
Ultimate access to all questions.
Deep dive into the quiz with AI chat providers.
We prepare a focused prompt with your quiz and certificate details so each AI can offer a more tailored, in-depth explanation.
A company is running an online transaction processing (OLTP) workload on AWS. This workload uses an unencrypted Amazon RDS DB instance in a Multi-AZ deployment. Daily database snapshots are taken from this instance.
What should a solutions architect do to ensure the database and snapshots are always encrypted moving forward?
A
Encrypt a copy of the latest DB snapshot. Replace existing DB instance by restoring the encrypted snapshot.
B
Create a new encrypted Amazon Elastic Block Store (Amazon EBS) volume and copy the snapshots to it. Enable encryption on the DB instance.
C
Copy the snapshots and enable encryption using AWS Key Management Service (AWS KMS). Restore encrypted snapshot to an existing DB instance.
D
Copy the snapshots to an Amazon S3 bucket that is encrypted using server-side encryption with AWS Key Management Service (AWS KMS) managed keys (SSE-KMS).
Explanation:
Correct Answer: A
To encrypt an existing unencrypted RDS DB instance, you must:
Why Option A is correct:
Why other options are incorrect:
Option B: RDS doesn't use EBS volumes directly in this manner. You cannot simply copy snapshots to EBS volumes and enable encryption on the DB instance. RDS encryption must be enabled at creation time or through the snapshot copy/restore process.
Option C: You cannot restore an encrypted snapshot to an existing DB instance. You must create a new DB instance from the encrypted snapshot. The phrase "restore encrypted snapshot to an existing DB instance" is incorrect.
Option D: Copying snapshots to S3 doesn't encrypt the RDS instance itself. While S3 encryption protects the snapshot copy in S3, it doesn't address the encryption requirement for the live RDS database or its native snapshots.
Key AWS Concepts: