Overview
Exam domain weights
Domain 3 (Secure Architectures) has the highest weight at 30%. IAM policies, encryption at rest and in transit, and VPC security are the most-tested topics within that domain.
Most-tested services by frequency
The Well-Architected Framework — 6 Pillars
Operational Excellence
- Automate operations with code
- Annotate documentation
- Make frequent, small, reversible changes
- Refine operations procedures frequently
- Anticipate failure; learn from all operational events
Security
- Implement a strong identity foundation (IAM)
- Enable traceability (CloudTrail, Config)
- Apply security at all layers
- Automate security best practices
- Protect data in transit and at rest (KMS, TLS)
Reliability
- Automatically recover from failure
- Test recovery procedures
- Scale horizontally to increase availability
- Stop guessing capacity (Auto Scaling)
- Manage change through automation
Performance Efficiency
- Democratize advanced technologies
- Go global in minutes
- Use serverless architectures
- Experiment more often
- Consider mechanical sympathy
Cost Optimization
- Implement cloud financial management
- Adopt a consumption model (pay-as-you-go)
- Measure overall efficiency
- Stop spending on undifferentiated heavy lifting
- Analyse and attribute expenditure
Sustainability
- Understand your impact
- Establish sustainability goals
- Maximize utilization
- Anticipate and adopt more efficient offerings
- Reduce downstream impact
Compute
EC2 — instance types and purchasing options
| Instance family | Optimized for | Use case |
|---|---|---|
t3 / t4g General | Burstable CPU credits | Dev/test, low-traffic web servers |
m6i / m7g General | Balanced CPU + memory | Application servers, mid-size databases |
c6i / c7g Compute | High vCPU-to-memory ratio | Batch, media encoding, HPC, gaming |
r6i / r7g Memory | High memory-to-vCPU ratio | In-memory caches, SAP, real-time analytics |
p4 / g5 Accelerated | GPU | ML training/inference, graphics rendering |
i4i / d3 Storage | High local NVMe IOPS | NoSQL, data warehousing, Hadoop |
| Purchasing option | Discount vs On-Demand | Commitment | Best for |
|---|---|---|---|
| On-Demand | — | None | Short-term, unpredictable workloads |
| Reserved (Standard) | Up to 72% | 1 or 3 years | Steady-state production workloads |
| Reserved (Convertible) | Up to 66% | 1 or 3 years | Long-term but instance type may change |
| Savings Plans (Compute) | Up to 66% | 1 or 3 years | Flexible — works across EC2, Lambda, Fargate |
| Spot Instances | Up to 90% | None (can be interrupted) | Fault-tolerant batch, CI/CD, stateless |
| Dedicated Hosts | Varies | On-Demand or Reserved | Compliance, BYOL software licensing |
The exam heavily tests Spot Instances — key rule: Spot is appropriate only when the workload can tolerate interruption (batch jobs, data processing). Never use Spot for databases or stateful applications without a recovery strategy.
Auto Scaling Groups — key concepts
| Concept | Detail |
|---|---|
| Launch Template | Defines AMI, instance type, key pair, security groups, user data. Preferred over launch configurations (which are legacy). |
| Scaling policies | Target Tracking — maintain a metric (e.g. CPU at 50%). Step Scaling — add N instances when alarm breaches threshold. Simple Scaling — single step, with cooldown. |
| Cooldown period | Default 300s after scale-out/in. Prevents thrashing. Target tracking policies manage their own cooldown. |
| Lifecycle hooks | Pause instances during launch (Pending:Wait) or termination (Terminating:Wait) to run custom scripts (install software, drain connections). |
| Warm pools | Pre-initialised, stopped instances that can launch faster than cold-start EC2. Reduces scale-out latency for slow-to-boot apps. |
| Health checks | EC2 status checks by default. Can add ELB health checks so unhealthy instances are replaced by ASG. |
Lambda & serverless compute
Lambda key facts
- Max execution time: 15 minutes
- Memory: 128 MB – 10,240 MB
- CPU allocated proportional to memory
- Concurrency default: 1,000 per region (soft limit)
- Deployment package: 50 MB zipped, 250 MB unzipped
- Ephemeral storage: /tmp up to 10 GB
- VPC access: attach ENI to reach private resources
Serverless architecture components
- API Gateway — REST, HTTP, WebSocket APIs; integrates directly with Lambda
- SQS — decouple producers/consumers; Lambda event source mapping
- DynamoDB — serverless NoSQL with Streams → Lambda triggers
- Step Functions — orchestrate multi-Lambda workflows with state
- EventBridge — event bus; schedule or route events to targets
- Fargate — serverless containers; no EC2 to manage
Lambda cold starts add latency when a new container is initialised. Mitigation: Provisioned Concurrency keeps warm instances ready. Also avoid placing Lambda in a VPC unless the function needs private resource access — VPC adds cold-start time due to ENI creation.
Elastic Load Balancing — choosing the right type
| Load balancer | Layer | Protocols | Key feature / choose when |
|---|---|---|---|
| ALB — Application | L7 | HTTP, HTTPS, gRPC | Content-based routing (path, host, headers), WebSockets, Lambda targets, microservices |
| NLB — Network | L4 | TCP, UDP, TLS | Ultra-low latency, millions of requests/sec, static IP, preserves source IP, PrivateLink |
| GLB — Gateway | L3 | All IP traffic | Inline security appliances (IDS/IPS, firewalls) — transparent bump-in-the-wire |
| CLB — Classic | L4/L7 | HTTP, HTTPS, TCP | Legacy only — do not use for new architectures |
Sticky sessions (session affinity) keep a user routed to the same target. ALB uses a cookie; NLB uses source IP hashing. Only use sticky sessions when the application cannot be made stateless — it limits the even distribution of load.
Storage
Amazon S3 — storage classes
| Storage class | Min storage | Retrieval | Use case |
|---|---|---|---|
| S3 Standard | None | Milliseconds | Frequently accessed data, websites, content distribution |
| S3 Intelligent-Tiering | None | Milliseconds | Unknown or changing access patterns — auto-tiers to save cost |
| S3 Standard-IA | 30 days | Milliseconds | Infrequent access, disaster recovery, backups |
| S3 One Zone-IA | 30 days | Milliseconds | Infrequent, reproducible data; lower cost, single AZ |
| S3 Glacier Instant | 90 days | Milliseconds | Archive accessed a few times per year (e.g., medical images) |
| S3 Glacier Flexible | 90 days | 1–12 hours | Archive; cost-sensitive; occasional retrieval acceptable |
| S3 Glacier Deep Archive | 180 days | 12–48 hours | Lowest cost; long-term compliance retention (7–10 years) |
S3 — key features for the exam
Data protection
- Versioning — keeps all versions; delete creates a delete marker
- MFA Delete — requires MFA to permanently delete a version
- Object Lock — WORM (Governance or Compliance mode)
- Replication (CRR/SRR) — cross-region or same-region; requires versioning
- Lifecycle policies — automate transitions between storage classes
Access control
- Bucket policies — resource-based, JSON, can grant cross-account access
- ACLs — legacy; prefer bucket policies and IAM instead
- Block Public Access — account-level or bucket-level safeguard
- Pre-signed URLs — temporary access for specific objects (time-limited)
- S3 Access Points — per-application access policies at scale
- CORS — required when a browser requests S3 from a different domain
For static website hosting, S3 must have public read access and a bucket website endpoint (not the REST endpoint). Combine with CloudFront for HTTPS, caching, and custom domains via Certificate Manager.
Block & file storage
| Service | Type | Scope | Key characteristic |
|---|---|---|---|
| EBS — Elastic Block Store | Block | Single AZ, single instance* | Persistent volumes for EC2. Types: gp3 (general), io2 (high IOPS), st1 (throughput HDD), sc1 (cold HDD) |
| Instance Store | Block | Instance lifetime only | Fastest local NVMe; data lost on stop/terminate. Good for temp buffers, caches |
| EFS — Elastic File System | File (NFS) | Multi-AZ, multi-instance | Shared POSIX filesystem. Scales automatically. Standard and Infrequent Access tiers |
| FSx for Windows | File (SMB) | Multi-AZ option | Managed Windows Server file shares; Active Directory integration |
| FSx for Lustre | File (Lustre) | Single or multi-AZ | HPC, ML training; integrates with S3; sub-millisecond latency |
*EBS Multi-Attach is available for io1/io2 volumes in the same AZ, allowing up to 16 Nitro-based instances to attach simultaneously — use cases are clustered databases.
Networking & Content Delivery
VPC — core components
| Component | What it does | Key exam notes |
|---|---|---|
| Subnet | IP range within an AZ | Public subnet has route to IGW; private subnet does not. Each subnet in exactly one AZ. |
| Internet Gateway (IGW) | VPC ↔ internet | Horizontally scaled, HA by design. One per VPC. Enables public IP/EIP instances to reach internet. |
| NAT Gateway | Private subnet → internet (outbound only) | Managed, HA within AZ. Deploy one per AZ for HA. Charged per GB processed. Cannot be used as a Bastion. |
| Security Group | Stateful instance-level firewall | Allow rules only. Return traffic allowed automatically. Applied to ENIs. |
| Network ACL (NACL) | Stateless subnet-level firewall | Allow and deny rules. Numbered priority. Must explicitly allow return traffic. Applied to subnets. |
| VPC Peering | Private routing between two VPCs | Non-transitive — A↔B and B↔C does NOT mean A↔C. Works cross-region and cross-account. |
| Transit Gateway | Hub-and-spoke VPC routing | Transitive. Connects VPCs, VPNs, Direct Connect. Scales to thousands of attachments. |
| VPC Endpoints | Private access to AWS services | Gateway endpoint: free; S3 and DynamoDB only. Interface endpoint: ENI-based; most other services; charged. |
NACLs are stateless — you must explicitly add both inbound and outbound rules for two-way communication, including ephemeral ports (1024–65535) for return traffic. Security groups are stateful — return traffic is automatically allowed.
Route 53 — routing policies
| Routing policy | Use case |
|---|---|
| Simple | Single resource; no health checks. Can return multiple values (client picks randomly). |
| Weighted | A/B testing; gradual traffic shifting between versions. Weight 0 = exclude from DNS. |
| Latency-based | Route to the AWS region with lowest latency for the user. |
| Failover | Active/passive DR. Primary + secondary. Route 53 health check triggers failover. |
| Geolocation | Route based on user's location (country, continent). Default record for unmatched locations. |
| Geoproximity | Route based on geographic proximity with bias adjustment. Requires Traffic Flow. |
| Multi-value Answer | Returns up to 8 healthy records. Not a substitute for a load balancer but adds basic resiliency. |
| IP-based | Route based on client's IP CIDR. Useful for on-premises CIDR ranges. |
CloudFront & content delivery
CloudFront key facts
- 450+ edge locations globally
- Origins: S3, ALB, EC2, custom HTTP
- Signed URLs / Signed Cookies for private content
- OAC (Origin Access Control) — restricts S3 to CloudFront only
- Cache behaviour: TTL controlled by origin headers or CloudFront policy
- Geo Restriction: allowlist or blocklist countries
- Lambda@Edge / CloudFront Functions: run code at edge
Hybrid connectivity
- Site-to-Site VPN — encrypted IPSec over public internet; fast to set up; ~1.25 Gbps per tunnel; Virtual Private Gateway or Transit Gateway
- Direct Connect — dedicated 1/10/100 Gbps private line; low latency, consistent bandwidth; takes weeks to provision
- Direct Connect + VPN — Direct Connect with IPSec VPN for encryption (DX is not encrypted by default)
- AWS Global Accelerator — routes traffic via AWS backbone to nearest edge; static Anycast IPs; good for non-HTTP (gaming, VoIP)
Databases
Choosing a database service
| Service | Type | Choose when |
|---|---|---|
| RDS | Relational (MySQL, PostgreSQL, MariaDB, Oracle, SQL Server) | Traditional RDBMS workloads; managed patching, backups, Multi-AZ failover |
| Aurora | Relational (MySQL/PostgreSQL compatible) | Need 5× MySQL or 3× PostgreSQL performance; auto-scaling storage up to 128 TB; Aurora Serverless for variable workloads |
| DynamoDB | NoSQL key-value & document | Single-digit millisecond at any scale; serverless; gaming, IoT, sessions, carts |
| ElastiCache | In-memory (Redis / Memcached) | Reduce DB read load with a caching layer; sessions; leaderboards. Redis adds persistence, pub/sub, replication. |
| Redshift | Data warehouse (OLAP, columnar) | Analytics and BI on petabyte-scale data; complex SQL; integrates with S3 via Redshift Spectrum |
| Neptune | Graph (Gremlin, SPARQL, openCypher) | Social networks, recommendation engines, fraud detection, knowledge graphs |
| DocumentDB | Document (MongoDB compatible) | JSON document store with MongoDB API compatibility |
| Timestream | Time-series | IoT, DevOps metrics, clickstream data with time-based queries |
RDS & Aurora HA patterns
RDS Multi-AZ
- Synchronous replication to standby in different AZ
- Automatic failover in 1–2 minutes (DNS CNAME flip)
- Standby is NOT readable — only for failover
- Backups taken from standby (no I/O impact on primary)
- Multi-AZ DB Cluster: 1 writer + 2 readable standbys (faster failover, ~35s)
Read Replicas
- Asynchronous replication — eventual consistency
- Up to 5 replicas per source (15 for Aurora)
- Cross-region replicas supported
- Can be promoted to standalone instance
- Use to offload read traffic (analytics, reporting)
- Replicas within region are free (data transfer); cross-region has cost
Read Replicas are for performance, not disaster recovery — they use asynchronous replication. Multi-AZ is for HA/DR with synchronous replication. These are complementary features, not alternatives.
DynamoDB — key exam concepts
| Concept | Detail |
|---|---|
| Primary key | Partition key only (simple) or Partition + Sort key (composite). Must be unique per item. |
| GSI / LSI | Global Secondary Index: different partition key, can be added anytime. Local Secondary Index: same partition key, different sort key, must be created at table creation. |
| Read consistency | Eventually consistent reads (default, cheaper). Strongly consistent reads (double the RCU, latest data). |
| DAX | DynamoDB Accelerator — in-memory cache, microsecond reads, write-through. Transparent to application. |
| Streams | Ordered change log of item modifications. Consumed by Lambda triggers or Kinesis Data Streams. |
| TTL | Time-to-live: automatically delete expired items at no cost. Set a Unix epoch timestamp attribute. |
| Global Tables | Multi-region, multi-master replication. Active-active: write to any region, changes replicate globally. |
| On-demand capacity | Pay per request; scales instantly. Good for unpredictable traffic. Provisioned capacity is cheaper for predictable workloads. |
Security & Identity
IAM — policies and roles
Policy evaluation logic
- Explicit Deny always wins — overrides any Allow
- If no explicit Allow → implicit Deny (default)
- Service Control Policies (SCPs) in AWS Organizations restrict the maximum permissions available — they do NOT grant permissions
- Permission boundaries set max permissions for an IAM entity
- Evaluation order: SCPs → Resource policies → Identity policies → Permission boundaries → Session policies
Best practices
- Never use root account for daily operations — create admin IAM user
- Enable MFA on root and privileged users
- Grant least-privilege permissions
- Use IAM Roles for EC2 instances (instance profiles) — never embed credentials in code
- Use IAM Roles for cross-account access
- Rotate access keys regularly; prefer short-lived credentials
- Use AWS Organizations + SCPs for guardrails across accounts
Encryption & key management
| Service / feature | What it does |
|---|---|
| KMS CMK (Customer Managed) | You control key policies, rotation, deletion. Managed in KMS. Used by most AWS services. |
| KMS AWS Managed Keys | AWS creates and manages key per service (e.g., aws/s3). Auto-rotated every year. Less control. |
| CloudHSM | Dedicated hardware security module. You control keys. FIPS 140-2 Level 3. Use when regulations require exclusive HSM control. |
| S3 SSE-S3 | Managed entirely by S3, AES-256. Zero admin overhead. |
| S3 SSE-KMS | Uses KMS. Audit trail in CloudTrail. Requires kms:GenerateDataKey permission. |
| S3 SSE-C | Customer provides key per request. AWS does not store the key. |
| Secrets Manager | Store and auto-rotate DB passwords, API keys. Native integration with RDS. Different from Parameter Store. |
| Parameter Store | Free tier for standard params; KMS optional. Good for non-secret config. No auto-rotation built in. |
Monitoring & threat detection
| Service | What it monitors / detects |
|---|---|
| CloudTrail | API call history for every AWS action — who, what, when, from where. Management events free; data events charged. Enable in all regions. |
| CloudWatch | Metrics, logs, alarms, dashboards. EC2 basic metrics every 5 min free; detailed every 1 min charged. Custom metrics via PutMetricData API. |
| VPC Flow Logs | IP traffic metadata at VPC / subnet / ENI level. Accepted and rejected traffic. Published to CloudWatch Logs or S3. |
| GuardDuty | Threat detection using ML on CloudTrail, DNS, VPC Flow Logs. Detects compromised instances, crypto-mining, reconnaissance. Enable per region. |
| Security Hub | Aggregates security findings from GuardDuty, Inspector, Macie, IAM Analyzer into a single pane. |
| AWS Config | Configuration compliance — records resource config changes, evaluates against rules. Point-in-time snapshots. |
| Inspector | Automated vulnerability scanning for EC2 (OS CVEs) and ECR container images. |
| Macie | Uses ML to discover and protect sensitive data (PII, credit card numbers) in S3 buckets. |
| WAF | Web Application Firewall — blocks SQL injection, XSS, rate limiting. Attached to ALB, CloudFront, API Gateway. |
| Shield Standard / Advanced | DDoS protection. Standard is free and automatic. Advanced adds 24/7 DDoS Response Team and cost protection. |
Architecture Patterns
High availability & fault tolerance
Availability targets
- 99.9% = ~8.7 hours downtime/year
- 99.95% = ~4.4 hours downtime/year
- 99.99% = ~52 minutes downtime/year
- 99.999% = ~5 minutes downtime/year
- Multi-AZ deployments typically achieve 99.99%
- Multi-region deployments target 99.999%+
Disaster recovery strategies
- Backup & Restore — lowest cost, highest RTO/RPO (hours)
- Pilot Light — core services running at minimal scale; scale up on DR event (minutes–hours)
- Warm Standby — scaled-down but fully functional copy; faster failover (minutes)
- Multi-Site Active/Active — full production in two regions; near-zero RTO/RPO; highest cost
RTO (Recovery Time Objective) = how long you can be down. RPO (Recovery Point Objective) = how much data loss is acceptable. Backup & Restore has high RTO and RPO; Active/Active has near-zero for both.
Decoupling & messaging
| Service | Pattern | Key facts |
|---|---|---|
| SQS Standard | Queue (pull, async) | At-least-once delivery; best-effort ordering; up to 14-day retention; unlimited throughput |
| SQS FIFO | Queue (pull, ordered) | Exactly-once; strict ordering within message group; 3,000 msg/sec with batching |
| SNS | Pub/sub (push, fan-out) | Topic → multiple subscriptions (SQS, Lambda, HTTP, email, SMS). SNS → SQS fan-out is a classic pattern. |
| Kinesis Data Streams | Real-time streaming | Ordered per shard; 1–7 day retention; consumers can replay. Use for real-time analytics, log ingestion. |
| Kinesis Data Firehose | Streaming ETL (near real-time) | Fully managed; delivers to S3, Redshift, OpenSearch, Splunk. No consumer management. 60s min buffering. |
| EventBridge | Event bus | Rich filtering on event content; 90+ AWS service sources; custom event buses; schema registry |
The classic exam trap: SQS visibility timeout — after a message is received, it becomes invisible for the timeout period (default 30s). If not deleted before timeout, it reappears. If your Lambda or consumer takes longer than the timeout, the message will be processed again. Set visibility timeout to 6× your function timeout.
Scalability patterns
Add more instances behind a load balancer. Stateless application tier enables this. Store session state in ElastiCache or DynamoDB, not on the instance. Use Auto Scaling Groups with target tracking.
CloudFront for static assets and API responses. ElastiCache Redis for database query results and session data. DAX for DynamoDB acceleration. Route 53 TTLs to cache DNS lookups.
Replace synchronous request chains with SQS queues. Producers write to queue; consumers (EC2, Lambda) process at their own pace. Queue depth drives Auto Scaling of consumers.
RDS and Aurora read replicas serve read-heavy traffic. Separate analytics queries to Redshift. DynamoDB on-demand capacity handles unpredictable read/write bursts automatically.
Cost optimization strategies
| Strategy | AWS tools / services |
|---|---|
| Right-size instances | AWS Compute Optimizer, Trusted Advisor, Cost Explorer — identify over-provisioned EC2, RDS, Lambda |
| Reserved capacity | Reserved Instances (1 or 3 yr), Savings Plans (Compute, EC2, SageMaker) for predictable workloads |
| Spot for batch & flexible | Spot Instances (up to 90% discount) for fault-tolerant jobs; Spot Fleet mixes types to maintain capacity |
| S3 storage tiers | S3 Lifecycle rules to transition to IA, Glacier; S3 Intelligent-Tiering for unknown access patterns |
| Serverless for variable load | Lambda (pay per invocation), Fargate (pay per vCPU/memory), API Gateway — zero cost when idle |
| Data transfer minimisation | VPC Gateway Endpoints (free for S3/DynamoDB), same-region data transfer, CloudFront to cache at edge |
| Visibility & governance | Cost Explorer, AWS Budgets (alerts), Cost Allocation Tags, AWS Organizations consolidated billing |
Cheat sheet
Most-tested decision points — quick reference
Spot InstancesReserved Instances or Savings PlansALB (Application, Layer 7)NLB (Network, Layer 4)GLB (Gateway, Layer 3)S3 One Zone-IAS3 Intelligent-TieringS3 Glacier Deep ArchiveEBS io2 Block ExpressEFS (NFS)FSx for WindowsNAT Gateway (per AZ)Gateway Endpoint (free)Transit GatewayRoute 53 Failover routingRoute 53 Weighted routingRDS Multi-AZRDS / Aurora Read ReplicasDynamoDBElastiCache RedisSQS Standard QueueSNS → SQS (fan-out pattern)Kinesis Data StreamsKinesis Data FirehoseSecrets ManagerSystems Manager Parameter StoreGuardDutyCloudTrailAWS Shield (+ WAF for L7)AWS WAFAmazon MacieAWS ConfigStorage selection guide
| If the question says… | Answer is likely… |
|---|---|
| Shared, POSIX filesystem, multiple EC2 Linux instances | EFS |
| Shared filesystem for Windows workloads / Active Directory | FSx for Windows File Server |
| HPC, ML training, needs S3 integration, sub-ms latency | FSx for Lustre |
| Database storage, boot volume, single EC2 instance | EBS |
| Temporary scratch data, highest possible IOPS, lose on termination OK | Instance Store |
| Object storage, internet-accessible, static website | S3 |
| On-premises backup to AWS, hybrid NFS/SMB access | Storage Gateway (File/Volume/Tape) |
| Large one-time data transfer, limited bandwidth, petabytes | AWS Snowball / Snowmobile |
| Continuous data sync from on-premises to S3 | AWS DataSync |
IAM policy evaluation — quick rules
| Rule | Detail |
|---|---|
| Deny always wins | An explicit Deny in any policy — identity, resource, SCP, or boundary — always takes precedence over any Allow, no exceptions. |
| SCPs limit, not grant | SCP set the ceiling of what's allowed across an AWS Organization member account. They never grant permissions by themselves. |
| Cross-account needs both | For cross-account access, BOTH the calling identity's policy must Allow AND the resource policy in the target account must Allow. |
| Role assumption | EC2, Lambda, and other services assume IAM Roles via instance profiles / execution roles. Never hard-code credentials. |
Practice quiz
Question 1 of 10
A company runs a web application with unpredictable traffic spikes. They need to ensure that EC2 instances launch automatically during peak hours and that costs remain low during off-peak hours. The instances must handle interruptions gracefully. Which EC2 purchasing option and AWS service combination is most cost-effective?
Question 2 of 10
A financial services company needs to store compliance documents for 7 years. The documents are accessed only during annual audits. Retrieval within 12 hours is acceptable. What is the most cost-effective S3 storage class?
Question 3 of 10
A solutions architect needs to restrict outbound internet traffic from instances in a private subnet while allowing those instances to download OS updates. The solution must be highly available across Availability Zones. What should they deploy?
Question 4 of 10
A company needs a database solution for a gaming leaderboard that requires single-digit millisecond read/write latency and must scale to millions of concurrent users without operational management. Which service is the best fit?
Question 5 of 10
An application running on EC2 needs to access an S3 bucket securely. The security team prohibits storing credentials on EC2 instances. What is the correct approach?
Question 6 of 10
A company wants to implement an event-driven architecture where an image upload to S3 triggers a Lambda function for thumbnail generation, and also sends a notification to an SQS queue for further processing by a separate service. How should this be designed?
Question 7 of 10
A company has a VPC with 3 private subnets in different AZs. They need EC2 instances in those subnets to access S3 buckets without traversing the public internet, and without incurring NAT Gateway data transfer charges. What is the most cost-effective solution?
Question 8 of 10
A web application uses an RDS MySQL database. The operations team reports that read queries are causing high CPU on the primary instance, slowing down write operations. The application can tolerate slightly stale data for reporting queries. What should the architect recommend?
Question 9 of 10
A security auditor requires that all API calls made across the AWS account are logged and stored durably for 90 days. The logs must be tamper-evident. Which service and configuration achieves this?
Question 10 of 10
A company runs a critical e-commerce application that must remain available even if an entire AWS Region becomes unavailable. The recovery time objective (RTO) is under 1 minute and the recovery point objective (RPO) is near zero. Which DR strategy meets these requirements?