Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-888 Questions and Answers

Question # 6

What does the possible_keys column in this output denote?

A.

if it is possible for you to include any indexes in your query

B.

whether there are any indexes on the tables that you are querying

C.

if there are any indexes that may be used to solve this query

D.

whether you are using any indexes in your query

Full Access
Question # 7

A MySQL Server has been running an existing application successfully for six months. The my.cnf is adjusted to contain this additional configuration:

The MySQL Server is restarted without error.

What effect will the new configuration have on existing account?

A.

They are not affected by this configuration change.

B.

They all connect via the secure sha256_password algorithm without any configuration change.

C.

They will have their passwords updated on start-up to sha256_password format.

D.

They will have to change their password the next time they login to the server.

Full Access
Question # 8

You have created a backup of the ‘sales’ database with the command:

Which two procedures can be used to restore the ‘orders’ table from the backup?

A.

B.

C.

D.

Full Access
Question # 9

The Performance Schema includes these tables related to status variables:

Which two facts are true about these tables? (Choose two.)

A.

The variable values in global_status are the sum of those in status_by_thread grouped by the variable name.

B.

All these tables have the same number of rows.

C.

The global_status table is equivalent to the SHOW GLOBAL STATUS statement.

D.

The variable values in status_by_account are the sum of those in status_by_host and status_by_user grouped by the variable name.

E.

The session_status table is equivalent to status_by_thread for the current thread.

Full Access
Question # 10

Due to an authentication plug-in that is used on the server, passwords are required to be sent as clear text as opposed to the usual encrypted format.

Which two methods would allow the mysql client to connect to the server and send clear text passwords? (Choose two.)

A.

mysql --protocol=PLAIN –uroot –p –h dbhost.example.com

B.

INSTALL PLUGIN mysql_cleartext_password SONAME ‘mysql_cleartext_password.so’;

C.

export LIBMYSQL_ENABLE_CLEARTEXT_PLUGIN=’Y’

D.

SET GLOBAL mysql_cleartext_passwords=1;

E.

mysql --enable-cleartext-plugin –uroot –p –h dbhost.example.com

Full Access
Question # 11

You have successfully provisioned the latest MySQL 5.7 database instance on a physical host, to be added to an existing farm for use in a modern, high volume, ACID-compliant, OLTP website, which serves hundreds of DML transactions per second.

The default values of which two key variables do you change to ensure seamless operation of the database? (Choose two.)

A.

Key Buffer Size

B.

InnoDB Redo Log Size

C.

Binary Log Size

D.

Buffer Pool Size

E.

Sort Buffer size

F.

Query Cache Size

Full Access
Question # 12

When you examine a new MySQL installation with default configuration, you find a file called ibdata1 in the database directory. Which two statements are true about this file? (Choose two.)

A.

it contains the binary log.

B.

it contains a general tablespace.

C.

it is the default location for all new tables that you create.

D.

it contains the system tablespace.

E.

it contains the redo log.

F.

it contains the undo log.

Full Access
Question # 13

You have a MySQL replication setup and you intentionally stop the SQL thread on the slave.

What are two reasons that you may stop the SQL thread on the slave while keeping the I/O thread running? (Choose two.)

A.

to allow the remaining events to be processed on the slave while not receiving new events from the master

B.

to allow a backup to be created under reduced load

C.

to allow for point-in-time recovery on the slave

D.

to prevent schema changes from propagating to the slave before they are validated

E.

to prevent any transaction experiencing a deadlock

Full Access
Question # 14

Consider that local disk files are accessible via MySQL with commands such as:

mysql> LOAD DATA LOCAL INFILE ‘/etc/passwd’ INTO TABLE mypasswords;

What change could be made to stop any breach via this insecurity?

A.

executing REVOKE LOAD FROM *.*

B.

setting the --local-service=0 option when starting mysqld

C.

executing REVOKE FILE FROM *.*

D.

executing REVOKE FILE ON *.* FROM ‘ ’ @’%’

E.

setting the --local-infile=0 option when starting mysqld

F.

setting the --open-files-limit=0 option when starting mysqld

Full Access
Question # 15

Consider:

Which statement best describes the meaning of the value for the key_len column?

A.

It shows how many bytes will be used from each index row.

B.

It shows the number of characters indexed in the key.

C.

It shows the total size of the index row.

D.

It shows how many columns in the index are examined.

Full Access
Question # 16

The following grants were executed:

GRANT CREATE ROUTING ON sales.* TO ‘webadmin’@’%’;

GRANT ALTER ON PROCEDURE sales.myproc TO ‘webadmin’@’%’;

A user successfully connects to the database as webadmin and created a stored procedure named get_reports. The next day, the user logs in again as webadmin and wants to delete the stored procedure named get_reports, and therefore, issues the following statement:

USE sales;

DROP PROCEDURE IF EXISTS get_reports;

What is the result of executing the statement?

A.

The user will get an error because he or she did not use the ALTER statement to drop the stored procedure.

B.

The user will get an error because he or she did not put the database name in front of the stored procedure name.

C.

The stored procedure named get_reports will be dropped.

D.

The user will get an error because he or she does not have the permission to drop stored procedures.

Full Access
Question # 17

Which three statements correctly describe MySQL InnoDB Cluster? (Choose three.)

A.

The cluster can be operated in multimaster mode with conflict detection for DML statements.

B.

All MySQL client programs and connectors can be used for executing queries.

C.

It provides fully synchronous replication between the nodes.

D.

There is support for automatic failover when one node fails.

E.

The data is automatically shared between the nodes.

F.

Each query will be executed in parallel across the nodes.

Full Access
Question # 18

Multiversion Concurrency Control (MVCC) enables what type of backup?

A.

Hot

B.

Binary

C.

Logical

D.

Incremental

Full Access