URL that the web application invokes when new photos are uploaded.
C.Create an Amazon CloudFront function that uses Amazon Comprehend to detect unwanted content.
Associate the function with the web application.
D.Create an AWS Lambda function that uses Amazon Rekognition Video to detect unwanted content. Create a
Lambda function URL that the web application invokes when new photos are uploaded.
Answer: B
Explanation:
Create an AWS Lambda function that uses Amazon Rekognition to detect unwanted content. Create a Lambda
function URL that the web application invokes when new photos are uploaded.
A.Set up a backup administrator account that the company can use to log in if the company loses the MFA
device.
B.Add multiple MFA devices for the root user account to handle the disaster scenario.
C.Create a new administrator account when the company cannot access the root account.
D.Attach the administrator policy to another IAM user when the company cannot access the root account.
Answer: B
Explanation:
B. Add multiple MFA devices for the root user account to handle the disaster scenario.
By adding multiple MFA devices for the root user account, the company ensures that it can still access the
account even if one MFA device is lost. This approach provides a backup for authentication, addressing the
concern of losing access to the root user account if the MFA device is lost.
The partners want to receive notification of user IDs through an HTTP endpoint when the company gives users
points. Hundreds of vendors are interested in becoming affiliated partners every day. The company wants to
design an architecture that gives the website the ability to add partners rapidly in a scalable way.
Which solution will meet these requirements with the LEAST implementation effort?
A.Create an Amazon Timestream database to keep a list of affiliated partners. Implement an AWS Lambda
function to read the list. Configure the Lambda function to send user IDs to each partner when the company
gives users points.
B.Create an Amazon Simple Notification Service (Amazon SNS) topic. Choose an endpoint protocol. Subscribe
the partners to the topic. Publish user IDs to the topic when the company gives users points.
C.Create an AWS Step Functions state machine. Create a task for every affiliated partner. Invoke the state
machine with user IDs as input when the company gives users points.
D.Create a data stream in Amazon Kinesis Data Streams. Implement producer and consumer applications. Store
a list of affiliated partners in the data stream. Send user IDs when the company gives users points.
Answer: B
Explanation:
SNS is designed for precisely this kind of use case. It allows you to publish messages to a topic, which can
then be delivered to multiple subscribers. Partners can subscribe to the SNS topic using an HTTP endpoint as
the protocol, which meets the requirement to notify partners via an HTTP endpoint. This approach is highly
scalable and requires the least implementation effort because it leverages managed services without the
need for custom logic to manage subscriptions or deliver notifications.
Question: 799 CertyIQ
A company needs to extract the names of ingredients from recipe records that are stored as text files in an
Amazon S3 bucket. A web application will use the ingredient names to query an Amazon DynamoDB table and
determine a nutrition score.
The application can handle non-food records and errors. The company does not have any employees who have
machine learning knowledge to develop this solution.
A.Use S3 Event Notifications to invoke an AWS Lambda function when PutObject requests occur. Program the
Lambda function to analyze the object and extract the ingredient names by using Amazon Comprehend. Store
the Amazon Comprehend output in the DynamoDB table.
B.Use an Amazon EventBridge rule to invoke an AWS Lambda function when PutObject requests occur.
Program the Lambda function to analyze the object by using Amazon Forecast to extract the ingredient names.
Store the Forecast output in the DynamoDB table.
C.Use S3 Event Notifications to invoke an AWS Lambda function when PutObject requests occur. Use Amazon
Polly to create audio recordings of the recipe records. Save the audio files in the S3 bucket. Use Amazon
Simple Notification Service (Amazon SNS) to send a URL as a message to employees. Instruct the employees to
listen to the audio files and calculate the nutrition score. Store the ingredient names in the DynamoDB table.
D.Use an Amazon EventBridge rule to invoke an AWS Lambda function when a PutObject request occurs.
Program the Lambda function to analyze the object and extract the ingredient names by using Amazon
SageMaker. Store the inference output from the SageMaker endpoint in the DynamoDB table.
Answer: A
Explanation:
Use S3 Event Notifications to invoke an AWS Lambda function when PutObject requests occur. Program the
Lambda function to analyze the object and extract the ingredient names by using Amazon Comprehend. Store
the Amazon Comprehend output in the DynamoDB table.
A.Create a new EFS file system in the primary account. Use AWS DataSync to copy the contents of the original
EFS file system to the new EFS file system.
B.Create a VPC peering connection between the VPCs that are in the primary account and the secondary
account.
C.Create a second Lambda function in the secondary account that has a mount that is configured for the file
system. Use the primary account's Lambda function to invoke the secondary account's Lambda function.
D.Move the contents of the file system to a Lambda layer. Configure the Lambda layer's permissions to allow
the company's secondary account to use the Lambda layer.
Answer: B
Explanation:
Reference:
https://docs.aws.amazon.com/efs/latest/ug/efs-different-vpc.html
A.Encrypt the data in the S3 bucket with server-side encryption (SSE) that uses an AWS Key Management
Service (AWS KMS) customer managed key.
B.Encrypt the data in the S3 bucket with server-side encryption (SSE) that uses an AWS Key Management
Service (AWS KMS) AWS managed key.
C.Encrypt the data in the S3 bucket with the default server-side encryption (SSE).
D.Encrypt the data at the company's data center before storing the data in the S3 bucket.
Answer: D
Explanation:
Encrypt the data at the company's data center before storing the data in the S3 bucket.
The backend processing application is long running and requires compute and memory to be adjusted. The
company does not want to manage the infrastructure.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an Amazon Simple Queue Service (Amazon SQS) queue. Integrate the queue with an Amazon
EventBridge rule to receive payment notifications from mobile devices. Configure the rule to validate payment
notifications and send the notifications to the backend application. Deploy the backend application on Amazon
Elastic Kubernetes Service (Amazon EKS) Anywhere. Create a standalone cluster.
B.Create an Amazon API Gateway API. Integrate the API with an AWS Step Functions state machine to receive
payment notifications from mobile devices. Invoke the state machine to validate payment notifications and send
the notifications to the backend application. Deploy the backend application on Amazon Elastic Kubernetes
Service (Amazon EKS). Configure an EKS cluster with self-managed nodes.
C.Create an Amazon Simple Queue Service (Amazon SQS) queue. Integrate the queue with an Amazon
EventBridge rule to receive payment notifications from mobile devices. Configure the rule to validate payment
notifications and send the notifications to the backend application. Deploy the backend application on Amazon
EC2 Spot Instances. Configure a Spot Fleet with a default allocation strategy.
D.Create an Amazon API Gateway API. Integrate the API with AWS Lambda to receive payment notifications
from mobile devices. Invoke a Lambda function to validate payment notifications and send the notifications to
the backend application. Deploy the backend application on Amazon Elastic Container Service (Amazon ECS).
Configure Amazon ECS with an AWS Fargate launch type.
Answer: D
Explanation:
Create an Amazon API Gateway API. Integrate the API with AWS Lambda to receive payment notifications
from mobile devices. Invoke a Lambda function to validate payment notifications and send the notifications to
the backend application. Deploy the backend application on Amazon Elastic Container Service (Amazon ECS).
Configure Amazon ECS with an AWS Fargate launch type.
A.Configure Amazon Cognito user pools for user authentication. Enable the risk-based adaptive authentication
feature with multifactor authentication (MFA).
B.Configure Amazon Cognito identity pools for user authentication. Enable multi-factor authentication (MFA).
C.Configure AWS Identity and Access Management (IAM) users for user authentication. Attach an IAM policy
that allows the AllowManageOwnUserMFA action.
D.Configure AWS IAM Identity Center (AWS Single Sign-On) authentication for user authentication. Configure
the permission sets to require multi-factor authentication (MFA).
Answer: A
Explanation:
Configure Amazon Cognito user pools for user authentication. Enable the risk-based adaptive authentication
feature with multifactor authentication (MFA).
Data analysts then need to create and train machine learning (ML) models by using SQL commands on the data.
The solution must use serverless AWS services wherever possible.
A.Run a daily Amazon EMR job to transform the data and load the data into Amazon Redshift. Use Amazon
Redshift ML to create and train the ML models.
B.Run a daily Amazon EMR job to transform the data and load the data into Amazon Aurora Serverless. Use
Amazon Aurora ML to create and train the ML models.
C.Run a daily AWS Glue job to transform the data and load the data into Amazon Redshift Serverless. Use
Amazon Redshift ML to create and train the ML models.
D.Run a daily AWS Glue job to transform the data and load the data into Amazon Athena tables. Use Amazon
Athena ML to create and train the ML models.
Answer: C
Explanation:
Run a daily AWS Glue job to transform the data and load the data into Amazon Redshift Serverless. Use
Amazon Redshift ML to create and train the ML models.
Question: 805 CertyIQ
A company runs containers in a Kubernetes environment in the company's local data center. The company wants to
use Amazon Elastic Kubernetes Service (Amazon EKS) and other AWS managed services. Data must remain locally
in the company's data center and cannot be stored in any remote site or cloud to maintain compliance.
Answer: C
Explanation:
A.Set up an AWS Storage Gateway Volume Gateway. Use an Amazon S3 Lifecycle policy to transition the data
to the appropriate storage class.
B.Set up an AWS Storage Gateway Amazon S3 File Gateway. Use an Amazon S3 Lifecycle policy to transition
the data to the appropriate storage class.
C.Use the Amazon Elastic File System (Amazon EFS) Standard-Infrequent Access (Standard-IA) storage class.
Activate the infrequent access lifecycle policy.
D.Use the Amazon Elastic File System (Amazon EFS) One Zone-Infrequent Access (One Zone-IA) storage class.
Activate the infrequent access lifecycle policy.
Answer: B
Explanation:
Set up an AWS Storage Gateway Amazon S3 File Gateway. Use an Amazon S3 Lifecycle policy to transition
the data to the appropriate storage class.
A.Configure reserved concurrency for the Lambda functions. Decrease the memory allocated to the Lambda
functions.
B.Configure reserved concurrency for the Lambda functions. Increase the memory according to AWS Compute
Optimizer recommendations.
C.Configure provisioned concurrency for the Lambda functions. Decrease the memory allocated to the Lambda
functions.
D.Configure provisioned concurrency for the Lambda functions. Increase the memory according to AWS
Compute Optimizer recommendations.
Answer: D
Explanation:
Configure provisioned concurrency for the Lambda functions. Increase the memory according to AWS
Compute Optimizer recommendations.
Which solution will meet these requirements with the FEWEST changes to the workloads?
A.Use Amazon Elastic Container Registry (Amazon ECR) as a private image repository to store the container
images. Specify scan on push filters for the ECR basic scan.
B.Store the container images in an Amazon S3 bucket. Use Amazon Macie to scan the images. Use an S3 Event
Notification to initiate a Macie scan for every event with an s3:ObjectCreated:Put event type.
C.Deploy the workloads to Amazon Elastic Kubernetes Service (Amazon EKS). Use Amazon Elastic Container
Registry (Amazon ECR) as a private image repository. Specify scan on push filters for the ECR enhanced scan.
D.Store the container images in an Amazon S3 bucket that has versioning enabled. Configure an S3 Event
Notification for s3:ObjectCreated:* events to invoke an AWS Lambda function. Configure the Lambda function
to initiate an Amazon Inspector scan.
Answer: A
Explanation:
Use Amazon Elastic Container Registry (Amazon ECR) as a private image repository to store the container
images. Specify scan on push filters for the ECR basic scan.
A.Configure an Amazon EventBridge rule to match incoming AWS Batch job SUCCEEDED events. Configure the
third-party API as an EventBridge API destination with a username and password. Set the API destination as the
EventBridge rule target.
B.Configure Amazon EventBridge Scheduler to match incoming AWS Batch job SUCCEEDED events. Configure
an AWS Lambda function to invoke the third-party API by using a username and password. Set the Lambda
function as the EventBridge rule target.
C.Configure an AWS Batch job to publish job SUCCEEDED events to an Amazon API Gateway REST API.
Configure an HTTP proxy integration on the API Gateway REST API to invoke the third-party API by using a
username and password.
D.Configure an AWS Batch job to publish job SUCCEEDED events to an Amazon API Gateway REST API.
Configure a proxy integration on the API Gateway REST API to an AWS Lambda function. Configure the Lambda
function to invoke the third-party API by using a username and password.
Answer: B
Explanation:
Configure Amazon EventBridge Scheduler to match incoming AWS Batch job SUCCEEDED events. Configure
an AWS Lambda function to invoke the third-party API by using a username and password. Set the Lambda
function as the EventBridge rule target.
A.Instruct the vendor to sign up for the AWS Hosted Connection Direct Connect Program. Use VPC peering to
connect the company's VPC and the vendor's VPC.
B.Configure a client VPN connection between the company's VPC and the vendor's VPC. Use VPC peering to
connect the company's VPC and the vendor's VPC.
C.Instruct the vendor to create a Network Load Balancer (NLB). Place the NLB in front of the Amazon RDS for
MySQL database. Use AWS PrivateLink to integrate the company's VPC and the vendor's VPC.
D.Use AWS Transit Gateway to integrate the company's VPC and the vendor's VPC. Use VPC peering to connect
the company’s VPC and the vendor's VPC.
Answer: C
Explanation:
Instruct the vendor to create a Network Load Balancer (NLB). Place the NLB in front of the Amazon RDS for
MySQL database. Use AWS PrivateLink to integrate the company's VPC and the vendor's VPC.
A.Create an Amazon Managed Grafana workspace without a VPC. Create a public endpoint for the RDS
database. Configure the public endpoint as a data source in Amazon Managed Grafana.
B.Create an Amazon Managed Grafana workspace in a VPC. Create a private endpoint for the RDS database.
Configure the private endpoint as a data source in Amazon Managed Grafana.
C.Create an Amazon Managed Grafana workspace without a VPCreate an AWS PrivateLink endpoint to
establish a connection between Amazon Managed Grafana and Amazon RDS. Set up Amazon RDS as a data
source in Amazon Managed Grafana.
D.Create an Amazon Managed Grafana workspace in a VPC. Create a public endpoint for the RDS database.
Configure the public endpoint as a data source in Amazon Managed Grafana.
Answer: C
Explanation:
Create an Amazon Managed Grafana workspace without a VPCreate an AWS PrivateLink endpoint to establish
a connection between Amazon Managed Grafana and Amazon RDS. Set up Amazon RDS as a data source in
Amazon Managed Grafana.
The company must store the transformed data in S3 buckets that data analysts access. The company needs a
prebuilt solution for data transformation that does not require code. The solution must provide data lineage and
data profiling. The company needs to share the data transformation steps with employees throughout the
company.
A.Configure an AWS Glue Studio visual canvas to transform the data. Share the transformation steps with
employees by using AWS Glue jobs.
B.Configure Amazon EMR Serverless to transform the data. Share the transformation steps with employees by
using EMR Serverless jobs.
C.Configure AWS Glue DataBrew to transform the data. Share the transformation steps with employees by
using DataBrew recipes.
D.Create Amazon Athena tables for the data. Write Athena SQL queries to transform the data. Share the Athena
SQL queries with employees.
Answer: C
Explanation:
Configure AWS Glue DataBrew to transform the data. Share the transformation steps with employees by
using DataBrew recipes.
The solutions architect wants to allow engineers to use a development version of the website to access one
specific development EC2 instance to test new features for the application. The solutions architect wants to use an
Amazon Route 53 hosted zone to give the engineers access to the development instance. The solution must
automatically route to the development instance even if the development instance is replaced.
A.Create an A Record for the development website that has the value set to the ALB. Create a listener rule on
the ALB that forwards requests for the development website to the target group that contains the development
instance.
B.Recreate the development instance with a public IP address. Create an A Record for the development website
that has the value set to the public IP address of the development instance.
C.Create an A Record for the development website that has the value set to the ALB. Create a listener rule on
the ALB to redirect requests for the development website to the public IP address of the development instance.
D.Place all the instances in the same target group. Create an A Record for the development website. Set the
value to the ALB. Create a listener rule on the ALB that forwards requests for the development website to the
target group.
Answer: A
Explanation:
Create an A Record for the development website that has the value set to the ALB. Create a listener rule on
the ALB that forwards requests for the development website to the target group that contains the
development instance.
Which solution will meet these requirements with the LEAST operational overhead?
A.Migrate the container application to Amazon Elastic Container Service (Amazon ECS). Use Amazon Simple
Queue Service (Amazon SQS) to retrieve the messages.
B.Migrate the container application to Amazon Elastic Kubernetes Service (Amazon EKS). Use Amazon MQ to
retrieve the messages.
C.Use highly available Amazon EC2 instances to run the application. Use Amazon MQ to retrieve the messages.
D.Use AWS Lambda functions to run the application. Use Amazon Simple Queue Service (Amazon SQS) to
retrieve the messages.
Answer: B
Explanation:
Migrate the container application to Amazon Elastic Kubernetes Service (Amazon EKS). Use Amazon MQ to
retrieve the messages.
A.Create Application Load Balancers (ALBs) in each Region to replace the existing NLBs. Register the existing
EC2 instances as targets for the ALBs in each Region.
B.Configure Amazon Route 53 to route equally weighted traffic to the NLBs in each Region.
C.Create additional NLBs and EC2 instances in other Regions where the company has large customer bases.
D.Create a standard accelerator in AWS Global Accelerator. Configure the existing NLBs as target endpoints.
Answer: D
Explanation:
Create a standard accelerator in AWS Global Accelerator. Configure the existing NLBs as target endpoints.
Some vendors run their systems on legacy applications that do not support S3 APIs. The vendors want to continue
to use SFTP-based applications to upload data. The company wants to use managed services for the needs of the
vendors that use legacy applications.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an AWS Database Migration Service (AWS DMS) instance to replicate data from the storage of the
vendors that use legacy applications to Amazon S3. Provide the vendors with the credentials to access the
AWS DMS instance.
B.Create an AWS Transfer Family endpoint for vendors that use legacy applications.
C.Configure an Amazon EC2 instance to run an SFTP server. Instruct the vendors that use legacy applications
to use the SFTP server to upload data.
D.Configure an Amazon S3 File Gateway for vendors that use legacy applications to upload files to an SMB file
share.
Answer: B
Explanation:
Create an AWS Transfer Family endpoint for vendors that use legacy applications.
Which solution will meet these requirements with the LEAST operational overhead?
A.Provide the extracted insights to Amazon Athena for analysis. Store the extracted insights and analysis in an
Amazon S3 bucket.
B.Store the extracted insights in an Amazon DynamoDB table. Use Amazon SageMaker to build a sentiment
model.
C.Provide the extracted insights to Amazon Comprehend for analysis. Save the analysis to an Amazon S3
bucket.
D.Store the extracted insights in an Amazon S3 bucket. Use Amazon QuickSight to visualize and analyze the
data.
Answer: C
Explanation:
Provide the extracted insights to Amazon Comprehend for analysis. Save the analysis to an Amazon S3
bucket.
Question: 818 CertyIQ
A company's application runs on Amazon EC2 instances that are in multiple Availability Zones. The application
needs to ingest real-time data from third-party applications.
The company needs a data ingestion solution that places the ingested raw data in an Amazon S3 bucket.
A.Create Amazon Kinesis data streams for data ingestion. Create Amazon Kinesis Data Firehose delivery
streams to consume the Kinesis data streams. Specify the S3 bucket as the destination of the delivery streams.
B.Create database migration tasks in AWS Database Migration Service (AWS DMS). Specify replication
instances of the EC2 instances as the source endpoints. Specify the S3 bucket as the target endpoint. Set the
migration type to migrate existing data and replicate ongoing changes.
C.Create and configure AWS DataSync agents on the EC2 instances. Configure DataSync tasks to transfer data
from the EC2 instances to the S3 bucket.
D.Create an AWS Direct Connect connection to the application for data ingestion. Create Amazon Kinesis Data
Firehose delivery streams to consume direct PUT operations from the application. Specify the S3 bucket as the
destination of the delivery streams.
Answer: A
Explanation:
Create Amazon Kinesis data streams for data ingestion. Create Amazon Kinesis Data Firehose delivery
streams to consume the Kinesis data streams. Specify the S3 bucket as the destination of the delivery
streams.
The company decides to use Amazon DynamoDB as the primary database for the application. A solutions architect
needs to identify a solution that handles the large data sizes.
Which solution will meet these requirements in the MOST operationally efficient way?
A.Create an AWS Lambda function to filter the data that exceeds DynamoDB item size limits. Store the larger
data in an Amazon DocumentDB (with MongoDB compatibility) database.
B.Store the large data as objects in an Amazon S3 bucket. In a DynamoDB table, create an item that has an
attribute that points to the S3 URL of the data.
C.Split all incoming large data into a collection of items that have the same partition key. Write the data to a
DynamoDB table in a single operation by using the BatchWriteItem API operation.
D.Create an AWS Lambda function that uses gzip compression to compress the large objects as they are
written to a DynamoDB table.
Answer: B
Explanation:
Store the large data as objects in an Amazon S3 bucket. In a DynamoDB table, create an item that has an
attribute that points to the S3 URL of the data.
Question: 820 CertyIQ
A company is migrating a legacy application from an on-premises data center to AWS. The application relies on
hundreds of cron jobs that run between 1 and 20 minutes on different recurring schedules throughout the day.
The company wants a solution to schedule and run the cron jobs on AWS with minimal refactoring. The solution
must support running the cron jobs in response to an event in the future.
A.Create a container image for the cron jobs. Use Amazon EventBridge Scheduler to create a recurring
schedule. Run the cron job tasks as AWS Lambda functions.
B.Create a container image for the cron jobs. Use AWS Batch on Amazon Elastic Container Service (Amazon
ECS) with a scheduling policy to run the cron jobs.
C.Create a container image for the cron jobs. Use Amazon EventBridge Scheduler to create a recurring
schedule. Run the cron job tasks on AWS Fargate.
D.Create a container image for the cron jobs. Create a workflow in AWS Step Functions that uses a Wait state
to run the cron jobs at a specified time. Use the RunTask action to run the cron job tasks on AWS Fargate.
Answer: C
Explanation:
Create a container image for the cron jobs. Use Amazon EventBridge Scheduler to create a recurring
schedule. Run the cron job tasks on AWS Fargate.
Which solution will meet these requirements with the LEAST development effort?
A.Establish a VPN connection from the VPC to Salesforce. Use AWS Glue DataBrew to transfer data.
B.Establish an AWS Direct Connect connection from the VPC to Salesforce. Use AWS Glue DataBrew to
transfer data.
C.Create an AWS PrivateLink connection in the VPC to Salesforce. Use Amazon AppFlow to transfer data.
D.Create a VPC peering connection to Salesforce. Use Amazon AppFlow to transfer data.
Answer: C
Explanation:
Create an AWS PrivateLink connection in the VPC to Salesforce. Use Amazon AppFlow to transfer data.
The company needs to optimize storage costs with some application and services changes.
Which solution will meet these requirements MOST cost-effectively?
A.Create an Amazon S3 bucket that uses an Intelligent-Tiering lifecycle policy. Copy all files to the S3 bucket.
Update the application to use Amazon S3 API to store and retrieve files.
B.Deploy Amazon FSx for Windows File Server file shares. Update the application to use CIFS protocol to store
and retrieve files.
C.Deploy Amazon FSx for OpenZFS file system shares. Update the application to use the new mount point to
store and retrieve files.
D.Create an Amazon S3 bucket that uses S3 Glacier Flexible Retrieval. Copy all files to the S3 bucket. Update
the application to use Amazon S3 API to store and retrieve files as standard retrievals.
Answer: A
Explanation:
Create an Amazon S3 bucket that uses an Intelligent-Tiering lifecycle policy. Copy all files to the S3 bucket.
Update the application to use Amazon S3 API to store and retrieve files.
The company needs a public load balancer in the AWS Cloud that will ensure seamless communication with
backend services. The load balancer must be capable of routing traffic based on the query strings to different
target groups. The traffic must also be encrypted.
A.Use a Network Load Balancer with a certificate attached from AWS Certificate Manager (ACM). Use query
parameter-based routing.
B.Use a Gateway Load Balancer. Import a generated certificate in AWS Identity and Access Management (IAM).
Attach the certificate to the load balancer. Use HTTP path-based routing.
C.Use an Application Load Balancer with a certificate attached from AWS Certificate Manager (ACM). Use
query parameter-based routing.
D.Use a Network Load Balancer. Import a generated certificate in AWS Identity and Access Management (IAM).
Attach the certificate to the load balancer. Use query parameter-based routing.
Answer: C
Explanation:
Use an Application Load Balancer with a certificate attached from AWS Certificate Manager (ACM). Use query
parameter-based routing.
A.Deploy the application to EC2 instances that run in an Auto Scaling group behind an Application Load
Balancer. Create an Amazon Redshift cluster that has multiple MySQL-compatible nodes.
B.Deploy the application to EC2 instances that are configured as a target group behind an Application Load
Balancer. Create an Amazon RDS for MySQL cluster that has multiple instances.
C.Deploy the application to EC2 instances that run in an Auto Scaling group behind an Application Load
Balancer. Create an Amazon Aurora Serverless MySQL cluster for the database layer.
D.Deploy the application to EC2 instances that are configured as a target group behind an Application Load
Balancer. Create an Amazon ElastiCache for Redis cluster that uses the MySQL connector.
Answer: C
Explanation:
Deploy the application to EC2 instances that run in an Auto Scaling group behind an Application Load
Balancer. Create an Amazon Aurora Serverless MySQL cluster for the database layer.
Which solution will meet these requirements with the LEAST operational overhead?
A.Migrate the data to the S3 bucket. Use server-side encryption with Amazon S3 managed keys (SSE-S3). Use
the built-in key rotation behavior of SSE-S3 encryption keys.
B.Create an AWS Key Management Service (AWS KMS) customer managed key. Enable automatic key rotation.
Set the S3 bucket's default encryption behavior to use the customer managed KMS key. Migrate the data to
the S3 bucket.
C.Create an AWS Key Management Service (AWS KMS) customer managed key. Set the S3 bucket's default
encryption behavior to use the customer managed KMS key. Migrate the data to the S3 bucket. Manually rotate
the KMS key every year.
D.Use customer key material to encrypt the data. Migrate the data to the S3 bucket. Create an AWS Key
Management Service (AWS KMS) key without key material. Import the customer key material into the KMS key.
Enable automatic key rotation.
Answer: A
Explanation:
Migrate the data to the S3 bucket. Use server-side encryption with Amazon S3 managed keys (SSE-S3). Use
the built-in key rotation behavior of SSE-S3 encryption keys.
The company's security team needs a single sign-on solution across all the company's AWS accounts. The
company must continue to manage users and groups that are in the on-premises Active Directory.
A.Create an Enterprise Edition Active Directory in AWS Directory Service for Microsoft Active Directory.
Configure the Active Directory to be the identity source for AWS IAM Identity Center.
B.Enable AWS IAM Identity Center. Configure a two-way forest trust relationship to connect the company's
self-managed Active Directory with IAM Identity Center by using AWS Directory Service for Microsoft Active
Directory.
C.Use AWS Directory Service and create a two-way trust relationship with the company's self-managed Active
Directory.
D.Deploy an identity provider (IdP) on Amazon EC2. Link the IdP as an identity source within AWS IAM Identity
Center.
Answer: B
Explanation:
Enable AWS IAM Identity Center. Configure a two-way forest trust relationship to connect the company's
self-managed Active Directory with IAM Identity Center by using AWS Directory Service for Microsoft Active
Directory.
Answer: C
Explanation:
The company's third-party auditors need proof that the designed controls have been implemented and are
functioning correctly. The company has hundreds of AWS accounts in a single organization in AWS Organizations.
The company needs to monitor the current state of the controls across accounts.
A.Designate one account as the Amazon Inspector delegated administrator account from the Organizations
management account. Integrate Inspector with Organizations to discover and scan resources across all AWS
accounts. Enable Inspector industry standards for NIST and PCI DSS.
B.Designate one account as the Amazon GuardDuty delegated administrator account from the Organizations
management account. In the designated GuardDuty administrator account, enable GuardDuty to protect all
member accounts. Enable GuardDuty industry standards for NIST and PCI DSS.
C.Configure an AWS CloudTrail organization trail in the Organizations management account. Designate one
account as the compliance account. Enable CloudTrail security standards for NIST and PCI DSS in the
compliance account.
D.Designate one account as the AWS Security Hub delegated administrator account from the Organizations
management account. In the designated Security Hub administrator account, enable Security Hub for all
member accounts. Enable Security Hub standards for NIST and PCI DSS.
Answer: D
Explanation:
Designate one account as the AWS Security Hub delegated administrator account from the Organizations
management account. In the designated Security Hub administrator account, enable Security Hub for all
member accounts. Enable Security Hub standards for NIST and PCI DSS.
What is the MOST operationally efficient solution that meets these requirements?
Answer: A
Explanation:
A.Use an Amazon S3 bucket to store the datasets. Use Amazon Athena to perform SQL JOIN queries to find
connections.
B.Use Amazon Neptune to store the datasets with edges and vertices. Query the data to find connections.
C.Use an Amazon S3 bucket to store the datasets. Use Amazon QuickSight to visualize connections.
D.Use Amazon RDS to store the datasets with multiple tables. Perform SQL JOIN queries to find connections.
Answer: B
Explanation:
Use Amazon Neptune to store the datasets with edges and vertices. Query the data to find connections.
Question: 831 CertyIQ
A company needs a secure connection between its on-premises environment and AWS. This connection does not
need high bandwidth and will handle a small amount of traffic. The connection should be set up quickly.
Answer: D
Explanation:
Reference:
https://docs.aws.amazon.com/vpn/latest/s2svpn/VPC_VPN.html
Which solution will meet these requirements with the LEAST operational overhead?
A.Configure an S3 File Gateway. Create SMB file shares on the file gateway that use the existing Active
Directory to authenticate.
B.Configure an Auto Scaling group with Amazon EC2 instances to run an SFTP solution. Configure the group to
scale up at 60% CPU utilization.
C.Create an AWS Transfer Family server with SFTP endpoints. Choose the AWS Directory Service option as the
identity provider. Use AD Connector to connect the on-premises Active Directory.
D.Create an AWS Transfer Family SFTP endpoint. Configure the endpoint to use the AWS Directory Service
option as the identity provider to connect to the existing Active Directory.
Answer: C
Explanation:
Create an AWS Transfer Family server with SFTP endpoints. Choose the AWS Directory Service option as the
identity provider. Use AD Connector to connect the on-premises Active Directory.
The company wants to ensure that each validation step Lambda function has access to only the information from
the order event that the function requires. The components of the order processing system should be loosely
coupled to accommodate future business changes.
A.Create an Amazon Simple Queue Service (Amazon SQS) queue for each validation step. Create a new Lambda
function to transform the order data to the format that each validation step requires and to publish the
messages to the appropriate SQS queues. Subscribe each validation step Lambda function to its corresponding
SQS queue.
B.Create an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the validation step Lambda
functions to the SNS topic. Use message body filtering to send only the required data to each subscribed
Lambda function.
C.Create an Amazon EventBridge event bus. Create an event rule for each validation step. Configure the input
transformer to send only the required data to each target validation step Lambda function.
D.Create an Amazon Simple Queue Service (Amazon SQS) queue. Create a new Lambda function to subscribe to
the SQS queue and to transform the order data to the format that each validation step requires. Use the new
Lambda function to perform synchronous invocations of the validation step Lambda functions in parallel on
separate threads.
Answer: C
Explanation:
Create an Amazon EventBridge event bus. Create an event rule for each validation step. Configure the input
transformer to send only the required data to each target validation step Lambda function.
Which solution will improve the performance of the application when it is moved to AWS?
A.Import the data into an Amazon DynamoDB table with provisioned capacity. Refactor the application to use
DynamoDB for reports.
B.Create the database on a compute optimized Amazon EC2 instance. Ensure compute resources exceed the
on-premises database.
C.Create an Amazon Aurora MySQL Multi-AZ DB cluster with multiple read replicas. Configure the application
to use the reader endpoint for reports.
D.Create an Amazon Aurora MySQL Multi-AZ DB cluster. Configure the application to use the backup instance
of the cluster as an endpoint for the reports.
Answer: C
Explanation:
Create an Amazon Aurora MySQL Multi-AZ DB cluster with multiple read replicas. Configure the application
to use the reader endpoint for reports.
A.Create a public virtual interface (VIF). Route the AWS traffic over the public VIF.
B.Create a VPC and a NAT gateway. Route the AWS traffic from the on-premises network to the NAT gateway.
C.Create a VPC and an Amazon S3 interface endpoint. Route the AWS traffic from the on-premises network to
the S3 interface endpoint.
D.Create a VPC peering connection between the on-premises network and Direct Connect. Route the AWS
traffic over the peering connection.
Answer: C
Explanation:
Create a VPC and an Amazon S3 interface endpoint. Route the AWS traffic from the on-premises network to
the S3 interface endpoint.
The company is expanding, and the company's engineering team deploys the website to a second Region. The
company wants to distribute traffic across both Regions to accommodate growth and for disaster recovery
purposes. The solution should not serve traffic from a Region in which the website is unhealthy.
Which policy or resource should the company use to meet these requirements?
Answer: B
Explanation:
A.Migrate all the files to an Amazon S3 bucket. Instruct the employees to access the files from the S3 bucket.
B.Take a snapshot of the existing EBS volume. Mount the snapshot as an EBS volume across the EC2 instances.
Instruct the employees to access the files from the EC2 instances.
C.Mount an Amazon Elastic File System (Amazon EFS) file system across all the EC2 instances. Instruct the
employees to access the files from the EC2 instances.
D.Create an Amazon Machine Image (AMI) from the EC2 instances. Configure new EC2 instances from the AMI
that use an instance store volume. Instruct the employees to access the files from the EC2 instances.
Answer: C
Explanation:
Mount an Amazon Elastic File System (Amazon EFS) file system across all the EC2 instances. Instruct the
employees to access the files from the EC2 instances.
Which solution should a solutions architect recommend to meet this requirement with the LEAST amount of
changes to the infrastructure?
A.Deploy AWS Certificate Manager to generate certificates. Use the certificates to encrypt the database
volume.
B.Deploy AWS CloudHSM, generate encryption keys, and use the keys to encrypt database volumes.
C.Configure SSL encryption using AWS Key Management Service (AWS KMS) keys to encrypt database
volumes.
D.Configure Amazon Elastic Block Store (Amazon EBS) encryption and Amazon RDS encryption with AWS Key
Management Service (AWS KMS) keys to encrypt instance and database volumes.
Answer: C
Explanation:
Configure SSL encryption using AWS Key Management Service (AWS KMS) keys to encrypt database
volumes.
Intermittently, the Lambda function times out while trying to upload the object because of saturated traffic on the
NAT instance's network. The company wants to access Amazon S3 without traversing the internet.
A.Replace the EC2 NAT instance with an AWS managed NAT gateway.
B.Increase the size of the EC2 NAT instance in the VPC to a network optimized instance type.
C.Provision a gateway endpoint for Amazon S3 in the VPUpdate the route tables of the subnets accordingly.
D.Provision a transit gateway. Place transit gateway attachments in the private subnets where the Lambda
function is running.
Answer: C
Explanation:
Provision a gateway endpoint for Amazon S3 in the VPUpdate the route tables of the subnets accordingly.
A solutions architect must design a solution that gives the reporters the ability to send the highest quality streams.
The solution must provide accelerated TCP connections back to the broadcast system.
A.Amazon CloudFront
B.AWS Global Accelerator
C.AWS Client VPN
D.Amazon EC2 instances and AWS Elastic IP addresses
Answer: B
Explanation:
Because of new regulations, the company needs to keep the monthly snapshots for 7 years. The company needs to
change its backup strategy to comply with the new regulations and to ensure that data is available with minimal
administrative effort.
A.Keep the daily snapshot in the EBS snapshot standard tier for 1 month. Copy the monthly snapshot to Amazon
S3 Glacier Deep Archive with a 7-year retention period.
B.Continue with the current EBS snapshot policy. Add a new policy to move the monthly snapshot to Amazon
EBS Snapshots Archive with a 7-year retention period.
C.Keep the daily snapshot in the EBS snapshot standard tier for 1 month. Keep the monthly snapshot in the
standard tier for 7 years. Use incremental snapshots.
D.Keep the daily snapshot in the EBS snapshot standard tier. Use EBS direct APIs to take snapshots of all the
EBS volumes every month. Store the snapshots in an Amazon S3 bucket in the Infrequent Access tier for 7
years.
Answer: B
Explanation:
Continue with the current EBS snapshot policy. Add a new policy to move the monthly snapshot to Amazon
EBS Snapshots Archive with a 7-year retention period.
Question: 842 CertyIQ
A company runs an application on several Amazon EC2 instances that store persistent data on an Amazon Elastic
File System (Amazon EFS) file system. The company needs to replicate the data to another AWS Region by using
an AWS managed service solution.
A.Use the EFS-to-EFS backup solution to replicate the data to an EFS file system in another Region.
B.Run a nightly script to copy data from the EFS file system to an Amazon S3 bucket. Enable S3 Cross-Region
Replication on the S3 bucket.
C.Create a VPC in another Region. Establish a cross-Region VPC peer. Run a nightly rsync to copy data from the
original Region to the new Region.
D.Use AWS Backup to create a backup plan with a rule that takes a daily backup and replicates it to another
Region. Assign the EFS file system resource to the backup plan.
Answer: A
Explanation:
Use the EFS-to-EFS backup solution to replicate the data to an EFS file system in another Region.
The company expects a high volume of customers during a promotional event. The new infrastructure in the AWS
Cloud must be highly available and scalable.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Migrate the web application to two Amazon EC2 instances across two Availability Zones behind an
Application Load Balancer. Migrate the database to Amazon RDS for Microsoft SQL Server with read replicas in
both Availability Zones.
B.Migrate the web application to an Amazon EC2 instance that runs in an Auto Scaling group across two
Availability Zones behind an Application Load Balancer. Migrate the database to two EC2 instances across
separate AWS Regions with database replication.
C.Migrate the web application to Amazon EC2 instances that run in an Auto Scaling group across two
Availability Zones behind an Application Load Balancer. Migrate the database to Amazon RDS with Multi-AZ
deployment.
D.Migrate the web application to three Amazon EC2 instances across three Availability Zones behind an
Application Load Balancer. Migrate the database to three EC2 instances across three Availability Zones.
Answer: C
Explanation:
Migrate the web application to Amazon EC2 instances that run in an Auto Scaling group across two
Availability Zones behind an Application Load Balancer. Migrate the database to Amazon RDS with Multi-AZ
deployment.
Question: 844 CertyIQ
A company has an on-premises business application that generates hundreds of files each day. These files are
stored on an SMB file share and require a low-latency connection to the application servers. A new company policy
states all application-generated files must be copied to AWS. There is already a VPN connection to AWS.
The application development team does not have time to make the necessary code modifications to move the
application to AWS.
Which service should a solutions architect recommend to allow the application to copy files to AWS?
Answer: D
Explanation:
AWS Storage Gateway service enables hybrid storage between on-premises environments and the AWS
Cloud. It provides low-latency performance by caching frequently accessed data on premises, while storing
data securely and durably in Amazon cloud storage services.
Which solution will meet these requirements with the MOST operational efficiency?
A.Create a script that scans the DynamoDB table and uses Amazon Simple Notification Service (Amazon SNS)
to send email messages to employees when necessary. Use a cron job to run this script every day on an Amazon
EC2 instance.
B.Create a script that scans the DynamoDB table and uses Amazon Simple Queue Service (Amazon SQS) to
send email messages to employees when necessary. Use a cron job to run this script every day on an Amazon
EC2 instance.
C.Create an AWS Lambda function that scans the DynamoDB table and uses Amazon Simple Notification
Service (Amazon SNS) to send email messages to employees when necessary. Schedule this Lambda function
to run every day.
D.Create an AWS Lambda function that scans the DynamoDB table and uses Amazon Simple Queue Service
(Amazon SQS) to send email messages to employees when necessary. Schedule this Lambda function to run
every day.
Answer: C
Explanation:
Create an AWS Lambda function that scans the DynamoDB table and uses Amazon Simple Notification
Service (Amazon SNS) to send email messages to employees when necessary. Schedule this Lambda function
to run every day.
A.Create an Amazon CloudWatch alarm to scale up the EC2 instances when CPU utilization exceeds 90%.
B.Create a recurring scheduled action to scale up the Auto Scaling group before the expected period of peak
demand.
C.Increase the minimum and maximum number of EC2 instances in the Auto Scaling group during the peak
demand period.
D.Configure an Amazon Simple Notification Service (Amazon SNS) notification to send alerts when there are
autoscaling:EC2_INSTANCE_LAUNCH events.
Answer: B
Explanation:
Create a recurring scheduled action to scale up the Auto Scaling group before the expected period of peak
demand.
Which solution meets this requirement with the LEAST operational overhead?
A.Store the password in AWS Secrets Manager. Enable automatic rotation on the secret.
B.Store the password in AWS Systems Manager Parameter Store. Enable automatic rotation on the parameter.
C.Store the password in AWS Systems Manager Parameter Store. Write an AWS Lambda function that rotates
the password.
D.Store the password in AWS Key Management Service (AWS KMS). Enable automatic rotation on the AWS
KMS key.
Answer: A
Explanation:
Store the password in AWS Secrets Manager. Enable automatic rotation on the secret.
A.Migrate the database to Amazon RDS for Oracle by using native tools. Replace the third-party features with
AWS Lambda.
B.Migrate the database to Amazon RDS Custom for Oracle by using native tools. Customize the new database
settings to support the third-party features.
C.Migrate the database to Amazon DynamoDB by using AWS Database Migration Service (AWS DMS).
Customize the new database settings to support the third-party features.
D.Migrate the database to Amazon RDS for PostgreSQL by using AWS Database Migration Service (AWS DMS).
Rewrite the application code to remove the dependency on third-party features.
Answer: B
Explanation:
Migrate the database to Amazon RDS Custom for Oracle by using native tools. Customize the new database
settings to support the third-party features.
A.Use third-party backup software with an AWS Storage Gateway tape gateway virtual tape library.
B.Use AWS Backup to configure and monitor all backups for the services in use.
C.Use AWS Config to set lifecycle management to take snapshots of all data sources on a schedule.
D.Use AWS Systems Manager State Manager to manage the configuration and monitoring of backup tasks.
Answer: B
Explanation:
Use AWS Backup to configure and monitor all backups for the services in use.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon RDS to store the data. Use SQL to query the data to identify security risks.
B.Use Amazon Neptune to store the data. Use SPARQL to query the data to identify security risks.
C.Use Amazon Redshift to store the data. Use SQL to query the data to identify security risks.
D.Use Amazon DynamoDB to store the data. Use PartiQL to query the data to identify security risks.
Answer: B
Explanation:
Use Amazon Neptune to store the data. Use SPARQL to query the data to identify security risks.
Question: 851 CertyIQ
A large company wants to provide its globally located developers separate, limited size, managed PostgreSQL
databases for development purposes. The databases will be low volume. The developers need the databases only
when they are actively working.
A.Give the developers the ability to launch separate Amazon Aurora instances. Set up a process to shut down
Aurora instances at the end of the workday and to start Aurora instances at the beginning of the next workday.
B.Develop an AWS Service Catalog product that enforces size restrictions for launching Amazon Aurora
instances. Give the developers access to launch the product when they need a development database.
C.Create an Amazon Aurora Serverless cluster. Develop an AWS Service Catalog product to launch databases
in the cluster with the default capacity settings. Grant the developers access to the product.
D.Monitor AWS Trusted Advisor checks for idle Amazon RDS databases. Create a process to terminate
identified idle RDS databases.
Answer: B
Explanation:
Develop an AWS Service Catalog product that enforces size restrictions for launching Amazon Aurora
instances. Give the developers access to launch the product when they need a development database.
A solutions architect must implement a solution in which all the EC2 instances share up-to-date website content
with the least possible lag time.
A.Update the EC2 user data in the Auto Scaling group lifecycle policy to copy the website assets from the EC2
instance that was launched most recently. Configure the ALB to make changes to the website assets only in the
newest EC2 instance.
B.Copy the website assets to an Amazon Elastic File System (Amazon EFS) file system. Configure each EC2
instance to mount the EFS file system locally. Configure the website hosting application to reference the
website assets that are stored in the EFS file system.
C.Copy the website assets to an Amazon S3 bucket. Ensure that each EC2 instance downloads the website
assets from the S3 bucket to the attached Amazon Elastic Block Store (Amazon EBS) volume. Run the S3 sync
command once each hour to keep files up to date.
D.Restore an Amazon Elastic Block Store (Amazon EBS) snapshot with the website assets. Attach the EBS
snapshot as a secondary EBS volume when a new EC2 instance is launched. Configure the website hosting
application to reference the website assets that are stored in the secondary EBS volume.
Answer: B
Explanation:
Copy the website assets to an Amazon Elastic File System (Amazon EFS) file system. Configure each EC2
instance to mount the EFS file system locally. Configure the website hosting application to reference the
website assets that are stored in the EFS file system.
Question: 853 CertyIQ
A company's web application consists of multiple Amazon EC2 instances that run behind an Application Load
Balancer in a VPC. An Amazon RDS for MySQL DB instance contains the data. The company needs the ability to
automatically detect and respond to suspicious or unexpected behavior in its AWS environment. The company
already has added AWS WAF to its architecture.
A.Use Amazon GuardDuty to perform threat detection. Configure Amazon EventBridge to filter for GuardDuty
findings and to invoke an AWS Lambda function to adjust the AWS WAF rules.
B.Use AWS Firewall Manager to perform threat detection. Configure Amazon EventBridge to filter for Firewall
Manager findings and to invoke an AWS Lambda function to adjust the AWS WAF web ACL.
C.Use Amazon Inspector to perform threat detection and to update the AWS WAF rules. Create a VPC network
ACL to limit access to the web application.
D.Use Amazon Macie to perform threat detection and to update the AWS WAF rules. Create a VPC network ACL
to limit access to the web application.
Answer: A
Explanation:
Use Amazon GuardDuty to perform threat detection. Configure Amazon EventBridge to filter for GuardDuty
findings and to invoke an AWS Lambda function to adjust the AWS WAF rules.
Which solution meets these requirements with the LEAST operational effort?
A.Create a database user with a user name and password. Add parameters for the database user name and
password to the CloudFormation template. Pass the parameters to the EC2 instances when the instances are
launched.
B.Create a database user with a user name and password. Store the user name and password in AWS Systems
Manager Parameter Store. Configure the EC2 instances to retrieve the database credentials from Parameter
Store.
C.Configure the DB cluster to use IAM database authentication. Create a database user to use with IAM
authentication. Associate a role with the EC2 instances to allow applications on the instances to access the
database.
D.Configure the DB cluster to use IAM database authentication with an IAM user. Create a database user that
has a name that matches the IAM user. Associate the IAM user with the EC2 instances to allow applications on
the instances to access the database.
Answer: C
Explanation:
Configure the DB cluster to use IAM database authentication. Create a database user to use with IAM
authentication. Associate a role with the EC2 instances to allow applications on the instances to access the
database.
Question: 855 CertyIQ
A company wants to configure its Amazon CloudFront distribution to use SSL/TLS certificates. The company does
not want to use the default domain name for the distribution. Instead, the company wants to use a different domain
name for the distribution.
Which solution will deploy the certificate without incurring any additional costs?
A.Request an Amazon issued private certificate from AWS Certificate Manager (ACM) in the us-east-1 Region.
B.Request an Amazon issued private certificate from AWS Certificate Manager (ACM) in the us-west-1 Region.
C.Request an Amazon issued public certificate from AWS Certificate Manager (ACM) in the us-east-1 Region.
D.Request an Amazon issued public certificate from AWS Certificate Manager (ACM) in the us-west-1 Region.
Answer: C
Explanation:
Request an Amazon issued public certificate from AWS Certificate Manager (ACM) in the us-east-1 Region.
The company must implement a solution to allow the external consultant access to only the report.
Which solution will meet these requirements with the MOST operational efficiency?
A.Create a new S3 bucket that is configured to host a public static website. Migrate the operations data to the
new S3 bucket. Share the S3 website URL with the external consultant.
B.Enable public access to the S3 bucket for 7 days. Remove access to the S3 bucket when the external
consultant completes the audit.
C.Create a new IAM user that has access to the report in the S3 bucket. Provide the access keys to the external
consultant. Revoke the access keys after 7 days.
D.Generate a presigned URL that has the required access to the location of the report on the S3 bucket. Share
the presigned URL with the external consultant.
Answer: D
Explanation:
Generate a presigned URL that has the required access to the location of the report on the S3 bucket. Share
the presigned URL with the external consultant.
Answer: A
Explanation:
A.Two AWS Direct Connect connections from the primary data center terminating at two Direct Connect
locations on two separate devices
B.A single AWS Direct Connect connection from each of the primary and secondary data centers terminating at
one Direct Connect location on the same device
C.Two AWS Direct Connect connections from each of the primary and secondary data centers terminating at
two Direct Connect locations on two separate devices
D.A single AWS Direct Connect connection from each of the primary and secondary data centers terminating at
one Direct Connect location on two separate devices
Answer: C
Explanation:
Two AWS Direct Connect connections from each of the primary and secondary data centers terminating at
two Direct Connect locations on two separate devices.
The company's finance team has access to the organization's management account and member accounts. The
finance team wants to find ways to optimize costs by using AWS Trusted Advisor.
Answer: AC
Explanation:
C.Review the Trusted Advisor checks for Amazon RDS Reserved Instance Optimization.
A.Create a gateway endpoint for Amazon S3 in the VPC. In the route tables for the private subnets, add an entry
for the gateway endpoint.
B.Create a single NAT gateway in a public subnet. In the route tables for the private subnets, add a default
route that points to the NAT gateway.
C.Create an AWS PrivateLink interface endpoint for Amazon S3 in the VPIn the route tables for the private
subnets, add an entry for the interface endpoint.
D.Create one NAT gateway for each Availability Zone in public subnets. In each of the route tables for the
private subnets, add a default route that points to the NAT gateway in the same Availability Zone.
Answer: A
Explanation:
Create a gateway endpoint for Amazon S3 in the VPC. In the route tables for the private subnets, add an entry
for the gateway endpoint.
A.Provision an Amazon RDS for MySQL DB instance with Provisioned IOPS SSD storage. Monitor write operation
metrics by using Amazon CloudWatch. Adjust the provisioned IOPS if necessary.
B.Provision an Amazon RDS for MySQL DB instance with General Purpose SSD storage. Place an Amazon
ElastiCache cluster in front of the DB instance. Configure the application to query ElastiCache instead.
C.Provision an Amazon DocumentDB (with MongoDB compatibility) instance with a memory optimized instance
type. Monitor Amazon CloudWatch for performance-related issues. Change the instance class if necessary.
D.Provision an Amazon Elastic File System (Amazon EFS) file system in General Purpose performance mode.
Monitor Amazon CloudWatch for IOPS bottlenecks. Change to Provisioned Throughput performance mode if
necessary.
Answer: A
Explanation:
Provision an Amazon RDS for MySQL DB instance with Provisioned IOPS SSD storage. Monitor write operation
metrics by using Amazon CloudWatch. Adjust the provisioned IOPS if necessary.
Question: 862 CertyIQ
A company runs an application in the AWS Cloud that generates sensitive archival data files. The company wants
to rearchitect the application's data storage. The company wants to encrypt the data files and to ensure that third
parties do not have access to the data before the data is encrypted and sent to AWS. The company has already
created an Amazon S3 bucket.
A.Configure the S3 bucket to use client-side encryption with an Amazon S3 managed encryption key. Configure
the application to use the S3 bucket to store the archival files.
B.Configure the S3 bucket to use server-side encryption with AWS KMS keys (SSE-KMS). Configure the
application to use the S3 bucket to store the archival files.
C.Configure the S3 bucket to use dual-layer server-side encryption with AWS KMS keys (SSE-KMS). Configure
the application to use the S3 bucket to store the archival files.
D.Configure the application to use client-side encryption with a key stored in AWS Key Management Service
(AWS KMS). Configure the application to store the archival files in the S3 bucket.
Answer: D
Explanation:
Configure the application to use client-side encryption with a key stored in AWS Key Management Service
(AWS KMS). Configure the application to store the archival files in the S3 bucket.
Which solution will meet these requirements with the LEAST operational overhead?
Answer: B
Explanation:
Modify the RDS database to have a retention period of 30 days for automated backups.
Answer: C
Explanation:
Create an Aurora read replica in the existing Aurora DB cluster. Update the application to use the replica
endpoint for read-only queries and to use the cluster endpoint for write queries.
Which combination of steps should the solutions architect take? (Choose two.)
Answer: AE
Explanation:
E.Use AWS Fargate with Amazon Elastic Container Service (Amazon ECS) to process the data.
A.Create a gateway VPC endpoint for Amazon S3. Create a route in the VPC route table to the endpoint.
B.Create an internal Network Load Balancer that has the S3 bucket as the target.
C.Deploy the S3 bucket inside the VPCreate a route in the VPC route table to the bucket.
D.Create an AWS Direct Connect connection between the VPC and an S3 regional endpoint.
Answer: A
Explanation:
Create a gateway VPC endpoint for Amazon S3. Create a route in the VPC route table to the endpoint.
A.Use Amazon Inspector reporting to generate EBS volume recommendations for optimization.
B.Use AWS Systems Manager reporting to determine EBS volume recommendations for optimization.
C.Use Amazon CloudWatch metrics reporting to determine EBS volume recommendations for optimization.
D.Use AWS Compute Optimizer to generate EBS volume recommendations for optimization.
Answer: D
Explanation:
Use AWS Compute Optimizer to generate EBS volume recommendations for optimization.
B.Use Amazon S3 Storage Lens to identify all S3 buckets that are not versioning-enabled across Regions.
C.Enable IAM Access Analyzer for S3 to identify all S3 buckets that are not versioning-enabled across Regions.
D.Create an S3 Multi-Region Access Point to identify all S3 buckets that are not versioning-enabled across
Regions.
Answer: B
Explanation:
Use Amazon S3 Storage Lens to identify all S3 buckets that are not versioning-enabled across Regions.
A.Create an Amazon Simple Queue Service (Amazon SQS) FIFO queue. Put all the orders in the SQS queue.
Configure an AWS Lambda function as the target to process the orders.
B.Create an Amazon Simple Notification Service (Amazon SNS) standard topic. Publish all the orders to the
SNS standard topic. Configure the application as a notification target.
C.Create a flow by using Amazon AppFlow. Send the orders to the flow. Configure an AWS Lambda function as
the target to process the orders.
D.Configure AWS X-Ray in the application to track the order requests. Configure the application to process the
orders by pulling the orders from Amazon CloudWatch.
Answer: A
Explanation:
Create an Amazon Simple Queue Service (Amazon SQS) FIFO queue. Put all the orders in the SQS queue.
Configure an AWS Lambda function as the target to process the orders.
A.Create two policy documents by using the AWS Management Console in each account. Assign the policy to
developers who need access.
B.Create an IAM role in the Development account. Grant the IAM role access to the Production account. Allow
developers to assume the role.
C.Create an IAM role in the Production account. Define a trust policy that specifies the Development account.
Allow developers to assume the role.
D.Create an IAM group in the Production account. Add the group as a principal in a trust policy that specifies
the Production account. Add developers to the group.
Answer: D
Explanation:
Create an IAM group in the Production account. Add the group as a principal in a trust policy that specifies the
Production account. Add developers to the group.
The solution must integrate with the web application and serve web content globally. The application currently has
a small user base, but the company expects the application's user base to increase.
A.Configure Amazon Cognito for authentication. Implement Lambda@Edge for authorization. Configure Amazon
CloudFront to serve the web application globally.
B.Configure AWS Directory Service for Microsoft Active Directory for authentication. Implement AWS Lambda
for authorization. Use an Application Load Balancer to serve the web application globally.
C.Configure Amazon Cognito for authentication. Implement AWS Lambda for authorization. Use Amazon S3
Transfer Acceleration to serve the web application globally.
D.Configure AWS Directory Service for Microsoft Active Directory for authentication. Implement Lambda@Edge
for authorization. Use AWS Elastic Beanstalk to serve the web application globally.
Answer: A
Explanation:
Configure Amazon Cognito for authentication. Implement Lambda@Edge for authorization. Configure Amazon
CloudFront to serve the web application globally.
How can the solutions architect meet this requirement with the LEAST operational overhead?
A.Update the IAM policies to deny the launch of large EC2 instances. Apply the policies to all users.
B.Define a resource in AWS Resource Access Manager that prevents the launch of large EC2 instances.
C.Create an IAM role in each account that denies the launch of large EC2 instances. Grant the developers IAM
group access to the role.
D.Create an organization in AWS Organizations in the management account with the default policy. Create a
service control policy (SCP) that denies the launch of large EC2 instances, and apply it to the AWS accounts.
Answer: D
Explanation:
Reference:
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html
A.Set up AWS Systems Manager Patch Manager to manage all the EC2 instances. Configure AWS Security Hub
to produce monthly reports.
B.Set up AWS Systems Manager Patch Manager to manage all the EC2 instances. Deploy Amazon Inspector,
and configure monthly reports.
C.Set up AWS Shield Advanced, and configure monthly reports. Deploy AWS Config to automate patch
installations on the EC2 instances.
D.Set up Amazon GuardDuty in the account to monitor all EC2 instances. Deploy AWS Config to automate patch
installations on the EC2 instances.
Answer: B
Explanation:
Set up AWS Systems Manager Patch Manager to manage all the EC2 instances. Deploy Amazon Inspector,
and configure monthly reports.
For disaster recovery (DR) purposes, the company wants to ensure that the application is available from another
AWS Region with minimal downtime.
Which solution will meet these requirements with the LEAST downtime?
A.Create an Auto Scaling group and an ELB in the DR Region. Configure the DynamoDB table as a global table.
Configure DNS failover to point to the new DR Region's ELB.
B.Create an AWS CloudFormation template to create EC2 instances, ELBs, and DynamoDB tables to be
launched when necessary. Configure DNS failover to point to the new DR Region's ELB.
C.Create an AWS CloudFormation template to create EC2 instances and an ELB to be launched when
necessary. Configure the DynamoDB table as a global table. Configure DNS failover to point to the new DR
Region's ELB.
D.Create an Auto Scaling group and an ELB in the DR Region. Configure the DynamoDB table as a global table.
Create an Amazon CloudWatch alarm with an evaluation period of 10 minutes to invoke an AWS Lambda
function that updates Amazon Route 53 to point to the DR Region's ELB.
Answer: C
Explanation:
Create an AWS CloudFormation template to create EC2 instances and an ELB to be launched when necessary.
Configure the DynamoDB table as a global table. Configure DNS failover to point to the new DR Region's ELB.
Answer: D
Explanation:
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
A.Configure new EC2 instances in a different Availability Zone. Use Amazon Route 53 to route traffic to all
instances.
B.Configure a Network Load Balancer in front of the EC2 instances.
C.Configure a Network Load Balancer for TCP traffic to the instances. Configure an Application Load Balancer
for HTTP and HTTPS traffic to the instances.
D.Create an Auto Scaling group for the EC2 instances. Configure the Auto Scaling group to use multiple
Availability Zones. Configure the Auto Scaling group to run application health checks on the instances.
E.Create an Amazon CloudWatch alarm. Configure the alarm to restart EC2 instances that transition to a
stopped state.
Answer: BD
Explanation:
D.Create an Auto Scaling group for the EC2 instances. Configure the Auto Scaling group to use multiple
Availability Zones. Configure the Auto Scaling group to run application health checks on the instances.
The company expects fewer than 100 site visits each month. The contact form must notify the company by email
when a customer fills out the form.
A.Host the dynamic contact form in Amazon Elastic Container Service (Amazon ECS). Set up Amazon Simple
Email Service (Amazon SES) to connect to a third-party email provider.
B.Create an Amazon API Gateway endpoint that returns the contact form from an AWS Lambda function.
Configure another Lambda function on the API Gateway to publish a message to an Amazon Simple Notification
Service (Amazon SNS) topic.
C.Host the website by using AWS Amplify Hosting for static content and dynamic content. Use server-side
scripting to build the contact form. Configure Amazon Simple Queue Service (Amazon SQS) to deliver the
message to the company.
D.Migrate the website from Amazon S3 to Amazon EC2 instances that run Windows Server. Use Internet
Information Services (IIS) for Windows Server to host the webpage. Use client-side scripting to build the
contact form. Integrate the form with Amazon WorkMail.
Answer: B
Explanation:
Create an Amazon API Gateway endpoint that returns the contact form from an AWS Lambda function.
Configure another Lambda function on the API Gateway to publish a message to an Amazon Simple
Notification Service (Amazon SNS) topic.
Question: 878 CertyIQ
A company creates dedicated AWS accounts in AWS Organizations for its business units. Recently, an important
notification was sent to the root user email address of a business unit account instead of the assigned account
owner. The company wants to ensure that all future notifications can be sent to different employees based on the
notification categories of billing, operations, or security.
A.Configure each AWS account to use a single email address that the company manages. Ensure that all
account owners can access the email account to receive notifications. Configure alternate contacts for each
AWS account with corresponding distribution lists for the billing team, the security team, and the operations
team for each business unit.
B.Configure each AWS account to use a different email distribution list for each business unit that the company
manages. Configure each distribution list with administrator email addresses that can respond to alerts.
Configure alternate contacts for each AWS account with corresponding distribution lists for the billing team,
the security team, and the operations team for each business unit.
C.Configure each AWS account root user email address to be the individual company managed email address of
one person from each business unit. Configure alternate contacts for each AWS account with corresponding
distribution lists for the billing team, the security team, and the operations team for each business unit.
D.Configure each AWS account root user to use email aliases that go to a centralized mailbox. Configure
alternate contacts for each account by using a single business managed email distribution list each for the
billing team, the security team, and the operations team.
Answer: A
Explanation:
Configure each AWS account to use a single email address that the company manages. Ensure that all
account owners can access the email account to receive notifications. Configure alternate contacts for each
AWS account with corresponding distribution lists for the billing team, the security team, and the operations
team for each business unit.
Customers are experiencing application timeouts during times of peak usage. A solutions architect needs to
rearchitect the application so that the application can scale to meet peak usage demands.
Which combination of actions will meet these requirements MOST cost-effectively? (Choose two.)
A.Configure an Auto Scaling group of new EC2 instances to retry the purchases until the processing is
complete. Update the applications to connect to the DB cluster by using Amazon RDS Proxy.
B.Configure the application to use an Amazon ElastiCache cluster in front of the Aurora PostgreSQL DB cluster.
C.Update the application to send the purchase requests to an Amazon Simple Queue Service (Amazon SQS)
queue. Configure an Auto Scaling group of new EC2 instances that read from the SQS queue.
D.Configure an AWS Lambda function to retry the ticket purchases until the processing is complete.
E.Configure an Amazon AP! Gateway REST API with a usage plan.
Answer: BC
Explanation:
B.Configure the application to use an Amazon ElastiCache cluster in front of the Aurora PostgreSQL DB
cluster.
C.Update the application to send the purchase requests to an Amazon Simple Queue Service (Amazon SQS)
queue. Configure an Auto Scaling group of new EC2 instances that read from the SQS queue.
The company’s senior leadership wants to view a custom dashboard that provides NAT gateway costs each day
starting at the beginning of the current month.
A.Share an Amazon QuickSight dashboard that includes the requested table visual. Configure QuickSight to
use AWS DataSync to query the new report.
B.Share an Amazon QuickSight dashboard that includes the requested table visual. Configure QuickSight to
use Amazon Athena to query the new report.
C.Share an Amazon CloudWatch dashboard that includes the requested table visual. Configure CloudWatch to
use AWS DataSync to query the new report.
D.Share an Amazon CloudWatch dashboard that includes the requested table visual. Configure CloudWatch to
use Amazon Athena to query the new report.
Answer: B
Explanation:
Share an Amazon QuickSight dashboard that includes the requested table visual. Configure QuickSight to use
Amazon Athena to query the new report.
Which combination of caching methods should a solutions architect implement to meet these requirements?
(Choose two.)
Answer: AC
Explanation:
The application will run for 1 year. The number of Lambda functions that the application uses will increase during
the 1-year period. The company must minimize costs on all application resources.
A.Purchase an EC2 Instance Savings Plan. Connect the Lambda functions to the private subnets that contain
the EC2 instances.
B.Purchase an EC2 Instance Savings Plan. Connect the Lambda functions to new public subnets in the same
VPC where the EC2 instances run.
C.Purchase a Compute Savings Plan. Connect the Lambda functions to the private subnets that contain the EC2
instances.
D.Purchase a Compute Savings Plan. Keep the Lambda functions in the Lambda service VPC.
Answer: C
Explanation:
Purchase a Compute Savings Plan. Connect the Lambda functions to the private subnets that contain the EC2
instances.
Which solution will meet these requirements with the LEAST operational overhead?
A.Instruct each developer to tag all their resources with a tag that has a key of CostCenter and a value of the
developer's name. Use the required-tags AWS Config managed rule to check for the tag. Create an AWS
Lambda function to terminate resources that do not have the tag. Configure AWS Cost Explorer to send a daily
report to each developer to monitor their spending.
B.Use AWS Budgets to establish budgets for each developer account. Set up budget alerts for actual and
forecast values to notify developers when they exceed or expect to exceed their assigned budget. Use AWS
Budgets actions to apply a DenyAll policy to the developer's IAM role to prevent additional resources from
being launched when the assigned budget is reached.
C.Use AWS Cost Explorer to monitor and report on costs for each developer account. Configure Cost Explorer
to send a daily report to each developer to monitor their spending. Use AWS Cost Anomaly Detection to detect
anomalous spending and provide alerts.
D.Use AWS Service Catalog to allow developers to launch resources within a limited cost range. Create AWS
Lambda functions in each AWS account to stop running resources at the end of each work day. Configure the
Lambda functions to resume the resources at the start of each work day.
Answer: B
Explanation:
Use AWS Budgets to establish budgets for each developer account. Set up budget alerts for actual and
forecast values to notify developers when they exceed or expect to exceed their assigned budget. Use AWS
Budgets actions to apply a DenyAll policy to the developer's IAM role to prevent additional resources from
being launched when the assigned budget is reached.
Which combination of security group configurations should the solutions architect use? (Choose three.)
A.Configure the security group for the web tier to allow inbound HTTPS traffic from the security group for the
ALB.
B.Configure the security group for the web tier to allow outbound HTTPS traffic to 0.0.0.0/0.
C.Configure the security group for the database tier to allow inbound Microsoft SQL Server traffic from the
security group for the application tier.
D.Configure the security group for the database tier to allow outbound HTTPS traffic and Microsoft SQL Server
traffic to the security group for the web tier.
E.Configure the security group for the application tier to allow inbound HTTPS traffic from the security group
for the web tier.
F.Configure the security group for the application tier to allow outbound HTTPS traffic and Microsoft SQL
Server traffic to the security group for the web tier.
Answer: ACE
Explanation:
A.Configure the security group for the web tier to allow inbound HTTPS traffic from the security group for the
ALB.
C.Configure the security group for the database tier to allow inbound Microsoft SQL Server traffic from the
security group for the application tier.
E.Configure the security group for the application tier to allow inbound HTTPS traffic from the security group
for the web tier.
The company wants to cost optimize the workload now that usage is at a steady state. The company wants to cover
the most services with the fewest savings plans.
Which combination of savings plans will meet these requirements? (Choose two.)
A.Purchase an EC2 Instance Savings Plan for Amazon EC2 and SageMaker.
B.Purchase a Compute Savings Plan for Amazon EC2, Lambda, and SageMaker.
C.Purchase a SageMaker Savings Plan.
D.Purchase a Compute Savings Plan for Lambda, Fargate, and Amazon EC2.
E.Purchase an EC2 Instance Savings Plan for Amazon EC2 and Fargate.
Answer: CD
Explanation:
D.Purchase a Compute Savings Plan for Lambda, Fargate, and Amazon EC2.
A.Use the AWS Schema Conversion Tool (AWS SCT) to rewrite the SQL queries in the applications.
B.Enable Babelfish on Aurora PostgreSQL to run the SQL queries from the applications.
C.Migrate the database schema and data by using the AWS Schema Conversion Tool (AWS SCT) and AWS
Database Migration Service (AWS DMS).
D.Use Amazon RDS Proxy to connect the applications to Aurora PostgreSQL.
E.Use AWS Database Migration Service (AWS DMS) to rewrite the SQL queries in the applications.
Answer: BC
Explanation:
B: Babelfish for Aurora PostgreSQL is a new capability for Amazon Aurora PostgreSQL-Compatible Edition
that enables Aurora to understand commands from applications written for Microsoft SQL Server.C: Is just
obvious: Use Data Migration Tool for the migration, Schema Conversion tool for the Schema conversion.
A solutions architect must design a solution to ensure that all newly created Amazon EBS volumes are encrypted
by default. The solution must also prevent the creation of unencrypted EBS volumes.
A.Configure the EC2 account attributes to always encrypt new EBS volumes.
B.Use AWS Config. Configure the encrypted-volumes identifier. Apply the default AWS Key Management
Service (AWS KMS) key.
C.Configure AWS Systems Manager to create encrypted copies of the EBS volumes. Reconfigure the EC2
instances to use the encrypted volumes.
D.Create a customer managed key in AWS Key Management Service (AWS KMS). Configure AWS Migration
Hub to use the key when the company migrates workloads.
Answer: B
Explanation:
Use AWS Config. Configure the encrypted-volumes identifier. Apply the default AWS Key Management
Service (AWS KMS) key.
A.Use a data stream in Amazon Kinesis Data Streams in on-demand mode to capture the clickstream data. Use
AWS Lambda to process the data in real time.
B.Use Amazon Kinesis Data Firehose to capture the clickstream data. Use AWS Glue to process the data in real
time.
C.Use Amazon Kinesis Video Streams to capture the clickstream data. Use AWS Glue to process the data in real
time.
D.Use Amazon Managed Service for Apache Flink (previously known as Amazon Kinesis Data Analytics) to
capture the clickstream data. Use AWS Lambda to process the data in real time.
Answer: A
Explanation:
Use a data stream in Amazon Kinesis Data Streams in on-demand mode to capture the clickstream data. Use
AWS Lambda to process the data in real time.
A.Set up an AWS CloudTrail event that has a rule to identify all S3 buckets that are not versioning-enabled
across Regions.
B.Use Amazon S3 Storage Lens to identify all S3 buckets that are not versioning-enabled across Regions.
C.Enable IAM Access Analyzer for S3 to identify all S3 buckets that are not versioning-enabled across Regions.
D.Create an S3 Multi-Region Access Point to identify all S3 buckets that are not versioning-enabled across
Regions.
Answer: B
Explanation:
Use Amazon S3 Storage Lens to identify all S3 buckets that are not versioning-enabled across Regions.
A.Create an S3 Lifecycle policy to move the files to S3 Glacier Instant Retrieval 30 days after object creation.
Delete the files 4 years after object creation.
B.Create an S3 Lifecycle policy to move the files to S3 One Zone-Infrequent Access (S3 One Zone-IA) 30 days
after object creation. Delete the files 4 years after object creation.
C.Create an S3 Lifecycle policy to move the files to S3 Standard-Infrequent Access (S3 Standard-IA) 30 days
after object creation. Delete the files 4 years after object creation.
D.Create an S3 Lifecycle policy to move the files to S3 Standard-Infrequent Access (S3 Standard-IA) 30 days
after object creation. Move the files to S3 Glacier Flexible Retrieval 4 years after object creation.
Answer: A
Explanation:
Create an S3 Lifecycle policy to move the files to S3 Glacier Instant Retrieval 30 days after object creation.
Delete the files 4 years after object creation.
A.Implement an active-active design between the two Regions. Configure the application to use the regional S3
endpoints closest to the user.
B.Use an active-passive configuration with S3 Multi-Region Access Points. Create a global endpoint for each of
the Regions.
C.Send user data to the regional S3 endpoints closest to the user. Configure an S3 cross-account replication
rule to keep the S3 buckets synchronized.
D.Set up Amazon S3 to use Multi-Region Access Points in an active-active configuration with a single global
endpoint. Configure S3 Cross-Region Replication.
Answer: D
Explanation:
Using a Multi-region Accesspoint in an Active-Active setup will send data to the closest Region, without
accessing the internet: "send remote user data to the nearest S3 bucket with no public network
congestion"Not very easy to read and understand but it's all there.
https://docs.aws.amazon.com/AmazonS3/latest/userguide/MultiRegionAccessPoints.html
A.Create an Auto Scaling group that has a minimum of one and a maximum of one. Create an Amazon Machine
Image (AMI) of each application instance. Use the AMI to create EC2 instances in the Auto Scaling group
Configure an Application Load Balancer in front of the Auto Scaling group.
B.Use AWS Backup to create an hourly backup of the EC2 instance that hosts each application. Store the
backup in Amazon S3 in a separate Availability Zone. Configure a disaster recovery process to restore the EC2
instance for each application from its most recent backup.
C.Create an Amazon Machine Image (AMI) of each application instance. Launch two new EC2 instances from
the AMI. Place each EC2 instance in a separate Availability Zone. Configure a Network Load Balancer that has
the EC2 instances as targets.
D.Use AWS Mitigation Hub Refactor Spaces to migrate each application off the EC2 instance. Break down
functionality from each application into individual components. Host each application on Amazon Elastic
Container Service (Amazon ECS) with an AWS Fargate launch type.
Answer: C
Explanation:
Create an Amazon Machine Image (AMI) of each application instance. Launch two new EC2 instances from the
AMI. Place each EC2 instance in a separate Availability Zone. Configure a Network Load Balancer that has the
EC2 instances as targets.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use AWS Control Tower to deploy accounts. Create a networking account that has a VPC with private
subnets and public subnets. Use AWS Resource Access Manager (AWS RAM) to share the subnets with the
workload accounts.
B.Use AWS Organizations to deploy accounts. Create a networking account that has a VPC with private subnets
and public subnets. Use AWS Resource Access Manager (AWS RAM) to share the subnets with the workload
accounts.
C.Use AWS Control Tower to deploy accounts. Deploy a VPC in each workload account. Configure each VPC to
route through an inspection VPC by using a transit gateway attachment.
D.Use AWS Organizations to deploy accounts. Deploy a VPC in each workload account. Configure each VPC to
route through an inspection VPC by using a transit gateway attachment.
Answer: B
Explanation:
Use AWS Organizations to deploy accounts. Create a networking account that has a VPC with private subnets
and public subnets. Use AWS Resource Access Manager (AWS RAM) to share the subnets with the workload
accounts.
Question: 894 CertyIQ
A company hosts a website on Amazon EC2 instances behind an Application Load Balancer (ALB). The website
serves static content. Website traffic is increasing. The company wants to minimize the website hosting costs.
A.Move the website to an Amazon S3 bucket. Configure an Amazon CloudFront distribution for the S3 bucket.
B.Move the website to an Amazon S3 bucket. Configure an Amazon ElastiCache cluster for the S3 bucket.
C.Move the website to AWS Amplify. Configure an ALB to resolve to the Amplify website.
D.Move the website to AWS Amplify. Configure EC2 instances to cache the website.
Answer: A
Explanation:
Move the website to an Amazon S3 bucket. Configure an Amazon CloudFront distribution for the S3 bucket.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Create an AWS Storage Gateway Volume Gateway. Create a file share that uses the required client protocol.
Connect the application server to the file share.
B.Create an AWS Storage Gateway Tape Gateway. Configure tapes to use Amazon S3. Connect the application
server to the Tape Gateway.
C.Create an Amazon EC2 Windows instance. Install and configure a Windows file share role on the instance.
Connect the application server to the file share.
D.Create an Amazon FSx for Windows File Server file system. Connect the application server to the file system.
Answer: D
Explanation:
Create an Amazon FSx for Windows File Server file system. Connect the application server to the file system.
The company's target recovery point objective (RPO) is 5 minutes and the target recovery time objective (RTO) is
20 minutes. The company wants to minimize configuration changes.
Which solution will meet these requirements with the MOST operational efficiency?
A.Create an Aurora read replica in us-west-1 similar in size to the production application's Aurora MySQL
cluster writer instance.
B.Convert the Aurora cluster to an Aurora global database. Configure managed failover.
C.Create a new Aurora cluster in us-west-1 that has Cross-Region Replication.
D.Create a new Aurora cluster in us-west-1. Use AWS Database Migration Service (AWS DMS) to sync both
clusters.
Answer: B
Explanation:
Aurora Global Database: allowing a single Amazon Aurora database to span multiple AWS Regions. It
replicates your data with no impact on database performance, enables fast local reads with low latency in
each Region, and provides disaster recovery from Region-wide outages.
A.Create a container for the job. Schedule the job to run as an AWS Fargate task on an Amazon Elastic
Container Service (Amazon ECS) cluster by using Amazon EventBridge Scheduler.
B.Configure the job to run in an AWS Lambda function. Create a scheduled rule in Amazon EventBridge to
invoke the Lambda function.
C.Configure an Auto Scaling group of Amazon EC2 Spot Instances that run Amazon Linux. Configure a crontab
entry on the instances to run the analysis.
D.Configure an AWS DataSync task to run the job. Configure a cron expression to run the task on a schedule.
Answer: A
Explanation:
Create a container for the job. Schedule the job to run as an AWS Fargate task on an Amazon Elastic
Container Service (Amazon ECS) cluster by using Amazon EventBridge Scheduler.
Which solution will meet these requirements with the LEAST development effort?
A.Configure a data lake in AWS Lake Formation. Use AWS Glue crawlers to ingest the security data into the
data lake.
B.Configure an AWS Lambda function to collect the security data in .csv format. Upload the data to an Amazon
S3 bucket.
C.Configure a data lake in Amazon Security Lake to collect the security data. Upload the data to an Amazon S3
bucket.
D.Configure an AWS Database Migration Service (AWS DMS) replication instance to load the security data into
an Amazon RDS cluster.
Answer: C
Explanation:
Configure a data lake in Amazon Security Lake to collect the security data. Upload the data to an Amazon S3
bucket.
If the migration is successful, the company will repeat the migration process for more than 100 applications.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Deploy software VPN tunnels between the application VPCs and the shared services VPC. Add routes
between the application VPCs in their subnets to the shared services VPC.
B.Deploy VPC peering connections between the application VPCs and the shared services VPC. Add routes
between the application VPCs in their subnets to the shared services VPC through the peering connection.
C.Deploy an AWS Direct Connect connection between the application VPCs and the shared services VPAdd
routes from the application VPCs in their subnets to the shared services VPC and the applications VPCs. Add
routes from the shared services VPC subnets to the applications VPCs.
D.Deploy a transit gateway with associations between the transit gateway and the application VPCs and the
shared services VPC. Add routes between the application VPCs in their subnets and the application VPCs to the
shared services VPC through the transit gateway.
Answer: D
Explanation:
Deploy a transit gateway with associations between the transit gateway and the application VPCs and the
shared services VPC. Add routes between the application VPCs in their subnets and the application VPCs to
the shared services VPC through the transit gateway.
The company needs a single container solution that can scale in an on-premises, hybrid, or cloud environment. The
company must run new application containers in the AWS Cloud and must use a load balancer for HTTP traffic.
A.Set up an ECS cluster that uses the AWS Fargate launch type for the cloud application containers. Use an
Amazon ECS Anywhere external launch type for the on-premises application containers.
B.Set up an Application Load Balancer for cloud ECS services.
C.Set up a Network Load Balancer for cloud ECS services.
D.Set up an ECS cluster that uses the AWS Fargate launch type. Use Fargate for the cloud application
containers and the on-premises application containers.
E.Set up an ECS cluster that uses the Amazon EC2 launch type for the cloud application containers. Use
Amazon ECS Anywhere with an AWS Fargate launch type for the on-premises application containers.
Answer: AB
Explanation:
A.Set up an ECS cluster that uses the AWS Fargate launch type for the cloud application containers. Use an
Amazon ECS Anywhere external launch type for the on-premises application containers.
The company wants to use the AWS Cloud to increase security and reduce operational overhead for the databases.
A.Migrate the databases to Amazon EC2 instances. Use an AWS Key Management Service (AWS KMS) AWS
managed key for encryption.
B.Migrate the databases to a Multi-AZ Amazon RDS for SQL Server DB instance. Use an AWS Key Management
Service (AWS KMS) AWS managed key for encryption.
C.Migrate the data to an Amazon S3 bucket. Use Amazon Macie to ensure data security.
D.Migrate the databases to an Amazon DynamoDB table. Use Amazon CloudWatch Logs to ensure data
security.
Answer: B
Explanation:
Migrate the databases to a Multi-AZ Amazon RDS for SQL Server DB instance. Use an AWS Key Management
Service (AWS KMS) AWS managed key for encryption.
A.Create an Auto Scaling group that contains multiple Amazon EC2 instances that host the application across
two Availability Zones. Configure an Application Load Balancer (ALB) and set the Auto Scaling group as the
target. Connect a WAF to the ALB.
B.Create a cluster placement group that contains multiple Amazon EC2 instances that hosts the application.
Configure an Application Load Balancer and set the EC2 instances as the targets. Connect a WAF to the
placement group.
C.Create two Amazon EC2 instances that host the application across two Availability Zones. Configure the EC2
instances as the targets of an Application Load Balancer (ALB). Connect a WAF to the ALB.
D.Create an Auto Scaling group that contains multiple Amazon EC2 instances that host the application across
two Availability Zones. Configure an Application Load Balancer (ALB) and set the Auto Scaling group as the
target. Connect a WAF to the Auto Scaling group.
Answer: A
Explanation:
Create an Auto Scaling group that contains multiple Amazon EC2 instances that host the application across
two Availability Zones. Configure an Application Load Balancer (ALB) and set the Auto Scaling group as the
target. Connect a WAF to the ALB.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create dedicated S3 access points and access point policies for each application.
B.Create an S3 Batch Operations job to set the ACL permissions for each object in the S3 bucket.
C.Replicate the objects in the S3 bucket to new S3 buckets for each application. Create replication rules by
prefix.
D.Replicate the objects in the S3 bucket to new S3 buckets for each application. Create dedicated S3 access
points for each application.
Answer: B
Explanation:
Create an S3 Batch Operations job to set the ACL permissions for each object in the S3 bucket.
A solutions architect needs to change the application to process the images when the images are uploaded.
A.Use S3 Event Notifications to write a message with image details to an Amazon Simple Queue Service
(Amazon SQS) queue. Configure an AWS Lambda function to read the messages from the queue and to process
the images.
B.Use S3 Event Notifications to write a message with image details to an Amazon Simple Queue Service
(Amazon SQS) queue. Configure an EC2 Reserved Instance to read the messages from the queue and to
process the images.
C.Use S3 Event Notifications to publish a message with image details to an Amazon Simple Notification Service
(Amazon SNS) topic. Configure a container instance in Amazon Elastic Container Service (Amazon ECS) to
subscribe to the topic and to process the images.
D.Use S3 Event Notifications to publish a message with image details to an Amazon Simple Notification Service
(Amazon SNS) topic. Configure an AWS Elastic Beanstalk application to subscribe to the topic and to process
the images.
Answer: A
Explanation:
Use S3 Event Notifications to write a message with image details to an Amazon Simple Queue Service
(Amazon SQS) queue. Configure an AWS Lambda function to read the messages from the queue and to
process the images.
Question: 905 CertyIQ
A company wants to improve the availability and performance of its hybrid application. The application consists of
a stateful TCP-based workload hosted on Amazon EC2 instances in different AWS Regions and a stateless UDP-
based workload hosted on premises.
Which combination of actions should a solutions architect take to improve availability and performance? (Choose
two.)
A.Create an accelerator using AWS Global Accelerator. Add the load balancers as endpoints.
B.Create an Amazon CloudFront distribution with an origin that uses Amazon Route 53 latency-based routing to
route requests to the load balancers.
C.Configure two Application Load Balancers in each Region. The first will route to the EC2 endpoints, and the
second will route to the on-premises endpoints.
D.Configure a Network Load Balancer in each Region to address the EC2 endpoints. Configure a Network Load
Balancer in each Region that routes to the on-premises endpoints.
E.Configure a Network Load Balancer in each Region to address the EC2 endpoints. Configure an Application
Load Balancer in each Region that routes to the on-premises endpoints.
Answer: AD
Explanation:
A.Create an accelerator using AWS Global Accelerator. Add the load balancers as endpoints.
D.Configure a Network Load Balancer in each Region to address the EC2 endpoints. Configure a Network
Load Balancer in each Region that routes to the on-premises endpoints.
Recently, all the company’s EBS snapshots were accidentally deleted while running a snapshot cleaning script
that deletes all expired EBS snapshots. A solutions architect needs to update the architecture to prevent data loss
without retaining EBS snapshots indefinitely.
Which solution will meet these requirements with the LEAST development effort?
A.Change the IAM policy of the user to deny EBS snapshot deletion.
B.Copy the EBS snapshots to another AWS Region after completing the snapshots daily.
C.Create a 7-day EBS snapshot retention rule in Recycle Bin and apply the rule for all snapshots.
D.Copy EBS snapshots to Amazon S3 Standard-Infrequent Access (S3 Standard-IA).
Answer: C
Explanation:
Reference:
https://aws.amazon.com/blogs/aws/new-recycle-bin-for-ebs-snapshots/
Question: 907 CertyIQ
A company wants to use an AWS CloudFormation stack for its application in a test environment. The company
stores the CloudFormation template in an Amazon S3 bucket that blocks public access. The company wants to
grant CloudFormation access to the template in the S3 bucket based on specific user requests to create the test
environment. The solution must follow security best practices.
A.Create a gateway VPC endpoint for Amazon S3. Configure the CloudFormation stack to use the S3 object
URL.
B.Create an Amazon API Gateway REST API that has the S3 bucket as the target. Configure the
CloudFormation stack to use the API Gateway URL.
C.Create a presigned URL for the template object. Configure the CloudFormation stack to use the presigned
URL.
D.Allow public access to the template object in the S3 bucket. Block the public access after the test
environment is created.
Answer: C
Explanation:
Reference :
https://docs.aws.amazon.com/AmazonS3/latest/userguide/ShareObjectPreSignedURL.html
The external support engineers need access to the AWS Management Console. The external support engineers
also need operating system access to the company’s fleet ofAmazon EC2 instances that run Amazon Linux in
private subnets.
A.Confirm that AWS Systems Manager Agent (SSM Agent) is installed on all instances. Assign an instance
profile with the necessary policy to connect to Systems Manager. Use AWS IAM Identity Center to provide the
external support engineers console access. Use Systems Manager Session Manager to assign the required
permissions.
B.Confirm that AWS Systems Manager Agent (SSM Agent) is installed on all instances. Assign an instance
profile with the necessary policy to connect to Systems Manager. Use Systems Manager Session Manager to
provide local IAM user credentials in each AWS account to the external support engineers for console access.
C.Confirm that all instances have a security group that allows SSH access only from the external support
engineers’ source IP address ranges. Provide local IAM user credentials in each AWS account to the external
support engineers for console access. Provide each external support engineer an SSH key pair to log in to the
application instances.
D.Create a bastion host in a public subnet. Set up the bastion host security group to allow access from only the
external engineers’ IP address ranges. Ensure that all instances have a security group that allows SSH access
from the bastion host. Provide each external support engineer an SSH key pair to log in to the application
instances. Provide local account IAM user credentials to the engineers for console access.
Answer: A
Explanation:
Confirm that AWS Systems Manager Agent (SSM Agent) is installed on all instances. Assign an instance
profile with the necessary policy to connect to Systems Manager. Use AWS IAM Identity Center to provide the
external support engineers console access. Use Systems Manager Session Manager to assign the required
permissions.
A.Create a cross-Region read replica. Configure the reports to be generated from the read replica.
B.Activate Multi-AZ DB instance deployment for RDS for PostgreSQL. Configure the reports to be generated
from the standby database.
C.Use AWS Data Migration Service (AWS DMS) to logically replicate data to a new database. Configure the
reports to be generated from the new database.
D.Create a read replica in us-east-1. Configure the reports to be generated from the read replica.
Answer: D
Explanation:
Create a read replica in us-east-1. Configure the reports to be generated from the read replica.
A.Send Amazon CloudWatch logs to Amazon Redshift. Use Amazon QuickS ght to perform further analysis.
B.Enable detailed monitoring on all EC2 instances. Use Amazon CloudWatch metrics to perform further
analysis.
C.Create an AWS Lambda function to fetch EC2 logs from Amazon CloudWatch Logs. Use Amazon CloudWatch
metrics to perform further analysis.
D.Send EC2 logs to Amazon S3. Use Amazon Redshift to fetch logs from the S3 bucket to process raw data for
further analysis with Amazon QuickSight.
Answer: B
Explanation:
Reference:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-cloudwatch-new.html
Question: 911 CertyIQ
A company runs an application that stores and shares photos. Users upload the photos to an Amazon S3 bucket.
Every day, users upload approximately 150 photos. The company wants to design a solution that creates a
thumbnail of each new photo and stores the thumbnail in a second S3 bucket.
A.Configure an Amazon EventBridge scheduled rule to invoke a script every minute on a long-running Amazon
EMR cluster. Configure the script to generate thumbnails for the photos that do not have thumbnails. Configure
the script to upload the thumbnails to the second S3 bucket.
B.Configure an Amazon EventBridge scheduled rule to invoke a script every minute on a memory-optimized
Amazon EC2 instance that is always on. Configure the script to generate thumbnails for the photos that do not
have thumbnails. Configure the script to upload the thumbnails to the second S3 bucket.
C.Configure an S3 event notification to invoke an AWS Lambda function each time a user uploads a new photo
to the application. Configure the Lambda function to generate a thumbnail and to upload the thumbnail to the
second S3 bucket.
D.Configure S3 Storage Lens to invoke an AWS Lambda function each time a user uploads a new photo to the
application. Configure the Lambda function to generate a thumbnail and to upload the thumbnail to a second
S3 bucket.
Answer: C
Explanation:
C. Configure an S3 event notification to invoke an AWS Lambda function each time a user uploads a new
photo to the application. Configure the Lambda function to generate a thumbnail and to upload the thumbnail
to the second S3 bucket.
A.Use S3 Inventory to list all objects. Use the AWS CLI to create a script that runs on an Amazon EC2 instance
that deletes objects from the inventory list.
B.Use AWS Batch to delete objects older than 3 years except for the data that must be retained.
C.Provision an AWS Glue crawler to query objects older than 3 years. Save the manifest file of old objects.
Create a script to delete objects in the manifest.
D.Enable S3 Inventory. Create an AWS Lambda function to filter and delete objects. Invoke the Lambda
function with S3 Batch Operations to delete objects by using the inventory reports.
Answer: D
Explanation:
Enable S3 Inventory. Create an AWS Lambda function to filter and delete objects. Invoke the Lambda function
with S3 Batch Operations to delete objects by using the inventory reports.
A.Grant full S3 bucket access to all Lambda functions through a shared IAM role.
B.Configure the Lambda functions to run within a VPC. Configure a bucket policy to grant access based on the
Lambda functions' VPC endpoint IP addresses.
C.Create individual IAM roles for each Lambda function. Grant the IAM roles access to the S3 bucket. Assign
each IAM role as the Lambda execution role for its corresponding Lambda function.
D.Configure a bucket policy granting access to the Lambda functions based on their function ARNs.
Answer: C
Explanation:
Create individual IAM roles for each Lambda function. Grant the IAM roles access to the S3 bucket. Assign
each IAM role as the Lambda execution role for its corresponding Lambda function.
The current architecture uses a static web frontend and a Java-based backend that contains the application logic.
The architecture also uses a MySQL database that the company hosts on an Amazon EC2 instance.
The company needs to ensure that the application is secure and available globally.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon CloudFront and AWS Amplify to host the static web frontend. Refactor the microservices to use
AWS Lambda functions that the microservices access by using Amazon API Gateway. Migrate the MySQL
database to an Amazon EC2 Reserved Instance.
B.Use Amazon CloudFront and Amazon S3 to host the static web frontend. Refactor the microservices to use
AWS Lambda functions that the microservices access by using Amazon API Gateway. Migrate the MySQL
database to Amazon RDS for MySQL.
C.Use Amazon CloudFront and Amazon S3 to host the static web frontend. Refactor the microservices to use
AWS Lambda functions that are in a target group behind a Network Load Balancer. Migrate the MySQL
database to Amazon RDS for MySQL.
D.Use Amazon S3 to host the static web frontend. Refactor the microservices to use AWS Lambda functions
that are in a target group behind an Application Load Balancer. Migrate the MySQL database to an Amazon EC2
Reserved Instance.
Answer: B
Explanation:
Use Amazon CloudFront and Amazon S3 to host the static web frontend. Refactor the microservices to use
AWS Lambda functions that the microservices access by using Amazon API Gateway. Migrate the MySQL
database to Amazon RDS for MySQL.
A solutions architect must design a solution to provide fast access to the data. The solution must also ensure the
data persists on disks in the event that the company restarts the application.
Which solution will meet these requirements with the LEAST operational overhead?
A.Configure an Amazon CloudFront distribution with an Amazon S3 bucket as the origin. Store the player data
in the S3 bucket.
B.Create Amazon EC2 instances in multiple AWS Regions. Store the player data on the EC2 instances.
Configure Amazon Route 53 with geolocation records to direct users to the closest EC2 instance.
C.Deploy an Amazon ElastiCache for Redis duster. Store the player data in the ElastiCache cluster.
D.Deploy an Amazon ElastiCache for Memcached duster. Store the player data in the ElastiCache cluster.
Answer: C
Explanation:
Amazon ElastiCache for Redis provides in-memory caching which ensures low latency and high throughput,
perfect for near real-time access to player reviews and rankings.Redis supports data persistence by
snapshotting data to disk (RDB snapshots) and appending changes to a log (AOF), ensuring that the data is
not lost even if the application restarts.
To meet compliance requirements, the data for each customer must be encrypted separately at rest by using a
secure, centralized key management solution. The company wants to use AWS Key Management Service (AWS
KMS) to implement encryption.
Which solution will meet these requirements with the LEAST operational overhead?
A.Generate a unique encryption key for each customer. Store the keys in an Amazon S3 bucket. Enable server-
side encryption.
B.Deploy a hardware security appliance in the AWS environment that securely stores customer-provided
encryption keys. Integrate the security appliance with AWS KMS to encrypt the sensitive data in the
application.
C.Create a single AWS KMS key to encrypt all sensitive data across the application.
D.Create separate AWS KMS keys for each customer's data that have granular access control and logging
enabled.
Answer: D
Explanation:
Create separate AWS KMS keys for each customer's data that have granular access control and logging
enabled.
A.Use a NAT gateway to manage web traffic. Use Amazon EC2 Auto Scaling groups to receive, process, and
store processed customer orders. Use an AWS Lambda function to capture and store unprocessed orders.
B.Use a Network Load Balancer (NLB) to manage web traffic. Use an Application Load Balancer to receive
customer orders from the NLUse Amazon Redshift with a Multi-AZ deployment to store unprocessed and
processed customer orders.
C.Use a Gateway Load Balancer (GWLB) to manage web traffic. Use Amazon Elastic Container Service (Amazon
ECS) to receive and process customer orders. Use the GWLB to capture and store unprocessed orders. Use
Amazon DynamoDB to store processed customer orders.
D.Use an Application Load Balancer to manage web traffic. Use Amazon EC2 Auto Scaling groups to receive
and process customer orders. Use Amazon Simple Queue Service (Amazon SQS) to store unprocessed orders.
Use Amazon RDS with a Multi-AZ deployment to store processed customer orders.
Answer: D
Explanation:
Use an Application Load Balancer to manage web traffic. Use Amazon EC2 Auto Scaling groups to receive and
process customer orders. Use Amazon Simple Queue Service (Amazon SQS) to store unprocessed orders. Use
Amazon RDS with a Multi-AZ deployment to store processed customer orders.
The company wants to use Amazon S3 for file storage. For the first year after the migration, the files will be
accessed once or twice and must be immediately available. After 1 year, the files must be archived for at least 7
years.
A.Use an archive tool to group the files into large objects. Use DataSync to migrate the objects. Store the
objects in S3 Glacier Instant Retrieval for the first year. Use a lifecycle configuration to transition the files to S3
Glacier Deep Archive after 1 year with a retention period of 7 years.
B.Use an archive tool to group the files into large objects. Use DataSync to copy the objects to S3 Standard-
Infrequent Access (S3 Standard-IA). Use a lifecycle configuration to transition the files to S3 Glacier Instant
Retrieval after 1 year with a retention period of 7 years.
C.Configure the destination storage class for the files as S3 Glacier Instant Retrieval. Use a lifecycle policy to
transition the files to S3 Glacier Flexible Retrieval after 1 year with a retention period of 7 years.
D.Configure a DataSync task to transfer the files to S3 Standard-Infrequent Access (S3 Standard-IA). Use a
lifecycle configuration to transition the files to S3 Deep Archive after 1 year with a retention period of 7 years.
Answer: A
Explanation:
Use an archive tool to group the files into large objects. Use DataSync to migrate the objects. Store the
objects in S3 Glacier Instant Retrieval for the first year. Use a lifecycle configuration to transition the files to
S3 Glacier Deep Archive after 1 year with a retention period of 7 years.
Question: 919 CertyIQ
A company recently performed a lift and shift migration of its on-premises Oracle database workload to run on an
Amazon EC2 memory optimized Linux instance. The EC2 Linux instance uses a 1 TB Provisioned IOPS SSD (io1) EBS
volume with 64,000 IOPS.
The database storage performance after the migration is slower than the performance of the on-premises
database.
A.Add more Provisioned IOPS SSD (io1) EBS volumes. Use OS commands to create a Logical Volume
Management (LVM) stripe.
B.Increase the Provisioned IOPS SSD (io1) EBS volume to more than 64,000 IOPS.
C.Increase the size of the Provisioned IOPS SSD (io1) EBS volume to 2 TB.
D.Change the EC2 Linux instance to a storage optimized instance type. Do not change the Provisioned IOPS
SSD (io1) EBS volume.
Answer: A
Explanation:
Add more Provisioned IOPS SSD (io1) EBS volumes. Use OS commands to create a Logical Volume
Management (LVM) stripe.
A.Configure an Amazon API Gateway REST API to invoke an AWS Lambda function that publishes events to an
Amazon Simple Queue Service (Amazon SQS) queue. Configure one or more subscribers to read events from
the SQS queue.
B.Configure an Amazon API Gateway REST API to invoke an AWS Lambda function that publishes events to an
Amazon Simple Notification Service (Amazon SNS) topic. Configure one or more subscribers to receive events
from the SNS topic.
C.Configure an Amazon API Gateway WebSocket API to write to a data stream in Amazon Kinesis Data Streams
with enhanced fan-out. Configure one or more subscribers to receive events from the data stream.
D.Configure an Amazon API Gateway HTTP API to invoke an AWS Lambda function that publishes events to an
Amazon Simple Notification Service (Amazon SNS) topic. Configure one or more subscribers to receive events
from the topic.
Answer: D
Explanation:
Configure an Amazon API Gateway HTTP API to invoke an AWS Lambda function that publishes events to an
Amazon Simple Notification Service (Amazon SNS) topic. Configure one or more subscribers to receive events
from the topic.
The company has noticed high CPU utilization on the EC2 instance during peak usage times. The high CPU
utilization corresponds to degraded performance on Amazon RDS for read requests. The company wants to reduce
the high CPU utilization and improve read request performance.
A.Resize the EC2 instance to an EC2 instance type that has more CPU capacity. Configure an Auto Scaling
group with a minimum and maximum size of 1. Configure an RDS read replica for read requests.
B.Resize the EC2 instance to an EC2 instance type that has more CPU capacity. Configure an Auto Scaling
group with a minimum and maximum size of 1. Add an RDS read replica and redirect all read/write traffic to the
replica.
C.Configure an Auto Scaling group with a minimum size of 1 and maximum size of 2. Resize the RDS DB instance
to an instance type that has more CPU capacity.
D.Resize the EC2 instance to an EC2 instance type that has more CPU capacity. Configure an Auto Scaling
group with a minimum and maximum size of 1. Resize the RDS DB instance to an instance type that has more
CPU capacity.
Answer: A
Explanation:
Resize the EC2 instance to an EC2 instance type that has more CPU capacity. Configure an Auto Scaling
group with a minimum and maximum size of 1. Configure an RDS read replica for read requests.
The company requires an access control solution that will prevent unauthorized access to the sensitive data.
A.Share the IAM user credentials for each development team member with the rest of the team to simplify
access management and to streamline development workflows.
B.Define IAM roles that have fine-grained permissions based on the principle of least privilege. Assign an IAM
role to each developer.
C.Create IAM access keys to grant programmatic access to AWS resources. Allow only developers to interact
with AWS resources through API calls by using the access keys.
D.Create an AWS Cognito user pool. Grant developers access to AWS resources by using the user pool.
Answer: B
Explanation:
Define IAM roles that have fine-grained permissions based on the principle of least privilege. Assign an IAM
role to each developer.
The company wants to resolve this performance issue and improve application availability.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
A.Use AWS Compute Optimizer to obtain a recommendation for an instance type to scale vertically.
B.Create an Amazon Machine Image (AMI) from the web server. Reference the AMI in a new launch template.
C.Create an Auto Scaling group and an Application Load Balancer to scale vertically.
D.Use AWS Compute Optimizer to obtain a recommendation for an instance type to scale horizontally.
E.Create an Auto Scaling group and an Application Load Balancer to scale horizontally.
Answer: BE
Explanation:
B.Create an Amazon Machine Image (AMI) from the web server. Reference the AMI in a new launch template.
E.Create an Auto Scaling group and an Application Load Balancer to scale horizontally.
A solutions architect needs to review all permissions that are granted to IAM users to determine which IAM users
have more permissions than required.
Which solution will meet these requirements with the LEAST administrative overhead?
A.Use Network Access Analyzer to review all access permissions in the company's AWS accounts.
B.Create an AWS CloudWatch alarm that activates when an IAM user creates or modifies resources in an AWS
account.
C.Use AWS Identity and Access Management (IAM) Access Analyzer to review all the company’s resources and
accounts.
D.Use Amazon Inspector to find vulnerabilities in existing IAM policies.
Answer: C
Explanation:
Use AWS Identity and Access Management (IAM) Access Analyzer to review all the company’s resources and
accounts.
A.Activate S3 Object Lock on the required objects and enable governance mode.
B.Activate S3 Object Lock on the required objects and enable compliance mode.
C.Enable versioning on the S3 bucket. Set a lifecycle policy to delete the objects after a specified period.
D.Configure an S3 Lifecycle policy to transition objects to S3 Glacier Flexible Retrieval for the retention
duration.
Answer: B
Explanation:
Activate S3 Object Lock on the required objects and enable compliance mode.
The web application needs to be available 24 hours a day, 7 days a week for customers. The company expects the
application to experience short bursts of high traffic. The workload must be highly available.
A.Configure an ECS capacity provider with Fargate. Conduct load testing by using a third-party tool. Rightsize
the Fargate tasks in Amazon CloudWatch.
B.Configure an ECS capacity provider with Fargate for steady state and Fargate Spot for burst traffic.
C.Configure an ECS capacity provider with Fargate Spot for steady state and Fargate for burst traffic.
D.Configure an ECS capacity provider with Fargate. Use AWS Compute Optimizer to rightsize the Fargate task.
Answer: B
Explanation:
Configure an ECS capacity provider with Fargate for steady state and Fargate Spot for burst traffic.
The company needs a managed solution with proactive engagement to detect against DDoS attacks.
A.Enable AWS Config. Configure an AWS Config managed rule that detects DDoS attacks.
B.Enable AWS WAF on the ALCreate an AWS WAF web ACL with rules to detect and prevent DDoS attacks.
Associate the web ACL with the ALB.
C.Store the ALB access logs in an Amazon S3 bucket. Configure Amazon GuardDuty to detect and take
automated preventative actions for DDoS attacks.
D.Subscribe to AWS Shield Advanced. Configure hosted zones in Route 53. Add ALB resources as protected
resources.
Answer: D
Explanation:
Subscribe to AWS Shield Advanced. Configure hosted zones in Route 53. Add ALB resources as protected
resources.
The company wants to improve application security with minimal architectural change to prevent unauthorized
attempts to access the application.
A.Implement a series of AWS WAF rules directly on the NLB to filter out unauthorized traffic.
B.Recreate the NLB with a security group to allow only trusted IP addresses.
C.Deploy a second NLB in parallel with the existing NLB configured with a strict IP address allow list.
D.Use AWS Shield Advanced to provide enhanced DDoS protection and prevent unauthorized access attempts.
Answer: B
Explanation:
Reference:
https://aws.amazon.com/about-aws/whats-new/2023/08/network-load-balancer-supports-security-groups/
The SNS topic uses AWS Key Management Service (AWS KMS) customer managed keys for encryption. The
company must ensure that the application has the necessary permissions to publish messages securely to the SNS
topic.
A.Create a resource policy for the SNS topic that allows the Lambda function to publish messages to the topic.
B.Use server-side encryption with AWS KMS keys (SSE-KMS) for the SNS topic instead of customer managed
keys.
C.Create a resource policy for the encryption key that the SNS topic uses that has the necessary AWS KMS
permissions.
D.Specify the Lambda function's Amazon Resource Name (ARN) in the SNS topic's resource policy.
E.Associate an Amazon API Gateway HTTP API with the SNS topic to control access to the topic by using API
Gateway resource policies.
F.Configure a Lambda execution role that has the necessary IAM permissions to use a customer managed key
in AWS KMS.
Answer: ACF
Explanation:
A.Create a resource policy for the SNS topic that allows the Lambda function to publish messages to the
topic.
C.Create a resource policy for the encryption key that the SNS topic uses that has the necessary AWS KMS
permissions.
F.Configure a Lambda execution role that has the necessary IAM permissions to use a customer managed key
in AWS KMS.
The employee web portal requires 100% uptime. The document extract program runs infrequently throughout the
day on an on-demand basis. The company wants to build a scalable and cost-effective new system that will require
minimal changes to the existing web portal. The company does not want to make any code changes.
Which solution will meet these requirements with the LEAST implementation effort?
A.Run Amazon EC2 On-Demand Instances in an Auto Scaling group for the web portal. Use an AWS Lambda
function to run the document extract program. Invoke the Lambda function when an employee uploads a new
reimbursement document.
B.Run Amazon EC2 Spot Instances in an Auto Scaling group for the web portal. Run the document extract
program on EC2 Spot Instances. Start document extract program instances when an employee uploads a new
reimbursement document.
C.Purchase a Savings Plan to run the web portal and the document extract program. Run the web portal and the
document extract program in an Auto Scaling group.
D.Create an Amazon S3 bucket to host the web portal. Use Amazon API Gateway and an AWS Lambda function
for the existing functionalities. Use the Lambda function to run the document extract program. Invoke the
Lambda function when the API that is associated with a new document upload is called.
Answer: D
Explanation:
Create an Amazon S3 bucket to host the web portal. Use Amazon API Gateway and an AWS Lambda function
for the existing functionalities. Use the Lambda function to run the document extract program. Invoke the
Lambda function when the API that is associated with a new document upload is called.
The Lambda function that is in the administrator account must be invoked by messages from the SNS topic that is
in the production account when significant metrics are reported.
A.Create an IAM resource policy for the Lambda function that allows Amazon SNS to invoke the function.
B.Implement an Amazon Simple Queue Service (Amazon SQS) queue in the administrator account to buffer
messages from the SNS topic that is in the production account. Configure the SQS queue to invoke the Lambda
function.
C.Create an IAM policy for the SNS topic that allows the Lambda function to subscribe to the topic.
D.Use an Amazon EventBridge rule in the production account to capture the SNS topic notifications. Configure
the EventBridge rule to forward notifications to the Lambda function that is in the administrator account.
E.Store performance metrics in an Amazon S3 bucket in the production account. Use Amazon Athena to analyze
the metrics from the administrator account.
Answer: AB
Explanation:
A.Create an IAM resource policy for the Lambda function that allows Amazon SNS to invoke the function.
B.Implement an Amazon Simple Queue Service (Amazon SQS) queue in the administrator account to buffer
messages from the SNS topic that is in the production account. Configure the SQS queue to invoke the
Lambda function.
A.Configure AWS Transit Gateway to directly manage custom subnet configurations for the pods in Amazon
EKS.
B.Create an AWS Direct Connect connection from the company's on-premises IP address ranges to the EKS
pods.
C.Use the Amazon VPC CNI plugin for Kubernetes. Define custom subnets in the VPC cluster for the pods to
use.
D.Implement a Kubernetes network policy that has pod anti-affinity rules to restrict pod placement to specific
nodes that are within custom subnets.
Answer: C
Explanation:
The Amazon VPC Container Network Interface (CNI) plugin is the default network plugin for Amazon EKS. It
allows Kubernetes pods to receive IP addresses from a VPC's subnet and enables pods to communicate
securely within the VPC as if they were native VPC resources.
Which solution will meet these requirements with the LEAST implementation effort?
A.Modify the RDS DB instance to use a Multi-AZ deployment. Apply the changes during the next maintenance
window.
B.Migrate the current database to a new Amazon DynamoDB Multi-AZ deployment. Use AWS Database
Migration Service (AWS DMS) with a heterogeneous migration strategy to migrate the current RDS DB instance
to DynamoDB tables.
C.Create a new RDS DB instance in a Multi-AZ deployment. Manually restore the data from the existing RDS DB
instance from the most recent snapshot.
D.Configure the DB instance in an Amazon EC2 Auto Scaling group with a minimum group size of three. Use
Amazon Route 53 simple routing to distribute requests to all DB instances.
Answer: A
Explanation:
Reference:
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_UpgradeDBInstance.Maintenance.html
The company needs a managed AWS storage service that supports both NFS and SMB access. The solution must
be able to share between protocols. The solution must have redundancy at the Availability Zone level.
A.Use Amazon FSx for NetApp ONTAP for storage. Configure multi-protocol access.
B.Create two Amazon EC2 instances. Use one EC2 instance for Windows SMB file server access and one EC2
instance for Linux NFS file server access.
C.Use Amazon FSx for NetApp ONTAP for SMB access. Use Amazon FSx for Lustre for NFS access.
D.Use Amazon S3 storage. Access Amazon S3 through an Amazon S3 File Gateway.
Answer: A
Explanation:
Reference:
https://aws.amazon.com/blogs/storage/enabling-multiprotocol-workloads-with-amazon-fsx-for-netapp-
ontap/
A solutions architect must reconfigure the application to be scalable and highly available. The solutions architect
must also reduce MySQL read latency.
A.Launch a second EC2 instance in a second AWS Region. Use a Route 53 failover routing policy to redirect the
traffic to the second EC2 instance.
B.Create and configure an Auto Scaling group to launch private EC2 instances in multiple Availability Zones.
Add the instances to a target group behind a new Application Load Balancer.
C.Migrate the database to an Amazon Aurora MySQL cluster. Create the primary DB instance and reader DB
instance in separate Availability Zones.
D.Create and configure an Auto Scaling group to launch private EC2 instances in multiple AWS Regions. Add
the instances to a target group behind a new Application Load Balancer.
E.Migrate the database to an Amazon Aurora MySQL cluster with cross-Region read replicas.
Answer: BC
Explanation:
Reference:
https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Concepts.AuroraHighAvailability.html
Which combination of steps will meet these requirements with the LEAST operational overhead? (Choose two.)
A.Create HTTP security headers by using Lambda@Edge to retrieve and create sensitive information
B.Create a Lambda layer that retrieves sensitive information
C.Store sensitive information in AWS Secrets Manager
D.Store sensitive information in AWS Systems Manager Parameter Store
E.Create a Lambda consumer with dedicated throughput to retrieve sensitive information and create
environmental variables
Answer: CD
Explanation:
The company wants to identify cost optimizations across the EC2 instances, the Auto Scaling group, and the EBS
volumes.
Which solution will meet these requirements with the MOST operational efficiency?
A.Create a new AWS Cost and Usage Report. Search the report for cost recommendations for the EC2
instances the Auto Scaling group, and the EBS volumes.
B.Create new Amazon CloudWatch billing alerts. Check the alert statuses for cost recommendations for the
EC2 instances, the Auto Scaling group, and the EBS volumes.
C.Configure AWS Compute Optimizer for cost recommendations for the EC2 instances, the Auto Scaling group
and the EBS volumes.
D.Configure AWS Compute Optimizer for cost recommendations for the EC2 instances. Create a new AWS Cost
and Usage Report. Search the report for cost recommendations for the Auto Scaling group and the EBS
volumes.
Answer: C
Explanation:
Reference:
https://aws.amazon.com/compute-optimizer/https://docs.aws.amazon.com/compute-
optimizer/latest/ug/what-is-compute-optimizer.html
A.Create an Amazon S3 bucket and call the service APIs from each instance's application
B.Create an Amazon S3 bucket and configure all instances to access it as a mounted volume
C.Configure an Amazon Elastic Block Store (Amazon EBS) volume and mount it across all instances
D.Configure an Amazon Elastic File System (Amazon EFS) file system and mount it across all instances
Answer: D
Explanation:
Configure an Amazon Elastic File System (Amazon EFS) file system and mount it across all instances.
After end-of-year activities are complete, the read replica has a constant 25% CPU usage. The primary instance
still has a constant 60% CPU usage. The company wants to rightsize the database and still provide enough
performance for future growth.
A.Delete the read replica Do not make changes to the primary instance
B.Resize the read replica to a smaller instance size Do not make changes to the primary instance
C.Resize the read replica to a larger instance size Resize the primary instance to a smaller instance size
D.Delete the read replica Resize the primary instance to a larger instance
Answer: B
Explanation:
Resize the read replica to a smaller instance size Do not make changes to the primary instance.
Question: 940 CertyIQ
A company is migrating its databases to Amazon RDS for PostgreSQL. The company is migrating its applications to
Amazon EC2 instances. The company wants to optimize costs for long-running workloads.
A.Use On-Demand Instances for the Amazon RDS for PostgreSQL workloads. Purchase a 1 year Compute
Savings Plan with the No Upfront option for the EC2 instances.
B.Purchase Reserved Instances for a 1 year term with the No Upfront option for the Amazon RDS for
PostgreSQL workloads. Purchase a 1 year EC2 Instance Savings Plan with the No Upfront option for the EC2
instances.
C.Purchase Reserved Instances for a 1 year term with the Partial Upfront option for the Amazon RDS for
PostgreSQL workloads. Purchase a 1 year EC2 Instance Savings Plan with the Partial Upfront option for the EC2
instances.
D.Purchase Reserved Instances for a 3 year term with the All Upfront option for the Amazon RDS for
PostgreSQL workloads. Purchase a 3 year EC2 Instance Savings Plan with the All Upfront option for the EC2
instances.
Answer: D
Explanation:
Purchase Reserved Instances for a 3 year term with the All Upfront option for the Amazon RDS for
PostgreSQL workloads. Purchase a 3 year EC2 Instance Savings Plan with the All Upfront option for the EC2
instances.
A.Create an IAM policy that defines the required permissions Attach the policy directly to the IAM role of the
EKS nodes.
B.Implement network policies within the EKS cluster to prevent Kubernetes service accounts from accessing
specific AWS services.
C.Modify the EKS cluster's IAM role to include permissions for each Kubernetes service account. Ensure a one-
to-one mapping between IAM roles and Kubernetes roles.
D.Define an IAM role that includes the necessary permissions. Annotate the Kubernetes service accounts with
the Amazon ResourceName (ARN) of the IAM role.
E.Set up a trust relationship between the IAM roles for the service accounts and an OpenID Connect (OIDC)
identity provider.
Answer: DE
Explanation:
D.Define an IAM role that includes the necessary permissions. Annotate the Kubernetes service accounts with
the Amazon ResourceName (ARN) of the IAM role.
E.Set up a trust relationship between the IAM roles for the service accounts and an OpenID Connect (OIDC)
identity provider.
Question: 942 CertyIQ
A company regularly uploads confidential data to Amazon S3 buckets for analysis.
The company's security policies mandate that the objects must be encrypted at rest. The company must
automatically rotate the encryption key every year. The company must be able to track key rotation by using AWS
CloudTrail. The company also must minimize costs for the encryption key.
Answer: D
Explanation:
A.Use AWS Budgets to download data for the past 3 months into a .csv file. Look up the desired information.
B.Load AWS Cost and Usage Reports into an Amazon RDS DB instance. Run SQL queries to get the desired
information.
C.Tag all the AWS resources with a key for cost and a value of the application's name. Activate cost allocation
tags. Use Cost Explorerto get the desired information.
D.Tag all the AWS resources with a key for cost and a value of the application's name. Use the AWS Billing and
Cost Management console todownload bills for the past 3 months. Look up the desired information.
Answer: C
Explanation:
Tag all the AWS resources with a key for cost and a value of the application's name. Activate cost allocation
tags. Use Cost Explorerto get the desired information.
The company wants to design a robust and resilient architecture for the application.
Answer: B
Explanation:
Deploy Amazon EC2 instances in an Auto Scaling group across multiple Availability Zones. Deploy a Multi-AZ
RDS DB instance. Use Amazon CloudFront to distribute static assets.
A security appliance in the company's networking account must inspect interactions between applications across
AWS accounts.
A.Deploy a Network Load Balancer (NLB) in the networking account to send traffic to the security appliance.
Configure the application accounts to send traffic to the NLB by using an interface VPC endpoint in the
application accounts.
B.Deploy an Application Load Balancer (ALB) in the application accounts to send traffic directly to the security
appliance.
C.Deploy a Gateway Load Balancer (GWLB) in the networking account to send traffic to the security appliance.
Configure the application accounts to send traffic to the GWLB by using an interface GWLB endpoint in the
application accounts.
D.Deploy an interface VPC endpoint in the application accounts to send traffic directly to the security
appliance.
Answer: C
Explanation:
Reference:
https://docs.aws.amazon.com/vpc/latest/privatelink/create-gateway-load-balancer-endpoint-service.html
Answer: A
Explanation:
Which solution will meet these requirements with the LEAST operational overhead?
A.Store the database credentials as a parameter in AWS Systems Manager Parameter Store Configure
Parameter Store to automatically rotate the secrets every 30 days. Update the Lambda function to retrieve the
credentials from the parameter.
B.Store the database credentials as a secret in AWS Secrets Manager. Configure Secrets Manager to
automatically rotate the credentials every 30 days. Update the Lambda function to retrieve the credentials
from the secret.
C.Store the database credentials as an encrypted Lambda environment variable. Write a custom Lambda
function to rotate the credentials. Schedule the Lambda function to run every 30 days.
D.Store the database credentials as a key in AWS Key Management Service (AWS KMS). Configure automatic
rotation for the key. Update the Lambda function to retneve the credentials from the KMS key.
Answer: B
Explanation:
Store the database credentials as a secret in AWS Secrets Manager. Configure Secrets Manager to
automatically rotate the credentials every 30 days. Update the Lambda function to retrieve the credentials
from the secret.
A.Configure the AWS DMS replication instance with a Multi-AZ deployment to provision instances across
multiple Availability Zones.
B.Create an AWS DMS Serverless replication task to analyze and replicate the data while provisioning the
required capacity.
C.Use Amazon EC2 Auto Scaling to scale the size of the AWS DMS replication instance up or down based on the
amount of data toreplicate.
D.Provision AWS DMS replication capacity by using Amazon Elastic Container Service (Amazon ECS) with an
AWS Fargate launch type to analyze and replicate the data while provisioning the required capacity.
Answer: B
Explanation:
Create an AWS DMS Serverless replication task to analyze and replicate the data while provisioning the
required capacity.
The company needs to provide secure and private connectivity from the application's internal services to the third-
party SaaS application. The company needs to ensure that there is minimal public internet exposure.
A.Implement an AWS Site-to-Site VPN to establish a secure connection with the third-party SaaS provider.
B.Deploy AWS Transit Gateway to manage and route traffic between the application's VPC and the third-party
SaaS provider.
C.Configure AWS PrivateLink to allow only outbound traffic from the VPC without enabling the third-party
SaaS provider to establish.
D.Use AWS PrivateLink to create a private connection between the application's VPC and the third-party SaaS
provider.
Answer: D
Explanation:
Use AWS PrivateLink to create a private connection between the application's VPC and the third-party SaaS
provider.
A.Configure AWS Direct Connect to connect to the VPC. Configure the VPC route tables to allow and deny
traffic between AWS and on premises as required.
B.Create an IAM policy to allow access to the AWS Management Console only from a defined set of corporate
IP addresses. Restrict user access based on job responsibility by using an IAM policy and roles.
C.Configure AWS Site-to-Site VPN to connect to the VPConfigure route table entries to direct traffic from on
premises to the VPConfigure instance security groups and network ACLs to allow only required traffic from on
premises.
D.Configure AWS Transit Gateway to connect to the VPC. Configure route table entries to direct traffic from on
premises to the VPC. Configure instance security groups and network ACLs to allow only required traffic from
on premises.
Answer: C
Explanation:
Configure AWS Site-to-Site VPN to connect to the VPConfigure route table entries to direct traffic from on
premises to the VPConfigure instance security groups and network ACLs to allow only required traffic from
on premises.
A.Store the credentials in AWS Key Management Service (AWS KMS). Create keys in AWS KMS. Configure the
application to load the database credentials from AWS KMS. Enable automatic key rotation
B.Store the credentials in encrypted local storage. Configure the application to load the database credentials
from the local storage. Set up a credentials rotation schedule by creating a cron job.
C.Store the credentials in AWS Secrets Manager. Configure the application to load the database credentials
from Secrets Manager. Set up a credentials rotation schedule by creating an AWS Lambda function for Secrets
Manager.
D.Store the credentials in AWS Systems Manager Parameter Store. Configure the application to load the
database credentials from Parameter Store. Set up a credentials rotation schedule in the RDS for MySQL
database by using Parameter Store.
Answer: C
Explanation:
Store the credentials in AWS Secrets Manager. Configure the application to load the database credentials
from Secrets Manager. Set up a credentials rotation schedule by creating an AWS Lambda function for
Secrets Manager.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create a new S3 bucket that uses server-side encryption with AWS KMS multi-Region keys (SSE-KMS).
Configure Cross-Region Replication (CRR). Load the data into the new S3 bucket. Use Amazon Athena to query
the data.
B.Create a new S3 bucket that uses server-side encryption with Amazon S3 managed keys (SSE-S3). Configure
Cross-Region Replication (CRR). Load the data into the new S3 bucket. Use Amazon RDS to query the data.
C.Configure Cross-Region Replication (CRR) on the existing S3 bucket. Use server-side encryption with Amazon
S3 managed keys (SSE-S3). Use Amazon Athena to query the data.
D.Configure S3 Cross-Region Replication (CRR) on the existing S3 bucket. Use server-side encryption with
AWS KMS multi-Region keys (SSE-KMS). Use Amazon RDS to query the data.
Answer: A
Explanation:
Create a new S3 bucket that uses server-side encryption with AWS KMS multi-Region keys (SSE-KMS).
Configure Cross-Region Replication (CRR). Load the data into the new S3 bucket. Use Amazon Athena to
query the data.
The company uses the user-uploaded images to run AI model training twice a year. The company needs a storage
solution to store the images.
A.Move uploaded images to Amazon S3 Glacier Deep Archive. Move premium user-generated AI images to S3
Standard. Move non-premium user-generated AI images to S3 Standard-Infrequent Access (S3 Standard-IA).
B.Move uploaded images to Amazon S3 Glacier Deep Archive Move all generated AI images to S3 Glacier
Flexible Retrieval.
C.Move uploaded images to Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA). Move premium user-
generated AI images to S3 Standard. Move non-premium user-generated AI images to S3 Standard-Infrequent
Access (S3 Standard-IA).
D.Move uploaded images to Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA). Move all generated AI
images to S3 Glacier Flexible Retrieval.
Answer: A
Explanation:
Move uploaded images to Amazon S3 Glacier Deep Archive. Move premium user-generated AI images to S3
Standard. Move non-premium user-generated AI images to S3 Standard-Infrequent Access (S3 Standard-IA).
The company provides the ML models to hundreds of users. The usage patterns for the models are irregular. Some
models are not used for days or weeks. Other models receive batches of thousands of requests at a time.
A.Direct the requests from the API to a Network Load Balancer (NLB). Deploy the ML models as AWS Lambda
functions that the NLB will invoke. Use auto scaling to scale the Lambda functions based on the traffic that the
NLB receives.
B.Direct the requests from the API to an Application Load Balancer (ALB). Deploy the ML models as Amazon
Elastic Container Service (Amazon ECS) services that the ALB will invoke. Use auto scaling to scale the ECS
cluster instances based on the traffic that the ALB receives.
C.Direct the requests from the API into an Amazon Simple Queue Service (Amazon SQS) queue. Deploy the ML
models as AWS Lambda functions that SQS events will invoke. Use auto scaling to increase the number of
vCPUs for the Lambda functions based on the size of the SQS queue.
D.Direct the requests from the API into an Amazon Simple Queue Service (Amazon SQS) queue. Deploy the ML
models as Amazon Elastic Container Service (Amazon ECS) services that read from the queue. Use auto scaling
for Amazon ECS to scale both the cluster capacity and number of the services based on the size of the SQS
queue.
Answer: D
Explanation:
Direct the requests from the API into an Amazon Simple Queue Service (Amazon SQS) queue. Deploy the ML
models as Amazon Elastic Container Service (Amazon ECS) services that read from the queue. Use auto
scaling for Amazon ECS to scale both the cluster capacity and number of the services based on the size of the
SQS queue.
The company needs to create a disaster recovery (DR) solution. The acceptable recovery time for the DR solution is
up to 30 minutes. The DR solution does not need to support customer usage when the primary infrastructure is
healthy.
A.Deploy the DR infrastructure in a second AWS Region with an ALB and an Auto Scaling group. Set the desired
capacity and maximum capacity of the Auto Scaling group to a minimum value. Convert the Aurora MySQL DB
cluster to an Aurora global database. Configure Amazon Route 53 for an active-passive failover with ALB
endpoints.
B.Deploy the DR infrastructure in a second AWS Region with an ALUpdate the Auto Scaling group to include
EC2 instances from the second Region. Use Amazon Route 53 to configure active-active failover. Convert the
Aurora MySQL DB cluster to an Aurora global database.
C.Back up the Aurora MySQL DB cluster data by using AWS Backup. Deploy the DR infrastructure in a second
AWS Region with an ALB. Update the Auto Scaling group to include EC2 instances from the second Region. Use
Amazon Route 53 to configure active-active failover. Create an Aurora MySQL DB cluster in the second Region
Restore the data from the backup.
D.Back up the infrastructure configuration by using AWS Backup. Use the backup to create the required
infrastructure in a second AWS Region. Set the Auto Scaling group desired capacity to zero. Use Amazon Route
53 to configure active-passive failover. Convert the Aurora MySQL DB cluster to an Aurora global database.
Answer: A
Explanation:
Deploy the DR infrastructure in a second AWS Region with an ALB and an Auto Scaling group. Set the desired
capacity and maximum capacity of the Auto Scaling group to a minimum value. Convert the Aurora MySQL DB
cluster to an Aurora global database. Configure Amazon Route 53 for an active-passive failover with ALB
endpoints.
A.Migrate the data processing application to Amazon EC2 Spot Instances. Store the data in Amazon S3
Standard. Move the data to Amazon S3 Glacier Instant. Retrieval after 30 days. Set an expiration to delete the
data after 2 years.
B.Migrate the data processing application to Amazon EC2 On-Demand Instances. Store the data in Amazon S3
Glacier Instant Retrieval. Move the data to S3 Glacier Deep Archive after 30 days. Set an expiration to delete
the data after 2 years.
C.Deploy Amazon EC2 Spot Instances to run the batch jobs. Store the data in Amazon S3 Standard. Move the
data to Amazon S3 Glacier Flexible Retrieval after 30 days. Set an expiration to delete the data after 2 years.
D.Deploy Amazon EC2 On-Demand Instances to run the batch jobs. Store the data in Amazon S3 Standard.
Move the data to Amazon S3 Glacier Deep Archive after 30 days. Set an expiration to delete the data after 2
years.
Answer: D
Explanation:
Deploy Amazon EC2 On-Demand Instances to run the batch jobs. Store the data in Amazon S3 Standard. Move
the data to Amazon S3 Glacier Deep Archive after 30 days. Set an expiration to delete the data after 2 years.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
Answer: BD
Explanation:
B.Associate an AWS Direct Connect gateway with the transit gateway that is attached to the VPCs.
D.Establish an AWS Direct Connect connection. Create a transit virtual interface (VIF) to a Direct Connect
gateway.
Customers have reported application timeouts when the company undergoes database failovers. The company
needs a resilient solution to reduce failover time.
Which solution will meet these requirements?
Answer: A
Explanation:
A. Create an Amazon RDS Proxy. Assign the proxy to the DB instance. Amazon RDS Proxy:RDS Proxy is
designed to manage connections to the database more efficiently. It can reduce the impact of failovers on the
application by maintaining connections and transparently rerouting them to the standby instance during a
failover event.By using RDS Proxy, the failover time is reduced because the proxy minimizes the disruption
that occurs when the database fails over, thus reducing application timeouts.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create an Amazon CloudWatch alarm to identify RDS instances that need to be stopped. Create an AWS
Lambda function to start and stop the RDS instances.
B.Create an AWS Trusted Advisor report to identify RDS instances to be started and stopped. Create an AWS
Lambda function to start and stop the RDS instances.
C.Create AWS Systems Manager State Manager associations to start and stop the RDS instances.
D.Create an Amazon EventBridge rule that invokes AWS Lambda functions to start and stop the RDS instances.
Answer: C
Explanation:
Create AWS Systems Manager State Manager associations to start and stop the RDS instances.
The company has started to share this data with a marketing firm in a new geographic region. The company has
granted the firm's AWS account access to the S3 bucket. The company wants to minimize the data transfer costs
when the marketing firm requests data from the S3 bucket.
Answer: A
Explanation:
The company recently identified a DDoS attack on the website. The company needs a solution to mitigate future
attacks.
Which solution will meet these requirements with the LEAST implementation effort?
A.Configure an AWS WAF web ACL for the Global Accelerator accelerator to block traffic by using rate-based
rules
B.Configure an AWS Lambda function to read the ALB metrics to block attacks by updating a VPC network ACL
C.Configure an AWS WAF web ACL on the ALB to block traffic by using rate-based rules
D.Configure an Amazon CloudFront distribution in front of the Global Accelerator accelerator
Answer: A
Explanation:
Configure an AWS WAF web ACL for the Global Accelerator accelerator to block traffic by using rate-based
rules.
The company wants to calculate performance metrics for customer device data on a daily basis. The solution must
have minimal effect on the table's provisioned read and write capacity.
A.Use an Amazon Athena SQL query with the Amazon Athena DynamoDB connector to calculate performance
metrics on a recurring schedule.
B.Use an AWS Glue job with the AWS Glue DynamoDB export connector to calculate performance metrics on a
recurring schedule.
C.Use an Amazon Redshift COPY command to calculate performance metrics on a recurring schedule.
D.Use an Amazon EMR job with an Apache Hive external table to calculate performance metrics on a recurring
schedule.
Answer: B
Explanation:
Use an AWS Glue job with the AWS Glue DynamoDB export connector to calculate performance metrics on a
recurring schedule.
Based on the number of jobs that need to be processed, the processing must run in parallel while adding and
removing application Amazon EC2 instances as needed. The application must be loosely coupled. The job items
must be durably stored.
A.Create an Amazon Simple Notification Service (Amazon SNS) topic to send the jobs that need to be
processed. Create an Auto Scaling group by using the launch template with the scaling policy set to add and
remove EC2 instances based on CPU usage.
B.Create an Amazon Simple Queue Service (Amazon SQS) queue to hold the jobs that need to be processed.
Create an Auto Scaling group by using the launch template with the scaling policy set to add and remove EC2
instances based on network usage.
C.Create an Amazon Simple Queue Service (Amazon SQS) queue to hold the jobs that need to be processed.
Create an Auto Scaling group by using the launch template with the scaling policy set to add and remove EC2
instances based on the number of items in the SQS queue.
D.Create an Amazon Simple Notification Service (Amazon SNS) topic to send the jobs that need to be
processed. Create an Auto Scaling group by using the launch template with the scaling policy set to add and
remove EC2 instances based on the number of messages published to the SNS topic.
Answer: C
Explanation:
Create an Amazon Simple Queue Service (Amazon SQS) queue to hold the jobs that need to be processed.
Create an Auto Scaling group by using the launch template with the scaling policy set to add and remove EC2
instances based on the number of items in the SQS queue.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use an Amazon EC2 instance in an Auto Scaling group to deploy a containerized application. Use an
Application Load Balancer to distribute web traffic. Use an Amazon RDS DB instance to store product data and
product images.
B.Use AWS Lambda functions to manage the existing monolithic application. Use Amazon DynamoDB to store
product data and product images. Use Amazon Simple Notification Service (Amazon SNS) for event-driven
communication between the Lambda functions.
C.Use Amazon Elastic Kubernetes Service (Amazon EKS) with an Amazon EC2 deployment to deploy a
containerized application. Use an Amazon Aurora cluster to store the product data. Use AWS Step Functions to
manage workflows. Store the product images in Amazon S3 Glacier Deep Archive.
D.Use Amazon Elastic Container Service (Amazon ECS) with AWS Fargate to deploy a containerized application.
Use Amazon RDS with a Multi-AZ deployment to store the product data. Store the product images in an Amazon
S3 bucket.
Answer: D
Explanation:
Use Amazon Elastic Container Service (Amazon ECS) with AWS Fargate to deploy a containerized application.
Use Amazon RDS with a Multi-AZ deployment to store the product data. Store the product images in an
Amazon S3 bucket.
A.Encrypt the data by using client-side encryption with customer managed keys.
B.Encrypt the data by using server-side encryption with AWS KMS keys (SSE-KMS).
C.Encrypt the data by using server-side encryption with customer-provided keys (SSE-C).
D.Encrypt the data by using client-side encryption with Amazon S3 managed keys.
Answer: A
Explanation:
Encrypt the data by using client-side encryption with customer managed keys.
A.Configure interface VPC endpoints for each AWS service that the teams need. Use the required interface VPC
endpoints to submit the big data workloads.
B.Create EMR runtime roles. Configure the cluster to use the runtime roles. Use the runtime roles to submit the
big data workloads.
C.Create an EC2 IAM instance profile that has the required permissions for each team. Use the instance profile
to submit the big data workloads.
D.Create an EMR security configuration that has the EnableApplicationScopedIAMRole option set to false. Use
the security configuration to submit the big data workloads.
Answer: B
Explanation:
Create EMR runtime roles. Configure the cluster to use the runtime roles. Use the runtime roles to submit the
big data workloads.
Question: 967 CertyIQ
A solutions architect is designing an application that helps users fill out and submit registration forms. The
solutions architect plans to use a two-tier architecture that includes a web application server tier and a worker tier.
The application needs to process submitted forms quickly. The application needs to process each form exactly
once. The solution must ensure that no data is lost.
A.Use an Amazon Simple Queue Service (Amazon SQS) FIFO queue between the web application server tier and
the worker tier to store and forward form data.
B.Use an Amazon API Gateway HTTP API between the web application server tier and the worker tier to store
and forward form data.
C.Use an Amazon Simple Queue Service (Amazon SQS) standard queue between the web application server tier
and the worker tier to store and forward form data.
D.Use an AWS Step Functions workflow. Create a synchronous workflow between the web application server
tier and the worker tier that stores and forwards form data.
Answer: A
Explanation:
Use an Amazon Simple Queue Service (Amazon SQS) FIFO queue between the web application server tier and
the worker tier to store and forward form data.
The company is planning to migrate to AWS and wants to use an AWS native solution.
A.Use Amazon EC2 instances to ingest and process the data streams to Amazon S3 buckets tor storage. Use
Amazon Athena to search the data. Use Amazon Managed Grafana to create visualizations.
B.Use Amazon EMR to ingest and process the data streams to Amazon Redshift for storage. Use Amazon
Redshift Spectrum to search the data. Use Amazon QuickSight to create visualizations.
C.Use Amazon Elastic Kubernetes Service (Amazon EKS) to ingest and process the data streams to Amazon
DynamoDB for storage. Use Amazon CloudWatch to create graphical dashboards to search and visualize the
data.
D.Use Amazon Kinesis Data Streams to ingest and process the data streams to Amazon OpenSearch Service.
Use OpenSearch Service to search the data. Use Amazon QuickSight to create visualizations.
Answer: D
Explanation:
Use Amazon Kinesis Data Streams to ingest and process the data streams to Amazon OpenSearch Service.
Use OpenSearch Service to search the data. Use Amazon QuickSight to create visualizations.
Question: 969 CertyIQ
A company currently runs an on-premises application that usesASP.NET on Linux machines. The application is
resource-intensive and serves customers directly.
The company wants to modernize the application to .NET. The company wants to run the application on containers
and to scale based on Amazon CloudWatch metrics. The company also wants to reduce the time spent on
operational maintenance activities.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use AWS App2Container to containerize the application. Use an AWS CloudFormation template to deploy the
application to Amazon Elastic Container Service (Amazon ECS) on AWS Fargate.
B.Use AWS App2Container to containerize the application. Use an AWS CloudFormation template to deploy the
application to Amazon Elastic Container Service (Amazon ECS) on Amazon EC2 instances.
C.Use AWS App Runner to containerize the application. Use App Runner to deploy the application to Amazon
Elastic Container Service (Amazon ECS) on AWS Fargate.
D.Use AWS App Runner to containerize the application. Use App Runner to deploy the application to Amazon
Elastic Kubernetes Service (Amazon EKS) on Amazon EC2 instances.
Answer: A
Explanation:
Use AWS App2Container to containerize the application. Use an AWS CloudFormation template to deploy the
application to Amazon Elastic Container Service (Amazon ECS) on AWS Fargate.
Which solution will meet these requirements with the LEAST operational overhead?
A.Store the employee credentials in AWS Systems Manager Parameter Store. Use AWS CloudFormation and
the BatchGetSecretValue API to retrieve usernames and passwords from Parameter Store.
B.Store the employee credentials in AWS Secrets Manager. Use AWS CloudFormation and AWS Batch with the
BatchGetSecretValue API to retrieve the usernames and passwords from Secrets Manager.
C.Store the employee credentials in AWS Systems Manager Parameter Store. Use AWS CloudFormation and
AWS Batch with the BatchGetSecretValue API to retrieve the usernames and passwords from Parameter Store.
D.Store the employee credentials in AWS Secrets Manager. Use AWS CloudFormation and the
BatchGetSecretValue API to retrieve the usernames and passwords from Secrets Manager.
Answer: D
Explanation:
Store the employee credentials in AWS Secrets Manager. Use AWS CloudFormation and the
BatchGetSecretValue API to retrieve the usernames and passwords from Secrets Manager.
Which solution will meet this requirement with the LEAST operational overhead?
Answer: C
Explanation:
Create an Amazon S3 bucket in ap-northeast-1. Configure Amazon S3 Transfer Acceleration. Download the
software by using the S3 Transfer Acceleration endpoint.
The company needs to design a highly available solution that provides low-latency access to block storage across
multiple Availability Zones.
Which solution will meet these requirements with the LEAST implementation effort?
A.Configure a Windows Server cluster that spans two Availability Zones on Amazon EC2 instances. Install the
application on both cluster nodes. Use Amazon FSx for Windows File Server as shared storage between the two
cluster nodes.
B.Configure a Windows Server cluster that spans two Availability Zones on Amazon EC2 instances. Install the
application on both cluster nodes. Use Amazon Elastic Block Store (Amazon EBS) General Purpose SSD (gp3)
volumes as storage attached to the EC2 instances. Set up application-level replication to sync data from one
EBS volume in one Availability Zone to another EBS volume in the second Availability Zone.
C.Deploy the application on Amazon EC2 instances in two Availability Zones. Configure one EC2 instance as
active and the second EC2 instance in standby mode. Use an Amazon FSx for NetApp ONTAP Multi-AZ file
system to access the data by using Internet Small Computer Systems Interface (iSCSI) protocol.
D.Deploy the application on Amazon EC2 instances in two Availability Zones. Configure one EC2 instance as
active and the second EC2 instance in standby mode. Use Amazon Elastic Block Store (Amazon EBS)
Provisioned IOPS SSD (io2) volumes as storage attached to the EC2 instances. Set up Amazon EBS level
replication to sync data from one io2 volume in one Availability Zone to another io2 volume in the second
Availability Zone.
Answer: A
Explanation:
Configure a Windows Server cluster that spans two Availability Zones on Amazon EC2 instances. Install the
application on both cluster nodes. Use Amazon FSx for Windows File Server as shared storage between the
two cluster nodes.
Question: 973 CertyIQ
A company is designing a web application with an internet-facing Application Load Balancer (ALB).
The company needs the ALB to receive HTTPS web traffic from the public internet. The ALB must send only
HTTPS traffic to the web application servers hosted on the Amazon EC2 instances on port 443. The ALB must
perform a health check of the web application servers over HTTPS on port 8443.
Which combination of configurations of the security group that is associated with the ALB will meet these
requirements? (Choose three.)
Answer: ACE
Explanation:
A. Allow HTTPS inbound traffic from 0.0.0.0/0 for port 443.This allows the ALB to receive HTTPS traffic from
the public internet on port 443.C. Allow HTTPS outbound traffic to the web application instances for port
443.This allows the ALB to forward HTTPS traffic to the web application servers on port 443.E. Allow HTTPS
outbound traffic to the web application instances for the health check on port 8443.This allows the ALB to
perform health checks on the web application servers over HTTPS on port 8443.
A.Use AWS Certificate Manager (ACM) to create a public certificate in the us-east-1 Region. Use the certificate
in CloudFront.
B.Use AWS Certificate Manager (ACM) to create a public certificate in eu-west-1. Use the certificate in
CloudFront.
C.Configure Amazon S3 to allow uploads from CloudFront. Configure S3 Transfer Acceleration.
D.Configure Amazon S3 to allow uploads from CloudFront origin access control (OAC).
E.Configure Amazon S3 to allow uploads from CloudFront. Configure an Amazon S3 website endpoint.
Answer: BD
Explanation:
B.Use AWS Certificate Manager (ACM) to create a public certificate in eu-west-1. Use the certificate in
CloudFront.
D.Configure Amazon S3 to allow uploads from CloudFront origin access control (OAC).
Question: 975 CertyIQ
A weather forecasting company collects temperature readings from various sensors on a continuous basis. An
existing data ingestion process collects the readings and aggregates the readings into larger Apache Parquet
files. Then the process encrypts the files by using client-side encryption with KMS managed keys (CSE-KMS).
Finally, the process writes the files to an Amazon S3 bucket with separate prefixes for each calendar day.
The company wants to run occasional SQL queries on the data to take sample moving averages for a specific
calendar day.
A.Configure Amazon Athena to read the encrypted files. Run SQL queries on the data directly in Amazon S3.
B.Use Amazon S3 Select to run SQL queries on the data directly in Amazon S3.
C.Configure Amazon Redshift to read the encrypted files. Use Redshift Spectrum and Redshift query editor v2
to run SQL queries on the data directly in Amazon S3.
D.Configure Amazon EMR Serverless to read the encrypted files. Use Apache SparkSQL to run SQL queries on
the data directly in Amazon S3.
Answer: A
Explanation:
Configure Amazon Athena to read the encrypted files. Run SQL queries on the data directly in Amazon S3.
The company wants to ensure that each user who accesses the application is sent to the EC2 instances that are
closest to the user’s location.
A.Implement an Amazon Route 53 geolocation routing policy. Use an internet-facing Application Load Balancer
to distribute the traffic across all Availability Zones within the same Region.
B.Implement an Amazon Route 53 geoproximity routing policy. Use an internet-facing Network Load Balancer
to distribute the traffic across all Availability Zones within the same Region.
C.Implement an Amazon Route 53 multivalue answer routing policy. Use an internet-facing Application Load
Balancer to distribute the traffic across all Availability Zones within the same Region.
D.Implement an Amazon Route 53 weighted routing policy. Use an internet-facing Network Load Balancer to
distribute the traffic across all Availability Zones within the same Region.
Answer: B
Explanation:
Implement an Amazon Route 53 geoproximity routing policy. Use an internet-facing Network Load Balancer
to distribute the traffic across all Availability Zones within the same Region.
Which solution will meet these requirements with the LEAST operational overhead?
A.Configure encryption at rest for Amazon RDS for MySQL by using AWS KMS managed keys. Configure AWS
Certificate Manager (ACM) SSL/TLS certificates for encryption in transit.
B.Configure encryption at rest for Amazon RDS for MySQL by using AWS KMS managed keys. Configure IPsec
tunnels for encryption in transit.
C.Implement third-party application-level data encryption before storing data in Amazon RDS for MySQL.
Configure AWS Certificate Manager (ACM) SSL/TLS certificates for encryption in transit.
D.Configure encryption at rest for Amazon RDS for MySQL by using AWS KMS managed keys. Configure a VPN
connection to enable private connectivity to encrypt data in transit.
Answer: A
Explanation:
Configure encryption at rest for Amazon RDS for MySQL by using AWS KMS managed keys. Configure AWS
Certificate Manager (ACM) SSL/TLS certificates for encryption in transit.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create Amazon RDS automated backups. Set the retention period to 90 days.
B.Create an Amazon RDS manual snapshot every day. Delete manual snapshots that are older than 90 days.
C.Use the Amazon Aurora Clone feature for Oracle to create a point-in-time restore. Delete clones that are
older than 90 days.
D.Create a backup plan that has a retention period of 90 days by using AWS Backup for Amazon RDS.
Answer: D
Explanation:
Create a backup plan that has a retention period of 90 days by using AWS Backup for Amazon RDS.
The company wants to cost-optimize the database solution. The company wants to use an AWS managed database
solution that will provide the necessary performance.
A.Deploy the database on Amazon RDS. Use Provisioned IOPS SSD storage to ensure consistent performance
for read and write operations.
B.Deploy the database on Amazon Aurora Serverless to automatically scale the database capacity based on
actual usage to accommodate the workload.
C.Deploy the database on Amazon DynamoDB. Use on-demand capacity mode to automatically scale
throughput to accommodate the workload.
D.Deploy the database on Amazon RDS. Use magnetic storage and use read replicas to accommodate the
workload.
Answer: B
Explanation:
Deploy the database on Amazon Aurora Serverless to automatically scale the database capacity based on
actual usage to accommodate the workload.
The company wants to ensure that the application running on EC2 instances can securely access only the S3
buckets that belong to the company’s AWS account.
Which solution will meet these requirements with the LEAST operational overhead?
A.Create a gateway endpoint for Amazon S3 that is attached to the VPC. Update the IAM instance profile policy
to provide access to only the specific buckets that the application needs.
B.Create a NAT gateway in a public subnet with a security group that allows access to only Amazon S3. Update
the route tables to use the NAT Gateway.
C.Create a gateway endpoint for Amazon S3 that is attached to the VPUpdate the IAM instance profile policy
with a Deny action and the following condition key:
D.Create a NAT Gateway in a public subnet. Update route tables to use the NAT Gateway. Assign bucket
policies for all buckets with a Deny action and the following condition key:
Answer: C
Explanation:
Create a gateway endpoint for Amazon S3 that is attached to the VPUpdate the IAM instance profile policy
with a Deny action and the following condition key.
The company uses AWS IAM Identity Center to manage user credentials. The development, testing, and operations
teams need secure access to Amazon RDS and Amazon S3 while ensuring the confidentiality of sensitive customer
data. The solution must comply with the principle of least privilege.
Which solution meets these requirements with the LEAST operational overhead?
A.Use IAM roles with least privilege to grant all the teams access. Assign IAM roles to each team with
customized IAM policies defining specific permission for Amazon RDS and S3 object access based on team
responsibilities.
B.Enable IAM Identity Center with an Identity Center directory. Create and configure permission sets with
granular access to Amazon RDS and Amazon S3. Assign all the teams to groups that have specific access with
the permission sets.
C.Create individual IAM users for each member in all the teams with role-based permissions. Assign the IAM
roles with predefined policies for RDS and S3 access to each user based on user needs. Implement IAM Access
Analyzer for periodic credential evaluation.
D.Use AWS Organizations to create separate accounts for each team. Implement cross-account IAM roles with
least privilege. Grant specific permission for RDS and S3 access based on team roles and responsibilities.
Answer: B
Explanation:
Enable IAM Identity Center with an Identity Center directory. Create and configure permission sets with
granular access to Amazon RDS and Amazon S3. Assign all the teams to groups that have specific access
with the permission sets.
The application requires temporary access to files in the S3 bucket. The company wants to grant the application
secure access to the files in the S3 bucket.
A.Create an S3 bucket policy that permits access to the bucket from the public IP address range of the
company’s on-premises data center.
B.Use IAM Roles Anywhere to obtain security credentials in IAM Identity Center that grant access to the S3
bucket. Configure the virtual machines to assume the role by using the AWS CLI.
C.Install the AWS CLI on the virtual machine. Configure the AWS CLI with access keys from an IAM user that
has access to the bucket.
D.Create an IAM user and policy that grants access to the bucket. Store the access key and secret key for the
IAM user in AWS Secrets Manager. Configure the application to retrieve the access key and secret key at
startup.
Answer: B
Explanation:
Use IAM Roles Anywhere to obtain security credentials in IAM Identity Center that grant access to the S3
bucket. Configure the virtual machines to assume the role by using the AWS CLI.
Question: 983 CertyIQ
A company hosts its core network services, including directory services and DNS, in its on-premises data center.
The data center is connected to the AWS Cloud using AWS Direct Connect (DX). Additional AWS accounts are
planned that will require quick, cost-effective, and consistent access to these network services.
What should a solutions architect implement to meet these requirements with the LEAST amount of operational
overhead?
A.Create a DX connection in each new account. Route the network traffic to the on-premises servers.
B.Configure VPC endpoints in the DX VPC for all required services. Route the network traffic to the on-premises
servers.
C.Create a VPN connection between each new account and the DX VPRoute the network traffic to the on-
premises servers.
D.Configure AWS Transit Gateway between the accounts. Assign DX to the transit gateway and route network
traffic to the on-premises servers.
Answer: D
Explanation:
Configure AWS Transit Gateway between the accounts. Assign DX to the transit gateway and route network
traffic to the on-premises servers.
A web development team needs a cost-optimized compute solution to improve the company’s ability to serve
dynamic content globally to millions of customers.
A.Create an Amazon CloudFront distribution. Configure the existing ALB as the origin.
B.Use Amazon Route 53 to serve traffic to the ALB and EC2 instances based on the geographic location of each
customer.
C.Create an Amazon S3 bucket with public read access enabled. Migrate the web application to the S3 bucket.
Configure the S3 bucket for website hosting.
D.Use AWS Direct Connect to directly serve content from the web application to the location of each customer.
Answer: A
Explanation:
Create an Amazon CloudFront distribution. Configure the existing ALB as the origin.
Answer: B
Explanation:
Amazon S3 Intelligent-Tiering.
The company will deploy the application on multiple EC2 instances in an Auto Scaling group. All instances require
access to the data that is stored in the EBS volume. The company needs a highly available and resilient solution
that does not introduce significant changes to the application's code.
A.Provision an EC2 instance that uses NFS server software. Attach a single 500 GB gp2 EBS volume to the
instance.
B.Provision an Amazon FSx for Windows File Server file system. Configure the file system as an SMB file store
within a single Availability Zone.
C.Provision an EC2 instance with two 250 GB Provisioned IOPS SSD EBS volumes.
D.Provision an Amazon Elastic File System (Amazon EFS) file system. Configure the file system to use General
Purpose performance mode.
Answer: D
Explanation:
Provision an Amazon Elastic File System (Amazon EFS) file system. Configure the file system to use General
Purpose performance mode.
The application must be highly available and must automatically scale as the number of users increases.
Which combination of steps will meet these requirements MOST cost-effectively? (Choose two.)
Answer: AB
Explanation:
A.In Organizations, create a new tag policy that specifies the data sensitivity tag key and the required values.
Enforce the tag values for the EC2 instances. Attach the tag policy to the appropriate OU.
B.In Organizations, create a new service control policy (SCP) that specifies the data sensitivity tag key and the
required tag values. Enforce the tag values for the EC2 instances. Attach the SCP to the appropriate OU.
C.Create a tag policy to deny running instances when a tag key is not specified. Create another tag policy that
prevents identities from deleting tags. Attach the tag policies to the appropriate OU.
D.Create a service control policy (SCP) to deny creating instances when a tag key is not specified. Create
another SCP that prevents identities from deleting tags. Attach the SCPs to the appropriate OU.
E.Create an AWS Config rule to check if EC2 instances use the data sensitivity tag and the specified values.
Configure an AWS Lambda function to delete the resource if a noncompliant resource is found.
Answer: AD
Explanation:
A.In Organizations, create a new tag policy that specifies the data sensitivity tag key and the required values.
Enforce the tag values for the EC2 instances. Attach the tag policy to the appropriate OU.
D.Create a service control policy (SCP) to deny creating instances when a tag key is not specified. Create
another SCP that prevents identities from deleting tags. Attach the SCPs to the appropriate OU.
The company needs to implement a 30-day backup retention policy. The company currently has both automated
RDS backups and manual RDS backups. The company wants to maintain both types of existing RDS backups that
are less than 30 days old.
A.Configure the RDS backup retention policy to 30 days for automated backups by using AWS Backup.
Manually delete manual backups that are older than 30 days.
B.Disable RDS automated backups. Delete automated backups and manual backups that are older than 30
days. Configure the RDS backup retention policy to 30 days for automated backups.
C.Configure the RDS backup retention policy to 30 days for automated backups. Manually delete manual
backups that are older than 30 days.
D.Disable RDS automated backups. Delete automated backups and manual backups that are older than 30 days
automatically by using AWS CloudFormation. Configure the RDS backup retention policy to 30 days for
automated backups.
Answer: C
Explanation:
Configure the RDS backup retention policy to 30 days for automated backups. Manually delete manual
backups that are older than 30 days.
Which storage solution should a solutions architect recommend for use after the migration?
A.AWS DataSync
B.Amazon Elastic Block Store (Amazon EBS)
C.Amazon Elastic File System (Amazon EFS)
D.Amazon EMR File System (Amazon EMRFS)
Answer: C
Explanation:
Recently, the web application was overwhelmed while processing an unexpected volume of tracker data. Data was
lost with no way to replay the events. A solutions architect must prevent this problem from happening again and
needs a solution with the least operational overhead.
A.Create an Amazon S3 bucket to store the data. Configure the application to scan for new data in the bucket
for processing.
B.Create an Amazon API Gateway endpoint to handle transmitted location coordinates. Use an AWS Lambda
function to process each item concurrently.
C.Create an Amazon Simple Queue Service (Amazon SQS) queue to store the incoming data. Configure the
application to poll for new messages for processing.
D.Create an Amazon DynamoDB table to store transmitted location coordinates. Configure the application to
query the table for new data for processing. Use TTL to remove data that has been processed.
Answer: C
Explanation:
Create an Amazon Simple Queue Service (Amazon SQS) queue to store the incoming data. Configure the
application to poll for new messages for processing.
The company must give the development team the ability to connect to the cluster by using the client when the
team is in the office.
A.Create a VPC and two public subnets. Create the RDS cluster in the public subnets. Use AWS Site-to-Site
VPN with a customer gateway in the company's office.
B.Create a VPC and two private subnets. Create the RDS cluster in the private subnets. Use AWS Site-to-Site
VPN with a customer gateway in the company's office.
C.Create a VPC and two private subnets. Create the RDS cluster in the private subnets. Use RDS security
groups to allow the company's office IP ranges to access the cluster.
D.Create a VPC and two public subnets. Create the RDS cluster in the public subnets. Create a cluster user for
each developer. Use RDS security groups to allow the users to access the cluster.
Answer: B
Explanation:
VPC and Private Subnets: By placing the RDS cluster in private subnets, you ensure that the RDS cluster is not
publicly accessible from the internet. This significantly improves security as the database is only accessible
through secure channels, not directly from the public internet.
AWS Site-to-Site VPN: Using a Site-to-Site VPN establishes a secure, encrypted connection between the on-
premises office and the AWS environment. This provides secure access to the RDS cluster without exposing it
to the internet, ensuring that the developers can only access the cluster when connected to the office
network.
Customer Gateway: The customer gateway is configured in the company's office to handle the VPN
connection, providing secure connectivity for the desktop client to the RDS cluster when the development
team is in the office.
What should the solutions architect do to reduce the overall data transfer costs?
Answer: C
Explanation:
What should a solutions architect do to meet this requirement with the LEAST operational effort?
A.Create a new AWS Key Management Service (AWS KMS) encryption key. Use AWS Secrets Manager to
create a new secret that uses the KMS key with the appropriate credentials. Associate the secret with the
Aurora DB cluster. Configure a custom rotation period of 14 days.
B.Create two parameters in AWS Systems Manager Parameter Store: one for the user name as a string
parameter and one that uses the SecureString type for the password. Select AWS Key Management Service
(AWS KMS) encryption for the password parameter, and load these parameters in the application tier.
Implement an AWS Lambda function that rotates the password every 14 days.
C.Store a file that contains the credentials in an AWS Key Management Service (AWS KMS) encrypted Amazon
Elastic File System (Amazon EFS) file system. Mount the EFS file system in all EC2 instances of the application
tier. Restrict the access to the file on the file system so that the application can read the file and that only
super users can modify the file. Implement an AWS Lambda function that rotates the key in Aurora every 14
days and writes new credentials into the file.
D.Store a file that contains the credentials in an AWS Key Management Service (AWS KMS) encrypted Amazon
S3 bucket that the application uses to load the credentials. Download the file to the application regularly to
ensure that the correct credentials are used. Implement an AWS Lambda function that rotates the Aurora
credentials every 14 days and uploads these credentials to the file in the S3 bucket.
Answer: A
Explanation:
Create a new AWS Key Management Service (AWS KMS) encryption key. Use AWS Secrets Manager to
create a new secret that uses the KMS key with the appropriate credentials. Associate the secret with the
Aurora DB cluster. Configure a custom rotation period of 14 days.
The company needs to process terabyte-sized videos to block some content in the videos. Video processing can
take up to 20 minutes.
The company needs a solution that will scale with demand and remain cost-effective.
A.Use AWS Lambda functions to process videos. Store video metadata in Amazon DynamoDB. Store video
content in Amazon S3 Intelligent-Tiering.
B.Use Amazon Elastic Container Service (Amazon ECS) and AWS Fargate to implement microservices to
process videos. Store video metadata in Amazon Aurora. Store video content in Amazon S3 Intelligent-Tiering.
C.Use Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB) to process
videos. Store video content in Amazon S3 Standard. Use Amazon Simple Queue Service (Amazon SQS) for
queuing and to decouple processing tasks.
D.Deploy a containerized video processing application on Amazon Elastic Kubernetes Service (Amazon EKS) on
Amazon EC2. Store video metadata in Amazon RDS in a single Availability Zone. Store video content in Amazon
S3 Glacier Deep Archive.
Answer: B
Explanation:
Use Amazon Elastic Container Service (Amazon ECS) and AWS Fargate to implement microservices to
process videos. Store video metadata in Amazon Aurora. Store video content in Amazon S3 Intelligent-Tiering.
The company will migrate to an Amazon Elastic Kubernetes Service (Amazon EKS) cluster. The company does not
want to manage the underlying compute infrastructure for the new architecture on AWS.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use a self-managed node to supply compute capacity. Deploy the application to the new EKS cluster.
B.Use managed node groups to supply compute capacity. Deploy the application to the new EKS cluster.
C.Use AWS Fargate to supply compute capacity. Create a Fargate profile. Use the Fargate profile to deploy the
application.
D.Use managed node groups with Karpenter to supply compute capacity. Deploy the application to the new EKS
cluster.
Answer: C
Explanation:
Use AWS Fargate to supply compute capacity. Create a Fargate profile. Use the Fargate profile to deploy the
application.
A.Deploy a self-managed database on Amazon EC2 instances by using open source software. Use Spot
Instances for cost optimization. Configure automated backups to Amazon S3.
B.Use Amazon RDS. Use on-demand capacity mode for the database with General Purpose SSD storage.
Configure automatic backups with a retention period of 7 days.
C.Use Amazon Aurora Serverless for the database. Use serverless capacity scaling. Configure automated
backups to Amazon S3.
D.Deploy a self-managed NoSQL database on Amazon EC2 instances. Use Reserved Instances for cost
optimization. Configure automated backups directly to Amazon S3 Glacier Flexible Retrieval.
Answer: C
Explanation:
Use Amazon Aurora Serverless for the database. Use serverless capacity scaling. Configure automated
backups to Amazon S3.
A solutions architect discovers that the image files are being uploaded to Amazon S3 through the public endpoint.
The solutions architect needs to ensure that traffic to Amazon S3 does not use the public endpoint.
A.Create a gateway VPC endpoint for the S3 bucket that has the necessary permissions for the VPC. Configure
the subnet route table to use the gateway VPC endpoint.
B.Move the S3 bucket inside the VPC. Configure the subnet route table to access the S3 bucket through private
IP addresses.
C.Create an Amazon S3 access point for the Amazon EC2 instance inside the VPConfigure the web application
to upload by using the Amazon S3 access point.
D.Configure an AWS Direct Connect connection between the VPC that has the Amazon EC2 instance and
Amazon S3 to provide a dedicated network path.
Answer: A
Explanation:
Create a gateway VPC endpoint for the S3 bucket that has the necessary permissions for the VPC. Configure
the subnet route table to use the gateway VPC endpoint.
The website is slow to respond during searches of the product catalog. The product catalog is a group of tables in
the MySQL database that the company does not update frequently. A solutions architect has determined that the
CPU utilization on the DB instance is high when product catalog searches occur.
What should the solutions architect recommend to improve the performance of the website during searches of the
product catalog?
A.Migrate the product catalog to an Amazon Redshift database. Use the COPY command to load the product
catalog tables.
B.Implement an Amazon ElastiCache for Redis cluster to cache the product catalog. Use lazy loading to
populate the cache.
C.Add an additional scaling policy to the Auto Scaling group to launch additional EC2 instances when database
response is slow.
D.Turn on the Multi-AZ configuration for the DB instance. Configure the EC2 instances to throttle the product
catalog queries that are sent to the database.
Answer: B
Explanation:
Implement an Amazon ElastiCache for Redis cluster to cache the product catalog. Use lazy loading to
populate the cache.
Which solution will meet these requirements with the MOST operational efficiency?
A.Use Amazon S3 File Gateway. Integrate S3 File Gateway with the on-premises applications to store and
directly retrieve files by using the SMB file system.
B.Use an AWS Storage Gateway Volume Gateway with cached volumes as iSCSI targets.
C.Use an AWS Storage Gateway Volume Gateway with stored volumes as iSCSI targets.
D.Use an AWS Storage Gateway Tape Gateway. Integrate Tape Gateway with the on-premises applications to
store virtual tapes in Amazon S3.
Answer: B
Explanation:
Use an AWS Storage Gateway Volume Gateway with cached volumes as iSCSI targets.
The order collection process occurs quickly, but the order fulfillment process can take longer. Data must not be
lost because of a scaling event.
A solutions architect must ensure that the order collection process and the order fulfillment process can both
scale adequately during peak traffic hours.
A.Use Amazon CloudWatch to monitor the CPUUtilization metric for each instance in both Auto Scaling groups.
Configure each Auto Scaling group's minimum capacity to meet its peak workload value.
B.Use Amazon CloudWatch to monitor the CPUUtilization metric for each instance in both Auto Scaling groups.
Configure a CloudWatch alarm to invoke an Amazon Simple Notification Service (Amazon SNS) topic to create
additional Auto Scaling groups on demand.
C.Provision two Amazon Simple Queue Service (Amazon SQS) queues. Use one SQS queue for order collection.
Use the second SQS queue for order fulfillment. Configure the EC2 instances to poll their respective queues.
Scale the Auto Scaling groups based on notifications that the queues send.
D.Provision two Amazon Simple Queue Service (Amazon SQS) queues. Use one SQS queue for order collection.
Use the second SQS queue for order fulfillment. Configure the EC2 instances to poll their respective queues.
Scale the Auto Scaling groups based on the number of messages in each queue.
Answer: D
Explanation:
Provision two Amazon Simple Queue Service (Amazon SQS) queues. Use one SQS queue for order collection.
Use the second SQS queue for order fulfillment. Configure the EC2 instances to poll their respective queues.
Scale the Auto Scaling groups based on the number of messages in each queue.
The company needs to design a robust, continuously available, and resilient DynamoDB architecture to maintain a
seamless gaming experience for users.
A.Create DynamoDB tables in a single AWS Region. Use on-demand capacity mode. Use global tables to
replicate data across multiple Regions.
B.Use DynamoDB Accelerator (DAX) to cache frequently accessed data. Deploy tables in a single AWS Region
and enable auto scaling. Configure Cross-Region Replication manually to additional Regions.
C.Create DynamoDB tables in multiple AWS Regions. Use on-demand capacity mode. Use DynamoDB Streams
for Cross-Region Replication between Regions.
D.Use DynamoDB global tables for automatic multi-Region replication. Deploy tables in multiple AWS Regions.
Use provisioned capacity mode. Enable auto scaling.
Answer: D
Explanation:
D. Use DynamoDB global tables for automatic multi-Region replication. Deploy tables in multiple AWS
Regions. Use provisioned capacity mode. Enable auto scaling. DynamoDB global tables automatically
replicate data across multiple Regions, ensuring that the data is available and consistent across all Regions.
This provides resilience and high availability by allowing users in different geographical locations to access
data from the closest Region.Provisioned capacity mode allows you to pre-allocate read and write capacity
units, which can result in cost savings over on-demand capacity mode if the traffic is predictable. Additionally,
auto scaling can be enabled to dynamically adjust the capacity based on the actual traffic, ensuring that you
only pay for the capacity that you need.Multi-Region deployment improves the resilience of the system. If a
failure occurs in one Region, another Region can seamlessly take over, ensuring an uninterrupted gaming
experience.
The company needs to design a storage solution for the application. The storage solution must maintain the
desired application performance.
Which storage solution will meet these requirements in the MOST cost-effective way?
A.Use Mountpoint for Amazon S3 to access the data in Amazon S3 for the on-premises application.
B.Configure an Amazon S3 File Gateway to provide storage for the on-premises application.
C.Copy the data from Amazon S3 to Amazon FSx for Windows File Server. Configure an Amazon FSx File
Gateway to provide storage for the on-premises application.
D.Configure an on-premises file server. Use the Amazon S3 API to connect to S3 storage. Configure the
application to access the storage from the on-premises file server.
Answer: B
Explanation:
B. Configure an Amazon S3 File Gateway to provide storage for the on-premises application. Amazon S3 File
Gateway provides a way for on-premises applications to access objects stored in Amazon S3 as files. It caches
frequently accessed data locally, which ensures low-latency access to the data. This is crucial for maintaining
the performance of the rendering application.By keeping the data in Amazon S3, the company benefits from
lower storage costs compared to using other storage services like Amazon FSx, while still providing the
necessary performance for the on-premises application through the local caching capabilities of the File
Gateway.The File Gateway seamlessly integrates with Amazon S3, allowing the application to access data
using standard file protocols like NFS or SMB, which simplifies the setup.
Which solution will improve response times for the international customers MOST cost-effectively?
A.Create an AWS Direct Connect connection that has a public virtual interface (VIF) to provide connectivity
from each customer's data center to us-east-1. Route customer API requests by using a Direct Connect
gateway to the ERP system API.
B.Set up an Amazon CloudFront distribution in front of the API. Configure the CachingOptimized managed
cache policy to provide improved cache efficiency.
C.Set up AWS Global Accelerator. Configure listeners for the necessary ports. Configure endpoint groups for
the appropriate Regions to distribute traffic. Create an endpoint in the group for the API.
D.Use AWS Site-to-Site VPN to establish dedicated VPN tunnels between Regions and customer networks.
Route traffic to the API over the VPN connections.
Answer: B
Explanation:
Set up an Amazon CloudFront distribution in front of the API. Configure the CachingOptimized managed
cache policy to provide improved cache efficiency.
The company wants to automate the customer survey process. Survey results must be available for the previous 12
months.
Which solution will meet these requirements in the MOST scalable way?
A.Send the survey results data to an Amazon API Gateway endpoint that is connected to an Amazon Simple
Queue Service (Amazon SQS) queue. Create an AWS Lambda function to poll the SQS queue, call Amazon
Comprehend for sentiment analysis, and save the results to an Amazon DynamoDB table. Set the TTL for all
records to 365 days in the future.
B.Send the survey results data to an API that is running on an Amazon EC2 instance. Configure the API to store
the survey results as a new record in an Amazon DynamoDB table, call Amazon Comprehend for sentiment
analysis, and save the results in a second DynamoDB table. Set the TTL for all records to 365 days in the future.
C.Write the survey results data to an Amazon S3 bucket. Use S3 Event Notifications to invoke an AWS Lambda
function to read the data and call Amazon Rekognition for sentiment analysis. Store the sentiment analysis
results in a second S3 bucket. Use S3 lifecycle policies on each bucket to expire objects after 365 days.
D.Send the survey results data to an Amazon API Gateway endpoint that is connected to an Amazon Simple
Queue Service (Amazon SQS) queue. Configure the SQS queue to invoke an AWS Lambda function that calls
Amazon Lex for sentiment analysis and saves the results to an Amazon DynamoDB table. Set the TTL for all
records to 365 days in the future.
Answer: A
Explanation:
Send the survey results data to an Amazon API Gateway endpoint that is connected to an Amazon Simple
Queue Service (Amazon SQS) queue. Create an AWS Lambda function to poll the SQS queue, call Amazon
Comprehend for sentiment analysis, and save the results to an Amazon DynamoDB table. Set the TTL for all
records to 365 days in the future.
New security protocols require the company to remove EC2 instances from service during a patch. When the
company attempts to follow the security protocol during the next patch, the company receives errors during the
patching window.
A.Change the target type of the target group from IP address type to instance type.
B.Continue to use the existing Systems Manager document without changes because it is already optimized to
handle instances that are in an IP address type target group behind an ALB.
C.Implement the AWSEC2-PatchLoadBalanacerInstance Systems Manager Automation document to manage
the patching process.
D.Use Systems Manager Maintenance Windows to automatically remove the instances from service to patch
the instances.
E.Configure Systems Manager State Manager to remove the instances from service and manage the patching
schedule. Use ALB health checks to re-route traffic.
Answer: CD
Explanation:
D.Use Systems Manager Maintenance Windows to automatically remove the instances from service to patch
the instances.
Question: 1007 CertyIQ
A medical company wants to perform transformations on a large amount of clinical trial data that comes from
several customers. The company must extract the data from a relational database that contains the customer data.
Then the company will transform the data by using a series of complex rules. The company will load the data to
Amazon S3 when the transformations are complete.
All data must be encrypted where it is processed before the company stores the data in Amazon S3. All data must
be encrypted by using customer-specific keys.
Which solution will meet these requirements with the LEAST amount of operational effort?
A.Create one AWS Glue job for each customer. Attach a security configuration to each job that uses server-side
encryption with Amazon S3 managed keys (SSE-S3) to encrypt the data.
B.Create one Amazon EMR cluster for each customer. Attach a security configuration to each cluster that uses
client-side encryption with a custom client-side root key (CSE-Custom) to encrypt the data.
C.Create one AWS Glue job for each customer. Attach a security configuration to each job that uses client-side
encryption with AWS KMS managed keys (CSE-KMS) to encrypt the data.
D.Create one Amazon EMR cluster for each customer. Attach a security configuration to each cluster that uses
server-side encryption with AWS KMS keys (SSE-KMS) to encrypt the data.
Answer: C
Explanation:
Create one AWS Glue job for each customer. Attach a security configuration to each job that uses client-side
encryption with AWS KMS managed keys (CSE-KMS) to encrypt the data.
The company notices that the application is showing signs of performance degradation during busy times and is
presenting 5xx errors. The company needs to make the application scale seamlessly.
A.Create an Amazon Machine Image (AMI) of the web application. Use the AMI to launch a second EC2 On-
Demand Instance. Use an Application Load Balancer to distribute the load across the two EC2 instances.
B.Create an Amazon Machine Image (AMI) of the web application. Use the AMI to launch a second EC2 On-
Demand Instance. Use Amazon Route 53 weighted routing to distribute the load across the two EC2 instances.
C.Create an AWS Lambda function to stop the EC2 instance and change the instance type. Create an Amazon
CloudWatch alarm to invoke the Lambda function when CPU utilization is more than 75%.
D.Create an Amazon Machine Image (AMI) of the web application. Apply the AMI to a launch template. Create
an Auto Scaling group that includes the launch template. Configure the launch template to use a Spot Fleet.
Attach an Application Load Balancer to the Auto Scaling group.
Answer: D
Explanation:
Create an Amazon Machine Image (AMI) of the web application. Apply the AMI to a launch template. Create an
Auto Scaling group that includes the launch template. Configure the launch template to use a Spot Fleet.
Attach an Application Load Balancer to the Auto Scaling group.
Question: 1009 CertyIQ
A company runs an environment where data is stored in an Amazon S3 bucket. The objects are accessed
frequently throughout the day. The company has strict da ta encryption requirements for data that is stored in the
S3 bucket. The company currently uses AWS Key Management Service (AWS KMS) for encryption.
The company wants to optimize costs associated with encrypting S3 objects without making additional calls to
AWS KMS.
Answer: B
Explanation:
Reference:
https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-key.html
The migration is time sensitive. The company wants to use a lift-and-shift strategy for non-critical workloads.
A.Use the AWS Schema Conversion Tool (AWS SCT) to collect data about the VMs.
B.Use AWS Application Migration Service. Install the AWS Replication Agent on the VMs.
C.Complete the initial replication of the VMs. Launch test instances to perform acceptance tests on the VMs.
D.Stop all operations on the VMs. Launch a cutover instance.
E.Use AWS App2Container (A2C) to collect data about the VMs.
F.Use AWS Database Migration Service (AWS DMS) to migrate the VMs.
Answer: BCD
Explanation:
B.Use AWS Application Migration Service. Install the AWS Replication Agent on the VMs.
C.Complete the initial replication of the VMs. Launch test instances to perform acceptance tests on the VMs.
The company needs to modify the application so the application can securely store user documents in an Amazon
S3 bucket.
Which combination of steps will securely integrate Amazon S3 with the application? (Choose two.)
A.Create an Amazon Cognito identity pool to generate secure Amazon S3 access tokens for users when they
successfully log in.
B.Use the existing Amazon Cognito user pool to generate Amazon S3 access tokens for users when they
successfully log in.
C.Create an Amazon S3 VPC endpoint in the same VPC where the company hosts the application.
D.Create a NAT gateway in the VPC where the company hosts the application. Assign a policy to the S3 bucket
to deny any request that is not initiated from Amazon Cognito.
E.Attach a policy to the S3 bucket that allows access only from the users' IP addresses.
Answer: AC
Explanation:
A.Create an Amazon Cognito identity pool to generate secure Amazon S3 access tokens for users when they
successfully log in.
C.Create an Amazon S3 VPC endpoint in the same VPC where the company hosts the application.
At peak times, some users report order processing delays and halls. The company has noticed that during these
delays, the EC2 instances are running at 100% CPU usage, and the SQS queue fills up. The peak times are variable
and unpredictable.
A.Use scheduled scaling for Amazon EC2 Auto Scaling to scale out the processing tier instances for the
duration of peak usage times. Use the CPU Utilization metric to determine when to scale.
B.Use Amazon ElastiCache for Redis in front of the DynamoDB backend tier. Use target utilization as a metric to
determine when to scale.
C.Add an Amazon CloudFront distribution to cache the responses for the web tier. Use HTTP latency as a metric
to determine when to scale.
D.Use an Amazon EC2 Auto Scaling target tracking policy to scale out the processing tier instances. Use the
ApproximateNumberOfMessages attribute to determine when to scale.
Answer: D
Explanation:
Use an Amazon EC2 Auto Scaling target tracking policy to scale out the processing tier instances. Use the
ApproximateNumberOfMessages attribute to determine when to scale.
Question: 1013 CertyIQ
A company's production environment consists of Amazon EC2 On-Demand Instances that run constantly between
Monday and Saturday. The instances must run for only 12 hours on Sunday and cannot tolerate interruptions. The
company wants to cost-optimize the production environment.
A.Purchase Scheduled Reserved Instances for the EC2 instances that run for only 12 hours on Sunday.
Purchase Standard Reserved Instances for the EC2 instances that run constantly between Monday and
Saturday.
B.Purchase Convertible Reserved Instances for the EC2 instances that run for only 12 hours on Sunday.
Purchase Standard Reserved Instances for the EC2 instances that run constantly between Monday and
Saturday.
C.Use Spot Instances for the EC2 instances that run for only 12 hours on Sunday. Purchase Standard Reserved
Instances for the EC2 instances that run constantly between Monday and Saturday.
D.Use Spot Instances for the EC2 instances that run for only 12 hours on Sunday. Purchase Convertible
Reserved Instances for the EC2 instances that run constantly between Monday and Saturday.
Answer: A
Explanation:
Purchase Scheduled Reserved Instances for the EC2 instances that run for only 12 hours on Sunday. Purchase
Standard Reserved Instances for the EC2 instances that run constantly between Monday and Saturday.
The company needs a solution to manage the growing number of image processing jobs. The solution must also
reduce the manual tasks in the image processing workflow. The company does not want to manage the underlying
infrastructure of the solution.
Which solution will meet these requirements with the LEAST operational overhead?
A.Use Amazon Elastic Container Service (Amazon ECS) with Amazon EC2 Spot Instances to process the images.
Configure Amazon Simple Queue Service (Amazon SQS) to orchestrate the workflow. Store the processed files
in Amazon Elastic File System (Amazon EFS).
B.Use AWS Batch jobs to process the images. Use AWS Step Functions to orchestrate the workflow. Store the
processed files in an Amazon S3 bucket.
C.Use AWS Lambda functions and Amazon EC2 Spot Instances to process the images. Store the processed files
in Amazon FSx.
D.Deploy a group of Amazon EC2 instances to process the images. Use AWS Step Functions to orchestrate the
workflow. Store the processed files in an Amazon Elastic Block Store (Amazon EBS) volume.
Answer: B
Explanation:
Use AWS Batch jobs to process the images. Use AWS Step Functions to orchestrate the workflow. Store the
processed files in an Amazon S3 bucket.
Question: 1015 CertyIQ
A company's image-hosting website gives users around the world the ability to up load, view, and download images
from their mobile devices. The company currently hosts the static website in an Amazon S3 bucket.
Because of the website's growing popularity, the website's performance has decreased. Users have reported
latency issues when they upload and download images.
Which solution will meet these requirements with the LEAST implementation effort?
A.Configure an Amazon CloudFront distribution for the S3 bucket to improve the download performance.
Enable S3 Transfer Acceleration to improve the upload performance.
B.Configure Amazon EC2 instances of the right sizes in multiple AWS Regions. Migrate the application to the
EC2 instances. Use an Application Load Balancer to distribute the website traffic equally among the EC2
instances. Configure AWS Global Accelerator to address global demand with low latency.
C.Configure an Amazon CloudFront distribution that uses the S3 bucket as an origin to improve the download
performance. Configure the application to use CloudFront to upload images to improve the upload
performance. Create S3 buckets in multiple AWS Regions. Configure replication rules for the buckets to
replicate users' data based on the users' location. Redirect downloads to the S3 bucket that is closest to each
user's location.
D.Configure AWS Global Accelerator for the S3 bucket to improve network performance. Create an endpoint
for the application to use Global Accelerator instead of the S3 bucket.
Answer: A
Explanation:
Configure an Amazon CloudFront distribution for the S3 bucket to improve the download performance. Enable
S3 Transfer Acceleration to improve the upload performance.
According to the company's security policy, traffic from the application must not travel across the internet.
A.Configure an S3 interface endpoint. Create a security group that allows outbound traffic to Amazon S3.
B.Configure an S3 gateway endpoint. Update the VPC route table to use the endpoint.
C.Configure an S3 bucket policy to allow traffic from the Elastic IP address that is assigned to the NAT
gateway.
D.Create a second NAT gateway in the same subnet where the legacy application is deployed. Update the VPC
route table to use the second NAT gateway.
Answer: B
Explanation:
Configure an S3 gateway endpoint. Update the VPC route table to use the endpoint.
Question: 1017 CertyIQ
A company has an application that runs on an Amazon Elastic Kubernetes Service (Amazon EKS) cluster on
Amazon EC2 instances. The application has a UI that uses Amazon DynamoDB and data services that use Amazon
S3 as part of the application deployment.
The company must ensure that the EKS Pods for the UI can access only Amazon DynamoDB and that the EKS Pods
for the data services can access only Amazon S3. The company uses AWS Identity and Access Management (IAM).
A.Create separate IAM policies for Amazon S3 and DynamoDB access with the required permissions. Attach
both IAM policies to the EC2 instance profile. Use role-based access control (RBAC) to control access to
Amazon S3 or DynamoDB for the respective EKS Pods.
B.Create separate IAM policies for Amazon S3 and DynamoDB access with the required permissions. Attach the
Amazon S3 IAM policy directly to the EKS Pods for the data services and the DynamoDB policy to the EKS Pods
for the UI.
C.Create separate Kubernetes service accounts for the UI and data services to assume an IAM role. Attach the
AmazonS3FullAccess policy to the data services account and the AmazonDynamoDBFullAccess policy to the UI
service account.
D.Create separate Kubernetes service accounts for the UI and data services to assume an IAM role. Use IAM
Role for Service Accounts (IRSA) to provide access to the EKS Pods for the UI to Amazon S3 and the EKS Pods
for the data services to DynamoDB.
Answer: D
Explanation:
https://docs.aws.amazon.com/eks/latest/userguide/service-accounts.html#service-accounts-iam
The company currently uses an on-premises Active Directory for internal authentication. The company uses AWS
Organizations to manage multiple AWS accounts that support multiple projects.
The company needs a solution to integrate with the existing infrastructure to provide centralized identity
management and access control.
Which solution will meet these requirements with the LEAST operational overhead?
A.Set up AWS Directory Service to create an AWS managed Microsoft Active Directory on AWS. Establish a
trust relationship with the on-premises Active Directory. Use IAM rotes that are assigned to Active Directory
groups to access AWS resources within the company's AWS accounts.
B.Create an IAM user for each developer. Manually manage permissions for each IAM user based on each user's
involvement with each project. Enforce multi-factor authentication (MFA) as an additional layer of security.
C.Use AD Connector in AWS Directory Service to connect to the on-premises Active Directory. Integrate AD
Connector with AWS IAM Identity Center. Configure permissions sets to give each AD group access to specific
AWS accounts and resources.
D.Use Amazon Cognito to deploy an identity federation solution. Integrate the identity federation solution with
the on-premises Active Directory. Use Amazon Cognito to provide access tokens for developers to access AWS
accounts and resources.
Answer: C
Explanation:
Use AD Connector in AWS Directory Service to connect to the on-premises Active Directory. Integrate AD
Connector with AWS IAM Identity Center. Configure permissions sets to give each AD group access to
specific AWS accounts and resources.
A.Set up an API Gateway private integration to restrict access to a predefined set of IP addresses.
B.Create a resource policy for the API that denies access to any IP address that is not specifically allowed.
C.Directly deploy the API in a private subnet. Create a network ACL. Set up rules to allow the traffic from
specific IP addresses.
D.Modify the security group that is attached to API Gateway to allow inbound traffic from only the trusted IP
addresses.
Answer: B
Explanation:
Create a resource policy for the API that denies access to any IP address that is not specifically allowed.
Thank you
Thank you for being so interested in the premium exam material.
I'm glad to hear that you found it informative and helpful.
If you have any feedback or thoughts on the bumps, I would love to hear them.
Your insights can help me improve our writing and better understand our readers.
Best of Luck
You have worked hard to get to this point, and you are well-prepared for the exam
Keep your head up, stay positive, and go show that exam what you're made of!