Saturday 14 April 2018

MySQL Objective Q & A

QUESTION NO: 1  A simple master-to-slave replication is currently being used. The following information is extracted from the SHOW SLAVE STATUS output:
Last_SQL_Error: Error 'Duplicate entry '8' for key 'PRIMARY' ' on query. Default database: 'mydb'. Query: 'insert into mytable VALUES ('8' , 'George') '
Skip_Counter: 0
Retrieved _Gtid_Set: 38f32e23480a7-32a1-c323f78067fd37821: 1-8 Auto _Position: 1
You execute a “SHOW CREATE TABLE mytable” on the slave:
CREATE TABLE ‘mytable’ (
‘ID’ int(11) NOT NULL DEFAULT ‘0’, ‘name’ char(10) DEFAULT NULL, PRIMARY KEY (‘ID’)
) The table mytable on the slave contains the following:
You have issued a STOP SLAVE command. One or more statements are required before you can issue a START SLAVE command to resolve the duplicate key error.
Which statement should be used?
A. SET GLOBAL SQL_SKIP_SLAVE_COUNTER=1
B. SET GTID_NEXT=”CONSISTENCY”;
BEGIN; COMMIT;
SET GTID_NEXT=” AUTOMATIC’;
C. SET GLOBAL enforce_gtid_consistency=ON

D. SET GTID_EXECUTED=”38f32e23480a7-32a1-c323f78067fd37821 : 9”;
E. SET GTID_NEXT=”38f32e23480a7-32a1-c323f78067fd37821 : 9”; BEGIN; COMMIT;
SET GTID_NEXT=”AUTOMATIC”;
Answer: A
QUESTION NO: 2  Consider the following statement on a RANGE partitioned table:
ALTER TABLE orders DROP PARTITION p1, p3;
What is the outcome of executing the above statement?
A. Only the first partition (p1) will be dropped as only one can be dropped at any time.

B. All data in p1 and p3 partitions are removed, but the table definition remains unchanged.

C. A syntax error will result as you cannot specify more than one partition in the same statement.
D. All data in p1 and p3 partitions are removed and the table definition is changed.
Answer: D
QUESTION NO: 3  You inherit a legacy database system when the previous DBA, Bob, leaves the company. You are notified that users are getting the following error:
mysql> CALL film_in_stock (40, 2, @count);
ERROR 1449 (HY000): The user specified as a definer (‘bon’@’localhost’) does not exist
How would you identify all stored procedures that pose the same problem?
A. Execute SELECT * FROM mysql.routines WHERE DEFINER=’bob@localhost’;.
B. Execute SHOW ROUTINES WHERE DEFINER=’bob@localhost’.

C. Execute SELECT * FROM INFORMATION_SCHEMA. ROUTINES WHERE DEFINER=’bob@localhost’;.
D. Execute SELECT * FROM INFORMATION_SCHEMA. PROCESSLIST WHERE USER=’bob’ and HOST=’ localhost’;.

E. Examine the Mysql error log for other ERROR 1449 messages.
Answer: C
Explanation: The processlist table has only the connected session info. The mysql.proc and information_schema.routines has the SP/routines and functions info including the definer and definition code.
QUESTION NO: 4  When designing an InnoDB table, identify an advantage of using the BIT datatype Instead of one of the integer datatypes.
A. BIT columns are written by InnoDB at the head of the row, meaning they are always the first to be retrieved.

B. Multiple BIT columns pack tightly into a row, using less space.

C. BIT (8) takes less space than eight TINYINT fields.
D. The BIT columns can be manipulated with the bitwise operators &, |, ~, ^, <<, and >>. The other integer types cannot.
Answer: B
QUESTION NO: 5  ROW-based replication has stopped working. You investigate the error log file and find the following entries:
2013-08-27 14:15:47 9056 [ERROR] Slave SQL: Could not execute Delete_rows event on table test.t1; Can’t find record in ‘t1’, Error_code: 1032; handler error
HA_ERR_KEY_NOT_FOUND; the event’s master log 56_master-bin. 000003, end_log_pos 851, Error_code: 1032
2013-08-27 14:15:47 9056 [warning] Slave: Can’t find record in ‘t1’ Error_code: 1032 2013-08-27 14:15:47 9056 [ERROR] Error running query, slave SQL thread aborted.
Fix the problem, and restart the slave SQL thread with “SLAVE START”. We stopped at log ‘56_master- bin. 000003’ position 684
Why did you receive this error?
A. The slave SQL thread does not have DELETE privileges to execute on test.t1 table.s

B. The table definition on the slave -litters from the master.

C. Multi-threaded replication slaves can have temporary errors occurring for cross database updates.

D. The slave SQL thread attempted to remove a row from the test.t1 table, but the row did not exist.
Answer: D
QUESTION NO: 6  Mysqldump was used to create a single schema backup;
Shell> mysqldump –u root –p sakila > sakila2013.sql
Which two commands will restore the sakila database without interfering with other running database?
A. Mysql> USE sakila; LOAD DATA INFILE ‘sakila2013.sql’;

B. Shell> mysql –u root –p sakila <sakila2013.sql

C. Shell> mysqlimport –u root –p sakila sakila2013.sql

D. Shell> mysql –u root -p –e ‘use sakila; source sakila2013.sql’
E. Shell> mysql –u root –p –silent < sakila2013.sql
Answer: B,D

QUESTION NO: 7  Consider the Mysql Enterprise Audit plugin.
You are checking user accounts and attempt the following query:
Mysql> SELECT user, host, plugin FROM mysql.users; ERROR 1146 (42S02): Table ‘mysql.users’ doesn’t exist
Which subset of event attributes would indicate this error in the audit.log file?
A. NAME=”Query”
STATUS=”1146”
SQLTEXT=”select user,host from users”/>

B. NAME=”Error”
STATUS=”1146”
SQLTEXT=”Error 1146 (42S02): Table ‘mysql.users’ doesn’t exist”/>
C. NAME=”Query”
STATUS=”1146”
SQLTEXT=” Error 1146 (42S02): Table ‘mysql.users’ doesn’t exist”/>
D. NAME=”Error”
STATUS=”1146”
SQLTEXT=”select user,host from users”/>

E. NAME=”Error”
STATUS=”0”
SQLTEXT=”Error 1146 (42S02): Table ‘mysql.users’ doesn’t exist”/>
Answer: A
QUESTION NO: 8  Which query would you use to find connections that are in the same state for longer than 180 seconds?
A. SHOW FULL PROCESSLIST WHEER Time > 180;

B. SELECT * FROM INFORMATION_SCHEMA.EVENTS SHERE STARTS < (DATE_SUB (NOW ( ), INTERVAL 180 SECOND) );

C. SELECT * FROM INFORMATION_SCHEMA.SESSION_STATUS WHERE STATE < (DATE_SUB (NOW ( ), INTERVAL 180 SECOND) );

D. SELECT * FROM INFORMATION_SCHEMA.PROCESSLIST WHERE TIME > 180;
Answer: D

Explanation: The show processlist cannot use where clause.
mysql> show full processlist where time>0;
ERROR 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'where time>0' at line 1
QUESTION NO: 9  A database exists as a read-intensive server that is operating with query_cachek_type = DEMAND.
The database is refreshed periodically, but the resultset size of the queries does not fluctuate.
Note the following details about this environment:
- A web application uses a limited set of queries.
- The Query Cache hit rate is high.
- All resultsets fit into the Query Cache.
- All queries are configured to use the Query Cache successfully.
The response times for queries have recently started to increase. The cause for this has correctly been identified as the increase in the number of concurrent users accessing the web service.
Based solely on the information provided, what is the most likely cause for this slowdown at the database level?
A. The Query Cache is pruning queries due to an increased number of requests.

B. Query_cache_min_res_unit has been exceeded, leading to an increased performance overhead due to additional memory block lookups.

C. Mutex contention on the Query Cache is forcing the queries to take longer due to its single- threaded nature.

D. The average resultset of a query is increasing due to an increase in the number of users requiring SQL statement execution.
Answer: C
QUESTION NO: 10  You have a login-path named “adamlocal” that was created by using the mysql_config_editor command.
You need to check what is defined for this login_path to ensure that it is correct for you deployment.
You execute this command:
$ mysql_config_editor print –login-path=adamlocal
What is the expected output of this command?
A. The command prints all parameters for the login-path. The password is printed in plain text.
B. The command prints all parameters for the login-path. The password is shown only when you provide the –password option.

C. The command prints all parameter for the login-path. The password is replaced with stars.

D. The command prints the encrypted entry for the login-path. The is only possible to see if an entry exists.
Answer: C
QUESTION NO: 11  You are using replication and the binary log files on your master server consume a lot of disk space.
Which two steps should you perform to safely remove some of the older binary log files?
A. Ensure that none of the attached slaves are using any of the binary logs you want to delete.
B. Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files.

C. Execute the PURGE BINARY LOGE NOT USED command.
D. Remove all of the binary log files that have a modification date earlier than today.
E. Edit the .index file to remove the files you want to delete.
Answer: A,B
Explanation: A: To safely purge binary log files, follow this procedure:
B: Syntax:
PURGE { BINARY | MASTER } LOGS
{ TO 'log_name' | BEFORE datetime_expr }
QUESTION NO: 12  Which two statements are true about InnoDB auto-increment locking?
A. The auto-increment lock can be a table-level lock.

B. InnoDB never uses table-level locks.

C. Some settings for innodb_autoinc_lock_mode can help reduce locking.
D. InnoDB always protects auto-increment updates with a table-level lock.
E. InnoDB does not use locks to enforce auto-increment uniqueness.
Answer: A,D

Explanation: A (not B): InnoDB uses a special lock called the table-level AUTO-INC lock for inserts into tables with AUTO_INCREMENT columns.
D (Not E): This lock is normally held to the end of the statement (not to the end of the transaction), to ensure that auto-increment numbers are assigned in a predictable and repeatable order for a given sequence of INSERT statements.
QUESTION NO: 13 Consider the Mysql Enterprise Audit plugin.
A CSV file called data.csv has 100 rows of data.
The stored procedure prepare_db ( ) has 10 auditable statements.
You run the following statements in the mydb database:
Mysql> CALL prepare_db ( );

Mysql> LOAD DATA INFILE ‘/tmp/data.cav’ INTO TABLE mytable;
Mysql> SHOW TABLES;
How many events are added to the audit log as a result of the preceding statements?
A. 102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event.
B. 3; only the top-level statements are logged.

C. 111; top-level statements and all lower-level statements are logged.

D. 12; only top-level statements and stored procedure events are logged.
Answer: B
QUESTION NO: 14  You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions.
C: \> mysqld – install Mysql56 – defaults – file = C : \my –opts.cnf
What is the expected outcome?
A. Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: \my-opts.cnf configuration file.
B. Mysql is installed as the Windows service name Mysql56, and uses c: \my-opts.cnf as the configuration file
C. An error message is issued because – install is not a valid option for mysqld.

D. A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: \my-opts.cnf.
Answer: B
QUESTION NO: 15  Consider the events_% tables in performance Schema.
Which two methods will clear or reset the collected events in the tables?
A. Using DELETE statements, for example, DELETE FROM performance_schema.events_watis_current;

B. Using the statement RESET PERFORMANCE CACHE;

C. Using the statement FLUSH PERFORMANCE CACHE;

D. Using TRUNCATE statements, for example, TRUNCATE TABLE performance_schema.events_waits_current;
E. Disabling and re-enabling all instruments
F. Restarting Mysql
Answer: D,E

Explanation: D: To avoid unpredictable results if you make timer changes, use TRUNCATE TABLE to reset Performance Schema statistics.
Example:
As with other aggregate tables within Performance Schema, you can reset the statistics within the digest table with:
TRUNCATE TABLE performance_schema.events_statements_summary_by_digest;
QUESTION NO: 16  What are four capabilities of the mysql client program?
A. Creating and dropping databases

B. Creating, dropping, and modifying tables and indexes

C. Shutting down the server by using the SHUTDOWN command

D. Creating and administering users
E. Displaying replication status information

F. Initiating a binary backup of the database by using the START BACKUP command
Answer: A,B,C,D,E
QUESTION NO: 17  Assume that you want to know which Mysql Server options were set to custom values.
Which two methods would you use to find out?
A. Check the configuration files in the order in which they are read by the Mysql Server and compare them with default values.

B. Check the command-line options provided for the Mysql Server and compare them with default values.

C. Check the output of SHOW GLOBAL VARIABLES and compare it with default values.

D. Query the INFORMATION_SCHEMA.GLOBAL_VARIABLES table and compare the result with default values.
Answer: C,D
QUESTION NO: 18  You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands:
$ pidof mysqld 3132
$tail - n2 /var/lib.mysql/hostname.err
2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld: ready for connections. Version: ‘5.6.13-enterprise-commercial-advaced’ socket: ‘/tmp/mysql.sock’ port; 3306 Mysql Enterprise Server – Advanced Edition (Commercial)
You attempt to log in as the root user with the following command:
$mysql –u root
ERROR 1045 (28000): Access denied for user ‘root’@’localhost’ (using password: NO)
Which statement is true about this scenario?
A. The RPM installation script sets a default password of password for new installations.
B. The local root user must log in with a blank password initially: mysql –u root –p.
C. New security measures mean that the mysql_secure_installation script must be run first on all new installations.

D. The mysql_install_bd post-installation script used – random-password.
Answer: B
QUESTION NO: 19  A Mysql Server has been running an existing application successfully for six months.
The my.cnf is adjusted to contain the following additional configuration:
[mysqld] Default-authentication-plugin=sha256_password
The Mysql Server is restarted without error.
What effect will the new configuration have in existing accounts?
A. They will have their passwords updated on start-up to sha256_password format.

B. They will have to change their password the next time they login to the server.

C. They are not affected by this configuration change.

D. They all connect via the secure sha256_password algorithm without any configuration change.
Answer: D
QUESTION NO: 20  In a design situation, there are multiple character sets that can properly encode your data.
Which three should influence your choice of character set?
A. Disk usage when storing data

B. Syntax when writing queries involving JOINS

C. Comparing the encoded data with similar columns on other tables
D. Memory usage when working with the data
E. Character set mapping index hash size
Answer: C,D,E
QUESTION NO: 21  What are three actions performed by the mysql_secure_installation tool?
A. It prompts you to set the root user account password.

B. It checks whether file permissions are appropriate within datadir.

C. It asks to remove the test database, which is generated at installation time.
D. It can delete any anonymous accounts.
E. It verifies that all users are configuration with the longer password hash.
Answer: A,C,D
QUESTION NO: 22  Consider the query:
Mysql> SET @run = 15;

Mysql> EXPLAIN SELECT objective, stage, COUNT (stage) FROM iteminformation
WHERE run=@run AND objective=’7.1’
GROUP BY objective,stage
ORDER BY stage;
 
The iteminformation table has the following indexes;
Mysql> SHOW INDEXES FROM iteminformation:
This query is run several times in an application with different values in the WHERE clause in a growing data set.
What is the primary improvement that can be made for this scenario?
A. Execute the run_2 index because it has caused a conflict in the choice of key for this query.

B. Drop the run_2 index because it has caused a conflict in the choice of key for this query.

C. Do not pass a user variable in the WHERE clause because it limits the ability of the optimizer to use indexes.

D. Add an index on the objective column so that is can be used in both the WHERE and GROUP BY operations.
E. Add a composite index on (run,objective,stage) to allow the query to fully utilize an index.
Answer: B
QUESTION NO: 23  Consider typical High Availability (HA) solutions that do not use shared storage.
Which three HA solutions do not use shared storage?
A. Mysql Replication

B. Distributed Replicated Block Device (DRBD) and Mysql
C. Windows Cluster and Mysql

D. Solaris Cluster and Mysql

E. Mysql NDB Cluster
Answer: A,B,E
QUESTION NO: 24  Which three statements are characteristic of the MEMORY storage engine?
A. Each table is represented on disk as an.frm file.

B. Each table has a corresponding.MYI and .MYD file.
C. It can support foreign keys.

D. It cannot contain text or BLOB columns.

E. Table contents are not saved if the server is restarted.
F. It can support transactions
Answer: A,D,E
QUESTION NO: 25  Consider the Mysql Enterprise Audit plugin.
The following event detail is found in the audit log:
<AUDIT_RECORD TIMESTAMP=”2013-04-09t01:54:17” NAME=”Connect” CONNECTION_ID=”3” STATUS=”1045”
USER=”kate” PROXY_USER=”” HOST=”localhost” IP=””
DB=””/>
Which two points can be concluded from the given event?
A. A connection was blocked by a firewall or a similar security mechanism.

B. A connection was attempted via socket rather than TCP.

C. A connection failed because the proxy user privileges did not match the login user.
D. A connection as the user kate was successful.

E. A connection failed due to authentication being unsuccessful.
Answer: B,E
Explanation: B: <IP>
A string representing the client IP address. This element appears only if the <NAME> value is Connect, Change user, or Query.
Example:
<IP>127.0.0.1</IP>
E: ERROR 1045 (28000): Access denied for user
QUESTION NO: 26  Consider the Mysql Enterprise Audit plugin.
Which statement is true when you identify a connection event that has used external authentication?
A. The attribute “STATUS” is set to the string EXTERNAL_AUTH.
B. The attribute “PRIV_USER” contains the username.

C. The event type that is given in the attribute “NAME” is EXTERNAL_AUTH.

D. There is no differentiation between native and external authentication events.
E. External authentication is managed through external auditing logs.

F. The “PROXY_PRIV” user shows a username if external authentication is used.
Answer: C
QUESTION NO: 27  You are having problems with connections from a specific host (192.168.1.15) not closing down correctly. You want to find the state of the threads from that host check for long-running queries.
Which statement will accomplish this?
A. SELECT * FROM INFORMATION_SCHEMA.PROCESSLIST WHERE HOST=’192.168.1.15’;
B. SELECT * FROM INFORMATION_SCHEMA.EVENTS WHERE HOST=’ 192.168.1.15’;

C. SELECT * FROM INFORMATION_SCHEMA.STATISTICS WHERE HOST=’ 192.168.1.15’;
D. SELECT * FROM INFORMATION_SCHEMA.INNODB_METEICS WHERE HOST=’ 192.168.1.15’;
Answer: A
QUESTION NO: 28  Identify a performance impact when using the Performance Schema.
A. There is no impact on performance.

B. There is an overhead for querying the Performance Schema but not for having it enabled.
C. There is a constant overhead regardless of settings and workload.

D. The overhead depends on the settings of the Performance Schema.
Answer: D
QUESTION NO: 29  Which statement is true about FLUSH LOGS command?
A. It requires the RELOAD, FILE, and DROP privileges.
B. It closes and reopens all log files.

C. It closes and sends binary log files to slave servers.
D. It flushes dirty pages in the buffer pool to the REDO logs.
Answer: B
QUESTION NO: 30  Which two are correct steps in taking a binary backup of MyISAM tables?
A. Always stop the server prior to the backup.

B. Stop the server or lock the tables prior to the backup.

C. Stop the server or lock the databases prior to the backup.
D. Make a copy of the .frm, .myd, and the .myi files.

E. Make a copy of the binary log and tablespace files.

Answer: B,D