当前分类: 1z0-883
问题:多选题What are three facts about backups with mysqldump?()ACan back up a remote database serverBAllow a consistent backup to be takenCAre always faster to restore than binary backupsDAre able to back up specific items within a databaseECreate automatically c...
查看答案
问题:多选题What are two methods of taking a binary backup of a Mysql Server using InnoDB storage engine?()AFile system snapshotsBMysqldumpslowCMysqlhotcopyDMysqldump with – binary-data optionEMysql Enterprise Backup...
问题:多选题Which two capabilities are granted with the SUPER privilege?()AAllowing a client to kill other client connectionsBAllowing a client to shut down the serverCAllowing change of the server runtime configurationDAllowing client accounts to take over the ac...
问题:单选题Consider the following: Which statement best describes the meaning of the value for the key_len column?()A It shows the total size of the index rowB It shows how many columns in the index are examinedC It shows the number of characters indexed in th...
问题:单选题You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands: $ pidof mysqld 3132 $tail – n2 /var/lib.mysql/hostname.err 2013-08-18 08:18:38 3132 [Note] /usr/...
问题:多选题Which three tasks can be performed by using the performance Schema?()AFinding queries that are not using indexesBFinding rows that are locked by InnoDBCFinding client connection attributesDFinding the part of a code in which a single query is spending ...
问题:多选题Which two events will cause a slave server to create a new relay log file?()AExecution of the FLUSH LOGS statementBStarting of the SQL threadCReaching the slave_pendign _jobs_size_max limitDExecution of FULSH TABLES WITH READ LOCKEStarting of the I/O t...
问题:单选题You want a record of all queries that are not using indexes. How would you achieve this?()A By enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyB By enabling the Error Log because not using indexes ...
问题:多选题Which two options describe how MySQL Server allocates memory?()AThread memory is pre-allocated up to thread_cache_size for performanceBEach connection may have its own per-thread memory allocationsCGlobal memory resources are allocated at server startu...
问题:多选题Which two requirements would lead towards a high availability solution?()AWhen uptime is criticalBWhen data must be refactoredCWhen application concurrency is staticDWhen data loss is unacceptableEWhen application is a single point of failure...
问题:单选题You have a login-path named "adamlocal" that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment. You execute this command: $mysql_config_editor pri...
问题:单选题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A The attribute STATUS is set to the string EXTERNAL_AUTHB The attribute PRIV_USER contains the usernameC T...
问题:单选题You adjust a default configuration to the following /etc/my.cnf on a Linux installation:[mysqld] Loq-bin Binrylog_format=ROW You do not notice the spelling error in binrylog_format and restart your production server. How does the MySQL server behave wi...
问题:多选题Compare a typical Distributed Replicated Block Device (DRBD) with MySQL Standard Replication using master-slave replication. Which two statements are correct?()ABoth technologies guarantee an identical copy of data on the secondary nodeBOnly MySQL can ...
问题:多选题Which three are properties of the MyISAM storage engine?()ATransaction supportBFULLTEXT indexing for text matchingCTable and page level locking supportDForeign key supportEGeospatial indexingFHASH index supportGTable level locking only...
问题:多选题You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()AUse the command PURGE BINARY LOGS and specify a binary log f...
问题:多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this s...