Question: you need to make your mysql system secure against attackers. What are you _not_ supposed to do?

  1. Run MySQL server as a normal user.
  2. Grant PROCESS or SUPER privilege to other users.
  3. Run MySQL server as the unix root user.
  4. Use the compressed protocol.

Answer: The correct answer of the above question is Option C:Run MySQL server as the unix root user.