Which SAP HANA features ensure that committed data is NOT lost if there is a power failure?
There are 2 correct answers to this question.
Response:
A. Automatic savepoints
B. Persisted redo logs
C. Delta merge
D. Undo logs
正解:A,B
質問 2:
logical error occurred in one tenant of your SAP HANA database. What action do you perform to make the tenant consistent again?
Please choose the correct answer.
Response:
A. Recover the system database first and then recover the affected tenant.
B. Recover the system database. The affected tenant is recovered automatically.
C. Recover the affected tenant. The system database is NOT recovered.
D. Recover the affected tenant first and then recover the system database.
正解:A
質問 3:
You receive a new system from your hardware partner with SAP HANA 2.0 multitenant database containers preinstalled.
What is a prerequisite to guarantee secure encryption of the data volumes?
Please choose the correct answer.
Response:
A. Change the generated SSFS master key for the whole database instance.
B. Update the connection information stored in the hdbuserstore.
C. Regenerate the encryption root keys for the internal application encryption.
D. Change the generated password of the SYSTEM user.
正解:B
質問 4:
During an unplanned maintenance, the SAP HANA database system is NOT accessible. The root cause is unclear.
Which SAP HANA cockpit 2.0 options allow you to investigate this situation?
There are 2 correct answers to this question.
Response:
A. Monitor performance
B. Troubleshoot unresponsive system
C. Launch cockpit for offline administration
D. Recover database
正解:B,C
質問 5:
Your SAP HANA system CANNOT be reached by SQL. You need to check all connections, transactions, and blocked transactions to understand the root cause.
Which system service do you use to collect the information?
Response:
A. daemon
B. preprocessor
C. sapstartsrv
D. nameserver
正解:C
質問 6:
SAP HANA uses SSFS to protect the root encryption keys. These root keys protect all encryption keys used in the SAP HANA database from unauthorized access.
What other two main functions of the root encryption keys?
There are 2 correct answers to this question.
Response:
A. The root key used for the internal data encryption service of the database
B. The root key used for data volume encryption
C. The root key used for users log encryption
D. The root key used for transactions volume encryption
正解:A,B
質問 7:
Which prerequisites apply when you perform an SAP HANA database copy of a single tenant system?
There are 2 correct answers to this question.
Response:
A. The number and type of services on the target database can be different from the source database.
B. The number of nodes on the target database is the same as or lower than the source database.
C. The restore point in time (PIT) of the target database is the same as or earlier than the source database.
D. The version of the target database is the same as or higher than the source database.
正解:B,D
質問 8:
During uptime migration, which information can you receive in the Charts Control Center, via the Utilities of the SUM UI?
There are 3 correct answers to this question.
Response:
A. The configured maximum number of parallel R3load processes
B. The process buckets being processed
C. The memory consumption of the target database
D. The actual number of running R3load processes
正解:A,B,D
質問 9:
In Dynamic data memory requirements Additional memory is required for objects that are created dynamically when new data is loaded or queries are executed.
Which of the following two recommendation?
There are 2 correct answers to this question.
Response:
A. Reserving double memory for dynamic objects as for static ones
B. Calculating the total RAM, the static RAM is divided by two
C. Reserving as much memory for dynamic objects as for static ones
D. Calculating the total RAM, the static RAM is multiplied by two
正解:C,D
Hoshino -
独学にぴったりな参考書で、理解しやすく簡単に書いてあって、本当にこのPass4Testの問題集ひとつのみで大丈夫でした。