Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which SAP HANA Cloud tools would you use to diagnose and analyze errors in database trace files? Note: There are 2 correct answers to this question.

A.

SAP HANA database explorer

B.

SAP HANA Cloud Central

C.

SQL trace analyzer

D.

Full system information dump

How long are SAP HANA Cloud, SAP HANA database backups retained by default?

A.

3 weeks

B.

2 weeks

C.

1 week

D.

4 weeks

Which SAP HANA trace must you activate to analyze performance issues with systems where third- party software cannot be installed?

A.

End-to-end

B.

Kernel profiler

C.

SQL

D.

Performance trace

Which database objects can you manipulate if you have the object privilege activity ALL PRIVILEGES? Note: There are 2 correct answers to this question.

A.

Functions

B.

Views

C.

Procedures

D.

Schemas

Where does the SAP HANA Cloud, SAP HANA database run in SAP BTP?

A.

Kubernetes container

B.

SAP HANA Cloud Central

C.

Cloud Foundry runtime

D.

Kyma runtime

Which privilege types are available in SAP HANA Cloud? Note: There are 3 correct answers to this question.

A.

Analytic

B.

System

C.

Object

D.

Application

E.

Package

What is the default single sign-on method when using hdbsql?

A.

Token based

B.

SAML based

C.

Kerberos based

D.

Certificate based

Which actions can you only choose when using the resident HDBLCM tool as root user? Note: There are 2 correct answers to this question.

A.

rename_system

B.

unregister_system

C.

update_host

D.

configure_internal_network

What cryptographic libraries are supported in SAP HANA? Note: There are 2 correct answers to this question.

A.

CommonCryptoLib

B.

Libgcrypt

C.

OpenSSL

D.

LibreSSL

Which hardware KPIs do you need to size before performing a tailored data center integration (TDI) installation for a productive SAP HANA database system? Note: There are 2 correct answers to this question.

A.

DRAM required for the static data memory area

B.

Total disk space required for the log volume

C.

Persistent memory (PMEM) required for backups

D.

Network bandwidth for the storage zone