Amazon BDS-C00 AWS Certified BigData – Specialty Online Training
Amazon BDS-C00 Online Training
The questions for BDS-C00 were last updated at Mar 09,2026.
- Exam Code: BDS-C00
- Exam Name: AWS Certified BigData - Specialty
- Certification Provider: Amazon
- Latest update: Mar 09,2026
Amazon RDS creates an SSL certificate and installs the certificate on the DB Instance when Amazon RDS provisions the instance. These certificates are signed by a certificate authority. The _____ is stored athttps://rds.amazonaws.com/doc/rds-ssl-ca-cert.pem.
- A . private key
- B . foreign key
- C . public key
- D . protected key
A user is planning to setup notifications on the RDS DB for a snapshot.
Which of the below mentioned event categories is not supported by RDS for this snapshot source type?
- A . Backup
- B . Creation
- C . Deletion
- D . Restoration
Is it possible to access your EBS snapshots?
- A . Yes, through the Amazon S3 APIs.
- B . Yes, through the Amazon EC2 APIs.
- C . No, EBS snapshots cannot be accessed; they can only be used to create a new EBS volume.
- D . EBS doesn’t provide snapshots.
A user wants to make so that whenever the CPU utilization of the AWS EC2 instance is above 90%, the redlight of his bedroom turns on.
Which of the below mentioned AWS services is helpful for this purpose?
- A . AWS CloudWatch + AWS SES
- B . AWS CloudWatch + AWS SNS
- C . It is not possible to configure the light with the AWS infrastructure services
- D . AWS CloudWatch and a dedicated software turning on the light
Customers have recently been complaining that your web application has randomly stopped responding. During a deep dive of your logs, the team has discovered a major bug in your Java web application. This bug is causing a memory leak that eventually causes the application to crash.
Your web application runs on Amazon EC2 and was built with AWS CloudFormation.
Which techniques should you see to help detect theses problems faster, as well as help eliminate the server’s unresponsiveness? Choose 2 answers
- A . Update your AWS CloudFormation configuration and enable a CustomResource that uses cfn- signal to detect memory leaks
- B . Update your CloudWatch metric granularity config for all Amazon EC2 memory metrics
to support five-second granularity. Create a CloudWatch alarm that triggers an Amazon SNS notification to page your team when the application memory becomes too large - C . Update your AWS CloudFormation configuration to take advantage of Auto Scaling groups.
Configure an Auto Scaling group policy to trigger off your custom CloudWatch metrics - D . Create a custom CloudWatch metric that you push your JVM memory usage to create a CloudWatch alarm that triggers an Amazon SNS notification to page your team when the application memory usage becomes too large
- E . Update your AWS CloudFormation configuration to take advantage of CloudWatch metrics Agent. Configure the CloudWatch Metrics Agent to monitor memory usage and trigger an Amazon SNS alarm
You are currently hosting multiple applications in a VPC and have logged numerous port scans coming in from a specific IP address block. Your security team has requested that all access from the offending IP address block be denied for the next 24 hours.
Which of the following is the best method to quickly and temporarily deny access from the specified IP address block?
- A . Create an AD policy to modify Windows Firewall settings on all hosts in the VPC to deny access from the IP address block
- B . Modify the Network ACLs associated with all public subnets in the VPC to deny access from the IP address block
- C . Add a rule to all of the VPC 5 Security Groups to deny access from the IP address block
- D . Modify the Windows Firewall settings on all Amazon Machine Images (AMIs) that your organization uses in that VPC to deny access from the IP address block
A solutions architect for a logistics organization ships packages from thousands of suppliers to end customers. The architect is building a platform where suppliers can view the status of one or more of their shipments. Each supplier can have multiple roles that will
only allow access to specific fields in the resulting information.
Which strategy allows the appropriate level of access control and requires the LEAST amount of management work?
- A . Send the tracking data to Amazon Kinesis Streams. Use AWS Lambda to store the data in an Amazon DynamoDB Table. Generate temporary AWS credentials for the supplier’s users with AWS STS, specifying fine-grained security policies to limit access only to their application data.
- B . Send the tracking data to Amazon Kinesis Firehouse. Use Amazon S3 notifications and AWS Lambda to prepare files in Amazon S3 with appropriate data for each supplier’s roles. Generate temporary AWS credentials for the suppliers’ users with AWS STS. Limit access to the appropriate files through security policies.
- C . Send the tracking data to Amazon Kinesis Streams. Use Amazon EMR with Spark Streaming to store the data in HBase. Create one table per supplier. Use HBase Kerberos integration with the suppliers’ users. Use HBase ACL-based security to limit access to the roles to their specific table and columns.
- D . Send the tracking data to Amazon Kinesis Firehose. Store the data in an Amazon Redshift cluster. Create views for the supplier’s users and roles. Allow suppliers access to the Amazon Redshift cluster using a user limited to the application view.
What is the charge for the data transfer incurred in replicating data between your primary and standby?
- A . Same as the standard data transfer charge
- B . Double the standard data transfer charge
- C . No charge. It is free
- D . Half of the standard data transfer charge
When an Auto Scaling group is running in Amazon Elastic Compute Cloud (EC2), your application rapidly scales up and down in response to load within a 10-minutes window; however, after the load peaks, you begin to see problems in your configuration management system where previously terminated Amazon EC2 resources are still showing as active.
What would be a reliable and efficient way to handle the cleanup of Amazon EC2 resources with your configuration management systems? Choose 2 answers
- A . Write a script that is run by a daily cron job on an Amazon EC2 instance and that executes API Describe calls of the EC2 Auto Scaling group and removes terminated instances from the configuration management system
- B . Configure an Amazon Simple Queue Service (SQS) queue for Auto Scaling actions that has a script that listens for new messages and removes terminated instances from the configuration management system
- C . Use your existing configuration management system to control the launching and bootstrapping of instances to reduce the number of moving parts in the automation
- D . Write a small script that is run during Amazon EC2 instance shutdown to de-register the resource from the configuration management system
- E . Use Amazon Simple Workflow Service (SWF) to maintain an Amazon DynamoDB database that contains a whitelist of instances that have been previously launched, and allow the Amazon SWF worker to remove information from the configuration management system
HTTP Query-based requests are HTTP requests that use the HTTP verb GET or POST and a Query parameter named_____________.
- A . Action
- B . Value
- C . Reset
- D . Retrieve