Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which storage option for MySQL data directory typically offers the worst performance in a highly concurrent, OLTP-heavy, IO-bound workload?

A.

battery-backed locally-attached RAID 5 array

B.

iSCSI Lun

C.

SAN (Fibre Channel) Lun

D.

NFS (Networked File System) mount

Consider the table people with this definition:

The application uses a query such as:

SELECT * FROM people WHERE YEAR(Birthday) = 1980;

The query is not using an index.

Which two methods can be used to allow the query to use an index? (Choose two.)

A.

Change the WHERE clause to Birthday BETWEEN 1980-01-01 AND 1980-12-31.

B.

Add a functional index for YEAR(Birthday).

C.

Execute ANALYZE TABLE to update the index statistics.

D.

Add a generated column calculating YEAR(Birthday) and index that column.

E.

Add FORCE INDEX (Birthday) to the query.

Consider:

What does the range value in the type column mean?

A.

You can use an index and return rows that fall within a range of values.

B.

The table will be scanned over a certain range of values.

C.

This type of index uses the range hash.

D.

There is a range of indexes that can be used.

Examine the mysqldumpslow output:

Which two options could explain the slow query? (Choose two.)

A.

There is network congestion between client and server.

B.

No index has been defined on the filtered column.

C.

There are 108 queries still being executed.

D.

A table lock is causing delays.

E.

A full table scan is being used.

Which MySQL utility program should you use to process and sort the Slow Query Log based on query time or average query time?

A.

mysqldumpslow

B.

mysqldump

C.

mysqlaccess

D.

mysqlshow

E.

mysqlslow

You are asked to examine user accounts and find:

Which two statements will best secure this environment? (Choose two.)

A.

DROP USER ‘’@’localhost’;

B.

ALTER USER ‘’@’localhost’ PASSWORD = ‘secret_password’;

C.

ALTER USER bob@’%’ IDENTIFIED BY ‘secret_password’;

D.

ALTER USER ‘root’@’localhost’ ACCOUNT LOCK;

E.

ALTER USER bob PASSWORD = ‘secret_password’;

F.

REVOKE ALL PRIVILEGES FROM ‘’@’localhost’;

On a master server that is using statement-based replication, a table of log data has become very large.

You decide to delete 100,000 rows.

Which two methods can be independently invoked to ensure that the delete is properly propagated to the slave? (Choose two.)

A.

Change the replication mode to MIXED before issuing any delete statements when the LIMIT clause is used.

B.

If the data modification is non-deterministic, the query optimizer will resolve any potential issues.

C.

Use the LIMIT clause to limit the deletion to 100,000 rows.

D.

Use the LIMIT clause in conjunction with the ORDER BY clause.

What two statements are true regarding FLUSH TABLES FOR EXPORT? (Choose two.)

A.

It can be used to export TEMPORARY tables.

B.

Table only exports when the table has its own tablespace.

C.

The InnoDB Storage engine must be used for the table being exported.

D.

It is the safest way to extract tables from the shared tablespace.

E.

Partitioned tables are not supported.

Which statement is true about using Microsoft Windows Cluster as a platform for MySQL?

A.

It relies on the shared disk architecture being visible to both servers.

B.

It is provided by means of IP-level disk replication.

C.

It implements High Availability by using the .NET Connector’s load balancing capabilities.

D.

It is a shared-nothing architecture.

You will configure a MySQL Server to act as a replication master. Which two options must be configured correctly to allow this? (Choose two.)

A.

log-master-updates

B.

rpl-recovery-rank

C.

server-id

D.

enable-master-start

E.

log-bin

F.

master-logging