AWS Certified Solutions Architect Associate Practice Test (SAA-C03)
Use the form below to configure your AWS Certified Solutions Architect Associate Practice Test (SAA-C03). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

AWS Certified Solutions Architect Associate SAA-C03 Information
AWS Certified Solutions Architect - Associate showcases knowledge and skills in AWS technology, across a wide range of AWS services. The focus of this certification is on the design of cost and performance optimized solutions, demonstrating a strong understanding of the AWS Well-Architected Framework. This certification can enhance the career profile and earnings of certified individuals and increase your credibility and confidence in stakeholder and customer interactions.
The AWS Certified Solutions Architect - Associate (SAA-C03) exam is intended for individuals who perform a solutions architect role. The exam validates a candidate’s ability to design solutions based on the AWS Well-Architected Framework.
The exam also validates a candidate’s ability to complete the following tasks:
- Design solutions that incorporate AWS services to meet current business requirements and future projected needs
- Design architectures that are secure, resilient, high-performing, and cost optimized
- Review existing solutions and determine improvements
Scroll down to see your responses and detailed results
Free AWS Certified Solutions Architect Associate SAA-C03 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Design Secure ArchitecturesDesign Resilient ArchitecturesDesign High-Performing ArchitecturesDesign Cost-Optimized Architectures
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Your client wants to improve the response time and reliability of their cloud-hosted service for customers spread worldwide. The existing setup consists of a centralized cloud deployment with a growing demand for adherence to regional data protection regulations. Which strategy should you employ as the architect to fulfill these performance and legal requirements?
Expand the deployment within the current data center location and utilize on-premises hardware to handle regional demands.
Consolidate resources into a single data center with an enhanced network connection to reduce service latency for all users regardless of their location.
Opt for a tightly-clustered infrastructure in the original data center to maximize throughput and processing power for the service.
Distribute resources across strategically located data centers and utilize DNS services featuring traffic routing based on the origin of requests to deliver optimal performance.
Answer Description
To achieve high availability and low latency for a service catering to a global audience, it is important to have a geographical spread in the deployments. Using geographical routing mechanisms also contributes to serving your customers from the nearest data center, hence improving latency. In contrast, single-region approaches with multi-site deployments or on-premises extensions do not provide the necessary global coverage. Moreover, leveraging placement strategies restricted to compute resources does not address geolocation-based routing or regional compliance concerns.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DNS and how does it help with traffic routing?
What are regional data protection regulations?
What are the benefits of a geographically distributed cloud deployment?
A multinational corporation seeks to fortify the security of the top-level user credentials across its numerous cloud accounts, where each account functions under its own operational domain. They intend to put into effect a two-step verification process for all top-level user logins and establish an automatic mechanism for monitoring any top-level credential usage in API calls. Which service should they utilize to automate the monitoring of such activities throughout all operational domains?
AWS GuardDuty
AWS Config
AWS Identity and Access Management (IAM)
Amazon CloudTrail
Answer Description
The service that enables logging of account actions and automatic detection of top-level user API activity is the correct answer, which is Amazon CloudTrail. It records events that are made within an account and can be set up to generate alerts when specific activities, including those by the top-level account user, are detected. The service known for configuration tracking is not suitable for monitoring account activities directly. The service responsible for identity management does not offer automated detection or alerting for specific user actions. The service focused on threat detection primarily monitors for unusual activity but is not specifically designed for tracking the usages of top-level user credentials.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Amazon CloudTrail and how does it work?
What are the differences between AWS Config and CloudTrail?
How does automated monitoring of API call activities enhance security?
An organization aims to maintain operational continuity of its critical workload even if an entire data center servicing their region encounters an outage. Their solution includes computing resources distributed across diverse physical locations within the same geographical area. To enhance the system's robustness, which strategy should be implemented for the data layer?
Configure an active-passive setup using a secondary region and enact health checks to direct traffic upon failure.
Install a globally distributed database with read replicas in various regions for geographical data distribution.
Introduce a Load Balancer to distribute traffic among database instances to minimize the impact of a location outage.
Implement a Multi-AZ configuration for the relational database to promote automatic failover and data redundancy.
Answer Description
The question asks what can you do to maintain operational continuity if one data center in a region has an outage. Keep in mind that with AWS, one region is made of many data centers groups into availability zones. Therefor, a multi-AZ setup would help mitigate and prevent outages during a data center outage.
Choosing a Multi-AZ deployment for an RDS instance provides high availability by automatically maintaining a synchronous standby replica in a different data center, or Availability Zone. In case of an infrastructure failure, the database will fail over to the standby so that database operations can resume quickly without manual intervention. This choice is the most aligned with the requirement for operational continuity within a single region in the face of a data center outage. The other answers either describe strategies that introduce geographical redundancy, which goes beyond the scope of the question, or load balancing, which does not address the need for automatic failover at the data layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Multi-AZ deployment in AWS RDS?
What are Availability Zones (AZs) in AWS?
How does automatic failover work in AWS RDS?
What does the principle of least privilege entail when assigning permissions to IAM users?
Granting full access to ensure uninterrupted resource availability
Using service-linked roles exclusively for all users
Enforcing regular password rotation
Providing only the permissions necessary to perform a task
Answer Description
The principle of least privilege dictates that IAM users should be given only the permissions that are absolutely necessary to perform their work. This minimizes the risk of accidental or deliberate misuse of permissions. Giving broad access increases security risks, while using service-linked roles presumes that an AWS service dictates permissions, rather than user-specific needs. Lastly, regular password rotation is a security practice, but it isn't directly associated with the principle discussed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are IAM users in AWS?
Why is the principle of least privilege important for security?
What are some examples of implementing least privilege in AWS?
A company operates under a multi-account strategy where one account is managed by the security engineers and another is operated by a separate team responsible for network administration. The security team needs to allow the network administration team's account access to a specific Amazon S3 bucket without broadening the access to other accounts. Which of the following is the MOST secure way to grant the required access?
Attach a resource-based policy directly to the S3 bucket identifying the network administration team's account as the principal with the specified permissions.
Set up a bucket policy that limits access to the S3 bucket based on the source IP range of the network administration team's office location.
Edit the S3 bucket's Access Control List (ACL) to include the user identifiers from the team handling network administration.
Implement a policy for individual users in the security engineers' account that grants permissions to the network administration team.
Answer Description
The most secure way to grant the network administration team's account access to a specific Amazon S3 bucket without broadening access to other accounts is by attaching a resource-based policy to the S3 bucket that explicitly specifies the network administration team's account as a principal with the necessary permissions. This method ensures that only the designated account has the required access to the S3 bucket. Using IAM user policies or modifying ACLs would not be sufficient because they do not provide a way to restrict access at the account level. Restricting access based on IP address may provide some network-level restriction but does not align with the requirement to limit access to only one specific account regardless of IP address and would not effectively control account-level access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a resource-based policy in AWS?
What are the differences between resource-based policies and IAM policies?
Why is using IAM user policies or modifying ACLs less secure than using a resource-based policy?
What is the purpose of using multiple Availability Zones for deploying applications on AWS?
To increase the overall performance of compute instances by equally distributing the workload.
To serve as a single point of contact and management for global resources in multiple regions.
To provide high availability and fault tolerance for applications by distributing resources within a region across physically separated data centers.
To cache static content closer to users and reduce latency.
Answer Description
Using multiple Availability Zones provides high availability and fault tolerance for applications by distributing resources within a region across physically separated data centers. This ensures that if one Availability Zone becomes unavailable or compromised, others can continue to operate, reducing the potential impact on the application's users. The incorrect answers mention increasing performance and reducing latency, which are benefits related to edge locations and caching respectively, rather than the primary purpose of Availability Zones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Availability Zones in AWS?
How does using multiple AZs affect application deployment?
What happens if an entire Availability Zone goes down?
You have been tasked with designing a solution for your company that allows existing corporate network users to obtain temporary credentials to interact with console and programmatic interfaces, streamlining the sign-on process and avoiding separate user management. Which method would you employ to facilitate this?
Distribute long-term security credentials to users for manual configuration of access to the necessary interfaces.
Create individual IAM users corresponding to each member of the workforce and manage permissions directly.
Implement a proprietary authentication solution specific to the company's internal systems for granting access.
Integrate the corporate directory with identity federation to assign permissions through temporary security credentials.
Answer Description
The process of federation involves the integration of an external directory service with IAM roles. By setting up federation, users authenticate with their local credentials on their existing directory system and then receive temporary security credentials to operate on the console or interact with services via APIs or CLI. This method honors the principle of least privilege and simplifies credential management while providing secure access. Manually creating IAM users is redundant and insecure for large enterprise environments. Assigning long-term credentials goes against security best practices, making them a poor choice. Lastly, developing a bespoke authentication portal partial to the corporation's internal system does not use AWS built-in mechanisms for secure access management and is less efficient and potentially less secure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is identity federation, and how does it work with AWS?
What are temporary security credentials, and why are they important?
What is the principle of least privilege, and how does it apply to AWS?
Your client wishes to build a system where their web and mobile platforms can securely request information from a variety of upstream services. This system must support managing developer access, accommodate changes in the structure of requests, and offer mechanisms to limit the number of incoming requests per user. Which Amazon service should they implement to meet these requirements?
Amazon Cognito
AWS Lambda
Amazon Simple Storage Service (S3)
AWS Step Functions
AWS Direct Connect
Amazon API Gateway
Answer Description
The correct answer is Amazon API Gateway because it securely manages API requests, supports developer access control, handles request transformations, and enforces rate limiting. It integrates with AWS services like Lambda and Cognito, making it ideal for managing web and mobile API traffic. The incorrect options lack full API management capabilities - AWS Direct Connect is for private networking, S3 is for storage, and Cognito only handles authentication. Step Functions is for workflow automation, and Lambda executes backend logic but lacks API request management. While some of these services complement API Gateway, none provide a complete solution on their own.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What functionalities does Amazon API Gateway offer for managing access?
How does API Gateway accommodate changes in the structure of requests?
What mechanisms does API Gateway provide to limit the number of incoming requests per user?
Your enterprise is scaling and plans to create separate environments for various departments. To ensure centralized management, consistent application of compliance requirements, and an automated setup process for these environments, which service should you leverage?
AWS Organizations
AWS Config
Amazon Inspector
AWS Control Tower
Answer Description
Using the selected service, enterprises can manage multiple environments by setting up a well-architected baseline, automating the provisioning of new environments, and uniformly applying policy controls across all environments for security and compliance. While the other options provide specific security features or advisory services, they do not offer the comprehensive solution needed for centralized governance and automated environment setup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is AWS Control Tower?
What are guardrails in AWS Control Tower?
How does AWS Control Tower differ from AWS Organizations?
A multinational enterprise has separate accounts for development and production environments to enhance security and operational efficiency. Developers need to access cloud resources in the production environment sporadically to perform troubleshooting. As a solutions architect, what approach would you suggest to facilitate these occasional access requirements while maintaining stringent security controls?
Provide distinct user credentials for each developer that grant access to the necessary services in the separate environment, with a scheduled monthly rotation policy.
Create identically named roles with necessary permissions in both the development and separate environment accounts.
Adjust the policies attached to resources in the separate environment to directly authorize access for identities from the development environment.
Implement trust relationships between the organization's accounts using roles with permissions to access necessary services, allowing for temporary credential assumption through a trusted federation.
Answer Description
The correct approach involves setting up trust relationships between accounts by creating roles that can be assumed as needed. The idea is to provide temporary credentials that can be used within certain security parameters defined by the role’s permission policy. This enables the enterprise to control access precisely without having to manage permanent credentials for each developer for each environment, adhering to the principle of least privilege. Generating dedicated user credentials or creating shared roles in both accounts doesn't follow the best practice of using temporary credentials for cross-account access and may not meet security and audit requirements. Enabling direct access by modifying resource policies could compromise security by making the role too permissive and is not aligned with recommended security practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are trust relationships in AWS?
What is the principle of least privilege?
What are temporary credentials in AWS and how do they work?
Stateless workloads in a microservices architecture enhance the system's ability to scale horizontally.
True
False
Answer Description
Stateless workloads do not store any state within the service instance and can be freely distributed across multiple computing resources, making the scaling process more straightforward and less prone to errors. This is because any instance of the service can handle any request without needing persistence or knowledge of previous interactions, unlike stateful workloads, which require some form of session management and data persistence that may limit scalability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a microservices architecture?
What does it mean for a workload to be stateless?
How does horizontal scaling work in a microservices architecture?
A company is deploying a three-tier web application consisting of a web server tier, application server tier, and a database tier. How should the organization restrict each tier to only the permissions necessary for their specific operations?
Employ root user credentials for all instances to maintain simplicity in permissions management and ensure full access to resources.
Distribute administrative credentials to instances in all tiers, ensuring they have sufficient permissions for any action they might need to perform.
Remove all permissions from instances in each tier to maximize security and prevent potential security incidents.
Assign tailored IAM roles to each EC2 instance in the respective tiers with only the permissions necessary for their functions.
Answer Description
Implementing fine-grained access controls by assigning tailored IAM roles to each tier's respective EC2 instances ensures that each tier operates with only the permissions necessary for its duties. This strict adherence to the principle of least privilege prevents excessive permissions that could be exploited in case of a security breach. Providing overarching administrative credentials to all tiers, using root account access, or stripping all permissions contradict the security best practice of granting least privilege to perform required functions and are, therefore, incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are IAM roles and how do they work in AWS?
What is the principle of least privilege?
What does it mean to employ fine-grained access controls?
Your company is deploying a web application on AWS using Amazon RDS for database storage, and the Security Officer is drafting a security strategy. What responsibility does AWS directly take care of as part of the shared responsibility model for Amazon RDS?
Managing user permissions within the database
Designing secure logical database schemas
Configuring database encryption at rest
Patching the underlying database software
Answer Description
AWS is responsible for protecting the infrastructure that runs AWS services, which includes the physical security of data centers, network infrastructure, and managed service patching, like Amazon RDS. Customers are responsible for managing the security inside the database, such as the data itself, controlling who can access the data, and using encryption to protect the data. While AWS will patch database engines, the logical database schema is within the customer's control, thus the correct answer is 'Patching the underlying database software'.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the shared responsibility model in AWS?
What does managing user permissions within a database involve?
Why is patching the underlying database software important?
An enterprise with distinct departments needs to ensure managed, independent access to their cloud resources within a shared environment. The configuration should enable department-specific resource management and enforce the least privilege access principle. As a solutions architect, which option would you recommend to achieve this goal?
Create separate user accounts with individualized permissions tailored to each member's role in the enterprise to manage resource access manually.
Set up groups corresponding to the enterprise's internal structure with attached permissions, ensuring each group's access is limited to resources necessary for their operations.
Utilize a central governance mechanism to broadly restrict services accessible by each department without individualized access controls.
Implement role-switching for different teams to grant them temporary access to other departments' resources when required.
Answer Description
Establishing groups for each department and assigning the corresponding policies necessary for their access needs would offer the best solution. This strategy enables clear role definition and privilege segregation. Users are allocated to their respective groups, simplifying the administration and modification of permissions in adherence to their roles. The incorrect choices involve strategies that either increase management complexity without providing additional value, mismatch the scenario's requirements, or fail to offer the precise control needed for departmental resource access within a common environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'least privilege access principle' mean?
How do AWS Identity and Access Management (IAM) groups work?
What are the benefits of using IAM roles instead of individual user permissions?
The root user of an AWS account is the only user that can enable MFA on their own account.
True
False
Answer Description
MFA can be enabled by the root user or an IAM user with the necessary permissions. While the root user has full access to all resources and settings by default, including MFA settings, IAM users must be granted permissions explicitly through IAM policies to manage MFA devices. Therefore, it's not accurate that the root user is the only one who can enable MFA; IAM users can also do so if properly authorized.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is IAM in AWS?
What is MFA and why is it important?
How do IAM policies work?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.