Get Real 304-200 Dumps with PDF and SOFT V8.02 For Passing - DumpsBase

Page 1

DUMPS BASE

EXAM DUMPS

LPI 304-200

28% OFF Automatically For You LPIC-3 Exam 304: Virtualization & High Availability, version 2.0


1.Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO correct answers.) A. More than one container requires access to block devices available in the host system. B. Remote access via SSH is required to all containers. C. Each container needs to have its own user accounts and user groups. D. Administrators of containers must be able to install customized Linux kernels. E. Different operating systems are to be used within containers on the same virtualization host. Answer: DE

2.When migrating a physical machine to a full virtualized machine, which of the following properties should be expected to change from the perspective of the guest operating system? (Choose TWO correct answers.) A. The user accounts within the guest operating system. B. The properties of the CPU and other hardware devices. C. The MAC address of the network interfaces. D. The version of the guest operating system. E. The software and applications installed on the guest system. Answer: BC

3.Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.) A. Creation of new instances can be automated by using scripts or APIs and service interfaces. B. The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed. C. Each and every user of an IaaS cloud has exactly one computing instance. D. Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's data. E. Instances may be created when needed and destroyed when they become obsolete. Answer: AE

4.Which of the following technologies is the most important component of IaaS clouds? A. Database replication B. DNS delegation C. Emulation


D. Mandatory Access Control E. Virtualization Answer: E

5.Which of the following statements are true regarding Xen domains? (Choose TWO correct answers.) A. Fully virtualized and paravirtualized domains are managed using the same tools and commands. B. Xen domains of all types require virtualization extensions in the host system's CPU. C. All fully virtualized domains are called 'Dom0' while all paravirtualized domains are called 'DomU'. D. Both paravirtualized and fully virtualized domains may run on the same host system. E. Paravirtualized domains are significantly slower than fully virtualized domains. Answer: AD

6.Which of the following directives is used in the configuration file of a Xen guest domain in order to define network interfaces? A. vif B. eth C. vnet D. vbr E. net Answer: A

7.Fill in the blank. Which value must be set in the option builder in the configuration file of a Xen guest domain in order to create a fully virtualized machine instead of a paravirtualized one? (Specify ONLY the value without any option name, quotes or operators.) Answer: 'hvm' -or- "hvm" -or- hvm

8.Fill in the blank. Which sub-command of xl changes the media inside a virtual CD-ROM drive of a Xen guest domain? (Specify ONLY the sub-command without any path or parameters.) Answer: block-attach -or- xl cd-insert -or- cd-eject -or- xl cd-eject -or- cd-insert -or- xl blockattach


-or- block-detach -or- xl block-detach

9.Which of the following components are parts of XAPI? (Choose TWO correct answers.) A. The XADB configuration management database. B. The XAPI virtual file system available at /xen. C. The xm command. D. The xe command. E. The xapi daemon. Answer: DE

10.Which of the following tools is used to interact with XenStore? A. xenstore-ls B. xendo C. xs D. xl store E. xstore Answer: A

11.Which of the following KVM parameters is identical to the KVM parameter -hdb file.img? A. -drive bus=ide1,type=slave,image=file.img B. -drive image=file.img,if=ide,device=hdb C. -drive bus=hd,busid=b,src=file.img D. -drive file=file.img,index=1,media=disk,if=ide E. -drive type=loop,src=file.img,dst=disk:hdb Answer: D

12.Fill in the blank. Which command in the KVM monitor ejects the first IDE CDROM drive? (Specify the KVM monitor command INCLUDING ALL REQUIRED PARAMETERS.) Answer: eject ide1-cd0 -or- eject -f ide1-cd0

13.When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system? A. All floppy, CDROM, and hard disk drives in that order. B. No devices are searched and the user is prompted to choose the boot device.


C. All network interfaces attached to the VM. D. All hard disks and no other devices. E. No devices are searched in order to support directly booting a Linux kernel. Answer: C

14.When used with KVM, which of the following block device image formats support snapshots? A. qcow B. dmg C. qed D. qcow2 E. raw Answer: D

15.Within the graphical output of a KVM virtual machine, which key sequence switches to the KVM monitor of the VM? A. Ctrl-Alt-1 B. Ctrl-Alt-0 C. Ctrl-Alt-4 D. Ctrl-Alt-2 E. Ctrl-Alt-3 Answer: D

16.Fill in the blank. Which command is used to perform all central management and configuration operations regarding OpenVZ containers? (Specify ONLY the command without any path or parameters.) Answer: vzctl -or- virsh

17.Which of the following tasks is performed by Vagrant? A. It migrates virtual machines automatically between host systems to distribute the load of all virtual machines equally to all hosts involved. B. It automates the installation of a virtual machine according to a configuration file describing the desired VM. C. It monitors the functionality of a virtual machine and restarts the VM in case of failure. D. It is a hypervisor optimized for the usage in embedded systems based on the ARM CPU architecture.


E. It is a programming interface used to create reports from collected performance and resource usage data of a libvirt-based virtualization infrastructure. Answer: B

18.What is libvirt? A. An identity manager used to provide Single-Sign-On for different operating systems. B. A driver package used to support 3D printers. C. A cluster manager used to handle node access to shared storage. D. A combined interface to several virtualization products. E. A Linux-based virtualization hypervisor. Answer: D

19.Which daemon applies the configuration and commands of libvirt to the virtualization components of the host system? A. vmd B. virtuald C. libvirtmgr D. libvirt-worker E. libvirtd Answer: E

20.Which of the following commands provides a detailed list of all image files contained in the libvirt storage pool vol1? A. virsh list --volumes --pool vol1 --details B. virsh vol-details vol1 C. virsh --show-pool vol1 --details D. virsh vol-list vol1 --details E. virsh volumes --source vol1 Cdetails Answer: D

21.Fill in the blank. Which subcommand of virsh opens the XML configuration of a virtual network in an editor in order to make changes to that configuration? (Specify ONLY the subcommand without any parameters.) Answer: virsh net-edit -or- net-edit


22.When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done? (Choose TWO correct answers.) A. Remove all default users and groups, including root and nobody. B. Remove all configuration files from /etc/ that were not manually modified. C. Remove all confidential data from the image. D. Remove all remote login services (i.e. SSH) from the image. E. Remove all private SSH keys from the image. Answer: CE

23.What is the usual way to gain command line access to computing instances in an IaaS cloud? A. By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances. B. Usually computing instances are accessed through a web frontend and do not allow command line access. C. By either telnet or SSH using the credentials of the cloud management system account with administrative privileges. D. By using a telnet session with the credentials set and publicized by the creator of the computing instance's system image. E. By using a VNC console which does not require authentication when it is invoked via the cloud management system. Answer: A

24.Which CPU flag indicates the hardware virtualization capability on an AMD CPU? A. SVM B. VIRT C. VMX D. PVM E. HVM Answer: A

25.Which of the following tasks are parts of a hypervisor's responsibility? (Choose TWO correct answers.) A. Create filesystems during the installation of new VM guest operating systems. B. Provide host-wide unique PIDs to the processes running inside the VMs in order to ease interprocess communication between virtual machines. C. Map the resources of virtual machines to the resources of the host system. D. Ensure isolation and eliminate any interference between virtual machines.


E. Manage authentication to network services running inside a virtual machine. Answer: CD

26.Which of the following statements are true for full virtualization? (Choose TWO correct answers.) A. Full virtualization does not require changes to the guest operating systems. B. Full virtualization has no performance impact compared to a non-virtualized baremetal installation on the same machine. C. Full virtualization has a severe performance impact and should not be used in production environments. D. Full virtualization may be supported by special CPU extensions that provide better performance. E. Full virtualization always requires additional software components and cannot be done using Linux only. Answer: AD

27.Which of the following statements are true regarding hardware based virtualization? (Choose TWO correct answers.) A. Hardware based virtualization requires special support in the host system's hardware which is present in all recent x86-based computers. B. Hardware based virtualization implements a whole machine in software and therefore can run virtual machines of a given hardware platform on an arbitrary host system. C. Hardware based virtualization relies on the host system's processor to call the hypervisor when critical instructions are executed by a virtual machine. D. Hardware based virtualization is not available on x86-based CPU architectures and requires special virtualization host hardware. Answer: AC

28.Fill in the blank. What is the name of the global configuration file for the xl tool stack? (Specify the file name only without any path.) Answer: /etc/xen/xl.conf -or- xl.conf

29.After the Xen guest configuration file debian.cfg has been created and successfully tested, which additional action must be performed in order to make this Xen guest start automatically every time the host system boots? A. It is necessary to add xendomains_auto = yes to the virtual machine configuration


file. B. It is necessary to add an entry for debian.cfg to the file /etc/xen/guesttab. C. It is necessary to run the command xl autostart debian.cfg. D. It is necessary to add a symbolic link to the configuration file in the /etc/xen/auto/ directory. E. It is not possible to use Xen and its tools to start virtual machines automatically. Answer: D

30.Which options to the xl command will deactivate a running Xen virtual machine? (Choose TWO correct answers.) A. destroy B. remove C. shutdown D. stop E. halt Answer: AC

31.Fill in the blank. What is the name of the kernel module that is required to be loaded in order to use KVM on an Intel CPU architecture? (Specify ONLY the module name without any path information and with or without the module suffix.) Answer: kvm-intel.ko -or- kvm-intel -or- kvm_intel.ko -or- kvm_intel

32.Which of the following is true regarding the CPU of a KVM virtual machine? (Choose TWO correct answers.) A. Each KVM virtual machine can only have one CPU with one core. B. KVM virtual machines support multiple virtual CPUs in order to run SMP systems. C. The CPU architecture of a KVM virtual machine is independent of the host system's architecture. D. For each KVM virtual machine one dedicated physical CPU core must be reserved. E. KVM uses the concept of virtual CPUs to map the virtual machines to physical CPUs. Answer: BE

33.Which statement is true regarding the Linux kernel module that must be loaded in order to use KVM? A. It must be loaded into the kernel of each virtual machine to provide paravirtualization which is required by KVM. B. It must be loaded into the kernel of the host system in order to use the virtualization


extensions of the host system's CPU. C. It must be loaded into the kernel of the host system only if the console of a virtual machine will be connected to a physical console of the host system. D. It must be loaded into the kernel of each virtual machine that will access files and directories from the host system's file system. E. It must be loaded into the kernel of the first virtual machine as it interacts with the KVM bare metal hypervisor and is required to trigger the start of additional virtual machines. Answer: B

34.Which of the following commands boots a KVM virtual machine using Debian GNU/Linux? A. qemu -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d B. qemu-kvm -drive file=debian.img -cdrom debian.iso -m 1024 -boot d C. kvm -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d D. kvm -qemu -drive file=debian.img -cdrom debian.iso -m 1024 -boot d Answer: B

35.Which of the following products use container-based virtualization? (Choose THREE correct answers.) A. KVM B. Linux VServer C. LXC D. OpenVZ E. Xen Answer: BCD

36.What action does the virsh restore command perform? A. It restores a virtual machine that was stopped by a kernel panic. B. It restores a virtual machine from a state file. C. It reverts a virtual machine, including its storage devices, to a previously saved state. D. It wakes up a virtual machine that was hibernated by the operating system running inside the virtual machine. Answer: B

37.How can data be shared between several virtual machines running on the same Linux-based host system? A. By mounting other VM's file systems from /dev/virt-disks/remote/.


B. By using a network file system or file transfer protocol. C. By default, Linux-based virtualization products provide full access to the host system to all virtual machines. D. By setting up a ramdisk in one virtual machine and mounting it using its UUID in the other VMs. E. By attaching the same virtual hard disk to all virtual machines and activating EXT4 sharing extensions on it. Answer: B

38.Which of the following data should be copied to the virtual machine when migrating a physical machine to a virtual machine? A. The block device buffers B. The CPU flags C. The file systems or their content D. The CPU register's content E. The memory Answer: C


GET FULL VERSION OF 304-200 DUMPS

Powered by TCPDF (www.tcpdf.org)


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.