Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

1z0-888 Sample Questions Answers

Questions 4

You have just created a replication slave from a backup of the master made with mysqldump:

You try to log in to the slave with the application user, but fail as follows:

The login works on the master.

Which two changes to the process can fix the issue?

Options:

A.

After the restore, log in to the database and execute FLUSH PRIVILEGES.

B.

Use the –-flush-privileges with mysqldump.

C.

Add a second dump for the ‘mysql’ database; --all-databases does not include it.

D.

Use the –-grants option to include GRANT statements in the dump.

Buy Now
Questions 5

A crucial database, ‘db_prod’, just disappeared from your production MySQL instance.

In reviewing the available MySQL logs (General, Audit, or Slow) and your own application-level logs, you identified this command from a customer facing application:

SELECT id FROM users WHERE login=’payback!’;DROP DATABASE db_prod;’

Which three methods could have been used to prevent this SQL injection attack from happening? (Choose three.)

Options:

A.

writing your client code to properly escape all user input

B.

giving limited privileges to accounts used by application servers to interact with their backing databases

C.

using SSL/TLS on your outward facing web servers (https://) to encrypt all user sessions

D.

using a hashing or encryption method to secure all user passwords in your MySQL tables

E.

removing any remaining anonymous accounts from your MySQL instance

F.

validating all user input before sending it to the database server

G.

changing all passwords for the MySQL account ‘root’@’%’ immediately after losing an employee who knew the current password

Buy Now
Questions 6

A MySQL database uses all InnoDB tables and is configured as follows;

You will be setting up a replication slave by using mysqldump. You will need a consistent backup taken from your running production server. The process should have minimal impact to active database connections.

Which two arguments will you pass to mysqldump to achieve this? (Choose two.)

Options:

A.

--skip-opt

B.

--lock-all-tables

C.

--create-apply-log

D.

--single-transaction

E.

--master-data

Buy Now
Questions 7

Consider these global status variables:

Which two conclusions can be made from the output? (Choose two.)

Options:

A.

There are 140 Performance Schema threads at the time of the output.

B.

There are 510 connections to MySQL at the time of the output.

C.

The thread cache has been configured with thread_cache_size set to at least 6.

D.

There are more connections being idle than executing queries.

E.

All max_connections were in use at 2018-03-22 14:54:06

Buy Now
Questions 8

You have installed the validate_password plug-in and set the validate_password_policy variable.

Which validation is affected by the validate_password_policy setting?

Options:

A.

whether a new password is rejected if it contains a word found in a dictionary file.

B.

whether a new password is rejected if it contains the current user’s username.

C.

the amount of delay after an incorrect password is entered

D.

the length of time before a newly created password expires

Buy Now
Questions 9

A master-slave replication setup has the slave showing this error:

On the master server, the binary logs show:

What could explain this error? (Choose two.)

Options:

A.

binlog_cache_size=1024 is too small and transactions are lost.

B.

binlog_format=STATEMENT and a non-deterministic query was executed.

C.

enforce_gtid_consistency=ON and consistency is broken between the master and the slave.

D.

The sync_relay_log=1000 setting on the slave is too small.

E.

sync_binlog=0 and the master server crashed.

Buy Now
Questions 10

Which statement is true about using Microsoft Windows Cluster as a platform for MySQL?

Options:

A.

It relies on the shared disk architecture being visible to both servers.

B.

It is provided by means of IP-level disk replication.

C.

It implements High Availability by using the .NET Connector’s load balancing capabilities.

D.

It is a shared-nothing architecture.

Buy Now
Questions 11

Which two methods accurately monitor the size of your total database size over time? (Choose two.)

Options:

A.

monitoring the Innodb_rows_inserted status variable

B.

monitoring the innodb_redo_log_size variable

C.

monitoring the information_schema.TABLES table

D.

monitoring datadir size in the operating system

E.

monitoring cumulative Innodb_page_size increase

F.

monitoring the performance_schema_hosts_size variable

Buy Now
Questions 12

You enable binary logging on MySQL Server with the configuration:

binlog-format=STATEMENT

log-bin

Which database updates are logged on the master server to the binary log by default?

Options:

A.

all updates except to the TEMPDB database

B.

all updates except to the PERFORMANCE_SCHEMA database

C.

all updates not involving temporary tables

D.

all updates to the default database, except temporary tables

E.

all updates to all databases

Buy Now
Questions 13

You have the following in your my.cnf configuration file:

[mysqld]

default_authentication_plugin=sha256_password

You want to create a new user who will be connecting from the IP address 192.0.2.10, and you want to use the authentication plug-in that implements SHA-256 hashing for user account passwords.

Which two statements would create a user named webdesign for this IP address with the password of imbatman using a SHA_256 password hash? (Choose two.)

Options:

A.

CREATE USER ‘webdesign’@’192.0.2.10’ IDENTIFIED AS sha256_user WITH sha256_password ‘imbatman’;

B.

CREATE USER ‘webdesign’@’192.0.2.10’ IDENTIFIED BY ‘iambatman’;

C.

CREATE USER ‘webdesign’@’192.0.2.10’ IDENTIFIED WITH sha256_password BY ‘imbatman’;

D.

CREATE USER WITH sha256_password ‘sha256_user’@’192.0.2.10’ IDENTIFIED AS ‘webdesign’ USING ‘imbatman’;

E.

CREATE USER ‘webdesign’@’192.0.2.10’ WITH mysql_native_password USING SHA265 BY ‘imbatman’;

F.

CREATE USER ‘webdesign’@’192.0.2.10’ IDENTIFIED BY SHA265 AS ‘imbatman’;

Buy Now
Questions 14

In which order does MySQL process an incoming INSERT statement?

Options:

A.

It checks whether the user is authorized to perform the query, writes to the binary log, and then optimizes it.

B.

It checks whether the user is authorized to perform the query, optimizes it, and then writes to the binary log.

C.

It writes the query to the binary log, optimizes it, and then checks whether the user is authorized to perform the query.

D.

It optimizes the query, checks whether the user is authorized to perform it, and then writes to the binary log.

Buy Now
Questions 15

Which two are considered good security practices when using passwords? (Choose two.)

Options:

A.

Use one-way encryption for storage of passwords.

B.

Store passwords external to the database.

C.

Choose short passwords to save on storage space.

D.

Use simple keyboard actions that give mixed letters.

E.

Do not use dictionary-based words.

Buy Now
Questions 16

Force Majeure is a catastrophic failure on a major level of the database operation. Regular backups are key to helping avoid data loss in such situations.

Which two other steps can help avoid data loss in a major catastrophe? (Choose two.)

Options:

A.

Implement a failover strategy to another geographic location.

B.

Create a master-master pair for each service.

C.

Have a second data centre in a different region or country.

D.

Keep software updated to the latest version.

E.

Use RAID 10 storage for data.

F.

Use on-site network-attached storage to separate service from data.

Buy Now
Questions 17

You are investigating the performance of a query which selects data from an InnoDB table.

Consider this Performance Schema diagnostics output for the query:

Which statement is true about the output?

Options:

A.

The time the query took is the sum of all timer_wait values.

B.

The query did not find its table in the table definition cache.

C.

The query read data from the data file rather than directly from the buffer pool.

D.

The event with event_id = 8945 is a child of the event with event_id=8944.

Buy Now
Questions 18

You are using replication and the binary log files on your master server consume a lot of disk space.

Which two steps should you perform to safely remove some of the older binary log files? (Choose two.)

Options:

A.

Execute the PURGE BINARY LOGS NOT USED command.

B.

Edit the .index file to remove the files you want to delete.

C.

Ensure that none of the attached slaves are using any of the binary logs you want to delete.

D.

Remove all of the binary log files that have a modification date earlier than today.

E.

Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files.

Buy Now
Questions 19

SQL injection is a common security threat.

Which two methods would help protect against this risk?

Options:

A.

using stored procedures to validate values that are input

B.

using SQL variables to secure input values

C.

using prepared statements to handle unsecured values

D.

installing the SQL Protection plugin to catch such attempts

E.

starting the server with the –-injection-protection command-line option.

Buy Now
Questions 20

Which are three facts about backups with mysqldump? (Choose three.)

Options:

A.

will lock all storage engines for duration of backup

B.

can back up a remote database server

C.

allow a consistent backup to be taken

D.

are able to back up specific items within a database

E.

create automatically compressed backups

F.

are always faster to restore than binary backups

Buy Now
Questions 21

You are setting up a new installation of MySQL Server 5.7 (a GA release.) You have used a ZIP or TAR package to ensure that the mysqld binary, along with its support files, such as plug-ins and error messages, now exist on the host. Assume that the default datadir exists on the host. You installed the binary in the default location (the default --basedir value) for your operating system.

Which step should you perform before defining your own databases and database tables?

Options:

A.

Execute a command with a minimal form of: mysql --initialize

B.

Register mysqld as a service that will start automatically on this host machine.

C.

Create a configuration file containing default-storage-engine=InnoDB.

D.

Set an exception in the host machine’s firewall to allow external users to talk to mysqld.

E.

Create additional login accounts (so that everyone does not need to log in as root) and assign them appropriate privileges.

Buy Now
Questions 22

You are contacted by a user who does not have permission to access a database table. You determine after investigation that this user should be permitted to have access and so you execute a GRANT statement to enable the user to access the table.

Which statement describes the activation of that access for the user?

Options:

A.

The access does not take effect until the user logs out and back in.

B.

The access does not take effect until the next time the server is started.

C.

The access is available immediately.

D.

The access does not take effect until you issue the FLUSH PRIVILEGES statement.

Buy Now
Questions 23

A MySQL instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ.

Which two will optimize the security of this setup? (Choose two.)

Options:

A.

enabling and using SSL for connections to the MySQL database

B.

running the server with –-skip-networking specified

C.

disabling connections from named pipes or socket files (depending on the operating system of the server)

D.

starting the server with –-bind-address=0.0.0.0 specified

E.

limiting logins to originate from the application server or the server’s subnet

F.

installing MySQL on the application server, and running the database and application on the same server

Buy Now
Questions 24

Consider the two partial outputs of the SHOW GLOBAL VARIABLES command from a master and slave server:

Master:

Slave:

There is a problem with the slave replicating from the master. Which statement describes the cause of the problem?

Options:

A.

The log_bin variable is set to OFF on the slave.

B.

server_id is not unique.

C.

The max_connections variable on the slave needs to be increased.

D.

The shared_memory_base_name variable must match the master.

E.

The version of the slave is newer that the version of the master.

Buy Now
Questions 25

Which two statements are true regarding the creating of new MySQL physical and logical backups? (Choose two.)

Options:

A.

Physical backups can be used to recover from data corruption.

B.

Logical backups are human-readable whereas physical backups are not.

C.

Logical backups are always larger than physical backups.

D.

Physical backups are usually slower than text backups.

E.

Physical backups are usually faster than text backups.

Buy Now
Questions 26

Which three options are most likely to be changed for production form their default values? (Choose three.)

Options:

A.

innodb_buffer_pool_size

B.

max_connections

C.

join_buffer_size

D.

character_set_system

E.

innodb_log_file_size

F.

max_user_connections

G.

port

Buy Now
Questions 27

Which storage option for MySQL data directory typically offers the worst performance in a highly concurrent, OLTP-heavy, IO-bound workload?

Options:

A.

battery-backed locally-attached RAID 5 array

B.

iSCSI Lun

C.

SAN (Fibre Channel) Lun

D.

NFS (Networked File System) mount

Buy Now
Questions 28

A MySQL Server has been running an existing application successfully for six months. The my.cnf is adjusted to contain this additional configuration:

The MySQL Server is restarted without error.

What effect will the new configuration have on existing account?

Options:

A.

They are not affected by this configuration change.

B.

They all connect via the secure sha256_password algorithm without any configuration change.

C.

They will have their passwords updated on start-up to sha256_password format.

D.

They will have to change their password the next time they login to the server.

Buy Now
Questions 29

Which two methods will provide the total number of partitions on a table? (Choose two.)

Options:

A.

Query the INFORMATION_SCHEMA.PARTITIONS table

B.

Use the command: SHOW TABLE STATUS

C.

Query the performance_schema.objects_summary_global_by_type table

D.

Query the INFORMATION_SCHEMA.TABLES table for the partition_count

E.

Use the command: SHOW CREATE TABLE

Buy Now
Questions 30

What is the best method for monitoring Group Replication conflict resolution?

Options:

A.

the PERFORMANCE_SCHEMA tables

B.

the SHOW PROCESSLIST command

C.

the INNODB Lock Monitor details

D.

the SHOW STATUS command

E.

the INFORMATION_SCHEMA tables

Buy Now
Questions 31

Which three statements correctly describe MySQL InnoDB Cluster? (Choose three.)

Options:

A.

The cluster can be operated in multimaster mode with conflict detection for DML statements.

B.

All MySQL client programs and connectors can be used for executing queries.

C.

It provides fully synchronous replication between the nodes.

D.

There is support for automatic failover when one node fails.

E.

The data is automatically shared between the nodes.

F.

Each query will be executed in parallel across the nodes.

Buy Now
Questions 32

Consider the CHECK TABLE command.

In which two situations should this command be used? (Choose two.)

Options:

A.

to find out why a query takes a long time to execute on a given table

B.

to make sure a table has no structural problems

C.

to improve performance by updating index distributing statistics on InnoDB tables

D.

to repair table structure problem

E.

to make sure that no table indexes are corrupted

Buy Now
Questions 33

old_alter_table is disabled as shown.

mysql> SELECT @@old_alter_table;

Consider this statement on a RANGE-partitioned table:

mysql> ALTER TABLE orders DROP PARTITION p1, p3;

What is the outcome of executing this statement?

Options:

A.

All data in p1 and p3 partitions is removed and the table definition is changed.

B.

All data in p1 and p3 partitions is removed, but the table definition remains unchanged.

C.

Only the first partition (p1) will be dropped because only one partition can be dropped at any time.

D.

It results in a syntax error because you cannot specify more than one partition in the same statement.

Buy Now
Questions 34

A single InnoDB table has been dropped by accident. You are unable to use an additional intermediate MySQL instance to restore the table. Which two backup methods can be used to restore the single table without stopping the MySQL instance? (Choose two.)

Options:

A.

a backup created with mysqldump --all-databases

B.

a backup created using FLUSH TABLES … FOR EXPORT

C.

an up-to-date replication slave

D.

a file system-level snapshot

E.

a file system copy created while MySQL was shut down.

Buy Now
Questions 35

You inherited a busy InnoDB OLTP Instance with 100 schemas and 100 active users per schema.

  • Total dataset size is 200G with an average schema size of 2G.
  • The data is transient and is not backed up and can be repopulated easily.
  • Performance and responsiveness of the DB is paramount.
  • The query pattern for the DB instance is split 90/10 read/write.
  • DB host is dedicated server with 256G RAM and 64 cores.

One of your colleagues made some recent changes to the system and users are now complaining of performance impacts.

Which four configuration file edits might your colleague have performed to cause the negative DB performance? (Choose four.)

Options:

A.

table_open_cache = 64

B.

innodb_buffer_pool_instances=64

innodb_buffer_pool_size=200G

C.

log_bin=mysql –bin

Innodb_flush_log_at_trx_commit=1

D.

sync_binlog=10

E.

innodb_flush_method=O_DIRECT

F.

max_heap_table_size = 2G

tmp_table_size=2G

G.

query_cache_size = 2G

query_cache_enabled=1

Buy Now
Questions 36

You have a MySQL instance with the following variables in the /etc/my.cnf file:

You issue these statements:

USE prices;

UPDATE sales.january SET amount=amount+1000;

An hour after excluding the statements, you realize that you made a mistake and you want to go to the binary log and look at the statements again.

Which statement is true? (Choose two.)

Options:

A.

You would receive an error on the statement because you cannot update a different database that what is specified with the USE statement.

B.

The changes caused by the UPDATE statement are logged to the binary log because the instance is using --binlog-format = ROW

C.

The statement would fail because you cannot update more than one row at a time when using --binlog-format = ROW.

D.

Nothing is logged because you are executing an UPDATE statement that will cause changes to more than one row, and you do not have the --binlog-format value set to STATEMENT.

E.

Nothing was written to the binary log because you cannot perform a calculation in a query without enclosing the statement in single quotation marks.

Buy Now
Questions 37

Which MySQL utility program should you use to process and sort the Slow Query Log based on query time or average query time?

Options:

A.

mysqldumpslow

B.

mysqldump

C.

mysqlaccess

D.

mysqlshow

E.

mysqlslow

Buy Now
Exam Code: 1z0-888
Exam Name: MySQL 5.7 Database Administrator
Last Update: Nov 20, 2024
Questions: 124
$64  $159.99
$48  $119.99
$40  $99.99
buy now 1z0-888