You are considering using file-system snapshots to back up MySQL.
Which three statements are true? (Choose three.)
A. They take roughly twice as long as logical backups.
B. They allow direct copying of table rows with operating system copy commands.
C. They work best for transaction storage engines that can perform their own recovery when restored.
D. The backup window is almost zero from the perspective of the application.
E. They do not back up views, stored procedures, or configuration files.
F. There is a slight performance cost while the snapshot is active.
G. They do not use additional disk space.
Where is the default data directory located after installing MySQL using RPM on Oracle Linux 7?
A. /usr/mysql
B. /usr/bin
C. /etc/my.cnf
D. /var/lib/mysql
E. /usr
You wish to protect your MySQL database against SQL injection attacks. Which method would fail to do this?
A. installing and configuring the Connection Control plugin
B. avoiding concatenation of SQL statements and user-supplied values in an application
C. using stored procedures for any database access
D. using PREPARED STATEMENTS
Examine Joe's account:
CREATE USER 'joe'@'%' IDENTIFIED BY '*secret*'
GRANT ALL PRIVILEGES ON *.* TO 'joe'@'%'
All existing connections for joe are killed.
Which two commands will stop joe establishing access to the MySQL instance? (Choose two.)
A. ALTER USER 'joe'@'%' ACCOUNT LOCK
B. ALTER USER 'joe'@'%' SET password='*invalid*'
C. REVOKE ALL PRIVILEGES ON *.* FROM 'joe'@'%'
D. ALTER USER 'joe'@'%' PASSWORD HISTORY 0
E. ALTER USER 'joe'@'%' IDENTIFIED BY '*invalid*' PASSWORD EXPIRE
F. REVOKE USAGE ON *.* FROM 'joe'@'%'
Examine this command and output:
Which statement is true?
A. Firewall_cached_entries is the number of statements found in the query cache for users in DETECTING mode.
B. Firewall_access_denied is the number of connection attempts from prohibited hosts that are denied.
C. Firewall_access_suspicious is the number of statements logged as suspicious for users in DETECTING mode.
D. Firewall_access_granted is the number of connections granted from whitelisted hosts.
A clean shutdown was performed with innodb_fast_shutdown=0.
While you were manipulating files, all files were accidentally deleted from the top-level data directory.
Which two files must be restored from backup to allow the DB to restart cleanly? (Choose two.)
A. ibtmp1
B. undo_001
C. ib_buffer_pool
D. ibdata1
E. mysql.ibd
F. ib_logfile0
Examine this command and output:
Which two options will improve the security of the MySQL instance? (Choose two.)
A. Remove group read/write privileges from the private_key.pem file.
B. Remove world read privileges from the server-cert.pem certificate file.
C. Change the group ownership of the mysql directory to the mysql user group.
D. Remove world read privileges from the public_key.pem file.
E. Change the parent directory owner and group to mysql.
F. Remove the world read/execute privilege from the accounting directory.
Your MySQL server is running on the Microsoft Windows platform.
Which three local connection protocols are available to you? (Choose three.)
A. named pipes
B. shared memory
C. SOCKET
D. X Protocol
E. UDP
F. TCP/IP
Which two are true about binary logs used in asynchronous replication? (Choose two.)
A. They are pushed from the master to the slave.
B. They contain events that describe database changes on the master.
C. They contain events that describe all queries run on the master.
D. They contain events that describe only administrative commands run on the master.
E. They are pulled from the master to the slave.
You want to log only the changes made to the database objects and data on the MySQL system.
Which log will do this by default?
A. general query log
B. audit log
C. slow query log
D. binary log
E. error log