AWS Certified Solutions Architect Associate

Pass AWS SAA-C03 by Building,
Not Memorizing

The only platform that tests if you can BUILD AWS solutions. 533 interactive questions + visual architecture builder.

βœ… 533 Questions πŸ’š Always Free πŸ“΄ Works Offline

Everything You Need to Pass

Comprehensive study tools designed for the AWS SAA-C03 certification

Practice Quiz

533 real-world questions covering all SAA-C03 domains with detailed explanations

Mock Exam

Timed 65-question practice tests that simulate the real exam experience

Architecture Builder

Drag-and-drop AWS services to build solutions and visualize architectures

Visual Exam

Interactive scenarios where you construct AWS architectures as answers

Study Guide

Comprehensive tips, strategies, and domain breakdowns for exam success

Keywords & Hints

Learn to identify question patterns and keywords that guide you to the right answer

533
Practice Questions
65
Mock Exam Questions
20
Visual Scenarios
100%
Exam Coverage

How It Works

Your path to AWS certification success

1

Start Free

Begin with 20 free practice questions to test your knowledge

2

Practice & Learn

Study with detailed explanations and visual architecture diagrams

3

Take Mock Exams

Simulate the real exam with timed practice tests

4

Pass with Confidence

Achieve your AWS Solutions Architect certification

Ready to Actually Understand AWS?

Start practicing with the most interactive AWS certification prep platform.

No signup required • Works offline • 100% free forever

πŸ“Š Dashboard

🎯 Current Certification: Solutions Architect AssociateSAA-C03

Pass score: 70% | Questions: 65 | Time: 90 min

0
Questions Answered
--%
Overall Accuracy
0
Best Streak
No
Exam Ready?
πŸ“ˆ Progress by Domain
⚠️ Weak Areas
Complete some questions to identify weak areas!

Practice Quiz ❓

🎯 Select Domain
☁️ AWS Solutions Architect Associate
Loading question...
πŸ’‘ Quick Study Tips

πŸ“ Mock Exam

πŸ“ Mock Certification Exam
65
Questions
90
Minutes
70%
Pass Score
πŸŽ“ SAA-C03 Smart Study Guide

Based on analysis of all 506 SAA-C03 practice questions

152
Design-Performant
144
Design-Secure
119
Design-Resilient
90
Design-Cost
πŸ“š Select Domain
πŸ” Design Secure Architectures (144 Questions)

πŸ† Top 10 Most Tested Services

1. S3145
2. IAM101
3. VPC85
4. EC284
5. CloudFront35
6. Route 5333
7. WAF30
8. VPN30
9. Direct Connect29
10. RDS26

🎯 Key Topics to Master

βœ… IAM: Roles vs policies, cross-account access, resource-based policies, permissions boundaries
βœ… Encryption: KMS, SSE-S3, SSE-C, SSE-KMS, SSL/TLS, client-side encryption
βœ… VPC Security: Security Groups (stateful) vs NACLs (stateless), VPC endpoints, PrivateLink
βœ… S3 Security: Bucket policies, ACLs, encryption at rest, versioning, MFA delete
βœ… Security Services: GuardDuty, WAF, Shield, Macie, Security Hub, Inspector

⚠️ Common Wrong Answer Traps

❌ Using Internet Gateway instead of NAT Gateway for private subnets
❌ Confusing Security Groups (instance-level) with NACLs (subnet-level)
❌ Using VPC Peering for complex connectivity (use Transit Gateway instead)
❌ Making resources public when private access is possible
❌ Confusing Gateway Endpoints (S3/DynamoDB only) with Interface Endpoints (other services)

πŸ’‘ Quick Reference

πŸ”‘ Cross-Account Access: Requires BOTH IAM role AND resource-based policy
πŸ”‘ Security Groups: Stateful, instance-level, allow rules only
πŸ”‘ NACLs: Stateless, subnet-level, allow + deny rules
πŸ”‘ VPC Endpoints: Gateway (S3/DynamoDB) vs Interface (all others)
πŸ”‘ Encryption at rest: KMS, SSE-S3, SSE-C, EBS encryption, RDS encryption
πŸ“ Exam Preparation Strategy

⏱️ Time Management (130 minutes / 65 questions)

⏰ Average 2 minutes per question
⏰ Mark difficult questions, return later
⏰ Reserve 15-20 minutes for final review

🎯 Domain Weighting (Approximate)

πŸ“Š Design Resilient: ~30% (20 questions)
πŸ“Š Design Performant: ~28% (18 questions)
πŸ“Š Design Secure: ~24% (16 questions)
πŸ“Š Design Cost: ~18% (11 questions)

❌ Red Flags (Usually Wrong)

Overly complex solutions
Manual processes instead of automation
Self-managed vs AWS-managed services
Single AZ for production
Storing credentials in code

βœ… Green Flags (Usually Correct)

Managed AWS services
Automation over manual intervention
Multi-AZ for high availability
Least privilege for security
Decoupled architectures
πŸ’‘ AWS Exam Keywords & Hints

Quick reference guide for AWS exam keywords, scenarios, and service mappings

πŸ”‘ Key Exam Keywords by Scenario

πŸ” Security & Compliance Keywords

πŸ”‘ "Encrypt data at rest" β†’ S3 SSE-S3, SSE-KMS, SSE-C | EBS encryption | RDS encryption
πŸ”‘ "Encrypt data in transit" β†’ SSL/TLS, HTTPS | VPN | CloudFront with HTTPS
πŸ”‘ "Least privilege" β†’ IAM policies with minimal permissions | Use roles instead of users
πŸ”‘ "Cross-account access" β†’ IAM roles with trust policies | Resource-based policies
πŸ”‘ "Prevent public access" β†’ S3 Block Public Access | VPC with private subnets | Security Groups
πŸ”‘ "Compliance and auditing" β†’ CloudTrail (API logs) | Config (resource compliance) | GuardDuty (threat detection)
πŸ”‘ "DDoS protection" β†’ AWS Shield Standard (free) | Shield Advanced (paid) | WAF
πŸ”‘ "Web application firewall" β†’ WAF on CloudFront, ALB, or API Gateway

πŸ›‘οΈ High Availability & Resilience Keywords

πŸ”‘ "High availability" β†’ Multi-AZ deployment | Multiple regions | Auto Scaling
πŸ”‘ "Disaster recovery" β†’ Cross-region replication | Backup and restore | RDS snapshots
πŸ”‘ "Automatic failover" β†’ RDS Multi-AZ | Aurora Global Database | Route 53 health checks
πŸ”‘ "Decouple components" β†’ SQS (queue) | SNS (pub/sub) | EventBridge (event bus)
πŸ”‘ "Load balancing" β†’ ALB (Layer 7, HTTP/HTTPS) | NLB (Layer 4, TCP/UDP) | GWLB (Layer 3)
πŸ”‘ "Auto-scaling" β†’ EC2 Auto Scaling Groups | DynamoDB auto scaling | Aurora auto scaling
πŸ”‘ "Fault tolerance" β†’ Multi-AZ | Read replicas | SQS with dead-letter queues

⚑ Performance Optimization Keywords

πŸ”‘ "Low latency" β†’ CloudFront (CDN) | ElastiCache | DynamoDB DAX | Global Accelerator
πŸ”‘ "Caching" β†’ CloudFront (edge) | ElastiCache (Redis/Memcached) | DAX (DynamoDB)
πŸ”‘ "High throughput" β†’ Provisioned IOPS (io1/io2) | S3 Transfer Acceleration | Enhanced networking
πŸ”‘ "Real-time processing" β†’ Kinesis Data Streams | Lambda | DynamoDB Streams
πŸ”‘ "Serverless" β†’ Lambda (compute) | DynamoDB (database) | S3 (storage) | API Gateway
πŸ”‘ "Global distribution" β†’ CloudFront | Global Accelerator | Route 53 with geolocation routing

πŸ’° Cost Optimization Keywords

πŸ”‘ "Most cost-effective" β†’ S3 Intelligent-Tiering | Spot Instances | Reserved Instances
πŸ”‘ "Infrequent access" β†’ S3 Standard-IA | S3 One Zone-IA | EFS IA
πŸ”‘ "Archive storage" β†’ S3 Glacier Flexible Retrieval | S3 Glacier Deep Archive
πŸ”‘ "Reduce data transfer costs" β†’ VPC endpoints | CloudFront | Direct Connect
πŸ”‘ "Pay for what you use" β†’ Lambda | Fargate | DynamoDB On-Demand | S3
πŸ”‘ "Long-term commitment" β†’ Reserved Instances (1/3 year) | Savings Plans | Dedicated Hosts

Cost + Performance (Read-Heavy API)

βœ… Answer: Enable Amazon API Gateway Caching.
πŸ’‘ Why: When read traffic is high and data can be stale (up to 24 hours), API Gateway cache + TTL reduces Lambda/Aurora calls, improving latency and lowering database cost.
πŸ”‘ Keywords: API Gateway Caching, TTL, Read-heavy, Cost Optimization, Performance

Hybrid Multi-Region Connectivity

βœ… Answer: Connect both Direct Connect links to a shared Direct Connect Gateway and attach each region's VGW.
πŸ’‘ Why: Direct Connect Gateway supports transitive routing across regions and on-prem locations with lower operational overhead than managing complex peering/VPN combinations.
πŸ”‘ Keywords: Direct Connect Gateway, VGW, Transitive Routing, Hybrid Cloud, Multi-Region, Direct Connect

Geographic Traffic Steering

βœ… Answer: Use Route 53 Geoproximity routing.
πŸ’‘ Why: Geoproximity routing can dynamically shift which geographic area routes to a resource by applying a bias value.
πŸ”‘ Keywords: Geoproximity Routing, Route 53, Bias, Geographic Routing, Dynamic Traffic Routing

Reusable Best-Practice Infrastructure

βœ… Answer: Use AWS CloudFormation to manage RDS databases via reusable templates.
πŸ’‘ Why: CloudFormation is Infrastructure as Code β€” encode best practices once into a template and every user/team reuses it. Trusted Advisor only recommends; Lambda alerts are reactive; IAM deny doesn't guide correct config.
πŸ”‘ Keywords: CloudFormation, Infrastructure as Code, IaC, Reusable Template, Best Practices, JSON/YAML

Message Broker with MQTT Protocol

βœ… Answer: Use Amazon MQ for managed message broker with MQTT support.
πŸ’‘ Why: Amazon MQ supports industry-standard protocols (JMS, AMQP, STOMP, MQTT, WebSocket). SQS/SNS/Kinesis are AWS-proprietary and do not support MQTT β€” no code changes needed with Amazon MQ.
πŸ”‘ Keywords: Amazon MQ, MQTT, AMQP, STOMP, ActiveMQ, Lift-and-Shift, Message Broker, Protocol Support

One-Time 1 PB S3 Cross-Region Copy

βœ… Answer: Use aws s3 sync command OR S3 Batch Replication (then delete the replication config).
πŸ’‘ Why: s3 sync uses CopyObject API and is idempotent. Batch Replication handles existing objects cross-region. Snowball is for on-premβ†’AWS only. S3 console is not feasible at PB scale. Transfer Acceleration speeds clientβ†’S3, not bucket-to-bucket.
πŸ”‘ Keywords: s3 sync, S3 Batch Replication, CopyObject, Cross-Region, One-Time Copy, CDC, Region-to-Region

Async Image Processing, Cost Minimization

βœ… Answer: Amazon SQS + EC2 Spot Instances.
πŸ’‘ Why: SQS buffers jobs asynchronously with built-in retry. Spot Instances cost up to 90% less than On-Demand. Reserved Instances require 1-3 year commitment β€” wrong for variable load. SNS has no retry/queue behavior.
πŸ”‘ Keywords: SQS, Spot Instances, Async Processing, Retry, Cost Optimization, Decoupling, Queue

Cheapest Multi-VPC Connectivity (Same Account)

βœ… Answer: Use VPC Peering.
πŸ’‘ Why: VPC Peering is the most cost-effective solution for connecting VPCs within the same account. Direct Connect is for on-premises. NAT Gateway is for internet access. Internet Gateway is for public internet.
πŸ”‘ Keywords: VPC Peering, Same Account, Cost-Effective, Private Connectivity, Non-Transitive

Proactive + Reactive EC2 Scaling

βœ… Answer: Predictive Scaling + Dynamic Scaling with Target Tracking.
πŸ’‘ Why: Predictive Scaling uses ML on historical data to pre-warm capacity. Target Tracking reacts in real-time to maintain a metric (e.g. CPU at 60%). Combined = forecast + react. Step Scaling is reactive only. Scheduled Scaling can't adapt dynamically.
πŸ”‘ Keywords: Predictive Scaling, Target Tracking, Dynamic Scaling, ML Forecast, Historical Patterns, Auto Scaling Group

ALB Marks All Instances Unhealthy

βœ… Answer: (1) Health check route is misconfigured OR (2) EC2 security group blocks ALB traffic.
πŸ’‘ Why: If the site loads via IP but ALB marks instances unhealthy, the ALB is hitting the wrong path OR the security group isn't allowing traffic from the ALB's security group on the health check port. EIPs, EBS volumes, and app runtime are not relevant.
πŸ”‘ Keywords: Health Check Route, Security Group, ALB, Unhealthy Targets, Listener Port, Health Check Port

Real-Time Streaming Analytics to S3

βœ… Answer: Kinesis Data Streams β†’ Kinesis Data Analytics β†’ Kinesis Data Firehose β†’ S3.
πŸ’‘ Why: KDS ingests, KDA runs real-time SQL on the stream, KDF delivers to S3. Athena is batch/interactive β€” not real-time. QuickSight can't consume KDS directly. SQS+EC2 isn't purpose-built for streaming analytics.
πŸ”‘ Keywords: Kinesis Data Streams, Kinesis Data Analytics, Kinesis Firehose, Real-Time Analytics, Streaming Pipeline, KDSβ†’KDAβ†’KDFβ†’S3

Hybrid Storage: Cached vs Stored Volumes

βœ… Answer: Storage Gateway β€” Cached Volumes.
πŸ’‘ Why: Cached Volumes store primary data in S3 and cache frequently accessed data locally β†’ minimizes local storage. Stored Volumes keep full dataset on-prem with async snapshots to S3 β€” still requires large local storage and recovery needs restore from S3.
πŸ”‘ Keywords: Storage Gateway, Cached Volumes, Stored Volumes, S3 Primary, Local Cache, Hybrid Cloud, Bandwidth Optimization

ASG Minimum Capacity + Cost for HA

βœ… Answer: Minimum capacity = 2 + use Reserved Instances for the minimum baseline.
πŸ’‘ Why: Min=2 ensures HA across AZs (ASG recovers to 2 after an AZ failure). Min=1 is a single point of failure. Min=3 wastes cost. Reserve only the always-on minimum for maximum savings; use On-Demand/Spot for burst.
πŸ”‘ Keywords: Auto Scaling Group, Minimum Capacity, Reserved Instances, High Availability, Multi-AZ, Cost Optimization, HA Baseline

Static IP for Firewall Whitelisting

βœ… Answer: Use a Network Load Balancer (NLB) with an Auto Scaling Group.
πŸ’‘ Why: NLB exposes a fixed static IP per AZ (or Elastic IP) that can be whitelisted. ALB and CLB expose a DNS name only β€” no static IP. There is no "dynamic EIP attachment" feature in ASG.
πŸ”‘ Keywords: Network Load Balancer, NLB, Static IP, Elastic IP, Firewall Whitelist, Layer 4, Fixed IP

Graph Database for Social Queries

βœ… Answer: Use Amazon Neptune.
πŸ’‘ Why: Neptune is a purpose-built graph database optimized for highly connected datasets and relationship queries. Redshift is a data warehouse. OpenSearch is for log/search. Aurora is relational with poor deep graph traversal.
πŸ”‘ Keywords: Amazon Neptune, Graph Database, Highly Connected, Relationships, Social Network, Gremlin, SPARQL, Recommendation Engine

Identify Idle EC2s + Right-Sizing

βœ… Answer: AWS Cost Optimization Hub + AWS Compute Optimizer.
πŸ’‘ Why: Cost Optimization Hub consolidates recommendations (idle resources, RIs, Savings Plans) across all accounts. Compute Optimizer uses ML for instance type right-sizing. S3 Storage Class Analysis only covers Standardβ†’IA transitions (NOT Glacier). Trusted Advisor does NOT auto-renew RIs.
πŸ”‘ Keywords: Cost Optimization Hub, Compute Optimizer, Right-Sizing, Idle Resources, Savings Plans, Reserved Instances, Cost Dashboard

Annual Key Rotation for S3 Encryption

βœ… Answer: KMS Customer Managed Key (CMK) with automatic rotation enabled + S3 default encryption set to that CMK.
πŸ’‘ Why: CMK auto-rotation is user-configurable, auditable, and rotates every 12 months automatically. SSE-S3 keys are not user-configurable or auditable. Imported key material disables auto-rotation. CloudHSM requires manual key management β€” highest overhead.
πŸ”‘ Keywords: KMS, Customer Managed Key, CMK, Automatic Key Rotation, Annual Rotation, SSE-KMS, S3 Encryption, Auditable

Stream S3 Files into Kinesis (Fastest, No Code)

βœ… Answer: Use AWS DMS (Database Migration Service) as bridge from S3 to Kinesis Data Streams.
πŸ’‘ Why: DMS natively supports S3 as source and Kinesis as target, handles full load AND CDC with no custom code. EventBridge+Lambda requires CloudTrail + custom development. S3 event notifications require significant custom code. S3 cannot directly write to SNS.
πŸ”‘ Keywords: AWS DMS, S3 to Kinesis, CDC, Change Data Capture, No Code, Full Load, Streaming, Database Migration Service

EFS for Sporadic Bursts, Low Average Throughput

βœ… Answer: EFS Burst Throughput Mode + General Purpose performance mode + EFS Standard storage class.
πŸ’‘ Why: Burst mode earns credits during idle periods and spends them during bursts β€” fully automatic, no manual config. Provisioned Throughput costs more for low-average workloads. One Zone doesn't auto-enable burst mode. EFS IA adds retrieval latency during bursts.
πŸ”‘ Keywords: EFS, Burst Throughput, Burst Credits, General Purpose, Sporadic, Automatic Scaling, No Provisioning

Stable IPs for Multi-Region ALBs

βœ… Answer: Use AWS Global Accelerator; register ALBs as endpoints.
πŸ’‘ Why: Global Accelerator provides 2 static anycast IPs globally β€” one-time firewall config. Lambda IP scripts need ongoing updates as IPs change. A single NLB is region-bound. Migrating all ALBs to NLBs still results in multiple IPs per region.
πŸ”‘ Keywords: Global Accelerator, Static IP, Anycast, Multi-Region, Firewall Whitelist, One-Time Config, ALB Endpoints

Minimum EFS Latency Across AZs

βœ… Answer: Create one EFS mount target per Availability Zone and mount from same-AZ instances.
πŸ’‘ Why: EC2 connecting to its local AZ mount target keeps traffic within the AZ β€” lowest latency, no cross-AZ charges. A single mount target forces cross-AZ traffic. Mount targets are VPC-level ENIs managed by EFS, not created on EC2 instances.
πŸ”‘ Keywords: EFS, Mount Target, Per-AZ, Local Access, Low Latency, ENI, Cross-AZ, VPC, Best Practice

CloudFront Capabilities (Select Three)

βœ… Answer: (1) Field-Level Encryption, (2) Route to multiple origins by content type, (3) Origin group for HA/failover.
πŸ’‘ Why: CloudFront uses field-level encryption (not KMS directly). Geo restriction blocks countries β€” it's not for HA. Price class groups edge locations by cost and does NOT route to different origins. Origin groups provide primary/secondary failover.
πŸ”‘ Keywords: CloudFront, Field-Level Encryption, Origin Group, Failover, Multiple Origins, Content Type Routing, Geo Restriction, Price Class

Scale VPN Throughput Beyond 1.25 Gbps

βœ… Answer: AWS Transit Gateway with ECMP routing + multiple VPN tunnels.
πŸ’‘ Why: Each VPN tunnel maxes at 1.25 Gbps. TGW + ECMP aggregates multiple tunnels to scale beyond that. Must enable BGP (dynamic routing) on TGW. Virtual Private Gateway does NOT support ECMP. Global Accelerator optimises path but doesn't add VPN bandwidth.
πŸ”‘ Keywords: Transit Gateway, ECMP, Equal Cost Multi-Path, VPN Tunnels, BGP, 1.25 Gbps, VPN Throughput, Scalable VPN

Short-Lived RDS Credentials from Lambda

βœ… Answer: IAM DB Authentication + IAM Role attached to Lambda.
πŸ’‘ Why: IAM role on Lambda generates a short-lived DB auth token (15 min lifetime) instead of using static username/password. Traffic is encrypted via SSL. Security group rules control network access, not authentication. VPC placement is network config, not auth.
πŸ”‘ Keywords: IAM DB Authentication, IAM Role, Lambda, Short-Lived Token, RDS, PostgreSQL, 15 Minutes, No Password

Cross-Account S3 Access

βœ… Answer: Use a Bucket Policy (resource-based policy).
πŸ’‘ Why: Bucket policies support cross-account principals. User/identity-based policies only apply to principals in YOUR account. Permissions boundary limits max permissions but does not grant access. Both bucket + user policy: the user policy alone still can't cross accounts.
πŸ”‘ Keywords: Bucket Policy, Resource-Based Policy, Cross-Account, S3, Principal, Identity Policy vs Resource Policy

Migrate Physical Tapes to AWS

βœ… Answer: Use AWS Storage Gateway β€” Tape Gateway (Virtual Tape Library).
πŸ’‘ Why: Tape Gateway replaces physical tapes with virtual tapes in S3, with no backup workflow changes. Archives to Glacier/Deep Archive for ultra-low cost. DataSync supports NFS/SMB only β€” not tape. Direct Connect is for ongoing hybrid connectivity, not one-time tape migration.
πŸ”‘ Keywords: Tape Gateway, VTL, Virtual Tape Library, Physical Tapes, S3 Glacier, No Workflow Change, Storage Gateway

S3 Lifecycle: Images vs Thumbnails

βœ… Answer: (1) Transition /images prefix to Standard-IA after 45 days. (2) Transition ALL objects to Glacier after 180 days (no prefix needed).
πŸ’‘ Why: Thumbnails are still active at 45d so only transition images using prefix. At 180d everything archives β€” no prefix needed. One Zone-IA is not HA (single AZ). Glacier with prefix at 180d is unnecessary β€” archive everything.
πŸ”‘ Keywords: S3 Lifecycle, Prefix, Standard-IA, S3 Glacier, Transition, Selective Transition, Archive All, Lifecycle Policy

Elastic Beanstalk Fast Instance Launch

βœ… Answer: Golden AMI (static components) + EC2 User Data (dynamic parts at boot).
πŸ’‘ Why: Golden AMI pre-bakes the 45-min static install. User Data runs only the fast dynamic config at boot. Using User Data for the full install still takes 45 min. S3 is storage β€” not an execution environment. Elastic Beanstalk deployment caching does not exist.
πŸ”‘ Keywords: Golden AMI, EC2 User Data, Fast Launch, Static Installation, Dynamic Config, Elastic Beanstalk, Pre-baked Image

Prevent Accidental DynamoDB Table Deletion

βœ… Answer: Enable DynamoDB Deletion Protection.
πŸ’‘ Why: Deletion Protection is a simple toggle that prevents any DeleteTable operation β€” zero ongoing maintenance. PITR restores AFTER deletion (reactive). CloudTrail+EventBridge+Lambda detects but data is already lost. Weekly S3 exports have data-loss gaps and require manual recovery.
πŸ”‘ Keywords: DynamoDB, Deletion Protection, Prevent Deletion, Zero Overhead, PITR vs Deletion Protection, Proactive vs Reactive

S3 Bucket Policy IpAddress + NotIpAddress

βœ… Answer: The policy allows the entire /24 CIDR except one IP (54.240.143.188).
πŸ’‘ Why: IpAddress condition = source must be within 54.240.143.0/24. NotIpAddress condition = source must NOT be 54.240.143.188/32. Both must be true (AND logic). Result: all 256 IPs in the /24 are allowed except .188.
πŸ”‘ Keywords: Bucket Policy, IpAddress, NotIpAddress, CIDR, Condition, AND Logic, IP Restriction, Allow Except

Route 53 Record Updated but Users Still Hit Old LB

βœ… Answer: The TTL (Time to Live) is still in effect β€” DNS resolvers are serving cached records.
πŸ’‘ Why: DNS changes don't propagate instantly β€” resolvers cache the old record until TTL expires. Best practice: lower TTL to 300s before making changes. Simple records have NO health checks. CNAME/Alias misconfiguration would break routing entirely, not just delay it.
πŸ”‘ Keywords: Route 53, TTL, Time to Live, DNS Propagation, DNS Cache, Simple Record, No Health Checks

DynamoDB: Idle at Night, Instant Spikes During Day

βœ… Answer: Use DynamoDB On-Demand Capacity Mode.
πŸ’‘ Why: On-Demand pays per request, handles instant spikes with no capacity planning, and costs nothing during idle periods. Provisioned + Auto Scaling introduces CloudWatch alarm lag β€” not instant. Global Tables are for multi-region replication, not variable load.
πŸ”‘ Keywords: DynamoDB, On-Demand, Pay-Per-Request, Unpredictable Traffic, Instant Scale, No Capacity Planning, Bursty Workload

Lambda Best Practices (Select Three)

βœ… Answer: (1) VPC Lambda needs NAT Gateway for internet access. (2) CloudWatch Alarms on ConcurrentExecutions/Invocations. (3) Lambda Layers for reusable shared code.
πŸ’‘ Why: Default Lambda runs in AWS-owned VPC with internet access. VPC-enabled Lambda loses that and needs NAT for public access. Lambda CAN be deployed as container images (supported since 2020). Do NOT over-provision timeout β€” match it to actual runtime.
πŸ”‘ Keywords: Lambda, VPC, NAT Gateway, Lambda Layers, ConcurrentExecutions, CloudWatch Alarm, Container Image, Timeout, Best Practices

IAM's Only Resource-Based Policy

βœ… Answer: Trust Policy (Role Trust Policy) is the only resource-based policy IAM supports.
πŸ’‘ Why: An IAM role is both an identity and a resource β€” it needs a trust policy defining who can assume it. ACLs are used by S3/VPC, not IAM. Permissions Boundary limits max permissions but doesn't grant access. SCPs are AWS Organizations level.
πŸ”‘ Keywords: Trust Policy, IAM Role, Resource-Based Policy, Assume Role, Principal, STS, Permissions Boundary vs Trust Policy

Async Decoupling with SaaS + Third-Party Apps

βœ… Answer: Use Amazon EventBridge.
πŸ’‘ Why: EventBridge is the ONLY AWS event service with native third-party SaaS integration. It ingests events from 90+ AWS services and supports 15+ targets. SNS/SQS have no SaaS integration. ELB is synchronous load balancing β€” not event-driven.
πŸ”‘ Keywords: EventBridge, SaaS Integration, Async Decoupling, Third-Party, Event Bus, Event-Driven, Schema Registry

10x Traffic Spike on Dynamic Website

βœ… Answer: Use an Auto Scaling Group (ASG).
πŸ’‘ Why: ASG automatically adds/removes EC2 instances to handle any traffic level. CloudFront caches STATIC content β€” useless for highly dynamic content. S3 hosts static sites only. Route 53 Multi-Value is DNS distribution, not compute scaling.
πŸ”‘ Keywords: Auto Scaling Group, ASG, Dynamic Content, Traffic Spike, Horizontal Scaling, EC2, CloudFront Static Only

Encrypt RDS Data In-Transit

βœ… Answer: Configure Amazon RDS to use SSL/TLS.
πŸ’‘ Why: SSL/TLS encrypts data moving between the application and RDS. KMS encrypts data AT REST β€” not in transit. IAM DB auth authenticates users but does not encrypt the channel. Security group changes control network access, not encryption.
πŸ”‘ Keywords: RDS, SSL, TLS, Data-in-Transit, Encryption, In-Transit vs At-Rest, PostgreSQL, ssl_ca, Force SSL
πŸš€ SAA-C03 Complete Coverage β€” Gap Topics

Critical topics not fully covered by the practice tests. Master these for a high score.

Disaster Recovery β€” 4 Strategies (RPO / RTO)

βœ… Answer: Backup & Restore β†’ Pilot Light β†’ Warm Standby β†’ Active-Active (cheapest/slowest to costliest/fastest).
πŸ’‘ Why: RPO = how much data you can lose. RTO = how fast you recover. Backup & Restore: hours. Pilot Light: core DB replicating, apps off, RTO minutes. Warm Standby: scaled-down live clone, RTO seconds. Active-Active: full production in 2+ regions, RTO ~zero.
πŸ”‘ Keywords: RPO, RTO, Backup & Restore, Pilot Light, Warm Standby, Active-Active, Multi-Site, Disaster Recovery, Cross-Region

Secrets Manager vs SSM Parameter Store

βœ… Answer: Secrets Manager for automatic credential rotation. Parameter Store for config values and low-cost secret storage.
πŸ’‘ Why: Secrets Manager has built-in rotation for RDS/Redshift/DocumentDB and charges ~$0.40/secret/month. Parameter Store is free for standard parameters, supports hierarchy (/app/prod/db), but has no built-in rotation. Keyword 'rotate automatically' always points to Secrets Manager.
πŸ”‘ Keywords: Secrets Manager, Parameter Store, Automatic Rotation, Credentials, API Keys, RDS Password Rotation, SecureString, SSM

AWS Organizations & Service Control Policies (SCPs)

βœ… Answer: SCPs set the MAXIMUM permissions ceiling for entire accounts β€” they do NOT grant permissions and restrict even the root user.
πŸ’‘ Why: Even if an IAM policy allows an action, an SCP deny overrides it. Common exam scenario: 'prevent any account from disabling CloudTrail' or 'restrict regions to us-east-1 only' β†’ attach SCP to root OU. IAM policies work within what SCPs permit.
πŸ”‘ Keywords: SCPs, Organizations, OU, Organizational Unit, Permission Ceiling, Root User Restriction, Deny All Regions, Consolidated Billing

Elastic Beanstalk Deployment Strategies

βœ… Answer: All-at-once (fastest, downtime) β†’ Rolling β†’ Rolling+batch β†’ Immutable (safest rollback) β†’ Blue/Green (zero downtime).
πŸ’‘ Why: Blue/Green swaps Route 53 CNAME between two environments β€” zero downtime, easy rollback. Immutable creates a fresh ASG then swaps β€” safest but doubles capacity briefly. Traffic Splitting (Canary) sends a % of traffic to new version. All-at-once is fastest but causes downtime in production.
πŸ”‘ Keywords: Elastic Beanstalk, Blue/Green, Immutable, Rolling, All-at-once, Traffic Splitting, Canary, Zero Downtime, Deployment Policy

ECS vs EKS vs Fargate

βœ… Answer: ECS = AWS-native containers. EKS = managed Kubernetes. Fargate = serverless compute for either (no EC2 to manage).
πŸ’‘ Why: ECS is simpler with tight AWS integration. EKS is for teams already using Kubernetes or needing multi-cloud portability. Fargate removes server management for both. Keyword 'serverless containers' = Fargate. Keyword 'Kubernetes' = EKS. Keyword 'no server management, AWS-native' = ECS + Fargate.
πŸ”‘ Keywords: ECS, EKS, Fargate, Kubernetes, Serverless Containers, Task Definition, Service Auto Scaling, Container Orchestration

AWS Step Functions

βœ… Answer: Use Step Functions to orchestrate multi-step workflows with retry, error handling, and parallel execution β€” especially when Lambda chaining gets complex.
πŸ’‘ Why: Lambda max runtime is 15 min. Step Functions Standard Workflows can run for up to 1 year. Express Workflows handle high-volume, short-duration tasks. Built-in retry logic, error catching, and human approval states. Keywords: 'long-running workflow', 'orchestrate multiple services', 'human approval' β†’ Step Functions.
πŸ”‘ Keywords: Step Functions, State Machine, Workflow Orchestration, Standard Workflow, Express Workflow, Retry, Error Handling, Human Approval

AWS Backup

βœ… Answer: AWS Backup centralizes backup management across EC2, EBS, RDS, DynamoDB, EFS, FSx, and Storage Gateway from one console.
πŸ’‘ Why: Before AWS Backup, you had to configure backup policies service by service. AWS Backup creates backup plans with schedules and retention. Backup Vault Lock enables WORM (Write Once Read Many) for immutable backups β€” cannot be deleted even by admin. Keyword 'centralized backup compliance' or 'cross-account backup' β†’ AWS Backup.
πŸ”‘ Keywords: AWS Backup, Backup Plan, Backup Vault, Vault Lock, WORM, Cross-Region Backup, Cross-Account Backup, Centralized Backup

FSx for Windows vs FSx for Lustre

βœ… Answer: FSx for Windows = SMB + Active Directory for Windows workloads. FSx for Lustre = sub-millisecond HPC/ML file system.
πŸ’‘ Why: FSx for Windows supports DFS namespaces, AD integration, and SMB protocol β€” ideal for migrating Windows file servers. FSx for Lustre delivers hundreds of GB/s throughput, integrates with S3 for data lake pipelines, and is used for ML training, genomics, financial simulations. Keyword 'Windows file server on AWS' β†’ FSx Windows. Keyword 'HPC, ML training, sub-ms latency' β†’ FSx Lustre.
πŸ”‘ Keywords: FSx for Windows, FSx for Lustre, SMB, Active Directory, HPC, ML Training, Sub-millisecond, S3 Integration, Parallel File System

Amazon RDS Proxy

βœ… Answer: Use RDS Proxy between Lambda and RDS to pool connections and prevent connection exhaustion.
πŸ’‘ Why: Lambda can scale to thousands of concurrent executions, each opening a new DB connection β€” this exhausts RDS max connections. RDS Proxy pools connections, reuses them, and reduces failover time by up to 66%. Supports IAM authentication. If exam says 'Lambda + RDS + connection limit' β†’ answer is RDS Proxy.
πŸ”‘ Keywords: RDS Proxy, Connection Pooling, Lambda RDS, Connection Exhaustion, Faster Failover, IAM Auth, Managed Proxy

AWS Config vs CloudTrail

βœ… Answer: CloudTrail = WHO made the API call. Config = WHAT the resource configuration is and how it changed.
πŸ’‘ Why: CloudTrail logs every API call (who, when, from where). Config continuously records resource state and evaluates compliance rules β€” e.g. 'is this security group open to 0.0.0.0/0?'. Config can auto-remediate via SSM Automation. Use both together: Config detects the misconfiguration, CloudTrail shows who caused it.
πŸ”‘ Keywords: AWS Config, CloudTrail, Configuration History, Compliance Rules, Auto-Remediation, Resource State, API Audit Log, WHAT vs WHO

Amazon Macie

βœ… Answer: Macie uses ML to discover and classify sensitive data (PII, credentials, financial) in Amazon S3.
πŸ’‘ Why: Macie scans S3 objects, identifies sensitive content, and alerts on exposed data. GDPR/HIPAA compliance in S3 β†’ Macie. Do NOT confuse: GuardDuty = threat/malicious activity. Inspector = CVE vulnerabilities in EC2/containers. Config = resource compliance. Macie = sensitive DATA in S3.
πŸ”‘ Keywords: Macie, PII, Sensitive Data, S3 Classification, GDPR, HIPAA, Data Discovery, ML-powered, Personally Identifiable Information

Cost Explorer vs Budgets vs Cost Anomaly Detection

βœ… Answer: Cost Explorer = analyze + forecast. AWS Budgets = threshold alerts. Cost Anomaly Detection = ML-powered unexpected spike alerts.
πŸ’‘ Why: Cost Explorer shows historical spend, trends, and RI/Savings Plans recommendations. Budgets sends alerts when you hit a defined $ threshold and can trigger automated actions. Cost Anomaly Detection requires no manual threshold β€” it learns your baseline and alerts when spend deviates unexpectedly. Keyword 'unexpected cost spike' β†’ Anomaly Detection.
πŸ”‘ Keywords: Cost Explorer, AWS Budgets, Cost Anomaly Detection, RI Recommendations, Savings Plans, Budget Actions, Forecast, Cost Allocation Tags

Cost Allocation Tags

βœ… Answer: Activate Cost Allocation Tags in Billing Console to track spend by team, project, or department in Cost Explorer.
πŸ’‘ Why: Without tags, all costs are mixed together. Tags like Environment=Production, Team=DataEng allow Cost Explorer to break down spend. Must be ACTIVATED in Billing Console to appear in reports. Use AWS Config rules or SCPs (via Tag Policies) to enforce tagging. Keyword 'showback/chargeback', 'cost by team' β†’ Cost Allocation Tags.
πŸ”‘ Keywords: Cost Allocation Tags, Tag Policy, Chargeback, Showback, Billing Console Activation, Cost Explorer Tags, AWS Organizations Tag Policies

AWS Graviton (ARM-based Instances)

βœ… Answer: Graviton instances (M6g, C7g, R7g, etc.) deliver up to 40% better price-performance than equivalent x86 instances for Linux workloads.
πŸ’‘ Why: AWS designed Graviton processors in-house using ARM architecture. They cost less and perform better for most Linux/containerized workloads. NOT for Windows (x86 only) or apps requiring x86 binary compatibility. Keyword 'best price-performance for compute' or 'reduce EC2 cost without Reserved Instances' β†’ Graviton.
πŸ”‘ Keywords: Graviton, ARM, M6g, C7g, R7g, Price-Performance, 40% cheaper, Linux, Containerized, AWS-designed

DataSync vs Storage Gateway

βœ… Answer: DataSync = migrate/transfer data to AWS. Storage Gateway = ongoing hybrid access between on-prem and AWS storage.
πŸ’‘ Why: DataSync is for moving data: NFS/SMB on-prem to S3/EFS/FSx. It's fast, encrypted, and validates data integrity. Storage Gateway keeps on-prem apps working while storing data in AWS β€” File Gateway (S3), Volume Gateway (EBS snapshots), Tape Gateway (Glacier). Keyword 'migrate files to AWS' β†’ DataSync. Keyword 'on-prem apps need AWS storage' β†’ Storage Gateway.
πŸ”‘ Keywords: DataSync, Storage Gateway, Migration, Hybrid Storage, NFS, SMB, File Gateway, Volume Gateway, One-Time Transfer, Ongoing Access

VPN: Customer Gateway vs Virtual Private Gateway

βœ… Answer: VGW (Virtual Private Gateway) = AWS side. CGW (Customer Gateway) = your on-premises router/firewall side.
πŸ’‘ Why: Site-to-Site VPN creates 2 encrypted tunnels between CGW and VGW for redundancy. For HA: use 2 CGWs. For throughput scale: replace VGW with Transit Gateway (supports ECMP across multiple VPN tunnels). VGW does NOT support ECMP β€” only TGW does.
πŸ”‘ Keywords: Customer Gateway, Virtual Private Gateway, VGW, CGW, Site-to-Site VPN, IPSec, BGP, Static Routing, Redundancy, Two Tunnels
🎯 Common Scenarios β†’ AWS Service Mapping

Storage Scenarios

Object storage with 99.999999999% durability
Scenario β†’ Service
S3
Block storage for EC2 instances
Scenario β†’ Service
EBS
Shared file system across multiple EC2 instances
Scenario β†’ Service
EFS
Archive data for 7-10 years at lowest cost
Scenario β†’ Service
S3 Glacier Deep Archive
Hybrid cloud storage with on-premises caching
Scenario β†’ Service
Storage Gateway

Database Scenarios

Relational database with automatic failover
Scenario β†’ Service
RDS Multi-AZ
NoSQL database with single-digit millisecond latency
Scenario β†’ Service
DynamoDB
MySQL/PostgreSQL 5x faster performance
Scenario β†’ Service
Aurora
In-memory caching for database queries
Scenario β†’ Service
ElastiCache
Petabyte-scale data warehouse for analytics
Scenario β†’ Service
Redshift

Networking Scenarios

Distribute traffic across EC2 instances (HTTP/HTTPS)
Scenario β†’ Service
Application Load Balancer
Low-latency load balancing (TCP/UDP)
Scenario β†’ Service
Network Load Balancer
Global content delivery with edge caching
Scenario β†’ Service
CloudFront
Private connectivity to AWS services (no internet)
Scenario β†’ Service
VPC Endpoints
Connect on-premises to AWS over dedicated line
Scenario β†’ Service
Direct Connect
Connect multiple VPCs in hub-and-spoke model
Scenario β†’ Service
Transit Gateway

Security Scenarios

Block SQL injection and XSS attacks
Scenario β†’ Service
AWS WAF
Managed encryption key service
Scenario β†’ Service
AWS KMS
Intelligent threat detection using ML
Scenario β†’ Service
GuardDuty
Track all API calls for auditing
Scenario β†’ Service
CloudTrail
Discover and protect sensitive data in S3
Scenario β†’ Service
Macie
🌳 Quick Decision Trees

Which Load Balancer?

βœ… ALB: HTTP/HTTPS traffic, path/host-based routing, Lambda targets, containerized apps
βœ… NLB: TCP/UDP traffic, extreme performance (<100ms), static IP, PrivateLink
βœ… GWLB: Deploy/scale 3rd-party virtual appliances (firewalls, IDS/IPS)
⚠️ CLB: Legacy - avoid for new deployments

Which S3 Storage Class?

βœ… S3 Standard: Frequently accessed data, low latency
βœ… S3 Standard-IA: Infrequent access, immediate retrieval, cheaper than Standard
βœ… S3 One Zone-IA: Infrequent access, non-critical data, 20% cheaper than Standard-IA
βœ… S3 Intelligent-Tiering: Unknown/changing access patterns, automatic tier optimization
βœ… S3 Glacier Instant Retrieval: Archive with millisecond retrieval, quarterly access
βœ… S3 Glacier Flexible Retrieval: Archive with minutes-hours retrieval, 1-2x/year access
βœ… S3 Glacier Deep Archive: Long-term archive, 12-hour retrieval, lowest cost

Which Database?

βœ… RDS: Traditional relational (MySQL, PostgreSQL, Oracle, SQL Server, MariaDB)
βœ… Aurora: High-performance MySQL/PostgreSQL compatible, auto-scaling storage
βœ… DynamoDB: NoSQL key-value, single-digit ms latency, serverless, auto-scaling
βœ… ElastiCache: In-memory caching (Redis for complex, Memcached for simple)
βœ… Redshift: Petabyte-scale data warehouse, columnar storage, analytics
βœ… DocumentDB: MongoDB-compatible document database
βœ… Neptune: Graph database for highly connected datasets

Which Compute?

βœ… EC2: Full control, persistent workloads, specific OS/software requirements
βœ… Lambda: Event-driven, short-lived (<15 min), serverless, pay per invocation
βœ… ECS: Docker containers, AWS-native orchestration
βœ… EKS: Kubernetes containers, complex orchestration needs
βœ… Fargate: Serverless containers (ECS/EKS), no server management
βœ… Batch: Batch processing jobs, automatic provisioning
πŸ“ Exam Strategy Tips

🎯 Question Analysis Strategy

1️⃣ Identify the scenario: Read carefully for keywords (high availability, cost-effective, low latency, etc.)
2️⃣ Eliminate wrong answers: Remove obviously incorrect options first
3️⃣ Look for AWS best practices: Managed services > self-managed, Multi-AZ > single AZ, etc.
4️⃣ Watch for qualifiers: "MOST cost-effective", "LEAST operational overhead", "HIGHEST performance"
5️⃣ Multiple correct answers: For "Select TWO/THREE" questions, ensure all selections work together

βœ… Green Flags (Usually Correct Answers)

βœ… AWS managed services over self-managed (RDS vs MySQL on EC2)
βœ… Multi-AZ deployments for high availability
βœ… Auto Scaling for handling variable load
βœ… CloudFormation/IaC for infrastructure automation
βœ… IAM roles over hardcoded credentials
βœ… Encryption at rest and in transit
βœ… Least privilege access principle
βœ… Decoupled architectures (SQS, SNS, EventBridge)
βœ… Serverless options (Lambda, Fargate, DynamoDB)

❌ Red Flags (Usually Wrong Answers)

❌ Single points of failure (single AZ, single instance)
❌ Manual processes that can be automated
❌ Overly complex solutions when simple ones exist
❌ Self-managed when AWS-managed available
❌ Hardcoded credentials in application code
❌ Public access when private is possible
❌ Ignoring encryption requirements
❌ Cross-region without justification (adds cost/complexity)

⚑ Common Traps to Avoid

⚠️ Read Replica β‰  Multi-AZ: Read replicas are for read scaling, Multi-AZ is for HA/failover
⚠️ Security Groups β‰  NACLs: SG is stateful (instance-level), NACL is stateless (subnet-level)
⚠️ CloudWatch β‰  CloudTrail: CloudWatch monitors metrics, CloudTrail logs API calls
⚠️ Gateway Endpoint β‰  Interface Endpoint: Gateway only for S3/DynamoDB, Interface for other services
⚠️ Standard SQS β‰  FIFO SQS: Standard is at-least-once, FIFO is exactly-once with ordering
⚠️ NAT Gateway β‰  Internet Gateway: NAT for private subnet outbound, IGW for public subnet bidirectional
🧠 Memory Aids & Mnemonics

S3 Storage Classes (Cost: Low β†’ High)

πŸ’° Glacier Deep Archive β†’ Glacier Flexible β†’ Glacier Instant β†’ One Zone-IA β†’ Standard-IA β†’ Intelligent-Tiering β†’ Standard

EC2 Instance Types (Remember: FIGHT DR MC PX)

πŸ–₯️ FPGA, Instance Store (high I/O), GPU, High disk throughput
πŸ–₯️ Dense storage, RAM (memory), Main (general), CPU (compute)
πŸ–₯️ Pics (GPU graphics), Xtreme memory

Well-Architected Framework Pillars

πŸ›οΈ CROPS: Cost Optimization, Reliability, Operational Excellence, Performance Efficiency, Security

RDS vs Aurora vs DynamoDB

πŸ—„οΈ RDS: Traditional relational, Multi-AZ for HA, Read Replicas for scaling
πŸ—„οΈ Aurora: MySQL/PostgreSQL compatible, 5x/3x faster, auto-scaling storage, global database
πŸ—„οΈ DynamoDB: NoSQL key-value, single-digit ms latency, serverless, global tables

VPC Endpoint Types

πŸ”Œ Gateway Endpoints: S3 and DynamoDB ONLY (uses route table)
πŸ”Œ Interface Endpoints: All other AWS services (uses ENI with private IP)

πŸ“š AWS Services

πŸ” Search AWS Services

πŸ—οΈ Architecture Builder

🎯 Difficulty Level
0/10
🟒 Beginner Completed
0/0
🟑 Intermediate Completed
0/0
πŸ”΄ Advanced Completed
Loading…

Requirements:
    πŸ—‚οΈ Service Palette
    🟑 Highlighted = recommended for this scenario
    Drag or double-click to add to canvas
    πŸ”— Click another service to draw a connection, or click the same service to cancel
    100% Click service β†’ click another to connect β€’ Click arrow to delete

    πŸ“„ Sample Questions

    Try these 10 hand-picked questions to experience the quality of our content. No signup required!

    10 Sample Questions
    5 AWS Domains
    100% Free Forever
    Question 1 of 10
    ⏸️
    Exam Paused

    Your progress is saved. Click Resume when you're ready.

    🎯 Visual Architecture Exam

    Master AWS by building architectures, not just memorizing answers

    20
    Questions
    40
    Total Points
    --
    Pass Score

    πŸ“‹ How It Works

    1

    Read the Scenario

    Understand the AWS requirements

    2

    Select Your Answer

    Choose A, B, C, or D β€” earn 1 point

    3

    Build the Architecture

    Drag AWS services on canvas β€” earn up to 1 point

    4

    Get Dual Scoring

    Instant feedback on answer + architecture

    Choose Your Mode

    ⏱️

    Timed Mode

    20 questions in 20 minutes β€” simulate real exam pressure

    • βœ“ 20 questions
    • βœ“ 1 minute per question
    • βœ“ Pass score: 71% (29/40)
    • βœ“ Up to 2 pauses (5 min each)
    πŸ“š

    Practice Mode

    Learn at your own pace β€” no timer, instant feedback

    • βœ“ All 20 questions
    • βœ“ No time limit
    • βœ“ Skip & review
    • βœ“ Detailed explanations