Pass the Oracle MySQL Database Administration 1z0-888 Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Due to an authentication plug-in that is used on the server, passwords are required to be sent as clear text as opposed to the usual encrypted format.

Which two methods would allow the mysql client to connect to the server and send clear text passwords? (Choose two.)

Options:

A.

mysql --protocol=PLAIN –uroot –p –h dbhost.example.com


B.

INSTALL PLUGIN mysql_cleartext_password SONAME ‘mysql_cleartext_password.so’;


C.

export LIBMYSQL_ENABLE_CLEARTEXT_PLUGIN=’Y’


D.

SET GLOBAL mysql_cleartext_passwords=1;


E.

mysql --enable-cleartext-plugin –uroot –p –h dbhost.example.com


Questions # 32:

How does the InnoDB storage engine handle deadlocks when they are detected?

Options:

A.

Both the affected transactions will be rolled back.


B.

The affected transactions wait for innodb_lock_wait_timeout seconds, and then roll back.


C.

One of the affected transactions will be rolled back, the other is allowed to proceed.


D.

The transaction isolation level determines which transaction is rolled back.


E.

The innodb_locks_unsafe_for_binlog setting determines which transaction is rolled back.


Questions # 33:

Which two statements are true about InnoDB auto-increment locking? (Choose two.)

Options:

A.

InnoDB never uses table-level locks.


B.

InnoDB always protects auto-increment updates with a table-level lock


C.

InnoDB does not use locks to enforce auto-increment uniqueness.


D.

The auto-increment lock can be a table-level lock.


E.

Some settings for innodb_autoinc_lock_mode can help reduce locking.


Questions # 34:

There are multiple instances of MySQL Server running on a single OS that is backed up using the mysqlbackup command.

The /etc/my/cnf contains default values, for example, datadir=/var/lib/mysql/, with extra instances having their own separate my.cnf file (for example /etc/mysql/instanceN.cnf) overriding the defaults.

A restore of the second instance is attempted from the mysqlbackup archive using this command:

mysqlbackup --backup-dir=/opt/backup/mysql/instance2 copy-back

Upon starting the second MySQL instance, you notice that the data does not match the expected backup. Which command-line option is required to successfully update the second instance?

Options:

A.

--restore=2


B.

--copy-back-from-log


C.

--backup-instance=/var/lib/mysql/instance2


D.

--instance=/var/lib/mysql/instance2


E.

--defaults-file=/etc/mysql/instance2.cnf


Questions # 35:

You are receiving complaints from your application administrators that they are seeing periodic stalls in database response (no queries to any table are returning results for several seconds or longer). You monitor your system and notice that the durations of those stalls correspond to peaks in disk I/O.

Which 2 things should you investigate?

Options:

A.

Check the rate of change in the status value Aborted_connects and compare to the rate of change in Connections.


B.

Check the difference between the InnoDB status values “Log Sequence number” and “Last Checkpoint” positions then compare that to the total size of the redo log.


C.

Check the rate of change in the status value Select_scan and compare to the rate of change in Com_select.


D.

Check the difference between the InooDB status values “Trx id counter” and “Purge done for” and compare to the state substatus of the main “Main thread”


E.

Check the rate of change in the statis value Qcache_hits and compare that to the rate of change of Qcache_not_cached.


Questions # 36:

Which storage option for MySQL data directory typically offers the worst performance in a highly concurrent, OLTP-heavy, IO-bound workload?

Options:

A.

battery-backed locally-attached RAID 5 array


B.

iSCSI Lun


C.

SAN (Fibre Channel) Lun


D.

NFS (Networked File System) mount


Questions # 37:

A particular government’s security policy is to have very strict data encryption and safety settings. This is done by restricting access based on their own CA authority and limiting access to particular users within a department. Which method could be used to restrict access as required?

Options:

A.

using GRANT … REQUIRE X509 AND REQUIRE ISSUER ‘/C=…..’ AND REQUIRE SUBJECT ‘/C=…..’


B.

using GRANT USAGE, X509, …….ON *.* TO user@remotehost IDENTIFIED BY ‘secret_password’


C.

using GRANT … REQUIRE SSL for a secure connection


D.

using GRANT USAGE, SSL, …..ON *.* TO user@remotehost IDENTIFIED BY ‘secret_password’


Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions