多项选择题Which two are correct steps in taking a binary backup of MyISAM tables?()

A.Always stop the server prior to the backup
B.Stop the server or lock the tables prior to the backup
C.Stop the server or lock the databases prior to the backup
D.Make a copy of the .frm, .myd, and the .myi files
E.Make a copy of the binary log and tablespace files


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which statement is true about FLUSH LOGS command?()

A.It requires the RELOAD, FILE, and DROP privileges
B.It closes and reopens all log files
C.It closes and sends binary log files to slave servers
D.It flushes dirty pages in the buffer pool to the REDO logs

2.单项选择题Identify a performance impact when using the Performance Schema.()

A.There is no impact on performance
B.The overhead depends on the settings of the Performance Schema
C.There is an overhead for querying the Performance Schema but not for having it enabled
D.There is a constant overhead regardless of settings and workload

4.单项选择题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()

A.The attribute "STATUS" is set to the string EXTERNAL_AUTH
B.The attribute "PRIV_USER" contains the username
C.The event type that is given in the attribute "NAME" is EXTERNAL_AUTH
D.There is no differentiation between native and external authentication events
E.External authentication is managed through external auditing logs
F.The "PROXY_PRIV" user shows a username if external authentication is used

5.多项选择题

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:

Which two points can be concluded from the given event?()

A.A connection as the user kate was successful
B.A connection failed due to authentication being unsuccessful
C.A connection was attempted via socket rather than TCP
D.A connection was blocked by a firewall or a similar security mechanism
E.A connection failed because the proxy user privileges did not match the login user

6.多项选择题Which three statements are characteristic of the MEMORY storage engine?()

A.It can support transactions
B.Table contents are not saved if the server is restarted
C.It cannot contain text or BLOB columns
D.It can support foreign keys
E.Each table is represented on disk as an.frm file
F.Each table has a corresponding.MYI and .MYD file

7.多项选择题Consider typical High Availability (HA) solutions that do not use shared storage. Which three HA solutions do not use shared storage?()

A.Mysql NDB Cluster
B.Mysql Replication
C.Distributed Replicated Block Device (DRBD) and Mysql
D.Windows Cluster and Mysql
E.Solaris Cluster and Mysql

8.单项选择题

Consider the query:
Mysql> SET @run = 15;
Mysql> EXPLAIN SELECT objective, stage, COUNT (stage)
FROM iteminformation
WHERE run=@run AND objective=’7.1’
GROUP BY objective,stage
ORDER BY stage;

The iteminformation table has the following indexes;
Mysql> SHOW INDEXES FROM iteminformation:

This query is run several times in an application with different values in the WHERE clause in a growing data set.
What is the primary improvement that can be made for this scenario?()

A.Do not pass a user variable in the WHERE clause because it limits the ability of the optimizer to use indexes
B.Add an index on the objective column so that is can be used in both the WHERE and GROUP BY operations
C.Drop the run_2 index because it has caused a conflict in the choice of key for this query
D.Execute the run_2 index because it has caused a conflict in the choice of key for this query
E.Add a composite index on (run,objective,stage) to allow the query to fully utilize an index

9.多项选择题What are three actions performed by the mysql_secure_installation tool?()

A.It prompts you to set the root user account password
B.It checks whether file permissions are appropriate within datadir
C.It asks to remove the test database, which is generated at installation time
D.It can delete any anonymous accounts
E.It verifies that all users are configuration with the longer password hash

10.多项选择题In a design situation, there are multiple character sets that can properly encode your data. Which three should influence your choice of character set?()

A.Syntax when writing queries involving JOINS
B.Memory usage when working with the data 
C.Character set mapping index hash size
D.Disk usage when storing data

最新试题

Consider the following:Which statement best describes the meaning of the value for the key_len column?()

题型:单项选择题

Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start.Which two statements would explain why the service did not start?()

题型:多项选择题

A general purpose MySQL instance is configured with the following options:—log-slow-queries—long-query-time=,0001—log-slow-admin-queries—general-log—log-bin—binlog-format=STATEMENT—innodb-flush-log-at-trx-commit=1Which three statements are true()。

题型:多项选择题

Which two options describe how MySQL Server allocates memory?()

题型:多项选择题

Which three methods will show the storage engine for the Country table?()

题型:多项选择题

Which three are properties of the MyISAM storage engine?()

题型:多项选择题

Which two statements are true about setting the per-thread buffers higher than required?()

题型:多项选择题

Which two capabilities are granted with the SUPER privilege?()

题型:多项选择题

Which three tasks can be performed by using the performance Schema?()

题型:多项选择题

You have a server that has very limited memory but has a very large table. You will use mysqldump to back up this table.Which option will ensure mysqldump will process a row at a time instead of buffering a set of rows?()

题型:单项选择题