Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the correct syntax for using transparent data encryption with an existing InnoDB table?

A.

ALTER TABLE t1 ADD ENCRYPTED_TABLESPACE = 'Y';

B.

ALTER TABLE t1 ENCRYPTION='Y';

C.

ALTER TABLE t1 WITH ENCRYPTION USING MASTER KEY;

D.

ALTER TABLE t1 SET TDE = 'ON';

Examine these InnoDB Cluster parameter settings:

Now examine the partial status:

A permanent network failure isolates host3.

Which two statements are true? (Choose two.)

A.

The instance deployed on host2 is elected as the new primary instance.

B.

The instance deployed on host3 is expelled from the cluster and must be rejoined using cluster.addInstance ('host3:3377')

C.

The instance deployed on host3 will automatically rejoin the cluster when connectivity is re-established.

D.

Failure of the instance deployed on host1 provokes an outage.

E.

The issuing command cluster.switchToMuitiPrimaryMode() will fail to enable multi-primary mode.

F.

The primary instance can be specified by using the command cluster.setPrimaryInstance(:).

Which two are true about binary logs used in asynchronous replication? (Choose two.)

A.

They are pushed from the master to the slave.

B.

They contain events that describe database changes on the master.

C.

They contain events that describe all queries run on the master.

D.

They contain events that describe only administrative commands run on the master.

E.

They are pulled from the master to the slave.

Which three are types of InnoDB tablespaces? (Choose three.)

A.

redo tablespaces

B.

encryption tablespaces

C.

schema tablespaces

D.

data tablespaces

E.

undo tablespaces

F.

temporary table tablespaces

Examine this statement and output:

You must try to reduce query execution time.

Which two queries should you focus on? (Choose two.)

A.

QN = 3

B.

QN = 5

C.

QN = 1

D.

QN = 4

E.

QN = 2

User account baduser@hostname on your MySQL instance has been compromised.

Which two commands stop any new connections using the compromised account? (Choose two.)

A.

ALTER USER baduser@hostname PASSWORD DISABLED;

B.

ALTER USER baduser@hostname MAX_USER_CONNECTIONS 0;

C.

ALTER USER baduser@hostname ACCOUNT LOCK;

D.

ALTER USER baduser@hostname IDENTIFIED WITH mysql_no_login;

E.

ALTER USER baduser@hostname DEFAULT ROLE NONE;

What does the slave I/O thread do?

A.

connects to the master and requests it to send updates recorded in its binary logs

B.

monitors and schedules I/O calls to the subsystem for the relay logs

C.

acquires a lock on the binary log for reading each event to be sent to the slave

D.

reads the relay log and executes the events contained in them

Which condition is true about the use of the hash join algorithm?

A.

No index can be used for the join.

B.

The query must access no more than two tables.

C.

The smallest of the tables in the join must fit in memory as set by join_buffer_size.

D.

At least one of the tables in the join must have a hash index.

Which two statements are true about MySQL server multi-source replication? (Choose two.)

A.

It is not compatible with auto-positioning.

B.

It needs to be re-instanced after a crash to maintain consistency.

C.

It uses only time-based replication conflict resolution.

D.

It relies on relay_log_recovery for resilient operations.

E.

It does not attempt to detect or resolve replication conflicts.

F.

It must use GTID replication.

A MySQL server is monitored using MySQL Enterprise Monitor’s agentless installation.

Which three features are available with this installation method? (Choose three.)

A.

MySQL Replication monitoring

B.

network-related information and network characteristics

C.

MySQL Query Analysis data

D.

CPU utilization

E.

security-related advisor warnings

F.

operating system memory utilization

G.

disk usage and disk characteristics including disk advisors warnings