SAA L2P 801-897 v24.021 Flashcards
QUESTION 897
A social media company is creating a rewards program website for its users. The company gives
users points when users create and upload videos to the website. Users redeem their points for
gifts or discounts from the company’s affiliated partners. A unique ID identifies users. The
partners refer to this ID to verify user eligibility for rewards.
The partners want to receive notification of user IDs through an HTTP endpoint when the
company gives users points. Hundreds of vendors are interested in becoming affiliated partners
every day. The company wants to design an architecture that gives the website the ability to add
partners rapidly in a scalable way.
Which solution will meet these requirements with the LEAST implementation effort?
A. Create an Amazon Timestream database to keep a list of affiliated partners. Implement an AWS
Lambda function to read the list. Configure the Lambda function to send user IDs to each partner
when the company gives users points.
B. Create an Amazon Simple Notification Service (Amazon SNS) topic. Choose an endpoint protocol.
Subscribe the partners to the topic. Publish user IDs to the topic when the company gives users
points.
C. Create an AWS Step Functions state machine. Create a task for every affiliated partner. Invoke the
state machine with user IDs as input when the company gives users points.
D. Create a data stream in Amazon Kinesis Data Streams. Implement producer and consumer
applications. Store a list of affiliated partners in the data stream. Send user IDs when the company
gives users points.
B. Create an Amazon Simple Notification Service (Amazon SNS) topic. Choose an endpoint protocol.
Subscribe the partners to the topic. Publish user IDs to the topic when the company gives users
points.
QUESTION 896
A company uses AWS to run its ecommerce platform. The platform is critical to the company’s
operations and has a high volume of traffic and transactions. The company configures a multi-
factor authentication (MFA) device to secure its AWS account root user credentials. The company
wants to ensure that it will not lose access to the root user account if the MFA device is lost.
Which solution will meet these requirements?
A. Set up a backup administrator account that the company can use to log in if the company loses the
MFA device.
B. Add multiple MFA devices for the root user account to handle the disaster scenario.
C. Create a new administrator account when the company cannot access the root account.
D. Attach the administrator policy to another IAM user when the company cannot access the root
account.
B. Add multiple MFA devices for the root user account to handle the disaster scenario.
QUESTION 895
A company needs a solution to prevent photos with unwanted content from being uploaded to the
company’s web application. The solution must not involve training a machine learning (ML)
model.
Which solution will meet these requirements?
A. Create and deploy a model by using Amazon SageMaker Autopilot. Create a real-time endpoint
that the web application invokes when new photos are uploaded.
B. Create an AWS Lambda function that uses Amazon Rekognition to detect unwanted content.
Create a Lambda function URL that the web application invokes when new photos are uploaded.
C. Create an Amazon CloudFront function that uses Amazon Comprehend to detect unwanted
content. Associate the function with the web application.
D. Create an AWS Lambda function that uses Amazon Rekognition Video to detect unwanted
content. Create a Lambda function URL that the web application invokes when new photos are
uploaded.
B. Create an AWS Lambda function that uses Amazon Rekognition to detect unwanted content.
Create a Lambda function URL that the web application invokes when new photos are uploaded.
QUESTION 894
A company is designing a tightly coupled high performance computing (HPC) environment in the
AWS Cloud. The company needs to include features that will optimize the HPC environment for
networking and storage.
Which combination of solutions will meet these requirements? (Choose two.)
A. Create an accelerator in AWS Global Accelerator. Configure custom routing for the accelerator.
B. Create an Amazon FSx for Lustre file system. Configure the file system with scratch storage.
C. Create an Amazon CloudFront distribution. Configure the viewer protocol policy to be HTTP and
HTTPS.
D. Launch Amazon EC2 instances. Attach an Elastic Fabric Adapter (EFA) to the instances.
E. Create an AWS Elastic Beanstalk deployment to manage the environment.
B. Create an Amazon FSx for Lustre file system. Configure the file system with scratch storage.
D. Launch Amazon EC2 instances. Attach an Elastic Fabric Adapter (EFA) to the instances.
QUESTION 893
A company wants to analyze and generate reports to track the usage of its mobile app. The app
is popular and has a global user base. The company uses a custom report building program to
analyze application usage.
The program generates multiple reports during the last week of each month. The program takes
less than 10 minutes to produce each report. The company rarely uses the program to generate
reports outside of the last week of each month The company wants to generate reports in the
least amount of time when the reports are requested.
Which solution will meet these requirements MOST cost-effectively?
A. Run the program by using Amazon EC2 On-Demand Instances. Create an Amazon EventBridge
rule to start the EC2 instances when reports are requested. Run the EC2 instances continuously
during the last week of each month.
B. Run the program in AWS Lambda. Create an Amazon EventBridge rule to run a Lambda function
when reports are requested.
C. Run the program in Amazon Elastic Container Service (Amazon ECS). Schedule Amazon ECS to
run the program when reports are requested.
D. Run the program by using Amazon EC2 Spot Instances. Create an Amazon EventBndge rule to
start the EC2 instances when reports are requested. Run the EC2 instances continuously during
the last week of each month.
B. Run the program in AWS Lambda. Create an Amazon EventBridge rule to run a Lambda function
when reports are requested.
QUESTION 892
A company has a mobile app for customers. The app’s data is sensitive and must be encrypted at
rest. The company uses AWS Key Management Service (AWS KMS).
The company needs a solution that prevents the accidental deletion of KMS keys. The solution
must use Amazon Simple Notification Service (Amazon SNS) to send an email notification to
administrators when a user attempts to delete a KMS key.
Which solution will meet these requirements with the LEAST operational overhead?
A. Create an Amazon EventBridge rule that reacts when a user tries to delete a KMS key. Configure
an AWS Config rule that cancels any deletion of a KMS key. Add the AWS Config rule as a target
of the EventBridge rule. Create an SNS topic that notifies the administrators.
B. Create an AWS Lambda function that has custom logic to prevent KMS key deletion. Create an
Amazon CloudWatch alarm that is activated when a user tries to delete a KMS key. Create an
Amazon EventBridge rule that invokes the Lambda function when the DeleteKey operation is
performed. Create an SNS topic. Configure the EventBridge rule to publish an SNS message that
notifies the administrators.
C. Create an Amazon EventBridge rule that reacts when the KMS DeleteKey operation is performed.
Configure the rule to initiate an AWS Systems Manager Automation runbook. Configure the runbook to cancel the deletion of the KMS key. Create an SNS topic. Configure the EventBridge
rule to publish an SNS message that notifies the administrators.
D. Create an AWS CloudTrail trail. Configure the trail to deliver logs to a new Amazon CloudWatch
log group. Create a CloudWatch alarm based on the metric filter for the CloudWatch log group.
Configure the alarm to use Amazon SNS to notify the administrators when the KMS DeleteKey
operation is performed.
C. Create an Amazon EventBridge rule that reacts when the KMS DeleteKey operation is performed.
Configure the rule to initiate an AWS Systems Manager Automation runbook. Configure the runbook to cancel the deletion of the KMS key. Create an SNS topic. Configure the EventBridge
rule to publish an SNS message that notifies the administrators.
QUESTION 891
An analytics company uses Amazon VPC to run its multi-tier services. The company wants to use
RESTful APIs to offer a web analytics service to millions of users. Users must be verified by using
an authentication service to access the APIs.
Which solution will meet these requirements with the MOST operational efficiency?
A. Configure an Amazon Cognito user pool for user authentication. Implement Amazon API Gateway
REST APIs with a Cognito authorizer.
B. Configure an Amazon Cognito identity pool for user authentication. Implement Amazon API
Gateway HTTP APIs with a Cognito authorizer.
C. Configure an AWS Lambda function to handle user authentication. Implement Amazon API
Gateway REST APIs with a Lambda authorizer.
D. Configure an IAM user to handle user authentication. Implement Amazon API Gateway HTTP APIs
with an IAM authorizer.
A. Configure an Amazon Cognito user pool for user authentication. Implement Amazon API Gateway
REST APIs with a Cognito authorizer.
QUESTION 890
A company has AWS Lambda functions that use environment variables. The company does not want its developers to see environment variables in plaintext.
Which solution will meet these requirements?
A. Deploy code to Amazon EC2 instances instead of using Lambda functions.
B. Configure SSL encryption on the Lambda functions to use AWS CloudHSM to store and encrypt
the environment variables.
C. Create a certificate in AWS Certificate Manager (ACM). Configure the Lambda functions to use the
certificate to encrypt the environment variables.
D. Create an AWS Key Management Service (AWS KMS) key. Enable encryption helpers on the
Lambda functions to use the KMS key to store and encrypt the environment variables.
D. Create an AWS Key Management Service (AWS KMS) key. Enable encryption helpers on the
Lambda functions to use the KMS key to store and encrypt the environment variables.
QUESTION 889
A company’s web application that is hosted in the AWS Cloud recently increased in popularity.
The web application currently exists on a single Amazon EC2 instance in a single public subnet.
The web application has not been able to meet the demand of the increased web traffic.
The company needs a solution that will provide high availability and scalability to meet the
increased user demand without rewriting the web application.
Which combination of steps will meet these requirements? (Choose two.)
A. Replace the EC2 instance with a larger compute optimized instance.
B. Configure Amazon EC2 Auto Scaling with multiple Availability Zones in private subnets.
C. Configure a NAT gateway in a public subnet to handle web requests.
D. Replace the EC2 instance with a larger memory optimized instance.
E. Configure an Application Load Balancer in a public subnet to distribute web traffic.
B. Configure Amazon EC2 Auto Scaling with multiple Availability Zones in private subnets.
E. Configure an Application Load Balancer in a public subnet to distribute web traffic.
QUESTION 888
A company needs a solution to prevent AWS CloudFormation stacks from deploying AWS
Identity and Access Management (IAM) resources that include an inline policy or “” in the
statement. The solution must also prohibit deployment of Amazon EC2 instances with public IP
addresses. The company has AWS Control Tower enabled in its organization in AWS
Organizations.
Which solution will meet these requirements?
A. Use AWS Control Tower proactive controls to block deployment of EC2 instances with public IP
addresses and inline policies with elevated access or “”.
B. Use AWS Control Tower detective controls to block deployment of EC2 instances with public IP
addresses and inline policies with elevated access or “*”.
C. Use AWS Config to create rules for EC2 and IAM compliance. Configure the rules to run an AWS
Systems Manager Session Manager automation to delete a resource when it is not compliant.
D. Use a service control policy (SCP) to block actions for the EC2 instances and IAM resources if the
actions lead to noncompliance.
D. Use a service control policy (SCP) to block actions for the EC2 instances and IAM resources if the
actions lead to noncompliance.
QUESTION 887
A company has stored 10 TB of log files in Apache Parquet format in an Amazon S3 bucket. The
company occasionally needs to use SQL to analyze the log files.
Which solution will meet these requirements MOST cost-effectively?
A. Create an Amazon Aurora MySQL database. Migrate the data from the S3 bucket into Aurora by using AWS Database Migration Service (AWS DMS). Issue SQL statements to the Aurora
database.
B. Create an Amazon Redshift cluster. Use Redshift Spectrum to run SQL statements directly on the
data in the S3 bucket.
C. Create an AWS Glue crawler to store and retrieve table metadata from the S3 bucket. Use
Amazon Athena to run SQL statements directly on the data in the S3 bucket.
D. Create an Amazon EMR cluster. Use Apache Spark SQL to run SQL statements directly on the
data in the S3 bucket.
C. Create an AWS Glue crawler to store and retrieve table metadata from the S3 bucket. Use
Amazon Athena to run SQL statements directly on the data in the S3 bucket.
QUESTION 886
A company has an organization in AWS Organizations that has all features enabled. The
company requires that all API calls and logins in any existing or new AWS account must be
audited. The company needs a managed solution to prevent additional work and to minimize
costs. The company also needs to know when any AWS account is not compliant with the AWS
Foundational Security Best Practices (FSBP) standard.
Which solution will meet these requirements with the LEAST operational overhead?
A. Deploy an AWS Control Tower environment in the Organizations management account. Enable
AWS Security Hub and AWS Control Tower Account Factory in the environment.
B. Deploy an AWS Control Tower environment in a dedicated Organizations member account.
Enable AWS Security Hub and AWS Control Tower Account Factory in the environment.
C. Use AWS Managed Services (AMS) Accelerate to build a multi-account landing zone (MALZ).
Submit an RFC to self-service provision Amazon GuardDuty in the MALZ.
D. Use AWS Managed Services (AMS) Accelerate to build a multi-account landing zone (MALZ).
Submit an RFC to self-service provision AWS Security Hub in the MALZ.
A. Deploy an AWS Control Tower environment in the Organizations management account. Enable
AWS Security Hub and AWS Control Tower Account Factory in the environment.
QUESTION 885
A company runs multiple workloads in its on-premises data center. The company’s data center
cannot scale fast enough to meet the company’s expanding business needs. The company wants
to collect usage and configuration data about the on-premises servers and workloads to plan a
migration to AWS.
Which solution will meet these requirements?
A. Set the home AWS Region in AWS Migration Hub. Use AWS Systems Manager to collect data
about the on-premises servers.
B. Set the home AWS Region in AWS Migration Hub. Use AWS Application Discovery Service to
collect data about the on-premises servers.
C. Use the AWS Schema Conversion Tool (AWS SCT) to create the relevant templates. Use AWS
Trusted Advisor to collect data about the on-premises servers.
D. Use the AWS Schema Conversion Tool (AWS SCT) to create the relevant templates. Use AWS
Database Migration Service (AWS DMS) to collect data about the on-premises servers.
B. Set the home AWS Region in AWS Migration Hub. Use AWS Application Discovery Service to
collect data about the on-premises servers.
QUESTION 884
A solutions architect is designing a payment processing application that runs on AWS Lambda in
private subnets across multiple Availability Zones. The application uses multiple Lambda
functions and processes millions of transactions each day.
The architecture must ensure that the application does not process duplicate payments.
Which solution will meet these requirements?
A. Use Lambda to retrieve all due payments. Publish the due payments to an Amazon S3 bucket.
Configure the S3 bucket with an event notification to invoke another Lambda function to process
the due payments.
B. Use Lambda to retrieve all due payments. Publish the due payments to an Amazon Simple Queue
Service (Amazon SQS) queue. Configure another Lambda function to poll the SQS queue and to
process the due payments.
C. Use Lambda to retrieve all due payments. Publish the due payments to an Amazon Simple Queue
Service (Amazon SQS) FIFO queue. Configure another Lambda function to poll the FIFO queue
and to process the due payments.
D. Use Lambda to retrieve all due payments. Store the due payments in an Amazon DynamoDB table. Configure streams on the DynamoDB table to invoke another Lambda function to process
the due payments.
D. Use Lambda to retrieve all due payments. Store the due payments in an Amazon DynamoDB table. Configure streams on the DynamoDB table to invoke another Lambda function to process
the due payments.
QUESTION 883
A company’s marketing data is uploaded from multiple sources to an Amazon S3 bucket. A series
of data preparation jobs aggregate the data for reporting. The data preparation jobs need to run
at regular intervals in parallel. A few jobs need to run in a specific order later.
The company wants to remove the operational overhead of job error handling, retry logic, and
state management.
Which solution will meet these requirements?
A. Use an AWS Lambda function to process the data as soon as the data is uploaded to the S3
bucket. Invoke other Lambda functions at regularly scheduled intervals.
B. Use Amazon Athena to process the data. Use Amazon EventBridge Scheduler to invoke Athena
on a regular internal.
C. Use AWS Glue DataBrew to process the data. Use an AWS Step Functions state machine to run
the DataBrew data preparation jobs.
D. Use AWS Data Pipeline to process the data. Schedule Data Pipeline to process the data once at
midnight.
C. Use AWS Glue DataBrew to process the data. Use an AWS Step Functions state machine to run
the DataBrew data preparation jobs.
QUESTION 882
A company maintains its accounting records in a custom application that runs on Amazon EC2
instances. The company needs to migrate the data to an AWS managed service for development
and maintenance of the application data. The solution must require minimal operational support and provide immutable, cryptographically verifiable logs of data changes.
Which solution will meet these requirements MOST cost-effectively?
A. Copy the records from the application into an Amazon Redshift cluster.
B. Copy the records from the application into an Amazon Neptune cluster.
C. Copy the records from the application into an Amazon Timestream database.
D. Copy the records from the application into an Amazon Quantum Ledger Database (Amazon
QLDB) ledger.
D. Copy the records from the application into an Amazon Quantum Ledger Database (Amazon
QLDB) ledger.
QUESTION 881
A company wants to deploy an internal web application on AWS. The web application must be
accessible only from the company’s office. The company needs to download security patches for
the web application from the internet.
The company has created a VPC and has configured an AWS Site-to-Site VPN connection to the
company’s office. A solutions architect must design a secure architecture for the web application.
Which solution will meet these requirements?
A. Deploy the web application on Amazon EC2 instances in public subnets behind a public
Application Load Balancer (ALB). Attach an internet gateway to the VPC. Set the inbound source
of the ALB’s security group to 0.0.0.0/0.
B. Deploy the web application on Amazon EC2 instances in private subnets behind an internal
Application Load Balancer (ALB). Deploy NAT gateways in public subnets. Attach an internet
gateway to the VPC. Set the inbound source of the ALB’s security group to the company’s office
network CIDR block.
C. Deploy the web application on Amazon EC2 instances in public subnets behind an internal
Application Load Balancer (ALB). Deploy NAT gateways in private subnets. Attach an internet
gateway to the VPSet the outbound destination of the ALB’s security group to the company’s office
network CIDR block.
D. Deploy the web application on Amazon EC2 instances in private subnets behind a public
Application Load Balancer (ALB). Attach an internet gateway to the VPC. Set the outbound
destination of the ALB’s security group to 0.0.0.0/0.
B. Deploy the web application on Amazon EC2 instances in private subnets behind an internal
Application Load Balancer (ALB). Deploy NAT gateways in public subnets. Attach an internet
gateway to the VPC. Set the inbound source of the ALB’s security group to the company’s office
network CIDR block.
QUESTION 880
A company wants to run its experimental workloads in the AWS Cloud. The company has a
budget for cloud spending. The company’s CFO is concerned about cloud spending
accountability for each department. The CFO wants to receive notification when the spending
threshold reaches 60% of the budget.
Which solution will meet these requirements?
A. Use cost allocation tags on AWS resources to label owners. Create usage budgets in AWS
Budgets. Add an alert threshold to receive notification when spending exceeds 60% of the budget.
B. Use AWS Cost Explorer forecasts to determine resource owners. Use AWS Cost Anomaly
Detection to create alert threshold notifications when spending exceeds 60% of the budget.
C. Use cost allocation tags on AWS resources to label owners. Use AWS Support API on AWS
Trusted Advisor to create alert threshold notifications when spending exceeds 60% of the budget.
D. Use AWS Cost Explorer forecasts to determine resource owners. Create usage budgets in AWS
Budgets. Add an alert threshold to receive notification when spending exceeds 60% of the budget.
A. Use cost allocation tags on AWS resources to label owners. Create usage budgets in AWS
Budgets. Add an alert threshold to receive notification when spending exceeds 60% of the budget.
QUESTION 879
A company has hired an external vendor to perform work in the company’s AWS account. The
vendor uses an automated tool that is hosted in an AWS account that the vendor owns. The
vendor does not have IAM access to the company’s AWS account. The company needs to grant
the vendor access to the company’s AWS account.
Which solution will meet these requirements MOST securely?
A. Create an IAM role in the company’s account to delegate access to the vendor’s IAM role. Attach
the appropriate IAM policies to the role for the permissions that the vendor requires.
B. Create an IAM user in the company’s account with a password that meets the password
complexity requirements. Attach the appropriate IAM policies to the user for the permissions that
the vendor requires.
C. Create an IAM group in the company’s account. Add the automated tool’s IAM user from the
vendor account to the group. Attach the appropriate IAM policies to the group for the permissions
that the vendor requires.
D. Create an IAM user in the company’s account that has a permission boundary that allows the
vendor’s account. Attach the appropriate IAM policies to the user for the permissions that the
vendor requires.
A. Create an IAM role in the company’s account to delegate access to the vendor’s IAM role. Attach
the appropriate IAM policies to the role for the permissions that the vendor requires.
QUESTION 878
A company has an Amazon Elastic File System (Amazon EFS) file system that contains a
reference dataset. The company has applications on Amazon EC2 instances that need to read
the dataset. However, the applications must not be able to change the dataset. The company
wants to use IAM access control to prevent the applications from being able to modify or delete
the dataset.
Which solution will meet these requirements?
A. Mount the EFS file system in read-only mode from within the EC2 instances.
B. Create a resource policy for the EFS file system that denies the elasticfilesystem:ClientWrite action
to the IAM roles that are attached to the EC2 instances.
C. Create an identity policy for the EFS file system that denies the elasticfilesystem:ClientWrite action
on the EFS file system.
D. Create an EFS access point for each application. Use Portable Operating System Interface
(POSIX) file permissions to allow read-only access to files in the root directory.
B. Create a resource policy for the EFS file system that denies the elasticfilesystem:ClientWrite action
to the IAM roles that are attached to the EC2 instances.
QUESTION 877
A data analytics company has 80 offices that are distributed globally. Each office hosts 1 PB of
data and has between 1 and 2 Gbps of internet bandwidth.
The company needs to perform a one-time migration of a large amount of data from its offices to Amazon S3. The company must complete the migration within 4 weeks.
Which solution will meet these requirements MOST cost-effectively?
A. Establish a new 10 Gbps AWS Direct Connect connection to each office. Transfer the data to
Amazon S3.
B. Use multiple AWS Snowball Edge storage-optimized devices to store and transfer the data to
Amazon S3.
C. Use an AWS Snowmobile to store and transfer the data to Amazon S3.
D. Set up an AWS Storage Gateway Volume Gateway to transfer the data to Amazon S3.
B. Use multiple AWS Snowball Edge storage-optimized devices to store and transfer the data to
Amazon S3.
QUESTION 876
A company uses AWS Organizations for its multi-account AWS setup. The security organizational
unit (OU) of the company needs to share approved Amazon Machine Images (AMIs) with the
development OU. The AMIs are created by using AWS Key Management Service (AWS KMS)
encrypted snapshots.
Which solution will meet these requirements? (Choose two.)
A. Add the development team’s OU Amazon Resource Name (ARN) to the launch permission list for
the AMIs.
B. Add the Organizations root Amazon Resource Name (ARN) to the launch permission list for the
AMIs.
C. Update the key policy to allow the development team’s OU to use the AWS KMS keys that are
used to decrypt the snapshots.
D. Add the development team’s account Amazon Resource Name (ARN) to the launch permission list
for the AMIs.
E. Recreate the AWS KMS key. Add a key policy to allow the Organizations root Amazon Resource
Name (ARN) to use the AWS KMS key.
A. Add the development team’s OU Amazon Resource Name (ARN) to the launch permission list for
the AMIs.
C. Update the key policy to allow the development team’s OU to use the AWS KMS keys that are
used to decrypt the snapshots.
QUESTION 875
A company has a mobile game that reads most of its metadata from an Amazon RDS DB
instance. As the game increased in popularity, developers noticed slowdowns related to the
game’s metadata load times. Performance metrics indicate that simply scaling the database will
not help. A solutions architect must explore all options that include capabilities for snapshots,
replication, and sub-millisecond response times.
What should the solutions architect recommend to solve these issues?
A. Migrate the database to Amazon Aurora with Aurora Replicas.
B. Migrate the database to Amazon DynamoDB with global tables.
C. Add an Amazon ElastiCache for Redis layer in front of the database.
D. Add an Amazon ElastiCache for Memcached layer in front of the database.
C. Add an Amazon ElastiCache for Redis layer in front of the database.
QUESTION 874
Use Amazon Elastic Kubernetes Service (Amazon EKS) with Amazon EC2 worker nodes.
A company has deployed an application in an AWS account. The application consists of
microservices that run on AWS Lambda and Amazon Elastic Kubernetes Service (Amazon EKS).
A separate team supports each microservice. The company has multiple AWS accounts and
wants to give each team its own account for its microservices.
A solutions architect needs to design a solution that will provide service-to-service communication
over HTTPS (port 443). The solution also must provide a service registry for service discovery.
Which solution will meet these requirements with the LEAST administrative overhead?
A. Create an inspection VPC. Deploy an AWS Network Firewall firewall to the inspection VPC. Attach
the inspection VPC to a new transit gateway. Route VPC-to-VPC traffic to the inspection VPC.
Apply firewall rules to allow only HTTPS communication.
B. Create a VPC Lattice service network. Associate the microservices with the service network.
Define HTTPS listeners for each service. Register microservice compute resources as targets.
Identify VPCs that need to communicate with the services. Associate those VPCs with the service
network.
C. Create a Network Load Balancer (NLB) with an HTTPS listener and target groups for each
microservice. Create an AWS PrivateLink endpoint service for each microservice. Create an
interface VPC endpoint in each VPC that needs to consume that microservice.
D. Create peering connections between VPCs that contain microservices. Create a prefix list for each
service that requires a connection to a client. Create route tables to route traffic to the appropriate
VPC. Create security groups to allow only HTTPS communication.
B. Create a VPC Lattice service network. Associate the microservices with the service network.
Define HTTPS listeners for each service. Register microservice compute resources as targets.
Identify VPCs that need to communicate with the services. Associate those VPCs with the service
network.