Understanding the types of identity management (for example, federated)
Describing Reserved Instance flexibility
Identifying appropriate migration strategies (for example, database replication, use of AWS Snowball)
Identifying database migration tools (for example AWS Database Migration Service [AWS DMS], AWS Schema Conversion Tool [AWS SCT])
Understanding which methods can achieve root user protection
Identifying and comparing when to use various compute purchasing options
Understanding the benefits of the AWS Cloud Adoption Framework (AWS CAF) (for example, reduced business risk; improved environmental, social, and governance (ESG) performance; increased revenue; increased operational efficiency)
Identifying memory-based databases
Identifying the services that manage IoT devices
Identifying tasks that only the account root user can perform
Identifying differences between the pillars of the Well-Architected Framework
Identifying NoSQL databases (for example, DynamoDB)
Identifying the services that can create and deploy frontend and mobile services
Defining groups, users, custom policies, and managed policies in compliance with the principle of least privilege
Identifying relational databases (for example, Amazon RDS, Amazon Aurora)
Identifying the services that can present the output of virtual machines (VMs) on end-user machines