Examine this statement, which executes successfully:
Now examine this query:
Which two statements can do this? (Choose two.)
User account baduser@hostname on your MySQL instance has been compromised.
Which two commands stop any new connections using the compromised account? (Choose two.)
Which two statements are true about the mysql_config_editor program? (Choose two.)
Which two statements are true about MySQL Enterprise Backup? (Choose two.)
You have configured MySQL Enterprise Monitor to monitor your MySQL server.
Which four features are available? (Choose four.)
Examine this statement and output:
You must try to reduce query execution time.
Which two queries should you focus on? (Choose two.)
How can mysql_multi be configured to allow MySQL instances to use the same port number?
Which two statements are true about the binary log encryption feature? (Choose two.)
You issue this command:
SHOW SLAVE STATUS -
In the output, there is a value for Seconds_behind_master.
How is this time calculated?
You plan to take daily full backups, which include the ndbinfo and sys (internal) databases.
Which command will back up the databases in parallel?
The data in this instance is transient; no backup or replication will be required. It is currently under performing.
After profiling the system, you highlight these MySQL status and global variables:
The OS metrics indicate that disk is a bottleneck. Other variables retain their default values.
Which three changes will provide the most benefit to the instance? (Choose three.)
Which two statements are true about the mysqld-auto.cnf file? (Choose two.)
Examine the modified output:
Seconds_Behind_ Master value is steadily growing. What are two possible causes? (Choose two.)
Which two queries are examples of successful SQL injection attacks? (Choose two.)
Examine this snippet from the binary log file named binlog.000036:
The rental table was accidentally dropped, and you must recover the table.
You have restored the last backup, which corresponds to the start of the binlog.000036 binary log.
Which command will complete the recovery?
There are five MySQL instances configured with a working group replication.
Examine the output of the group members:
Which two statements are true about network partitioning in the cluster? (Choose two.)
Examine this statement:
mysql> DROP ROLE r_role1, r_role2;
Which two are true? (Choose two.)
MySQL is installed on a Linux server with this configuration:
Which method sets the default authentication to SHA-256 hashing for authenticating user account passwords?
Four nodes are configured to use circular replication.
Examine these configuration parameters for each node:
Which statement is true?
Examine these commands and output:
Which connection ID is holding the metadata lock?
Which three are requirements for a secure MySQL Server environment? (Choose three.)