Exam4Training

Lpi 304-200 LPIC-3 Exam 304: Virtualization & High Availability, version 2.0 Online Training

Question #1

Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO

correct answers.)

  • A . More than one container requires access to block devices available in the host system.
  • B . Remote access via SSH is required to all containers.
  • C . Each container needs to have its own user accounts and user groups.
  • D . Administrators of containers must be able to install customized Linux kernels.
  • E . Different operating systems are to be used within containers on the same virtualization host.

Reveal Solution Hide Solution

Correct Answer: DE
Question #2

When migrating a physical machine to a full virtualized machine, which of the following properties should be expected to change from the perspective of the guest operating system? (Choose TWO correct answers.)

  • A . The user accounts within the guest operating system.
  • B . The properties of the CPU and other hardware devices.
  • C . The MAC address of the network interfaces.
  • D . The version of the guest operating system.
  • E . The software and applications installed on the guest system.

Reveal Solution Hide Solution

Correct Answer: BC
Question #3

Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)

  • A . Creation of new instances can be automated by using scripts or APIs and service interfaces.
  • B . The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
  • C . Each and every user of an IaaS cloud has exactly one computing instance.
  • D . Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance’s data.
  • E . Instances may be created when needed and destroyed when they become obsolete.

Reveal Solution Hide Solution

Correct Answer: AE
Question #4

Which of the following technologies is the most important component of IaaS clouds?

  • A . Database replication
  • B . DNS delegation
  • C . Emulation
  • D . Mandatory Access Control
  • E . Virtualization

Reveal Solution Hide Solution

Correct Answer: E
Question #5

Which of the following statements are true regarding Xen domains? (Choose TWO correct answers.)

  • A . Fully virtualized and paravirtualized domains are managed using the same tools and commands.
  • B . Xen domains of all types require virtualization extensions in the host system’s CPU.
  • C . All fully virtualized domains are called ‘Dom0’ while all paravirtualized domains are called ‘DomU’.
  • D . Both paravirtualized and fully virtualized domains may run on the same host system.
  • E . Paravirtualized domains are significantly slower than fully virtualized domains.

Reveal Solution Hide Solution

Correct Answer: AD
Question #6

Which of the following directives is used in the configuration file of a Xen guest domain in order to define network interfaces?

  • A . vif
  • B . eth
  • C . vnet
  • D . vbr
  • E . net

Reveal Solution Hide Solution

Correct Answer: A
Question #7

Fill in the blank.

Which value must be set in the option builder in the configuration file of a Xen guest domain in order to create a fully virtualized machine instead of a paravirtualized one? (Specify ONLY the value without any option name, quotes or operators.)

Reveal Solution Hide Solution

Correct Answer: ‘hvm’ -or- "hvm" -or- hvm
Question #8

Fill in the blank.

Which sub-command of xl changes the media inside a virtual CD-ROM drive of a Xen guest domain? (Specify ONLY the sub-command without any path or parameters.)

Reveal Solution Hide Solution

Correct Answer: block-attach -or- xl cd-insert -or- cd-eject -or- xl cd-eject -or- cd-insert -or- xl block-attach

-or- block-detach -or- xl block-detach

Question #9

Which of the following components are parts of XAPI? (Choose TWO correct answers.)

  • A . The XADB configuration management database.
  • B . The XAPI virtual file system available at /xen.
  • C . The xm command.
  • D . The xe command.
  • E . The xapi daemon.

Reveal Solution Hide Solution

Correct Answer: DE
Question #10

Which of the following tools is used to interact with XenStore?

  • A . xenstore-ls
  • B . xendo
  • C . xs
  • D . xl store
  • E . xstore

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which of the following KVM parameters is identical to the KVM parameter -hdb file.img?

  • A . -drive bus=ide1,type=slave,image=file.img
  • B . -drive image=file.img,if=ide,device=hdb
  • C . -drive bus=hd,busid=b,src=file.img
  • D . -drive file=file.img,index=1,media=disk,if=ide
  • E . -drive type=loop,src=file.img,dst=disk:hdb

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Fill in the blank.

Which command in the KVM monitor ejects the first IDE CDROM drive? (Specify the KVM monitor command INCLUDING ALL REQUIRED PARAMETERS.)

Reveal Solution Hide Solution

Correct Answer: eject ide1-cd0 -or- eject -f ide1-cd0
Question #13

When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?

  • A . All floppy, CDROM, and hard disk drives in that order.
  • B . No devices are searched and the user is prompted to choose the boot device.
  • C . All network interfaces attached to the VM.
  • D . All hard disks and no other devices.
  • E . No devices are searched in order to support directly booting a Linux kernel.

Reveal Solution Hide Solution

Correct Answer: C
Question #14

When used with KVM, which of the following block device image formats support snapshots?

  • A . qcow
  • B . dmg
  • C . qed
  • D . qcow2
  • E . raw

Reveal Solution Hide Solution

Correct Answer: D
Question #15

Within the graphical output of a KVM virtual machine, which key sequence switches to the KVM monitor of the VM?

  • A . Ctrl-Alt-1
  • B . Ctrl-Alt-0
  • C . Ctrl-Alt-4
  • D . Ctrl-Alt-2
  • E . Ctrl-Alt-3

Reveal Solution Hide Solution

Correct Answer: D
Question #16

Fill in the blank.

Which command is used to perform all central management and configuration operations regarding

OpenVZ containers? (Specify ONLY the command without any path or parameters.)

Reveal Solution Hide Solution

Correct Answer: vzctl -or- virsh
Question #17

Which of the following tasks is performed by Vagrant?

  • A . It migrates virtual machines automatically between host systems to distribute the load of all virtual machines equally to all hosts involved.
  • B . It automates the installation of a virtual machine according to a configuration file describing the desired
    VM.
  • C . It monitors the functionality of a virtual machine and restarts the VM in case of failure.
  • D . It is a hypervisor optimized for the usage in embedded systems based on the ARM CPU architecture.
  • E . It is a programming interface used to create reports from collected performance and resource usage
    data of a libvirt-based virtualization infrastructure.

Reveal Solution Hide Solution

Correct Answer: B
Question #18

What is libvirt?

  • A . An identity manager used to provide Single-Sign-On for different operating systems.
  • B . A driver package used to support 3D printers.
  • C . A cluster manager used to handle node access to shared storage.
  • D . A combined interface to several virtualization products.
  • E . A Linux-based virtualization hypervisor.

Reveal Solution Hide Solution

Correct Answer: D
Question #19

Which daemon applies the configuration and commands of libvirt to the virtualization components of the host system?

  • A . vmd
  • B . virtuald
  • C . libvirtmgr
  • D . libvirt-worker
  • E . libvirtd

Reveal Solution Hide Solution

Correct Answer: E
Question #20

Which of the following commands provides a detailed list of all image files contained in the libvirt storage pool vol1?

  • A . virsh list –volumes –pool vol1 –details
  • B . virsh vol-details vol1
  • C . virsh –show-pool vol1 –details
  • D . virsh vol-list vol1 –details
  • E . virsh volumes –source vol1 Cdetails

Reveal Solution Hide Solution

Correct Answer: D

Question #21

Fill in the blank.

Which subcommand of virsh opens the XML configuration of a virtual network in an editor in order to make changes to that configuration? (Specify ONLY the subcommand without any parameters.)

Reveal Solution Hide Solution

Correct Answer: virsh net-edit -or- net-edit
Question #22

When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done? (Choose TWO correct answers.)

  • A . Remove all default users and groups, including root and nobody.
  • B . Remove all configuration files from /etc/ that were not manually modified.
  • C . Remove all confidential data from the image.
  • D . Remove all remote login services (i.e. SSH) from the image.
  • E . Remove all private SSH keys from the image.

Reveal Solution Hide Solution

Correct Answer: CE
Question #23

What is the usual way to gain command line access to computing instances in an IaaS cloud?

  • A . By providing a public SSH key to the cloud management system and using the matching private SSH
    key to log into the instances.
  • B . Usually computing instances are accessed through a web frontend and do not allow command line access.
  • C . By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.
  • D . By using a telnet session with the credentials set and publicized by the creator of the computing instance’s system image.
  • E . By using a VNC console which does not require authentication when it is invoked via the cloud management system.

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Which CPU flag indicates the hardware virtualization capability on an AMD CPU?

  • A . SVM
  • B . VIRT
  • C . VMX
  • D . PVM
  • E . HVM

Reveal Solution Hide Solution

Correct Answer: A
Question #25

Which of the following tasks are parts of a hypervisor’s responsibility? (Choose TWO correct answers.)

  • A . Create filesystems during the installation of new VM guest operating systems.
  • B . Provide host-wide unique PIDs to the processes running inside the VMs in order to ease interprocess communication between virtual machines.
  • C . Map the resources of virtual machines to the resources of the host system.
  • D . Ensure isolation and eliminate any interference between virtual machines.
  • E . Manage authentication to network services running inside a virtual machine.

Reveal Solution Hide Solution

Correct Answer: CD
Question #26

Which of the following statements are true for full virtualization? (Choose TWO correct answers.)

  • A . Full virtualization does not require changes to the guest operating systems.
  • B . Full virtualization has no performance impact compared to a non-virtualized bare-metal installation on the same machine.
  • C . Full virtualization has a severe performance impact and should not be used in production environments.
  • D . Full virtualization may be supported by special CPU extensions that provide better performance.
  • E . Full virtualization always requires additional software components and cannot be done using Linux only.

Reveal Solution Hide Solution

Correct Answer: AD
Question #27

Which of the following statements are true regarding hardware based virtualization? (Choose TWO correct answers.)

  • A . Hardware based virtualization requires special support in the host system’s hardware which is present in all recent x86-based computers.
  • B . Hardware based virtualization implements a whole machine in software and therefore can run virtual machines of a given hardware platform on an arbitrary host system.
  • C . Hardware based virtualization relies on the host system’s processor to call the hypervisor when critical instructions are executed by a virtual machine.
  • D . Hardware based virtualization is not available on x86-based CPU architectures and requires special virtualization host hardware.

Reveal Solution Hide Solution

Correct Answer: AC
Question #28

Fill in the blank.

What is the name of the global configuration file for the xl tool stack? (Specify the file name only without any path.)

Reveal Solution Hide Solution

Correct Answer: /etc/xen/xl.conf -or- xl.conf
Question #29

After the Xen guest configuration file debian.cfg has been created and successfully tested, which

additional action must be performed in order to make this Xen guest start automatically every time the host system boots?

  • A . It is necessary to add xendomains_auto = yes to the virtual machine configuration file.
  • B . It is necessary to add an entry for debian.cfg to the file /etc/xen/guesttab.
  • C . It is necessary to run the command xl autostart debian.cfg.
  • D . It is necessary to add a symbolic link to the configuration file in the /etc/xen/auto/ directory. E. It is not possible to use Xen and its tools to start virtual machines automatically.

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Which options to the xl command will deactivate a running Xen virtual machine? (Choose TWO correct answers.)

  • A . destroy
  • B . remove
  • C . shutdown
  • D . stop
  • E . halt

Reveal Solution Hide Solution

Correct Answer: AC

Question #31

Fill in the blank.

What is the name of the kernel module that is required to be loaded in order to use KVM on an Intel CPU architecture? (Specify ONLY the module name without any path information and with or without the module suffix.)

Reveal Solution Hide Solution

Correct Answer: kvm-intel.ko -or- kvm-intel -or- kvm_intel.ko -or- kvm_intel
Question #32

Which of the following is true regarding the CPU of a KVM virtual machine? (Choose TWO correct answers.)

  • A . Each KVM virtual machine can only have one CPU with one core.
  • B . KVM virtual machines support multiple virtual CPUs in order to run SMP systems.
  • C . The CPU architecture of a KVM virtual machine is independent of the host system’s architecture.
  • D . For each KVM virtual machine one dedicated physical CPU core must be reserved.
  • E . KVM uses the concept of virtual CPUs to map the virtual machines to physical CPUs.

Reveal Solution Hide Solution

Correct Answer: BE
Question #33

Which statement is true regarding the Linux kernel module that must be loaded in order to use KVM?

  • A . It must be loaded into the kernel of each virtual machine to provide paravirtualization which is required by KVM.
  • B . It must be loaded into the kernel of the host system in order to use the virtualization extensions of the host system’s CPU.
  • C . It must be loaded into the kernel of the host system only if the console of a virtual machine will be connected to a physical console of the host system.
  • D . It must be loaded into the kernel of each virtual machine that will access files and directories from the host system’s file system.
  • E . It must be loaded into the kernel of the first virtual machine as it interacts with the KVM bare metal hypervisor and is required to trigger the start of additional virtual machines.

Reveal Solution Hide Solution

Correct Answer: B
Question #34

Which of the following commands boots a KVM virtual machine using Debian GNU/Linux?

  • A . qemu -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
  • B . qemu-kvm -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
  • C . kvm -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
  • D . kvm -qemu -drive file=debian.img -cdrom debian.iso -m 1024 -boot d

Reveal Solution Hide Solution

Correct Answer: B
Question #35

Which of the following products use container-based virtualization? (Choose THREE correct answers.)

  • A . KVM
  • B . Linux VServer
  • C . LXC
  • D . OpenVZ
  • E . Xen

Reveal Solution Hide Solution

Correct Answer: BCD
Question #36

What action does the virsh restore command perform?

  • A . It restores a virtual machine that was stopped by a kernel panic.
  • B . It restores a virtual machine from a state file.
  • C . It reverts a virtual machine, including its storage devices, to a previously saved state.
  • D . It wakes up a virtual machine that was hibernated by the operating system running inside the virtual machine.

Reveal Solution Hide Solution

Correct Answer: B
Question #37

How can data be shared between several virtual machines running on the same Linux-based host system?

  • A . By mounting other VM’s file systems from /dev/virt-disks/remote/.
  • B . By using a network file system or file transfer protocol.
  • C . By default, Linux-based virtualization products provide full access to the host system to all virtual machines.
  • D . By setting up a ramdisk in one virtual machine and mounting it using its UUID in the other VMs.
  • E . By attaching the same virtual hard disk to all virtual machines and activating EXT4 sharing extensions on it.

Reveal Solution Hide Solution

Correct Answer: B
Question #38

Which of the following data should be copied to the virtual machine when migrating a physical machine to a virtual machine?

  • A . The block device buffers
  • B . The CPU flags
  • C . The file systems or their content
  • D . The CPU register’s content
  • E . The memory

Reveal Solution Hide Solution

Correct Answer: C
Question #39

What does IaaS stand for?

  • A . Integration as a Service
  • B . Intelligence as a Service
  • C . Instances as a Service
  • D . Infrastructure as a Service
  • E . Information as a Service

Reveal Solution Hide Solution

Correct Answer: D
Question #40

Which of the following types of guest systems does Xen support? (Choose TWO correct answers.)

  • A . Paravirtualized guests (PV)
  • B . Foreign architecture guests (FA)
  • C . Fully virtualized guests (HVM)
  • D . Container virtualized guests (CVM)
  • E . Emulated guests (EMU)

Reveal Solution Hide Solution

Correct Answer: AC

Question #41

Fill in the blank.

Which sub-command of xl lists the block devices that are currently attached to a Xen guest domain? (Specify ONLY the sub-command without any path or parameters.)

Reveal Solution Hide Solution

Correct Answer: block-list -or- xl block-list
Question #42

What is XAPI?

  • A . An extension of libvirt which adds live migration of virtual servers between arbitrary hypervisors.
  • B . A ReSTful API which is used by xl to communicate with the Xen hypervisor.
  • C . The communication interface between a paravirtualized Linux Kernel and the Xen hypervisor.
  • D . A high level tool chain which provides advanced management tools and interfaces for Xen.
  • E . The internal messaging system within the Xen hypervisor.

Reveal Solution Hide Solution

Correct Answer: D
Question #43

In order to use the option dom0_mem to limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?

  • A . In its Makefile, when Xen is built.
  • B . In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.
  • C . In the bootloader configuration, when Xen is booted.
  • D . In its .config file, when the Domain-0 kernel is built.
  • E . In any of Xen’s global configuration files.

Reveal Solution Hide Solution

Correct Answer: C
Question #44

Fill in the blank.

Which command was used in Xen 3.x as a predecessor of the xl command? (Specify ONLY the command without any path or parameters.)

Reveal Solution Hide Solution

Correct Answer: xm
Question #45

Which of the following KVM monitor commands changes the image file in the first IDE CDROM drive of a virtual machine?

  • A . change ide1-cd0 /tmp/linux.iso
  • B . update ide1-cd0 /tmp/linux.iso
  • C . set ide1-cd0=/tmp/linux.iso
  • D . eject –reconnect ide1-cd0 /tmp/linux.iso
  • E . disc file=/tmp/linux.iso,device=/dev/sr0

Reveal Solution Hide Solution

Correct Answer: A
Question #46

Which of the following are valid KVM parameters? (Choose THREE correct answers.)

  • A . -drive file=iscsi://user%password@fileserver/iqn.2001-04.com.example/1
  • B . -drive file=rsync://user%password@fileserver:/tmp/file.iso,media=cdrom,readonly
  • C . -drive file=ssh://user@host/tmp/file.img
  • D . -drive file=imap://user:password@mailserver:/INBOX/Wufnc6MjYp@mailgate
  • E . -drive file=http://user:password@fileserver/pub/linux.iso,media=cdrom,readonly

Reveal Solution Hide Solution

Correct Answer: ACE
Question #47

Fill in the blank.

When using direct Linux booting to start Linux within a KVM virtual machine, which KVM parameter is used to specify parameters for the Linux Kernel? (Specify ONLY the option name without any values or parameters.)

Reveal Solution Hide Solution

Correct Answer: append -or- -append
Question #48

Which of the following commands lists the snapshots existing in the disk image vm1.img?

  • A . qemu-info snapshots vm1.img
  • B . qemu-img snapshot -l vm1.img
  • C . qemu -hda snapshot -l vm1.img -noboot -list snapshots
  • D . qemu-snapshots -l vm1.img
  • E . qemu-monitor -snapshots -hda vm1.img

Reveal Solution Hide Solution

Correct Answer: B
Question #49

Fill in the blank.

Which command in the KVM monitor restores a snapshot? (Specify ONLY the command without any path or parameters.)

Reveal Solution Hide Solution

Correct Answer: loadvm
Question #50

Fill in the blank. In the command

vzctl      105 /usr/bin/apt-get install wget

which subcommand of vzctl is missing in order to install wget in the OpenVZ container 105?

Reveal Solution Hide Solution

Correct Answer: exec -or- exec2

Question #51

Which of the following statements are true regarding VirtualBox?

  • A . It supports only Linux as a guest operating system.
  • B . It is available for Linux only.
  • C . It provides both a graphical user interface and command line tools to administer virtual machines.
  • D . It requires dedicated shared storage as it cannot store virtual machine disk images locally on block
    devices of the virtualization host.
  • E . It is a special kernel booted before the first regular operating system.

Reveal Solution Hide Solution

Correct Answer: C
Question #52

Which of the following statements is true regarding networking with libvirt?

  • A . Libvirt’s network functionality is limited to connecting virtual machines to a physical network interface of the host system.
  • B . Libvirt networks appear, by default, as standard Linux bridges in the host system.
  • C . Libvirt assigns the same MAC address to all virtual machines and isolates their network interfaces at the link layer.
  • D . Libvirt requires a dedicated network interface that may not be used by the host system.
  • E . Libvirt supports exactly one virtual network and connects all virtual machines to it.

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version