Amazon SAA-C03 Exam Questions
AWS Certified Solutions Architect - Associate SAA-C03 (Page 7 )

Updated On: 18-Mar-2026

A company needs to review its AWS Cloud deployment to ensure that its Amazon S3 buckets do not have unauthorized configuration changes.
What should a solutions architect do to accomplish this goal?

  1. Turn on AWS Config with the appropriate rules.
  2. Turn on AWS Trusted Advisor with the appropriate checks.
  3. Turn on Amazon Inspector with the appropriate assessment template.
  4. Turn on Amazon S3 server access logging. Configure Amazon EventBridge (Amazon Cloud Watch Events).

Answer(s): A

Explanation:

A) AWS Config with the appropriate rules ensures continuous evaluation of S3 bucket configurations and can flag unauthorized changes via managed or custom rules.
B) Trusted Advisor checks are best-effort and not continuous policy-compliance monitoring for specific resource configurations, though they cover best practices at a high level.
C) Amazon Inspector focuses on security vulnerabilities and exposures of EC2 instances, not S3 configuration drift.
D) Server access logging and EventBridge provide access trails and event routing, not continuous configuration-compliance monitoring for drift.



A company is launching a new application and will display application metrics on an Amazon CloudWatch dashboard. The company's product manager needs to access this dashboard periodically. The product manager does not have an AWS account. A solutions architect must provide access to the product manager by following the principle of least privilege.
Which solution will meet these requirements?

  1. Share the dashboard from the CloudWatch console. Enter the product manager's email address, and complete the sharing steps. Provide a shareable link for the dashboard to the product manager.
  2. Create an IAM user specifically for the product manager. Attach the CloudWatchReadOnlyAccess AWS managed policy to the user. Share the new login credentials with the product manager. Share the browser URL of the correct dashboard with the product manager.
  3. Create an IAM user for the company's employees. Attach the ViewOnlyAccess AWS managed policy to the IAM user. Share the new login credentials with the product manager. Ask the product manager to navigate to the CloudWatch console and locate the dashboard by name in the Dashboards section.
  4. Deploy a bastion server in a public subnet. When the product manager requires access to the dashboard, start the server and share the RDP credentials. On the bastion server, ensure that the browser is configured to open the dashboard URL with cached AWS credentials that have appropriate permissions to view the dashboard.

Answer(s): A

Explanation:

A) The correct approach is to share the CloudWatch dashboard directly with the external user using the built-in sharing feature, which allows access without provisioning an AWS account and adheres to least privilege by sharing only the specific dashboard link with view permissions.
B) Creates an IAM user and distributes credentials; external user would have long-term access keys and full dashboard access beyond need, violating least privilege and requiring credential management.
C) Requires an IAM user and credential sharing; product manager without account gains access if given credentials, and navigation may expose more than intended; not ideal for external users.
D) Involves operational overhead and potential security risks by exposing a bastion with cached credentials; not least-privilege or scalable for external access.



A company is migrating applications to AWS. The applications are deployed in different accounts. The company manages the accounts centrally by using AWS Organizations. The company's security team needs a single sign-on (SSO) solution across all the company's accounts. The company must continue managing the users and groups in its on-premises self-managed Microsoft Active Directory.
Which solution will meet these requirements?

  1. Enable AWS Single Sign-On (AWS SSO) from the AWS SSO console. Create a one-way forest trust or a one-way domain trust to connect the company's self-managed Microsoft Active Directory with AWS SSO by using AWS Directory Service for Microsoft Active Directory.
  2. Enable AWS Single Sign-On (AWS SSO) from the AWS SSO console. Create a two-way forest trust to connect the company's self-managed Microsoft Active Directory with AWS SSO by using AWS Directory Service for Microsoft Active Directory.
  3. Use AWS Directory Service. Create a two-way trust relationship with the company's self-managed Microsoft Active Directory.
  4. Deploy an identity provider (IdP) on premises. Enable AWS Single Sign-On (AWS SSO) from the AWS SSO console.

Answer(s): B

Explanation:

AWS SSO with a two-way forest trust to AWS Managed Microsoft AD satisfies centralized on-prem AD management and SSO across multiple accounts via Organizations.
A) One-way forest trust is insufficient for bidirectional attribute/group synchronization and for seamless SSO across AWS accounts.
B) Correct: two-way forest trust with AWS Managed Microsoft AD enables full AD trust, group/OU mapping, and centralized user management while SSO across accounts.
C) AWS Directory Service with a two-way trust is not the recommended SSO path across multiple AWS accounts; AWS SSO provides the centralized SSO and account access control integration.
D) On-prem IdP with AWS SSO generally implies SSO via external IdP; using AWS Directory Service/Managed AD is the standard approach for centralized AD-managed users.



A company provides a Voice over Internet Protocol (VoIP) service that uses UDP connections. The service consists of Amazon EC2 instances that run in an Auto Scaling group. The company has deployments across multiple AWS Regions.
The company needs to route users to the Region with the lowest latency. The company also needs automated failover between Regions.
Which solution will meet these requirements?

  1. Deploy a Network Load Balancer (NLB) and an associated target group. Associate the target group with the Auto Scaling group. Use the NLB as an AWS Global Accelerator endpoint in each Region.
  2. Deploy an Application Load Balancer (ALB) and an associated target group. Associate the target group with the Auto Scaling group. Use the ALB as an AWS Global Accelerator endpoint in each Region.
  3. Deploy a Network Load Balancer (NLB) and an associated target group. Associate the target group with the Auto Scaling group. Create an Amazon Route 53 latency record that points to aliases for each NLB. Create an Amazon CloudFront distribution that uses the latency record as an origin.
  4. Deploy an Application Load Balancer (ALB) and an associated target group. Associate the target group with the Auto Scaling group. Create an Amazon Route 53 weighted record that points to aliases for each ALB. Deploy an Amazon CloudFront distribution that uses the weighted record as an origin.

Answer(s): A

Explanation:

The correct option is A because Global Accelerator provides static IP addresses and routes users to the Region with the lowest latency, with automated regional failover for multi-region deployments. NLB in each Region handles UDP traffic efficiently, aligning with VoIP requirements.
B is incorrect because ALB supports HTTP/HTTPS, not UDP, making it unsuitable for VoIP UDP traffic, and AWS Global Accelerator works with endpoints but ALB + UDP isn’t ideal for this use case.
C is incorrect because latency-based Route 53 records with per-Region NLBs plus CloudFront add complexity; Global Accelerator offers faster failover and static anycast IPs without CloudFront in this scenario.
D is incorrect because ALB cannot handle UDP, and CloudFront is not needed when Global Accelerator provides optimized global routing and failover for UDP traffic.



A development team runs monthly resource-intensive tests on its general purpose Amazon RDS for MySQL DB instance with Performance Insights enabled. The testing lasts for 48 hours once a month and is the only process that uses the database. The team wants to reduce the cost of running the tests without reducing the compute and memory attributes of the DB instance.
Which solution meets these requirements MOST cost-effectively?

  1. Stop the DB instance when tests are completed. Restart the DB instance when required.
  2. Use an Auto Scaling policy with the DB instance to automatically scale when tests are completed.
  3. Create a snapshot when tests are completed. Terminate the DB instance and restore the snapshot when required.
  4. Modify the DB instance to a low-capacity instance when tests are completed. Modify the DB instance again when required.

Answer(s): C

Explanation:

The correct answer is C. Creating a snapshot and terminating the DB instance reduces ongoing compute and storage costs during the 28 days when tests aren’t running, while preserving the exact state to restore on demand without changing instance type or paying for idle capacity.
A is incorrect because stopping a MySQL RDS instance incurs a brief downtime to restart and does not preserve data beyond the snapshot’s point-in-time; it also may still incur some storage costs. B is incorrect because RDS Auto Scaling for a single DB instance isn’t supported to scale compute during test windows. D is incorrect because changing instance class incurs time and potential maintenance impact; it’s less cost-effective than snapshot-terminate-restore.



Viewing page 7 of 205
Viewing questions 31 - 35 out of 824 questions



Post your Comments and Discuss Amazon SAA-C03 exam dumps with other Community members:

SAA-C03 Exam Discussions & Posts

AI Tutor 👋 I’m here to help!