Which of the following privileges allow read access to data in SAP HANA information models depending
on certain values or combination of values? Choose the correct answer.
Response:
A. System Privileges
B. Object Privileges
C. Analytic Privileges
D. Package Privileges
you installed an SAP Netweaver based application on an SAP HANA database what is the default secure user store to store the password of the sap
A. Xuser
B. hdbuserstore
C. ABAP secure store file system (SFFS)
D. instance secure store file system (SSFS)
Which components of SAP HANA Indexserver allow clients to connect and communicate with the SAP
HANA database?
Please choose the correct answer.
Response:
A. Request Processing and Execution Control
B. External Interfaces
C. Relational Engines
D. Storage Engine and Disk Storage
Your customer wants to know when the productive SAP HANA system was updated and to which version.
Where do you find this information?
There are 2 correct answers to this question
Response:
A. In the General Information app of SAP HANA cockpit 2.0
B. In the administration editor of the SAP HANA studio
C. In the catalog view of the SAP HANA Web-based Development Workbench
D. In the SAP HANA database explorer for SAP HANA cockpit 2.0
Which activities are required when you execute an SAP HANA Near Zero Downtime upgrade? There are 2 correct answers to this question. Response:
A. Perform a takeover3.
B. Upgrade the secondary system with the command line tool.
C. Stop the secondary system.
D. Restart the primary and secondary system.
Why should you use variables in SQLScript? There are 2 correct answers to this question. Response:
A. To implement flow control logic
B. To support processing push-down
C. To increase parallelization opportunities
D. To improve code readability
SAP HANA uses SSFS to protect the root encryption keys. These root keys protect all encryption keys
used in the SAP HANA database from unauthorized access. What other two main functions of the root
encryption keys? There are 2 correct answers to this question.
Response:
A. The root key used for the internal data encryption service of the database
B. The root key used for data volume encryption
C. The root key used for users log encryption
D. The root key used for transactions volume encryption
Which of the following database resources can be monitored at the DBA Cockpit Current Status Overview
monitor?
There are 3 correct answers to this question.
Response:
A. The time at which the database was started.
B. Disk consumption from the SAP HANA database.
C. Connection statistics about open connections.
D. Memory and CPU consumption from the SAP HANA database.
Which of the following users are able to start and stop a distributed SAP HANA Database System There
are 2 correct answers to this question.
Response:
A. SYSTEM user
B. ADM user
C. ROOT user
Which of the following statements is true for the SAP HANA preinstalled role
(SAP_INTERNAL_HANA_SUPPORT) for support cases?
Choose the correct answer.
Response:
A. It can be granted to the SYSTEM user.
B. It can be granted to another role.
C. It can only be granted further system privileges.
D. It can only be granted further object privileges.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SAP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C_HANATEC_15 exam preparations and SAP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.