00:20:00

AWS Certified Solutions Architect Associate Practice Test (SAA-C03)

Use the form below to configure your AWS Certified Solutions Architect Associate Practice Test (SAA-C03). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for AWS Certified Solutions Architect Associate SAA-C03
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Solutions Architect Associate SAA-C03 Information

AWS Certified Solutions Architect - Associate showcases knowledge and skills in AWS technology, across a wide range of AWS services. The focus of this certification is on the design of cost and performance optimized solutions, demonstrating a strong understanding of the AWS Well-Architected Framework. This certification can enhance the career profile and earnings of certified individuals and increase your credibility and confidence in stakeholder and customer interactions.

The AWS Certified Solutions Architect - Associate (SAA-C03) exam is intended for individuals who perform a solutions architect role. The exam validates a candidate’s ability to design solutions based on the AWS Well-Architected Framework.

The exam also validates a candidate’s ability to complete the following tasks:

  • Design solutions that incorporate AWS services to meet current business requirements and future projected needs
  • Design architectures that are secure, resilient, high-performing, and cost optimized
  • Review existing solutions and determine improvements
AWS Certified Solutions Architect Associate SAA-C03 Logo
  • Free AWS Certified Solutions Architect Associate SAA-C03 Practice Test

  • 20 Questions
  • Unlimited
  • Design Secure Architectures
    Design Resilient Architectures
    Design High-Performing Architectures
    Design Cost-Optimized Architectures

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

Which of the following statements about enabling multi-factor authentication (MFA) in AWS is correct?

Select ONE answer.

  • An IAM user can enable an MFA device for their own user if their IAM policy permits the required actions.

  • Only the AWS account root user can enable MFA, and IAM users cannot enable it even if granted permissions.

  • MFA can only be enabled through the AWS CLI; the AWS Management Console does not support enabling MFA devices.

  • MFA can be enabled for an IAM role in the same way that it is enabled for a user.

Question 2 of 20

What is the purpose of using multiple Availability Zones for deploying applications on AWS?

  • To provide high availability and fault tolerance for applications by distributing resources within a region across physically separated data centers.

  • To serve as a single point of contact and management for global resources in multiple regions.

  • To increase the overall performance of compute instances by equally distributing the workload.

  • To cache static content closer to users and reduce latency.

Question 3 of 20

A healthcare company stores patient information that includes sensitive records in Amazon S3. They are subject to strict compliance regulations and need an automated way to classify their data at scale and be alerted of any potential exposure risks. Which service should they implement for continuous analysis of their stored content and to receive automated security alerts in case of unsecured sensitive data?

  • Use Amazon Cognito to manage patient identity verification and to secure sensitive records.

  • Configure AWS Secrets Manager for rotating credentials and alerting on data exposure.

  • Adopt Amazon Macie for content analysis and automated alerts on insecure data storage.

  • Implement Amazon GuardDuty for continuous threat detection and data classification in S3.

Question 4 of 20

An application is experiencing significant load on its database tier, particularly with read-heavy query operations that are impacting performance. Which service would best alleviate this issue by caching query results to enhance the performance and scalability of the application?

  • Amazon RDS Read Replicas

  • Amazon RDS Multi-AZ deployment

  • Amazon ElastiCache

  • Amazon Simple Storage Service (S3)

Question 5 of 20

A multinational corporation seeks to fortify the security of the top-level user credentials across its numerous cloud accounts, where each account functions under its own operational domain. They intend to put into effect a two-step verification process for all top-level user logins and establish an automatic mechanism for monitoring any top-level credential usage in API calls. Which service should they utilize to automate the monitoring of such activities throughout all operational domains?

  • AWS GuardDuty

  • AWS Config

  • AWS Identity and Access Management (IAM)

  • Amazon CloudTrail

Question 6 of 20

A company operates under a multi-account strategy where one account is managed by the security engineers and another is operated by a separate team responsible for network administration. The security team needs to allow the network administration team's account access to a specific Amazon S3 bucket without broadening the access to other accounts. Which of the following is the MOST secure way to grant the required access?

  • Edit the S3 bucket's Access Control List (ACL) to include the user identifiers from the team handling network administration.

  • Attach a resource-based policy directly to the S3 bucket identifying the network administration team's account as the principal with the specified permissions.

  • Implement a policy for individual users in the security engineers' account that grants permissions to the network administration team.

  • Set up a bucket policy that limits access to the S3 bucket based on the source IP range of the network administration team's office location.

Question 7 of 20

A SaaS provider currently runs its entire stack in the us-east-1 Region. Customers are located in North America, Europe, and Asia-Pacific. The product team adds two new requirements:

  1. Decrease round-trip latency for all users and maintain service availability if an AWS Region becomes unavailable.
  2. Comply with regional regulations that require all customer data created in the European Union (EU) to remain in EU infrastructure.

As the solutions architect, which approach best meets both requirements while minimizing ongoing operational overhead?

  • Deploy the application stack in eu-central-1 and ap-southeast-2 in addition to us-east-1. Use Amazon Route 53 latency-based routing with health checks to direct users to the nearest healthy Region. Store EU customer data only in eu-central-1 and disable cross-Region replication for those buckets and databases.

  • Retain a single-Region deployment in us-east-1 but add AWS Global Accelerator to improve network paths for TCP and UDP traffic worldwide.

  • Keep the workload in us-east-1 and place Amazon CloudFront in front of the application to cache static and dynamic content at global edge locations.

  • Move all compute instances into a cluster placement group in us-east-1 and purchase a 100 Gbps AWS Direct Connect to enhance throughput and latency for every user.

Question 8 of 20

An enterprise with distinct departments needs to ensure managed, independent access to their cloud resources within a shared environment. The configuration should enable department-specific resource management and enforce the least privilege access principle. As a solutions architect, which option would you recommend to achieve this goal?

  • Utilize a central governance mechanism to broadly restrict services accessible by each department without individualized access controls.

  • Implement role-switching for different teams to grant them temporary access to other departments' resources when required.

  • Set up groups corresponding to the enterprise's internal structure with attached permissions, ensuring each group's access is limited to resources necessary for their operations.

  • Create separate user accounts with individualized permissions tailored to each member's role in the enterprise to manage resource access manually.

Question 9 of 20

An e-commerce platform built with microservices experiences sudden traffic spikes during flash-sale campaigns. The order-ingestion service must hand off each order message for downstream processing with these requirements:

  • Every order message must be processed at least once; duplicate processing is acceptable.
  • Producers and consumers must scale independently to handle unpredictable surges without message loss.
  • The solution should minimize operational overhead and keep services loosely coupled.

Which AWS service best meets these requirements?

  • Amazon Simple Queue Service (SQS)

  • AWS Step Functions

  • Amazon EventBridge event bus

  • Amazon Kinesis Data Streams

Question 10 of 20

Which service should be utilized to manage user sign-up and sign-in functionalities, along with federated authentication, for a mobile application that requires integration with social login providers?

  • AWS Identity and Access Management (IAM)

  • Amazon Cognito

  • AWS Control Tower

  • Amazon GuardDuty

Question 11 of 20

Your company is deploying a web application on AWS using Amazon RDS for database storage, and the Security Officer is drafting a security strategy. What responsibility does AWS directly take care of as part of the shared responsibility model for Amazon RDS?

  • Managing user permissions within the database

  • Designing secure logical database schemas

  • Configuring database encryption at rest

  • Patching the underlying database software

Question 12 of 20

A company is decomposing a monolithic web application into microservices on AWS. The engineering team wants each new microservice to scale out easily when traffic spikes, without requiring complex session-handling logic. Which design approach BEST satisfies this requirement?

  • Write the microservice to read and write all application data to the local file system.

  • Enable sticky sessions on the Application Load Balancer so each user is routed to the same instance.

  • Design each microservice to be stateless and persist required data in a shared store such as Amazon DynamoDB.

  • Store user session data in the microservice's in-memory cache for fast access.

Question 13 of 20

An application running on Amazon EC2 instances needs to read log files that are stored only in the S3 bucket named app-logs. No other S3 actions or buckets are required.

Which IAM policy best implements the principle of least privilege for the application's IAM role?

  • Allow s3:GetObject and s3:PutObject on all S3 buckets in the account.

  • Attach the AWS managed policy AmazonS3ReadOnlyAccess to the role.

  • Allow s3:*" on the resource arn:aws:s3:::app-logs/*.

  • Allow the action s3:GetObject on the resource arn:aws:s3:::app-logs/*.

Question 14 of 20

A multinational enterprise has separate accounts for development and production environments to enhance security and operational efficiency. Developers need to access cloud resources in the production environment sporadically to perform troubleshooting. As a solutions architect, what approach would you suggest to facilitate these occasional access requirements while maintaining stringent security controls?

  • Provide distinct user credentials for each developer that grant access to the necessary services in the separate environment, with a scheduled monthly rotation policy.

  • Implement trust relationships between the organization's accounts using roles with permissions to access necessary services, allowing for temporary credential assumption through a trusted federation.

  • Adjust the policies attached to resources in the separate environment to directly authorize access for identities from the development environment.

  • Create identically named roles with necessary permissions in both the development and separate environment accounts.

Question 15 of 20

Your company plans to host a set of web applications in the AWS Cloud. Each application should be accessible over the internet but must be isolated from one another to prevent potential security issues. As the Solutions Architect, you need to design a strategy that enforces the isolation while allowing HTTPS traffic to each application. Which approach satisfies these requirements?

  • Create a VPC with multiple public subnets and deploy each application in a separate security group that allows inbound traffic only on TCP port 443.

  • Deploy all applications to a single EC2 instance and control access using the instance's security group to allow inbound traffic only on port 443.

  • Create a VPC with a single public subnet and apply a network ACL that allows inbound traffic on port 22 to ensure secure communication.

  • Configure a single public subnet within a VPC and associate all applications to one security group that allows all inbound traffic.

Question 16 of 20

An organization aims to maintain operational continuity of its critical workload even if an entire data center servicing their region encounters an outage. Their solution includes computing resources distributed across diverse physical locations within the same geographical area. To enhance the system's robustness, which strategy should be implemented for the data layer?

  • Install a globally distributed database with read replicas in various regions for geographical data distribution.

  • Introduce a Load Balancer to distribute traffic among database instances to minimize the impact of a location outage.

  • Implement a Multi-AZ configuration for the relational database to promote automatic failover and data redundancy.

  • Configure an active-passive setup using a secondary region and enact health checks to direct traffic upon failure.

Question 17 of 20

A company is deploying a three-tier web application consisting of a web server tier, application server tier, and a database tier. How should the organization restrict each tier to only the permissions necessary for their specific operations?

  • Distribute administrative credentials to instances in all tiers, ensuring they have sufficient permissions for any action they might need to perform.

  • Employ root user credentials for all instances to maintain simplicity in permissions management and ensure full access to resources.

  • Assign tailored IAM roles to each EC2 instance in the respective tiers with only the permissions necessary for their functions.

  • Remove all permissions from instances in each tier to maximize security and prevent potential security incidents.

Question 18 of 20

You have been tasked with designing a solution for your company that allows existing corporate network users to obtain temporary credentials to interact with console and programmatic interfaces, streamlining the sign-on process and avoiding separate user management. Which method would you employ to facilitate this?

  • Integrate the corporate directory with identity federation to assign permissions through temporary security credentials.

  • Distribute long-term security credentials to users for manual configuration of access to the necessary interfaces.

  • Implement a proprietary authentication solution specific to the company's internal systems for granting access.

  • Create individual IAM users corresponding to each member of the workforce and manage permissions directly.

Question 19 of 20

Your enterprise is scaling and plans to create separate environments for various departments. To ensure centralized management, consistent application of compliance requirements, and an automated setup process for these environments, which service should you leverage?

  • AWS Organizations

  • AWS Config

  • AWS Control Tower

  • Amazon Inspector

Question 20 of 20

Your client wishes to build a system where their web and mobile platforms can securely request information from a variety of upstream services. This system must support managing developer access, accommodate changes in the structure of requests, and offer mechanisms to limit the number of incoming requests per user. Which Amazon service should they implement to meet these requirements?

  • Amazon API Gateway

  • AWS Lambda

  • Amazon Simple Storage Service (S3)

  • AWS Step Functions

  • AWS Direct Connect

  • Amazon Cognito