oracle 1z0-920 practice test

MySQL 2019 Implementation Essentials Exam


Question 1

Which two methods help prevent MySQL security risks?

  • A. Use a firewall to control access to MySQL ports.
  • B. Transmit plain (unencrypted) data over networks.
  • C. Ensure that MySQL accounts have short and easy passwords.
  • D. Allow unauthorized clients to connect to the server.
  • E. Use the secure installation script "mysql_alays_secure_installation".
  • F. Grant only permissions that a user requires.
Answer:

BD

Discussions

Question 2

Which two statements are true about MySQL Enterprise Authentication?

  • A. MySQL Enterprise Authentication makes it more difficult to set up security because you have different sets of security policies.
  • B. MySQL Enterprise Authentication determines what operation the user can perform.
  • C. MySQL Enterprise Authentication supports Linux Pluggable Authentication Modules (PAM).
  • D. MySQL Enterprise Authentication supports Windows Active Directory.
  • E. MySQL Enterprise Edition automatically connects to Oracle Password Vault to verify user passwords..
Answer:

CD

Discussions

Question 3

Which three prerequisites are needed for creating an Oracle Linux VM instance in the Oracle Cloud
Infrastructure?

  • A. Custom Image
  • B. Object Storage
  • C. existing VCN
  • D. bare metal Oracle Linux shape
  • E. ssh key pair
  • F. subnet configured on a Virtual Cloud Network (VCN)
Answer:

ABD

Discussions

Question 4

Which two statements about the download of MySQL Enterprise Backup are correct?

  • A. MySQL Enterprise Backup can be downloaded from My Oracle Support (MOS).
  • B. MySQL Enterprise Backup comes with MySQL Utilities Package, which is available for download publicly on http://www.mysql.com .
  • C. MySQL Enterprise Backup is a separate package from MySQL Enterprise Edition. It can be downloaded from https://edelivery.oracle.com .
  • D. MySQL Enterprise Backup comes with all MySQL editions including community edition.
  • E. MySQL Enterprise Backup comes with MySQL Connector and is freely available for download.
Answer:

CD

Discussions

Question 5

Which MySQL Enterprise Edition plug-in replaces real values with substitutes?

  • A. MySQL Enterprise Audit
  • B. MySQL Enterprise Scalability
  • C. MySQL Enterprise No-Login Authentication
  • D. MySQL Enterprise Transparent Data Encryption (TDE)
  • E. MySQL Enterprise Data Masking and De-identification
Answer:

E

Explanation:
New!MySQL Enterprise Masking and De-identification
MySQL Enterprise Masking and De-identification provides an easy to use, built-in database solution
to help organizations protect sensitive data from unauthorized uses by hiding and replacing real
values with substitutes.
https://www.mysql.com/products/enterprise/#:~:text=New!&text=MySQL%20Enterprise%20Maskin
g%20and%20De%2Didentification%20provides%20an%20easy%20to,replacing%20real%20values%2
0with%20substitutes.

Discussions

Question 6

The MySQL Enterprise Monitor Agent requires a user configured in each MySQL instance that is being
monitored with suitable privileges to collect information about the server.
Which statement is correct?

  • A. The super privilege is required when starting, stopping, or restarting monitored MySQL databases.
  • B. MySQL Enterprise Monitor creates the required users automatically.
  • C. The super privilege is required when creating and populating the inventory table, as well as running statements such as show master logs or SHOW ENGINE INNODB STATUS.
  • D. Monitoring metrics need super and root privileges because they are not available for a less- privileged user.
Answer:

C

Discussions

Question 7

Which three are requirements for MySQL Group Replication (GR)?

  • A. Data to be replicated must be stored in the InnoDB transactional storage engine.
  • B. The use of global transaction identifiers is required.
  • C. Primary keys are required on every replicated table.
  • D. GR only works with MySQL versions 8.0.12 or higher.
  • E. The binary log format must be set to mixed.
  • F. The minimum number of required nodes for achieving a consensus is two.
Answer:

ACE

Explanation:
https://dev.mysql.com/doc/refman/5.7/en/group-replication-requirements.html

Discussions

Question 8

The slave connects to the master and asks for updated records. What command was issued for this to
happen?

  • A. SLAVE RUN
  • B. SLAVE START
  • C. START RUN SLAVE
  • D. RUN SLAVE
  • E. START SLAVE
Answer:

B

Discussions

Question 9

Which three statements are true about MySQL Enterprise Backup?

  • A. It performs hot or warm backups.
  • B. It provides the ability to create incremental backups.
  • C. It cannot back up encrypted tablespaces.
  • D. It enables you to take non-locking backups.
  • E. It performs logical backups.
Answer:

BDE

Discussions

Question 10

You want to create the user named jenny for any host server with the password secretpassi23! and
the password is expired? Which command should you use?

  • A. CREATE USER 'jenny'@'%' IDENTIFIED WITH sha256_password BY ‘SecretPass123!';
  • B. CREATE USER ,jenny,0,%t IDENTIFIED BY 'SecretPass123!' PASSWORD EXPIRE;
  • C. CREATE USER 'jenny'@’%' WITH HASHED(password,'SecretPass123!'), PASSWORD EXPIRE
  • D. CREATE USER 'jenny *@'localhost' IDENTIFIED WITH HASH PASSWORD('SecretPass123!')
  • E. CREATE USER 'jenny'@'localhost' IDENTIFIED BY ('SecretPass123!','256', Expired)
Answer:

E

Discussions
To page 2