Oracle 1Z0-883 Sample Questions:
01. Which of the following best describes the scope of explicitly and implicitly set locks?
a) Explicitly set locks may span several commands.
b) Implicitly set locks may span several commands.
c) Implicitly set locks will span only one statement or transaction.
d) Explicitly set locks will span only one statement or transaction.
02. Is it ever safe to start the MySQL server as root?
a) No it is never safe to start it as root.
b) Yes it is always safe to start it as root.
c) Yes provided you make it switch the effective user to mysql.
d) No because you can not make it switch the effective user if started as root.
03. Which two are true regarding MySQL binary and text backups?
a) Binary backups are usually faster than text backups.
b) Binary backups are usually slower than text backups.
c) Text backups are human-readable while binary backups are not.
d) Binary backups are not portable across different operating systems.
04. A Mysql Server has been running an existing application successfully for six months. The my.cnf is adjusted to contain the following additional configuration:
The Mysql Server is restarted without error. What effect will the new configuration have in existing accounts?
a) They will have their passwords updated on start-up to sha256_password format.
b) They will have to change their password the next time they login to the server.
c) They are not affected by this configuration change.
d) They all connect via the secure sha256_password algorithm without any configuration change.
05. You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions.
C: \> mysqld – install Mysql56 – defaults – file = C : \my –opts.cnf
What is the expected outcome?
a) Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: \my-opts.cnf configuration file.
b) Mysql is installed as the Windows service name Mysql56, and uses c: \my-opts.cnf as the configuration file.
c) An error message is issued because - install is not a valid option for mysqld.
d) A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: \my-opts.cnf.
06. Which of the following are reasons to not just enable all logging?
a) Security risks.
b) More disk space is used.
c) More memory is used.
d) Slower performance.
07. What are three actions performed by the mysql_secure_installation tool?
a) It prompts you to set the root user account password.
b) It checks whether file permissions are appropriate within datadir.
c) It asks to remove the test database, which is generated at installation time.
d) It can delete any anonymous accounts.
e) It verifies that all users are configuration with the longer password hash.
08. Which statement is true about FLUSH LOGS command?
a) It closes and reopens all log files.
b) It requires the RELOAD, FILE, and DROP privileges.
c) It closes and sends binary log files to slave servers.
d) It flushes dirty pages in the buffer pool to the REDO logs.
09. Assume that you want to know which Mysql Server options were set to custom values. Which two methods would you use to find out?
a) Check the configuration files in the order in which they are read by the Mysql Server and compare them with default values.
b) Check the command-line options provided for the Mysql Server and compare them with default values.
c) Check the output of SHOW GLOBAL VARIABLES and compare it with default values.
d) Query the INFORMATION_SCHEMA.GLOBAL_VARIABLES table and compare the result with default values.
10. Which three statements describe how the strict SQL mode provides added security?
a) It rejects statements that try to insert out-of-range values
b) It rejects invalid dates.
c) It limits the operations that the server can perform.
d) It rejects queries that produce out-of-range values.
e) It rejects dates with zero day or month values.
Oracle MySQL Database Administrator Answers
Question 1
A simple master-to-slave replication is currently being used. The following information is extracted from the SHOW SLAVE STATUS output:
Last_SQL_Error: Error 'Duplicate entry '8' for key 'PRIMARY' ' on query. Default database: 'mydb'. Query: 'insert into mytable VALUES ('8' , 'George') '
Skip_Counter: 0 -
Retrieved _Gtid_Set: 38f32e23480a7-32a1-c323f78067fd37821: 1-8
Auto _Position: 1 -
You execute a "SHOW CREATE TABLE mytable" on the slave:
CREATE TABLE mytable (
ID int(11) NOT NULL DEFAULT 0,
name char(10) DEFAULT NULL,
PRIMARY KEY (ID)
)
The table mytable on the slave contains the following:
You have issued a STOP SLAVE command. One or more statements are required before you can issue a START SLAVE command to resolve the duplicate key error.
Which statement should be used?
A. SET GLOBAL SQL_SKIP_SLAVE_COUNTER=1
B. SET GTID_NEXT="CONSISTENCY"; BEGIN; COMMIT; SET GTID_NEXT=" AUTOMATIC’;
C. SET GLOBAL enforce_gtid_consistency=ON
D. SET GTID_EXECUTED="38f32e23480a7-32a1-c323f78067fd37821 : 9";
E. SET GTID_NEXT="38f32e23480a7-32a1-c323f78067fd37821 : 9"; BEGIN; COMMIT; SET GTID_NEXT="AUTOMATIC";
Question 2
Consider the following statement on a RANGE partitioned table:
ALTER TABLE orders DROP PARTITION p1, p3;
What is the outcome of executing the above statement?
A. Only the first partition (p1) will be dropped as only one can be dropped at any time.
B. All data in p1 and p3 partitions are removed, but the table definition remains unchanged.
C. A syntax error will result as you cannot specify more than one partition in the same statement.
D. All data in pi and p3 partitions are removed and the table definition is changed.
Question 3
You inherit a legacy database system when the previous DBA, Bob, leaves the company. You are notified that users are getting the following error: mysql> CALL film_in_stock (40, 2, @count);
ERROR 1449 (HY000): The user specified as a definer (bon@localhost) does not exist
How would you identify all stored procedures that pose the same problem?
A. Execute SELECT * FROM mysql.routines WHERE DEFINER=’bob@localhost’;.
B. Execute SHOW ROUTINES WHERE DEFINER=’bob@localhost’.
C. Execute SELECT * FROM INFORMATION_SCHEMA. ROUTINES WHERE DEFINER=’bob@localhost’;.
D. Execute SELECT * FROM INFORMATION_SCHEMA. PROCESSLIST WHERE USER=’bob’ and HOST=’ localhost’;.
E. Examine the Mysql error log for other ERROR 1449 messages.
Question 4
When designing an InnoDB table, identify an advantage of using the BIT datatype Instead of one of the integer datatypes.
A. BIT columns are written by InnoDB at the head of the row, meaning they are always the first to be retrieved.
B. Multiple BIT columns pack tightly into a row, using less space.
C. BIT (8) takes less space than eight TINYINT fields.
D. The BIT columns can be manipulated with the bitwise operators &, |, ~, ^, <<, and >>. The other integer types cannot.
Question 5
ROW-based replication has stopped working. You investigate the error log file and find the following entries:
2013-08-27 14:15:47 9056 [ERROR] Slave SQL: Could not execute Delete_rows event on table test.t1; Cant find record in t1, Error_code: 1032; handler error
HA_ERR_KEY_NOT_FOUND; the events master log 56_master-bin. 000003, end_log_pos 851, Error_code: 1032
2013-08-27 14:15:47 9056 [warning] Slave: Cant find record in t1 Error_code: 1032
2013-08-27 14:15:47 9056 [ERROR] Error running query, slave SQL thread aborted. Fix the problem, and restart the slave SQL thread with "SLAVE START". We stopped at log 56_master-bin. 000003 position 684
Why did you receive this error?
A. The slave SQL thread does not have DELETE privileges to execute on test.t1 table.s
B. The table definition on the slave -litters from the master.
C. Multi-threaded replication slaves can have temporary errors occurring for cross database updates.
D. The slave SQL thread attempted to remove a row from the test.t1 table, but the row did not exist.
Question 6
Mysqldump was used to create a single schema backup;
Shell> mysqldump u root p sakila > sakila2013.sql
Which two commands will restore the sakila database without interfering with other running database?
A. Mysql> USE sakila; LOAD DATA INFILE ‘sakila2013.sql’;
B. Shell> mysql –u root –p sakila <sakila2013.sql
C. Shell> mysqlimport –u root –p sakila sakila2013.sql
D. Shell> mysql –u root -p –e ‘use sakila; source sakila2013.sql’
E. Shell> mysql –u root –p –silent < sakila2013.sql
Question 7
Consider the Mysql Enterprise Audit plugin.
You are checking user accounts and attempt the following query:
Mysql> SELECT user, host, plugin FROM mysql.users;
ERROR 1146 (42S02): Table mysql.users doesnt exist
Which subset of event attributes would indicate this error in the audit.log file?
A. NAME="Query" STATUS="1146" SQLTEXT="select user,host from users"/>
B. NAME="Error" STATUS="1146" SQLTEXT="Error 1146 (42S02): Table ‘mysql.users’ doesn’t exist"/>
C. NAME="Query" STATUS="1146" SQLTEXT=" Error 1146 (42S02): Table ‘mysql.users’ doesn’t exist"/>
D. NAME="Error" STATUS="1146" SQLTEXT="select user,host from users"/>
E. NAME="Error" STATUS="0" SQLTEXT="Error 1146 (42S02): Table ‘mysql.users’ doesn’t exist"/>
Question 8
Which query would you use to find connections that are in the same state for longer than 180 seconds?
A. SHOW FULL PROCESSLIST WHEER Time > 180;
B. SELECT * FROM INFORMATION_SCHEMA.EVENTS SHERE STARTS < (DATE_SUB (NOW ( ), INTERVAL 180 SECOND) );
C. SELECT * FROM INFORMATION_SCHEMA.SESSION_STATUS WHERE STATE < (DATE_SUB (NOW ( ), INTERVAL 180 SECOND) );
D. SELECT * FROM INFORMATION_SCHEMA.PROCESSLIST WHERE TIME > 180;
Question 9
A database exists as a read-intensive server that is operating with query_cachek_type = DEMAND.
The database is refreshed periodically, but the resultset size of the queries does not fluctuate.
Note the following details about this environment:
✑ A web application uses a limited set of queries.
✑ The Query Cache hit rate is high.
✑ All resultsets fit into the Query Cache.
✑ All queries are configured to use the Query Cache successfully.
The response times for queries have recently started to increase. The cause for this has correctly been identified as the increase in the number of concurrent users accessing the web service.
Based solely on the information provided, what is the most likely cause for this slowdown at the database level?
A. The Query Cache is pruning queries due to an increased number of requests.
B. Query_cache_min_res_unit has been exceeded, leading to an increased performance overhead due to additional memory block lookups.
C. Mutex contention on the Query Cache is forcing the queries to take longer due to its single-threaded nature.
D. The average resultset of a query is increasing due to an increase in the number of users requiring SQL statement execution.
Question 10
You have a login-path named "adamlocal" that was created by using the mysql_config_editor command.
You need to check what is defined for this login_path to ensure that it is correct for you deployment.
You execute this command:
$ mysql_config_editor print login-path=adamlocal
What is the expected output of this command?
A. The command prints all parameters for the login-path. The password is printed in plain text.
B. The command prints all parameters for the login-path. The password is shown only when you provide the –password option.
C. The command prints all parameter for the login-path. The password is replaced with stars.
D. The command prints the encrypted entry for the login-path. The is only possible to see if an entry exists.
Question 11
You are using replication and the binary log files on your master server consume a lot of disk space.
Which two steps should you perform to safely remove some of the older binary log files?
A. Ensure that none of the attached slaves are using any of the binary logs you want to delete.
B. Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files.
C. Execute the PURGE BINARY LOGE NOT USED command.
D. Remove all of the binary log files that have a modification date earlier than today.
E. Edit the .index file to remove the files you want to delete.
Question 12
Which two statements are true about InnoDB auto-increment locking?
A. The auto-increment lock can be a table-level lock.
B. InnoDB never uses table-level locks.
C. Some settings for innodb_autoinc_lock_mode can help reduce locking.
D. InnoDB always protects auto-increment updates with a table-level lock.
E. InnoDB does not use locks to enforce auto-increment uniqueness.
Question 13
Consider the Mysql Enterprise Audit plugin.
A CSV file called data.csv has 100 rows of data.
The stored procedure prepare_db ( ) has 10 auditable statements.
You run the following statements in the mydb database:
Mysql> CALL prepare_db ( );
Mysql> LOAD DATA INFILE /tmp/data.cav INTO TABLE mytable;
Mysql> SHOW TABLES;
How many events are added to the audit log as a result of the preceding statements?
A. 102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event.
B. 3; only the top-level statements are logged.
C. 111; top-level statements and all lower-level statements are logged.
D. 12; only top-level statements and stored procedure events are logged.
Question 14
You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions.
C: \> mysqld install Mysql56 defaults file = C : \my opts.cnf
What is the expected outcome?
A. Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: \my-opts.cnf configuration file.
B. Mysql is installed as the Windows service name Mysql56, and uses c: \my-opts.cnf as the configuration file
C. An error message is issued because – install is not a valid option for mysqld.
D. A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: \my-opts.cnf.
Question 15
Consider the events_% tables in performance Schema.
Which two methods will clear or reset the collected events in the tables?
A. Using DELETE statements, for example, DELETE FROM performance_schema.events_watis_current;
B. Using the statement RESET PERFORMANCE CACHE;
C. Using the statement FLUSH PERFORMANCE CACHE;
D. Using TRUNCATE statements, for example, TRUNCATE TABLE performance_schema.events_waits_current;
E. Disabling and re-enabling all instruments
F. Restarting Mysql
Question 16
What are four capabilities of the mysql client program?
A. Creating and dropping databases
B. Creating, dropping, and modifying tables and indexes
C. Shutting down the server by using the SHUTDOWN command
D. Creating and administering users
E. Displaying replication status information
F. Initiating a binary backup of the database by using the START BACKUP command
Question 17
Assume that you want to know which Mysql Server options were set to custom values.
Which two methods would you use to find out?
A. Check the configuration files in the order in which they are read by the Mysql Server and compare them with default values.
B. Check the command-line options provided for the Mysql Server and compare them with default values.
C. Check the output of SHOW GLOBAL VARIABLES and compare it with default values.
D. Query the INFORMATION_SCHEMA.GLOBAL_VARIABLES table and compare the result with default values.
Question 18
You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands:
$ pidof mysqld
3132
$tail - n2 /var/lib.mysql/hostname.err
2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld: ready for connections.
Version: 5.6.13-enterprise-commercial-advaced socket: /tmp/mysql.sock port;
3306 Mysql Enterprise Server Advanced Edition (Commercial)
You attempt to log in as the root user with the following command:
$mysql u root
ERROR 1045 (28000): Access denied for user root@localhost (using password: NO)
Which statement is true about this scenario?
A. The RPM installation script sets a default password of password for new installations.
B. The local root user must log in with a blank password initially: mysql –u root –p.
C. New security measures mean that the mysql_secure_installation script must be run first on all new installations.
D. The mysql_install_bd post-installation script used – random-password.
Question 19
A Mysql Server has been running an existing application successfully for six months.
The my.cnf is adjusted to contain the following additional configuration:
[mysqld]
Default-authentication-plugin=sha256_password
The Mysql Server is restarted without error.
What effect will the new configuration have in existing accounts?
A. They will have their passwords updated on start-up to sha256_password format.
B. They will have to change their password the next time they login to the server.
C. They are not affected by this configuration change.
D. They all connect via the secure sha256_password algorithm without any configuration change.
Question 20
In a design situation, there are multiple character sets that can properly encode your data.
Which three should influence your choice of character set?
A. Disk usage when storing data
B. Syntax when writing queries involving JOINS
C. Comparing the encoded data with similar columns on other tables
D. Memory usage when working with the data
E. Character set mapping index hash size
Question 21
What are three actions performed by the mysql_secure_installation tool?
A. It prompts you to set the root user account password.
B. It checks whether file permissions are appropriate within datadir.
C. It asks to remove the test database, which is generated at installation time.
D. It can delete any anonymous accounts.
E. It verifies that all users are configuration with the longer password hash.
Question 22
Consider the query:
Mysql> SET @run = 15;
Mysql> EXPLAIN SELECT objective, stage, COUNT (stage)
FROM iteminformation -
WHERE run=@run AND objective=7.1
GROUP BY objective,stage -
ORDER BY stage;
The iteminformation table has the following indexes;
Mysql> SHOW INDEXES FROM iteminformation:
This query is run several times in an application with different values in the WHERE clause in a growing data set.
What is the primary improvement that can be made for this scenario?
A. Execute the run_2 index because it has caused a conflict in the choice of key for this query.
B. Drop the run_2 index because it has caused a conflict in the choice of key for this query.
C. Do not pass a user variable in the WHERE clause because it limits the ability of the optimizer to use indexes.
D. Add an index on the objective column so that is can be used in both the WHERE and GROUP BY operations.
E. Add a composite index on (run,objective,stage) to allow the query to fully utilize an index.
Question 23
Consider typical High Availability (HA) solutions that do not use shared storage.
Which three HA solutions do not use shared storage?
A. Mysql Replication
B. Distributed Replicated Block Device (DRBD) and Mysql
C. Windows Cluster and Mysql
D. Solaris Cluster and Mysql
E. Mysql NDB Cluster
Question 24
Which three statements are characteristic of the MEMORY storage engine?
A. Each table is represented on disk as an.frm file.
B. Each table has a corresponding.MYI and .MYD file.
C. It can support foreign keys.
D. It cannot contain text or BLOB columns.
E. Table contents are not saved if the server is restarted.
F. It can support transactions
Question 25
Consider the Mysql Enterprise Audit plugin.
The following event detail is found in the audit log:
<AUDIT_RECORD
TIMESTAMP="2013-04-09t01:54:17"
NAME="Connect"
CONNECTION_ID="3"
STATUS="1045"
USER="kate"
PROXY_USER=""
HOST="localhost"
IP=""
DB=""/>
Which two points can be concluded from the given event?
A. A connection was blocked by a firewall or a similar security mechanism.
B. A connection was attempted via socket rather than TCP.
C. A connection failed because the proxy user privileges did not match the login user.
D. A connection as the user kate was successful.
E. A connection failed due to authentication being unsuccessful.
Question 26
Consider the Mysql Enterprise Audit plugin.
Which statement is true when you identify a connection event that has used external authentication?
A. The attribute "STATUS" is set to the string EXTERNAL_AUTH.
B. The attribute "PRIV_USER" contains the username.
C. The event type that is given in the attribute "NAME" is EXTERNAL_AUTH.
D. There is no differentiation between native and external authentication events.
E. External authentication is managed through external auditing logs.
F. The "PROXY_PRIV" user shows a username if external authentication is used.
Question 27
You are having problems with connections from a specific host (192.168.1.15) not closing down correctly. You want to find the state of the threads from that host check for long-running queries.
Which statement will accomplish this?
A. SELECT * FROM INFORMATION_SCHEMA.PROCESSLIST WHERE HOST=’192.168.1.15’;
B. SELECT * FROM INFORMATION_SCHEMA.EVENTS WHERE HOST=’ 192.168.1.15’;
C. SELECT * FROM INFORMATION_SCHEMA.STATISTICS WHERE HOST=’ 192.168.1.15’;
D. SELECT * FROM INFORMATION_SCHEMA.INNODB_METEICS WHERE HOST=’ 192.168.1.15’;
Question 28
Identify a performance impact when using the Performance Schema.
A. There is no impact on performance.
B. There is an overhead for querying the Performance Schema but not for having it enabled.
C. There is a constant overhead regardless of settings and workload.
D. The overhead depends on the settings of the Performance Schema.
Question 29
Which statement is true about FLUSH LOGS command?
A. It requires the RELOAD, FILE, and DROP privileges.
B. It closes and reopens all log files.
C. It closes and sends binary log files to slave servers.
D. It flushes dirty pages in the buffer pool to the REDO logs.
Question 30
Which two are correct steps in taking a binary backup of MyISAM tables?
A. Always stop the server prior to the backup.
B. Stop the server or lock the tables prior to the backup.
C. Stop the server or lock the databases prior to the backup.
D. Make a copy of the .frm, .myd, and the .myi files.
E. Make a copy of the binary log and tablespace files.
Oracle MySQL Database Administrator Answers
Question 31
You want to start monitoring statistics on the distribution of storage engines that are being used and the average sizes of tables in the various databases.
Some details are as follows:
The Mysql instance has 400 databases.
✑ Each database on an average consists of 25-50 tables.
You use the query:
SELECT TABLE_SCHEMA,
ENGINE,
COUNT (*),
SUM (data_length) total_size -
FROM INFORMATION_SCHEMA.TABLES -
WHERE TABLE_TYPE = BASE TABLE -
GROUP BY TABLE_SCHEMA, ENGINE -
;
Why is this query slow to execute?
A. Counting and summarizing all table pages in the InnoDB shared tablespace is time consuming.
B. Collecting information requires various disk-level operations and is time consuming.
C. Aggregating details from various storage engine caches for the final output is time consuming.
D. Collecting information requires large numbers of locks on various INFORMATION_SCHEMA tables.
Question 32
Which two events will cause a slave server to create a new relay log file?
A. Starting of the I/O thread
B. Execution of the FLUSH LOGS statement
C. Starting of the SQL thread
D. Reaching the slave_pendign _jobs_size_max limit
E. Execution of FULSH TABLES WITH READ LOCK
Question 33
The InnoDB engine has a feature known as clustered indexes.
Which three statements are true about clustered indexes as used in InnoDB?
A. A primary key must exist for creation of a clustered index.
B. A primary key is used as a clustered index.
C. A clustered index is a grouping of indexes from different tables into a global index for faster searching.
D. If no indexes exist, a hidden clustered index is generated based on row IDs.
E. A clustered index provides direct access to a page containing row data.
F. The first unique index is always used as a clustered index and not a primary key.
G. A clustered index allows fulltext searching within InnoDB,
Question 34
A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ.
Which two will optimize the security of this setup?
A. Disabling connections from named pipes or socket files (depending on the operating system of the server)
B. Running the server with – skip-networking specified
C. Limiting logins to originate from the application server or the server’s subnet
D. Starting the server with – bind- address=0.0.0.0 specified
E. Installing Mysql on the application server, and running the database and application on the same server
F. Enabling and using SSL for connections to the Mysql database EF
Question 35
Which hardware storage option, when set up with redundant disks, offers the least stability, availability, and reliability for Mysql data?
A. RAID 5
B. iSCSI
C. SAN (Storage Area Network)
D. NFS (Networked File System)
Question 36
Which two statements are true regarding partitioning in Mysql?
A. Tables with BLOB and TEXT columns cannot be partitioned.
B. Partitioning allows easier management of smaller data sets for certain queries.
C. Partitioning allows different columns to be stored in separate files.
D. The partitioning expression is an integer or function that returns an integer value or NULL value.
E. Partitioning is only available for those storage engines that implements it natively.
Question 37
You are using CTIDS in replication. You need to skip a transaction with the CTID of aaa-bbb-ccc-ddd-eee : 3 on a slave.
Which command would you execute from a Mysql prompt?
A. STOP SLAVE; SETGTID_NEXT="aaa-bbb-ccc-ddd-eee: 3"; BEGIN; COMMIT; SET GTID_NEXT="AUTOMATIC"; START SLAVE
B. STOP SLAVE; SET GLOBAL SQL_SLAVE_SKIP_COUNTER=1; START SLAVE;
C. STOP SLAVE; BEGIN; SET GTID_IGNORE="aaa-bbb-ccc-ddd-eee: 3"; COMMIT; START SLAVE;
D. STOP SLAVE; RESET SLAVE; BEGIN; SKIP NEXT GTID; COMMIT; START SLAVE;
Question 38
User A issues the command:
LOCK TABLES pets READ;
Which command can User B execute against the pets table?
A. UPDATE pets…
B. SELECT….FROM pets
C. INSERT INTO pets…
D. ALTER TABLE pets…
Question 39
When backing up a replication slave, which three should also be backed up in addition to data?
A. The master.info and relay.info files
B. The relay log files
C. The relay index file
D. Mysql.slave_master_info table
E. Mysql.slave_relay_log_info table
F. Mysql.slave_worker_info table
Question 40
You want to shutdown a running Mysql Server cleanly.
Which three commands that are valid on either Windows or Linux will achieve this?
A. Shell> pkill –u mysql mysqld_safe
B. Shell> service mysql safe_exit
C. Shell> /etc/init.d/mysql stop
D. Shell> mysqladmin –u root –p shutdown
E. Mysql> STOP PROCESS mysqld;
F. Shell> net stop mysql
G. Shell> nmc mysql shutdown
Question 41
What are two methods of taking a binary backup of a Mysql Server using InnoDB storage engine?
A. Mysql Enterprise Backup
B. Mysqldump with – binary-data option
C. Mysqlhotcopy
D. File system snapshots
E. Mysqldumpslow
Question 42
Consider the following table:
CREATE TABLE game (
id int (10) unsigned NOT NULL AUTO_INCREMENT,
keyword varchar (45) DEFAULT NULL,
date datetime NOT NULL,
PRIMARY KEY (id , date),
UNIQUE KEY keyword_idx (keyword , date)
) ENGINE=InnoDB DEFAULT CHARSET=latin1
PARTITION BY RANGE (TO_DAYS (date) ) (
PARTITION g201301 VALUES LESS THAN (TO_DAYS (2013-01-01 00:00:00) ),
PARTITION g201302 VALUES LESS THAN (TO_DAYS (2013-02-01 00:00:00) ),
PARTITION g201303 VALUES LESS THAN (TO_DAYS (2013-03-01 00:00:00) ),
PARTITION g201304 VALUES LESS THAN (TO_DAYS (2013-04-01 00:00:00) ),
PARTITION gMORES VALUES LESS THAN (MAXVALUE) );
Which method should used to add a new g201305 partition to the table?
A. ALTER TABLE games REORGANIZE PARTITION (gMORES) INTO g01305 VALUES LESS THAN (TO_DAYS (2013-05-01 00:00:00) ), gMORES VALUES LESS THAN (MAXVALUE) );
B. ALTER TABLE games ADD PARTITION g201350 VALUES LESS THAN (TO_DAYS (2013-05-01 00:00:00) );
C. ALTER TABLE games COALESCE PARTITION (gMORES) INTO g01305 VALUES LESS THAN (TO_DAYS (2013-05-01 00:00:00) ), gMORES VALUES LESS THAN (MAXVALUE) );
D. ALTER TABLE games SPLIT PARTITION (gMORES) INTO g201305 VALUES LESS THAN (TO_DAYS (2013-05-01 00:00:00) ), gMORES VALUES LESS THAN (MAXVALUE) );
E. ALTHER TABLE games DROP PATITION gMORES, ADD PARTITION g201305 VALUES LESS THAN (TO_DAYS (2013-05-01 00:00:00) ), gMORES VALUES LESS THAN (MAXVALUE) );
Question 43
Full Atomicity, Consistency, Isolation, Durability (ACID) compliance is a necessity for a new application, which heavily reads and writes data.
This requires the following config file options:
Sync_binlog=1 -
Innodb_flush_log_at_trx_commit=1
Innodb_doublewrite=1 -
However, this configuration is expected to introduce disk I/O overhead.
What three changes will reduce disk I/O overheads?
A. Use of soft links for database directories on the same physical disk
B. Use of separate directories on the same physical disk for log files and data files
C. Placement of InnoDB log files and datadir on separate physical disks
D. Allocation of RAM to the buffer pool such that more of the data can fit in RAM
E. Use of delay_key_write=ON for batch index update
Question 44
You want a record of all queries that are not using indexes.
How would you achieve this?
A. By enabling the Slow Query Log because all queries that are not using indexes will be logged automatically
B. By enabling the Error Log because not using indexes is an error
C. By enabling the Slow Query Log and using the – log-queries-not-using-indexes option
D. By enabling the Error Log and using the – log-queries-not-using-indexes option
Question 45
The validate_password plugin is loaded and displays the following settings in global variables:
Mysql> SHOW VARIABLES LIKE validate_password%;
When attempting to set your password, you get the following error:
Mysql> SET PASSWORD = PASSWORD (Hoverl@%);
ERROR 1819 (HY000): Your password does not satisfy the current policy requirements
What is the cause of the error?
A. The password is eight characters long, but needs to exceed validate_password_length to be valid.
B. All of the MEDIUM password policy requirements have not been honored.
C. The password matches a substring Hover as a dictionary word.
D. The password does not match the validate_passoword_number_count requirement.
E. There is no dictionary file defined, so password validation cannot work as expected.
Question 46
You attempt to connect to a Mysql Server by using the mysql program. However, you receive the following notice:
ERROR 2059 (HY000): Authentication plugin mysql_clear_password connot be loaded: plugin not enabled
What would you run to fix the issue?
A. The mysql client with the – ignore-password-hashing option
B. The mysql_secure_installation script to update server security settings
C. The mysql client with the – enable-cleartext-plugin option
D. The mysql_upgrade script
E. The install plugin command for the mysql_cleartext_password plugin
Question 47
The following commands are available in the Linux binary distributions of Mysql:
✑ Mysqld
✑ Mysqld_safe
✑ Mysql.server
What is the correct description of each of these commands?
A. Mysqld is the server. Mysqld_safe is a shell script that invokes mysqld. Mysql.server is a wrapper for mysql_safe.
B. Mysqld is a shell script that starts mysql.server. Mysqld_safe causes the server to start up in data recovery mode. Mysql.server is the server.
C. Mysqld is the server. Mysqld_safe causes the server to start up in data recovery mode. Mysql.server is a wrapper for mysqld_safe.
D. Mysql, mysqld.safe, and mysql.server reside in different locations but are all symlinked to the same script.
Question 48
Which three statements describe how the strict SQL mode provides added security?
A. It rejects statements that try to insert out-of-range values
B. It rejects invalid dates.
C. It limits the operations that the server can perform.
D. It rejects queries that produce out-of-range values.
E. It rejects dates with zero day or month values.