Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-888 - MySQL 5.7 Database Administrator

Page: 4 / 4
Total 124 questions

What is the order of tables shown in an EXPLAIN output?

A.

It lists tables from the smallest to the largest.

B.

It lists tables in the order in which their data will be read.

C.

It lists tables from the most optimized to the least optimized.

D.

It lists tables in the order in which they are specified in the statement that is being explained.

You are contacted by a user who does not have permission to access a database table. You determine after investigation that this user should be permitted to have access and so you execute a GRANT statement to enable the user to access the table.

Which statement describes the activation of that access for the user?

A.

The access does not take effect until the user logs out and back in.

B.

The access does not take effect until the next time the server is started.

C.

The access is available immediately.

D.

The access does not take effect until you issue the FLUSH PRIVILEGES statement.

You created a backup of the world database with this command:

shell> mysqldump --opt world > dump.sql

Which two will import the data from dump.sql? (Choose two.)

A.

shell> mysqladmin recover test dump.sql

B.

shell> mysql test < dump.sql

C.

shell> mysqlimport test dump.sql

D.

mysql> USE test;

mysql> LOAD DATA INFILE ‘dump.sql’;

E.

mysql>USE test;

mysql>SOURCE dump.sql;

Which two methods accurately monitor the size of your total database size over time? (Choose two.)

A.

monitoring the Innodb_rows_inserted status variable

B.

monitoring the innodb_redo_log_size variable

C.

monitoring the information_schema.TABLES table

D.

monitoring datadir size in the operating system

E.

monitoring cumulative Innodb_page_size increase

F.

monitoring the performance_schema_hosts_size variable

These details are shown when logged in to an account:

Which set of statements would match the accounts shown?

A.

mysql> CREATE USER ‘employee’@’localhost’ IDENTIFIED BY ‘more_secrets’;

mysql> CREATE USER ’’@’’ IDENTIFIED BY ‘valid_password’ WITH PROXY ‘employee’@’localhost’;

B.

mysql> CREATE USER ‘employee’@’localhost’ IDENTIFIED BY ‘more_secrets’;

mysql> GRANT PROXY ON ‘employee’@’localhost’ TO ‘robert’@’localhost’;

C.

mysql> CREATE USER ‘robert’@’localhost’ IDENTIFIED BY ‘secret_password’;

mysql>CREATE USER ‘employee’@’localhost’ IDENTIFIED BY ‘more_secrets’;

D.

mysql> CREATE_USER ’’@’’ IDENTIFIED WITH authentication_pam ACCOUNT LOCK;

mysql> CREATE USER ‘employee’@’localhost’ IDENTIFIED BY ‘more_secrets’;

mysql> GRANT PROXY ON ‘employee’@’localhost’ TO ’’@’’;

You have installed the validate_password plug-in and set the validate_password_policy variable.

Which validation is affected by the validate_password_policy setting?

A.

whether a new password is rejected if it contains a word found in a dictionary file.

B.

whether a new password is rejected if it contains the current user’s username.

C.

the amount of delay after an incorrect password is entered

D.

the length of time before a newly created password expires

An admin attempts to enforce stronger security by using these commands:

The admin then leaves the system running with the specified changes. What are two remaining security concerns? (Choose two.)

A.

validate_password_policy cannot be set without restarting the MySQL instance.

B.

The name of the dictionary file is too obvious.

C.

The dictionary file word list is too short.

D.

validate_password_dictionary_file cannot be set without restarting the MySQL instance.

E.

The validate_password plug-in has not been loaded.

F.

The dictionary file is in an insecure location.