Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-768 Exam -

Free HP0-768 Sample Questions:

Q: 1 Which parameter can only be configured when adding an audit trail?
A. audit trail file size
B. active volumes
C. files per volume
D. audit trail prefix
Answer: A

Q: 2 Under what circumstance is it possible to have audited data on the same volume as audit trail files which have not yet been dumped?
A. when the volume is defined as an overflow volume
B. when the volume is defined as a restore volume
C. when index files or alternate key files are the only audited data files on this volume
D. when the data is being replicated by the remote data facility (RDF)
Answer: A

Q: 3 Which action does TMF perform during TMF overflow processing?
A. Audit trails are copied from the active volume to the overflow volume.
B. New audit trails are created on the overflow volume until the oldest file is unpinned.
C. Overflow threshold is temporarily increased to the begintransdisable threshold.
D. Audit trail files are renamed.
Answer: A

Q: 4 Which TMFCOM command requires that TMF is stopped? Select TWO.
Answer: A, E

Q: 5 What can reduce the amount of disk contention and excessive seeks during audit dump processing?
A. mirroring disk drives
B. configuring more than one active audit volume for an audit trail
C. configuring more than one tape device for the audit dump process
D. configuring more files per active audit volume
Answer: B

Q: 6 Performing a TMFCOM ALTER DATAVOLS to change RECOVERYMODE from ARCHIVE to ONLINE _______.
A. causes audit trails which may be needed for volume recovery to be restored to disk
B. releases audit trails that were pinned on disk because they would be needed for volume recovery
C. causes subsequent audit trails to be retained on disk for as long as they may be needed for volume recovery
D. forces a volume recovery operation on that data volume
Answer: C

Q: 7 When is it possible for multiple TMF configurations to be active at the same time?
A. Only one TMF configuration is allowed to be active at one time.
B. after the TMFCOM ALTER TMF, CONFVOL command has been used
C. when there are multiple RDF configurations in use
D. when both master and auxiliary audit trails have been configured
Answer: A

Q: 8 What is the purpose of data volumes in the TMF configuration?
A. to contain the data to be protected
B. to contain the data generated by TMF for protection
C. to contain the TMF configuration information
D. to contain the TMF catalog
Answer: A

Q: 9 Which TMFCOM command MUST be used prior to configuring TMF with a new audit trail?
Answer: A

Q: 10 What can you do to increase audit trail capacity on a running system? Select TWO.
A. Increase the size of the audit trail files.
B. Add an auxiliary audit trail.
C. Add an active audit volume.
D. Increase the number of audit trail files per active audit volume.
E. Free disk space on existing active audit volumes.
Answer: C, D

Q: 11 A TMF data volume has a status of DISABLED (DIRTY). Which TMFCOM command is necessary to remove the data volume from the TMF configuration?
Answer: A

Q: 12 Which condition may occur after decreasing the number of files per active audit volume in the TMF configuration?
A. The transaction rate will increase.
B. The auto-abort threshold will decrease.
C. The audit trail usage can be reduced.
D. The begintransdisable threshold can be exceeded.
Answer: D

Q: 13 What is the maximum number of auxiliary audit trails that can be added to a TMF configuration?
A. 15
B. 16
C. 99
D. 100
Answer: A

Q: 14 What is contained in the TMF audit trail?
A. process information for applications that generate transactions
B. TMF configuration changes
C. transaction statistics
D. information required by TMF to protect audited files
Answer: D

Q: 15 TMF has been started. What actions must be performed to change the audit trail file size?
A. stop TMF, delete the TMF configuration, add the audit trail specifying the new filesize
B. stop TMF, alter the audit trail specifying the new filesize
C. stop TMF, delete the TMF configuration, alter the audit trail specifying the new filesize
D. stop the audit trail, delete the audit trail, add the audit trail with the new file size
Answer: A

Q: 16 Which task does a TMF begin transaction perform?
A. It marks a set of data records to be read and locked.
B. It identifies the beginning of a logical unit of work.
C. It starts TMF.
D. It identifies the beginning of a new audit trail.
Answer: B

Q: 17 Transaction atomicity implies that _______.
A. only one transaction should be performed at a time
B. all of a transaction's changes are protected from system failure
C. all transactions should be small
D. all or none of a transaction's changes are applied
Answer: D

Q: 18 Transaction isolation implies that _______.
A. a transaction should only contain a single update
B. the outcome of an uncommitted transaction is not visible to another transaction
C. transactions should access data one record at a time
D. transactions are only processed one at a time
Answer: B

Q: 19 What is a purpose of after images in the audit trail?
A. to allow recovery of committed transactions
B. to enable automatic fixes to Enscribe records
C. to keep record changes available to the application
D. to enable compression of online files
Answer: A

Q: 20 What is the relationship of TMF audit trails to data files?
A. Audit trails contain the security access lists for access to the data files.
B. Audit trails contain the pointers to changed records in the data files.
C. Audit trails contain changes made to audited data files.
D. Audit trails contain changes made to all data files.
Answer: C

Q: 21 A purpose of a lock is to _______.
A. coordinate interprocess messages when accessing the database
B. identify the user id of the process updating the record
C. ensure that only a privileged user can make changes
D. isolate changes from other simultaneous change attempts
Answer: D

Q: 22 Which task does a TMF end transaction perform?
A. It searches the audit trail looking for the associated BEGIN event.
B. It guarantees that the database changes will be undone if the transaction aborts.
C. It makes the transaction's database changes permanent and releases the transaction's locks.
D. It maintains transaction history so that the transaction can be subsequently aborted.
Answer: C

Q: 23 What is the primary purpose of "open" transaction standards?
A. to ensure that data types are consistent across all heterogeneous databases
B. to share database change information across heterogeneous databases
C. to allow transactions to span heterogeneous databases
D. to allow database changes to be replicated from one database type to another
Answer: C

Q: 24 A deadlock may occur when _______.
A. a transaction attempts to read through another transaction's database locks
B. one transaction attempts to update a data item that is locked by a long-running transaction
C. two transactions attempt to update the same data item
D. two transactions attempt to lock the same two data items in the opposite order
Answer: D

Q: 25 What is true regarding backups of the TMF configuration subvolume (ZTMFCONF)?
A. It is unnecessary to backup the ZTMFCONF subvolume since it can be recovered from the TMF online dump operations in the event that it is irreparably damaged.
B. It is unnecessary to backup the ZTMFCONF subvolume since it can easily be rebuilt using TMFCOM commands in the event that it is irreparably damaged.
C. The ZTMFCONF subvolume should be backed up daily in order to quickly facilitate its restoration in the event that it is irreparably damaged.
D. The ZTMFCONF subvolume only needs to be backed up if it resides on an unmirrored disk.
Answer: C

Q: 26 The TMFCOM INFO DUMPS command with the OBEYFORM or DETAIL options should be performed on a regular basis to assist with _______.
A. recovery of a damaged TMF catalog
B. looking up the dump number for a recovery operation
C. manual deletion of obsolete dumps
D. pre-loading of audit trails for a volume recovery
Answer: A

Q: 27 Which TMFCOM command is used to recover a specific file, regardless of the flags set in the file label?
A. RECOVER FILES <filename> !
Answer: D

Q: 28 Excessive disk contention on the TMF master audit trail incurred only during an audit dump operation would best be resolved by _______.
A. configuring a block size larger than the default for audit dumping
B. adding a second active volume for the master audit trail
C. adding an auxiliary audit trail volume
D. configuring multiple parallel dump processes for the master audit trail
Answer: B

Q: 29 The user has to recover a purged partition of an Enscribe file. What is the best recovery strategy?
A. The entire file and Enscribe data dictionary must be recovered.
B. The entire file must be recovered and TMF will recover the file structure for the purged partition.
C. Only the purged partition must be recovered and the purged partition will need to be pre-created by the user in its original file structure.
D. Only the purged partition must be recovered and TMF will recover the file structure for the purged partition.
Answer: D

© 2014, All Rights Reserved