You are on page 1of 6

Questions and Answers from

it.toolbox.com for the


certification on TADM51
Oracle
Answer cannot be trusted so use them on your own risk.

1. The separate server process created on behalf of each work process (generally, of a user process) is
called
A. System process
B. Standard process
C. Dedicated process
D. Shadow process
2. Which SAP tool is used to change the password of SAP
3. SAP recommends that you should not use BRCONNECT to shutdown and startup the database. Why?
4. Rollback segments are created by the SAP installation tool using the storage parameters
A. INITIAL
B. OPTIMAL
C. MAXEXTENT
D. MINEXTENT
E. NEXT
5. Which of the following parameters influences the behavior of the Oracle cost based optimizer
A. TUNE_OPTIMIZER
B. OPTIMIZER_MODE
C. CBO_ULTRA_WARP
D. DB_FILE_MULTIBLOCK_READ_COUNT
E. dba/ora/use_hint
6. As the SAP administrator, you want to use the compression functionality of BRBACKUP/BRARCHIVE;
you have set the parameter compress=yes, what other two (2) parameters must be set
7. In which transaction allows you to know which files must be restored in the event of a recovery
A. DB12
B. DB13
C. DB14
D. DB16
8. The SAP administrator for the external backup tools in combination with RMAN backup sets, what value
will you set backup_dev_type to?
9. SAP recommends that the archive directory (defined by the Oracle parameter log _archiver_dest) should
be on a different disk from the directory where BRARCHIVE stores its log file ($SAPARCH; or if not set,
$SAPDATA_HOME/saparch), Why?
10. The SAP recommended update statistics strategy involves which of the following steps?
A. Watch and hide logs
B. Monitoring and evaluation of table accesses
C. Scanning and update statistics
D. Check and update statistics
E. Write to file and delete old table entries
11. ______ and _____ special systems privileges gives you administrative privileges to perform certain
database operations for which privileges cannot be granted in any other fashion
12. In an SAP system; which kind of authentication is used to connect to Oracle using the SYSDBA and
SYSOPER privileges
13. Create tablespace is an example of object privileges. True/False
14. The SYSOPER special system privilege can perform the following tasks as SAPDBA privilege except
A. Database shutdown
B. Create database

1
C. View user data
D. BACKUP DATABASE
E. ARCHIVELOG
15. The SYSDBA and SYSOPER system privilege allow access to a database instance when the database
is not open. True/False
16. Control of the SYSDBA and SYSOPER system privilege is totally outside the database itself. True/False
17. In SAP system with Oracle, special operating system users created during the installation have
privileges for administration and maintenance of the Oracle database. True/False
18. Mention two (2) OS users created each in UNIX and windows platform during the installation of SAP on
Oracle
19. Which of the following OS users groups in UNIX and Windows platform has full administration of all
instances
A. dba
B. oper
C. ORA__DBA
D. ORA__OPER
E. ORA_DBA
20. If you assign a database role to a database user, the user will be granted all privileges included in the
role. True/False
21. Which of the following is a predefined Oracle database role
A. DBA
B. SYSDBA
C. SYSOPER
22. Because the DBA predefined role is flagged with the ADMIN option; it can be used to shutdown and start
an Oracle instance. True/
23. The SAP installation creates just one additional role called ______
24. The SAPDBA role contains the Oracle system privileges and objects privileges. True/False.
25. What is the implication of having different number of work processes defined differently in different
places in the system
A. No implication, the system resolves it by taking the definition of the kernel
B. Inconsistencies can occur
C. The switching must be done manually
D. The switching takes place dynamically
26. Packages are created and managed with
A. Package Builder (SPAK)
B. Package Developer (SPAK)
C. Package Editor (SPAK)
D. ABAP Editor (SE38)
27. It is possible for an individual to request for his own namespace in SAP. True/False
28. Workbench and customizing requests are both created with
A. SE10
B. SE09
C. SE12
D. SE21
29. What elements are parts of the data structure of an SAP system?
A. Registry Repository
B. Object Repository
C. Client
D. Database Server
E. Cross-client customizing
F. SAP Kernel
30. Decide which of the following statements are correct
A. Entering customer data requires a customizing request
B. A change request contains one or more tasks
C. A task can always be assigned to only one developer
D. Any customizing requires a customizing request
31. Which statements are correct?
A. The transport of objects is divided into export, storage and import phases
B. The import into target system is performed automatically at midnight Greenwich Mean Time
C. The transport directory is specified by parameter DIR_TRANS

2
D. When transporting, the following rules applies: The target client is the same as the source client,
unless otherwise specified
32. Work processes use a shared user to access the database. True/false
33. Users are assigned authorizations using
A. Privileges
B. Profile
C. Roles
D. Authentication
34. Which of the following are user types in an SAP system
A. Dialog
B. System
C. Communication
D. Service
E. RFC
F. Reference
35. Which of these user types is used to assign additional authorization
A. Dialog
B. System
C. Communication
D. Reference
36. Which of the following user type is used for anonymous system accesses using an ITS or ICF service
A. Dialog
B. System
C. Service
D. Communication
E. Reference
37. Which of the following user types can be used for dialog free communication within the system
A. Dialog
B. System
C. Service
D. Communication
E. Reference
38. Which of the following user types requires only the system administrator to change the password
A. Dialog
B. System
C. Service
D. Communication
E. Reference
39. Which of the following user type is exempted from the usual settings for the validity period of a password

A. Dialog
B. System
C. Communication
D. Reference
E. Service
40. It is recommended that databases are checked at least once per backup cycle for data block corruption.
This can be achieved by
A. Using the verify option (-w|verify use_dbv) when running brbackup
B. Performing level 0 backup using Orale Recovery Manager (RMAN) together with SAP tools
C. Using the verify (w|verify use_dbv) when running brarchive
D. Oracle always checks for corrupt data blocks whenever a back is done.
41. How will you know the current patch level of your SAP Web AS Java?
A. This can be determined by using transaction SMICM
B. In the command prompt, type java – version
C. Through the service /sap/monitoring/systeminfo
D. It is not possible to know the current patch level except the current kernel patch level.
42. The work processes of a started instance of web application server 6.20 connects to the Oracle
database with which of the following user IDs?
A. System
B. Sysdba
C. SAPR3
D. SAP

3
43. The following are correct in respect to OPS$connect except
A. OPS $connect authorization is needed for all users connecting to the Oracle database
B. BR*Tools uses the OPS$ connect by default to connect to the database
C. OPS $ connect enables the SAP work processes to connect to the Oracle database
D. OPS $ connect authorization allows an operating system user to connect to the database without
being prompted for a password.
44. The following rules applies to accessing buffered data except?
A. Native SQL Statements do not make use of SAP buffer
B. You need to use “SELECT SINGLE…” statements to access partial buffered (single record buffering)
data
C. SAP tables content is not buffered by default. You are required to activate buffering as you see the
need.
D. The statement “SELECT…USING BUFFER” always accessed buffered data
E. The statement “SELECT BYPASSING BUFFER” do not make use of SAP buffers.
45. Which settings are necessary for activating the integrated ITS. (More than one answer is correct)
A. Set the profile parameter itsp/enable to 1
B. Activate the ICF service /sap/public/bc/its/mimes
C. Set the profile parameter itsp/enable to Y
D. Activate the ICF service /sap/its/java/integrated
46. Which of the following is correct is NOT correct about Java Message Server? (More than one answer is
correct)

A. The message server allows for synchronization of data across the cluster
B. The message server is used for load balancing.
C. The Message server is a brand new coding specifically designed for SAP Web AS 6.40
D. The message server is not a critical component of SAP Web AS
47. Which of the following is correct about the Generic Request and Message Generator (GRMG)?
A. It uses HTTP or HTTPS to exchange XML based monitoring data.
B. It uses RFC connection to exchange XML based monitoring data.
C. It uses SMTP to exchange XML based monitoring data.
D. It uses BAPI to exchange XML based monitoring data.
48. Which of the following tools will you use to install additional instance for your existing SAP Web AS Java
instance?
A. Telnet
B. SAPinst
C. Visual Administrator
D. Configuration Editor
49. Which of the following tools does SAP recommend that you use when changing the password of the
users SYS and SYSTEM?

A. BRRESTORE
B. BRSPACE
C. BRCONNECT
D. It is not possible to change the password of powerful users account like SYS and SYSTEM

4
The Answers :

1. D
2. BRCONNECT (The chpass function of BRCONNECT)
3. It does not write log files of its action unlike BRSPACE
4. A, C, D, E
5. B, D, E. Others are OPTIMIZER_INDEX_CACHING;
HASH_AREA_SIZE/PGA_AGGREGATE_TARGET; SORT_AREA_SIZE;
OPTIMIZER_INDEX_COST_ADJ
6. compress_cmd & compress_dev
7. A. The “recovery report” button
8. rman_util or rman_disks or rman_stage
9. To prevent an archiver stuck, so that if the archive directory is full, running BRARCHIVE to save and
delete the existing archived redo log files might fail because BRARCHIVE cannot write into its log file
10. D
11. SYSDBA; SYSOPER
12. Operating System
13. False
14. B, C
15. True
16. True
17. True
18. Windows: adm and SAPService UNIX: ora and adm
19. A, E; B and D has restricted administration of all and DBSID instances respectively. C has full
administration of the instance and not all instances.
20. True. System and Object privileges are pooled to database roles
21. A
22. False. You still need the SYSOPER/SYSDBA privilege
23. SAPDBA
24. True
25. B. If it is not possible to switch between operation modes, this is usually due to inconsistencies in the
SAP system. These inconsistencies can occur if the number of work processes is defined differently in
different places in the system. There are the instance profiles at operating system level, the instance
profile in the database, and the definition of operation modes themselves. If for example, the number of
work process in the profile is changed, the system can no longer switch operation modes until after a
restart of the instance. It is therefore necessary to adjust the configuration of the operation modes after a
change to the profile.
26. A.
27. True. You can request your own namespace that begins and end with “/” free of charge from SAP. E.g
/Firm/. All of the objects that you write then have a name beginning with “/Firm” such as
“/Firm/GreatProgram/”.
28. A, B
29. B, C, E. The object repository, cross client customizing, and the clients are part of the data structures of
an SAP system. The database structure is not part of the data structure, rather, it contains it.
30. B, C. Entering customer data is not part of customizing and therefore does not require a customizing
request. Only client dependent customizing requires a customizing request; cross client customizing, on
the other hand, requires a workbench request. A change request contains one or more tasks, each of
which are assigned to only one developer.
31. C, D. The transport is divided into only two phases: Export and Import. The import into database of the
target system is never performed automatically.
32. True
33. C
34. A, B, C, D, F. RFC is not a type of user in SAP.
35. D. A reference user is used only to assign additional authorization. You can specify a reference user for
a dialog user for additional authorization on the roles tab page. A reference user is a general non-
person-related user.
36. C. A service user is a dialog user that is available to a larger anonymous group of users. You should only
assign highly restricted authorizations to users of this type
37. B, D
38. B, C
39. B

5
40. A, B
During a database backup with the option –verify use_dbv, BRBACKUP checks whether the backup
contains corrupt data blocks.
Through the oracle shadow process, RMAN reads data blocks from the database, checks them for
corruption and filters those blocks out that have never been used.
Corrupt data blocks are not recognized during a backup, therefore a database backup can contain
corrupt data blocks
41. C
You can display information about the current patch level of SAP Web AS Java and the applications in
the browser by calling the URL http://:/sap/monitoring/systeminfo
42. D
SAP processes no longer connect to the database with the user SAPR3, but with the user SAP
43. A, C
To avoid password having to be entered interactively or appear on the command line, BR*Tools normally
use the OPS$ user to connect to the database. To use a different user for the database, specify –u|usr.
An operating system user can only perform connect/ successfully if corresponding OPS$ user exist in
the oracle database.
44. D
Table buffering is one of the most important performance related feature of open SQL. To reduce
database load and network communication, parts of a database table can be marked for buffering using
java dictionary.
45. A, B
As part of SAP Web AS 6.40, the integrated ITS is automatically installed with the SAP Kernel. To be
able to use the integrated ITS, the following prerequisites must be fulfilled.

1. The ICM process is running and is configured for Http(s)


2. The Profile parameter itsp/enable is set to 1
3. The desired ITS Service has been published to the INTERNAL site
4. The desired ITS Service is activated in the ICF and the GUI Link property is set to Y
5. The ICF service /sap/public/bc/its/mimes is activated in the ICF.

In many installations, customers activate the ITS integrated into SAP Web AS 6.40 in order to be able to
conveniently use SAP GUI for HTML.

Options C and D are wrong


46. C, D
The Java message server is designed to allow Java applications to use enterprise messaging systems.
The J2EE server must handle clustering and load balancing. The Java cluster requires a special
instance called the central instance.
The central services consist of the Java message server and the Java enqueue server. You can also call
the message server for availability monitoring in addition to the ABAP message server.
47. A
The Generic Request and Message Generator (GRMG) is a central infrastructure for availability
monitoring of Java based components and applications.
It consist of two parts namely Infrastructure and Applications

How it works:

GRMG infrastructure periodically calls GRMG application using URLs (HTTP)


GRMG request (XML) is sent to GRMG application to check availability
GRMG application returns a response (XML)
48. B
When you double click sapinst.exe in the subdirectory …. \SAPINST\NT\I386 of the installation master
DVD; you have installed another dialog instance for your existing SAP Web AS ABAP/Java.
49. C

SAP recommends that you should never change the password of critical database users like SYS and
SYSTEM by oracle methods. The password would not be modified in the table SAPUSER; consequently
work processes would send a connect request with the wrong password, which will be refused by oracle.
SAP recommends that you use the SAP tool BRCONNECT to change passwords.