[Free] 2017(Jan) EnsurePass Pass4sure Oracle 1z0-883 Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2017 Jan Oracle Official New Released 1z0-883
100% Free Download! 100% Pass Guaranteed!

MySQL 5.6 Database Administrator

Question No: 31

Which three statements are true about memory buffer allocation by a MySQL Server?

  1. Global buffers such as the InnoDB buffer pool are allocated after the server starts, and are never freed.

  2. Thread buffers are allocated when a client connects, and are freed when the client disconnects.

  3. Buffers that are needed for certain operation are allocated when the operation starts, and freed when it ends.

  4. User buffers are allocated at server startup and freed when the user is dropped.

  5. All dynamic buffers that are set with a SET GLOBAL statement immediately get allocated globally, and are never freed.

Answer: A,B,C

Question No: 32

A database exists as a read-intensive server that is operating with query_cachek_type = DEMAND.

The database is refreshed periodically, but the resultset size of the queries does not fluctuate.

Note the following details about this environment:

->A web application uses a limited set of queries.

->The Query Cache hit rate is high.

->All resultsets fit into the Query Cache.

->All queries are configured to use the Query Cache successfully.

The response times for queries have recently started to increase. The cause for this has correctly been identified as the increase in the number of concurrent users accessing the web service.

Based solely on the information provided, what is the most likely cause for this slowdown at the database level?

  1. The Query Cache is pruning queries due to an increased number of requests.

  2. Query_cache_min_res_unit has been exceeded, leading to an increased performance overhead due to additional memory block lookups.

  3. Mutex contention on the Query Cache is forcing the queries to take longer due to its single-threaded nature.

  4. The average resultset of a query is increasing due to an increase in the number of users requiring SQL statement execution.

Answer: C

Question No: 33

Which three tasks can be performed by using the performance Schema?

  1. Finding queries that are not using indexes

  2. Finding rows that are locked by InnoDB

  3. Finding client connection attributes

  4. Finding the part of a code in which a single query is spending time

  5. Finding the size of each table

Answer: A,B,C

Question No: 34

Consider typical High Availability (HA) solutions that do not use shared storage. Which three HA solutions do not use shared storage?

  1. Mysql Replication

  2. Distributed Replicated Block Device (DRBD) and Mysql

  3. Windows Cluster and Mysql

  4. Solaris Cluster and Mysql

  5. Mysql NDB Cluster

Answer: A,B,E

Question No: 35

Consider the events_% tables in performance Schema.

Which two methods will clear or reset the collected events in the tables?

  1. Using DELETE statements, for example, DELETE FROM performance_schema.events_watis_current;

  2. Using the statement RESET PERFORMANCE CACHE;

  3. Using the statement FLUSH PERFORMANCE CACHE;

  4. Using TRUNCATE statements, for example, TRUNCATE TABLE performance_schema.events_waits_current;

  5. Disabling and re-enabling all instruments

  6. Restarting Mysql

Answer: D,E

Explanation: D: To avoid unpredictable results if you make timer changes, use TRUNCATE TABLE to reset Performance Schema statistics.


As with other aggregate tables within Performance Schema, you can reset the statistics within the digest table with:

TRUNCATE TABLE performance_schema.events_statements_summary_by_digest;

Reference: Performance Schema Event Timing http://dev.mysql.com/doc/refman/5.5/en/performance-schema-timing.html

Question No: 36

While reviewing the MySQL error log, you see occasions where MySQL has exceeded the number of file handles allowed to it by the operating system.

Which method will reduce the number of file handles in use?

  1. Disconnecting idle localhost client sessions

  2. Implementing storage engine data compression options

  3. Relocating your data and log files to separate storage devices

  4. Activating the MySQL Enterprise thread pool plugin

Answer: A

Question No: 37

You are using replication and the binary log files on your master server consume a lot of disk space.

Which two steps should you perform to safely remove some of the older binary log files?

  1. Ensure that none of the attached slaves are using any of the binary logs you want to delete.

  2. Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files.

  3. Execute the PURGE BINARY LOGE NOT USED command.

  4. Remove all of the binary log files that have a modification date earlier than today.

  5. Edit the .index file to remove the files you want to delete.

Answer: A,B

Explanation: A: To safely purge binary log files, follow this procedure:

->On each slave server, use SHOW SLAVE STATUS to check which log file it is reading.

->Obtain a listing of the binary log files on the master server with SHOW BINARY LOGS.

->Determine the earliest log file among all the slaves. This is the target file. If all the slaves are up to date, this is the last log file on the list.

->Make a backup of all the log files you are about to delete. (This step is optional, but always advisable.)

->Purge all log files up to but not including the target file.

B: Syntax:


{ TO #39;log_name#39; | BEFORE datetime_expr } Reference: PURGE BINARY LOGS Syntax

Question No: 38

A Mysql Server has been running an existing application successfully for six months.

The my.cnf is adjusted to contain the following additional configuration:


Default-authentication-plugin=sha256_password The Mysql Server is restarted without error.

What effect will the new configuration have in existing accounts?

  1. They will have their passwords updated on start-up to sha256_password format.

  2. They will have to change their password the next time they login to the server.

  3. They are not affected by this configuration change.

  4. They all connect via the secure sha256_password algorithm without any configuration change.

Answer: D

Reference: http://dev.mysql.com/doc/refman/5.6/en/sha256-authentication-plugin.html

Question No: 39

You have taken a Logical Volume Manager (LVM) snapshot backup of a volume that contains the MySQL data directory.

Why is it important to remove snapshots after completing a RAW backup in this way?

  1. The system can only support one snapshot per volume, and you need to remove it to be able to take your next backup.

  2. The snapshot size will continue to grow as changes to the volume are made.

  3. The snapshots take a significant amount of disk space as they are a duplicate copy of the data.

  4. The system keeps a copy of changes in memory and can cause an out of memory event.

Answer: C

Question No: 40

An existing master-slave setup is currently using a delayed replication of one hour. The master has crashed and the slave must be “rolled forward” to provide all the latest data.

The SHOW SLAVE STATUS indicates the following values:

RELAY_LOG_FILE = hostname-relay-bin.00004 RELAY_LOG_POS = 1383

Which command set would make the slave current?


  2. STOP SLAVE; CHANGE MASTER TO MASTER_DELAY =0, RELAY_LOG_FILE = ‘hostname-relay-bin.00004’ , RELAY_LOG_POS = 1383;

  3. STOP SLAVE; CHANGE MASTER TO RELAY_LOG_FILE = ‘hostname-relay- bin.00004’, RELAY_LOG_POS = 1383;

  4. STOP SLAVE; SET GLOBAL master_delay =0; START SLAVE;

Answer: A

100% Ensurepass Free Download!
Download Free Demo:1z0-883 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass 1z0-883 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.