New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H13-922 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H13-922_V1.5

H13-922 Exam Dumps - HCIP-GaussDB-OLAP V1.0

Go to page:
Question # 9

What algorithm does the CLOG log buffer use

A.

FIFO

B.

LRU

C.

SLRU

D.

RANDOM

Full Access
Question # 10

What are the ACID characteristics of transaction

A.

Atomic

B.

Consistency

C.

Isolation

D.

Persistence

Full Access
Question # 11

Please select an isolation type that is not supported by the logical cluster

A.

Resource isolation

B.

Data isolation

C.

Operation and maintenance isolation

D.

Privilege isolation

Full Access
Question # 12

Which of the following options is correct in the description of expansion and reduction

A.

Support DDL operations in user concurrent transaction blocks during capacity expansion

B.

User concurrent transaction blocks are not supported during expansion to create Temp tables.

C.

Physical clusters support scaling

D.

For logical cluster scaling, it can be performed with only one DN

Full Access
Question # 13

What is the correct statement about resource quota among tenants?

A.

After "CPU Quota" is set. The system will allocate CPU execution time to the current tenant in proportion to the "CPU quota"

B.

After the CPU quota parameter is set, the system will assign an exclusive number of CPU cores to the current tenant according to the "CPU quota" ratio. Other tenants can use it flexibly when the load is high

C.

"CPU quota" and "CPU quota" can take effect at the same time

D.

The storage space size of the tenant persistent data table space corresponds to an actual physical storage space size, which is specified by the parent tenant. The total storage used by all child tenants cannot exceed the total storage specified by the parent tenant

Full Access
Question # 14

In addition to the audit function, what are the other database security technologies?

A.

Vulnerability Scan

B.

Database encryption

C.

Data desensitization

Full Access
Question # 15

(Multiple choice) Which of the following information cannot be obtained using the pg_authid system table?

A.

User name

B.

User plaintext password

C.

Is the administrator

D.

Is it locked

Full Access
Question # 16

Which of the following is the GaussDB200 database instance type?

A.

CN

B.

DN

C.

WLM

D.

GTM

Full Access
Go to page: