多项选择题

A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ.
Which two will optimize the security of this setup?()
 

A.Disabling connections from named pipes or socket files (depending on the operating system of the server)
B.Enabling and using SSL for connections to the Mysql database
C.Installing Mysql on the application server, and running the database and application on the same server
D.Starting the server with – bind- address=0.0.0.0 specified
E.Running the server with – skip-networking specified
F.Limiting logins to originate from the application server or the server's subnet'


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题

The InnoDB engine has a feature known as clustered indexes.
Which three statements are true about clustered indexes as used in InnoDB?()

A.A primary key must exist for creation of a clustered index
B.A clustered index allows fulltext searching within InnoDB
C.The first unique index is always used as a clustered index and not a primary key
D.A clustered index provides direct access to a page containing row data
E.If no indexes exist, a hidden clustered index is generated based on row IDs
F.A primary key is used as a clustered index
G.A clustered index is a grouping of indexes from different tables into a global index for faster searching

2.多项选择题Which two events will cause a slave server to create a new relay log file?()

A.Execution of the FLUSH LOGS statement
B.Starting of the SQL thread
C.Reaching the slave_pendign _jobs_size_max limit
D.Execution of FULSH TABLES WITH READ LOCK
E.Starting of the I/O thread

3.单项选择题

You want to start monitoring statistics on the distribution of storage engines that are being used and the average sizes of tables in the various databases.
Some details are as follows:
The Mysql instance has 400 databases. Each database on an average consists of 25-50 tables. You use the query:
SELECT TABLE_SCHEMA, 'ENGINE', COUNT (*), SUM(data_length) total_size FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_TYPE= 'BASE TABLE' GROUP BY TABLE_SCHEMA, 'ENGINE' ;
Why is this query slow to execute?()

A.Collecting information requires large numbers of locks on various INFORMATION_SCHEMA tables
B.Aggregating details from various storage engine caches for the final output is time consuming
C.Collecting information requires various disk-level operations and is time consuming
D.Counting and summarizing all table pages in the InnoDB shared tablespace is time consuming

4.多项选择题Which two are correct steps in taking a binary backup of MyISAM tables?()

A.Always stop the server prior to the backup
B.Stop the server or lock the tables prior to the backup
C.Stop the server or lock the databases prior to the backup
D.Make a copy of the .frm, .myd, and the .myi files
E.Make a copy of the binary log and tablespace files

5.单项选择题Which statement is true about FLUSH LOGS command?()

A.It requires the RELOAD, FILE, and DROP privileges
B.It closes and reopens all log files
C.It closes and sends binary log files to slave servers
D.It flushes dirty pages in the buffer pool to the REDO logs

6.单项选择题Identify a performance impact when using the Performance Schema.()

A.There is no impact on performance
B.The overhead depends on the settings of the Performance Schema
C.There is an overhead for querying the Performance Schema but not for having it enabled
D.There is a constant overhead regardless of settings and workload

8.单项选择题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()

A.The attribute "STATUS" is set to the string EXTERNAL_AUTH
B.The attribute "PRIV_USER" contains the username
C.The event type that is given in the attribute "NAME" is EXTERNAL_AUTH
D.There is no differentiation between native and external authentication events
E.External authentication is managed through external auditing logs
F.The "PROXY_PRIV" user shows a username if external authentication is used

9.多项选择题

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:

Which two points can be concluded from the given event?()

A.A connection as the user kate was successful
B.A connection failed due to authentication being unsuccessful
C.A connection was attempted via socket rather than TCP
D.A connection was blocked by a firewall or a similar security mechanism
E.A connection failed because the proxy user privileges did not match the login user

10.多项选择题Which three statements are characteristic of the MEMORY storage engine?()

A.It can support transactions
B.Table contents are not saved if the server is restarted
C.It cannot contain text or BLOB columns
D.It can support foreign keys
E.Each table is represented on disk as an.frm file
F.Each table has a corresponding.MYI and .MYD file

最新试题

Which two statements are true about setting the per-thread buffers higher than required?()

题型:多项选择题

Which two capabilities are granted with the SUPER privilege?()

题型:多项选择题

Which three methods will show the storage engine for the Country table?()

题型:多项选择题

Which three data components are needed for point-in-time recovery?()

题型:多项选择题

MySQL is installed on a Linux server and has the following configuration:What is the purpose of changing ownership of datadir to the ‘mysql’ user?()

题型:单项选择题

You need to replicate a table from a master to a slave. The master and slave copies of the table will have different number of columns.Which two conditions must be true?()

题型:多项选择题

While reviewing the MySQL error log, you see occasions where MySQL has exceeded the number of file handles allowed to it by the operating system.Which method will reduce the number of file handles in use?()

题型:单项选择题

Which two options describe how MySQL Server allocates memory?()

题型:多项选择题

You are attempting to secure a MySQL server by using SSL encryption.On starting MySQL, you get this error:130123 10:38:02 [ERROR] mysqld: unknown option '—ssl'What is the cause of the error?()

题型:单项选择题

You have table 'apps','userdata' on server that uses MyISAM storage engine.You want to transfer this data to server but use InnoDB engine instead. You execute the following commands: ServerB commands:Shell> mysqldump –u root –h server –no-data apps userdata mysql –u root –p appsShell> mysql –u root –p –h server –e 'ALTER TABLE 'apps','userdata' ENGINE=InnoDB;'Shell> mysqldump –u root –p –h server –no-create-info –order-by-primary apps userdata mysql –u root –p appsWhat effect does the – order-by-primary argument have on the mysqldump command?()

题型:单项选择题