New Year Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

1z0-888 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-888 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: MySQL 5.7 Database Administrator
  • Last Update: Jan 13, 2025
  • Questions and Answers: 124
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-888 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-888 Practice Exam Questions with Answers MySQL 5.7 Database Administrator Certification

Question # 6

The MySQL user ‘adam’ currently has USAGE permissions to the database.

The football database is transactional and has non-stop updates from application users. The ‘adam’ user needs to be able to take consistent backups of the football database by using the –-single-transaction option.

Which extra GRANT permissions are required for adam to take mysqldump backups?

A.

The ‘adam’ user must also have SINGLE TRANSACTION global grant to take a consistent backup.

B.

The ‘adam’ user needs the PROCESS privilege to be able to take a consistent backup while other users are connected.

C.

The ‘adam’ user must have the SUPER privilege in order to take data backups.

D.

The ‘adam’ user must also have SELECT on the football database for backup to work.

Full Access
Question # 7

You have just executed a manual backup by using this command:

mysqlbackup –u root –p –-socket=/tmp/my.sock –-backup-dir=/my/backup/ backup

The operation completed without error.

What is the state of this backup and operation required before it is ready to be restored?

A.

Backup State = Compressed Backup

Operation = copy-back

B.

Backup State = Raw Backup

Operation = apply-log

C.

Backup State = Prepared Backup

Operation = validate

D.

Backup State = Prepared Backup

Operation = apply-log

E.

Backup State = Raw Backup

Operation = backupdir-to-image

Full Access
Question # 8

What is the best method for monitoring Group Replication conflict resolution?

A.

the PERFORMANCE_SCHEMA tables

B.

the SHOW PROCESSLIST command

C.

the INNODB Lock Monitor details

D.

the SHOW STATUS command

E.

the INFORMATION_SCHEMA tables

Full Access
Question # 9

Consider the table people with this definition:

1z0-888 question answer

The application uses a query such as:

SELECT * FROM people WHERE YEAR(Birthday) = 1980;

The query is not using an index.

Which two methods can be used to allow the query to use an index? (Choose two.)

A.

Change the WHERE clause to Birthday BETWEEN 1980-01-01 AND 1980-12-31.

B.

Add a functional index for YEAR(Birthday).

C.

Execute ANALYZE TABLE to update the index statistics.

D.

Add a generated column calculating YEAR(Birthday) and index that column.

E.

Add FORCE INDEX (Birthday) to the query.

Full Access
Question # 10

Multiversion Concurrency Control (MVCC) enables what type of backup?

A.

Hot

B.

Binary

C.

Logical

D.

Incremental

Full Access
Question # 11

A MySQL instance has this configuration values set:

1z0-888 question answer

A transaction involving a single InnoDB INSERT statement commits.

Which list of locations is in the sequence of disk writes for this transaction?

A.

binary log, redo log, doublewrite buffer, and tablespace

B.

redo log, binary log, doublewrite buffer, and tablespace

C.

doublewrite buffer, redo log, tablespace, and binary log

D.

redo log, doublewrite buffer, tablespace, and binary log

Full Access
Question # 12

Which two statements are true regarding the creating of new MySQL physical and logical backups? (Choose two.)

A.

Physical backups can be used to recover from data corruption.

B.

Logical backups are human-readable whereas physical backups are not.

C.

Logical backups are always larger than physical backups.

D.

Physical backups are usually slower than text backups.

E.

Physical backups are usually faster than text backups.

Full Access
Question # 13

Which two options describe how MySQL Server allocates memory? (Choose two.)

A.

Each connection may have its own per-thread memory allocations.

B.

Thread memory is pre-allocated up to thread_cache_size for performance.

C.

Each thread allocates memory from a global pool.

D.

Global memory resources are allocated at server startup.

Full Access
Question # 14

Consider that local disk files are accessible via MySQL with commands such as:

mysql> LOAD DATA LOCAL INFILE ‘/etc/passwd’ INTO TABLE mypasswords;

What change could be made to stop any breach via this insecurity?

A.

executing REVOKE LOAD FROM *.*

B.

setting the --local-service=0 option when starting mysqld

C.

executing REVOKE FILE FROM *.*

D.

executing REVOKE FILE ON *.* FROM ‘ ’ @’%’

E.

setting the --local-infile=0 option when starting mysqld

F.

setting the --open-files-limit=0 option when starting mysqld

Full Access
Question # 15

Consider these global status variables:

1z0-888 question answer

Which two conclusions can be made from the output? (Choose two.)

A.

There are 140 Performance Schema threads at the time of the output.

B.

There are 510 connections to MySQL at the time of the output.

C.

The thread cache has been configured with thread_cache_size set to at least 6.

D.

There are more connections being idle than executing queries.

E.

All max_connections were in use at 2018-03-22 14:54:06

Full Access
Question # 16

You have a consistent InnoDB backup created with mysqldump, the largest table is 50 GB in size.

You start to restore your backup with this command;

shell> mysql –u root –p < backup.sql

After 30 minutes, you notice that the rate of restore seems to have slowed down. No other processes or external factors are affecting server performance.

Which is the most likely explanation for this slowdown?

A.

The MySQL server has stopped inserting data to check index consistency.

B.

InnoDB is doing CRC32 checks over the tablespace data as it grows.

C.

The MySQL server is taking a periodical snapshot of data so it can resume the restore if it is interrupted mid-way.

D.

InnoDB has filled the redo log and now must flush the pages.

E.

Secondary indexes no longer fit into the buffer pool.

Full Access
Question # 17

An admin attempts to enforce stronger security by using these commands:

1z0-888 question answer

The admin then leaves the system running with the specified changes. What are two remaining security concerns? (Choose two.)

A.

validate_password_policy cannot be set without restarting the MySQL instance.

B.

The name of the dictionary file is too obvious.

C.

The dictionary file word list is too short.

D.

validate_password_dictionary_file cannot be set without restarting the MySQL instance.

E.

The validate_password plug-in has not been loaded.

F.

The dictionary file is in an insecure location.

Full Access
Question # 18

Which two statements are true about InnoDB auto-increment locking? (Choose two.)

A.

InnoDB never uses table-level locks.

B.

InnoDB always protects auto-increment updates with a table-level lock

C.

InnoDB does not use locks to enforce auto-increment uniqueness.

D.

The auto-increment lock can be a table-level lock.

E.

Some settings for innodb_autoinc_lock_mode can help reduce locking.

Full Access
Question # 19

A crucial database, ‘db_prod’, just disappeared from your production MySQL instance.

In reviewing the available MySQL logs (General, Audit, or Slow) and your own application-level logs, you identified this command from a customer facing application:

SELECT id FROM users WHERE login=’payback!’;DROP DATABASE db_prod;’

Which three methods could have been used to prevent this SQL injection attack from happening? (Choose three.)

A.

writing your client code to properly escape all user input

B.

giving limited privileges to accounts used by application servers to interact with their backing databases

C.

using SSL/TLS on your outward facing web servers (https://) to encrypt all user sessions

D.

using a hashing or encryption method to secure all user passwords in your MySQL tables

E.

removing any remaining anonymous accounts from your MySQL instance

F.

validating all user input before sending it to the database server

G.

changing all passwords for the MySQL account ‘root’@’%’ immediately after losing an employee who knew the current password

Full Access
Question # 20

Which statement describes how the relay log works?

A.

when a slave receives a change from the master, it is processed first, and then recorded in the relay log.

B.

It maintains a record of available master binary logs and the current executed log position.

C.

It stores changes on the master, and relays them to the slave.

D.

When a slave receives a change from the master, it is recorded in the relay log first and processed later.

Full Access
Question # 21

After analysis on the slow query log on a high-end OLTP service, the table identified in the slow queries is:

1z0-888 question answer

What are the two most likely reasons for the slowness given this output? (Choose two.)

A.

Date should be a TIMESTAMP field for better performance.

B.

The User field is too long for most names.

C.

The engine type is not appropriate to the application use.

D.

Using default values for DATETIME causes table scans.

E.

No indexes are defined.

Full Access
Question # 22

Consider the index information for the dept_emp table in the employee’s schema:

1z0-888 question answer

Which two conclusions can be made based on the output of the query? (Choose two.)

A.

There are three indexes on the table.

B.

There is a redundant index on the dept_no column.

C.

The secondary indexes are optimized for unique key look-ups.

D.

The values on the emp_no column must be unique.

E.

The selectivity of the dept_no column is the best of the indexed columns.

F.

There is a redundant index on the emp_no column.

Full Access
Question # 23

You are no longer able to log in to an existing MySQL Server because the root password credentials not working. You need to reset the root password to complete various administrative tasks. What are the two major methods that will achieve this? (Choose two.)

A.

Start the MySQL Server in --safe-mode, which only loads the privilege system for changes as data is inaccessible.

B.

Start the MySQL Server with reset-root-password in my.cnf, which will prompt you to enter a new root user password.

C.

Start the MySQL Server with --init-file pointing to SQL that executes an ALTER USER statement to change the root user password.

D.

Start the MySQL Server with --skip-grant-tables and execute SQL, which will update the root password.

E.

Start the MySQL Server with –initialize-insecure to force a password reset procedure on the command line.

Full Access
Question # 24

Which three allocate memory per thread in MySQL? (Choose three.)

A.

query cache

B.

thread cache

C.

read buffer

D.

internal temporary table

E.

sort buffer

F.

InnoDB buffer pool instance

Full Access
Question # 25

You want to create a temporary table named OLD_INVENTORY in the OLD_INVENTORY database on the master server. This table is not to be replicated to the slave server.

Which two changes would ensure that the temporary table does not propagate to the slave? (Choose two.)

A.

Set binlog_format=MIXED with the --replicate-ignore-temp-table option.

B.

Use the --replicate-do-db, --replicate-do-table, or --replicate-wild-do-table option with the value equal to OLD_INVENTORY.

C.

Change the binlog_format option to ROW and restart mysqld before you create the OLD_INVENTORY table.

D.

Stop SQL_THREAD on the slave until you have finished using the OLD_INVENTORY temporary table.

E.

Use the --replicate-ignore-table option with the value equal to OLD_INVENTORY.OLD_INVENTORY and restart mysqld before creating the temporary table.

Full Access
Question # 26

You are creating a strategy for backing up MySQL using a cold binary backup. The MySQL instance is a replication master with global transaction identifiers (GTIDs) enabled and it uses Transparent Data Encryption (TDE). Other than the configuration required to make the instance a replication master and enabled GTIDs and TDE, the instance is using all default settings.

The requirements for the backup are:

  • It must be possible to rebuild the instance using the backup.
  • It must be verified.
  • It must allow for a catastrophic hardware failure.

Which four steps must be included in the backup strategy? (Choose four.)

A.

Include the keyring data and/or configuration in the backup.

B.

Restore the backup to a clean MySQL instance.

C.

Copy the backup to a remote host.

D.

Include the MySQL socket file in the backup.

E.

Include the ibtmp1 file in the backup.

F.

Include the relay logs in the backup.

G.

Include the operating system disk encryption key in the backup.

Full Access
Question # 27

Consider the CHECK TABLE command.

In which two situations should this command be used? (Choose two.)

A.

to find out why a query takes a long time to execute on a given table

B.

to make sure a table has no structural problems

C.

to improve performance by updating index distributing statistics on InnoDB tables

D.

to repair table structure problem

E.

to make sure that no table indexes are corrupted

Full Access
Question # 28

You enable binary logging on MySQL Server with the configuration:

binlog-format=STATEMENT

log-bin

Which database updates are logged on the master server to the binary log by default?

A.

all updates except to the TEMPDB database

B.

all updates except to the PERFORMANCE_SCHEMA database

C.

all updates not involving temporary tables

D.

all updates to the default database, except temporary tables

E.

all updates to all databases

Full Access
Question # 29

Which three options are most likely to be changed for production form their default values? (Choose three.)

A.

innodb_buffer_pool_size

B.

max_connections

C.

join_buffer_size

D.

character_set_system

E.

innodb_log_file_size

F.

max_user_connections

G.

port

Full Access
Question # 30

To satisfy a security requirement, you have created or altered some user accounts to include REQUIRE X509.

Which additional task needs to be performed for those user accounts to fulfill the requirement to use X509?

A.

Install the X509 plug-in on the server.

B.

Set the X509 option in the [client] section of the MySQL server’s configuration file.

C.

Restart the server with the --require-x509 option.

D.

Distribute client digital certificates to the client computers being used to log in by the user accounts.

E.

Provide users access to the server’s private key.

Full Access
Question # 31

A MySQL instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ.

Which two will optimize the security of this setup? (Choose two.)

A.

enabling and using SSL for connections to the MySQL database

B.

running the server with –-skip-networking specified

C.

disabling connections from named pipes or socket files (depending on the operating system of the server)

D.

starting the server with –-bind-address=0.0.0.0 specified

E.

limiting logins to originate from the application server or the server’s subnet

F.

installing MySQL on the application server, and running the database and application on the same server

Full Access
Question # 32

You have just created a replication slave from a backup of the master made with mysqldump:

1z0-888 question answer

You try to log in to the slave with the application user, but fail as follows:

1z0-888 question answer

The login works on the master.

Which two changes to the process can fix the issue?

A.

After the restore, log in to the database and execute FLUSH PRIVILEGES.

B.

Use the –-flush-privileges with mysqldump.

C.

Add a second dump for the ‘mysql’ database; --all-databases does not include it.

D.

Use the –-grants option to include GRANT statements in the dump.

Full Access
Question # 33

You are using GTIDS in replication. You need to skip a transaction with the GTID of aaa-bbb-ccc-ddd-eee:3 on a slave.

Which procedure would you execute from a MySQL prompt?

A.

1z0-888 question answer

B.

1z0-888 question answer

C.

1z0-888 question answer

D.

1z0-888 question answer

Full Access
Question # 34

Where does MySQL Linux RPM install the mysqld binary?

A.

/usr/libexec/

B.

/usr/local/mysql/bin/

C.

/usr/sbin/

D.

/usr/bin/

E.

/opt/mysql/server/bin/

Full Access
Question # 35

You are setting up a new installation of MySQL Server 5.7 (a GA release.) You have used a ZIP or TAR package to ensure that the mysqld binary, along with its support files, such as plug-ins and error messages, now exist on the host. Assume that the default datadir exists on the host. You installed the binary in the default location (the default --basedir value) for your operating system.

Which step should you perform before defining your own databases and database tables?

A.

Execute a command with a minimal form of: mysql --initialize

B.

Register mysqld as a service that will start automatically on this host machine.

C.

Create a configuration file containing default-storage-engine=InnoDB.

D.

Set an exception in the host machine’s firewall to allow external users to talk to mysqld.

E.

Create additional login accounts (so that everyone does not need to log in as root) and assign them appropriate privileges.

Full Access
Question # 36

Which two statements describe how InnoDB recovery works? (Choose two.)

A.

InnoDB handles most crash recoveries automatically.

B.

InnoDB blocks some operations when innodb_force_recovery is set to greater than 0.

C.

There will in general be lost committed transactions after a crash using the default settings.

D.

It is required to enable binlog_gtid_simple_recovery to perform a crash recovery.

E.

It is recommended to set innodb_force_recovery = 1 as part of normal operations.

F.

It is always required to enable innodb_force_recovery to perform a crash recovery.

Full Access
Question # 37

An existing master-slave setup is currently using a delayed replication of one hour. The master has crashed and the slave must be “rolled forward” to provide all the latest data.

The SHOW SLAVE STATUS indicates these values:

  • RELAY_LOG_FILE=hostname-relay-bin.00004
  • RELAY_LOG_POS=1383

Which command set would make the slave current?

A.

STOP SLAVE; SET GLOBAL master_delay=0; START SLAVE;

B.

STOP SLAVE; CHANGE MASTER TO RELAY_LOG_FILE = ‘hostname-relay-bin.00004’,

RELAY_LOG_POS = 1383;

C.

STOP SLAVE; CHANGE MASTER TO MASTER_DELAY=0; START SLAVE;

D.

STOP SLAVE; CHANGE MASTER TO MASTER_DELAY=0; RELAY_LOG_FILE = ‘hostname-relay-bin.00004’, RELAY_LOG_POS = 1383;

Full Access