Question: you need to make your mysql system secure against attackers. What are you _not_ supposed to do?
- Run MySQL server as a normal user.
- Grant PROCESS or SUPER privilege to other users.
- Run MySQL server as the unix root user.
- Use the compressed protocol.
Answer: The correct answer of the above question is Option C:Run MySQL server as the unix root user.