You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" MySQL 8.0 Database Administrator Practice Test 4 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
MySQL 8.0 Database Administrator
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Which MySQL feature helps audit and monitor host environment security by tracking all MySQL queries and user activities?
Correct
The MySQL Enterprise Audit Plugin helps audit and monitor all activities within MySQL, tracking queries, logins, and user actions for enhanced security. The other options help with performance but are not security-focused.
Incorrect
The MySQL Enterprise Audit Plugin helps audit and monitor all activities within MySQL, tracking queries, logins, and user actions for enhanced security. The other options help with performance but are not security-focused.
Unattempted
The MySQL Enterprise Audit Plugin helps audit and monitor all activities within MySQL, tracking queries, logins, and user actions for enhanced security. The other options help with performance but are not security-focused.
Question 2 of 60
2. Question
Which security risk can occur if a MySQL user account has an empty password?
Correct
A MySQL account with an empty password allows anyone to connect without authentication, leading to unauthorized database access. The other options are unrelated to password security.
Incorrect
A MySQL account with an empty password allows anyone to connect without authentication, leading to unauthorized database access. The other options are unrelated to password security.
Unattempted
A MySQL account with an empty password allows anyone to connect without authentication, leading to unauthorized database access. The other options are unrelated to password security.
Question 3 of 60
3. Question
Which binary log backup strategy ensures the lowest risk of data inconsistency?
Correct
sync_binlog=1 ensures that every transaction is written to disk immediately, preventing log corruption. binlog_checksum detects errors. Disabling binary logging removes recovery options, and MEMORY storage does not persist logs.
Incorrect
sync_binlog=1 ensures that every transaction is written to disk immediately, preventing log corruption. binlog_checksum detects errors. Disabling binary logging removes recovery options, and MEMORY storage does not persist logs.
Unattempted
sync_binlog=1 ensures that every transaction is written to disk immediately, preventing log corruption. binlog_checksum detects errors. Disabling binary logging removes recovery options, and MEMORY storage does not persist logs.
Question 4 of 60
4. Question
Which MySQL storage optimization technique is best for reducing disk usage in a large database?
Correct
Table Compression in MySQL reduces disk storage usage by storing data in a more compact format, making it ideal for large databases. Other techniques focus on performance rather than storage.
Incorrect
Table Compression in MySQL reduces disk storage usage by storing data in a more compact format, making it ideal for large databases. Other techniques focus on performance rather than storage.
Unattempted
Table Compression in MySQL reduces disk storage usage by storing data in a more compact format, making it ideal for large databases. Other techniques focus on performance rather than storage.
Question 5 of 60
5. Question
Which MySQL 8.0 system variable enables binary log encryption?
Correct
The binlog_encryption=ON system variable enables binary log encryption in MySQL 8.0. This ensures that binary logs, relay logs, and other log files are encrypted before being written to disk. The other options are not valid MySQL system variables for enabling binary log encryption.
Incorrect
The binlog_encryption=ON system variable enables binary log encryption in MySQL 8.0. This ensures that binary logs, relay logs, and other log files are encrypted before being written to disk. The other options are not valid MySQL system variables for enabling binary log encryption.
Unattempted
The binlog_encryption=ON system variable enables binary log encryption in MySQL 8.0. This ensures that binary logs, relay logs, and other log files are encrypted before being written to disk. The other options are not valid MySQL system variables for enabling binary log encryption.
Question 6 of 60
6. Question
Which MySQL Enterprise Monitor alert is most useful for detecting query plan regressions?
Correct
The Execution Plan Drift Alert notifies users when MySQL‘s query optimizer changes execution plans, which can cause unexpected performance regressions. Index usage and buffer pool metrics do not directly detect this issue.
Incorrect
The Execution Plan Drift Alert notifies users when MySQL‘s query optimizer changes execution plans, which can cause unexpected performance regressions. Index usage and buffer pool metrics do not directly detect this issue.
Unattempted
The Execution Plan Drift Alert notifies users when MySQL‘s query optimizer changes execution plans, which can cause unexpected performance regressions. Index usage and buffer pool metrics do not directly detect this issue.
Question 7 of 60
7. Question
Which MySQL Enterprise Monitor feature helps detect long-running queries affecting database performance?
Correct
The Query Analyzer in MySQL Enterprise Monitor provides a detailed breakdown of query execution times, helping detect long-running and inefficient queries. The Performance Schema and Slow Query Log offer insights but are not part of Enterprise MonitorÂ’s query analysis tools.
Incorrect
The Query Analyzer in MySQL Enterprise Monitor provides a detailed breakdown of query execution times, helping detect long-running and inefficient queries. The Performance Schema and Slow Query Log offer insights but are not part of Enterprise MonitorÂ’s query analysis tools.
Unattempted
The Query Analyzer in MySQL Enterprise Monitor provides a detailed breakdown of query execution times, helping detect long-running and inefficient queries. The Performance Schema and Slow Query Log offer insights but are not part of Enterprise MonitorÂ’s query analysis tools.
Question 8 of 60
8. Question
Which system variable controls how often dirty pages are flushed from the buffer pool to disk?
Correct
The innodb_max_dirty_pages_pct variable sets the threshold for dirty pages in the buffer pool before flushing them to disk. Flush log settings control log writes, buffer pool instances affect concurrency, and adaptive flushing adjusts page cleaning behavior.
Incorrect
The innodb_max_dirty_pages_pct variable sets the threshold for dirty pages in the buffer pool before flushing them to disk. Flush log settings control log writes, buffer pool instances affect concurrency, and adaptive flushing adjusts page cleaning behavior.
Unattempted
The innodb_max_dirty_pages_pct variable sets the threshold for dirty pages in the buffer pool before flushing them to disk. Flush log settings control log writes, buffer pool instances affect concurrency, and adaptive flushing adjusts page cleaning behavior.
Question 9 of 60
9. Question
Which MySQL 8.0 feature prevents data corruption by writing a full page image before modifications?
Correct
InnoDB Full Page Writes prevent corruption by storing a full-page image before making changes, ensuring crash recovery can reconstruct pages correctly. This prevents half-written pages from causing data inconsistencies. The other options focus on log management and flushing strategies.
Incorrect
InnoDB Full Page Writes prevent corruption by storing a full-page image before making changes, ensuring crash recovery can reconstruct pages correctly. This prevents half-written pages from causing data inconsistencies. The other options focus on log management and flushing strategies.
Unattempted
InnoDB Full Page Writes prevent corruption by storing a full-page image before making changes, ensuring crash recovery can reconstruct pages correctly. This prevents half-written pages from causing data inconsistencies. The other options focus on log management and flushing strategies.
Question 10 of 60
10. Question
Which step is required when setting up asynchronous replication in MySQL?
Correct
Asynchronous replication relies on binary logs to record changes, which replicas retrieve to maintain data consistency. Without binary logging, replication cannot function properly.
Incorrect
Asynchronous replication relies on binary logs to record changes, which replicas retrieve to maintain data consistency. Without binary logging, replication cannot function properly.
Unattempted
Asynchronous replication relies on binary logs to record changes, which replicas retrieve to maintain data consistency. Without binary logging, replication cannot function properly.
Question 11 of 60
11. Question
Which MySQL log file helps track rapid database growth due to excessive data modifications?
Correct
The Binary Log records all INSERT, UPDATE, and DELETE operations, helping administrators identify excessive data growth patterns. The Slow Query Log and General Query Log do not track data growth, and the Error Log only records failures.
Incorrect
The Binary Log records all INSERT, UPDATE, and DELETE operations, helping administrators identify excessive data growth patterns. The Slow Query Log and General Query Log do not track data growth, and the Error Log only records failures.
Unattempted
The Binary Log records all INSERT, UPDATE, and DELETE operations, helping administrators identify excessive data growth patterns. The Slow Query Log and General Query Log do not track data growth, and the Error Log only records failures.
Question 12 of 60
12. Question
Which MySQL variable is used to prioritize how the optimizer chooses query execution plans?
Correct
The optimizer_switch variable allows fine-tuning of query optimizer behavior by enabling or disabling various optimization techniques. optimizer_prune_level affects subquery optimization, optimizer_max_join_size limits large join execution, and optimizer_search_depth controls how deep the optimizer evaluates query plans.
Incorrect
The optimizer_switch variable allows fine-tuning of query optimizer behavior by enabling or disabling various optimization techniques. optimizer_prune_level affects subquery optimization, optimizer_max_join_size limits large join execution, and optimizer_search_depth controls how deep the optimizer evaluates query plans.
Unattempted
The optimizer_switch variable allows fine-tuning of query optimizer behavior by enabling or disabling various optimization techniques. optimizer_prune_level affects subquery optimization, optimizer_max_join_size limits large join execution, and optimizer_search_depth controls how deep the optimizer evaluates query plans.
Question 13 of 60
13. Question
Which InnoDB status section provides details about transaction execution?
Correct
The TRANSACTIONS section of SHOW ENGINE INNODB STATUS provides detailed transaction information, including active transactions, pending commits, and locks held. Other sections focus on memory, I/O, or lock details.
Incorrect
The TRANSACTIONS section of SHOW ENGINE INNODB STATUS provides detailed transaction information, including active transactions, pending commits, and locks held. Other sections focus on memory, I/O, or lock details.
Unattempted
The TRANSACTIONS section of SHOW ENGINE INNODB STATUS provides detailed transaction information, including active transactions, pending commits, and locks held. Other sections focus on memory, I/O, or lock details.
Question 14 of 60
14. Question
How can MySQL‘s optimizer decide between using an index scan or a table scan?
Correct
MySQLÂ’s optimizer uses statistics about table size, index cardinality, and query conditions to choose between index scans or table scans. It does not automatically choose table scans for smaller tables or prioritize index order.
Incorrect
MySQLÂ’s optimizer uses statistics about table size, index cardinality, and query conditions to choose between index scans or table scans. It does not automatically choose table scans for smaller tables or prioritize index order.
Unattempted
MySQLÂ’s optimizer uses statistics about table size, index cardinality, and query conditions to choose between index scans or table scans. It does not automatically choose table scans for smaller tables or prioritize index order.
Question 15 of 60
15. Question
Which MySQL command removes a privilege from a user account without affecting other privileges?
Correct
The REVOKE statement is used to remove specific privileges without affecting other permissions. REMOVE and DROP PRIVILEGE are invalid commands, and DELETE FROM mysql.db is not recommended as it bypasses privilege management.
Incorrect
The REVOKE statement is used to remove specific privileges without affecting other permissions. REMOVE and DROP PRIVILEGE are invalid commands, and DELETE FROM mysql.db is not recommended as it bypasses privilege management.
Unattempted
The REVOKE statement is used to remove specific privileges without affecting other permissions. REMOVE and DROP PRIVILEGE are invalid commands, and DELETE FROM mysql.db is not recommended as it bypasses privilege management.
Question 16 of 60
16. Question
Which method best ensures zero data loss in a MySQL 8.0 high-availability setup?
Correct
Semi-synchronous replication ensures zero data loss by waiting for at least one replica to confirm receiving binary log changes before committing. This guarantees durability in case of primary server failure. Asynchronous replication lacks this guarantee. Delayed replication is useful for recovery but does not prevent loss. Statement-based replication can lead to inconsistency due to non-deterministic execution.
Incorrect
Semi-synchronous replication ensures zero data loss by waiting for at least one replica to confirm receiving binary log changes before committing. This guarantees durability in case of primary server failure. Asynchronous replication lacks this guarantee. Delayed replication is useful for recovery but does not prevent loss. Statement-based replication can lead to inconsistency due to non-deterministic execution.
Unattempted
Semi-synchronous replication ensures zero data loss by waiting for at least one replica to confirm receiving binary log changes before committing. This guarantees durability in case of primary server failure. Asynchronous replication lacks this guarantee. Delayed replication is useful for recovery but does not prevent loss. Statement-based replication can lead to inconsistency due to non-deterministic execution.
Question 17 of 60
17. Question
Which scenario requires binary log backups for full point-in-time recovery?
Correct
Binary logs allow point-in-time recovery after accidental deletions, replaying transactions up to a specific moment. Database crashes may require redo logs instead. Query optimization and migrations do not need binary log backups.
Incorrect
Binary logs allow point-in-time recovery after accidental deletions, replaying transactions up to a specific moment. Database crashes may require redo logs instead. Query optimization and migrations do not need binary log backups.
Unattempted
Binary logs allow point-in-time recovery after accidental deletions, replaying transactions up to a specific moment. Database crashes may require redo logs instead. Query optimization and migrations do not need binary log backups.
Question 18 of 60
18. Question
Which privilege is required for a user to modify their own password?
Correct
The ALTER USER privilege allows a user to change their own password. UPDATE ON mysql.user is not allowed for security reasons, CHANGE PASSWORD is not a valid privilege, and MODIFY ACCOUNT does not exist in MySQL.
Incorrect
The ALTER USER privilege allows a user to change their own password. UPDATE ON mysql.user is not allowed for security reasons, CHANGE PASSWORD is not a valid privilege, and MODIFY ACCOUNT does not exist in MySQL.
Unattempted
The ALTER USER privilege allows a user to change their own password. UPDATE ON mysql.user is not allowed for security reasons, CHANGE PASSWORD is not a valid privilege, and MODIFY ACCOUNT does not exist in MySQL.
Question 19 of 60
19. Question
What is the effect of the max_connections option in the option file?
Correct
The max_connections option controls the maximum number of simultaneous client connections. It does not set memory limits, query limits, or thread spawning behavior.
Incorrect
The max_connections option controls the maximum number of simultaneous client connections. It does not set memory limits, query limits, or thread spawning behavior.
Unattempted
The max_connections option controls the maximum number of simultaneous client connections. It does not set memory limits, query limits, or thread spawning behavior.
Question 20 of 60
20. Question
Which statement best describes how MySQL Enterprise Firewall protects a database server?
Correct
MySQL Enterprise Firewall provides security by monitoring, learning, and blocking unauthorized SQL queries, preventing injection attacks. It does not handle TLS encryption, password hashing, or auditing directly. These tasks are managed by separate MySQL security features.
Incorrect
MySQL Enterprise Firewall provides security by monitoring, learning, and blocking unauthorized SQL queries, preventing injection attacks. It does not handle TLS encryption, password hashing, or auditing directly. These tasks are managed by separate MySQL security features.
Unattempted
MySQL Enterprise Firewall provides security by monitoring, learning, and blocking unauthorized SQL queries, preventing injection attacks. It does not handle TLS encryption, password hashing, or auditing directly. These tasks are managed by separate MySQL security features.
Question 21 of 60
21. Question
What does the Seconds_Behind_Source value indicate in replication monitoring?
Correct
The Seconds_Behind_Source value represents the difference between the current primary transaction timestamp and the replicaÂ’s last applied transaction timestamp. It does not predict synchronization time, track last commit duration, or measure event execution delays.
Incorrect
The Seconds_Behind_Source value represents the difference between the current primary transaction timestamp and the replicaÂ’s last applied transaction timestamp. It does not predict synchronization time, track last commit duration, or measure event execution delays.
Unattempted
The Seconds_Behind_Source value represents the difference between the current primary transaction timestamp and the replicaÂ’s last applied transaction timestamp. It does not predict synchronization time, track last commit duration, or measure event execution delays.
Question 22 of 60
22. Question
Which mysqldump option ensures foreign keys are disabled during restoration?
Correct
The –disable-foreign-keys option in mysqldump ensures that foreign key checks are disabled during restoration. –disable-checks-table does not exist. –ignore-key-constraints is invalid, and –skip-index-validations is unrelated.
Incorrect
The –disable-foreign-keys option in mysqldump ensures that foreign key checks are disabled during restoration. –disable-checks-table does not exist. –ignore-key-constraints is invalid, and –skip-index-validations is unrelated.
Unattempted
The –disable-foreign-keys option in mysqldump ensures that foreign key checks are disabled during restoration. –disable-checks-table does not exist. –ignore-key-constraints is invalid, and –skip-index-validations is unrelated.
Question 23 of 60
23. Question
Which installation method downloads and installs MySQL automatically on Linux?
Correct
The yum install mysql-server command is used to download and install MySQL on RHEL-based systems. The other commands either contain incorrect syntax or refer to non-RHEL package managers.
Incorrect
The yum install mysql-server command is used to download and install MySQL on RHEL-based systems. The other commands either contain incorrect syntax or refer to non-RHEL package managers.
Unattempted
The yum install mysql-server command is used to download and install MySQL on RHEL-based systems. The other commands either contain incorrect syntax or refer to non-RHEL package managers.
Question 24 of 60
24. Question
Which statement retrieves metadata information from the MySQL Data Dictionary?
Correct
The Information Schema provides a view-based interface for accessing Data Dictionary metadata. The other options reference non-existent tables or incorrect sources.
Incorrect
The Information Schema provides a view-based interface for accessing Data Dictionary metadata. The other options reference non-existent tables or incorrect sources.
Unattempted
The Information Schema provides a view-based interface for accessing Data Dictionary metadata. The other options reference non-existent tables or incorrect sources.
Question 25 of 60
25. Question
Which system variable determines the audit log file format in MySQL?
Correct
The audit_log_format system variable defines whether audit logs are stored in JSON or XML format. Other options do not exist in MySQL 8.0.
Incorrect
The audit_log_format system variable defines whether audit logs are stored in JSON or XML format. Other options do not exist in MySQL 8.0.
Unattempted
The audit_log_format system variable defines whether audit logs are stored in JSON or XML format. Other options do not exist in MySQL 8.0.
Question 26 of 60
26. Question
Which MySQL variable controls the maximum password length allowed for user accounts?
Correct
The validate_password_length variable defines the minimum and maximum password length for MySQL user accounts. The other options do not exist as valid MySQL settings.
Incorrect
The validate_password_length variable defines the minimum and maximum password length for MySQL user accounts. The other options do not exist as valid MySQL settings.
Unattempted
The validate_password_length variable defines the minimum and maximum password length for MySQL user accounts. The other options do not exist as valid MySQL settings.
Question 27 of 60
27. Question
Which MySQL command provides real-time information about active client connections and running queries?
Correct
The SHOW PROCESSLIST command provides real-time insight into active connections, running queries, and thread statuses. Other commands focus on status variables, storage engine internals, or configuration settings.
Incorrect
The SHOW PROCESSLIST command provides real-time insight into active connections, running queries, and thread statuses. Other commands focus on status variables, storage engine internals, or configuration settings.
Unattempted
The SHOW PROCESSLIST command provides real-time insight into active connections, running queries, and thread statuses. Other commands focus on status variables, storage engine internals, or configuration settings.
Question 28 of 60
28. Question
Which InnoDB logging feature reduces write overhead by delaying secondary index updates?
Correct
InnoDB Change Buffering optimizes performance by delaying secondary index updates and merging changes later. Redo Log Batching and Write-Ahead Logging improve transaction durability, but do not buffer index changes.
Incorrect
InnoDB Change Buffering optimizes performance by delaying secondary index updates and merging changes later. Redo Log Batching and Write-Ahead Logging improve transaction durability, but do not buffer index changes.
Unattempted
InnoDB Change Buffering optimizes performance by delaying secondary index updates and merging changes later. Redo Log Batching and Write-Ahead Logging improve transaction durability, but do not buffer index changes.
Question 29 of 60
29. Question
Which step is required before bootstrapping a MySQL InnoDB Cluster?
Correct
Before bootstrapping an InnoDB Cluster, you must enable Group Replication and set up instance credentials. MySQL Router setup, backup snapshots, or binary log synchronization are not prerequisites for initializing the cluster.
Incorrect
Before bootstrapping an InnoDB Cluster, you must enable Group Replication and set up instance credentials. MySQL Router setup, backup snapshots, or binary log synchronization are not prerequisites for initializing the cluster.
Unattempted
Before bootstrapping an InnoDB Cluster, you must enable Group Replication and set up instance credentials. MySQL Router setup, backup snapshots, or binary log synchronization are not prerequisites for initializing the cluster.
Question 30 of 60
30. Question
Which MySQL function retrieves the active roles assigned to the current session?
Correct
The CURRENT_ROLE() function returns the active roles assigned to the current session. SHOW GRANTS lists privileges but does not filter by active roles. SHOW ROLES and SESSION_ROLE() do not exist in MySQL.
Incorrect
The CURRENT_ROLE() function returns the active roles assigned to the current session. SHOW GRANTS lists privileges but does not filter by active roles. SHOW ROLES and SESSION_ROLE() do not exist in MySQL.
Unattempted
The CURRENT_ROLE() function returns the active roles assigned to the current session. SHOW GRANTS lists privileges but does not filter by active roles. SHOW ROLES and SESSION_ROLE() do not exist in MySQL.
Question 31 of 60
31. Question
Which command enables the MySQL Enterprise Audit plugin on a running server?
Correct
To enable MySQL Enterprise Audit, the INSTALL PLUGIN command is used with the appropriate shared library file. Other options do not exist or are not valid for enabling the audit plugin.
Incorrect
To enable MySQL Enterprise Audit, the INSTALL PLUGIN command is used with the appropriate shared library file. Other options do not exist or are not valid for enabling the audit plugin.
Unattempted
To enable MySQL Enterprise Audit, the INSTALL PLUGIN command is used with the appropriate shared library file. Other options do not exist or are not valid for enabling the audit plugin.
Question 32 of 60
32. Question
Which of the following best describes the function of a MySQL replication lag?
Correct
Replication lag occurs when a transaction is committed on the primary server but is not yet applied to the replica server. This delay can be caused by network latency, slow disk writes, or heavy load on the replica. It is an important factor in replication performance, as excessive lag can cause outdated data on replicas. The delay in query execution (latency), difference in processed queries, and memory flushing to disk are separate concepts and do not define replication lag.
Incorrect
Replication lag occurs when a transaction is committed on the primary server but is not yet applied to the replica server. This delay can be caused by network latency, slow disk writes, or heavy load on the replica. It is an important factor in replication performance, as excessive lag can cause outdated data on replicas. The delay in query execution (latency), difference in processed queries, and memory flushing to disk are separate concepts and do not define replication lag.
Unattempted
Replication lag occurs when a transaction is committed on the primary server but is not yet applied to the replica server. This delay can be caused by network latency, slow disk writes, or heavy load on the replica. It is an important factor in replication performance, as excessive lag can cause outdated data on replicas. The delay in query execution (latency), difference in processed queries, and memory flushing to disk are separate concepts and do not define replication lag.
Question 33 of 60
33. Question
Which command checks the MySQL server‘s status from the command line?
Correct
The mysqladmin –show-server-status command displays the current status of the MySQL server. The other options reference non-existent or incorrect commands.
Incorrect
The mysqladmin –show-server-status command displays the current status of the MySQL server. The other options reference non-existent or incorrect commands.
Unattempted
The mysqladmin –show-server-status command displays the current status of the MySQL server. The other options reference non-existent or incorrect commands.
Question 34 of 60
34. Question
Which command dynamically enables MySQL‘s slow query log without restarting the server?
Correct
Setting slow_query_log=ON dynamically enables the slow query log without a server restart. The other options either do not exist or require indirect modifications to system files.
Incorrect
Setting slow_query_log=ON dynamically enables the slow query log without a server restart. The other options either do not exist or require indirect modifications to system files.
Unattempted
Setting slow_query_log=ON dynamically enables the slow query log without a server restart. The other options either do not exist or require indirect modifications to system files.
Question 35 of 60
35. Question
Which mysqlpump feature improves parallel backup performance on large databases?
Correct
The –default-parallelism option in mysqlpump enables parallel execution of table dumps, speeding up large database backups. –optimized-storage-set does not exist. –index-priority-cache is unrelated, and –transactional-logging refers to binary logs, not backups.
Incorrect
The –default-parallelism option in mysqlpump enables parallel execution of table dumps, speeding up large database backups. –optimized-storage-set does not exist. –index-priority-cache is unrelated, and –transactional-logging refers to binary logs, not backups.
Unattempted
The –default-parallelism option in mysqlpump enables parallel execution of table dumps, speeding up large database backups. –optimized-storage-set does not exist. –index-priority-cache is unrelated, and –transactional-logging refers to binary logs, not backups.
Question 36 of 60
36. Question
Which MySQL system variable must be different for each instance to prevent file access conflicts?
Correct
The tmpdir variable specifies the temporary file directory for MySQL, which must be unique for each instance to avoid file access conflicts. join_buffer_size and innodb_buffer_pool_size affect performance but do not create file conflicts. table_definition_cache controls metadata caching but does not impact multiple instance execution.
Incorrect
The tmpdir variable specifies the temporary file directory for MySQL, which must be unique for each instance to avoid file access conflicts. join_buffer_size and innodb_buffer_pool_size affect performance but do not create file conflicts. table_definition_cache controls metadata caching but does not impact multiple instance execution.
Unattempted
The tmpdir variable specifies the temporary file directory for MySQL, which must be unique for each instance to avoid file access conflicts. join_buffer_size and innodb_buffer_pool_size affect performance but do not create file conflicts. table_definition_cache controls metadata caching but does not impact multiple instance execution.
Question 37 of 60
37. Question
Which key factor determines the frequency of database backups in a backup strategy?
Correct
The data modification rate influences how frequently backups are required to minimize data loss risk. Query execution speed affects performance but does not dictate backup schedules. User connection count impacts server load, and index optimization level relates to query speed, not backups.
Incorrect
The data modification rate influences how frequently backups are required to minimize data loss risk. Query execution speed affects performance but does not dictate backup schedules. User connection count impacts server load, and index optimization level relates to query speed, not backups.
Unattempted
The data modification rate influences how frequently backups are required to minimize data loss risk. Query execution speed affects performance but does not dictate backup schedules. User connection count impacts server load, and index optimization level relates to query speed, not backups.
Question 38 of 60
38. Question
Which command provides an estimate of total disk space usage by a MySQL database?
Correct
The SUM(data_length + index_length) query in Information Schema calculates the total storage used by tables and indexes in a database. The other options are invalid or do not provide a direct measurement of database size.
Incorrect
The SUM(data_length + index_length) query in Information Schema calculates the total storage used by tables and indexes in a database. The other options are invalid or do not provide a direct measurement of database size.
Unattempted
The SUM(data_length + index_length) query in Information Schema calculates the total storage used by tables and indexes in a database. The other options are invalid or do not provide a direct measurement of database size.
Question 39 of 60
39. Question
Which high availability strategy ensures automatic failover with minimal downtime?
Correct
MySQL InnoDB Cluster combines Group Replication with MySQL Router, enabling automatic failover by detecting node failures and promoting a new primary with minimal downtime.
Incorrect
MySQL InnoDB Cluster combines Group Replication with MySQL Router, enabling automatic failover by detecting node failures and promoting a new primary with minimal downtime.
Unattempted
MySQL InnoDB Cluster combines Group Replication with MySQL Router, enabling automatic failover by detecting node failures and promoting a new primary with minimal downtime.
Question 40 of 60
40. Question
Which MySQL 8.0 feature allows you to roll back a transaction to a specific savepoint?
Correct
Savepoints allow a transaction to be rolled back to a specific state instead of fully rolling back. This feature is useful for managing complex transactions where partial rollback is required. Point-in-time recovery uses binary logs but does not allow selective transaction rollback. Replication copies changes across servers but is not related to rollback.
Incorrect
Savepoints allow a transaction to be rolled back to a specific state instead of fully rolling back. This feature is useful for managing complex transactions where partial rollback is required. Point-in-time recovery uses binary logs but does not allow selective transaction rollback. Replication copies changes across servers but is not related to rollback.
Unattempted
Savepoints allow a transaction to be rolled back to a specific state instead of fully rolling back. This feature is useful for managing complex transactions where partial rollback is required. Point-in-time recovery uses binary logs but does not allow selective transaction rollback. Replication copies changes across servers but is not related to rollback.
Question 41 of 60
41. Question
Which MySQL privilege should be restricted for user accounts to minimize the impact of SQL injection attacks?
Correct
The DROP privilege should be restricted to prevent SQL injection attacks from dropping critical tables. Limiting access to the DROP privilege reduces the potential damage. The other options are more common and needed for regular database use.
Incorrect
The DROP privilege should be restricted to prevent SQL injection attacks from dropping critical tables. Limiting access to the DROP privilege reduces the potential damage. The other options are more common and needed for regular database use.
Unattempted
The DROP privilege should be restricted to prevent SQL injection attacks from dropping critical tables. Limiting access to the DROP privilege reduces the potential damage. The other options are more common and needed for regular database use.
Question 42 of 60
42. Question
Which action is required before restarting an InnoDB Cluster after a failure?
Correct
Before restarting an InnoDB Cluster, it is critical to verify the replication state across all nodes to prevent data inconsistency. Modifying MySQL Router, enabling semi-sync replication, or adjusting binlog retention is not necessary for recovery.
Incorrect
Before restarting an InnoDB Cluster, it is critical to verify the replication state across all nodes to prevent data inconsistency. Modifying MySQL Router, enabling semi-sync replication, or adjusting binlog retention is not necessary for recovery.
Unattempted
Before restarting an InnoDB Cluster, it is critical to verify the replication state across all nodes to prevent data inconsistency. Modifying MySQL Router, enabling semi-sync replication, or adjusting binlog retention is not necessary for recovery.
Question 43 of 60
43. Question
Which of the following best describes the purpose of the InnoDB redo log in MySQL 8.0?
Correct
The InnoDB redo log records changes to pages in the buffer pool before they are written to disk. This ensures durability and allows crash recovery by replaying changes that were not flushed to the tablespace before a failure. The redo log is essential for maintaining data integrity in case of unexpected shutdowns. The binary logs, on the other hand, track changes for replication and point-in-time recovery, but they are not the same as the redo log. Audit logs, which store executed queries, serve a different purpose.
Incorrect
The InnoDB redo log records changes to pages in the buffer pool before they are written to disk. This ensures durability and allows crash recovery by replaying changes that were not flushed to the tablespace before a failure. The redo log is essential for maintaining data integrity in case of unexpected shutdowns. The binary logs, on the other hand, track changes for replication and point-in-time recovery, but they are not the same as the redo log. Audit logs, which store executed queries, serve a different purpose.
Unattempted
The InnoDB redo log records changes to pages in the buffer pool before they are written to disk. This ensures durability and allows crash recovery by replaying changes that were not flushed to the tablespace before a failure. The redo log is essential for maintaining data integrity in case of unexpected shutdowns. The binary logs, on the other hand, track changes for replication and point-in-time recovery, but they are not the same as the redo log. Audit logs, which store executed queries, serve a different purpose.
Question 44 of 60
44. Question
Which MySQL status variable indicates the number of lock waits due to contention?
Correct
The Innodb_row_lock_waits metric shows the number of times transactions had to wait for row locks, helping diagnose lock contention issues. Other metrics track memory usage, deadlocks, and log buffer delays, but not row locks.
Incorrect
The Innodb_row_lock_waits metric shows the number of times transactions had to wait for row locks, helping diagnose lock contention issues. Other metrics track memory usage, deadlocks, and log buffer delays, but not row locks.
Unattempted
The Innodb_row_lock_waits metric shows the number of times transactions had to wait for row locks, helping diagnose lock contention issues. Other metrics track memory usage, deadlocks, and log buffer delays, but not row locks.
Question 45 of 60
45. Question
Which MySQL variable controls the maximum size of the binary log before rotation?
Correct
The max_binlog_size variable sets the maximum size of a binary log file before MySQL automatically rotates it. The other options do not exist in MySQL.
Incorrect
The max_binlog_size variable sets the maximum size of a binary log file before MySQL automatically rotates it. The other options do not exist in MySQL.
Unattempted
The max_binlog_size variable sets the maximum size of a binary log file before MySQL automatically rotates it. The other options do not exist in MySQL.
Question 46 of 60
46. Question
Which optimizer trace field shows why MySQL chose a specific index?
Correct
The cost_estimate field in optimizer_trace explains why MySQL chose a specific index, based on cost calculations. query_block_id identifies query parts but does not explain index choice. partition_used refers to partitioning, not indexing. ref_or_null relates to JOIN optimizations.
Incorrect
The cost_estimate field in optimizer_trace explains why MySQL chose a specific index, based on cost calculations. query_block_id identifies query parts but does not explain index choice. partition_used refers to partitioning, not indexing. ref_or_null relates to JOIN optimizations.
Unattempted
The cost_estimate field in optimizer_trace explains why MySQL chose a specific index, based on cost calculations. query_block_id identifies query parts but does not explain index choice. partition_used refers to partitioning, not indexing. ref_or_null relates to JOIN optimizations.
Question 47 of 60
47. Question
Which system variable is responsible for setting the maximum allowed packet size that MySQL accepts from a client?
Correct
The max_allowed_packet variable defines the largest single packet or network message that MySQL will accept from a client. If a packet exceeds this size, MySQL rejects the query with an error. The other variables manage log file sizes, network buffers, and temporary table limits but do not control packet size.
Incorrect
The max_allowed_packet variable defines the largest single packet or network message that MySQL will accept from a client. If a packet exceeds this size, MySQL rejects the query with an error. The other variables manage log file sizes, network buffers, and temporary table limits but do not control packet size.
Unattempted
The max_allowed_packet variable defines the largest single packet or network message that MySQL will accept from a client. If a packet exceeds this size, MySQL rejects the query with an error. The other variables manage log file sizes, network buffers, and temporary table limits but do not control packet size.
Question 48 of 60
48. Question
Which schema in MySQL 8.0 provides metadata tables for the Data Dictionary?
Correct
The MySQL System Schema contains Data Dictionary metadata tables, replacing legacy storage methods. The Information Schema provides metadata views, and the Performance Schema is used for performance monitoring.
Incorrect
The MySQL System Schema contains Data Dictionary metadata tables, replacing legacy storage methods. The Information Schema provides metadata views, and the Performance Schema is used for performance monitoring.
Unattempted
The MySQL System Schema contains Data Dictionary metadata tables, replacing legacy storage methods. The Information Schema provides metadata views, and the Performance Schema is used for performance monitoring.
Question 49 of 60
49. Question
Which MySQL statement grants a user the ability to create other user accounts?
Correct
The CREATE USER privilege allows a user to create, modify, and remove user accounts in MySQL. CREATE applies only to database objects, USER_ADMIN is not a valid privilege, and ACCOUNT_ADMIN does not exist in MySQL 8.0.
Incorrect
The CREATE USER privilege allows a user to create, modify, and remove user accounts in MySQL. CREATE applies only to database objects, USER_ADMIN is not a valid privilege, and ACCOUNT_ADMIN does not exist in MySQL 8.0.
Unattempted
The CREATE USER privilege allows a user to create, modify, and remove user accounts in MySQL. CREATE applies only to database objects, USER_ADMIN is not a valid privilege, and ACCOUNT_ADMIN does not exist in MySQL 8.0.
Question 50 of 60
50. Question
Which MySQL 8.0 feature helps prevent dirty reads and ensures that transactions do not see uncommitted changes?
Correct
The Repeatable Read isolation level is the default in MySQL 8.0 and ensures that once a transaction reads data, subsequent reads within the same transaction will see the same data, even if other transactions modify it. This prevents dirty reads (reading uncommitted data) and minimizes non-repeatable reads. While Read Committed prevents dirty reads, it does not guarantee repeatable reads. Serializable is the strictest level, ensuring full isolation but reducing concurrency.
Incorrect
The Repeatable Read isolation level is the default in MySQL 8.0 and ensures that once a transaction reads data, subsequent reads within the same transaction will see the same data, even if other transactions modify it. This prevents dirty reads (reading uncommitted data) and minimizes non-repeatable reads. While Read Committed prevents dirty reads, it does not guarantee repeatable reads. Serializable is the strictest level, ensuring full isolation but reducing concurrency.
Unattempted
The Repeatable Read isolation level is the default in MySQL 8.0 and ensures that once a transaction reads data, subsequent reads within the same transaction will see the same data, even if other transactions modify it. This prevents dirty reads (reading uncommitted data) and minimizes non-repeatable reads. While Read Committed prevents dirty reads, it does not guarantee repeatable reads. Serializable is the strictest level, ensuring full isolation but reducing concurrency.
Question 51 of 60
51. Question
Which MySQL setting forces all client connections to use SSL/TLS encryption?
Correct
The require_secure_transport=ON setting ensures that all client connections must use SSL/TLS encryption, preventing unencrypted data transmission. The other options are invalid or nonexistent MySQL settings.
Incorrect
The require_secure_transport=ON setting ensures that all client connections must use SSL/TLS encryption, preventing unencrypted data transmission. The other options are invalid or nonexistent MySQL settings.
Unattempted
The require_secure_transport=ON setting ensures that all client connections must use SSL/TLS encryption, preventing unencrypted data transmission. The other options are invalid or nonexistent MySQL settings.
Question 52 of 60
52. Question
Which MySQL data directory path contains files needed for a raw file backup?
Correct
The /var/lib/mysql/data-store directory contains all MySQL data files needed for raw file backups. Configuration files are in /etc/mysql/. Binaries and tools are stored in /usr/local/bin/. Plugins and caches are separate from data storage.
Incorrect
The /var/lib/mysql/data-store directory contains all MySQL data files needed for raw file backups. Configuration files are in /etc/mysql/. Binaries and tools are stored in /usr/local/bin/. Plugins and caches are separate from data storage.
Unattempted
The /var/lib/mysql/data-store directory contains all MySQL data files needed for raw file backups. Configuration files are in /etc/mysql/. Binaries and tools are stored in /usr/local/bin/. Plugins and caches are separate from data storage.
Question 53 of 60
53. Question
Which MySQL 8.0 command creates a user with a password and requires authentication using the caching_sha2 plugin?
Correct
The default authentication plugin in MySQL 8.0 is caching_sha2_password, which provides stronger security than older methods. Using mysql_native_password is supported but not recommended. The sha256_password plugin exists but is not the default. If no authentication plugin is specified, MySQL uses caching_sha2_password by default.
Incorrect
The default authentication plugin in MySQL 8.0 is caching_sha2_password, which provides stronger security than older methods. Using mysql_native_password is supported but not recommended. The sha256_password plugin exists but is not the default. If no authentication plugin is specified, MySQL uses caching_sha2_password by default.
Unattempted
The default authentication plugin in MySQL 8.0 is caching_sha2_password, which provides stronger security than older methods. Using mysql_native_password is supported but not recommended. The sha256_password plugin exists but is not the default. If no authentication plugin is specified, MySQL uses caching_sha2_password by default.
Question 54 of 60
54. Question
What is the function of the Coordinator thread in MySQL 8.0 parallel replication?
Correct
The Coordinator thread manages parallel replication by distributing transactions to multiple worker threads, improving replication speed. It does not synchronize logs, adjust network buffers, or prevent duplicate transactions (GTIDs handle that).
Incorrect
The Coordinator thread manages parallel replication by distributing transactions to multiple worker threads, improving replication speed. It does not synchronize logs, adjust network buffers, or prevent duplicate transactions (GTIDs handle that).
Unattempted
The Coordinator thread manages parallel replication by distributing transactions to multiple worker threads, improving replication speed. It does not synchronize logs, adjust network buffers, or prevent duplicate transactions (GTIDs handle that).
Question 55 of 60
55. Question
Which MySQL statement activates a role for the current session?
Correct
To activate a role for the current session, the correct command is SET ROLE ‘role_name‘. Other options (USE ROLE, ENABLE ROLE, ACTIVATE ROLE) do not exist in MySQL 8.0. Roles must be explicitly set per session unless assigned as a default role.
Incorrect
To activate a role for the current session, the correct command is SET ROLE ‘role_name‘. Other options (USE ROLE, ENABLE ROLE, ACTIVATE ROLE) do not exist in MySQL 8.0. Roles must be explicitly set per session unless assigned as a default role.
Unattempted
To activate a role for the current session, the correct command is SET ROLE ‘role_name‘. Other options (USE ROLE, ENABLE ROLE, ACTIVATE ROLE) do not exist in MySQL 8.0. Roles must be explicitly set per session unless assigned as a default role.
Question 56 of 60
56. Question
Which feature allows a replica to replicate from multiple MySQL primary servers?
Correct
Multisource replication is enabled by defining separate replication channels, each receiving transactions from one primary server. Parallel execution, logical clocks, and binlog caching are beneficial but do not provide multisource replication support directly.
Incorrect
Multisource replication is enabled by defining separate replication channels, each receiving transactions from one primary server. Parallel execution, logical clocks, and binlog caching are beneficial but do not provide multisource replication support directly.
Unattempted
Multisource replication is enabled by defining separate replication channels, each receiving transactions from one primary server. Parallel execution, logical clocks, and binlog caching are beneficial but do not provide multisource replication support directly.
Question 57 of 60
57. Question
Which MySQL 8.0 feature allows automatic recovery of a database in case of a crash?
Correct
The InnoDB Storage Engine supports ACID compliance and includes crash recovery capabilities. It maintains a redo log and undo log, which ensure that transactions are either fully committed or completely rolled back in the event of a crash. Unlike MyISAM, which does not support crash recovery, InnoDB automatically restores its state using its transaction logs, making it the preferred storage engine for critical applications.
Incorrect
The InnoDB Storage Engine supports ACID compliance and includes crash recovery capabilities. It maintains a redo log and undo log, which ensure that transactions are either fully committed or completely rolled back in the event of a crash. Unlike MyISAM, which does not support crash recovery, InnoDB automatically restores its state using its transaction logs, making it the preferred storage engine for critical applications.
Unattempted
The InnoDB Storage Engine supports ACID compliance and includes crash recovery capabilities. It maintains a redo log and undo log, which ensure that transactions are either fully committed or completely rolled back in the event of a crash. Unlike MyISAM, which does not support crash recovery, InnoDB automatically restores its state using its transaction logs, making it the preferred storage engine for critical applications.
Question 58 of 60
58. Question
Which command creates an audit log filtering rule for specific users?
Correct
The CREATE AUDIT FILTER command defines filtering rules for auditing specific users or operations. The other options are either invalid syntax or do not exist in MySQL 8.0.
Incorrect
The CREATE AUDIT FILTER command defines filtering rules for auditing specific users or operations. The other options are either invalid syntax or do not exist in MySQL 8.0.
Unattempted
The CREATE AUDIT FILTER command defines filtering rules for auditing specific users or operations. The other options are either invalid syntax or do not exist in MySQL 8.0.
Question 59 of 60
59. Question
Which MySQL Enterprise Backup feature allows compressing backups to reduce storage requirements?
Correct
The –compress backup mode in MySQL Enterprise Backup reduces backup file size by applying compression. –backup directory path specifies where the backup is stored. –apply-log recovery step applies incremental backups, and –incremental restore is used for restoring only changed data.
Incorrect
The –compress backup mode in MySQL Enterprise Backup reduces backup file size by applying compression. –backup directory path specifies where the backup is stored. –apply-log recovery step applies incremental backups, and –incremental restore is used for restoring only changed data.
Unattempted
The –compress backup mode in MySQL Enterprise Backup reduces backup file size by applying compression. –backup directory path specifies where the backup is stored. –apply-log recovery step applies incremental backups, and –incremental restore is used for restoring only changed data.
Question 60 of 60
60. Question
Which best practice reduces table-level locks in high-concurrency environments?
Correct
Row-Based Locking minimizes table-wide contention by allowing transactions to lock individual rows instead of entire tables. Query Caching does not affect locks, Write-Ahead Logging improves durability, and Heap Storage is limited to memory tables.
Incorrect
Row-Based Locking minimizes table-wide contention by allowing transactions to lock individual rows instead of entire tables. Query Caching does not affect locks, Write-Ahead Logging improves durability, and Heap Storage is limited to memory tables.
Unattempted
Row-Based Locking minimizes table-wide contention by allowing transactions to lock individual rows instead of entire tables. Query Caching does not affect locks, Write-Ahead Logging improves durability, and Heap Storage is limited to memory tables.
X
Use Page numbers below to navigate to other practice tests