Examine Joe's account:
CREATE USER 'joe'@'%' IDENTIFIED BY '*secret*'
GRANT ALL PRIVILEGES ON *.* TO 'joe'@'%'
All existing connections for joe are killed.
Which two commands will stop joe establishing access to the MySQL instance? (Choose two.)
Which two statements are true about the binary log encryption feature? (Choose two.)
A valid raw backup of the shop.customers MyISAM table was taken.
You must restore the table. You begin with these steps:
1.Confirm that secure_file_priv=’/var/tmp’
2.mysql> DROP TABLE shop.customers;
3.shell> cp /backup/customers.MY* /var/lib/mysql/shop/
Which two actions are required to complete the restore? (Choose two.)
You wish to store the username and password for a client connection to MySQL server in a file on a local file system.
Which is the best way to encrypt the file?