Exam Details

  • Exam Code
    :SAA-C03
  • Exam Name
    :AWS Certified Solutions Architect - Associate (SAA-C03)
  • Certification
    :Amazon Certifications
  • Vendor
    :Amazon
  • Total Questions
    :1304 Q&As
  • Last Updated
    :Jun 07, 2025

Amazon Amazon Certifications SAA-C03 Questions & Answers

  • Question 431:

    A company uses an on-premises network-attached storage (NAS) system to provide file shares to its high performance computing (HPC) workloads. The company wants to migrate its latency-sensitive HPC workloads and its storage to the AWS Cloud. The company must be able to provide NFS and SMB multi- protocol access from the file system.

    Which solution will meet these requirements with the LEAST latency? (Choose two.)

    A. Deploy compute optimized EC2 instances into a cluster placement group.

    B. Deploy compute optimized EC2 instances into a partition placement group.

    C. Attach the EC2 instances to an Amazon FSx for Lustre file system.

    D. Attach the EC2 instances to an Amazon FSx for OpenZFS file system.

    E. Attach the EC2 instances to an Amazon FSx for NetApp ONTAP file system.

  • Question 432:

    A company has multiple AWS accounts in an organization in AWS Organizations that different business units use. The company has multiple offices around the world. The company needs to update security group rules to allow new office CIDR ranges or to remove old CIDR ranges across the organization. The company wants to centralize the management of security group rules to minimize the administrative overhead that updating CIDR ranges requires.

    Which solution will meet these requirements MOST cost-effectively?

    A. Create VPC security groups in the organization's management account. Update the security groups when a CIDR range update is necessary.

    B. Create a VPC customer managed prefix list that contains the list of CIDRs. Use AWS Resource Access Manager (AWS RAM) to share the prefix list across the organization. Use the prefix list in the security groups across the organization.

    C. Create an AWS managed prefix list. Use an AWS Security Hub policy to enforce the security group update across the organization. Use an AWS Lambda function to update the prefix list automatically when the CIDR ranges change.

    D. Create security groups in a central administrative AWS account. Create an AWS Firewall Manager common security group policy for the whole organization. Select the previously created security groups as primary groups in the policy.

  • Question 433:

    A company runs a website that stores images of historical events. Website users need the ability to search and view images based on the year that the event in the image occurred. On average, users request each image only once or twice a year. The company wants a highly available solution to store and deliver the images to users.

    Which solution will meet these requirements MOST cost-effectively?

    A. Store images in Amazon Elastic Block Store (Amazon EBS). Use a web server that runs on Amazon EC2.

    B. Store images in Amazon Elastic File System (Amazon EFS). Use a web server that runs on Amazon EC2.

    C. Store images in Amazon S3 Standard. Use S3 Standard to directly deliver images by using a static website.

    D. Store images in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Use S3 Standard-IA to directly deliver images by using a static website.

  • Question 434:

    A company is planning to run a group of Amazon EC2 instances that connect to an Amazon Aurora database. The company has built an AWS CloudFormation template to deploy the EC2 instances and the Aurora DB cluster. The company wants to allow the instances to authenticate to the database in a secure way. The company does not want to maintain static database credentials.

    Which solution meets these requirements with the LEAST operational effort?

    A. Create a database user with a user name and password. Add parameters for the database user name and password to the CloudFormation template. Pass the parameters to the EC2 instances when the instances are launched.

    B. Create a database user with a user name and password. Store the user name and password in AWS Systems Manager Parameter Store. Configure the EC2 instances to retrieve the database credentials from Parameter Store.

    C. Configure the DB cluster to use IAM database authentication. Create a database user to use with IAM authentication. Associate a role with the EC2 instances to allow applications on the instances to access the database.

    D. Configure the DB cluster to use IAM database authentication with an IAM user. Create a database user that has a name that matches the IAM user. Associate the IAM user with the EC2 instances to allow applications on the instances to access the database.

  • Question 435:

    A company collects and shares research data with the company's employees all over the world. The company wants to collect and store the data in an Amazon S3 bucket and process the data in the AWS Cloud. The company will share the

    data with the company's employees. The company needs a secure solution in the AWS Cloud that minimizes operational overhead.

    Which solution will meet these requirements?

    A. Use an AWS Lambda function to create an S3 presigned URL. Instruct employees to use the URL.

    B. Create an IAM user for each employee. Create an IAM policy for each employee to allow S3 access. Instruct employees to use the AWS Management Console.

    C. Create an S3 File Gateway. Create a share for uploading and a share for downloading. Allow employees to mount shares on their local computers to use S3 File Gateway.

    D. Configure AWS Transfer Family SFTP endpoints. Select the custom identity provider options. Use AWS Secrets Manager to manage the user credentials Instruct employees to use Transfer Family.

  • Question 436:

    A company has an application workflow that uses an AWS Lambda function to download and decrypt files from Amazon S3. These files are encrypted using AWS Key Management Service (AWS KMS) keys. A solutions architect needs to design a solution that will ensure the required permissions are set correctly. Which combination of actions accomplish this? (Choose two.)

    A. Attach the kms:decrypt permission to the Lambda function's resource policy

    B. Grant the decrypt permission for the Lambda IAM role in the KMS key's policy

    C. Grant the decrypt permission for the Lambda resource policy in the KMS key's policy.

    D. Create a new IAM policy with the kms:decrypt permission and attach the policy to the Lambda function.

    E. Create a new IAM role with the kms:decrypt permission and attach the execution role to the Lambda function.

  • Question 437:

    A company is building a new furniture inventory application. The company has deployed the application on a fleet ofAmazon EC2 instances across multiple Availability Zones. The EC2 instances run behind an Application Load Balancer (ALB) in their VPC. A solutions architect has observed that incoming traffic seems to favor one EC2 instance, resulting in latency for some requests. What should the solutions architect do to resolve this issue?

    A. Disable session affinity (sticky sessions) on the ALB

    B. Replace the ALB with a Network Load Balancer

    C. Increase the number of EC2 instances in each Availability Zone

    D. Adjust the frequency of the health checks on the ALB's target group

  • Question 438:

    A company is required to use cryptographic keys in its on-premises key manager. The key manager is outside of the AWS Cloud because of regulatory and compliance requirements. The company wants to manage encryption and decryption by using cryptographic keys that are retained outside of the AWS Cloud and that support a variety of external key managers from different vendors. Which solution will meet these requirements with the LEAST operational overhead?

    A. Use AWS CloudHSM key store backed by a CloudHSM cluster.

    B. Use an AWS Key Management Service (AWS KMS) external key store backed by an external key manager.

    C. Use the default AWS Key Management Service (AWS KMS) managed key store.

    D. Use a custom key store backed by an AWS CloudHSM cluster.

  • Question 439:

    An international company has a subdomain for each country that the company operates in. The subdomains are formatted as example.com, country1.example.com, and country2.example.com. The company's workloads are behind an

    Application Load Balancer. The company wants to encrypt the website data that is in transit.

    Which combination of steps will meet these requirements? (Choose two.)

    A. Use the AWS Certificate Manager (ACM) console to request a public certificate for the apex top domain example com and a wildcard certificate for *.example.com.

    B. Use the AWS Certificate Manager (ACM) console to request a private certificate for the apex top domain example.com and a wildcard certificate for *.example.com.

    C. Use the AWS Certificate Manager (ACM) console to request a public and private certificate for the apex top domain example.com.

    D. Validate domain ownership by email address. Switch to DNS validation by adding the required DNS records to the DNS provider.

    E. Validate domain ownership for the domain by adding the required DNS records to the DNS provider.

  • Question 440:

    A company runs several websites on AWS for its different brands. Each website generates tens of gigabytes of web traffic logs each day. A solutions architect needs to design a scalable solution to give the company's developers the ability to

    analyze traffic patterns across all the company's websites. This analysis by the developers will occur on demand once a week over the course of several months. The solution must support queries with standard SQL.

    Which solution will meet these requirements MOST cost-effectively?

    A. Store the logs in Amazon S3. Use Amazon Athena tor analysis.

    B. Store the logs in Amazon RDS. Use a database client for analysis.

    C. Store the logs in Amazon OpenSearch Service. Use OpenSearch Service for analysis.

    D. Store the logs in an Amazon EMR cluster Use a supported open-source framework for SQL-based analysis.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Amazon exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SAA-C03 exam preparations and Amazon certification application, do not hesitate to visit our Vcedump.com to find your solutions here.