1.
Which attributes can you can configure in the Alert Checks of the SAP HANA dB in the SAP HANA cockpit?
Correct Answer(s)
C. E-mail notification
D. Threshold values
E. Check Start Times
Explanation
In the Alert Checks of the SAP HANA dB in the SAP HANA cockpit, you can configure the attributes such as E-mail notification, Threshold values, and Check Start Times. E-mail notification allows you to receive alerts via email. Threshold values can be set to define the limits at which alerts should be triggered. Check Start Times enable you to schedule when the alert checks should be performed.
2.
You are using the SAP HANA cockpit to change a user account. Which of the following authentication types can you use? (2 correct)
Correct Answer(s)
A. SAP assertion ticket
D. X.509 certificates
Explanation
In SAP HANA cockpit, you can use the SAP assertion ticket and X.509 certificates as authentication types for changing a user account. SAP assertion ticket is a form of single sign-on authentication that allows users to access multiple SAP systems without entering their credentials repeatedly. X.509 certificates, on the other hand, are digital certificates that verify the identity of a user or system and are commonly used for secure communication over the internet.
3.
In which tool can you activate the SAP HANA traces?
Correct Answer
B. SAP HANA studio diagnosis mode
Explanation
In the SAP HANA studio diagnosis mode, you can activate the SAP HANA traces. This mode allows you to diagnose and troubleshoot issues in the SAP HANA system by providing detailed information about the system's performance and behavior. By activating the traces in this mode, you can gather valuable information that can help in identifying and resolving any issues or bottlenecks in the system.
4.
Which prerequisites apply when you perform an SAP HANA dB copy of a single tenant system? (2 correct)
Correct Answer(s)
A. The number of nodes on the target dB is the same or lower than the source dB
B. The version of the target dB is the same or higher than the source dB
Explanation
When performing an SAP HANA dB copy of a single tenant system, there are two prerequisites that apply. Firstly, the number of nodes on the target dB must be the same or lower than the source dB. This means that the target system cannot have more nodes than the source system. Secondly, the version of the target dB must be the same or higher than the source dB. This ensures compatibility and prevents any issues that may arise from using an older version of the dB.
5.
The data storage of your productive SAP HANA instance crashed and you need to recover the database. The log storage is still intact. You have a full data backup that is nine hours old and an incremental backup that is four hours old. To which point in time can you recover the database?
Correct Answer
D. The database can be recovered to the latest log backup
Explanation
The latest log backup contains the most recent changes made to the database before the crash occurred. Therefore, recovering the database to the latest log backup will bring it back to the most up-to-date state possible before the crash.
6.
What do you do to prepare a database migration option (DMO) of software update manager(SUM) procedure? (3 correct)
Correct Answer(s)
B. Extract the SAP HANA Client installation archive
D. Move the stack.xml update file into the download folder
E. Move the SPAM update archive into the download folder
Explanation
To prepare a database migration option (DMO) of software update manager (SUM) procedure, you need to extract the SAP HANA Client installation archive, move the stack.xml update file into the download folder, and move the SPAM update archive into the download folder. These steps are necessary for the successful execution of the migration process.
7.
Which of the following security KPI’s can you monitor in the SAP HANA cockpit? (2 correct)
Correct Answer(s)
A. Password Policy
D. Data storage security
Explanation
In the SAP HANA cockpit, you can monitor the security KPIs related to Password Policy and Data storage security. Password Policy refers to the rules and requirements set for user passwords, such as complexity and expiration. Monitoring this KPI ensures that strong password policies are in place to protect against unauthorized access. Data storage security involves monitoring the security measures implemented to protect the data stored in SAP HANA, such as encryption, access controls, and backups. Monitoring this KPI helps ensure the confidentiality, integrity, and availability of the data.
8.
Due to a hardware failure, you are using a different host to recover a crashed SAP HANA dB. Which of the following configuration files must you use for the recovery? (2 correct)
Correct Answer(s)
B. Nameserver.ini
D. Indexserver.ini
Explanation
To recover a crashed SAP HANA dB using a different host, you need to use the nameserver.ini and indexserver.ini configuration files. The nameserver.ini file contains the configuration settings for the SAP HANA name server, which manages the overall system landscape. The indexserver.ini file contains the configuration settings for the SAP HANA index server, which is responsible for processing queries and managing data storage. By using these two configuration files, you can ensure that the recovered dB functions properly on the new host.
9.
Which operating system users are created when you install an SAP HANA dB? (2 correct)
Correct Answer(s)
B. Sapadm
C. Adm
Explanation
When you install an SAP HANA dB, two operating system users that are created are sapadm and adm. These users are necessary for managing and administering the SAP HANA database. The sapadm user is used for administrative tasks related to the SAP HANA system, while the adm user is a standard system administration user. Both users have specific roles and permissions within the SAP HANA environment.
10.
How is a savepoint triggered in SAP HANA? (2 correct)
Correct Answer(s)
C. By performing a soft shutdown
D. By starting a data backup
Explanation
A savepoint in SAP HANA can be triggered by performing a soft shutdown or by starting a data backup. When a soft shutdown is performed, it allows the system to save the current state of the database and create a savepoint. Similarly, starting a data backup also triggers a savepoint as it involves saving the current state of the database. By updating the memory or committing a transaction, savepoints are not triggered.
11.
You are analysing an SQL execution with the SQL Plan Cache in a distributed system. Execution time is poor and the master node is overloaded. Where do you change the configuration parameters to improve the execution time?
Correct Answer
D. Indexserver.ini
Explanation
To improve the execution time in a distributed system with poor performance and an overloaded master node, you need to change the configuration parameters in the indexserver.ini file. This file contains the configuration settings for the index server, which is responsible for executing SQL queries and managing data in the system. By adjusting the parameters in this file, such as memory allocation, parallel processing, and query optimization settings, you can optimize the execution time and alleviate the load on the master node.
12.
You need to analyse bottlenecks and forecast the requirements for your SAP HANA dB. Which tile of the SAP HANA cockpit do you select?
Correct Answer
B. Disk usage
Explanation
To analyze bottlenecks and forecast requirements for the SAP HANA dB, the appropriate tile to select in the SAP HANA cockpit is "Disk usage." This tile provides information on the amount of disk space being used by the database, allowing you to monitor and manage storage utilization. By analyzing disk usage, you can identify any potential bottlenecks related to storage capacity and plan for future requirements accordingly.
13.
Which parameter setting enables you to activate the load distribution and statement routing in a scale-out SAP HANA system?
Correct Answer
A. Client_distribution_mode
Explanation
The parameter setting "Client_distribution_mode" enables the activation of load distribution and statement routing in a scale-out SAP HANA system. This setting determines how client connections are distributed among the different nodes in the system, allowing for efficient utilization of resources and improved performance. By enabling load distribution and statement routing, the system can effectively distribute incoming client requests across multiple nodes, balancing the workload and optimizing the overall system performance.
14.
What happens when an SAP HANA system is restarted? (2 correct)
Correct Answer(s)
A. Redo log is replayed since the last savepoint
D. All row tables and row table attributes are loaded into the memory
Explanation
When an SAP HANA system is restarted, the redo log is replayed since the last savepoint. This ensures that any changes made to the database since the last savepoint are applied. Additionally, all row tables and row table attributes are loaded into the memory. This allows for quick access to the data stored in these tables.
15.
You must design a high-availability SAP HANA dB system with 8 hosts (6 worker and 2 standby) that also uses multitenant dB containers. Which rules apply? (2 correct)
Correct Answer(s)
B. The tenant databases must run on the worker hosts
D. The system database instance must run on all hosts (worker and standby)
Explanation
The tenant databases must run on the worker hosts because they are responsible for handling the workload of the individual tenants. The system database instance must run on all hosts (worker and standby) to ensure high availability and fault tolerance in case of any host failure.
16.
Q16. You are optimizing the table distribution in a scale-out SAP HANA dB. Which best practices apply? (2 correct)
Correct Answer(s)
B. The row store can be distributed over all nodes
C. Table partitions can be distributed over all nodes
Explanation
In a scale-out SAP HANA database, it is recommended to distribute the row store and table partitions over all nodes for optimization. This allows for better performance and load balancing across the system. By distributing the row store and table partitions, the workload is evenly distributed and can be processed in parallel across all nodes, resulting in improved query performance. Distributing the columns of a table over all nodes is not mentioned as a best practice in this context.
17.
Which security infrastructures can you integrate with SAP HANA?
Correct Answer(s)
A. Linux syslog
B. Identity management
Explanation
The correct answer is Linux syslog and Identity management. Linux syslog is a logging system that can be integrated with SAP HANA to monitor and record system events and activities. Identity management refers to the process of managing user identities and their access to resources within an organization. Integrating identity management with SAP HANA ensures that only authorized users have access to the system and its data, enhancing security.
18.
You are setting up a disaster recovery system replication. You want the transaction processing of the primary system to be suspended if the network to the secondary system fails. Which log replication mode must you use?
Correct Answer
C. Full sync
Explanation
To ensure that the transaction processing of the primary system is suspended if the network to the secondary system fails, the appropriate log replication mode to use is "full sync." In full sync mode, the primary system waits for acknowledgment from the secondary system after each transaction before proceeding with the next one. This ensures that the primary system is aware of the status of the secondary system and suspends transaction processing if the network connection is lost.
19.
What is the minimum memory requirement for a delta merge operation in SAP HANA?
Correct Answer
B. Current size of main storage
+ future size of main storage
+ current size of delta storage
+ some additional free memory
Explanation
The minimum memory requirement for a delta merge operation in SAP HANA is determined by the current size of the main storage, the future size of the main storage, the current size of the delta storage, and some additional free memory. This combination of memory is necessary to ensure that the merge operation can be successfully executed without any memory constraints.
20.
Which of the following are characteristics of a design-time role (3 correct)?
Correct Answer(s)
B. It is granted through the execution of stored procedures
D. It can be transported between systems
E. It is created by the technical user _SYS_REPO
Explanation
A design-time role is granted through the execution of stored procedures because these procedures are responsible for assigning the necessary privileges and authorizations to the role. It can be transported between systems, meaning that it can be exported from one system and imported into another, allowing for consistent role assignments across different environments. Lastly, it is created by the technical user _SYS_REPO, indicating that this user has the authority and capability to define and manage design-time roles.
21.
You install a SAP HANA database and NetWeaver AS ABAP 7.5 on one server. This system will be the customer's productive system. Which of the following installation requirements are correct (2 answers)?
Correct Answer(s)
A. The System ID(SID) for the SAP NetWeaver AS ABAP system and the SAP HANA database must be different
D. The memory resources for the SAP NetWeaver AS ABAP system and the SAP HANA database must be added
Explanation
The System ID (SID) for the SAP NetWeaver AS ABAP system and the SAP HANA database must be different because they are separate systems and should have unique identifiers. On the other hand, the memory resources for the SAP NetWeaver AS ABAP system and the SAP HANA database must be added together because both systems require memory for their operations.
22.
You are using your own user account and need to activate the Kernel Profiler trace to analyse a performance issue. The Kernel Profiler is inactive and you cannot activate it. What is the root cause of this problem?
Correct Answer
D. You are missing the role SAP_INTERNAL_HANA_SUPPORT
Explanation
The root cause of the problem is that the user is missing the role SAP_INTERNAL_HANA_SUPPORT. This role is required to activate the Kernel Profiler trace and analyze performance issues. Without this role, the user does not have the necessary privileges to activate the profiler.
23.
What can you monitor? In the tenant database status of the SAP HANA cockpit?
Correct Answer
D. CPU, disk and memory of the tenant
Explanation
In the SAP HANA cockpit, you can monitor the CPU, disk, and memory usage of the tenant database. This allows you to keep track of the resource utilization and performance of the tenant, ensuring efficient operation and identifying any potential bottlenecks or issues. Monitoring these parameters helps in optimizing the overall performance and stability of the tenant database.
24.
What kinds of patches are available in the SAP HANA revision strategy? (2 correct)
Correct Answer(s)
B. Support Package
D. Support Package Stack
Explanation
The correct answer is Support Package and Support Package Stack. In the SAP HANA revision strategy, Support Packages are available to provide bug fixes and enhancements to the system. Support Package Stacks, on the other hand, are a collection of Support Packages that are released at regular intervals and contain a larger set of fixes and improvements. Both types of patches are important for keeping the SAP HANA system up to date and ensuring its stability and performance.
25.
Why does SAP HANA have a persistence storage layer that is disk based? (2 correct)
Correct Answer(s)
B. To provide an area to unload data when memory is full
C. To enable data recovery if the power fails
Explanation
The persistence storage layer in SAP HANA is disk-based to provide an area to unload data when memory is full. This allows the system to free up memory by storing less frequently accessed data on disk, ensuring efficient memory usage. Additionally, the disk-based storage enables data recovery if the power fails, as the data is persisted on disk and can be restored when the system restarts.
26.
Which of the following options are valid SAP HANA backup strategies? (2 correct)
Correct Answer(s)
B. A storage snapshot followed by incremental backups and differential backups
C. A full data backup followed by incremental backups and differential backups
Explanation
The correct answer is A storage snapshot followed by incremental backups and differential backups, and A full data backup followed by incremental backups and differential backups. These options provide valid SAP HANA backup strategies. The storage snapshot allows for a quick and efficient backup by capturing the data at a specific point in time. Incremental backups capture only the changes made since the last backup, reducing the amount of data that needs to be backed up. Differential backups capture the changes made since the last full backup, providing a more comprehensive backup strategy.
27.
How can you minimize the Database Migration Option (DMO) downtime?
Correct Answer
C. Adjust the number of R3load processes during benchmarking and the DMO procedure
Explanation
Adjusting the number of R3load processes during benchmarking and the DMO procedure can help minimize the Database Migration Option (DMO) downtime. This allows for better control and optimization of the data migration process, potentially speeding up the migration and reducing the overall downtime. By adjusting the number of R3load processes, the system can handle the migration more efficiently, ensuring a smoother and faster transition to the new database.
28.
You are implementing a system replication for an SAP HANA system. How is the secondary SAP HANA database synchronized with the with the primary SAP HANA database (choose 2)?
Correct Answer(s)
A. Each service on the secondary database establishes a connection with its primary database
D. An initial snapshot and the redo log are transferred from the primary database to the secondary database
Explanation
The secondary SAP HANA database is synchronized with the primary database through two methods. Firstly, each service on the secondary database establishes a connection with its primary database, allowing for real-time data replication and synchronization. Secondly, an initial snapshot and the redo log are transferred from the primary database to the secondary database, ensuring that all changes made on the primary database are replicated on the secondary database. These two methods work together to keep the secondary database synchronized with the primary database in real-time.
29.
A user is complaining about missing privileges when executing a query in the SAP HANA studio. How do you need to configure the index server trace to obtain the missing privileges?
Correct Answer
A. Select trace level Info for the authorization component
Explanation
To obtain the missing privileges when executing a query in the SAP HANA studio, the index server trace needs to be configured by selecting trace level Info for the authorization component. This will enable the system to provide detailed information about the authorization process and help identify any missing privileges that may be causing the issue. By setting the trace level to Info, the system will log relevant authorization events and provide valuable insights for troubleshooting and resolving the user's complaint.
30.
You need to troubleshoot invalid object errors for stored procedures with complex structures. Which interface do you use?
Correct Answer
D. Dependency Viewer
Explanation
The Dependency Viewer interface is used to troubleshoot invalid object errors for stored procedures with complex structures. It allows you to view the dependencies between different objects in the database, such as tables, views, and stored procedures. By using the Dependency Viewer, you can identify any missing or invalid objects that may be causing the errors in the stored procedures.
31.
Which backup scenarios are allowed in multitenant database containers? (2 correct)
Correct Answer(s)
A. The system database can initiate its own backup and the backup of tenant databases
D. A database can initiate its own backup unless this is prohibited by the system configuration
Explanation
The correct answer is that the system database can initiate its own backup and the backup of tenant databases, and a database can initiate its own backup unless this is prohibited by the system configuration. This means that in a multitenant database container, the system database has the ability to back up its own data as well as the data of the tenants. Additionally, individual tenant databases can also initiate their own backups unless there are specific restrictions set by the system configuration.
32.
Which command can you use to bring a scale-out SAP HANA database to a fully operational state?
Correct Answer
B. Sapcontrol -nr -function StartSystem
Explanation
The correct answer is "sapcontrol -nr -function StartSystem". This command is used to start a scale-out SAP HANA database and bring it to a fully operational state. The "-nr" parameter specifies the instance number of the database, and the "-function StartSystem" parameter indicates that the entire system should be started.
33.
You need to analyse data points which are continuously sent from a factory robot to SAP HANA. Which of the following SAP HANA services do you use?
Correct Answer
D. SAP Smart Data Streaming
Explanation
SAP Smart Data Streaming is the correct answer because it is a service specifically designed for real-time data analysis and processing. It allows for the continuous analysis of data points sent from the factory robot to SAP HANA, enabling real-time decision-making and monitoring. SAP Landscape Transformation is used for data migration and system consolidation, SAP Smart Data Integration is used for data integration and replication, and SAP Remote Data Sync is used for remote data synchronization, but they are not specifically designed for real-time data analysis like SAP Smart Data Streaming.
34.
You developed a native SAP HANA application using SAP HANA extended application services. Which authentication methods are supported to access the SAP HANA database? (2 correct)
Correct Answer(s)
B. Basic authentication
D. Form-based authentication
Explanation
The correct answer is Basic authentication and Form-based authentication. Basic authentication is a simple method where the user provides a username and password to access the SAP HANA database. Form-based authentication is a more advanced method where the user is redirected to a login page and provides their credentials. Both methods are supported by SAP HANA extended application services for accessing the database.
35.
What are the benefits of the Database Migration Option (DMO)? (2 correct)
Correct Answer(s)
C. It requires only one maintenance pHase
D. It supports in-place migration
Explanation
The Database Migration Option (DMO) offers several benefits. Firstly, it requires only one maintenance phase, which means that the migration process can be completed more efficiently and with less downtime. Additionally, it supports in-place migration, allowing the database to be migrated without the need for a separate target database. This simplifies the migration process and reduces the complexity.
36.
You plan to implement an SAP HANA system with multitenant containers using a scale-out scenario with high availability. What rules can be applied when you implement such an SAP HANA system? (2 correct)
Correct Answer(s)
C. Single tenant databases can be failed over to the standby host
D. An instance of the system database can run on all the nodes including the standby host
Explanation
In an SAP HANA system with multitenant containers using a scale-out scenario with high availability, single tenant databases can be failed over to the standby host. This means that if one host fails, the single tenant databases can be automatically switched to the standby host to ensure continuous operation. Additionally, an instance of the system database can run on all the nodes, including the standby host. This allows for redundancy and ensures that the system database is accessible even if one or more nodes fail.
37.
You are encountering errors while executing SAP HANA reports that contain calculation views. You suspect an authorization issue. What do you do to use the authorization trace? (2 correct)
Correct Answer(s)
B. Select INFO from the System Trace Level for the Indexserver component and then select authorization
C. Specify the name of the table/view
Explanation
To use the authorization trace for troubleshooting errors in SAP HANA reports that contain calculation views, you need to select INFO from the System Trace Level for the Indexserver component. This will enable detailed logging of authorization-related information. Additionally, you should specify the name of the table or view that is causing the issue. By doing so, you can narrow down the trace to focus on the specific object that is encountering authorization problems.
38.
Which backup scenarios can you perform in multitenant database containers? (2 correct)
Correct Answer(s)
A. Backups of all the tenant databases from the system database
D. Backup of your own tenant database
Explanation
In a multitenant database container, you can perform backups of all the tenant databases from the system database. This means that you can create backups of all the databases within the container, including those belonging to other tenants. Additionally, you can also perform a backup of your own tenant database, ensuring that your data is protected.
39.
You need to set up an SAP HANA system where several companies share the same SAP HANA instance. You have to provide each company a dedicated share of the instance for its data configuration and user management. Which deployment Scenario do you use?
Correct Answer
C. Multiple Components on One Database (MCOD)
40.
Your customer has security restrictions which prohibit direct SQL connections from your PC to the productive SAP HANA system. Which tool do you use to monitor the system alerts of the SAP HANA database from your PC? (2 correct)
Correct Answer(s)
A. SAP HANA cockpit
B. DBA cockpit
Explanation
You can use the SAP HANA cockpit or the DBA cockpit to monitor the system alerts of the SAP HANA database from your PC. These tools provide a user-friendly interface that allows you to view and manage system alerts without the need for a direct SQL connection to the productive SAP HANA system. The HDBSQL Command Line Tool and SAP HANA Studio may require a direct SQL connection, which is prohibited by the customer's security restrictions.
41.
You migrated an SAP Business Warehouse system to the SAP HANA platform and want use SAP HANA models in your custom ABAP reports. What must you do to make sure that the end user authorizations work properly?
Correct Answer
B. Execute the control report RSUSR_DBMS_USERS_CHECK
Explanation
To ensure that the end user authorizations work properly after migrating an SAP Business Warehouse system to the SAP HANA platform and using SAP HANA models in custom ABAP reports, it is necessary to execute the control report RSUSR_DBMS_USERS_CHECK. This report checks and synchronizes the user authorizations between the ABAP system and the underlying database, in this case, SAP HANA. By executing this report, any inconsistencies or discrepancies in the user authorizations can be identified and resolved, ensuring that the end user authorizations function correctly in the new system.
42.
When you use the Resetting the DMO procedure as a fallback scenario, which of the changes made during the migration are NOT reset? (3 correct)
Correct Answer(s)
A. The DBACOCKPIT user on the SAP HANA database
D. The deleted SAP Business Intelligence data on the non-SAP database
E. The updated BRTOOLS on the non-SAP database
Explanation
When using the Resetting the DMO procedure as a fallback scenario, the changes made to the following are NOT reset:
1. The DBACOCKPIT user on the SAP HANA database - This user is not affected by the reset and its changes will remain intact.
2. The deleted SAP Business Intelligence data on the non-SAP database - Any data that has been deleted from the SAP Business Intelligence system on the non-SAP database will not be restored.
3. The updated BRTOOLS on the non-SAP database - Any updates made to the BRTOOLS on the non-SAP database will not be reverted.
43.
You are setting up a high available, distributed SAP HANA system. Which prerequisites must be met? (2 correct)
Correct Answer(s)
B. The shared storage is connected to every host
C. The index server is started on all nodes
Explanation
In order to set up a high available, distributed SAP HANA system, two prerequisites must be met. Firstly, the shared storage needs to be connected to every host. This ensures that all nodes have access to the same data and can operate in a distributed manner. Secondly, the index server needs to be started on all nodes. This allows for parallel processing and load balancing across the system.
44.
What do you need to size before you install SAP HANA in a Tailored Data Centre Integration (TDI) scenario? (3 correct)
Correct Answer(s)
A. CPU
C. Disk
D. Main memory
Explanation
In order to install SAP HANA in a Tailored Data Centre Integration (TDI) scenario, you need to size the CPU, disk, and main memory. These components are essential for the proper functioning of SAP HANA and ensuring optimal performance. The CPU is responsible for processing the data and executing instructions, while the disk is used for storing the data. Main memory, also known as RAM, is used for temporary storage and fast access to data. Sizing these components correctly is crucial to meet the system requirements and ensure smooth operation of SAP HANA.
45.
You need to install an SAP HANA system with advanced installation options. With which installation methods are all installation parameters available? (2 correct)
Correct Answer(s)
A. Hdblcm + batch modus
B. Hdblcm
Explanation
The installation methods that provide all installation parameters are Hdblcm + batch modus and hdblcm. These methods allow for advanced installation options and provide access to all installation parameters. The other options, hdblcmgui and hdblcm + interactive modus, may not provide all installation parameters or advanced options.
46.
You need to reset the Database Migration Option (DMO) procedure due to a hardware failover. What are the prerequisites if you want to use the DMO Reset option? (2 correct)
Correct Answer(s)
B. The source database needs to be available
D. The SUM folder needs to exist
Explanation
To use the DMO Reset option, two prerequisites must be met. Firstly, the source database needs to be available. This means that the database should be accessible and operational. Secondly, the SUM folder needs to exist. The SUM folder is a specific directory where the Software Update Manager (SUM) tool is located. It contains necessary files and resources for the migration process. Both these prerequisites are essential for successfully resetting the Database Migration Option (DMO) procedure after a hardware failover.
47.
Due to a hardware failure, you are using the Recovery Wizard to recover a crashed SAP HANA database. From where does this wizard read the recovery information?
Correct Answer
D. $(DIR_INSTANCE)/backup/data
Explanation
The Recovery Wizard reads the recovery information from the directory specified by $(DIR_INSTANCE)/backup/data.
48.
You are asked by SAP Support to provide SAP HANA Support Diagnosis information. Where do you collect this information? (2 correct)
Correct Answer(s)
A. In the SAP HANA studio on the "Diagnosis Files" tab of the Administration View
D. In the SAP HANA studio on the "Trace Configuration" tab of the administration view
Explanation
To collect SAP HANA Support Diagnosis information, you can gather it in two places. One is in the SAP HANA studio on the "Diagnosis Files" tab of the Administration View, where you can find relevant diagnostic files. The other is in the SAP HANA studio on the "Trace Configuration" tab of the administration view, where you can configure and view trace information. These two locations provide important diagnostic and trace data for SAP HANA support.
49.
Which of the following cryptographic providers are used as encryption services in SAP HANA? (2 correct)
Correct Answer(s)
C. CommonCryptoLib
D. OpenSSLLib
Explanation
The correct answer is CommonCryptoLib and OpenSSLLib. These two cryptographic providers are used as encryption services in SAP HANA. SAPCryptoLib and MSCryptoLib are not used for encryption in SAP HANA.
50.
You want to protect your SAP HANA scale-out system from hardware failures. Which option do you choose to benefit from automatic failure detection?
Correct Answer
B. Standby mode
Explanation
Standby mode is the correct option to choose in order to benefit from automatic failure detection in a SAP HANA scale-out system. Standby mode allows for automatic detection and recovery from hardware failures by maintaining a standby instance that can take over in case of a failure. This ensures high availability and minimizes downtime in the event of hardware failures. System replication, storage replication, and automatic save point do not provide the same level of automatic failure detection and recovery as standby mode.