- Basic IT knowledge is recommended
- Better to take some course preferably free AWS course
- A free-tier AWS account is recommended to follow along with the practice labs
- Hands-on experience using compute, networking, storage, and database AWS services
- Hands-on experience with AWS deployment and management services
- Ability to identify and define technical requirements for an AWS-based application
- Response Types
There are two types of questions on the examination:
– Multiple choice: Has one correct response and three incorrect responses.
– Multiple responses: Has two correct responses out of five response options.
- Effectively demonstrate knowledge of how to architect and deploy secure and robust applications on AWS technologies
- Define a solution using architectural design principles based on customer requirements
- Provide implementation guidance based on best practices to the organization throughout the life cycle of the project
A product team is creating a new application that will store a large amount of data. The data will be
analyzed hourly and modified by multiple Amazon EC2 Linux instances. The application team
believes the amount of space needed will continue to grow for the next 6 months.
Which set of actions should a solutions architect take to support these needs?
A. Store the data in an Amazon EBS volume. Mount the EBS volume on the application instances.
B. Store the data in an Amazon EFS file system. Mount the file system on the application instances.
C. Store the data in Amazon S3 Glacier. Update the vault policy to allow access to the application
D. Store the data in Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Update the bucket
policy to allow access to the application instances.
Two Auto Scaling applications, Application A and Application B, currently run within a shared
set of subnets.
A Solutions Architect wants to make sure that Application A can make requests to Application B, but
Application B should be denied from making requests to Application A.
Which is the SIMPLEST solution to achieve this policy?
A. Migrating the applications to separate subnets from each other
B. Using security groups that reference the application server’s IP addresses
C. Using Network Access Control Lists to allow/deny traffic based on application IP addresses
D. Using security groups that reference the security groups of the other application