You have just created a replication slave from a backup of the master made with mysqldump:
You try to log in to the slave with the application user, but fail as follows:
The login works on the master.
Which two changes to the process can fix the issue?
A crucial database, ‘db_prod’, just disappeared from your production MySQL instance.
In reviewing the available MySQL logs (General, Audit, or Slow) and your own application-level logs, you identified this command from a customer facing application:
SELECT id FROM users WHERE login=’payback!’;DROP DATABASE db_prod;’
Which three methods could have been used to prevent this SQL injection attack from happening? (Choose three.)
A MySQL database uses all InnoDB tables and is configured as follows;
You will be setting up a replication slave by using mysqldump. You will need a consistent backup taken from your running production server. The process should have minimal impact to active database connections.
Which two arguments will you pass to mysqldump to achieve this? (Choose two.)
Consider these global status variables:
Which two conclusions can be made from the output? (Choose two.)
You have installed the validate_password plug-in and set the validate_password_policy variable.
Which validation is affected by the validate_password_policy setting?
A master-slave replication setup has the slave showing this error:
On the master server, the binary logs show:
What could explain this error? (Choose two.)
Which statement is true about using Microsoft Windows Cluster as a platform for MySQL?
Which two methods accurately monitor the size of your total database size over time? (Choose two.)
You enable binary logging on MySQL Server with the configuration:
binlog-format=STATEMENT
log-bin
Which database updates are logged on the master server to the binary log by default?
You have the following in your my.cnf configuration file:
[mysqld]
default_authentication_plugin=sha256_password
You want to create a new user who will be connecting from the IP address 192.0.2.10, and you want to use the authentication plug-in that implements SHA-256 hashing for user account passwords.
Which two statements would create a user named webdesign for this IP address with the password of imbatman using a SHA_256 password hash? (Choose two.)
Which two are considered good security practices when using passwords? (Choose two.)
Force Majeure is a catastrophic failure on a major level of the database operation. Regular backups are key to helping avoid data loss in such situations.
Which two other steps can help avoid data loss in a major catastrophe? (Choose two.)
You are investigating the performance of a query which selects data from an InnoDB table.
Consider this Performance Schema diagnostics output for the query:
Which statement is true about the output?
You are using replication and the binary log files on your master server consume a lot of disk space.
Which two steps should you perform to safely remove some of the older binary log files? (Choose two.)
SQL injection is a common security threat.
Which two methods would help protect against this risk?
You are setting up a new installation of MySQL Server 5.7 (a GA release.) You have used a ZIP or TAR package to ensure that the mysqld binary, along with its support files, such as plug-ins and error messages, now exist on the host. Assume that the default datadir exists on the host. You installed the binary in the default location (the default --basedir value) for your operating system.
Which step should you perform before defining your own databases and database tables?
You are contacted by a user who does not have permission to access a database table. You determine after investigation that this user should be permitted to have access and so you execute a GRANT statement to enable the user to access the table.
Which statement describes the activation of that access for the user?
A MySQL instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ.
Which two will optimize the security of this setup? (Choose two.)
Consider the two partial outputs of the SHOW GLOBAL VARIABLES command from a master and slave server:
Master:
Slave:
There is a problem with the slave replicating from the master. Which statement describes the cause of the problem?
Which two statements are true regarding the creating of new MySQL physical and logical backups? (Choose two.)
Which three options are most likely to be changed for production form their default values? (Choose three.)
Which storage option for MySQL data directory typically offers the worst performance in a highly concurrent, OLTP-heavy, IO-bound workload?
A MySQL Server has been running an existing application successfully for six months. The my.cnf is adjusted to contain this additional configuration:
The MySQL Server is restarted without error.
What effect will the new configuration have on existing account?
Which two methods will provide the total number of partitions on a table? (Choose two.)
Which three statements correctly describe MySQL InnoDB Cluster? (Choose three.)
Consider the CHECK TABLE command.
In which two situations should this command be used? (Choose two.)
old_alter_table is disabled as shown.
mysql> SELECT @@old_alter_table;
Consider this statement on a RANGE-partitioned table:
mysql> ALTER TABLE orders DROP PARTITION p1, p3;
What is the outcome of executing this statement?
A single InnoDB table has been dropped by accident. You are unable to use an additional intermediate MySQL instance to restore the table. Which two backup methods can be used to restore the single table without stopping the MySQL instance? (Choose two.)
You inherited a busy InnoDB OLTP Instance with 100 schemas and 100 active users per schema.
One of your colleagues made some recent changes to the system and users are now complaining of performance impacts.
Which four configuration file edits might your colleague have performed to cause the negative DB performance? (Choose four.)
You have a MySQL instance with the following variables in the /etc/my.cnf file:
You issue these statements:
USE prices;
UPDATE sales.january SET amount=amount+1000;
An hour after excluding the statements, you realize that you made a mistake and you want to go to the binary log and look at the statements again.
Which statement is true? (Choose two.)
Which MySQL utility program should you use to process and sort the Slow Query Log based on query time or average query time?