Amazon AWS Certified Solutions Architect - Associate SAA-C03 AWS Certified Solutions Architect - Associate Exam Questions in PDF

Free Amazon AWS Certified Solutions Architect - Associate Dumps Questions (page: 22)

A company is concerned about the security of its public web application due to recent web attacks. The application uses an Application Load Balancer (ALB). A solutions architect must reduce the risk of DDoS attacks against the application.
What should the solutions architect do to meet this requirement?

  1. Add an Amazon Inspector agent to the ALB.
  2. Configure Amazon Macie to prevent attacks.
  3. Enable AWS Shield Advanced to prevent attacks.
  4. Configure Amazon GuardDuty to monitor the ALB.

Answer(s): C

Explanation:

Enabling AWS Shield Advanced provides DDoS protection at the edge and integrates with ALB, offering enhanced DDoS mitigation, scrubbing, and 24/7 DDoS response team support, directly addressing DDoS risk for the public web application. A) Amazon Inspector assesses EC2 instances, not real-time DDoS protection on ALB. B) Amazon Macie focuses on data security and privacy, not DDoS defense. D) Amazon GuardDuty monitors for threats and compromised instances, not active DDoS mitigation for an ALB. Therefore, Shield Advanced is the correct choice.



A company’s web application is running on Amazon EC2 instances behind an Application Load Balancer. The company recently changed its policy, which now requires the application to be accessed from one specific country only.
Which configuration will meet this requirement?

  1. Configure the security group for the EC2 instances.
  2. Configure the security group on the Application Load Balancer.
  3. Configure AWS WAF on the Application Load Balancer in a VP
  4. Configure the network ACL for the subnet that contains the EC2 instances.

Answer(s): C

Explanation:

A) The security group on the EC2 instances does not filter by geographic location; it controls traffic at the instance level, not country-based access. B) The security group on the ALB does not provide country-based filtering; SGs are per resource and operate at the IP/port level without geo controls. C) AWS WAF on the ALB supports geo Match Conditions to allow or block requests by country, satisfying the requirement. D) Network ACLs operate at the subnet level and do not offer granular geo-based filtering for specific country access.



A company provides an API to its users that automates inquiries for tax computations based on item prices. The company experiences a larger number of inquiries during the holiday season only that cause slower response times. A solutions architect needs to design a solution that is scalable and elastic.
What should the solutions architect do to accomplish this?

  1. Provide an API hosted on an Amazon EC2 instance. The EC2 instance performs the required computations when the API request is made.
  2. Design a REST API using Amazon API Gateway that accepts the item names. API Gateway passes item names to AWS Lambda for tax computations.
  3. Create an Application Load Balancer that has two Amazon EC2 instances behind it. The EC2 instances will compute the tax on the received item names.
  4. Design a REST API using Amazon API Gateway that connects with an API hosted on an Amazon EC2 instance. API Gateway accepts and passes the item names to the EC2 instance for tax computations.

Answer(s): B

Explanation:

A REST API with API Gateway and AWS Lambda (B) is scalable and elastic, as API Gateway handles traffic management and Lambda provides automatic scaling for compute without provisioning servers. Lambda’s pay-per-use model fits seasonal spikes.
A: EC2-based compute is not inherently elastic; requires provisioning and scaling groups, which adds management overhead and slower cold starts.
C: ELB with fixed EC2 instances lacks automatic scaling during spikes and requires manual capacity planning.
D: API Gateway-to-EC2 integration reintroduces server management and lacks the fully serverless, scalable benefits of Lambda; adds latency from the extra hop.



A solutions architect is creating a new Amazon CloudFront distribution for an application. Some of the information submitted by users is sensitive. The application uses HTTPS but needs another layer of security. The sensitive information should.be protected throughout the entire application stack, and access to the information should be restricted to certain applications.
Which action should the solutions architect take?

  1. Configure a CloudFront signed URL.
  2. Configure a CloudFront signed cookie.
  3. Configure a CloudFront field-level encryption profile.
  4. Configure CloudFront and set the Origin Protocol Policy setting to HTTPS Only for the Viewer Protocol Policy.

Answer(s): C

Explanation:

CloudFront field-level encryption (FLE) encrypts specific data fields in user requests at the edge, protecting sensitive information end-to-end through the stack and restricting access to designated applications that hold the decryption keys.
A) CloudFront signed URLOnly controls access to the content, not field-level data protection. B) Signed cookies also manage access, not data encryption within requests. D) Origin Protocol Policy HTTPS Only ensures transport security to the origin, but does not encrypt specific fields in transit or enforce per-field access control. C) Correct: FLE provides per-field encryption, meeting the requirement for protecting sensitive information across the stack and limiting access to authorized apps.



A gaming company hosts a browser-based application on AWS. The users of the application consume a large number of videos and images that are stored in Amazon S3. This content is the same for all users.
The application has increased in popularity, and millions of users worldwide accessing these media files. The company wants to provide the files to the users while reducing the load on the origin.
Which solution meets these requirements MOST cost-effectively?

  1. Deploy an AWS Global Accelerator accelerator in front of the web servers.
  2. Deploy an Amazon CloudFront web distribution in front of the S3 bucket.
  3. Deploy an Amazon ElastiCache for Redis instance in front of the web servers.
  4. Deploy an Amazon ElastiCache for Memcached instance in front of the web servers.

Answer(s): B

Explanation:

Using CloudFront in front of S3 caches and delivers static media at edge locations, reducing origin load and lowering cost for global, cacheable content.
A) Global Accelerator optimizes network paths to endpoints but does not provide caching for S3 content, so cost reduction and cache benefits are limited.
C) ElastiCache for Redis introduces a caching layer but is stateful and requires application changes; it sits behind the app, not at the edge for static media.
D) ElastiCache for Memcached similarly adds a cache but at the origin side; it’s not a global CDN and lacks edge caching for S3 content.



A company has a multi-tier application that runs six front-end web servers in an Amazon EC2 Auto Scaling group in a single Availability Zone behind an Application Load Balancer (ALB). A solutions architect needs to modify the infrastructure to be highly available without modifying the application.
Which architecture should the solutions architect choose that provides high availability?

  1. Create an Auto Scaling group that uses three instances across each of two Regions.
  2. Modify the Auto Scaling group to use three instances across each of two Availability Zones.
  3. Create an Auto Scaling template that can be used to quickly create more instances in another Region.
  4. Change the ALB in front of the Amazon EC2 instances in a round-robin configuration to balance traffic to the web tier.

Answer(s): B

Explanation:

The correct answer is B.
A) Deploying across two Regions is unnecessary for regional HA and introduces cross-region latency and data transfer costs; not required for high availability within a single application.
B) Using three instances across two Availability Zones distributes load and resilience against AZ failures, meeting HA requirements without modifying the app.
C) An Auto Scaling template to another Region aids rapid deployment but does not ensure active HA without cross-region routing and syncing; it’s not a direct HA architecture adjustment.
D) ALB round-robin does not address AZ failure scenarios and does not increase HA beyond current single-AZ deployment.



An ecommerce company has an order-processing application that uses Amazon API Gateway and an AWS Lambda function. The application stores data in an Amazon Aurora PostgreSQL database. During a recent sales event, a sudden surge in customer orders occurred. Some customers experienced timeouts, and the application did not process the orders of those customers.
A solutions architect determined that the CPU utilization and memory utilization were high on the database because of a large number of open connections. The solutions architect needs to prevent the timeout errors while making the least possible changes to the application.
Which solution will meet these requirements?

  1. Configure provisioned concurrency for the Lambda function. Modify the database to be a global database in multiple AWS Regions.
  2. Use Amazon RDS Proxy to create a proxy for the database. Modify the Lambda function to use the RDS Proxy endpoint instead of the database endpoint.
  3. Create a read replica for the database in a different AWS Region. Use query string parameters in API Gateway to route traffic to the read replica.
  4. Migrate the data from Aurora PostgreSQL to Amazon DynamoDB by using AWS Database Migration Service (AWS DMS). Modify the Lambda function to use the DynamoDB table.

Answer(s): B

Explanation:

Amazon RDS Proxy offloads and multiplexes database connections, reducing open connections and CPU/memory pressure on Aurora PostgreSQL during spikes, which minimizes timeouts without substantial application changes. A) Provisioned concurrency helps Lambda cold-starts but does not address DB connection saturation. Global database and regional failover add complexity and latency rather than solving connection limits. C) Read replicas in another region do not alleviate connection saturation and routing via API Gateway adds overhead. D) Migrating to DynamoDB is a major architecture change and unnecessary for this issue. B) correctly targets connection management with minimal changes to the Lambda and existing Aurora setup.



An application runs on Amazon EC2 instances in private subnets. The application needs to access an Amazon DynamoDB table.
What is the MOST secure way to access the table while ensuring that the traffic does not leave the AWS network?

  1. Use a VPC endpoint for DynamoDB.
  2. Use a NAT gateway in a public subnet.
  3. Use a NAT instance in a private subnet.
  4. Use the internet gateway attached to the VPC.

Answer(s): A

Explanation:

Ansible: A) reason
A) A VPC endpoint for DynamoDB provides private, secure connectivity to DynamoDB from within the VPC without traversing the public internet, ensuring traffic stays on the AWS network.
B) A NAT gateway allows private-subnet instances to access the internet, not DynamoDB privately, and could expose traffic to the public internet if DynamoDB were reachable otherwise.
C) A NAT instance has similar limitations and maintenance overhead as a NAT gateway, and still routes through the public internet unless the service supports VPC endpoints.
D) An internet gateway would route traffic to the public internet, not keeping it entirely within the AWS network.



Share your comments for Amazon AWS Certified Solutions Architect - Associate exam with other users:

S
SAM
12/4/2023 12:56:00 AM

explained answers

A
Andy
12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks

S
siva
5/17/2023 12:32:00 AM

very helpfull

M
mouna
9/27/2023 8:53:00 AM

good questions

B
Bhavya
9/12/2023 7:18:00 AM

help to practice csa exam

M
Malik
9/28/2023 1:09:00 PM

nice tip and well documented

R
rodrigo
6/22/2023 7:55:00 AM

i need the exam

D
Dan
6/29/2023 1:53:00 PM

please upload

A
Ale M
11/22/2023 6:38:00 PM

prepping for fsc exam

A
ahmad hassan
9/6/2023 3:26:00 AM

pd1 with great experience

Ž
Žarko
9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution

S
Shiji
10/15/2023 1:08:00 PM

helpful to check your understanding.

D
Da Costa
8/27/2023 11:43:00 AM

question 128 the answer should be static not auto

B
bot
7/26/2023 6:45:00 PM

more comments here

K
Kaleemullah
12/31/2023 1:35:00 AM

great support to appear for exams

B
Bsmaind
8/20/2023 9:26:00 AM

useful dumps

B
Blessious Phiri
8/13/2023 8:37:00 AM

making progress

N
Nabla
9/17/2023 10:20:00 AM

q31 answer should be d i think

V
vladputin
7/20/2023 5:00:00 AM

is this real?

N
Nick W
9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it

N
Naveed
8/28/2023 2:48:00 AM

good questions with simple explanation

C
cert
9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s

Y
Yves
8/29/2023 8:46:00 PM

very inciting

M
Miguel
10/16/2023 11:18:00 AM

question 5, it seems a instead of d, because: - care plan = case - patient = person account - product = product2;

B
Byset
9/25/2023 12:49:00 AM

it look like real one

D
Debabrata Das
8/28/2023 8:42:00 AM

i am taking oracle fcc certification test next two days, pls share question dumps

N
nITA KALE
8/22/2023 1:57:00 AM

i need dumps

C
CV
9/9/2023 1:54:00 PM

its time to comptia sec+

S
SkepticReader
8/1/2023 8:51:00 AM

question 35 has an answer for a different question. i believe the answer is "a" because it shut off the firewall. "0" in registry data means that its false (aka off).

N
Nabin
10/16/2023 4:58:00 AM

helpful content

B
Blessious Phiri
8/15/2023 3:19:00 PM

oracle 19c is complex db

S
Sreenivas
10/24/2023 12:59:00 AM

helpful for practice

L
Liz
9/11/2022 11:27:00 PM

support team is fast and deeply knowledgeable. i appreciate that a lot.

N
Namrata
7/15/2023 2:22:00 AM

helpful questions

AI Tutor 👋 I’m here to help!