Which two are features of MySQL Enterprise Firewall? (Choose two.)
Which two are features of MySQL Enterprise Firewall? (Choose two.)
MySQL Enterprise Firewall provides functionality to record incoming SQL statements to facilitate the creation of a whitelist of permitted commands, enhancing security by allowing only approved SQL statements. It also blocks potential threats by using these pre-approved whitelists, preventing unauthorized access or execution of harmful SQL statements.
Examine the modified output:
Seconds_Behind_ Master value is steadily growing.
What are two possible causes? (Choose two.)
When the 'Seconds_Behind_Master' value is steadily growing, it indicates that the slave is unable to keep up with the master for some reason. One possible cause is that the master is too busy to transmit data quickly enough, resulting in the slave waiting for more data (option A). Another possibility is that the master is producing a large volume of events in parallel, but the slave processes them serially, causing it to fall behind (option D). These scenarios can both lead to an increase in the 'Seconds_Behind_Master' value.
You must configure the MySQL command-line client to provide the highest level of trust and security when connecting to a remote MySQL Server.
Which value of --ssl-mode will do this?
For the highest level of trust and security when connecting to a remote MySQL server using the command-line client, the --ssl-mode value should be VERIFY_IDENTITY. This mode requires SSL, verifies the certificate authority, and also checks that the server's identity matches the hostname, ensuring maximum security.
Consider this shell output and executed commands:
[root@oel7 ~]# ps aux | grep mysqld
mysql 2076 3.5 24.6 1386852 372572 ? Ssl 12:01 0:01 /usr/sbin/mysqid
[root@oel7 ~]# kill -15 2076
Which statement is true about MySQL server shutdown?
kill -15 sends a SIGTERM signal to the MySQL server, which prompts the server to perform a graceful shutdown. This means that the server will complete any ongoing transactions, flush caches, and close connections before shutting down, similar to what happens when using mysqladmin shutdown. Therefore, using kill -15 for shutting down the MySQL server is a normal and safe process.
You wish to protect your MySQL database against SQL injection attacks.
Which method would fail to do this?
Installing and configuring the Connection Control plugin does not directly prevent SQL injection attacks. This plugin is designed to limit the number of connection attempts from a host and to manage connection behavior but does not provide mechanisms to protect against SQL injection. The other methods mentioned, such as avoiding the concatenation of SQL statements and user-supplied values, using stored procedures, and utilizing prepared statements, are effective techniques to prevent SQL injection vulnerabilities.