Examine this command and output:
Which two statements are true? (Choose two.)
A. The lock is at the metadata object level.
B. The lock is a shared lock.
C. The lock is an intentional lock.
D. The lock is at the table object level.
E. The lock is a row-level lock.
F. The lock is an exclusive lock.
Examine this query:
What information does this query provide?
A. total memory used across all connections associated with the user on connection number 10
B. total memory used by the first 10 connections
C. total memory used by thread number 10
D. total memory used across all connections associated with the user on thread number 10
E. total memory used by connection number 10
F. total memory used by the first 10 threads
Which two statements are true about MySQL Enterprise Backup? (Choose two.)
A. It supports backing up only table structures.
B. It can perform hot or warm backups.
C. It creates logical backups.
D. It supports the creation of incremental backups.
E. It supports backup of a remote MySQL system.
F. It supports restoring to a remote MySQL system.
Examine this statement: mysql> DROP ROLE r_role1, r_role2; Which two are true? (Choose two.)
A. It fails if any of the roles is specified in the mandatory_roles variable.
B. You must revoke r_role1 and r_role2 from all users and other roles before dropping the roles.
C. Existing connections can continue to use the roles' privileges until they reconnect.
D. You must revoke all privileges from r_role1 and r_role2 before dropping the roles.
E. It fails if you do not have the ADMIN OPTION of the roles r_role1 and r_role2.
F. It fails if at least one of the roles does not exist.
You plan to install MySQL Server by using the RPM download. Which two statements are true? (Choose two.)
A. You can provide the root password interactively.
B. You must manually initialize the data directory.
C. The MySQL RPM package installation supports deploying multiple MySQL versions on the same host.
D. MySQL uses the RPM relocatable installation target feature.
E. The functionality is split among several RPM package files.
F. You can find the root password in the error log after the first start.
Examine these statements, which execute successfully: TRUNCATE test; BEGIN;
INSERT INTO test(id, name) VALUES(1, "Hello"); ROLLBACK;
SELECT id FROM test;
Which three storage engines would return a nonempty recordset for the test table when executing the statements? (Choose three.)
A. NDB
B. ARCHIVE
C. InnopB
D. BLACKHOLE
E. MEMORY
F. MyISAM
What does the binlog dump thread do?
A. It monitors and schedules the rotation/deletion of the binary logs.
B. It reads the relay log and executes the events contained in them.
C. It acquires a lock on the binary log for reading each event to be sent to the slave.
D. It connects to the master and asks it to send updates recorded in its binary logs.
t is a non-empty InnoDB table.
Examine these statements, which are executed in one session:
BEGIN;
SELECT * FROM t FOR UPDATE;
Which is true?
A. If OPTIMIZE TABLE; is invoked, it will create a table lock on t and force a transaction rollback.
B. If OPTIMIZE LOCAL TABLE t; is invoked from another session, it executes normally and returns the status.
C. mysqlcheck --analyze --all-databases will execute normally on all tables and return a report.
D. If ANALYZE TABLE; is invoked from the same session, it hangs until the transaction is committed or rolled back.
A colleague complains about slow response time on your website. Examine this query and output:
What is the most likely cause for the high number of lock waits?
A. You use the MyISAM storage engine for most common tables.
B. You use the InnoDB storage engine and statements wait while data is inserted.
C. The Innodb Buffer pool is full.
D. Your table accesses wait for the operating system level flush.
Examine this parameter setting:
audit_log=FORCE_LOG_PERMANENT
What effect does this have on auditing?
A. It will force the load of the audit plugin even in case of errors at server start.
B. It causes the audit log to be created if it does not exist.
C. It prevents the audit plugin from being removed from the running server.
D. It prevents the audit log from being removed or rotated.