TE0-124 Teradata 12 Database Administration Practice Exam Set 4

Which statement is true about using triggers?


Options are :

  • An atomicupsert in Tpump with triggers defined can be used.
  • Row and statement operations can be combined within a single trigger definition
  • An AFTER statement trigger can be issued.
  • A row, column, or statement trigger can be defined.

Answer : A row, column, or statement trigger can be defined.

NR0-014 Teradata Administration V2R5 Certified Practice Exam Set 1

A customer has a critical application that runs 24x7. They have experienced data loss on the system in the past and have since implemented fallback on all their critical tables. The customer recently experienced a restart which occurred after two physical disks in the same rank failed. They have since replaced the disks, but now need to restore data to these new disks. Which method should they use to restore data to these disks?


Options are :

  • Restore data by performing a full archive restore.
  • Restore data from the data dictionary.
  • Restore data using the Down AMP Recovery Journal.
  • Restore data from the Transient Journal.

Answer : Restore data using the Down AMP Recovery Journal.

A customer wants to continually load data and only establish row level locking. Which two load utilities are available for the task? (Choose two.)


Options are :

  • Teradata Parallel Transporter (TPT) using the Update Operator
  • MultiLoad
  • Teradata Parallel Transporter (TPT) using the Stream Operator
  • TPump

Answer : Teradata Parallel Transporter (TPT) using the Update Operator MultiLoad

A requirement from auditors is to track all unauthorized and authorized use of sensitive data for a particular table. Which type of logging should be used to track this type of activity?


Options are :

  • LogOnOff Logging
  • Locking Logger
  • ResUsage Logging
  • Access Logging

Answer : Access Logging

TE0-121 12 Teradata Basics Certification Practical Exam Set 4

An administrator has identified an active transaction which is negatively impacting overall system performance. Which tool can be used to terminate the transaction while it is executing?


Options are :

  • Teradata Administrator
  • Priority Scheduler
  • Teradata SQL Administrator
  • Administrative Workstation
  • Performance Monitor

Answer : Administrative Workstation

An end user has been experiencing slow performance on a query. The database administrator suspects the query has processing skew. Which two Database Query Log tables can be used to investigate CPU skew? (Choose two.)


Options are :

  • DBQLogTbl
  • DBQLStepTbl
  • DBQLSqlTbl
  • DBQLSummaryTbl
  • DBQLExplainTbl

Answer : DBQLogTbl DBQLSqlTbl

Which assumptions should be made when planning to copy a database to a different server platform?


Options are :

  • User Defined Types will not be copied and will need to be recompiled.
  • User Defined Function external shared libraries/DLLare copied automatically.
  • UDFs within the database must be copied individually.
  • Existing Stored Procedures will be dropped and then copied.

Answer : Existing Stored Procedures will be dropped and then copied.

TE0-121 Teradata Basics Practice Test Set 3

Which two are characteristics of a well-performing tactical query? (Choose two.)


Options are :

  • primarily single or few-AMP queries
  • typicallyscan multiple partitions
  • large amount of spool space utilized
  • all-AMP queries that consume less than 0.5 CPU second per node

Answer : primarily single or few-AMP queries typicallyscan multiple partitions

Which two are true about when the object use count data held in cache will be written to disk? (Choose two.)


Options are :

  • when the object use count parameter is turned off
  • when theDBC.ObjectUseCollect macro is executed
  • when the cache cannot store any more object data
  • whenObjectUseCountCollectRate in DBS Control is reached

Answer : when the cache cannot store any more object data whenObjectUseCountCollectRate in DBS Control is reached

Which utility is utilized to create the SYSLIB database for User Defined Functions?


Options are :

  • DBS Control (dbscontrol)
  • Update DBC (updatedbc)
  • Configuration Utility (config)
  • Database Initialization Program (DIP)

Answer : Update DBC (updatedbc)

NCR NR0-017 Teradata Masters Update V2R5 Practice Exam Set 4

If a single-partition archive only has data for one month (December, 2009) and the following RESTORE statement is used to restore data from a partitioned archive: RESTORE DATA TABLES (SalesDB.Sales_Tbl), (PARTITIONS WHERE (!Sales_Date BETWEEN '2009-11-01' AND '2009-12-31'!)), FILE = salesarc; Which action is performed by the RESTORE statement?


Options are :

  • Nothing, an error occurs because the RESTORE statement identifies partitions that are not defined in the archive.
  • All of the rows associated with November and December are deleted and rows for December are restored.
  • Only the rows for December are deleted and rows for December are restored.
  • All of the rows in the table are deleted and rows for December are restored.

Answer : All of the rows in the table are deleted and rows for December are restored.

Which utility can be used to change the Node logging rate?


Options are :

  • schmon
  • awtmon
  • gtwglobal
  • ctl/xctl

Answer : schmon

Users are submitting transactions to the Teradata database via a middle-tier server. What would facilitate immediate execution of the requests?


Options are :

  • Pool the transactions before making a call to the database
  • Pool the sessions so logons are pre-established.
  • Pool the requests so they can work in parallel.
  • Pool the queries so they can be cached.

Answer : Pool the sessions so logons are pre-established.

TE0-124 Teradata 12 Database Administration Practice Exam Set 5

Table1 is defined with Fallback. Table2 does not have Fallback. While updating 100 rows on each table, if the update fails, which type of protection is provided by the system to maintain the integrity of the data?


Options are :

  • Table1 - After Image Journal; Table2 - Before Image Journal
  • Table1 - Transient Journal; Table2 - Before Image Journal
  • Table1 - Transient Journal; Table2 - Transient Journal
  • Table1 - Transient Journal; Table2 - Down AMP Recovery Journal
  • Table1 - Down AMP Recovery Journal; Table2 - Transient Journal

Answer : Table1 - Transient Journal; Table2 - Transient Journal

While executing the FastLoad Utility to load a Fallback table, a database full condition occurs during the Acquisition Phase (Phase 1). Which action should be performed to complete the load?


Options are :

  • Assign more space, specify Record 1 in the Begin Loading command in the script, and resubmit the script.
  • Assign more space and resubmit the script.
  • Drop all secondary indexes and resubmit the script.
  • Assign more space, specify the checkpoint number in the Begin Loading command in the script, and resubmit the script.

Answer : Assign more space, specify the checkpoint number in the Begin Loading command in the script, and resubmit the script.

Which three objects are restored during an All-AMP Restore of an entire Database? (Choose three.)


Options are :

  • User Defined Types
  • Triggers
  • Stored Procedures
  • User Defined Functions

Answer : Triggers Stored Procedures User Defined Functions

NR0-015 Teradata Design Architecture V2R5 Practice Test Set 2

When implementing a new application, which two techniques can help limit DBC.AccessRights table growth? (Choose two.)


Options are :

  • Implement views on the tables and grant privileges to the views.
  • Grant rights at the Database level to ALL users.
  • Grant rights on each object to a Profile and grant the Profile to each user.
  • Grant rights on each object to a Role and grant the Role to each user.

Answer : Grant rights at the Database level to ALL users. Grant rights on each object to a Role and grant the Role to each user.

While analyzing node utilization reports, the system administrator recognizes that network connections are skewed to one node. What could be causing this to happen? (Choose two)


Options are :

  • Many clients are using ODBC and have only defined the first node.
  • Many clients are using OLEDB and have not defined theNumberOfCOPS.
  • Many clients are using BTEQ and did not specify the database to use, so they are using the default DBC.
  • Many clients are using a load utility only specifying the first node

Answer : Many clients are using OLEDB and have not defined theNumberOfCOPS. Many clients are using BTEQ and did not specify the database to use, so they are using the default DBC.

A customer wants to conditionally protect employees' birthdates from being viewed by users outside of the Human Resources (HR) department but allow all employees to retrieve their personal data. Which two methods work together to meet this requirement? (Choose two.)


Options are :

  • Use a WHERE clause restricting data retrieval to HR users only.
  • Restrict access to the table using database roles.
  • Use a CASE expression in a view.
  • Use a user-defined function to decrypt thebirthdate data during retrieval.

Answer : Restrict access to the table using database roles. Use a user-defined function to decrypt thebirthdate data during retrieval.

TE0-141 14 Teradata Basics Certified Practice Test Set 2

Which utility is used to alter the number of AMPs in a system?


Options are :

  • reconfig
  • rcvmanager
  • dbscontrol
  • vprocmanager

Answer : vprocmanager

A customer wants to load multiple input data files as they appear in a Unix file directory using a single load operation. Which load utility is available for the task?


Options are :

  • TPump
  • FastLoad
  • Teradata Parallel Transporter (TPT)
  • MultiLoad

Answer : TPump

Queries are being submitted to the Teradata database through a middle-tier application using session pooling. What should be used to identify the submitting user?


Options are :

  • External Stored Procedure
  • Queryband
  • DBC.AccessLog view
  • DBC.LogOnOff

Answer : External Stored Procedure

NR0-016 NCR Teradata Application Development V2R5 Exam Set 2

When is a user allowed to log on with a NULL password?


Options are :

  • When Single-Sign-On is not enforced.
  • When the password is defined as NULL.
  • When the site employs external authorization.
  • When a password was not specified in the CREATE USER statement.

Answer : When the password is defined as NULL.

A customer wants to set up and utilize query access logging. Which management tool is available for the task?


Options are :

  • Teradata Administrator
  • Teradata Query Director
  • Administrative Workstation
  • Teradata Dynamic Workload Manager (TDWM)

Answer : Administrative Workstation

Which statement is true if an ALTER TABLE is executed on a populated table?


Options are :

  • When compression is added to a VARCHAR column, NULL values are compressed.
  • Fallback can be added if two AMPs in a cluster are down.
  • When the AFTER IMAGE JOURNAL is added to the table, ROLLBACK is supported
  • If the table is defined with a single-level PPI, you can ADD and DROP ranges at either end.

Answer : If the table is defined with a single-level PPI, you can ADD and DROP ranges at either end.

TE0-126 Teradata 12 Enterprise Architecture Practice Exam Set 2

When planning for disaster recovery, which two assumptions are valid? (Choose two.)


Options are :

  • UDF external shared libraries/DLL must be restored separately.
  • Stored Procedures must be restored separately.
  • SYSUDTLIB is included with a DBC archive.
  • A cluster Restore will restore UDF Dictionary and source code.

Answer : Stored Procedures must be restored separately. A cluster Restore will restore UDF Dictionary and source code.

When a set of jobs was initially implemented on a system where these jobs were the only workload executing, they completed within an hour. Twelve months later the same set of jobs is still the only workload and completes in two hours. The batch window for this set of jobs is four hours. Assuming that the same trend continues, which ResUsage table should be used to estimate when this set of jobs might run longer than the four hour window?


Options are :

  • DBC.ResUsageSldv
  • DBC.ResUsageSawt
  • DBC.ResUsageSpma
  • DBC.ResUsageSps

Answer : DBC.ResUsageSpma

A system administrator is receiving calls from various user communities that their queries are taking longer to run than normal. Which tool can be used to see the number of active throttles?


Options are :

  • Gateway Control
  • PMON
  • TDWM
  • Throttle Monitor

Answer : Throttle Monitor

TE0-141 14 Teradata Basics Certified Practice Test Set 4

A former employee was overheard talking about continuing to remotely access the system using an application ID through the mainframe. How can the security administrator determine if a breach has occurred? (Choose two.)


Options are :

  • Evaluate logon attempts in theDBC.TDPExitLog table.
  • Check theDBC.AccessLog for queries that might have been run.
  • Research logon source information inDBC.LogOnOff.
  • Investigate the application ID logons in theDBC.SW_Event_Log table.

Answer : Evaluate logon attempts in theDBC.TDPExitLog table. Research logon source information inDBC.LogOnOff.

A customer expects to get large amounts of data once a week and requires the data to be split into three tables during a single load process. Which load utility is available for the task?


Options are :

  • FastLoad
  • Teradata Parallel Transporter (TPT) using the Load Operator
  • Teradata Parallel Transporter (TPT) using a Producer Operator
  • Teradata Parallel Transporter (TPT) using the Update Operator

Answer : FastLoad

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions