问题:单选题You want to start monitoring statistics on the distribution of storage engines that are being used and the average sizes of tables in the various databases. Some details are as follows: The Mysql instance has 400 databases. Each database on an average consists of 25-50 tables. You use the query: SELECT TABLE_SCHEMA, 'ENGINE', COUNT (*), SUM(data_length) total_size FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_TYPE= 'BASE TABLE' GROUP BY TABLE_SCHEMA, 'ENGINE' ; Why is this query slow to execute?()A Collecting information requires large numbers of locks on various INFORMATION_SCHEMA tablesB Aggregating details from various storage engine caches for the final output is time consumingC Collecting information requires various disk-level operations and is time consumingD Counting and summarizing all table pages in the InnoDB shared tablespace is time consuming
查看答案
问题:单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A All system users have access to the MySQL server via—login path localB login-path can be used only for MySQL servers running on a local machineC login-path allows you to provide login credentials without passing clear text passwords on the command lineD When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later
问题:单选题Consider the Mysql Enterprise Audit plugin. A CSV file called data.csv has 100 rows of data. The stored procedure prepare_db ( ) has 10 auditable statements. You run the following statements in the mydb database: Mysql> CALL prepare_db ( ); Mysql> LOAD DATA INFILE '/tmp/data.cav' INTO TABLE mytable; Mysql> SHOW TABLES; How many events are added to the audit log as a result of the preceding statements?()A 12; only top-level statements and stored procedure events are loggedB 111; top-level statements and all lower-level statements are loggedC 3; only the top-level statements are loggedD 102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event
问题:单选题You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A The — ssl level was not specifiedB The server was not started with the – enable–ssl-plugin optionC — ssl is not a valid server optionD The mysqld binary was not compiled with SSL supportE The server's SSL certificate was invalid
问题:单选题An existing master-slave setup is currently using a delayed replication of one hour. The master has crashed and the slave must be "rolled forward" to provide all the latest data. The SHOW SLAVE STATUS indicates the following values: RELAY_LOG_FILE =hostname-relay-bin.00004 RELAY_LOG_POS = 1383 Which command set would make the slave current?()A STOP SLAVE; CHANGE MASTER TO MASTER_DELAY =0, RELAY_LOG_FILE = 'hostnamerelay- bin.00004' , RELAY_LOG_POS= 1383B STOP SLAVE; CHANGE MASTER TO RELAY_LOG_FILE = 'hostname-relay-bin.00004', RELAY_LOG_POS = 1383C STOP SLAVE; CHANGE MASTER TO MASTER_DELAY=0; START SLAVED STOP SLAVE; SET GLOBAL master_delay =0; START SLAVE
问题:多选题Which two requirements would lead towards a high availability solution?()AWhen uptime is criticalBWhen data must be refactoredCWhen application concurrency is staticDWhen data loss is unacceptableEWhen application is a single point of failure
问题:多选题Full Atomicity, Consistency, Isolation, Durability (ACID) compliance is a necessity for a new application, which heavily reads and writes data. This requires the following config file options: Sync_binlog=1 Innodb_flush_log_at_trx_commit=1 Innodb_doublewrite=1 However, this configuration is expected to introduce disk I/O overhead. What three changes will reduce disk I/O overheads?()AUse of soft links for database directories on the same physical diskBUse of delay_key_write=ON for batch index updateCAllocation of RAM to the buffer pool such that more of the data can fit in RAMDPlacement of InnoDB log files and datadir on separate physical disksEUse of separate directories on the same physical disk for log files and data files
问题:单选题Which hardware storage option, when set up with redundant disks, offers the least stability,availability, and reliability for Mysql data?()A RAID 5B iSCSIC SAN (Storage Area Network)D NFS (Networked File System)
问题:单选题You have a server that has very limited memory but has a very large table. You will use mysqldump to back up this table. Which option will ensure mysqldump will process a row at a time instead of buffering a set of rows?()A — quickB — skip-bufferC — single-transactionD — tab
问题:多选题What are three facts about backups with mysqldump?()ACan back up a remote database serverBAllow a consistent backup to be takenCAre always faster to restore than binary backupsDAre able to back up specific items within a databaseECreate automatically compressed backupsFWill lock all storage engines for duration of backup
问题:单选题Consider the following: Which statement best describes the meaning of the value for the key_len column?()AIt shows the total size of the index rowBIt shows how many columns in the index are examinedCIt shows the number of characters indexed in the keyDIt shows how many bytes will be used from each index row
问题:多选题Mysqldump was used to create a single schema backup; Shell> mysqldump –u root –p sakila > sakila2013.sql Which two commands will restore the sakila database without interfering with other running database?()AMysql> USE sakila; LOAD DATA INFILE 'sakila2013.sql';BShell> mysql –u root –p sakila sakila2013.sqlCShell> mysql import –u root –p sakila sakila2013.sqlDShell> mysql –u root -p –e 'use sakila; source sakila2013.sql'EShell> mysql –u root –p –silent < sakila2013.sql
问题:单选题What is true regarding InnoDB locking?()A InnoDB uses row and table-level locks, but row locks are not escalatesB InnoDB locks only those rows that are updatedC InnoDB only uses row locks, not page or table-level locksD InnoDB row locks may be escalated to page or table-level locksE InnoDB uses row-level or table-level locks depending on the number of rows affected
问题:单选题You adjust a default configuration to the following /etc/my.cnf on a Linux installation:[mysqld] Loq-bin Binrylog_format=ROW You do not notice the spelling error in binrylog_format and restart your production server. How does the MySQL server behave with incorrectly spelled options?()A Mysqld uses internal configuration versioning and reverts to the previous configurationB When using mysql_config_editor for configuration adjustments, it detects incorrect syntax and typing mistakesC The mysqld_safe script skips the unknown variable and starts using the remaining configuration changesD Mysqld prints to the error log about an unknown variable, and then exits
问题:单选题While reviewing the MySQL error log, you see occasions where MySQL has exceeded the number of file handles allowed to it by the operating system. Which method will reduce the number of file handles in use?()A Activating the MySQL Enterprise thread pool pluginB Relocating your data and log files to separate storage devicesC Disconnecting idle localhost client sessionsD Implementing storage engine data compression options
问题:多选题When backing up a replication slave, which three should also be backed up in addition to data?()AThe master.info and relay.info filesBThe relay log filesCThe relay index fileDMysql.slave_master_info tableEMysql.slave_relay_log_info tableFMysql.slave_worker_info table
问题:单选题You have taken a Logical Volume Manager (LVM) snapshot backup of a volume that contains the MySQL data directory. Why is it important to remove snapshots after completing a RAW backup in this way?()A The snapshot size will continue to grow as changes to the volume are madeB The snapshots take a significant amount of disk space as they are a duplicate copy of the dataC The system can only support one snapshot per volume, and you need to remove it to be able to take your next backupD The system keeps a copy of changes in memory and can cause an out of memory event
问题:单选题Review the definition of the phone_list view. CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= 'root'@localhost' SQL SECURITY DEFINER VIEW 'phone_list' AS SELECT e . id as id 'e . first_name AS 'first_name' 'e . last_name AS 'last_name' 'coalesce ( ph1.phone_no, ' – ') AS 'office_no' 'coalesce (ph2 .phone_no, ' – ') AS 'cell_no' FROM employees e LEFT JOIN employee_phone ph1 ON ph1.emp_id = e.id AND ph1.type = 'office' LEFT JOIN employee_phone ph2 ON ph2 .emp_id = e.id AND ph2 .type = 'mobile' The tables employees and employee_phone are InnoDB tables; all columns are used in this view. The contents of the phone_list view are as follows: Mysql> select * from phone_list; 1 row in set (0.00 sec) Which method can you use to change the cell_no value to '555-8888' for John Doe?()A INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, '555-8888','mobile')B UPDATE phone_list SET cell_name '555-8888' WHERE first_name= 'John' and last_name= 'Doe'C DELETE FROM phone_list WHERE first_name= 'John' and last_name= 'Doe'; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES ('John' , 'Doe' , 'x1234' , '555-8888)D UPDATE employee_phone SET phone_no= '555-8888' where emp_id=1
问题:多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'