Text Material Preview
<p>TDVAN5</p><p>Exam Name: Vantage Administration Exam</p><p>Full version: 72 Q&As</p><p>Full version of TDVAN5 Dumps</p><p>Share some TDVAN5 exam dumps below.</p><p>1. Which portlets contain detailed information about QueryGrid requests?</p><p>A. Application Queries, My Queries, Query Groups</p><p>B. My Queries, Completed Queries, Metric Heatmap</p><p>C. Metrics Analysis, Node Monitor, Completed Queries</p><p>D. Completed Queries, Query Groups, My Queries</p><p>1 / 9</p><p>https://www.certqueen.com/TDVAN5.html</p><p>Answer: D</p><p>Explanation:</p><p>Completed Queries: This portlet provides details about queries that have already been</p><p>executed, including those involving QueryGrid. It helps in analyzing query performance and</p><p>execution details. Query Groups: This portlet allows you to group and monitor specific queries,</p><p>including QueryGrid requests, which can help in tracking performance and workload</p><p>management across groups of queries.</p><p>My Queries: This portlet gives users a view of the queries they have executed, including any</p><p>QueryGrid requests, making it a useful tool for tracking query status and performance.</p><p>The combination of these portlets provides comprehensive insight into QueryGrid requests,</p><p>allowing administrators and users to monitor, analyze, and troubleshoot them effectively.</p><p>2. Which privilege category is granted to a user on a newly created object?</p><p>A. Ownership</p><p>B. Explicit</p><p>C. Inherited</p><p>D. Automatic</p><p>Answer: A</p><p>Explanation:</p><p>When a user creates an object (such as a table, view, or database), they automatically receive</p><p>ownership privileges on that object. This means the creator has full control over the object,</p><p>including the ability to grant or revoke access to other users, modify the object, and drop it if</p><p>necessary. Option B (Explicit) refers to privileges that are specifically granted by an owner or an</p><p>administrator, but in this case, the privileges are automatically granted by virtue of object</p><p>creation.</p><p>Option C (Inherited) refers to privileges a user inherits through roles or profiles, but that’s not</p><p>relevant to the automatic ownership granted upon object creation.</p><p>Option D (Automatic) could be misleading here. While ownership privileges are granted</p><p>automatically, the correct term for the type of privilege is ownership.</p><p>3. An application is consuming very high I/O on Teradata Vantage. The Administrator has been</p><p>asked to identify the queries that are consuming more than 100 million IOs and are suspected</p><p>of completing Full Table Scans or Large Redistribution.</p><p>Which metrics should be examined for high values to identify the queries?</p><p>A. MAXAMPIO and PJI</p><p>B. TOTALIOCOUNT and PJI</p><p>2 / 9</p><p>C. I/O SKEW % and UII</p><p>D. REQPHYSIO and UII</p><p>Answer: B</p><p>Explanation:</p><p>TOTALIOCOUNT represents the total number of I/O operations a query performs, which is</p><p>crucial when trying to identify queries consuming excessive I/O (in this case, more than 100</p><p>million IOs). This directly indicates the amount of I/O a query is generating.</p><p>PJI (Product Join Index) measures whether a product join is being performed in the query,</p><p>which is often associated with inefficient joins that result in large redistributions of data. A high</p><p>PJI value</p><p>indicates that the query might be performing a product join, leading to a significant performance</p><p>hit due to large redistributions.</p><p>Option A (MAXAMPIO and PJI): MAXAMPIO refers to the maximum I/O performed by a single</p><p>AMP, but TOTALIOCOUNT is a more direct indicator of the total I/O performed by a query</p><p>across all AMPs. Option C (I/O SKEW % and UII): I/O SKEW % indicates uneven distribution of</p><p>I/O, which can cause performance issues, but it does not directly measure the total I/O</p><p>consumption like TOTALIOCOUNT does. UII (Utility Impact Index) is relevant but not as</p><p>important for identifying large I/O queries. Option D (REQPHYSIO and UII): REQPHYSIO refers</p><p>to the number of physical I/Os, but it is not as comprehensive as TOTALIOCOUNT, which</p><p>includes both logical and physical I/O.</p><p>Thus, TOTALIOCOUNT (for total I/O) and PJI (to detect potential large redistributions due to</p><p>product joins) are the key metrics to identify queries with high I/O and large redistributions.</p><p>4. A Vantage instance includes the following four databases:</p><p>Tables Database contains base tables and associated index subtables</p><p>Upsert_Database: contains views and other objects to support base table modifications</p><p>Query Database: contains views and other objects supporting queries and reporting</p><p>Development_Database: contains objects supporting development of new data applications</p><p>The Administrator needs to add a new user that will perform batch-level functions.</p><p>Which action should the Administrator take to achieve this goal?</p><p>A. Grant the CHECKPOINT privilege on the Tables_Database to the new user’s account.</p><p>B. Set the user’s default role to one that has the CREATE TABLE privilege on the</p><p>Tables_Database.</p><p>C. Set the user's profile to one that has the CREATE TABLE privilege on the Tables_Database.</p><p>D. Grant the CHECKPOINT privilege on the Tables_Database to the new user’s profile.</p><p>Answer: C</p><p>3 / 9</p><p>Explanation:</p><p>Batch-level functions often involve creating and modifying tables as part of large data loads or</p><p>updates. To allow the new user to perform these functions, the Administrator should assign</p><p>them a profile that grants appropriate permissions, such as the CREATE TABLE privilege on the</p><p>Tables_Database, where base tables are stored.</p><p>Profiles are a common way to manage and control resource and security settings for users in</p><p>Teradata, and assigning a profile with the CREATE TABLE privilege ensures that the user can</p><p>create tables in the specified database without granting excessive privileges.</p><p>Option A (Grant the CHECKPOINT privilege on the Tables_Database): The CHECKPOINT</p><p>privilege is related to checkpointing transactions, which is not directly relevant to batch-level</p><p>functions involving table creation or modification.</p><p>Option B (Set the user’s default role to one that has the CREATE TABLE privilege): While</p><p>setting a default role can grant privileges, using a profile is a more scalable way to manage user</p><p>resource and privilege settings, especially if the profile already exists with the necessary</p><p>permissions.</p><p>Option D (Grant the CHECKPOINT privilege on the Tables_Database to the new user’s profile):</p><p>Again, the CHECKPOINT privilege is not directly related to the batch-level activities such as</p><p>creating tables.</p><p>5. A customer has to use Data Mover with legacy tools to transfer data from the production</p><p>system to the disaster recovery (DR) system. Both systems are on-prem, but located in different</p><p>geographies. Where should the Data Mover Server be deployed to provide optimum data</p><p>transfer?</p><p>A. Location does not affect data transfer bandwidth.</p><p>B. In the cloud</p><p>C. In the source environment (production]</p><p>D. In the target environment</p><p>Answer: C</p><p>Explanation:</p><p>Data Mover Server should be deployed in the source environment (production) for optimum data</p><p>transfer. This setup ensures that the data is transferred as efficiently as possible from the</p><p>production system to the disaster recovery (DR) system. By having the server close to the</p><p>source, it can access the data more quickly and efficiently initiate the transfer process,</p><p>minimizing delays caused by geographic distance.</p><p>Location does not affect data transfer bandwidth: Location does affect data transfer bandwidth</p><p>due to network latency and distance between systems.</p><p>4 / 9</p><p>In the cloud: Using a cloud environment would introduce unnecessary complexity and potential</p><p>latency since both systems are on-prem.</p><p>In the target environment (DR): Deploying the Data Mover Server in the target environment</p><p>could introduce latency issues, as it would have to pull data from the production system over</p><p>long distances.</p><p>Thus, placing the server in the source environment is optimal for reducing latency and</p><p>maximizing data transfer efficiency.</p><p>6. The Administrator</p><p>has received a request to add SELECT rights on the BusinessViews</p><p>database to end users, developers, and batch accounts in the accounting unit.</p><p>The following roles are set up for each group:</p><p>The Administrator created the AcctShared role and will use it in a role nesting strategy to</p><p>provide the required access.</p><p>Which actions can the Administrator take to fulfill this request?</p><p>A. Grant SELECT on AcctShared to BusinessViews, then grant AcctUsers, AcctDev, and</p><p>AcctBatch to AcctShared.</p><p>B. Grant SELECT on BusinessViews to AcctShared, then grant AcctUsers, AcctDev, and</p><p>AcctBatch to AcctShared.</p><p>C. Grant SELECT on BusinessViews to AcctShared, then grant AcctShared to AcctUsers.</p><p>AcctDev, and AcctBatch.</p><p>D. Grant SELECT on AcctShared to BusinessViews, then grant AcctShared to AcctUsers.</p><p>AcctDev, and AcctBatch.</p><p>Answer: C</p><p>Explanation:</p><p>The AcctShared role should be granted SELECT access on the BusinessViews database. This</p><p>ensures that the role itself has the necessary privileges.</p><p>Then, you can nest this role by granting AcctShared to the individual roles of AcctUsers,</p><p>AcctDev, and AcctBatch. This role nesting strategy allows the users in these groups to inherit</p><p>the permissions from AcctShared without having to directly grant the privileges to each</p><p>individual role. This approach maintains a clean and efficient permission structure using role</p><p>5 / 9</p><p>nesting.</p><p>7. There is corruption in a table in the DBC database.</p><p>Which action should the Administrator take to restore the table?</p><p>A. Perform a SYSINIT, and restore the corrupted table.</p><p>B. Set the corrupted AMP offline, and restore the entire system.</p><p>C. Set the corrupted AMP offline, and restore the corrupted table.</p><p>D. Perform a SYSINIT, and restore the entire system.</p><p>Answer: C</p><p>Explanation:</p><p>If a table in the DBC (Data Dictionary) database is corrupted, the proper approach is to set the</p><p>corrupted AMP offline to isolate the issue, and then restore the corrupted table from a backup.</p><p>This limits the scope of the recovery to only the affected AMP and table, minimizing the impact</p><p>on the rest of the system.</p><p>Perform a SYSINIT, and restore the corrupted table: A SYSINIT is a full system initialization and</p><p>should only be done in extreme cases, as it wipes the entire system. This is too drastic for table-</p><p>level corruption.</p><p>Set the corrupted AMP offline, and restore the entire system: Restoring the entire system is</p><p>unnecessary if only one table is corrupted.</p><p>Perform a SYSINIT, and restore the entire system: This would be an extreme and time-</p><p>consuming option, only used if the entire system is corrupted.</p><p>8. An Administrator has been asked to improve the response time of the workloads in the</p><p>tactical tier. Workloads are in all tiers of TASM. They are at CPU and I/O capacity, and they</p><p>have AWT reserved for tactical. The Administrator begins by analyzing the data and the</p><p>workload prioritization.</p><p>Which action should the Administrator take?</p><p>A. Increase the relative weight of the tactical tier.</p><p>B. Disable the expedite option of the workloads in the SLG Tier level 1.</p><p>C. Increase the number of AWTs.</p><p>D. Adjust the limits of awt concurrency in the tactical tier using DBS control.</p><p>Answer: A</p><p>Explanation:</p><p>In a TASM (Teradata Active System Management) environment, the relative weight of different</p><p>tiers (such as tactical, SLG, or background) determines the amount of CPU and I/O resources</p><p>allocated to each tier. Increasing the relative weight of the tactical tier would prioritize these</p><p>6 / 9</p><p>workloads, giving them more resources relative to other tiers and improving their response time.</p><p>Option B (Disable the expedite option of the workloads in the SLG Tier level 1) might alleviate</p><p>some resource pressure from SLG Tier 1 workloads, but it doesn't directly improve the</p><p>prioritization or resource allocation for tactical workloads.</p><p>Option C (Increase the number of AWTs) is not applicable because the system already has</p><p>reserved AWTs for tactical workloads, and AWT (AMP Worker Task) availability is likely not the</p><p>bottleneck here. Simply increasing the number of AWTs without addressing the core CPU and</p><p>I/O resource allocation will not improve tactical workload response.</p><p>Option D (Adjust the limits of AWT concurrency in the tactical tier using DBS control) might</p><p>provide marginal improvements but won't have a significant impact on overall resource</p><p>prioritization. It focuses more on concurrency management than directly improving workload</p><p>performance through resource allocation.</p><p>9. An Administrator needs to perform a cleanup task on the LOAD_ISOLATED table</p><p>Employee_Address, which has grown in size.</p><p>Which lock is placed on the table when the Administrator performs clean up of the logically</p><p>deleted rows?</p><p>A. WRITE</p><p>B. ROW ACCESS</p><p>C. EXCLUSIVE</p><p>D. IREAD</p><p>Answer: A</p><p>Explanation:</p><p>When performing cleanup tasks such as deleting logically deleted rows, the WRITE lock is</p><p>typically applied. This lock ensures that the Administrator can modify the data in the table (such</p><p>as removing logically deleted rows) while preventing other users from accessing the table for</p><p>write operations. However, it allows other users to read from the table.</p><p>Other lock types:</p><p>ROW ACCESS allows reading specific rows without blocking other access, which is not suitable</p><p>for cleanup tasks.</p><p>EXCLUSIVE locks the entire table for both reading and writing, which is generally too restrictive</p><p>for this kind of operation.</p><p>READ only allows read access and does not permit any modifications, which would prevent the</p><p>cleanup task from being performed.</p><p>10. An Administrator wants to see the list of foreign servers and their parameters in a Teradata</p><p>7 / 9</p><p>QueryGrid configuration for a Vantage system.</p><p>Which database shows this information?</p><p>A. TD_SYSFNLIB</p><p>B. TD_SERVER_DB</p><p>C. TD_FOREIGN_DB</p><p>D. SECADMIN</p><p>Answer: B</p><p>Explanation:</p><p>TD_SERVER_DB contains the metadata for foreign servers and their configurations in a</p><p>Teradata QueryGrid environment. This includes information about the foreign servers and their</p><p>associated parameters, which is useful for managing and monitoring QueryGrid connections.</p><p>The other options are not directly relevant for this purpose:</p><p>TD_SYSFNLIB contains system functions and is unrelated to QueryGrid server configurations.</p><p>TD_FOREIGN_DB is not a valid database in the context of QueryGrid configuration.</p><p>SECADMIN is related to security and user management but does not contain information about</p><p>foreign servers in QueryGrid.</p><p>11. Which spool threshold can an Administrator set to define workload management exception</p><p>criteria?</p><p>A. Maximum Spool Rows</p><p>B. Spool Skew</p><p>C. Hot AMP Spool</p><p>D. Max Spool Space By AMP</p><p>Answer: B</p><p>Explanation:</p><p>Spool Skew is a threshold that an Administrator can set in workload management to detect and</p><p>manage uneven distribution of spool space usage across AMPs (Access Module Processors).</p><p>When spool skew exceeds a certain threshold, it can trigger exception handling or corrective</p><p>actions, helping to prevent performance degradation caused by unbalanced resource utilization.</p><p>The other options are less commonly used for defining workload management exception</p><p>criteria:</p><p>Maximum Spool Rows: This is not a standard threshold for workload management.</p><p>Hot AMP Spool: While this refers to uneven spool space usage on a specific AMP, spool skew</p><p>is the more appropriate term and metric used for setting thresholds.</p><p>Max Spool Space By AMP: This isn't a standard workload management threshold. Spool space</p><p>limits are generally applied system-wide or per user, not by AMP.</p><p>8 / 9</p><p>More Hot Exams are available.</p><p>350-401 ENCOR Exam Dumps</p><p>350-801 CLCOR Exam Dumps</p><p>200-301 CCNA Exam Dumps</p><p>Powered by TCPDF (www.tcpdf.org)</p><p>9 / 9</p><p>https://www.certqueen.com/promotion.asp</p><p>https://www.certqueen.com/350-401.html</p><p>https://www.certqueen.com/350-801.html</p><p>https://www.certqueen.com/200-301.html</p><p>http://www.tcpdf.org</p>