Which four authentication protocols are allowed when using MySQL Enterprise Authentication?
A. Native Windows services
B. authentication via Pluggable Authentication Modules (PAMs)
C. Simple Authentication and Security Layer
D. SECURID authentication and authorization identity
E. authentication using SHA-256 password hashing
F. connections through the local host via the UNIX socket file
You need to change the password level for a test system. Which two allow to change this level before you create new test user/passwords?
A. Add validate_password='new level' in the [security] section of the MySQL configuration file.
B. SET GLOBAL validate_password_policy='new level';
C. SET GLOBAL force_password_complex_policy=0;
D. Add validate_password_policy='new level' in the [mysqld] section of the MySQL configuration file.
Which is a correct example of creating an Enterprise Encryption function?
A. SET @function = CREATE_ASYMMETRIC_PRIV_KEY(@algo, @key_len);
B. CREATE FUNCTION asymmetric_decrypt RETURNS STRING SONAME 'openss1_udf.so';
C. INSERT INTO t1 (key_co1) FUNCTION(CREATE_ASYMMETRIC_PRIV_KEY('RSA', 1024));
D. VALIDATE FUNCTION create_asymmetric_priv_key WITH 'openssl_udf.so';
Which best describes database horizontal scale-out architecture deployment in MySQL in a read- heavy environment?
A. Allocating more CPU to the database instance to improve throughput performance.
B. Deploy MySQL read-only slaves utilizing replication so that the slaves can be used for reads.
C. Increasing the memory capacity so that there is a larger pooling buffer to increase the database read performance.
D. Adding more MySQL servers and sharing the same dacadir on a shared storage component like NFS.
E. Increasing the storage capacity so that the database can store more data to scale.
Which is true about inserting an additional line in a single document stored in MySQL document store?
A. You specify the new element's position in the JSON_ARRAY_INSERT statement.
B. Any new lines can only be inserted at the end of the document.
C. You cannot insert a single line, you have to replace the entire document with a new document.
D. The path specified must be an array position past the end of an array using the JSON_POSITION statement.
Which three installation options are available for installing the MySQL Enterprise Monitor/Agent on Linux?
A. A GUI for installing MySQL Enterprise Monitor, Agent, and a MySQL Repository database
B. A CLI-based wizard MySQL Enterprise Monitor, Agent, and a MySQL Repository database
C. A script (with an option file) for installing MySQL Enterprise Monitor, Agent, and a MySQL Repository database
D. A MySQL Enterprise Monitor to remotely deploy the MySQL Monitor Agent
E. A browser-based wizard to remotely deploy the MySQL Monitor Agent
Which two statements are true about MySQL Enterprise Firewall?
A. On Windows systems, MySQL Enterprise Firewall is controlled and managed by using the Windows Internet Connection Firewall control panel.
B. The firewall functionality is dependent upon SHA-256 and ANSI-specific functions built in to the mysql.firewall table. These functions cannot be deleted, even by the root user.
C. MySQL Enterprise Firewall is available only in MySQL Enterprise versions 5.7.10.and later.
D. Server-side plug-ins named MYSQL_FIREWALL_USERS and MYSQL_FIREWALL-WHITELIST implement INFORMATION_SCHEMA tables that provide views into the firewall data cache.
E. System tables named firewall_users and firewall_whitelist in the mysql database provide persistent storage of firewall data.
F. MySQL Enterprise Firewall shows only notifications blocked connections, which originated outside of your network's primary domain.
The user `fwuser'@'localhost% was registered with the MySQL Enterprise Firewall and was granted privileges for the SAKILA database. You executed the commands: You want to clear the account whitelist for the * fwuser" @* localhost* user. Which statement should you run to accomplish this?
A. Option A
B. Option B
C. Option C
D. Option D
Which MySQL Enterprise Edition plug-in replaces real values with substitutes?
A. MySQL Enterprise Audit
B. MySQL Enterprise Scalability
C. MySQL Enterprise No-Login Authentication
D. MySQL Enterprise Transparent Data Encryption (TDE)
E. MySQL Enterprise Data Masking and De-identification
Which two statements are true about MySQL Enterprise Authentication?
A. MySQL Enterprise Authentication makes it more difficult to set up security because you have different sets of security policies.
B. MySQL Enterprise Authentication determines what operation the user can perform.
C. MySQL Enterprise Authentication supports Linux Pluggable Authentication Modules (PAM).
D. MySQL Enterprise Authentication supports Windows Active Directory.
E. MySQL Enterprise Edition automatically connects to Oracle Password Vault to verify user passwords..