You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" MySQL 8.0 Database Administrator Practice Test 3 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
MySQL 8.0 Database Administrator
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Which MySQL option should be included in the option file to enable query logging?
Correct
Setting general_log to ON enables query logging. log_queries, log_output, and log_queries_on are incorrect or incomplete settings for this purpose.
Incorrect
Setting general_log to ON enables query logging. log_queries, log_output, and log_queries_on are incorrect or incomplete settings for this purpose.
Unattempted
Setting general_log to ON enables query logging. log_queries, log_output, and log_queries_on are incorrect or incomplete settings for this purpose.
Question 2 of 60
2. Question
Which binlog format is recommended for row-based replication in MySQL?
Correct
Row-based replication logs actual row modifications, improving data consistency by avoiding non-deterministic statement execution that can lead to replica drift.
Incorrect
Row-based replication logs actual row modifications, improving data consistency by avoiding non-deterministic statement execution that can lead to replica drift.
Unattempted
Row-based replication logs actual row modifications, improving data consistency by avoiding non-deterministic statement execution that can lead to replica drift.
Question 3 of 60
3. Question
Which system table in MySQL 8.0 stores metadata about indexes and constraints?
Correct
The mysql.table_constraints table contains index and constraint metadata inside the Data Dictionary. The other options are not valid Data Dictionary tables.
Incorrect
The mysql.table_constraints table contains index and constraint metadata inside the Data Dictionary. The other options are not valid Data Dictionary tables.
Unattempted
The mysql.table_constraints table contains index and constraint metadata inside the Data Dictionary. The other options are not valid Data Dictionary tables.
Question 4 of 60
4. Question
Which MySQL command displays all privileges assigned to a specific user?
Correct
The SHOW GRANTS statement lists all privileges assigned to a user. SHOW PRIVILEGES FOR is not a valid command, and querying mysql.privileges or mysql.user directly is not the recommended method.
Incorrect
The SHOW GRANTS statement lists all privileges assigned to a user. SHOW PRIVILEGES FOR is not a valid command, and querying mysql.privileges or mysql.user directly is not the recommended method.
Unattempted
The SHOW GRANTS statement lists all privileges assigned to a user. SHOW PRIVILEGES FOR is not a valid command, and querying mysql.privileges or mysql.user directly is not the recommended method.
Question 5 of 60
5. Question
Which encryption algorithm is used by default for InnoDB tablespace encryption in MySQL 8.0?
Correct
MySQL 8.0 uses AES-256 as the default encryption algorithm for InnoDB tablespace encryption, providing a high level of security. RC4, 3DES, and Blowfish are either outdated or not supported for this purpose.
Incorrect
MySQL 8.0 uses AES-256 as the default encryption algorithm for InnoDB tablespace encryption, providing a high level of security. RC4, 3DES, and Blowfish are either outdated or not supported for this purpose.
Unattempted
MySQL 8.0 uses AES-256 as the default encryption algorithm for InnoDB tablespace encryption, providing a high level of security. RC4, 3DES, and Blowfish are either outdated or not supported for this purpose.
Question 6 of 60
6. Question
Which method enhances the security of MySQL host backups to prevent unauthorized access during backup operations?
Correct
Encrypting backup files using SSL or other encryption methods ensures that backup data remains secure, even if stored outside of MySQL. Storing backups in an unencrypted format or adjusting timing does not directly secure the backup data.
Incorrect
Encrypting backup files using SSL or other encryption methods ensures that backup data remains secure, even if stored outside of MySQL. Storing backups in an unencrypted format or adjusting timing does not directly secure the backup data.
Unattempted
Encrypting backup files using SSL or other encryption methods ensures that backup data remains secure, even if stored outside of MySQL. Storing backups in an unencrypted format or adjusting timing does not directly secure the backup data.
Question 7 of 60
7. Question
Which replication topology is best suited for both high availability and read scalability?
Correct
A Primary-Replica topology with multiple read replicas is commonly used for scalability and high availability, ensuring that reads are distributed efficiently while keeping a single primary for consistency.
Incorrect
A Primary-Replica topology with multiple read replicas is commonly used for scalability and high availability, ensuring that reads are distributed efficiently while keeping a single primary for consistency.
Unattempted
A Primary-Replica topology with multiple read replicas is commonly used for scalability and high availability, ensuring that reads are distributed efficiently while keeping a single primary for consistency.
Question 8 of 60
8. Question
Which MySQL 8.0 component is responsible for managing tablespace storage and handling transactions?
Correct
The InnoDB Storage Engine Subsystem is responsible for tablespace management, transaction processing, and ACID compliance in MySQL 8.0. It handles data storage through file-per-table or shared tablespaces and manages buffer pools for performance optimization. The Storage Engine Interface acts as a bridge but does not handle storage directly. The Data Dictionary Module stores metadata but not user data.
Incorrect
The InnoDB Storage Engine Subsystem is responsible for tablespace management, transaction processing, and ACID compliance in MySQL 8.0. It handles data storage through file-per-table or shared tablespaces and manages buffer pools for performance optimization. The Storage Engine Interface acts as a bridge but does not handle storage directly. The Data Dictionary Module stores metadata but not user data.
Unattempted
The InnoDB Storage Engine Subsystem is responsible for tablespace management, transaction processing, and ACID compliance in MySQL 8.0. It handles data storage through file-per-table or shared tablespaces and manages buffer pools for performance optimization. The Storage Engine Interface acts as a bridge but does not handle storage directly. The Data Dictionary Module stores metadata but not user data.
Question 9 of 60
9. Question
Which MySQL 8.0 variable controls the amount of redo log space allocated for transactions?
Correct
The innodb_redo_log_capacity variable determines the total redo log space available for transactions before logs are flushed. innodb_log_file_size used to control this in previous versions but is now deprecated. innodb_undo_tablespaces manages rollback segments, and innodb_buffer_pool_size affects caching of data and indexes, not transaction logs.
Incorrect
The innodb_redo_log_capacity variable determines the total redo log space available for transactions before logs are flushed. innodb_log_file_size used to control this in previous versions but is now deprecated. innodb_undo_tablespaces manages rollback segments, and innodb_buffer_pool_size affects caching of data and indexes, not transaction logs.
Unattempted
The innodb_redo_log_capacity variable determines the total redo log space available for transactions before logs are flushed. innodb_log_file_size used to control this in previous versions but is now deprecated. innodb_undo_tablespaces manages rollback segments, and innodb_buffer_pool_size affects caching of data and indexes, not transaction logs.
Question 10 of 60
10. Question
Which approach ensures data consistency in a multi-primary Group Replication setup?
Correct
In multi-primary Group Replication, MySQL uses conflict detection rules to avoid conflicting writes across nodes. Single-threaded replication, commit timeouts, and disabling binlog checksums do not improve consistency in a multi-primary environment.
Incorrect
In multi-primary Group Replication, MySQL uses conflict detection rules to avoid conflicting writes across nodes. Single-threaded replication, commit timeouts, and disabling binlog checksums do not improve consistency in a multi-primary environment.
Unattempted
In multi-primary Group Replication, MySQL uses conflict detection rules to avoid conflicting writes across nodes. Single-threaded replication, commit timeouts, and disabling binlog checksums do not improve consistency in a multi-primary environment.
Question 11 of 60
11. Question
Which approach ensures zero downtime when upgrading MySQL 8.0?
Correct
Using replication-based migration allows traffic to be switched from old to new instances without service interruption. Other methods risk downtime due to transaction mismatches.
Incorrect
Using replication-based migration allows traffic to be switched from old to new instances without service interruption. Other methods risk downtime due to transaction mismatches.
Unattempted
Using replication-based migration allows traffic to be switched from old to new instances without service interruption. Other methods risk downtime due to transaction mismatches.
Question 12 of 60
12. Question
Which mysqlpump option controls the number of parallel threads used for dumping?
Correct
The –parallel-threads-set option specifies how many threads to use in mysqlpump for parallel execution. –default-worker-count is incorrect. –thread-concurrency-opt does not exist, and –jobs-processors-list is unrelated.
Incorrect
The –parallel-threads-set option specifies how many threads to use in mysqlpump for parallel execution. –default-worker-count is incorrect. –thread-concurrency-opt does not exist, and –jobs-processors-list is unrelated.
Unattempted
The –parallel-threads-set option specifies how many threads to use in mysqlpump for parallel execution. –default-worker-count is incorrect. –thread-concurrency-opt does not exist, and –jobs-processors-list is unrelated.
Question 13 of 60
13. Question
Which step is required to configure multisource replication in MySQL 8.0?
Correct
Multisource replication allows a single replica server to receive changes from multiple primary servers. This requires defining separate replication channels, each corresponding to a different source. Unlike traditional replication, relay logs are not unique per source, semi-synchronous replication is optional, and GTIDs are managed globally, not per thread.
Incorrect
Multisource replication allows a single replica server to receive changes from multiple primary servers. This requires defining separate replication channels, each corresponding to a different source. Unlike traditional replication, relay logs are not unique per source, semi-synchronous replication is optional, and GTIDs are managed globally, not per thread.
Unattempted
Multisource replication allows a single replica server to receive changes from multiple primary servers. This requires defining separate replication channels, each corresponding to a different source. Unlike traditional replication, relay logs are not unique per source, semi-synchronous replication is optional, and GTIDs are managed globally, not per thread.
Question 14 of 60
14. Question
Which step is critical to prevent backup corruption in MySQL replication setups?
Correct
In MySQL replication, using FLUSH TABLES WITH READ LOCK ensures consistent backups by preventing writes. Stopping binary logging disrupts replication consistency. Flushing table statistics does not ensure data integrity, and Restarting buffer pool affects memory, not backups.
Incorrect
In MySQL replication, using FLUSH TABLES WITH READ LOCK ensures consistent backups by preventing writes. Stopping binary logging disrupts replication consistency. Flushing table statistics does not ensure data integrity, and Restarting buffer pool affects memory, not backups.
Unattempted
In MySQL replication, using FLUSH TABLES WITH READ LOCK ensures consistent backups by preventing writes. Stopping binary logging disrupts replication consistency. Flushing table statistics does not ensure data integrity, and Restarting buffer pool affects memory, not backups.
Question 15 of 60
15. Question
Which command verifies MySQL Enterprise Firewall rules for a specific user?
Correct
To check recorded firewall rules for a user, administrators can query mysql.firewall_whitelist. The other options are not valid MySQL commands.
Incorrect
To check recorded firewall rules for a user, administrators can query mysql.firewall_whitelist. The other options are not valid MySQL commands.
Unattempted
To check recorded firewall rules for a user, administrators can query mysql.firewall_whitelist. The other options are not valid MySQL commands.
Question 16 of 60
16. Question
Which MySQL network setting poses the biggest security threat if not properly configured?
Correct
Setting bind_address=‘0.0.0.0‘ makes MySQL accessible from all IP addresses, increasing the risk of unauthorized access. max_connections affects performance but is not a security issue. thread_cache_size and net_read_timeout manage connection efficiency but do not introduce security vulnerabilities.
Incorrect
Setting bind_address=‘0.0.0.0‘ makes MySQL accessible from all IP addresses, increasing the risk of unauthorized access. max_connections affects performance but is not a security issue. thread_cache_size and net_read_timeout manage connection efficiency but do not introduce security vulnerabilities.
Unattempted
Setting bind_address=‘0.0.0.0‘ makes MySQL accessible from all IP addresses, increasing the risk of unauthorized access. max_connections affects performance but is not a security issue. thread_cache_size and net_read_timeout manage connection efficiency but do not introduce security vulnerabilities.
Question 17 of 60
17. Question
Which MySQL setting should be enabled for automatic cluster recovery?
Correct
Enabling group_replication_start_on_boot ensures that nodes automatically restart replication after failure recovery. The other settings do not enable automatic recovery.
Incorrect
Enabling group_replication_start_on_boot ensures that nodes automatically restart replication after failure recovery. The other settings do not enable automatic recovery.
Unattempted
Enabling group_replication_start_on_boot ensures that nodes automatically restart replication after failure recovery. The other settings do not enable automatic recovery.
Question 18 of 60
18. Question
What is the purpose of the dba.configureInstance() command?
Correct
The dba.configureInstance() command configures an instance to meet the requirements for joining an InnoDB Cluster. It does not check consistency, modify election rules, or synchronize binary logs.
Incorrect
The dba.configureInstance() command configures an instance to meet the requirements for joining an InnoDB Cluster. It does not check consistency, modify election rules, or synchronize binary logs.
Unattempted
The dba.configureInstance() command configures an instance to meet the requirements for joining an InnoDB Cluster. It does not check consistency, modify election rules, or synchronize binary logs.
Question 19 of 60
19. Question
Which log file contains startup errors when MySQL fails to launch?
Correct
MySQL logs startup failures in /var/log/mysql/mysql-error.log, helping administrators troubleshoot errors. The other options do not represent valid MySQL error log files.
Incorrect
MySQL logs startup failures in /var/log/mysql/mysql-error.log, helping administrators troubleshoot errors. The other options do not represent valid MySQL error log files.
Unattempted
MySQL logs startup failures in /var/log/mysql/mysql-error.log, helping administrators troubleshoot errors. The other options do not represent valid MySQL error log files.
Question 20 of 60
20. Question
Which TLS version is most secure for MySQL server connections?
Correct
TLSv1.3 is the latest and most secure version, offering faster handshakes and stronger encryption than TLSv1.2. TLSv1.1 and TLSv1.0 are considered obsolete and insecure.
Incorrect
TLSv1.3 is the latest and most secure version, offering faster handshakes and stronger encryption than TLSv1.2. TLSv1.1 and TLSv1.0 are considered obsolete and insecure.
Unattempted
TLSv1.3 is the latest and most secure version, offering faster handshakes and stronger encryption than TLSv1.2. TLSv1.1 and TLSv1.0 are considered obsolete and insecure.
Question 21 of 60
21. Question
Which statement is true about covering indexes in MySQL 8.0?
Correct
A covering index contains all columns needed for a query, allowing MySQL to avoid reading the actual table (known as Index-Only Scan). This greatly improves performance by reducing I/O operations. They do not replace foreign keys, nor do they store only pointers. While they can sometimes improve JOINs, that is not their primary benefit.
Incorrect
A covering index contains all columns needed for a query, allowing MySQL to avoid reading the actual table (known as Index-Only Scan). This greatly improves performance by reducing I/O operations. They do not replace foreign keys, nor do they store only pointers. While they can sometimes improve JOINs, that is not their primary benefit.
Unattempted
A covering index contains all columns needed for a query, allowing MySQL to avoid reading the actual table (known as Index-Only Scan). This greatly improves performance by reducing I/O operations. They do not replace foreign keys, nor do they store only pointers. While they can sometimes improve JOINs, that is not their primary benefit.
Question 22 of 60
22. Question
Which MySQL command provides detailed replication status, including I/O and SQL thread states?
Correct
In MySQL 8.0, SHOW REPLICA STATUS replaces SHOW SLAVE STATUS to provide detailed replication diagnostics, including thread states, lag, and errors. The master status command only shows binary log details, while the processlist command displays all active threads, not just replication-related ones.
Incorrect
In MySQL 8.0, SHOW REPLICA STATUS replaces SHOW SLAVE STATUS to provide detailed replication diagnostics, including thread states, lag, and errors. The master status command only shows binary log details, while the processlist command displays all active threads, not just replication-related ones.
Unattempted
In MySQL 8.0, SHOW REPLICA STATUS replaces SHOW SLAVE STATUS to provide detailed replication diagnostics, including thread states, lag, and errors. The master status command only shows binary log details, while the processlist command displays all active threads, not just replication-related ones.
Question 23 of 60
23. Question
Which MySQL component is responsible for handling conflicts in Group Replication?
Correct
In Group Replication, the Group Communication System (GCS) detects conflicts and applies transaction rules. There is no Global Transaction Handler, and InnoDB does not resolve conflicts independently. The Primary Election Process determines leadership, not conflicts.
Incorrect
In Group Replication, the Group Communication System (GCS) detects conflicts and applies transaction rules. There is no Global Transaction Handler, and InnoDB does not resolve conflicts independently. The Primary Election Process determines leadership, not conflicts.
Unattempted
In Group Replication, the Group Communication System (GCS) detects conflicts and applies transaction rules. There is no Global Transaction Handler, and InnoDB does not resolve conflicts independently. The Primary Election Process determines leadership, not conflicts.
Question 24 of 60
24. Question
Which MySQL setting helps prevent unauthorized access to the serverÂ’s data directory?
Correct
The secure_file_priv setting restricts the directories that MySQL can use for importing and exporting files, helping to prevent unauthorized access to sensitive data directories. The other options do not exist in MySQL 8.0.
Incorrect
The secure_file_priv setting restricts the directories that MySQL can use for importing and exporting files, helping to prevent unauthorized access to sensitive data directories. The other options do not exist in MySQL 8.0.
Unattempted
The secure_file_priv setting restricts the directories that MySQL can use for importing and exporting files, helping to prevent unauthorized access to sensitive data directories. The other options do not exist in MySQL 8.0.
Question 25 of 60
25. Question
What is the benefit of MySQL‘s query cache in terms of query optimization?
Correct
The query cache stores results of SELECT queries, so identical queries can retrieve data faster without re-executing them. It does not store query plans or reduce locks.
Incorrect
The query cache stores results of SELECT queries, so identical queries can retrieve data faster without re-executing them. It does not store query plans or reduce locks.
Unattempted
The query cache stores results of SELECT queries, so identical queries can retrieve data faster without re-executing them. It does not store query plans or reduce locks.
Question 26 of 60
26. Question
Which log file contains records of all SQL queries that modify the database?
Correct
The MySQL binary log (mysql-bin-logs.log) records all SQL statements that modify the database for replication and recovery. The other options refer to unrelated or non-existent log files.
Incorrect
The MySQL binary log (mysql-bin-logs.log) records all SQL statements that modify the database for replication and recovery. The other options refer to unrelated or non-existent log files.
Unattempted
The MySQL binary log (mysql-bin-logs.log) records all SQL statements that modify the database for replication and recovery. The other options refer to unrelated or non-existent log files.
Question 27 of 60
27. Question
Which file is used to store MySQLÂ’s server PID (Process ID) on Linux?
Correct
The MySQL server process ID (PID) is stored in /var/run/mysql/mysql.pidfile, allowing system tools to manage the server process. The other options do not refer to valid MySQL PID storage locations.
Incorrect
The MySQL server process ID (PID) is stored in /var/run/mysql/mysql.pidfile, allowing system tools to manage the server process. The other options do not refer to valid MySQL PID storage locations.
Unattempted
The MySQL server process ID (PID) is stored in /var/run/mysql/mysql.pidfile, allowing system tools to manage the server process. The other options do not refer to valid MySQL PID storage locations.
Question 28 of 60
28. Question
Which tablespace storage method allows InnoDB to reclaim unused space efficiently?
Correct
The File-Per-Table Mode enables MySQL to reclaim space efficiently by allowing table truncation or dropping to shrink .ibd files. The Shared Tablespace does not reclaim space well, Temporary Tables store non-persistent data, and Page Compression reduces disk usage but does not reclaim space.
Incorrect
The File-Per-Table Mode enables MySQL to reclaim space efficiently by allowing table truncation or dropping to shrink .ibd files. The Shared Tablespace does not reclaim space well, Temporary Tables store non-persistent data, and Page Compression reduces disk usage but does not reclaim space.
Unattempted
The File-Per-Table Mode enables MySQL to reclaim space efficiently by allowing table truncation or dropping to shrink .ibd files. The Shared Tablespace does not reclaim space well, Temporary Tables store non-persistent data, and Page Compression reduces disk usage but does not reclaim space.
Question 29 of 60
29. Question
Which MySQL performance schema table stores information about index usage statistics?
Correct
The events_statements_summary table in performance_schema tracks statement execution metrics, including index usage. table_io_waits_summary records I/O wait times, but not index details. table_lock_waits_summary focuses on lock waits, while table_statistics_summary does not specifically track index usage.
Incorrect
The events_statements_summary table in performance_schema tracks statement execution metrics, including index usage. table_io_waits_summary records I/O wait times, but not index details. table_lock_waits_summary focuses on lock waits, while table_statistics_summary does not specifically track index usage.
Unattempted
The events_statements_summary table in performance_schema tracks statement execution metrics, including index usage. table_io_waits_summary records I/O wait times, but not index details. table_lock_waits_summary focuses on lock waits, while table_statistics_summary does not specifically track index usage.
Question 30 of 60
30. Question
Which command is best suited for safely backing up binary logs in MySQL 8.0?
Correct
The mysqlbinlog utility can back up binary logs remotely by streaming data. mysqldump does not handle binary logs. mysqlpump does not support binary log backups, and cp does not ensure log consistency.
Incorrect
The mysqlbinlog utility can back up binary logs remotely by streaming data. mysqldump does not handle binary logs. mysqlpump does not support binary log backups, and cp does not ensure log consistency.
Unattempted
The mysqlbinlog utility can back up binary logs remotely by streaming data. mysqldump does not handle binary logs. mysqlpump does not support binary log backups, and cp does not ensure log consistency.
Question 31 of 60
31. Question
What system-level security feature in MySQL prevents unauthorized users from accessing the operating systemÂ’s files and directories?
Correct
A Chroot Jail can be used to isolate MySQL from the broader operating system, ensuring that MySQL can only access the files and directories designated within the jail. Both AppArmor and SELinux provide additional security but are not as directly focused on this specific environment isolation.
Incorrect
A Chroot Jail can be used to isolate MySQL from the broader operating system, ensuring that MySQL can only access the files and directories designated within the jail. Both AppArmor and SELinux provide additional security but are not as directly focused on this specific environment isolation.
Unattempted
A Chroot Jail can be used to isolate MySQL from the broader operating system, ensuring that MySQL can only access the files and directories designated within the jail. Both AppArmor and SELinux provide additional security but are not as directly focused on this specific environment isolation.
Question 32 of 60
32. Question
Which of the following best describes how MySQL replication handles relay logs?
Correct
In MySQL replication, the I/O thread retrieves binary logs from the primary server and stores them as relay logs on the replica. The SQL thread then reads the relay logs and applies transactions. The Coordinator and Worker threads do not handle relay logs directly.
Incorrect
In MySQL replication, the I/O thread retrieves binary logs from the primary server and stores them as relay logs on the replica. The SQL thread then reads the relay logs and applies transactions. The Coordinator and Worker threads do not handle relay logs directly.
Unattempted
In MySQL replication, the I/O thread retrieves binary logs from the primary server and stores them as relay logs on the replica. The SQL thread then reads the relay logs and applies transactions. The Coordinator and Worker threads do not handle relay logs directly.
Question 33 of 60
33. Question
Which MySQL table stores the SQL statements recorded by MySQL Enterprise Firewall?
Correct
The mysql.firewall_whitelist table contains allowed SQL statements for users configured in MySQL Enterprise Firewall. The other tables do not exist in the MySQL security system.
Incorrect
The mysql.firewall_whitelist table contains allowed SQL statements for users configured in MySQL Enterprise Firewall. The other tables do not exist in the MySQL security system.
Unattempted
The mysql.firewall_whitelist table contains allowed SQL statements for users configured in MySQL Enterprise Firewall. The other tables do not exist in the MySQL security system.
Question 34 of 60
34. Question
Which lock type is most likely to cause contention in InnoDB transactions?
Correct
An Exclusive Lock in InnoDB prevents other transactions from reading or modifying the locked row, making it the primary cause of contention. Shared Locks do not block reads, Metadata Locks impact schema changes, and Gap Locks occur in specific transaction isolation levels.
Incorrect
An Exclusive Lock in InnoDB prevents other transactions from reading or modifying the locked row, making it the primary cause of contention. Shared Locks do not block reads, Metadata Locks impact schema changes, and Gap Locks occur in specific transaction isolation levels.
Unattempted
An Exclusive Lock in InnoDB prevents other transactions from reading or modifying the locked row, making it the primary cause of contention. Shared Locks do not block reads, Metadata Locks impact schema changes, and Gap Locks occur in specific transaction isolation levels.
Question 35 of 60
35. Question
Which status variable tracks the number of currently open client connections?
Correct
The Threads_connected status variable reflects the number of currently active client connections. The other variables do not exist or provide unrelated metrics.
Incorrect
The Threads_connected status variable reflects the number of currently active client connections. The other variables do not exist or provide unrelated metrics.
Unattempted
The Threads_connected status variable reflects the number of currently active client connections. The other variables do not exist or provide unrelated metrics.
Question 36 of 60
36. Question
Which method allows MySQL Router to automatically handle failover?
Correct
MySQL Router dynamically fetches cluster metadata to automatically route traffic. Manually modifying routing tables, static node assignments, or restarting connections are not required for failover.
Incorrect
MySQL Router dynamically fetches cluster metadata to automatically route traffic. Manually modifying routing tables, static node assignments, or restarting connections are not required for failover.
Unattempted
MySQL Router dynamically fetches cluster metadata to automatically route traffic. Manually modifying routing tables, static node assignments, or restarting connections are not required for failover.
Question 37 of 60
37. Question
Which MySQL command prevents a user from connecting without SSL?
Correct
The ALTER USER ‘user‘@‘host‘ REQUIRE SSL command forces the user to use an SSL connection. The other options are either incorrect syntax or unsupported by MySQL 8.0.
Incorrect
The ALTER USER ‘user‘@‘host‘ REQUIRE SSL command forces the user to use an SSL connection. The other options are either incorrect syntax or unsupported by MySQL 8.0.
Unattempted
The ALTER USER ‘user‘@‘host‘ REQUIRE SSL command forces the user to use an SSL connection. The other options are either incorrect syntax or unsupported by MySQL 8.0.
Question 38 of 60
38. Question
Which MySQL function helps prevent SQL injection attacks by escaping potentially dangerous characters in user input?
Correct
The REAL_ESCAPE_STRING() function in MySQL escapes special characters, making input safe by preventing SQL injection attacks. Other functions like QUOTE() donÂ’t provide the same level of protection.
Incorrect
The REAL_ESCAPE_STRING() function in MySQL escapes special characters, making input safe by preventing SQL injection attacks. Other functions like QUOTE() donÂ’t provide the same level of protection.
Unattempted
The REAL_ESCAPE_STRING() function in MySQL escapes special characters, making input safe by preventing SQL injection attacks. Other functions like QUOTE() donÂ’t provide the same level of protection.
Question 39 of 60
39. Question
What is the recommended strategy for conflict resolution in multisource replication?
Correct
MySQL does not provide automatic conflict resolution in multisource replication. The best approach is to design applications to avoid conflicting writes across multiple sources. Delayed replication, row-based formats, and external tools may help, but they do not prevent conflicts at the source level.
Incorrect
MySQL does not provide automatic conflict resolution in multisource replication. The best approach is to design applications to avoid conflicting writes across multiple sources. Delayed replication, row-based formats, and external tools may help, but they do not prevent conflicts at the source level.
Unattempted
MySQL does not provide automatic conflict resolution in multisource replication. The best approach is to design applications to avoid conflicting writes across multiple sources. Delayed replication, row-based formats, and external tools may help, but they do not prevent conflicts at the source level.
Question 40 of 60
40. Question
Which MySQL Shell command performs automatic InnoDB Cluster recovery?
Correct
The dba.rebootClusterFromCompleteOutage() command automatically recovers the cluster when all nodes fail. Other options, such as resetting metadata, validating instances, or resetting topology, do not perform full recovery.
Incorrect
The dba.rebootClusterFromCompleteOutage() command automatically recovers the cluster when all nodes fail. Other options, such as resetting metadata, validating instances, or resetting topology, do not perform full recovery.
Unattempted
The dba.rebootClusterFromCompleteOutage() command automatically recovers the cluster when all nodes fail. Other options, such as resetting metadata, validating instances, or resetting topology, do not perform full recovery.
Question 41 of 60
41. Question
Which MySQL configuration parameter impacts database storage expansion the most?
Correct
The innodb_file_per_table setting determines whether each InnoDB table has its own tablespace or shares a global tablespace, directly affecting storage expansion strategies. Other parameters do not impact database size growth.
Incorrect
The innodb_file_per_table setting determines whether each InnoDB table has its own tablespace or shares a global tablespace, directly affecting storage expansion strategies. Other parameters do not impact database size growth.
Unattempted
The innodb_file_per_table setting determines whether each InnoDB table has its own tablespace or shares a global tablespace, directly affecting storage expansion strategies. Other parameters do not impact database size growth.
Question 42 of 60
42. Question
Which MySQL database access control practice introduces a major security risk?
Correct
Assigning privileges to the PUBLIC role means all users can access those privileges, creating a major security risk. Using roles helps manage permissions effectively, restricting access to system tables enhances security, and table-level privileges limit unnecessary access.
Incorrect
Assigning privileges to the PUBLIC role means all users can access those privileges, creating a major security risk. Using roles helps manage permissions effectively, restricting access to system tables enhances security, and table-level privileges limit unnecessary access.
Unattempted
Assigning privileges to the PUBLIC role means all users can access those privileges, creating a major security risk. Using roles helps manage permissions effectively, restricting access to system tables enhances security, and table-level privileges limit unnecessary access.
Question 43 of 60
43. Question
Which MySQL log file is most useful for troubleshooting authentication failures?
Correct
The error log records failed authentication attempts, plugin errors, and permission issues, making it essential for security auditing. The other logs do not focus on authentication failures.
Incorrect
The error log records failed authentication attempts, plugin errors, and permission issues, making it essential for security auditing. The other logs do not focus on authentication failures.
Unattempted
The error log records failed authentication attempts, plugin errors, and permission issues, making it essential for security auditing. The other logs do not focus on authentication failures.
Question 44 of 60
44. Question
Which component in MySQL 8.0 stores metadata about schemas, tables, and indexes?
Correct
The MySQL Data Dictionary System stores schema, table, column, and index metadata, replacing .frm, .TRG, and .TRN files. The other options do not exist or refer to different concepts.
Incorrect
The MySQL Data Dictionary System stores schema, table, column, and index metadata, replacing .frm, .TRG, and .TRN files. The other options do not exist or refer to different concepts.
Unattempted
The MySQL Data Dictionary System stores schema, table, column, and index metadata, replacing .frm, .TRG, and .TRN files. The other options do not exist or refer to different concepts.
Question 45 of 60
45. Question
Which MySQL configuration file is commonly used for server settings on Linux?
Correct
The /etc/mysql/my.cnf-defaults file is typically used to configure MySQL settings on Linux. The other options are incorrect file paths or non-existent configurations.
Incorrect
The /etc/mysql/my.cnf-defaults file is typically used to configure MySQL settings on Linux. The other options are incorrect file paths or non-existent configurations.
Unattempted
The /etc/mysql/my.cnf-defaults file is typically used to configure MySQL settings on Linux. The other options are incorrect file paths or non-existent configurations.
Question 46 of 60
46. Question
Which MySQL 8.0 cache stores compiled SQL statements to improve query execution speed?
Correct
The MySQL Prepared Statement Cache stores compiled SQL statements, reducing parsing overhead for repeated queries. The other options do not exist in MySQL or serve different purposes.
Incorrect
The MySQL Prepared Statement Cache stores compiled SQL statements, reducing parsing overhead for repeated queries. The other options do not exist in MySQL or serve different purposes.
Unattempted
The MySQL Prepared Statement Cache stores compiled SQL statements, reducing parsing overhead for repeated queries. The other options do not exist in MySQL or serve different purposes.
Question 47 of 60
47. Question
Which of the following commands enables encryption for an InnoDB table in MySQL 8.0?
Correct
To enable encryption for an InnoDB table in MySQL 8.0, you use ALTER TABLE ENCRYPTION=‘Y‘;. This ensures the tablespace is encrypted using a key from the configured keyring plugin. The SET GLOBAL innodb_encrypt=ON; command does not exist. ENABLE ENCRYPTION ON TABLE is not a valid SQL statement. Directly modifying system tables (mysql.tables) is not supported for enabling encryption.
Incorrect
To enable encryption for an InnoDB table in MySQL 8.0, you use ALTER TABLE ENCRYPTION=‘Y‘;. This ensures the tablespace is encrypted using a key from the configured keyring plugin. The SET GLOBAL innodb_encrypt=ON; command does not exist. ENABLE ENCRYPTION ON TABLE is not a valid SQL statement. Directly modifying system tables (mysql.tables) is not supported for enabling encryption.
Unattempted
To enable encryption for an InnoDB table in MySQL 8.0, you use ALTER TABLE ENCRYPTION=‘Y‘;. This ensures the tablespace is encrypted using a key from the configured keyring plugin. The SET GLOBAL innodb_encrypt=ON; command does not exist. ENABLE ENCRYPTION ON TABLE is not a valid SQL statement. Directly modifying system tables (mysql.tables) is not supported for enabling encryption.
Question 48 of 60
48. Question
Which option file should be used to specify client connection settings for MySQL client programs?
Correct
Client settings are defined within the [client] section of the my.cnf file, which ensures correct client behavior across various MySQL programs. Other files or sections are not used for client-specific configurations.
Incorrect
Client settings are defined within the [client] section of the my.cnf file, which ensures correct client behavior across various MySQL programs. Other files or sections are not used for client-specific configurations.
Unattempted
Client settings are defined within the [client] section of the my.cnf file, which ensures correct client behavior across various MySQL programs. Other files or sections are not used for client-specific configurations.
Question 49 of 60
49. Question
Which metric does MySQL Enterprise Monitor use to prioritize query optimization efforts?
Correct
MySQL Enterprise Monitor prioritizes query optimization by focusing on execution time, since slow queries have the greatest impact on performance. Other metrics like lock wait times and temporary tables are useful but secondary.
Incorrect
MySQL Enterprise Monitor prioritizes query optimization by focusing on execution time, since slow queries have the greatest impact on performance. Other metrics like lock wait times and temporary tables are useful but secondary.
Unattempted
MySQL Enterprise Monitor prioritizes query optimization by focusing on execution time, since slow queries have the greatest impact on performance. Other metrics like lock wait times and temporary tables are useful but secondary.
Question 50 of 60
50. Question
Which command is used to take a full backup with MySQL Enterprise Backup?
Correct
The mysqlbackup –backup command is used in MySQL Enterprise Backup to perform a full database backup. mysqldump –all-databases performs a logical dump. mysqlpump –include-schema is another logical export tool, and mysqlbinlog –save-logs is used for binary log backups.
Incorrect
The mysqlbackup –backup command is used in MySQL Enterprise Backup to perform a full database backup. mysqldump –all-databases performs a logical dump. mysqlpump –include-schema is another logical export tool, and mysqlbinlog –save-logs is used for binary log backups.
Unattempted
The mysqlbackup –backup command is used in MySQL Enterprise Backup to perform a full database backup. mysqldump –all-databases performs a logical dump. mysqlpump –include-schema is another logical export tool, and mysqlbinlog –save-logs is used for binary log backups.
Question 51 of 60
51. Question
What is the primary purpose of the InnoDB redo log?
Correct
The InnoDB redo log plays a crucial role in MySQL‘s crash recovery mechanism. Before changes are written to the tablespace files, they are recorded in the redo log to ensure durability and consistency. In the event of a system failure, MySQL can use the redo log to recover committed transactions that were not yet flushed to disk. Unlike the binary log, which is used for replication, the redo log is internal to InnoDB and is essential for ACID compliance.
Incorrect
The InnoDB redo log plays a crucial role in MySQL‘s crash recovery mechanism. Before changes are written to the tablespace files, they are recorded in the redo log to ensure durability and consistency. In the event of a system failure, MySQL can use the redo log to recover committed transactions that were not yet flushed to disk. Unlike the binary log, which is used for replication, the redo log is internal to InnoDB and is essential for ACID compliance.
Unattempted
The InnoDB redo log plays a crucial role in MySQL‘s crash recovery mechanism. Before changes are written to the tablespace files, they are recorded in the redo log to ensure durability and consistency. In the event of a system failure, MySQL can use the redo log to recover committed transactions that were not yet flushed to disk. Unlike the binary log, which is used for replication, the redo log is internal to InnoDB and is essential for ACID compliance.
Question 52 of 60
52. Question
Which MySQL setting ensures that a password must be changed after the first login?
Correct
The FORCE PASSWORD CHANGE option forces users to change their password upon first login. The other options are incorrect or do not exist in MySQL 8.0.
Incorrect
The FORCE PASSWORD CHANGE option forces users to change their password upon first login. The other options are incorrect or do not exist in MySQL 8.0.
Unattempted
The FORCE PASSWORD CHANGE option forces users to change their password upon first login. The other options are incorrect or do not exist in MySQL 8.0.
Question 53 of 60
53. Question
Which command checks the state of an InnoDB Cluster after recovery?
Correct
The dba.getCluster().status() function provides a detailed status of an InnoDB Cluster. Checking group_replication status, metadata tables, or binary logs does not provide full recovery information.
Incorrect
The dba.getCluster().status() function provides a detailed status of an InnoDB Cluster. Checking group_replication status, metadata tables, or binary logs does not provide full recovery information.
Unattempted
The dba.getCluster().status() function provides a detailed status of an InnoDB Cluster. Checking group_replication status, metadata tables, or binary logs does not provide full recovery information.
Question 54 of 60
54. Question
Which option in mysqldump ensures that data consistency when dumping InnoDB tables?
Correct
The –single-transaction option allows mysqldump to take a consistent snapshot of InnoDB tables without locking them. –disable-keys-option speeds up index rebuilding but does not ensure consistency. –lock-tables-command locks tables but blocks writes. –quick-buffer-enable does not exist.
Incorrect
The –single-transaction option allows mysqldump to take a consistent snapshot of InnoDB tables without locking them. –disable-keys-option speeds up index rebuilding but does not ensure consistency. –lock-tables-command locks tables but blocks writes. –quick-buffer-enable does not exist.
Unattempted
The –single-transaction option allows mysqldump to take a consistent snapshot of InnoDB tables without locking them. –disable-keys-option speeds up index rebuilding but does not ensure consistency. –lock-tables-command locks tables but blocks writes. –quick-buffer-enable does not exist.
Question 55 of 60
55. Question
Which MySQL feature can be used to optimize a query involving multiple ORDER BY clauses?
Correct
Using indexes on columns involved in ORDER BY can significantly reduce sorting overhead. Index_merge, GROUP BY, or forcing early execution do not provide similar optimizations in this case.
Incorrect
Using indexes on columns involved in ORDER BY can significantly reduce sorting overhead. Index_merge, GROUP BY, or forcing early execution do not provide similar optimizations in this case.
Unattempted
Using indexes on columns involved in ORDER BY can significantly reduce sorting overhead. Index_merge, GROUP BY, or forcing early execution do not provide similar optimizations in this case.
Question 56 of 60
56. Question
Which MySQL 8.0 feature helps prevent replication lag in high-latency networks?
Correct
Multi-threaded replication (MTR) enables parallel execution of transactions on replicas, reducing replication lag, especially on workloads with independent transactions. Group Replication provides high availability but does not address lag directly. Heartbeat events help monitor but do not prevent lag. Read scaling distributes queries but does not impact the replication process.
Incorrect
Multi-threaded replication (MTR) enables parallel execution of transactions on replicas, reducing replication lag, especially on workloads with independent transactions. Group Replication provides high availability but does not address lag directly. Heartbeat events help monitor but do not prevent lag. Read scaling distributes queries but does not impact the replication process.
Unattempted
Multi-threaded replication (MTR) enables parallel execution of transactions on replicas, reducing replication lag, especially on workloads with independent transactions. Group Replication provides high availability but does not address lag directly. Heartbeat events help monitor but do not prevent lag. Read scaling distributes queries but does not impact the replication process.
Question 57 of 60
57. Question
What must be configured in the option file for MySQL to use multi-threaded replication?
Correct
The slave_parallel_workers option configures multi-threaded replication in MySQL. This setting must be placed in the [mysqld] section to ensure proper execution. Other options, like master_replication, are incorrect.
Incorrect
The slave_parallel_workers option configures multi-threaded replication in MySQL. This setting must be placed in the [mysqld] section to ensure proper execution. Other options, like master_replication, are incorrect.
Unattempted
The slave_parallel_workers option configures multi-threaded replication in MySQL. This setting must be placed in the [mysqld] section to ensure proper execution. Other options, like master_replication, are incorrect.
Question 58 of 60
58. Question
Which performance schema table captures MySQL query execution time and resource usage?
Correct
The performance_schema.events_statements_history table records SQL statements, execution time, and resource consumption. Other tables focus on threads, memory, or connection tracking.
Incorrect
The performance_schema.events_statements_history table records SQL statements, execution time, and resource consumption. Other tables focus on threads, memory, or connection tracking.
Unattempted
The performance_schema.events_statements_history table records SQL statements, execution time, and resource consumption. Other tables focus on threads, memory, or connection tracking.
Question 59 of 60
59. Question
Which Enterprise Monitor component generates alerts based on predefined rules?
Correct
The Alerting System in MySQL Enterprise Monitor detects server anomalies, slow queries, high CPU usage, and replication issues, triggering alerts for administrators. Other components do not generate real-time alerts.
Incorrect
The Alerting System in MySQL Enterprise Monitor detects server anomalies, slow queries, high CPU usage, and replication issues, triggering alerts for administrators. Other components do not generate real-time alerts.
Unattempted
The Alerting System in MySQL Enterprise Monitor detects server anomalies, slow queries, high CPU usage, and replication issues, triggering alerts for administrators. Other components do not generate real-time alerts.
Question 60 of 60
60. Question
Which MySQL parameter forces a replica to start replication from a specific GTID?
Correct
To resume replication from a GTID position, MySQL uses GTID auto-positioning, configured via CHANGE REPLICATION SOURCE TO … SOURCE_AUTO_POSITION = 1. The RESET MASTER and RESET REPLICA ALL commands clear logs but do not position replication, and GTID enforcement ensures consistent logging, not GTID-based resumption.
Incorrect
To resume replication from a GTID position, MySQL uses GTID auto-positioning, configured via CHANGE REPLICATION SOURCE TO … SOURCE_AUTO_POSITION = 1. The RESET MASTER and RESET REPLICA ALL commands clear logs but do not position replication, and GTID enforcement ensures consistent logging, not GTID-based resumption.
Unattempted
To resume replication from a GTID position, MySQL uses GTID auto-positioning, configured via CHANGE REPLICATION SOURCE TO … SOURCE_AUTO_POSITION = 1. The RESET MASTER and RESET REPLICA ALL commands clear logs but do not position replication, and GTID enforcement ensures consistent logging, not GTID-based resumption.
X
Use Page numbers below to navigate to other practice tests