I don't think it's B, since that's more about the instance role itself, not user access. For controlling who can use Session Manager, you attach an IAM policy to users (A) and make it tag-based (E). Trap is confusing instance vs user access.
Option A and B make sense, you don't need root or admin to member accounts for just SAML federation. The IP address (C) is a distractor here, SAML trusts are all about metadata exchange and certificates. If I missed something let me know.
Yeah, for federation you really need both the AWS SSO (IAM Identity Center) SAML metadata and the IdP's metadata like the X.509 cert. So that's A and B. No need for IPs or access to all accounts here. Pretty sure that's what they're looking for, but shout if you see it differently!
Yeah, for SAML 2.0 federation you definitely need the metadata files from both sides. So A and B are the way to go here. The IP address and root/admin access aren't part of this setup, just need the right metadata exchange. Pretty sure that's all there is to it, unless I'm missing some edge case.
Option A is the way to go. Weighted random doesn't work with sticky sessions, so users can get routed to different EC2s mid-session, causing errors. Least outstanding requests works better with session affinity. Pretty sure that's the fix-let me know if anyone's seen otherwise.
Looks a lot like scenarios from the official AWS practice tests. A is correct since least outstanding requests supports sticky sessions, unlike weighted random. I think this matches what you'd see in the study guide too. Disagree?
Pretty sure it's D. The flow log shows the outbound (response) traffic to the client's ephemeral port gets rejected, which is classic when the subnet's NACL doesn't allow that outbound range. Security groups are stateful so wouldn't block the reply like this. Let me know if I'm missing something.
Option B makes sense, but I hesitate a bit since you have to export the dashboard JSON and paste it into the template. Still, that's the method that actually creates a new dashboard per stack automatically using CloudFormation. Not 100% sure since some folks mention scripting with CLI (A), but B feels like what AWS wants here. Agree?