Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

1z0-908 MySQL 8.0 Database Administrator Questions and Answers

Questions 4

Which statement is true about MySQL Enterprise Transparent Data Encryption (TDE)?

Options:

A.

MySQL TDE uses an appropriate keyring plugin to store the keys in a centralized location.

B.

Both MyISAM and InnoDB tables can be encrypted by setting the keyring_engine = ALL variable in the MySQL configuration file.

C.

Lost tablespace encryption keys can be regenerated only if the master database key is known or present in the Key Vault specification.

D.

TDE can encrypt InnoDB and MyISAM tables only when the tables are stored in the SYSTEM tablespace.

Buy Now
Questions 5

Which statement is true about cold backups?

Options:

A.

They are backups taken from snapshots of a running database.

B.

They are backups taken from OS copy commands.

C.

They are good to use if only data structures must be backed up but not log files.

D.

They are good to use when many users are online accessing the database.

Buy Now
Questions 6

Which two statements are true about MySQL server multi-source replication? (Choose two.)

Options:

A.

It is not compatible with auto-positioning.

B.

It needs to be re-instanced after a crash to maintain consistency.

C.

It uses only time-based replication conflict resolution.

D.

It relies on relay_log_recovery for resilient operations.

E.

It does not attempt to detect or resolve replication conflicts.

F.

It must use GTID replication.

Buy Now
Questions 7

Which four are types of information stored in the MySQL data dictionary? (Choose four.)

Options:

A.

performance metrics

B.

table definitions

C.

access control lists

D.

view definitions

E.

server runtime configuration

F.

server configuration rollback

G.

stored procedure definitions

Buy Now
Questions 8

Examine this command, which executes successfull

mysqlbackup --defaults-file=/backups/server-my.cnf --backup-dir=/backups/full

copy-back

Which statement is true about the copy-back process?

Options:

A.

The copy-back process is used to overwrite a new backup over an existing backup.

B.

It restores files from the data directory to their original MySQL server locations.

C.

It restores files from the backup directory to their original MySQL server locations.

D.

The copy-back process makes inconsistent backups.

Buy Now
Questions 9

You must configure the MySQL command-line client to provide the highest level of trust and security when connecting to a remote MySQL Server.

Which value of --ssl-mode will do this?

Options:

A.

PREFERRED

B.

VERIFY_CA

C.

REQUIRED

D.

VERIFY_IDENTITY

Buy Now
Questions 10

Where is the default data directory located after installing MySQL using RPM on Oracle Linux 7?

Options:

A.

/usr/mysql

B.

/usr/bin

C.

/etc/my.cnf

D.

/var/lib/mysql

E.

/usr

Buy Now
Questions 11

Examine this snippet from the binary log file named binlog.000036:

The rental table was accidentally dropped, and you must recover the table.

You have restored the last backup, which corresponds to the start of the binlog.000036 binary log.

Which command will complete the recovery?

Options:

A.

mysqlbinlog --stop-position=500324 binlog.000036 | mysql

B.

mysqlbinlog --stop-datetime='2019-ll-20 14:55:18' binlog.000036 | mysql

C.

mysqlbinlog --stop-position=5004S3 binlog.000036 | mysql

D.

mysqlbinlog --stop-datetime='2019-ll-20 14:55:16' binlog.000036 | mysql

Buy Now
Questions 12

Which two statements are true about using backups of the binary log? (Choose two.)

Options:

A.

Multiple binary logs can be used to restore data.

B.

Multiple binary logs can be applied in parallel for faster data restoration.

C.

Binary logs are relatively small, and therefore, excellent for long-term storage and disaster recovery.

D.

Binary logs can always be used to unapply unwanted schema changes.

E.

They allow for point-in-time recovery of the data.

Buy Now
Questions 13

Which three are characteristics of a newly created role? (Choose three.)

Options:

A.

It can be dropped using the DROP ROLE statement.

B.

It is stored in the mysql.role table.

C.

It is created as a locked account.

D.

It can be renamed using the RENAME ROLE statement.

E.

It can be granted to user accounts.

F.

It can be protected with a password.

Buy Now
Questions 14

Examine this statement, which executes successfully:

Now examine this query:

Which two statements can do this? (Choose two.)

Options:

A.

ALTER TABLE employees -

ADD INDEX (birth_date DESC);

B.

ALTER TABLE employees -

ADD INDEX ((MONTH(birth_date)));

C.

ALTER TABLE employees -

ADD COLUMN birth_month tinyint unsigned GENERATED ALWAYS AS (MONTH(birth_date)) VIRTUAL NOT NULL,

ADD INDEX (birth_month);

D.

ALTER TABLE employees -

ADD COLUMN birth_month tinyint unsigned GENERATED ALWAYS AS (birth_date->>'$.month') VIRTUAL NOT NULL,

ADD INDEX (birth_month);

E.

ALTER TABLE employees -

ADD INDEX ((CAST(birth_date->>'$.month' AS unsigned)));

F.

ALTER TABLE employees -

ADD INDEX (birth_date);

Buy Now
Questions 15

Which two queries are examples of successful SQL injection attacks? (Choose two.)

Options:

A.

SELECT user,passwd FROM members

WHERE user = ‘?’;INSERT INTO members(‘user’,’passwd’) VALUES

(‘bob@example.com’,‘secret’);--‘;

B.

SELECT id, name FROM user WHERE user.id=(SELECT members.id FROM members);

C.

SELECT id, name FROM user WHERE id=23 OR id=32 OR 1=1;

D.

SELECT id, name FROM user WHERE id=23 OR id=32 AND 1=1;

E.

SELECT email,passwd FROM members

WHERE email = ‘INSERT INTO members(‘email’,’passwd’) VALUES (‘bob@example.com’,

‘secret’);--‘;

F.

SELECT user, phone FROM customers WHERE name = ‘\; DROP TABLE users; --‘;

Buy Now
Questions 16

There are five MySQL instances configured with a working group replication.

Examine the output of the group members:

Which two statements are true about network partitioning in the cluster? (Choose two.)

Options:

A.

The cluster will shut down to preserve data consistency.

B.

The cluster has built-in high availability and updates group_replication_ip_whitelist to remove the unreachable nodes.

C.

The group replication will buffer the transactions on the online nodes until the unreachable nodes return online.

D.

There could be both a 2 node and 3 node group replication still running, so shutting down group replication and diagnosing the issue is recommended.

E.

A manual intervention to force group members to be only the working two instances is required.

Buy Now
Questions 17

You want to dump all databases with names that start with "db".

Which command will achieve this?

Options:

A.

mysqlpump --include-tables=db.% --result-file=all_db_backup.sql

B.

mysqlpump > all_db_backup.sql

C.

mysqlpump --include-databases=db --result-file=all_db_backup.sql

D.

mysqlpump --include-databases=db% --result-file=all_db_backup.sql

Buy Now
Questions 18

Your MySQL instance is capturing a huge amount of financial transactions every day in the finance database.

Company policy is to create a backup every day.

The main tables being updated are prefixed with transactions-.

These tables are archived into tables that are prefixed with archives- each month. mysqlbackup --optimistic-busy-tables="^finance\.transactions-.*" backup

Which optimization process best describes what happens with the redo logs?

Options:

A.

The redo logs are backed up first, then the transaction and archive tables.

B.

The redo logs are backed up only if there are changes showing for the transactions tables.

C.

The redo logs are not backed up at all.

D.

The archive tables are backed up first, then the transaction tables and redo logs.

E.

The transaction tables are backed up first, then the archive tables and redo logs.

Buy Now
Questions 19

You recently upgraded your MySQL installation to MySQL 8.0.

Examine this client error:

Which option will allow this client to connect to MySQL Server?

Options:

A.

[mysqld]

default_authentication_plugin=sha256_password

B.

ALTER USER user -

IDENTIFIED WITH mysql_native_password

BY 'password';

C.

[mysqld]

default_authentication_plugin=caching_sha2_password

D.

ALTER USER user -

IDENTIFIED WITH caching_sha2_password

BY 'password';

E.

ALTER USER user -

IDENTIFIED WITH sha256_password -

BY 'password';

F.

[mysqld]

default_authentication_plugin=mysql_native_password

Buy Now
Questions 20

Your MySQL server is running on the Microsoft Windows platform.

Which three local connection protocols are available to you? (Choose three.)

Options:

A.

named pipes

B.

shared memory

C.

SOCKET

D.

X Protocol

E.

UDP

F.

TCP/IP

Buy Now
Questions 21

Which two MySQL Server accounts are locked by default? (Choose two.)

Options:

A.

any user set as DEFINER for stored programs

B.

any internal system accounts

C.

any new ROLE accounts

D.

any user created without a password

E.

any user created with a username, but missing the host name

Buy Now
Exam Code: 1z0-908
Exam Name: MySQL 8.0 Database Administrator
Last Update: Jun 15, 2025
Questions: 140
1z0-908 pdf

1z0-908 PDF

$29.75  $84.99
1z0-908 Engine

1z0-908 Testing Engine

$35  $99.99
1z0-908 PDF + Engine

1z0-908 PDF + Testing Engine

$47.25  $134.99