Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1z0-908 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-908 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: MySQL 8.0 Database Administrator
  • Last Update: May 3, 2024
  • Questions and Answers: 140
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-908 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-908 Practice Exam Questions with Answers MySQL 8.0 Database Administrator Certification

Question # 6

You must run multiple instances of MySQL Server on a single host.

Which three methods are supported? (Choose three.)

A.

Run MySQL Server docker containers.

B.

Use systemd with different settings for each instance.

C.

Use system tools to lock each instance to its own CPU.

D.

Start mysqld or mysqld_safe using different option files for each instance.

E.

Run mysqld with --datadir defined for each instance.

F.

Use resource groups to lock different instances on separate CPUs.

Full Access
Question # 7

Examine this command and output:

1z0-908 question answer

Which two options will improve the security of the MySQL instance? (Choose two.)

A.

Remove group read/write privileges from the private_key.pem file.

B.

Remove world read privileges from the server-cert.pem certificate file.

C.

Change the group ownership of the mysql directory to the mysql user group.

D.

Remove world read privileges from the public_key.pem file.

E.

Change the parent directory owner and group to mysql.

F.

Remove the world read/execute privilege from the accounting directory.

Full Access
Question # 8

User account baduser@hostname on your MySQL instance has been compromised.

Which two commands stop any new connections using the compromised account? (Choose two.)

A.

ALTER USER baduser@hostname PASSWORD DISABLED;

B.

ALTER USER baduser@hostname MAX_USER_CONNECTIONS 0;

C.

ALTER USER baduser@hostname ACCOUNT LOCK;

D.

ALTER USER baduser@hostname IDENTIFIED WITH mysql_no_login;

E.

ALTER USER baduser@hostname DEFAULT ROLE NONE;

Full Access
Question # 9

Which two are valid uses for binary logs on a MySQL instance? (Choose two.)

A.

recording the order in which queries are issued

B.

audit of all queries

C.

point-in-time recovery

D.

replication

E.

logging the duration and locks for all queries

Full Access
Question # 10

Which three actions are effective in capacity planning? (Choose three.)

A.

buying more RAM

B.

monitoring OS resources for patterns

C.

adding circular replication nodes for increased DML capability

D.

buying more CPU

E.

buying more disk

F.

basing expected growth on an average of the last 3 years

G.

consulting the application team about any future projects and use

Full Access
Question # 11

Which statement is true about InnoDB persistent index statistics?

A.

Updating index statistics is an I/O expensive operation.

B.

Index statistics are calculated from pages buffered in the buffer pool for tables with InnoDB storage engine.

C.

Setting innodb_stats_auto_recalc=ON causes statistics to be updated automatically when a new index is created.

D.

Execution plans based on transient index statistics improve precision when

innodb_stats_persistent_sample_pages is increased.

E.

Increasing innodb_stats_persistent_sample_pages determines higher pages scanning speed, at the cost of increased memory usage.

F.

Tables are scanned and index statistics recalculated when an instance is restarted.

Full Access
Question # 12

Your MySQL server is running on the Microsoft Windows platform.

Which three local connection protocols are available to you? (Choose three.)

A.

named pipes

B.

shared memory

C.

SOCKET

D.

X Protocol

E.

UDP

F.

TCP/IP

Full Access
Question # 13

Which two statements are true about the mysqld-auto.cnf file? (Choose two.)

A.

This file is for storing MySQL Server configuration options in ISON format.

B.

This file is for logging purposes only and is never processed.

C.

It is read and processed at the beginning of startup configuration.

D.

It is read and processed at the end of startup configuration.

E.

It is always updated with changes to system variables.

F.

This file is for storing MySQL server_uuid values only.

Full Access
Question # 14

On examination, your MySQL installation datadir has become recursively world read/write/executable.

What are two major concerns of running an installation with incorrect file privileges? (Choose two.)

A.

Users could overwrite configuration files.

B.

Data files could be deleted.

C.

SQL injections could be used to insert bad data into the database.

D.

MySQL binaries could be damaged, deleted, or altered.

E.

Extra startup time would be required for the MySQL server to reset the privileges.

Full Access
Question # 15

A MySQL server is monitored using MySQL Enterprise Monitor’s agentless installation.

Which three features are available with this installation method? (Choose three.)

A.

MySQL Replication monitoring

B.

network-related information and network characteristics

C.

MySQL Query Analysis data

D.

CPU utilization

E.

security-related advisor warnings

F.

operating system memory utilization

G.

disk usage and disk characteristics including disk advisors warnings

Full Access
Question # 16

Which two statements are true about using backups of the binary log? (Choose two.)

A.

Multiple binary logs can be used to restore data.

B.

Multiple binary logs can be applied in parallel for faster data restoration.

C.

Binary logs are relatively small, and therefore, excellent for long-term storage and disaster recovery.

D.

Binary logs can always be used to unapply unwanted schema changes.

E.

They allow for point-in-time recovery of the data.

Full Access
Question # 17

You have just installed MySQL on Oracle Linux and adjusted your /etc/my.cnf parameters to suit your installation.

Examine the output:

1z0-908 question answer

What statement is true about the start attempt?

A.

MySQL server was not started due to a problem while executing process 2732.

B.

MySQL server continued to start up even though another process existed.

C.

systemd found the mysqld service disabled and failed to start it.

D.

systemd waited for 30 seconds before timing out and start up failed.

E.

systemd attempted to start mysqld, found another systemd mysqld process running, and shut it down.

Full Access
Question # 18

Which two are use cases of MySQL asynchronous replication? (Choose two.)

A.

You can scale writes by creating a replicated mesh.

B.

It guarantees near real-time replication between a master and a slave.

C.

You can scale reads by adding multiple slaves.

D.

MySQL Enterprise Backup will automatically back up from an available slave.

E.

It allows backup to be done on the slave without impacting the master.

Full Access
Question # 19

Examine this statement and output:

1z0-908 question answer

Which two SQL statements can jsmith execute? (Choose two.)

A.

UPDATE world.country SET Name='all';

B.

UPDATE world.country SET Name='one' LIMIT 1;

C.

UPDATE world.country SET Name='new' WHERE Name='old';

D.

UPDATE world.country SET Name=CONCAT('New ',Name);

E.

UPDATE world.country SET Name='first' ORDER BY Name LIMIT

Full Access
Question # 20

Examine Joe's account:

CREATE USER 'joe'@'%' IDENTIFIED BY '*secret*'

GRANT ALL PRIVILEGES ON *.* TO 'joe'@'%'

All existing connections for joe are killed.

Which two commands will stop joe establishing access to the MySQL instance? (Choose two.)

A.

ALTER USER 'joe'@'%' ACCOUNT LOCK

B.

ALTER USER 'joe'@'%' SET password='*invalid*'

C.

REVOKE ALL PRIVILEGES ON *.* FROM 'joe'@'%'

D.

ALTER USER 'joe'@'%' PASSWORD HISTORY 0

E.

ALTER USER 'joe'@'%' IDENTIFIED BY '*invalid*' PASSWORD EXPIRE

F.

REVOKE USAGE ON *.* FROM 'joe'@'%'

Full Access
Question # 21

You have a MySQL system with 500 GB of data that needs frequent backups.

You use a mix of MyISAM and InnoDB storage engines for your data. Examine your backup requirement:

  • The MySQL system being backed up can never be unavailable or locked to the client applications.
  • The recovery from the backup must work on any system.
  • Only 1 hour of data can be lost on recovery of the backup.

Which option fulfills all backup requirements?

A.

Take a physical backup of the MySQL system.

B.

Use the Clone Plugin to copy the data to another MySQL system.

C.

Take a logical backup of the MySQL system.

D.

Take your backup from a slave of the MySQL system.

Full Access