Leads4pass > Oracle > Oracle Certifications > 1Z0-920 > 1Z0-920 Online Practice Questions and Answers

1Z0-920 Online Practice Questions and Answers

Questions 4

Assume that MySQL Enterprise Monitor is configured to monitor MySQL 8.0.10 or a later instance. Which three features are available?

A. creating e-mail alerts and SNMP traps for MySQL warnings

B. starting and stopping the MySQL instance

C. analyzing executed MySQL queries

D. deploying MySQL agent on supported target operating system

E. monitoring the availability of the MySQL Instance

F. tracing import and export with mysqldump

Buy Now
Questions 5

Which statement would you use to remove the population column from the city table?

A. ALTER TABLE city DROP population;

B. DELETE population FROM city;

C. ALTER TABLE city DELETE population;

D. ALTER TABLE city LESS population;

E. DROP population FROM city;

Buy Now
Questions 6

Which four authentication protocols are allowed when using MySQL Enterprise Authentication?

A. Native Windows services

B. authentication via Pluggable Authentication Modules (PAMs)

C. Simple Authentication and Security Layer

D. SECURID authentication and authorization identity

E. authentication using SHA-256 password hashing

F. connections through the local host via the UNIX socket file

Buy Now
Questions 7

Which three components can MySQL InnoDB Cluster use to Achieve database high availability?

A. MySQL Servers with Group Replication to replicate data to all members of the cluster.

B. MySQL Online Hot Backup to keep data consistent and always ready to be used.

C. MySQL Shell to create and administer InnoDB Clusters using the built-in AdminAPI.

D. MySQL X Plugin to enable MySQL to use the X Protocol to speed up and monitor data replication.

E. MySQL Router to ensure client requests are load balanced and routed to the correct servers.

Buy Now
Questions 8

You have three machines with MySQL Databases running on Linux platform. Which backup procedures would allow online and remote backup of the MySQL Database on the three machines to a connected Storage NFS?

A. 1. Mount the Remote Storage NFS volume to each of the three machines with proper privilege for the backup OS user to have all access.

2.

Install MySQL Enterprise Backup on machine which is used to start the backup.

3.

Start mysqlbackup on only one machine with the installation to back up the databases for the three machines to the mounted volume using - -backup-dir and by giving-- hosts=machine1:port1, machine2:port2, machine3:port3.

4.

Validate the backups using the mysqlbackup program to ensure that the backups created are valid.

B. 1. Mount the Remote Storage NFS volume to each of the three machines with proper privilege for the backup OS user to have all access.

2.

Install MySQL Enterprise Backup on all three machines.

3.

Start mysqlbackup on all machines to back up the database to the mounted volume using - -backupdir.

4.

Validate the backup using the mysqlbackup program to ensure that the backup created is valid.

C. 1. Mount the Remote Storage NFS volume to each of the three machines with proper privilege for the backup OS user to have all access.

2.

Install MySQL Enterprise Backup on the machine that is used to start the backup.

3.

Start mysqlbackup on only one machine with the installation to back up the databases for the three machines to the mounted volume using - - backup-dir and by specifying -- config-files=my1.cnf, my2.cnf, my3.cnf.my1.cnf, my2cnf, and my3.cnf are the MySQL Database Configuration files on the three machines.

4.

Validate the backup by using the mysqlbackup program to ensure that the backup created is valid.

D. 1. Mount the Remote Storage NFS volume to each of the three machines with proper privilege for the backup OS user to have all access.

2.

Install MySQL Workbench on a separate machine, which is used to connect to the three machines to back up and restore.

3.

Startup MySQL backup from MySQL Workbench to back up the three databases.

4.

Validate the backup by using MySQL Workbench to ensure that the backup created is valid.

Buy Now
Questions 9

Which best describes database horizontal scale-out architecture deployment in MySQL in a read- heavy environment?

A. Allocating more CPU to the database instance to improve throughput performance.

B. Deploy MySQL read-only slaves utilizing replication so that the slaves can be used for reads.

C. Increasing the memory capacity so that there is a larger pooling buffer to increase the database read performance.

D. Adding more MySQL servers and sharing the same dacadir on a shared storage component like NFS.

E. Increasing the storage capacity so that the database can store more data to scale.

Buy Now
Questions 10

What are Security Lists in Oracle Cloud Infrastructure?

A. They allow administrators access to applications in the cloud and external servers.

B. They are user-role designations that assign rights to certain internal users and external users.

C. They are essentially firewall rules that help control traffic between OCI instances.

D. Security lists are data encryption levels that control who can see the data.

E. They contain rules established by HIPAA for securing end-user data.

Buy Now
Questions 11

You have created your Compute instance using an Oracle-provided Oracle Linux image. You want to log in to your OCI Compute instance using SSH. Which three items do you need for this process?

A. Public IP address

B. User Password

C. SSH private key

D. The opc user

E. SSH public key

F. The root user

Buy Now
Questions 12

Which two statements are true about MySQL Enterprise Firewall?

A. On Windows systems, MySQL Enterprise Firewall is controlled and managed by using the Windows Internet Connection Firewall control panel.

B. The firewall functionality is dependent upon SHA-256 and ANSI-specific functions built in to the mysql.firewall table. These functions cannot be deleted, even by the root user.

C. MySQL Enterprise Firewall is available only in MySQL Enterprise versions 5.7.10.and later.

D. Server-side plug-ins named MYSQL_FIREWALL_USERS and MYSQL_FIREWALL-WHITELIST implement INFORMATION_SCHEMA tables that provide views into the firewall data cache.

E. System tables named firewall_users and firewall_whitelist in the mysql database provide persistent storage of firewall data.

F. MySQL Enterprise Firewall shows only notifications blocked connections, which originated outside of your network's primary domain.

Buy Now
Questions 13

Which MySQL Enterprise Edition plug-in replaces real values with substitutes?

A. MySQL Enterprise Audit

B. MySQL Enterprise Scalability

C. MySQL Enterprise No-Login Authentication

D. MySQL Enterprise Transparent Data Encryption (TDE)

E. MySQL Enterprise Data Masking and De-identification

Buy Now
Exam Code: 1Z0-920
Exam Name: MySQL 2019 Implementation Essentials
Last Update: Jan 13, 2025
Questions: 70
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99