1.
What information can be retrieved with transaction Local Work Process Overview (SM50)? Note: There are 3 correct answers to this question
Correct Answer(s)
C. The status of an individual work process, for example, waiting, running, on hold, etc.
D. The process ID of the work process
E. The program that is currently executed by the work process
Explanation
The transaction Local Work Process Overview (SM50) allows users to retrieve the status of an individual work process, such as whether it is waiting, running, on hold, etc. It also provides the process ID of the work process and the program that is currently being executed by the work process.
2.
What are reserved work processes?
Correct Answer
B. Dialog work processes that can only be used for a specific task
Explanation
Reserved work processes are dialog work processes that can only be used for a specific task. These work processes are allocated and reserved for a particular job or transaction and cannot be used for any other purpose. Once the task is completed, these work processes are released and made available for other tasks. They are typically used for interactive processes that require user input and are designed to provide a dedicated and efficient processing environment for specific tasks.
3.
What are some of the evaluation criteria for the impact of SQL statements on performance? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. How often is the statement executed
C. What the contribution is to the system's overall response
Explanation
The evaluation criteria for the impact of SQL statements on performance include how often the statement is executed and what the contribution is to the system's overall response. The frequency of execution helps determine the potential impact on performance, as frequently executed statements can have a larger impact. Additionally, understanding the contribution of the statement to the system's overall response helps identify if it is a critical or resource-intensive operation that may affect performance. The other options, such as the user executing the statement and the work process type, may have an impact on security or resource allocation but are not directly related to the evaluation of performance impact.
4.
In transaction Operating System Monitor (ST06) you detect that CPU idle value on a server, with dedicated resources, is often below 20%. How should you investigate this situation? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. Check if load can be distributed to other servers with spare CPU capacity
B. Check the 'Top 40 CPU Processes' in transaction Operating System Monitor (ST06(n))
Explanation
To investigate the situation of CPU idle value often below 20%, two possible approaches can be taken. Firstly, checking if the load can be distributed to other servers with spare CPU capacity can help determine if the current server is overloaded and if the load can be balanced. Secondly, analyzing the 'Top 40 CPU Processes' in the Operating System Monitor (ST06(n)) can identify any specific processes or applications that are consuming excessive CPU resources and causing the low idle value. These two actions can provide insights into the root cause of the low CPU idle value and help in resolving the issue.
5.
Which of the following transactions show historical data? Note: There are 2 correct answers to this question
Correct Answer(s)
B. Operating System Monitor (ST06)
D. Workload Monitor (ST03n)
Explanation
The transactions "Operating System Monitor (ST06)" and "Workload Monitor (ST03n)" show historical data. These transactions allow users to view and analyze past performance data and statistics related to the operating system and workload. They provide insights into system utilization, resource consumption, and performance trends over time.
6.
Where can you find the top expensive SQL statements on the system?
Correct Answer
A. In the cursor cache of the DBA cockpit
Explanation
The cursor cache of the DBA cockpit is where you can find the top expensive SQL statements on the system. This means that the DBA cockpit keeps track of the SQL statements that consume the most resources, allowing administrators to identify and address performance issues. The other options mentioned, such as the transaction Operating System Monitor (ST06(n)), transaction SQL trace (ST05 or ST12), and transaction Work Process Overview (SM50 and SM66), are not specifically designed for monitoring SQL statements' performance.
7.
Can database request time include network time?
Correct Answer
A. Yes, because database request time is measured at SAP instance level
Explanation
The answer states that database request time can include network time because it is measured at the SAP instance level. This implies that the measurement of database request time takes into account the time it takes for the request to travel over the network and reach the SAP instance. Therefore, network time is considered as part of the overall database request time measurement.
8.
In the transaction profile Workload Monitor (ST03n), how do you identify a poorly performing program that may be causing overall performance problems? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. Its total response time and average response time are high
B. Its average CPU time and/or database time are high
Explanation
A poorly performing program can be identified in the transaction profile Workload Monitor (ST03n) by looking at its total response time and average response time, as well as its average CPU time and/or database time. If these values are high, it indicates that the program is taking longer to execute and may be causing overall performance problems.
9.
How is SAP Dialog Response time defined?
Correct Answer
A. As the timespan between the dispatcher receives a request till he sends out the
final response to the front end
Explanation
The correct answer is the timespan between the dispatcher receiving a request and sending out the final response to the front end. This definition specifically focuses on the response time from the point of receiving the request to providing the final response to the user interface. It does not include the time taken for rendering or other processes.
10.
With transaction Operating System Monitor (STO6) - Top 40 CPU Processes, you identified a process with unusually high CPU utilization. What are next steps to check the root cause? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. If it is a database process, you use the database monitor (ST04) and check if this
activity can be tuned or moved to another time
C. If it is an SAP work process, you compare the process ID (PID) to the list of
transactions in SMSO to find out what activity is causing the load
Explanation
The correct answers suggest the next steps to check the root cause of a process with unusually high CPU utilization. If the process is a database process, the database monitor (ST04) can be used to check if the activity can be tuned or moved to another time. If the process is an SAP work process, comparing the process ID (PID) to the list of transactions in SMSO can help identify the activity causing the load. These steps can help investigate and address the root cause of the high CPU utilization.
11.
On which information does the data access strategy used for executing an SQL
statement depend on? Note: There are 2 correct answers to this question.
Correct Answer
A. The fields specified in the WHERE clause of the SQL statement
Explanation
The data access strategy used for executing an SQL statement depends on the fields specified in the WHERE clause of the SQL statement. This is because the WHERE clause is used to filter the data and retrieve only the records that meet the specified conditions. By analyzing the fields in the WHERE clause, the database can determine the most efficient way to access the data, such as using indexes or other optimization techniques. Additionally, the availability of indexes for the queried tables is also a factor that can influence the data access strategy.
12.
What are some of the reasons for buffer swaps, which are visible in transaction Buffer
Monitor (ST02)? Note: There are 2 correct answers to this question.
Correct Answer(s)
C. Not enough space left in the buffer for buffering the new object
D. No enough directory entries to buffer the new object
Explanation
The transaction Buffer Monitor (ST02) allows monitoring of buffer swaps in SAP systems. Buffer swaps occur when there is not enough space left in the buffer to accommodate a new object or when there are not enough directory entries available to buffer the new object. This can happen when the buffer is full or when the system is experiencing high demand for buffering. These two reasons are visible in the transaction Buffer Monitor as they indicate the need for buffer swaps to maintain system performance and avoid memory-related issues.
13.
You suspect that there is an issue with the network connection from the application
layer to the presentation layer. Which check do you perform in which transaction?
Correct Answer
A. LAN check by ping in transaction Operating System Monitor (ST06(n))
Explanation
In order to troubleshoot the suspected issue with the network connection from the application layer to the presentation layer, the recommended check is to perform a LAN check by ping in the transaction Operating System Monitor (ST06(n)). This check allows you to verify the connectivity and latency between the different layers of the network infrastructure. By using the ping command, you can send a test message to a specific IP address or hostname and check for any packet loss or high latency, which could indicate a network issue.
14.
What type of data is stored in PROC memory? Note: There are 2 correct answers to
this question.
Correct Answer(s)
A. Data that is NOT bound to a specific user context
C. Local heap memory in the work process that is not assigned to a user context
Explanation
The correct answers are "Data that is NOT bound to a specific user context" and "Local heap memory in the work process that is not assigned to a user context". These types of data are stored in PROC memory, which is a memory area in the work process that is not associated with any specific user context or transaction. This memory is used to store data that is shared among multiple users or transactions, such as system-wide information or temporary data.
15.
What are the main parts of SAP virtual memory? Note: There are 2 correct answers to
this question.
Correct Answer
A. CPU memory
Explanation
The main parts of SAP virtual memory are CPU memory and Physical memory. CPU memory is the memory that is directly accessible by the CPU and is used for storing data that is currently being processed. Physical memory, also known as RAM, is the physical hardware component that stores data and instructions that are currently being used by the CPU. These two components work together to provide efficient memory management and execution of SAP processes.
16.
What happens when a buffered table is updated by an SQL request? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. The database is updated and the buffer of the current application server is
invalidated
B. Changes are written to table DDLOG, which is read at a certain interval to
invalidate the buffered content on the other application servers
Explanation
When a buffered table is updated by an SQL request, the database is updated and the buffer of the current application server is invalidated. Additionally, changes are written to table DDLOG, which is read at a certain interval to invalidate the buffered content on the other application servers. This ensures that all application servers have the most up-to-date data and that the buffered content is synchronized across the servers.
17.
Which RFC type is used if you want to establish communication with a remote system,
but don't want to wait for the resuit for further processing?
Correct Answer
B. Asynchronous RFC (aRFC)
Explanation
Asynchronous RFC (aRFC) is the correct answer because it allows for establishing communication with a remote system without needing to wait for the result for further processing. With aRFC, the requesting system can continue its operations while the remote system processes the request asynchronously. This enables better performance and efficiency in scenarios where immediate response is not necessary, such as in batch processing or when dealing with large amounts of data.
18.
Which RFC type is used for multiple communication steps that must be completed in a
particular order?
Correct Answer
D. Queued RFC (qRFC)
Explanation
Queued RFC (qRFC) is the correct answer because it is used for multiple communication steps that must be completed in a particular order. With qRFC, the system ensures that the steps are executed in the sequence they were added to the queue, maintaining the order of execution. This is useful when there is a dependency between the steps and they need to be processed in a specific order to maintain data integrity or consistency.
19.
When should you usually switch off table buffering? Note: There are 2 correct answers
to this question. Note: There are 2 correct answers to this question.
Correct Answer(s)
A. If the table is larger than 1MB
B. If the table experiences many invalidations
Explanation
Table buffering is a technique used to improve the performance of accessing database tables by storing them in memory. However, enabling table buffering for large tables (larger than 1MB) can consume a significant amount of memory, which may impact system performance. Additionally, if a table experiences frequent invalidations (changes to the table's data), it may be more efficient to switch off table buffering to avoid unnecessary memory usage. Therefore, switching off table buffering for large tables and tables with frequent invalidations can be beneficial.
20.
Which elements are part of the RFC CPIC time during a synchronous RFC call to
another system? Note: There are 3 correct answers to this question.
Correct Answer(s)
A. Roll wait time
B. Roll out time
D. Time to establish the RFC connection
Explanation
During a synchronous RFC call to another system, the elements that are part of the RFC CPIC time include the roll wait time, roll out time, and the time to establish the RFC connection. Roll wait time refers to the time spent waiting for database locks to be released. Roll out time is the time taken to transfer data from the roll area to the database. Time to establish the RFC connection is the duration required to establish a connection between the systems involved in the RFC call. These three elements contribute to the overall CPIC time during the synchronous RFC call.
21.
Which of the following are parts of the dialog response time? Note: There are 3
correct answers to this question
Correct Answer(s)
A. Wait time
B. Roll-in time
C. Enqueue time
Explanation
The dialog response time consists of three parts: wait time, roll-in time, and enqueue time. Wait time refers to the time a user has to wait before receiving a response. Roll-in time is the time taken to load and display the response on the screen. Enqueue time is the time taken to put the response in a queue for processing. Rendering time and design time are not part of the dialog response time.
22.
Which KPIs from the Operation System Monitor (ST06) can indicate a hardware
bottleneck? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. High CPU utilization near 100%
B. High swap/paging activity
Explanation
High CPU utilization near 100% and high swap/paging activity can indicate a hardware bottleneck. When the CPU utilization is near 100%, it means that the CPU is being heavily utilized and may not be able to handle additional tasks efficiently, indicating a possible hardware limitation. Similarly, high swap/paging activity suggests that the system is frequently swapping data between the physical memory and the disk, which can slow down performance and indicate a potential hardware bottleneck.
23.
How should the SAP Operating System Collector (SAPOSCOL) be deployed? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. If there is one instance on one host, only one SAPOSCOL process is required
C. If there are multiple instances on one host, only one SAPOSCOL process is
required
Explanation
The SAPOSCOL process is responsible for collecting operating system data for SAP systems. If there is only one instance running on a single host, then only one SAPOSCOL process is needed to collect the necessary data. However, if there are multiple instances running on the same host, it is still sufficient to have only one SAPOSCOL process to collect the operating system data for all the instances. Hence, the correct answers are: If there is one instance on one host, only one SAPOSCOL process is required, and if there are multiple instances on one host, only one SAPOSCOL process is required.
24.
What is the SAP Operating System Collector (SAPOSCOL)?
Correct Answer
A. An SAP proprietary standalone program for collecting Operating System usage
information
Explanation
The correct answer is "An SAP proprietary standalone program for collecting Operating System usage information." SAPOSCOL is a program developed by SAP that is used to collect information about the usage of the operating system. It is a standalone program, meaning it can be run independently of other SAP systems. SAPOSCOL is specifically designed to gather data related to the operating system and is not an alternative to the transaction Operating System Monitor (ST06(n)) or a built-in tool in ABAP systems. It is not a third-party tool either.
25.
You are reviewing RFC data in the transaction Workload Monitor (ST03n). Which RFC
profile provides information about function modules in other systems that are called
from this system?
Correct Answer
A. RFC client profile
Explanation
The RFC client profile provides information about function modules in other systems that are called from this system. This profile helps monitor and analyze the performance and usage of RFC calls made by the current system to external systems. It provides details about the function modules, such as the number of calls, response time, and data volume, allowing administrators to identify any performance issues or bottlenecks in the RFC communication.
26.
What are some of the reasons for using the extended memory concept in SAP systems? Note: There are 3 correct answers to this question.
Correct Answer(s)
C. Fast context switches are needed in SAP systems because many users share few
work processes
D. SAP transactions usually consist of more than one step or screen
E. Extended memory is accessed through pointers; therefore, fast context switches
are possible
Explanation
The extended memory concept is used in SAP systems for several reasons. Firstly, fast context switches are needed because many users share few work processes. This ensures efficient utilization of resources and improves system performance. Secondly, SAP transactions usually consist of multiple steps or screens, and extended memory allows for the storage of large amounts of data required for these transactions. Lastly, extended memory is accessed through pointers, which enables fast context switches and enhances system responsiveness.
27.
In transaction Operating System Monitor (STDG) in an ABAP-oniy system, how can
you recognize a memory bottleneck? Note: There are 2 correct answers to this
question.
Correct Answer(s)
A. In a Unix system, more than 20% of RAM paged out/ swapped out per hour
B. In a Windows system, more than 25% of RAM paged in per hour
Explanation
A memory bottleneck can be recognized in a Unix system if more than 20% of RAM is paged out or swapped out per hour. This indicates that the system is frequently moving data from RAM to disk, which can slow down the overall performance. In a Windows system, a memory bottleneck can be identified if more than 25% of RAM is paged in per hour. This suggests that the system is constantly bringing data from disk to RAM, which can also impact the system's performance.
28.
Which memory area is allocated at instance start?
Correct Answer
B. Extended memory
Explanation
At instance start, the memory area that is allocated is the extended memory. Extended memory refers to the additional memory beyond the 1MB limit of conventional memory in a computer system. It is typically used to store large amounts of data or to run memory-intensive programs.
29.
Which profile parameters control the buffer synchronization? Note: There are 2 correct
answers to this question.
Correct Answer
A. Rdisp/bufrefmode
Explanation
The profile parameters "rdisp/bufrefmode" and "rdisp/bufreftime" control the buffer synchronization. These parameters determine the behavior of the buffer when it comes to refreshing and updating its contents. "rdisp/bufrefmode" defines the mode of buffer synchronization, while "rdisp/bufreftime" specifies the time interval for refreshing the buffer. These parameters help optimize the performance and efficiency of the buffer by ensuring that it is synchronized and updated regularly.
30.
What are some of the measures used to optimize SAP performance at a technical
level? Note: There are 3 correct answers to this question.
Correct Answer(s)
A. Optimization of SAP system parameters
C. Optimization of database and operating system configuration
D. Optimization of workload distribution
31.
How can SAP shared memory be accessed?
Correct Answer
D. Shared memory is accessible by all processes of one instance
Explanation
Shared memory in SAP can be accessed by all processes of one instance. This means that any process running within the same instance can access the shared memory. This allows for efficient and fast communication between different processes within the same instance, as they can directly access and share data stored in the shared memory. However, shared memory is not accessible on the operating system level or across different instances.
32.
In the transaction Workload Monitor (ST03n), what is he main indicator of poor
database performance?
Correct Answer
A. Average DB request time of more than 40% of average response time
Explanation
The main indicator of poor database performance in the transaction Workload Monitor (ST03n) is when the average DB request time is more than 40% of the average response time. This suggests that a significant portion of the response time is being spent on database requests, indicating potential performance issues with the database.
33.
Which option represents "Generic area buffered"?
Correct Answer
A. During the first access to a table, all table content is copied to the table buffer on
the SAP instance
Explanation
During the first access to a table, all table content is copied to the table buffer on the SAP instance. This means that when the table is accessed for the first time, the entire content of the table is copied and stored in the table buffer. This allows for faster access to the table data in subsequent accesses, as the data is already available in the buffer.
34.
When you are investigating a database performance issue you find an often used
expensive SQL statement that is doing a full table scan to access a small amount of
data. No suitable index exists. How can you improve the performance of this query?
Correct Answer
A. By creating an index using selective fields from the where clause
Explanation
Creating an index using selective fields from the where clause can improve the performance of the query because it allows the database to quickly locate the specific data needed for the query. By creating an index on the fields used in the where clause, the database can efficiently filter and retrieve the necessary data, eliminating the need for a full table scan. This can greatly reduce the time and resources required for the query, resulting in improved performance.
35.
When you run transaction Table Call Statistics (ST10), which of the following indicates
that a table should be unbuffered? Note: There are 3 correct answers to this question.
Tables with a high number of invalidations.
Correct Answer(s)
A. Tables with a high number of invalidations
B. Tables with a high number of invalidations
C. Tables with a large buffer size
Explanation
The presence of a high number of invalidations indicates that a table should be unbuffered. This means that the data in the table is frequently changing or being modified, which can lead to inconsistencies if the table is buffered. Tables with a large buffer size may also indicate that they should be unbuffered, as this suggests that the table is consuming a significant amount of memory in the buffer. Additionally, tables with more direct reads than sequential reads may benefit from being unbuffered, as direct reads bypass the buffer and access the data directly from the disk.
36.
You see very high paging rates (>SD% RAM per hour). What could be possible countermeasures? Note: There are 2 correct answers to this question.
Correct Answer(s)
A. Distribute processes that do not need to run on this specific hardware to other
hardware with unused capacity
D. Identify users/programs that cause high memory consumption and optimize
expensive SQL statements and suboptimal programming
Explanation
Possible countermeasures for high paging rates include distributing processes that do not need to run on the specific hardware to other hardware with unused capacity. This helps to alleviate the memory pressure on the current hardware. Additionally, identifying users or programs that are causing high memory consumption and optimizing expensive SQL statements and suboptimal programming can help reduce the need for excessive paging. By addressing these issues, the system can better manage memory usage and reduce the frequency of paging.
37.
Which system parameters are used to set RFC quotas? Note: There are 2 correct
answers to this question.
Correct Answer(s)
A. Rdisp/rfc_use_quotas
B. Rdisp/rfc_max_login
Explanation
The system parameters rdisp/rfc_use_quotas and rdisp/rfc_max_login are used to set RFC quotas. rdisp/rfc_use_quotas determines whether RFC quotas are used or not, while rdisp/rfc_max_login sets the maximum number of logins for RFC users. These parameters help in managing and controlling the usage of RFC connections in the system.
38.
How should optimizer statistics be kept up to date?
Correct Answer
A. By using scheduled periodic refreshes
Explanation
The correct answer is by using scheduled periodic refreshes. Optimizer statistics play a crucial role in query optimization and execution plans. Keeping them up to date ensures that the optimizer has accurate information about the data distribution and can make informed decisions about the most efficient way to execute queries. Scheduled periodic refreshes automatically update the statistics at regular intervals, ensuring that they are always current and accurate. This approach eliminates the need for manual updates and avoids inconsistencies that can occur when relying on update jobs triggered by specific issues.
39.
What is stored in extended memory? Note: There are 2 correct answers to this question
Correct Answer(s)
A. User context data
C. Objects associated with individual users and their open transactions
Explanation
Extended memory stores user context data and objects associated with individual users and their open transactions. User context data includes information about the user's session, preferences, and settings. Objects associated with individual users and their open transactions refer to the data and resources that are specific to each user and their ongoing activities within the system. These can include temporary tables, buffers, and other program-related data that is needed to maintain the state of the user's work.
40.
What is an expensive SQL statement?
Correct Answer
A. An SQL statement that causes the database to read many blocks (from disk or
database buffer)
Explanation
An expensive SQL statement is one that causes the database to read many blocks (from disk or database buffer). This means that the statement requires a significant amount of data to be retrieved from storage, which can result in slower performance and increased resource usage. By reading more blocks than necessary, the statement puts additional strain on the system and can lead to inefficiencies in data retrieval. To optimize performance, it is important to identify and tune these expensive SQL statements.