Amazon BDS-C00 Exam (page: 10)
Amazon AWS Certified Big Data -Speciality
Updated on: 15-Feb-2026

Viewing Page 10 of 100

The maximum size of a Kinesis data blob, the data payload before Base64 encoding is? (choose one)

  1. Five megabytes
  2. Two megabytes
  3. One kilobyte
  4. One megabyte

Answer(s): D

Explanation:

The maximum size of a Kinesis data blob, the data payload before Base64 encoding is one megabtye


Reference:

http://docs.aws.amazon.com/streams/latest/dev/working-with-kinesis.html



The Snowball client uses a(n) to define what kind of data is transferred between the client’s data center and a Snowball.

  1. schema
  2. JSON configuration file
  3. interface
  4. XML configuration file

Answer(s): A

Explanation:

The Snowball client uses schemas to define what kind of data is transferred between the client’s data center and a Snowball. The schemas are declared when a command is issued.


Reference:

http://docs.aws.amazon.com/snowball/latest/ug/using-client.html



An AWS Snowball appliance includes a(n) network connection to minimize data transfer times.

  1. 10GBaseT
  2. 1000BaseT
  3. 40GBaseT
  4. Infiniband

Answer(s): A

Explanation:

An AWS Snowball appliance has a 10GBaseT network connection (both RJ45 as well as SFP+ with either a fiber or copper interface) to minimize data transfer times. This allows the Snowball appliance to transfer up to 80 terabytes of data from a data source to the appliance in about a day, plus shipping time.


Reference:

https://aws.amazon.com/snowball/details/



The job management API for AWS Snowball is a network protocol based on HTTP that uses a(n) model.

  1. RPC
  2. MPI
  3. publish/subscribe
  4. RMI

Answer(s): A

Explanation:

The job management API for AWS Snowball is a network protocol based on HTTP. It uses JSON (RFC 4627) documents for HTTP request/response bodies and is an RPC model, in which there is a fixed set of operations, and the syntax for each operation is known to clients without any prior interaction.


Reference:

http://docs.aws.amazon.com/snowball/latest/api-reference/api-reference.html



Which statements are true about re-sharding in Amazon Kinesis?

  1. The shard or pair of shards that result from the re-sharding operation are referred to as child shards.
  2. When you re-shard, data records that were flowing to the parent shards are rerouted to flow to the child shards based on the hash key values that the data record partition keys map to.
  3. The shard or pair of shards that the re-sharding operation acts on are referred to as parent shards.
  4. After you call a re-sharding operation, you do not need to wait for the stream to become active again.

Answer(s): A,B,C

Explanation:

Kinesis Streams supports re-sharding which enables you to adjust the number of shards in your stream in order to adapt to changes in the rate of data flow through the stream.
The shard or pair of shards that the re-sharding operation acts on are referred to as parent shards. The shard or pair of shards that result from the re-sharding operation are referred to as child shards. After you call a re-sharding operation, you need to wait for the stream to become active again.
When you re-shard, data records that were flowing to the parent shards are rerouted to flow to the child shards based on the hash key values that the data record partition keys map to.


Reference:

http://docs.aws.amazon.com/streams/latest/dev/working-with-kinesis.html



Viewing Page 10 of 100



Share your comments for Amazon BDS-C00 exam with other users:

Regor 12/4/2023 2:01:00 PM

is this a valid prince2 practitioner dumps?
UNITED KINGDOM


asl 9/14/2023 3:59:00 PM

all are relatable questions
CANADA


Siyya 1/19/2024 8:30:00 PM

might help me to prepare for the exam
Anonymous


Ted 6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.
GERMANY


Paul K 11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available
INDIA


ph 6/16/2023 12:41:00 AM

very legible
Anonymous


sephs2001 7/31/2023 10:42:00 PM

is this exam accurate or helpful?
Anonymous


ash 7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days
INDIA


Sneha 8/17/2023 6:29:00 PM

this is useful
CANADA


sachin 12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected
Anonymous


tomAws 7/18/2023 5:05:00 AM

nice questions
BRAZIL


Rahul 6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?
INDIA


TeamOraTech 12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.
Anonymous


Curtis 7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.
UNITED STATES


sam 7/17/2023 6:22:00 PM

cannot evaluate yet
Anonymous


nutz 7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid
UNITED STATES


rajesh soni 1/17/2024 6:53:00 AM

good examplae to learn basic
INDIA


Tanya 10/25/2023 7:07:00 AM

this is useful information
Anonymous


Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous


Rajender 10/18/2023 3:54:00 AM

i would like to take psm1 exam.
Anonymous


Blessious Phiri 8/14/2023 9:53:00 AM

cbd and pdb are key to the database
SOUTH AFRICA


Alkaed 10/19/2022 10:41:00 AM

the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.
NETHERLANDS


Dave Gregen 9/4/2023 3:17:00 PM

please upload p_sapea_2023
SWEDEN