Assume that you want to know which Mysql Server options were set to custom values.
Which two methods would you use to find out?
A. Check the configuration files in the order in which they are read by the Mysql Server and compare them
with default values.
B. Check the command-line options provided for the Mysql Server and compare them with default values.
C. Check the output of SHOW GLOBAL VARIABLES and compare it with default values.
D. Query the INFORMATION_SCHEMA.GLOBAL_VARIABLES table and compare the result with default values.
Correct Answer: CD
You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts
successfully as verified by the following commands:
$ pidof mysqld
$tail - n2 /var/lib.mysql/hostname.err
2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld: ready for connections.
Version: `5.6.13-enterprise-commercial-advaced' socket: `/tmp/mysql.sock' port;
3306 Mysql Enterprise Server Advanced Edition (Commercial)
You attempt to log in as the root user with the following command:
$mysql u root
ERROR 1045 (28000): Access denied for user `root'@'localhost' (using password: NO)
Which statement is true about this scenario?
A. The RPM installation script sets a default password of password for new installations.
B. The local root user must log in with a blank password initially: mysql u root p.
C. New security measures mean that the mysql_secure_installation script must be run first on all new
D. The mysql_install_bd post-installation script used random-password.
Correct Answer: D
A Mysql Server has been running an existing application successfully for six months.
The my.cnf is adjusted to contain the following additional configuration:
The Mysql Server is restarted without error.
What effect will the new configuration have in existing accounts?
A. They will have their passwords updated on start-up to sha256_password format.
B. They will have to change their password the next time they login to the server.
C. They are not affected by this configuration change.
D. They all connect via the secure sha256_password algorithm without any configuration change.
Correct Answer: C
In a design situation, there are multiple character sets that can properly encode your data.
Which three should influence your choice of character set?
A. Disk usage when storing data
B. Syntax when writing queries involving JOINS
C. Comparing the encoded data with similar columns on other tables
D. Memory usage when working with the data
E. Character set mapping index hash size
Correct Answer: ADE
Consider the query:
Mysql> SET @run = 15;
Mysql> EXPLAIN SELECT objective, stage, COUNT (stage)
WHERE run=@run AND objective='7.1'
GROUP BY objective,stage
ORDER BY stage;
The iteminformation table has the following indexes;
Mysql> SHOW INDEXES FROM iteminformation:
This query is run several times in an application with different values in the WHERE clause in a growing data
What is the primary improvement that can be made for this scenario?
A. Execute the run_2 index because it has caused a conflict in the choice of key for this query.
B. Drop the run_2 index because it has caused a conflict in the choice of key for this query.
C. Do not pass a user variable in the WHERE clause because it limits the ability of the optimizer to use
D. Add an index on the objective column so that is can be used in both the WHERE and GROUP BY operations.
E. Add a composite index on (run,objective,stage) to allow the query to fully utilize an index.
Correct Answer: E
Consider typical High Availability (HA) solutions that do not use shared storage.
Which three HA solutions do not use shared storage?
A. Mysql Replication
B. Distributed Replicated Block Device (DRBD) and Mysql
C. Windows Cluster and Mysql
D. Solaris Cluster and Mysql
E. Mysql NDB Cluster
Correct Answer: ABE
Which three statements are characteristic of the MEMORY storage engine?
A. Each table is represented on disk as an.frm file.
B. Each table has a corresponding.MYI and .MYD file.
C. It can support foreign keys.
D. It cannot contain text or BLOB columns.
E. Table contents are not saved if the server is restarted.
F. It can support transactions
Correct Answer: ADE
Consider the Mysql Enterprise Audit plugin.
The following event detail is found in the audit log:
Which two points can be concluded from the given event?
A. A connection was blocked by a firewall or a similar security mechanism.
B. A connection was attempted via socket rather than TCP.
C. A connection failed because the proxy user privileges did not match the login user.
D. A connection as the user kate was successful.
E. A connection failed due to authentication being unsuccessful.
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额