Amazon BDS-C00 AWS Certified BigData – Specialty Online Training
Amazon BDS-C00 Online Training
The questions for BDS-C00 were last updated at Mar 01,2026.
- Exam Code: BDS-C00
- Exam Name: AWS Certified BigData - Specialty
- Certification Provider: Amazon
- Latest update: Mar 01,2026
You need to design a VPC for a web-application consisting of an Elastic Load Balancer (ELB). A fleet of web/application servers, and an RDS database The Entire Infrastructure must be distributed over 2 availability zones.
Which VPC configuration works while assuring the database is not available from the Internet?
- A . One public subnet for ELB one public subnet for the web-servers, and one private subnet for the database
- B . One public subnet for ELB two private subnets for the web-servers, two private subnets for RDS
- C . Two public subnets for ELB two private subnets for the web-servers and two private subnets for RDS
- D . Two public subnets for ELB two public subnets for the web-servers, and two public subnets for RDS
What is an isolated database environment running in the cloud (Amazon RDS) called?
- A . DB Instance
- B . DB Unit
- C . DB Server
- D . DB Volume
Managers in a company need access to the human resources database that runs on Amazon Redshift, to run reports about their employees. Managers must only see information about their direct reports.
Which technique should be used to address this requirement with Amazon Redshift?
- A . Define an IAM group for each employee as an IAM user in that group and use that to limit the access.
- B . Use Amazon Redshift snapshot to create one cluster per manager. Allow the managers to access only their designated clusters.
- C . Define a key for each manager in AWS KMS and encrypt the data for their employees with their private keys.
- D . Define a view that uses the employee’s manager name to filter the records based on current user names.
A company has reproducible data that they want to store on Amazon Web Services. The company may want to retrieve the data on a frequent basis.
Which Amazon web services storage option allows the customer to optimize storage costs and still achieve high availability for their data?
- A . Amazon S3 Reduced Redundancy Storage
- B . Amazon EBS Magnetic Volume
- C . Amazon Glacier
- D . Amazon S3 Standard Storage
A company receives data sets coming from external providers on Amazon S3. Data sets from different providers are dependent on one another. Data sets will drive at different and is no particular order.
A data architect needs to design a solution that enables the company to do the following:
• Rapidly perform cross data set analysis as soon as the data becomes available
• Manage dependencies between data sets that arrives at different times
Which architecture strategy offers a scalable and cost-effective solution that meets these requirements?
- A . Maintain data dependency information in Amazon RDS for MySQL. Use an AWS Pipeline job to load an Amazon EMR Hive Table based on task dependencies and event notification triggers in Amazon S3
- B . Maintain data dependency information in an Amazon DynamoDB table. Use Amazon SNS and event notification to publish data to a fleet of Amazon EC2 workers. Once the task dependencies have been resolved process the data with Amazon EMR
- C . Maintain data dependency information in an Amazon ElasticCache Redis cluster. Use Amazon S3 event notifications to trigger an AWS Lambda function that maps the S3 object to Redis. Once the dependencies have been resolved process the data with Amazon EMR
- D . Maintain data dependency information in an Amazon DynamoDB table. Use Amazon S3 event notifications to trigger an AWS Lambda function that maps the S3 object to the task associated with it in DynamoDB. Once all task dependencies have been resolved process the data with Amazon EMR
An Administrator needs to design the event log storage architecture for events from mobile devices. The event data will be processed by an Amazon EMR cluster daily for aggregated reporting and analytics before being archived.
How should the administrator recommend storing the log data?
- A . Create an Amazon S3 bucket and write log data into folders by device Execute the EMR job on the device folders
- B . Create an Amazon DynamoDB table partitioned on the device and sorted on data, write log data to the table. Execute the EMR job on the Amazon DynamoDB table
- C . Create an Amazon S3 bucket and write data into folders by day. Execute the EMR job on the daily folder
- D . Create an Amazon DynamoDB table partitioned on Event ID, write log data to table. Execute the EMR job on the table
When using the following AWS services, which should be implemented in multiple Availability Zones for high availability solutions? Choose 2 answers
- A . Amazon Simple Storage Service
- B . Amazon Elastic Load Balancing
- C . Amazon Elastic Compute Cloud
- D . Amazon Simple Notification Service
- E . Amazon DynamoDB
Fill in the blanks: A_____ is a storage device that moves data in sequences of bytes or bits (blocks). Hint: These devices support random access and generally use buffered I/O.
- A . block map
- B . storage block
- C . mapping device
- D . block device
An AWS customer is deploying a web application that is composed of a front-end running on Amazon EC2 and of confidential data that is stored on Amazon S3. The customer security policy that all access operations to this sensitive data must be authenticated and authorized by a centralized access management system that is operated by a separate security team. In addition, the web application team that owns and administers the EC2 web front-end instances is prohibited from having any ability to access the data that circumvents this centralized access management system.
Which of the following configurations will support these requirements?
- A . Encrypt the data on Amazon S3 using a CloudHSM that is operated by the separate security team. Configure the web application to integrate with the CloudHSM for decrypting approved data access operations for trusted end-users.
- B . Configure the web application to authenticate end-users against the centralized access management system. Have the web application provision trusted users STS tokens entitling the download of approved data directly from Amazon S3
- C . Have the separate security team create and IAM role that is entitled to access the data on Amazon S3. Have the web application team provision their instances with this role while denying their IAM users access to the data on Amazon S3
- D . Configure the web application to authenticate end-users against the centralized access management system using SAML. Have the end-users authenticate to IAM using their SAML token and download the approved data directly from S3.
Can the string value of ‘Key’ be prefixed with laws?
- A . No
- B . Only for EC2 not S3
- C . Yes
- D . Only for S3 not EC