11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1z0-908 Exam Dumps - MySQL 8.0 Database Administrator

Question # 4

Your my.cnf file contains these settings:

You want to log queries that looked at a minimum of 5000 records and either took longer than 5 seconds to run or did not use indexes.

Which contains all the settings that you need to add to or modify the slow log configuration?

A.

min_examined_row_limit=5000

B.

long_query_time=5

log_throttle_queries_not_using_indexes=5

C.

log_throttle_queries_not_using_indexes=5

min_examined_ row_limit=5000

D.

long_query_time=5

E.

long_query_time=5

min_examined_row_limit=5000

F.

log_throttle_queries_not_using_indexes=5

G.

long_query_time=5

log_throttle_queries_not_using_indexes=5

min_examined_row_limit=5000

Full Access
Question # 5

Which four are types of information stored in the MySQL data dictionary? (Choose four.)

A.

performance metrics

B.

table definitions

C.

access control lists

D.

view definitions

E.

server runtime configuration

F.

server configuration rollback

G.

stored procedure definitions

Full Access
Question # 6

Examine this command, which executes successfully on InnoDB Cluster: dba.dropMetadataSchema()

Which two statements are true? (Choose two.)

A.

Group Replication will be dissolved and all metadata purged.

B.

Group Replication is still operational, but InnoDB Cluster must be reimported under MySQL Shell.

C.

The mysql_innodb_cluster_metadata schema is dropped from the instance where the connection was established.

D.

The command drops the mysql_innodb_cluster_metadata schema and re-creates it.

E.

The mysql_innodb_cluster_metadata schema is dropped from all reachable members of the cluster.

F.

Connections driven by MySQL Router are not affected by the command.

Full Access
Question # 7

Which two are valid uses for binary logs on a MySQL instance? (Choose two.)

A.

recording the order in which queries are issued

B.

audit of all queries

C.

point-in-time recovery

D.

replication

E.

logging the duration and locks for all queries

Full Access
Question # 8

Which three actions are effective in capacity planning? (Choose three.)

A.

buying more RAM

B.

monitoring OS resources for patterns

C.

adding circular replication nodes for increased DML capability

D.

buying more CPU

E.

buying more disk

F.

basing expected growth on an average of the last 3 years

G.

consulting the application team about any future projects and use

Full Access
Question # 9

Examine these InnoDB Cluster parameter settings:

Now examine the partial status:

A permanent network failure isolates host3.

Which two statements are true? (Choose two.)

A.

The instance deployed on host2 is elected as the new primary instance.

B.

The instance deployed on host3 is expelled from the cluster and must be rejoined using cluster.addInstance ('host3:3377')

C.

The instance deployed on host3 will automatically rejoin the cluster when connectivity is re-established.

D.

Failure of the instance deployed on host1 provokes an outage.

E.

The issuing command cluster.switchToMuitiPrimaryMode() will fail to enable multi-primary mode.

F.

The primary instance can be specified by using the command cluster.setPrimaryInstance(:).

Full Access
Question # 10

Examine this query and output:

Which two statements are true? (Choose two.)

A.

The country table is accessed as the first table, and then joined to the city table.

B.

It takes more than 8 milliseconds to sort the rows.

C.

The optimizer estimates that 51 rows in the country table have Continent = ‘Asia’.

D.

35 rows from the city table are included in the result.

E.

The query returns exactly 125 rows.

Full Access
Question # 11

How can mysql_multi be configured to allow MySQL instances to use the same port number?

A.

The instances use different user accounts unique to each instance.

B.

The instances listen on different IP addresses.

C.

The instances use different socket names.

D.

The instances have appropriate net masks set.

Full Access
Question # 12

There are five MySQL instances configured with a working group replication.

Examine the output of the group members:

Which two statements are true about network partitioning in the cluster? (Choose two.)

A.

The cluster will shut down to preserve data consistency.

B.

The cluster has built-in high availability and updates group_replication_ip_whitelist to remove the unreachable nodes.

C.

The group replication will buffer the transactions on the online nodes until the unreachable nodes return online.

D.

There could be both a 2 node and 3 node group replication still running, so shutting down group replication and diagnosing the issue is recommended.

E.

A manual intervention to force group members to be only the working two instances is required.

Full Access
Question # 13

Which two are use cases of MySQL asynchronous replication? (Choose two.)

A.

You can scale writes by creating a replicated mesh.

B.

It guarantees near real-time replication between a master and a slave.

C.

You can scale reads by adding multiple slaves.

D.

MySQL Enterprise Backup will automatically back up from an available slave.

E.

It allows backup to be done on the slave without impacting the master.

Full Access
Question # 14

User account baduser@hostname on your MySQL instance has been compromised.

Which two commands stop any new connections using the compromised account? (Choose two.)

A.

ALTER USER baduser@hostname PASSWORD DISABLED;

B.

ALTER USER baduser@hostname MAX_USER_CONNECTIONS 0;

C.

ALTER USER baduser@hostname ACCOUNT LOCK;

D.

ALTER USER baduser@hostname IDENTIFIED WITH mysql_no_login;

E.

ALTER USER baduser@hostname DEFAULT ROLE NONE;

Full Access
Question # 15

You must configure the MySQL command-line client to provide the highest level of trust and security when connecting to a remote MySQL Server.

Which value of --ssl-mode will do this?

A.

PREFERRED

B.

VERIFY_CA

C.

REQUIRED

D.

VERIFY_IDENTITY

Full Access
Question # 16

You wish to protect your MySQL database against SQL injection attacks.

Which method would fail to do this?

A.

installing and configuring the Connection Control plugin

B.

avoiding concatenation of SQL statements and user-supplied values in an application

C.

using stored procedures for any database access

D.

using PREPARED STATEMENTS

Full Access
Question # 17

Examine Joe's account:

CREATE USER 'joe'@'%' IDENTIFIED BY '*secret*'

GRANT ALL PRIVILEGES ON *.* TO 'joe'@'%'

All existing connections for joe are killed.

Which two commands will stop joe establishing access to the MySQL instance? (Choose two.)

A.

ALTER USER 'joe'@'%' ACCOUNT LOCK

B.

ALTER USER 'joe'@'%' SET password='*invalid*'

C.

REVOKE ALL PRIVILEGES ON *.* FROM 'joe'@'%'

D.

ALTER USER 'joe'@'%' PASSWORD HISTORY 0

E.

ALTER USER 'joe'@'%' IDENTIFIED BY '*invalid*' PASSWORD EXPIRE

F.

REVOKE USAGE ON *.* FROM 'joe'@'%'

Full Access
Question # 18

Which two statements are true about the binary log encryption feature? (Choose two.)

A.

It encrypts any connecting slaves connection thread.

B.

It can be set at run time.

C.

It requires a keyring plugin.

D.

When enabled it encrypts existing binary logs.

E.

It can be activated per session.

Full Access
Question # 19

A valid raw backup of the shop.customers MyISAM table was taken.

You must restore the table. You begin with these steps:

1.Confirm that secure_file_priv=’/var/tmp’

2.mysql> DROP TABLE shop.customers;

3.shell> cp /backup/customers.MY* /var/lib/mysql/shop/

Which two actions are required to complete the restore? (Choose two.)

A.

shell> cp /backup/customers.sdi /var/tmp

B.

shell> cp /backup/customers.sdi /var/lib/mysql/shop/

C.

mysql> SOURCE ‘/var/tmp/customers.sdi’

D.

mysql> IMPORT TABLE FROM /var/tmp/customers.sdi

E.

shell> cp /backup/customers.frm /var/lib/mysql/shop/

F.

mysql> IMPORT TABLE FROM /var/lib/mysql/shop/customers.sdi

G.

mysql> ALTER TABLE shop.customers IMPORT TABLESPACE

Full Access
Question # 20

Which command enables rule-based MySQL Auditing capabilities?

A.

shell> mysql < audit_log_filter_linux_install.sql

B.

shell> mysqld --initialize --log-raw=audit.log

C.

mysql> INSTALL PLUGIN audit_log;

D.

mysql> INSTALL COMPONENT audit_log;

Full Access
Question # 21

You wish to store the username and password for a client connection to MySQL server in a file on a local file system.

Which is the best way to encrypt the file?

A.

Use the AES_ENCRYPT() MySQL function on the option file.

B.

Use mysql_secure_installation to encrypt stored login credentials.

C.

Use a text editor to create a new defaults file and encrypt it from Linux prompt.

D.

Use mysql_config_editor to create an encrypted file.

Full Access