Download MySQL 5.6 Database Administrator.1z0-883.SelfTestEngine.2019-01-23.56q.vcex

Vendor: Oracle
Exam Code: 1z0-883
Exam Name: MySQL 5.6 Database Administrator
Date: Jan 23, 2019
File Size: 221 KB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A database exists as a read-intensive server that is operating with query_cachek_type = DEMAND. 
The database is refreshed periodically, but the resultset size of the queries does not fluctuate. 
Note the following details about this environment:
  • A web application uses a limited set of queries. 
  • The Query Cache hit rate is high. 
  • All resultsets fit into the Query Cache. 
  • All queries are configured to use the Query Cache successfully. 
The response times for queries have recently started to increase. The cause for this has correctly been identified as the increase in the number of concurrent users 
accessing the web service. 
Based solely on the information provided, what is the most likely cause for this slowdown at the database level?
  1. The Query Cache is pruning queries due to an increased number of requests.
  2. Query_cache_min_res_unit has been exceeded, leading to an increased performance overhead due to additional memory block lookups.
  3. Mutex contention on the Query Cache is forcing the queries to take longer due to its single-threaded nature.
  4. The average resultset of a query is increasing due to an increase in the number of users requiring SQL statement execution.
Correct answer: C
Question 2
You have a login-path named “adamlocal” that was created by using the mysql_config_editor command. 
You need to check what is defined for this login_path to ensure that it is correct for you deployment. 
You execute this command:
$ mysql_config_editor print –login-path=adamlocal 
What is the expected output of this command?
  1. The command prints all parameters for the login-path. The password is printed in plain text.
  2. The command prints all parameters for the login-path. The password is shown only when you provide the –password option.
  3. The command prints all parameter for the login-path. The password is replaced with stars.
  4. The command prints the encrypted entry for the login-path. The is only possible to see if an entry exists.
Correct answer: C
Question 3
You are using replication and the binary log files on your master server consume a lot of disk space. 
Which two steps should you perform to safely remove some of the older binary log files?
  1. Ensure that none of the attached slaves are using any of the binary logs you want to delete.
  2. Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files.
  3. Execute the PURGE BINARY LOGE NOT USED command.
  4. Remove all of the binary log files that have a modification date earlier than today.
  5. Edit the .index file to remove the files you want to delete.
Correct answer: AB
Explanation:
A: To safely purge binary log files, follow this procedure:On each slave server, use SHOW SLAVE STATUS to check which log file it is reading. Obtain a listing of the binary log files on the master server with SHOW BINARY LOGS. Determine the earliest log file among all the slaves. This is the target file. If all the slaves are up to date, this is the last log file on the list. Make a backup of all the log files you are about to delete. (This step is optional, but always advisable.) Purge all log files up to but not including the target file. B: Syntax:PURGE { BINARY | MASTER } LOGS     { TO 'log_name' | BEFORE datetime_expr } Reference: 13.4.1.1 PURGE BINARY LOGS Syntax
A: To safely purge binary log files, follow this procedure:
  1. On each slave server, use SHOW SLAVE STATUS to check which log file it is reading. 
  2. Obtain a listing of the binary log files on the master server with SHOW BINARY LOGS. 
  3. Determine the earliest log file among all the slaves. This is the target file. If all the slaves are up to date, this is the last log file on the list. 
  4. Make a backup of all the log files you are about to delete. (This step is optional, but always advisable.) 
  5. Purge all log files up to but not including the target file. 
B: Syntax:
PURGE { BINARY | MASTER } LOGS 
    { TO 'log_name' | BEFORE datetime_expr } 
Reference: 13.4.1.1 PURGE BINARY LOGS Syntax
Question 4
Which two statements are true about InnoDB auto-increment locking?
  1. The auto-increment lock can be a table-level lock.
  2. InnoDB never uses table-level locks.
  3. Some settings for innodb_autoinc_lock_mode can help reduce locking.
  4. InnoDB always protects auto-increment updates with a table-level lock.
  5. InnoDB does not use locks to enforce auto-increment uniqueness.
Correct answer: AD
Explanation:
A (not B): InnoDB uses a special lock called the table-level AUTO-INC lock for inserts into tables with AUTO_INCREMENT columns.D (Not E): This lock is normally held to the end of the statement (not to the end of the transaction), to ensure that auto-increment numbers are assigned in a predictable and repeatable order for a given sequence of INSERT statements. Reference: 14.6.5.2 Configurable InnoDB Auto-Increment Lockinghttp://dev.mysql.com/doc/refman/5.6/en/innodb-auto-increment-configurable.html
A (not B): InnoDB uses a special lock called the table-level AUTO-INC lock for inserts into tables with AUTO_INCREMENT columns.
D (Not E): This lock is normally held to the end of the statement (not to the end of the transaction), to ensure that auto-increment numbers are assigned in a predictable and repeatable order for a given sequence of INSERT statements. 
Reference: 14.6.5.2 Configurable InnoDB Auto-Increment Locking
http://dev.mysql.com/doc/refman/5.6/en/innodb-auto-increment-configurable.html
Question 5
Consider the Mysql Enterprise Audit plugin. 
A CSV file called data.csv has 100 rows of data. 
The stored procedure prepare_db ( ) has 10 auditable statements. 
You run the following statements in the mydb database:
Mysql> CALL prepare_db ( ); 
Mysql> LOAD DATA INFILE ‘/tmp/data.cav’ INTO TABLE mytable; 
Mysql> SHOW TABLES; 
How many events are added to the audit log as a result of the preceding statements?
  1. 102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event.
  2. 3; only the top-level statements are logged.
  3. 111; top-level statements and all lower-level statements are logged.
  4. 12; only top-level statements and stored procedure events are logged.
Correct answer: B
Explanation:
Reference: http://dev.mysql.com/doc/mysql-security-excerpt/5.5/en/audit-log-plugin-logging-control.html
Reference: http://dev.mysql.com/doc/mysql-security-excerpt/5.5/en/audit-log-plugin-logging-control.html
Question 6
Consider the events_% tables in performance Schema. 
Which two methods will clear or reset the collected events in the tables?
  1. Using DELETE statements, for example, DELETE FROM performance_schema.events_watis_current;
  2. Using the statement RESET PERFORMANCE CACHE;
  3. Using the statement FLUSH PERFORMANCE CACHE;
  4. Using TRUNCATE statements, for example, TRUNCATE TABLE performance_schema.events_waits_current;
  5. Disabling and re-enabling all instruments
  6. Restarting Mysql
Correct answer: DE
Explanation:
D: To avoid unpredictable results if you make timer changes, use TRUNCATE TABLE to reset Performance Schema statistics.Example:As with other aggregate tables within Performance Schema, you can reset the statistics within the digest table with:TRUNCATE TABLE performance_schema.events_statements_summary_by_digest; Reference: 22.2.3.1 Performance Schema Event Timinghttp://dev.mysql.com/doc/refman/5.5/en/performance-schema-timing.html
D: To avoid unpredictable results if you make timer changes, use TRUNCATE TABLE to reset Performance Schema statistics.
Example:
As with other aggregate tables within Performance Schema, you can reset the statistics within the digest table with:
TRUNCATE TABLE performance_schema.events_statements_summary_by_digest; 
Reference: 22.2.3.1 Performance Schema Event Timing
http://dev.mysql.com/doc/refman/5.5/en/performance-schema-timing.html
Question 7
What are four capabilities of the mysql client program?
  1. Creating and dropping databases
  2. Creating, dropping, and modifying tables and indexes
  3. Shutting down the server by using the SHUTDOWN command
  4. Creating and administering users
  5. Displaying replication status information
  6. Initiating a binary backup of the database by using the START BACKUP command
Correct answer: ABCDE
Question 8
Assume that you want to know which Mysql Server options were set to custom values. 
Which two methods would you use to find out?
  1. Check the configuration files in the order in which they are read by the Mysql Server and compare them with default values.
  2. Check the command-line options provided for the Mysql Server and compare them with default values.
  3. Check the output of SHOW GLOBAL VARIABLES and compare it with default values.
  4. Query the INFORMATION_SCHEMA.GLOBAL_VARIABLES table and compare the result with default values.
Correct answer: CD
Explanation:
Question 9
You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands:
$ pidof mysqld
3132
$tail - n2 /var/lib.mysql/hostname.err
2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld: ready for connections.
Version: ‘5.6.13-enterprise-commercial-advaced’ socket: ‘/tmp/mysql.sock’ port;
3306 Mysql Enterprise Server – Advanced Edition (Commercial)
You attempt to log in as the root user with the following command:
$mysql –u root
ERROR 1045 (28000): Access denied for user ‘root’@’localhost’ (using password: NO)
Which statement is true about this scenario?
  1. The RPM installation script sets a default password of password for new installations.
  2. The local root user must log in with a blank password initially: mysql –u root –p.
  3. New security measures mean that the mysql_secure_installation script must be run first on all new installations.
  4. The mysql_install_bd post-installation script used – random-password.
Correct answer: B
Question 10
A Mysql Server has been running an existing application successfully for six months. 
The my.cnf is adjusted to contain the following additional configuration:
[mysqld] 
Default-authentication-plugin=sha256_password 
The Mysql Server is restarted without error. 
What effect will the new configuration have in existing accounts? 
  1. They will have their passwords updated on start-up to sha256_password format.
  2. They will have to change their password the next time they login to the server.
  3. They are not affected by this configuration change.
  4. They all connect via the secure sha256_password algorithm without any configuration change.
Correct answer: D
Explanation:
Reference: http://dev.mysql.com/doc/refman/5.6/en/sha256-authentication-plugin.html
Reference: http://dev.mysql.com/doc/refman/5.6/en/sha256-authentication-plugin.html
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!