00:15:00

AWS Certified Solutions Architect Associate Practice Test (SAA-C03)

Use the form below to configure your AWS Certified Solutions Architect Associate Practice Test (SAA-C03). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for AWS Certified Solutions Architect Associate SAA-C03
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

AWS Certified Solutions Architect Associate SAA-C03 Information

AWS Certified Solutions Architect - Associate showcases knowledge and skills in AWS technology, across a wide range of AWS services. The focus of this certification is on the design of cost and performance optimized solutions, demonstrating a strong understanding of the AWS Well-Architected Framework. This certification can enhance the career profile and earnings of certified individuals and increase your credibility and confidence in stakeholder and customer interactions.

The AWS Certified Solutions Architect - Associate (SAA-C03) exam is intended for individuals who perform a solutions architect role. The exam validates a candidate’s ability to design solutions based on the AWS Well-Architected Framework.

The exam also validates a candidate’s ability to complete the following tasks:

  • Design solutions that incorporate AWS services to meet current business requirements and future projected needs
  • Design architectures that are secure, resilient, high-performing, and cost optimized
  • Review existing solutions and determine improvements

Free AWS Certified Solutions Architect Associate SAA-C03 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Design Secure Architectures
    Design Resilient Architectures
    Design High-Performing Architectures
    Design Cost-Optimized Architectures

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 15

A multinational corporation seeks to fortify the security of the top-level user credentials across its numerous cloud accounts, where each account functions under its own operational domain. They intend to put into effect a two-step verification process for all top-level user logins and establish an automatic mechanism for monitoring any top-level credential usage in API calls. Which service should they utilize to automate the monitoring of such activities throughout all operational domains?

  • Amazon CloudTrail

  • AWS Config

  • AWS GuardDuty

  • AWS Identity and Access Management (IAM)

Question 2 of 15

A company operates under a multi-account strategy where one account is managed by the security engineers and another is operated by a separate team responsible for network administration. The security team needs to allow the network administration team's account access to a specific Amazon S3 bucket without broadening the access to other accounts. Which of the following is the MOST secure way to grant the required access?

  • Edit the S3 bucket's Access Control List (ACL) to include the user identifiers from the team handling network administration.

  • Implement a policy for individual users in the security engineers' account that grants permissions to the network administration team.

  • Attach a resource-based policy directly to the S3 bucket identifying the network administration team's account as the principal with the specified permissions.

  • Set up a bucket policy that limits access to the S3 bucket based on the source IP range of the network administration team's office location.

Question 3 of 15

An enterprise with distinct departments needs to ensure managed, independent access to their cloud resources within a shared environment. The configuration should enable department-specific resource management and enforce the least privilege access principle. As a solutions architect, which option would you recommend to achieve this goal?

  • Set up groups corresponding to the enterprise's internal structure with attached permissions, ensuring each group's access is limited to resources necessary for their operations.

  • Utilize a central governance mechanism to broadly restrict services accessible by each department without individualized access controls.

  • Create separate user accounts with individualized permissions tailored to each member's role in the enterprise to manage resource access manually.

  • Implement role-switching for different teams to grant them temporary access to other departments' resources when required.

Question 4 of 15

What is the purpose of using multiple Availability Zones for deploying applications on AWS?

  • To serve as a single point of contact and management for global resources in multiple regions.

  • To increase the overall performance of compute instances by equally distributing the workload.

  • To cache static content closer to users and reduce latency.

  • To provide high availability and fault tolerance for applications by distributing resources within a region across physically separated data centers.

Question 5 of 15

Your client wishes to build a system where their web and mobile platforms can securely request information from a variety of upstream services. This system must support managing developer access, accommodate changes in the structure of requests, and offer mechanisms to limit the number of incoming requests per user. Which Amazon service should they implement to meet these requirements?

  • Amazon Cognito

  • AWS Step Functions

  • Amazon API Gateway

  • AWS Direct Connect

  • Amazon Simple Storage Service (S3)

  • AWS Lambda

Question 6 of 15

Your enterprise is scaling and plans to create separate environments for various departments. To ensure centralized management, consistent application of compliance requirements, and an automated setup process for these environments, which service should you leverage?

  • AWS Config

  • AWS Control Tower

  • AWS Organizations

  • Amazon Inspector

Question 7 of 15

A company is deploying a three-tier web application consisting of a web server tier, application server tier, and a database tier. How should the organization restrict each tier to only the permissions necessary for their specific operations?

  • Employ root user credentials for all instances to maintain simplicity in permissions management and ensure full access to resources.

  • Remove all permissions from instances in each tier to maximize security and prevent potential security incidents.

  • Distribute administrative credentials to instances in all tiers, ensuring they have sufficient permissions for any action they might need to perform.

  • Assign tailored IAM roles to each EC2 instance in the respective tiers with only the permissions necessary for their functions.

Question 8 of 15

A company is decomposing a monolithic web application into microservices on AWS. The engineering team wants each new microservice to scale out easily when traffic spikes, without requiring complex session-handling logic. Which design approach BEST satisfies this requirement?

  • Write the microservice to read and write all application data to the local file system.

  • Enable sticky sessions on the Application Load Balancer so each user is routed to the same instance.

  • Design each microservice to be stateless and persist required data in a shared store such as Amazon DynamoDB.

  • Store user session data in the microservice's in-memory cache for fast access.

Question 9 of 15

You have been tasked with designing a solution for your company that allows existing corporate network users to obtain temporary credentials to interact with console and programmatic interfaces, streamlining the sign-on process and avoiding separate user management. Which method would you employ to facilitate this?

  • Implement a proprietary authentication solution specific to the company's internal systems for granting access.

  • Create individual IAM users corresponding to each member of the workforce and manage permissions directly.

  • Integrate the corporate directory with identity federation to assign permissions through temporary security credentials.

  • Distribute long-term security credentials to users for manual configuration of access to the necessary interfaces.

Question 10 of 15

An organization aims to maintain operational continuity of its critical workload even if an entire data center servicing their region encounters an outage. Their solution includes computing resources distributed across diverse physical locations within the same geographical area. To enhance the system's robustness, which strategy should be implemented for the data layer?

  • Implement a Multi-AZ configuration for the relational database to promote automatic failover and data redundancy.

  • Install a globally distributed database with read replicas in various regions for geographical data distribution.

  • Configure an active-passive setup using a secondary region and enact health checks to direct traffic upon failure.

  • Introduce a Load Balancer to distribute traffic among database instances to minimize the impact of a location outage.

Question 11 of 15

An application running on Amazon EC2 instances needs to read log files that are stored only in the S3 bucket named app-logs. No other S3 actions or buckets are required.

Which IAM policy best implements the principle of least privilege for the application's IAM role?

  • Attach the AWS managed policy AmazonS3ReadOnlyAccess to the role.

  • Allow s3:GetObject and s3:PutObject on all S3 buckets in the account.

  • Allow the action s3:GetObject on the resource arn:aws:s3:::app-logs/*.

  • Allow s3:*" on the resource arn:aws:s3:::app-logs/*.

Question 12 of 15

A SaaS provider currently runs its entire stack in the us-east-1 Region. Customers are located in North America, Europe, and Asia-Pacific. The product team adds two new requirements:

  1. Decrease round-trip latency for all users and maintain service availability if an AWS Region becomes unavailable.
  2. Comply with regional regulations that require all customer data created in the European Union (EU) to remain in EU infrastructure.

As the solutions architect, which approach best meets both requirements while minimizing ongoing operational overhead?

  • Keep the workload in us-east-1 and place Amazon CloudFront in front of the application to cache static and dynamic content at global edge locations.

  • Retain a single-Region deployment in us-east-1 but add AWS Global Accelerator to improve network paths for TCP and UDP traffic worldwide.

  • Deploy the application stack in eu-central-1 and ap-southeast-2 in addition to us-east-1. Use Amazon Route 53 latency-based routing with health checks to direct users to the nearest healthy Region. Store EU customer data only in eu-central-1 and disable cross-Region replication for those buckets and databases.

  • Move all compute instances into a cluster placement group in us-east-1 and purchase a 100 Gbps AWS Direct Connect to enhance throughput and latency for every user.

Question 13 of 15

Your company is deploying a web application on AWS using Amazon RDS for database storage, and the Security Officer is drafting a security strategy. What responsibility does AWS directly take care of as part of the shared responsibility model for Amazon RDS?

  • Configuring database encryption at rest

  • Patching the underlying database software

  • Managing user permissions within the database

  • Designing secure logical database schemas

Question 14 of 15

A multinational enterprise has separate accounts for development and production environments to enhance security and operational efficiency. Developers need to access cloud resources in the production environment sporadically to perform troubleshooting. As a solutions architect, what approach would you suggest to facilitate these occasional access requirements while maintaining stringent security controls?

  • Implement trust relationships between the organization's accounts using roles with permissions to access necessary services, allowing for temporary credential assumption through a trusted federation.

  • Create identically named roles with necessary permissions in both the development and separate environment accounts.

  • Adjust the policies attached to resources in the separate environment to directly authorize access for identities from the development environment.

  • Provide distinct user credentials for each developer that grant access to the necessary services in the separate environment, with a scheduled monthly rotation policy.

Question 15 of 15

Which of the following statements about enabling multi-factor authentication (MFA) in AWS is correct?

Select ONE answer.

  • MFA can only be enabled through the AWS CLI; the AWS Management Console does not support enabling MFA devices.

  • An IAM user can enable an MFA device for their own user if their IAM policy permits the required actions.

  • Only the AWS account root user can enable MFA, and IAM users cannot enable it even if granted permissions.

  • MFA can be enabled for an IAM role in the same way that it is enabled for a user.