Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H13-921_V1.5 Exam Dumps - HCIP-GaussDB-OLTP V1.5

Go to page:
Question # 9

Which functions can database security auditing provide?

A.

Reporting

B.

User behavior audit

C.

Multidimensional analysis

D.

Real-time alerts

Full Access
Question # 10

Which descriptions about session parameters are correct?

A.

max_connections: maximum allowed connections

B.

wait_timeout: max idle time for non-interactive connections

C.

interactive_timeout: max idle time for interactive connections

D.

connect_timeout: exception thrown if connection not established in time

Full Access
Question # 11

When creating a GaussDB (for MySQL) instance, the system automatically creates system accounts (usable by users) to support backend O&M. Which are these accounts?

A.

rdsAdmin

B.

rdsRepl

C.

rdsBackup

D.

rdsMetric

Full Access
Question # 12

In a 16-core, 64GB GaussDB (for MySQL) instance, what is the default size of the innodb_log_buffer_size parameter?

A.

128MB

B.

256MB

C.

512MB

D.

1024MB

Full Access
Question # 13

Which descriptions of important modules in GaussDB (for MySQL) architecture are correct?

A.

Page Stores: persist Pages

B.

SAL (Storage Abstraction Layer): sharding, recovery, remote storage

C.

SQL: transaction commit, based on MySQL 8.0, fully compatible

D.

Log Stores: persist redo logs

Full Access
Question # 14

If an administrator finds that the InnoDB read cache hit rate is low in GaussDB (for MySQL), what should be optimized first?

A.

Change network configuration

B.

Change CPU specification

C.

Optimize SQL statements

D.

Increase buffer size

Full Access
Question # 15

Which of the following are part of GaussDB (for MySQL)'s Cloud Native design philosophy?

A.

Separation of compute and storage, decoupled primary/secondary

B.

Fault-tolerant, self-healing storage layer with shared access (1 write, many reads)

C.

Full utilization of SSD random read performance

D.

Adoption of new network technologies like RDMA

E.

Log-intensive workloads handled by compute nodes (e.g., redo processing)

Full Access
Question # 16

For composite indexes, B+ tree is built left-to-right.

A.

True

B.

False

Full Access
Go to page: