Free Practice Questions for AWS Certified CloudOps Engineer - Associate (SOA-C03) Certification
Study with 364 exam-style practice questions designed to help you prepare for the AWS Certified CloudOps Engineer - Associate (SOA-C03).
Start Practicing
Random Questions
Practice with randomly mixed questions from all topics
Domain Mode
Practice questions from a specific topic area
Exam Information
Exam Details
Key information about AWS Certified CloudOps Engineer - Associate (SOA-C03)
associate (intermediate)
Multiple choice, multiple response
720 out of 1000
1 year of experience with deployment, management, troubleshooting, networking, and security on AWS; 1 year in a related operations role (e.g., system administrator)
CloudOps engineers
50 scored questions (plus 15 unscored)
Exam Topics & Skills Assessed
Skills measured (from the official study guide)
Domain 1: Monitoring, Logging, Analysis, Remediation, and Performance Optimization
Subdomain 1.1: Implement metrics, alarms, and ļ¬lters by using AWS monitoring and logging services
⢠Conļ¬gure AWS monitoring and logging by using AWS services (for example, Amazon CloudWatch, AWS CloudTrail, Amazon Managed Service for Prometheus) ⢠Conļ¬gure and manage the CloudWatch agent to collect metrics and logs from Amazon EC2 instances, Amazon Elastic Container Service (Amazon ECS) clusters, or Amazon Elastic Kubernetes Service (Amazon EKS) clusters ⢠Conļ¬gure, identify, and troubleshoot CloudWatch alarms that can invoke AWS services directly or through Amazon EventBridge (for example, by creating composite alarms and identifying their invokable actions) ⢠Create, implement, and manage customizable and shareable CloudWatch dashboards that display metrics and alarms for AWS resources across multiple accounts and AWS Regions ⢠Conļ¬gure AWS services to send notiļ¬cations to Amazon Simple Notiļ¬cation Service (Amazon SNS) and to invoke alarms that send notiļ¬cations to Amazon SNS
Subdomain 1.2: Identify and remediate issues by using monitoring and availability metrics
⢠Analyze performance metrics and automate remediation strategies by using AWS services and functionality (for example, CloudWatch, AWS User Notiļ¬cations, AWS Lambda, AWS Systems Manager, CloudTrail, auto scaling) ⢠Use EventBridge to route, enrich, and deliver events, and troubleshoot any issues with event bus rules ⢠Create or run custom and predeļ¬ned Systems Manager Automation runbooks (for example, by using AWS SDKs or custom scripts) to automate tasks and streamline processes on AWS
Subdomain 1.3: Implement performance optimization strategies for compute, storage, and database resources
⢠Optimize compute resources and remediate performance problems by using performance metrics, resource tags, and AWS tools ⢠Analyze Amazon Elastic Block Store (Amazon EBS) performance metrics, troubleshoot issues, and optimize volume types to improve performance and reduce cost ⢠Implement and optimize Amazon S3 performance strategies (for example, AWS DataSync, S3 Transfer Acceleration, multipart uploads, S3 Lifecycle policies) to enhance data transfer, storage eļ¬ciency, and access patterns ⢠Evaluate and select shared storage solutions (for example, Amazon Elastic File System [Amazon EFS], Amazon FSx), and optimize the solutions (for example, EFS lifecycle policies) for speciļ¬c use cases and requirements ⢠Monitor Amazon RDS metrics (for example, Amazon RDS Performance Insights, CloudWatch alarms), and modify conļ¬gurations to increase performance eļ¬ciency (for example, Performance Insights proactive recommendations, RDS Proxy) ⢠Implement, monitor, and optimize EC2 instances and their associated storage and networking capabilities (for example, EC2 placement groups)
Domain 2: Reliability and Business Continuity
Subdomain 2.1: Implement scalability and elasticity
⢠Conļ¬gure and manage scaling mechanisms in compute environments ⢠Implement caching by using AWS services to enhance dynamic scalability (for example, Amazon CloudFront, Amazon ElastiCache) ⢠Conļ¬gure and manage scaling in AWS managed databases (for example, Amazon RDS, Amazon DynamoDB)
Subdomain 2.2: Implement highly available and resilient environments
⢠Conļ¬gure and troubleshoot Elastic Load Balancing (ELB) and Amazon Route 53 health checks ⢠Conļ¬gure fault-tolerant systems (for example, Multi-AZ deployments)
Subdomain 2.3: Implement backup and restore strategies
⢠Automate snapshots and backups for AWS resources (for example, Amazon EC2 instances, RDS DB instances, Amazon Elastic Block Store [Amazon EBS] volumes, Amazon S3 buckets, DynamoDB tables) by using AWS services (for example, AWS Backup) ⢠Use various methods to restore databases (for example, point-in-time restore) to meet recovery time objective (RTO), recovery point objective (RPO), and cost requirements ⢠Implement versioning for storage services (for example, Amazon S3, Amazon FSx) ⢠Follow disaster recovery procedures
Domain 3: Deployment, Provisioning, and Automation
Subdomain 3.1: Provision and maintain cloud resources
⢠Create and manage AMIs and container images (for example, Amazon EC2 Image Builder) ⢠Create and manage stacks of resources by using AWS CloudFormation and the AWS Cloud Development Kit (AWS CDK) ⢠Identify and remediate deployment issues (for example, subnet sizing issues, CloudFormation errors, permissions issues) ⢠Provision and share resources across multiple AWS Regions and accounts (for example, AWS Resource Access Manager [AWS RAM], CloudFormation StackSets) ⢠Implement deployment strategies and services ⢠Use and manage third-party tools to automate resource deployment (for example, Terraform, Git)
Subdomain 3.2: Automate the management of existing resources
⢠Use AWS services to automate operational processes (for example, AWS Systems Manager) ⢠Implement event-driven automation by using AWS services and features (for example, AWS Lambda, Amazon S3 Event Notiļ¬cations)
Domain 4: Security and Compliance
Subdomain 4.1: Implement and manage security and compliance tools and policies
⢠Implement AWS Identity and Access Management (IAM) features (for example, password policies, multi-factor authentication [MFA], roles, federated identity, resource policies, policy conditions) ⢠Troubleshoot and audit access issues by using AWS tools (for example, AWS CloudTrail, IAM Access Analyzer, IAM policy simulator) ⢠Implement multi-account strategies securely ⢠Implement remediation based on the results of AWS Trusted Advisor security checks ⢠Enforce compliance requirements (for example, AWS Region and service selections)
Subdomain 4.2: Implement strategies to protect data and infrastructure
⢠Implement and enforce a data classiļ¬cation scheme ⢠Implement, conļ¬gure, and troubleshoot encryption at rest (for example, AWS Key Management Service [AWS KMS]) ⢠Implement, conļ¬gure, and troubleshoot encryption in transit (for example, AWS Certiļ¬cate Manager [ACM]) ⢠Securely store secrets by using AWS services ⢠Conļ¬gure reports and remediate ļ¬ndings from AWS services (for example, AWS Security Hub, Amazon GuardDuty, AWS Conļ¬g, Amazon Inspector)
Domain 5: Networking and Content Delivery
Subdomain 5.1: Implement and optimize networking features and connectivity
⢠Conļ¬gure a VPC (for example, subnets, route tables, network ACLs, security groups, NAT gateways, internet gateway, egress-only internet gateway) ⢠Conļ¬gure private networking connectivity ⢠Audit AWS network protection services (for example, Amazon Route 53 Resolver DNS Firewall, AWS WAF, AWS Shield, AWS Network Firewall) in a single account ⢠Optimize the cost of network architectures
Subdomain 5.2: Conļ¬gure domains, DNS services, and content delivery
⢠Conļ¬gure DNS (for example, Route 53 Resolver) ⢠Implement Route 53 routing policies, conļ¬gurations, and query logging ⢠Conļ¬gure content and service distribution (for example, Amazon CloudFront, AWS Global Accelerator)
Subdomain 5.3: Troubleshoot network connectivity issues
⢠Troubleshoot VPC conļ¬gurations (for example, subnets, route tables, network ACLs, security groups, transit gateways, NAT gateways) ⢠Collect and interpret networking logs to troubleshoot issues (for example, VPC ļ¬ow logs, Elastic Load Balancing [ELB] access logs, AWS WAF web ACL logs, CloudFront logs, container logs) ⢠Identify and remediate CloudFront caching issues ⢠Identify and troubleshoot hybrid connectivity issues and private connectivity issues ⢠Conļ¬gure and analyze Amazon CloudWatch network monitoring services
Techniques & products