1z0 908 Demo
1z0 908 Demo
0 Database Administrator
Oracle 1z0-908
Version Demo
https://dumpsboss.com
support@dumpsboss.com
QUESTION NO: 1
You are having performance issues with MySQL instances. Those servers are monitored with MySQL Enterprise Monitor.
Using Query Analyzer, where do you begin to look for problem queries?
A. Sort the “Exec" column and check for SQL queries with low Query Response Time index (QRTi) values.
B. Look for queries with low total latency times in the Latency section in the times series graph.
C. Look for queries with big prolonged spikes in row activity/access graph in the times series graph.
D. Sort the “Exec" column and check for SQL queries with high Query Response Time index (QRTi) values.
ANSWER: C
QUESTION NO: 2
Which two actions are required to complete the restore? (Choose two.)
ANSWER: D G
C. They are good to use if only data structures must be backed up but not log files.
D. They are good to use when many users are online accessing the database.
ANSWER: A
QUESTION NO: 4
A. The country table is accessed as the first table, and then joined to the city table.
C. The optimizer estimates that 51 rows in the country table have Continent = ‘Asia’.
ANSWER: C D
QUESTION NO: 5
B. MySQL Router configures itself based on the information retrieved from the InnoDB cluster metadata server.
D. MySQL Router configures all the cluster nodes based on the information retrieved from the InnoDB cluster metadata
server.
ANSWER: B
Explanation:
Reference: https://dev.mysql.com/doc/mysql-router/8.0/en/mysqlrouter.html
QUESTION NO: 6
Which two methods allow a DBA to reset a user's password? (Choose two.)
B. mysql_secure_installation utility
E. GRANT statement
ANSWER: A C
QUESTION NO: 7
Which three settings control global buffers shared by all threads on a MySQL server? (Choose three.)
A. sort_buffer_size
B. key_buffer_size
C. table_open_cache
D. read_buffer_size
E. innodb_buffer_pool_size
ANSWER: A B F
Explanation:
Reference: https://docs.oracle.com/cd/E17952_01/mysql-5.7-en/server-system-variables.html
QUESTION NO: 8
Your MySQL environment has asynchronous position based-replication with one master and one slave.
You determined that the slave relay log files were corrupted and unusable, but no other files are damaged.
A. The slave relay logs should be deleted; then execute START SLAVE;
B. The relay logs from the master should be used to replace the corrupted relay logs.
C. The slave relay logs should be deleted; execute CHANGE MASTER to adjust the replication relay log file name, then
issue start SLAVE;
ANSWER: B
QUESTION NO: 9
B. Firewall_access_denied is the number of connection attempts from prohibited hosts that are denied.
C. Firewall_access_suspicious is the number of statements logged as suspicious for users in DETECTING mode.
ANSWER: C
QUESTION NO: 10
On examination, your MySQL installation datadir has become recursively world read/write/executable.
What are two major concerns of running an installation with incorrect file privileges? (Choose two.)
C. SQL injections could be used to insert bad data into the database.
E. Extra startup time would be required for the MySQL server to reset the privileges.
ANSWER: B E