Exam4Training

Lpi 306-300 LPIC-3: High Availability and Storage Clusters – Exam 306, version 3.0 Online Training

Question #1

Which of the following statements describes fencing resources in a high availability cluster?

  • A . Fencing is the automated stop and restart of cluster services that suffer from software errors.
  • B . Fencing is the disconnection of a failed cluster node from any other cluster resources.
  • C . Fencing is the forwarding of incoming network connections to backend servers.
  • D . Fencing is the assignment of services to different cluster nodes to avoid interference of the services.
  • E . Fencing is the accounting and limitation of disk usage on shared storage.

Reveal Solution Hide Solution

Correct Answer: B
Question #2

True or False: Define constraints on which services may run on the same cluster node is the purpose of fencing in a high availability cluster.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #3

Which utility is used to manage the low-level configuration and settings of DRBD devices?

  • A . drbdadm
  • B . drbdmon
  • C . drbdsetup
  • D . drbdmeta

Reveal Solution Hide Solution

Correct Answer: C
Question #4

How can you check the status and configuration of network bonding interfaces using the nmcli command?

  • A . nmcli show bonding
  • B . nmcli bond show
  • C . nmcli interface bonding
  • D . nmcli bonding status

Reveal Solution Hide Solution

Correct Answer: B
Question #5

How can you create and manage Rados Block Devices (RBDs) in Ceph?

  • A . By using the ceph-deploy command-line tool.
  • B . By configuring OSDs with the desired storage devices.
  • C . By interacting with the rados command-line tool.
  • D . By adjusting the CRUSH map to include RBD pools.

Reveal Solution Hide Solution

Correct Answer: C
Question #6

What does the term "split brain" refer to in the context of high availability clusters?

  • A . Nodes competing for resources after a failure
  • B . Data inconsistency due to replication delays
  • C . Failure of the entire cluster
  • D . Network partition causing communication issues

Reveal Solution Hide Solution

Correct Answer: D
Question #7

In the command: pcs constraint order VHost1IPv4 ____ HTTPD which missing word is required in order to ensure that the service HTTPD is always started after the service VHost1IPv4?

Solution: then -or- THEN

Determine whether the given solution is correct?

  • A . Correct
  • B . Incorrect

Reveal Solution Hide Solution

Correct Answer: A
Question #8

Which parameter of vgchange controls whether a volume group is shared within a shared storage cluster? (Specify ONLY the option name without any values or parameters.)

Solution: -c -or- c -or- clustered -or- –clustered

Determine whether the given solution is correct?

  • A . Correct
  • B . Incorrect

Reveal Solution Hide Solution

Correct Answer: A
Question #9

Which one of the following should NOT be used as a lowlevel device for DRBD?

  • A . A LVM logical volume
  • B . A physical hard disk
  • C . A EVMS volume
  • D . A loop device

Reveal Solution Hide Solution

Correct Answer: D
Question #10

Which of the following situations can result in a split brain situation in a high availability cluster?

  • A . The load balancer of a load balanced cluster fails.
  • B . The communication between the cluster nodes is interrupted.
  • C . Cluster services are moved between cluster nodes.
  • D . More than one node is active in a load balanced cluster.
  • E . A cluster node has successfully been fenced.

Reveal Solution Hide Solution

Correct Answer: B

Question #11

What are the key concepts of Ceph updates?

  • A . Update order, tunables, and features
  • B . Update intervals, reliability, and performance
  • C . Update compatibility, licensing, and documentation
  • D . Update security, monitoring, and automation

Reveal Solution Hide Solution

Correct Answer: A
Question #12

Which utility is used for monitoring and managing system resources in monit?

  • A . smartctl
  • B . nvme-cli
  • C . apcupsd
  • D . monit

Reveal Solution Hide Solution

Correct Answer: D
Question #13

What is the purpose of configuring high availability aspects of GlusterFS?

  • A . To prevent unauthorized access to storage volumes.
  • B . To ensure continuous availability of storage services.
  • C . To optimize storage performance for specific workloads.
  • D . To enable replication of data across multiple storage nodes.

Reveal Solution Hide Solution

Correct Answer: B
Question #14

What is true for a virtual IP address in the context of keepalived? (Choose TWO correct answers.)

  • A . The distinct IP addresses of all backend servers are called virtual IP addresses.
  • B . Every server running keepalived has exactly one virtual IP address and cannot have any additional virtual IP addresses.
  • C . The virtual IP address is the address to which incoming connections are made in order to reach the load balancer.
  • D . keepalived uses VRRP to ensure the availability of the virtual IP address.
  • E . Within the whole LVS cluster managed by keepalived, the virtual IP address never appears on any network interface.

Reveal Solution Hide Solution

Correct Answer: CD
Question #15

When running a Linux Virtual Server (LVS) cluster, what is the purpose of a nanny process?

  • A . Each nanny process checks the state of one configured service on one real server, and tells LVS if the service on that real server is malfunctioning.
  • B . The nanny process powers off a nonfunctional backend server.
  • C . The nanny process restarts the daemon of a failed service on a real server node.
  • D . The nanny process changes the IP routing table in the Linux kernel according to the LVS configuration.

Reveal Solution Hide Solution

Correct Answer: A
Question #16

Which of the following statements is true about clustered file systems?

  • A . They are only used for distributed file storage.
  • B . They cannot be maintained and troubleshooted.
  • C . They provide concurrent access to shared file systems in a cluster.
  • D . They are limited to specific Linux distributions.

Reveal Solution Hide Solution

Correct Answer: C
Question #17

Which of the following are tools or services that manage a Linux Virtual Server (LVS) setup? (Choose TWO correct answers.)

  • A . keepalived
  • B . ldirectord
  • C . lvproxy
  • D . roundrobind
  • E . vserverd

Reveal Solution Hide Solution

Correct Answer: AB
Question #18

In a Pacemaker cluster, which one of the following commands shows the right syntax for fencing the node on port 3 using the APC rack PDU device which can be found at IP address 192.168.1.145?

  • A . apc_stonith -a 192.168.1.145 -l apc -n 3 -v -o shutdown -r now
  • B . fence_apc -a 192.168.1.145 -l apc -p apc -n 3 -v -o shutdown -r now
  • C . fence_apc -a 192.168.1.145 -l apc -p apc -n 3 -v -o reboot
  • D . apc_stonith -a 192.168.1.145 -l apc -p apc -n 3 -v -o reboot

Reveal Solution Hide Solution

Correct Answer: C
Question #19

Using Linux Virtual Server (LVS) without any additional tools provides which of the following features?

  • A . Balancing network connections across several backend servers.
  • B . Automatically taking over the services of failed nodes.
  • C . Restarting failed services on the backend servers.
  • D . Checking the integrity of services on backend servers.
  • E . Starting and stopping backend servers as needed.

Reveal Solution Hide Solution

Correct Answer: A
Question #20

What is the purpose of mdadm monitoring and reporting?

  • A . To track the CPU usage of the RAID devices.
  • B . To monitor the temperature of the RAID disks.
  • C . To receive notifications about RAID array failures.
  • D . To optimize the performance of the RAID array.

Reveal Solution Hide Solution

Correct Answer: C

Question #21

Which utility is used to manage software RAID devices on Linux?

  • A . smartctl
  • B . fdisk
  • C . lvm
  • D . mdadm

Reveal Solution Hide Solution

Correct Answer: D
Question #22

What does the /proc/mdstat file contain?

  • A . Information about the system’s memory usage.
  • B . Details about the RAID devices and their status.
  • C . The configuration file for the mdadm utility.
  • D . A log of disk check operations performed on the array.

Reveal Solution Hide Solution

Correct Answer: B
Question #23

Which command-line utility is used to manage the fencing devices in a Pacemaker cluster?

  • A . stonith_admin
  • B . stonith
  • C . sbd
  • D . pcs

Reveal Solution Hide Solution

Correct Answer: B
Question #24

How can you configure traffic shaping and control in Linux?

  • A . By modifying the /etc/network/interfaces file.
  • B . By using the nmcli command with appropriate options.
  • C . By configuring traffic shaping parameters in the switch.
  • D . By using the ip command with appropriate options.

Reveal Solution Hide Solution

Correct Answer: D
Question #25

Which utility is used to resize a GFS2 file system?

  • A . mkfs.gfs2
  • B . mount.gfs2
  • C . fsck.gfs2
  • D . gfs2_grow

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Which bond mode in network bonding provides fault tolerance by using one active interface and one standby interface?

  • A . Active-Backup
  • B . Balance-TLB
  • C . Balance-ALB
  • D . 802.3ad

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Which of the following statements is true regarding journals of a GFS2 filesystem?

  • A . Each GFS2 filesystem has exactly one journal.
  • B . Once a GFS2 filesystem is created, the number of journals cannot be changed.
  • C . Every node that simultaneously mounts the filesystem requires its own GFS2 journal.
  • D . Journals were heavily used in GFS and are deprecated and optional in GFS2.
  • E . The GFS Cluster Journal Daemon, GCJD, handles the journaling in a GFS2 cluster.

Reveal Solution Hide Solution

Correct Answer: C
Question #28

Which one of the following is NOT a required component for running an OCFS2 filesystem resource in a Pacemaker cluster?

  • A . A clone resource for the OCFS2 file system.
  • B . A shared storage device accessible by all nodes using the OCFS2 filesystem.
  • C . The distributed lock manager (DLM).
  • D . The cluster logical volume manager (CLVM).
  • E . The O2CB service.

Reveal Solution Hide Solution

Correct Answer: D
Question #29

Which of the following configuration settings specify that keepalived is to use the round robin algorithm?

  • A . lb_mode rr
  • B . lb_algo rr
  • C . loadbalancer_mode=rr
  • D . algorithm=round robin
  • E . lb_algorithm=rr

Reveal Solution Hide Solution

Correct Answer: B
Question #30

Load Balanced Clusters commonly utilize which of the following algorithms to distribute incoming traffic among backend servers?

  • A . ACLs
  • B . VRRP
  • C . Syncd
  • D . Connection scheduling algorithms

Reveal Solution Hide Solution

Correct Answer: D

Question #31

Which of the following is not a device classes are commonly used STONITH devices?

  • A . CPU frequency management tools
  • B . Remote Management Services like iLO or DRAC
  • C . Blade Control Devices
  • D . Uninterruptable Power Supplies, UPS

Reveal Solution Hide Solution

Correct Answer: A
Question #32

In case one service in a Pacemaker cluster depends on another service running on the same node, which score should be assigned to the constraint describing that dependency?

  • A . -1
  • B . 0
  • C . 1
  • D . FORCE
  • E . INFINITY

Reveal Solution Hide Solution

Correct Answer: E
Question #33

How can you configure VLANs on network interfaces?

  • A . By modifying the /etc/network/interfaces file.
  • B . By using the nmcli command with appropriate options.
  • C . By configuring VLANs in the switch configuration.
  • D . By running the ifenslave command with VLAN parameters.

Reveal Solution Hide Solution

Correct Answer: A
Question #34

What is the purpose of restoring and verifying the integrity of a Ceph cluster after an outage?

  • A . To repair data corruption in storage pools.
  • B . To ensure that all OSDs are functioning properly.
  • C . To synchronize the metadata between MDS instances.
  • D . To rebalance the data across OSDs.

Reveal Solution Hide Solution

Correct Answer: D
Question #35

What is the purpose of monitoring S.M.A.R.T values using smartmontools?

  • A . To monitor the system’s CPU usage.
  • B . To monitor the system’s memory usage.
  • C . To monitor the health of storage devices.
  • D . To monitor network bandwidth usage.

Reveal Solution Hide Solution

Correct Answer: C
Question #36

Which load balancing algorithm considers the load and capacity of backend servers to distribute traffic efficiently?

  • A . NAT (Network Address Translation)
  • B . Direct Routing
  • C . Tunneling
  • D . Dynamic Round Robin

Reveal Solution Hide Solution

Correct Answer: D
Question #37

Which one of the following options represents a valid declaration of a backend server with HAProxy?

  • A . host server_x 10.1.0.1:80 cookie server_x
  • B . backend server_x 10.1.0.1:80
  • C . server server_x 10.1.0.1:80 check
  • D . pool server_x 10.1.0.1:80

Reveal Solution Hide Solution

Correct Answer: C
Question #38

What is the purpose of RSTP (Rapid Spanning Tree Protocol) in switch configuration for high availability?

  • A . To provide load balancing across multiple network interfaces.
  • B . To ensure redundancy and quick recovery in case of network failures.
  • C . To manage VLANs and network segmentation.
  • D . RSTP is not related to switch configuration.

Reveal Solution Hide Solution

Correct Answer: B
Question #39

Which of the following Messaging Layers are supported by Pacemaker? (Choose TWO correct answers.)

  • A . Heartbeat
  • B . OpenAIS
  • C . DRBD
  • D . SCMP
  • E . Slurm

Reveal Solution Hide Solution

Correct Answer: AB
Question #40

What is the purpose of ACLs (Access Control Lists) in the context of Load Balanced Clusters?

  • A . Load balancing algorithm selection
  • B . Backend server configuration
  • C . IP address failover
  • D . Implementing access control rules

Reveal Solution Hide Solution

Correct Answer: D

Question #41

HAProxy is commonly used as a load balancer in Load Balanced Clusters.

What is the primary function of HAProxy?

  • A . Backend server networking
  • B . Connection scheduling algorithms
  • C . Load balancing and proxying
  • D . IP address failover

Reveal Solution Hide Solution

Correct Answer: C
Question #42

What is LVM (Logical Volume Manager)?

  • A . A file system used in Linux for managing storage devices.
  • B . A utility for partitioning hard drives into multiple logical volumes.
  • C . A software layer that provides flexible management of disk space.
  • D . A command-line tool for creating RAID arrays.

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which utility is used to create device maps for multipathed devices in Linux?

  • A . tgtadm
  • B . kpartx
  • C . multipath
  • D . pvmove

Reveal Solution Hide Solution

Correct Answer: B
Question #44

How does the command to add a new resource to a Pacemaker cluster using crm begin?

  • A . crm manage cluster
  • B . crm configure primitive
  • C . crm service add
  • D . crm configure resource
  • E . crm resource new

Reveal Solution Hide Solution

Correct Answer: B
Question #45

Which command is used to create a new physical volume in LVM?

  • A . pvcreate
  • B . vgcreate
  • C . lvcreate
  • D . pvdisplay

Reveal Solution Hide Solution

Correct Answer: A
Question #46

What is the purpose of the drbdmon utility?

  • A . To manage DRBD networking connections
  • B . To monitor the status of DRBD devices
  • C . To configure automatic recovery and error handling
  • D . To verify the integrity of a DRBD device

Reveal Solution Hide Solution

Correct Answer: B
Question #47

How can you add a new device to an existing RAID array?

  • A . Using the mdadm command with the –add option.
  • B . By running the fsck utility on the array.
  • C . Using the lvm command to extend the array.
  • D . By modifying the /proc/mdstat file manually.

Reveal Solution Hide Solution

Correct Answer: A
Question #48

Which of the following commands displays only the resources of the cluster information base of a pacemaker cluster?

  • A . cibquery -o resources
  • B . cibadmin -R
  • C . cibadmin -Q -o resources
  • D . cibquery -L resources
  • E . cib_admin -L resources

Reveal Solution Hide Solution

Correct Answer: C
Question #49

Which of the following commands can be used to safely test and preview Pacemaker configuration changes? (Choose TWO correct answers.)

  • A . crm_test
  • B . crm_simulate
  • C . crm_dryrun
  • D . crm_lab
  • E . crm_shadow

Reveal Solution Hide Solution

Correct Answer: BE
Question #50

What is the purpose of the nvme-cli utility?

  • A . To monitor network interfaces.
  • B . To configure NVMe storage devices.
  • C . To manage power supply events.
  • D . To monitor system memory usage.

Reveal Solution Hide Solution

Correct Answer: B

Question #51

What is the purpose of a Storage Area Network (SAN)?

  • A . To provide network connectivity for servers
  • B . To store and retrieve data from remote block storage devices
  • C . To connect multiple servers together in a cluster
  • D . To manage file systems on distributed storage

Reveal Solution Hide Solution

Correct Answer: B
Question #52

How can you recover a RAID device after a failure?

  • A . By replacing the failed disk and running the mdadm –rebuild command.
  • B . By reformatting the RAID device and rebuilding the array from scratch.
  • C . By running the fsck utility on the array to fix any disk errors.
  • D . By modifying the /proc/sys/dev/raid/ file to restore the array.

Reveal Solution Hide Solution

Correct Answer: A
Question #53

Which of the following statements are true regarding a load balancer? (Choose TWO correct answers.)

  • A . Failover clusters are not operational without at least one dedicated load balancer.
  • B . All response packages sent from a backend server to a client must pass through the load balancer.
  • C . The load balancer is usually deployed on one of the backend servers.
  • D . Load balancers may be able to analyze traffic.
  • E . All incoming connections to the cluster services are received by the load balancer.

Reveal Solution Hide Solution

Correct Answer: DE
Question #54

In the command: crm configure ____ http-after-ipv4 Mandatory: VHost1IPv4 HTTPD which missing word is required in order to ensure that the service HTTPD is always started after the service VHost1IP?

Solution: order -or- ORDER

Determine whether the given solution is correct?

  • A . Correct
  • B . Incorrect

Reveal Solution Hide Solution

Correct Answer: A
Question #55

Which actions should be taken in a load balanced cluster in order to protect the load balancer against outages?

  • A . Load balancers cannot be protected against outages which is why they should always be built on dedicated hardware.
  • B . No actions are necessary as a load balancer cannot become a single point of failure.
  • C . Two or more load balancers should be deployed as a cascade that passes packets from one to the other.
  • D . Two load balancers should be deployed as a failover cluster.
  • E . Load balancers are used for performance and scalability reasons only and cannot be used to archive high availability clusters.

Reveal Solution Hide Solution

Correct Answer: D
Question #56

What is the purpose of configuring system shutdown at specific UPS events?

  • A . To prevent data loss during power outages.
  • B . To optimize system performance during high resource usage.
  • C . To automatically restart the system after a hardware failure.
  • D . To extend the lifespan of storage devices.

Reveal Solution Hide Solution

Correct Answer: A
Question #57

Which command-line utility is used to manage the Pacemaker cluster configuration database?

  • A . pcs
  • B . crm
  • C . crm_mon
  • D . cibadmin

Reveal Solution Hide Solution

Correct Answer: D
Question #58

In a cluster with shared-nothing architecture, how is data shared between nodes?

  • A . Nodes share a common disk
  • B . Data is replicated across all nodes
  • C . Each node has its own copy of data
  • D . Data is distributed across multiple disks

Reveal Solution Hide Solution

Correct Answer: C
Question #59

What is the purpose of placement groups (PGs) in a Ceph cluster?

  • A . To distribute data across OSDs for redundancy and performance.
  • B . To manage access control for different storage pools.
  • C . To synchronize data between MDS instances in a CephFS.
  • D . To monitor the health and availability of MON nodes.

Reveal Solution Hide Solution

Correct Answer: A
Question #60

What is the purpose of fencing in a high availability cluster?

  • A . Prevent failed nodes from interfering with the remaining intact part of the cluster.
  • B . Ensure a consistent assignment of all network connections from a client to the same cluster server.
  • C . Define constraints on which services may run on the same cluster node.
  • D . Enforce storage quota and other resource limitations for each service provided by the cluster.
  • E . Provide multi-tenancy cluster configuration for cloud computing.

Reveal Solution Hide Solution

Correct Answer: A

Question #61

Which utility is commonly used to manage and control DRBD devices?

  • A . drbdadm
  • B . drbdmon
  • C . drbdsetup
  • D . drbdmeta

Reveal Solution Hide Solution

Correct Answer: A
Question #62

Which of the following sections are found in the Pacemaker configuration XML file?

  • A . <pacemaker> and <corosync>
  • B . <configuration> and <status>
  • C . <nodes> and <services>
  • D . <ressources> and <services>
  • E . <cluster> and <state>

Reveal Solution Hide Solution

Correct Answer: B
Question #63

Which cluster architecture involves a primary node and a standby node that takes over when the primary node fails?

  • A . Active/Passive Cluster
  • B . Active/Active Cluster
  • C . Failover Cluster
  • D . Load Balanced Cluster

Reveal Solution Hide Solution

Correct Answer: A
Question #64

What is network bonding?

  • A . Combining multiple network interfaces into a single logical interface.
  • B . Configuring VLANs on network interfaces for traffic separation.
  • C . Enabling redundant networking connections for high availability.
  • D . Establishing a secure connection between two networks.

Reveal Solution Hide Solution

Correct Answer: A
Question #65

Which utility can be used to manage network bonding in Linux?

  • A . nmcli
  • B . ip
  • C . ifenslave
  • D . bonding.ko

Reveal Solution Hide Solution

Correct Answer: C
Question #66

What is the purpose of the lvextend command?

  • A . To create a new logical volume in LVM.
  • B . To extend the size of an existing logical volume.
  • C . To display information about logical volumes.
  • D . To remove a logical volume from LVM.

Reveal Solution Hide Solution

Correct Answer: B
Question #67

Which tool is used to configure system shutdown at specific UPS events?

  • A . smartctl
  • B . nvme-cli
  • C . apcupsd
  • D . monit

Reveal Solution Hide Solution

Correct Answer: C
Question #68

Which clustered file system is commonly used on Linux and has the acronym OCFS2?

  • A . Open Cluster File System 2
  • B . Oracle Clustered File System 2
  • C . Online Cluster File System 2
  • D . Open-source Cluster File System 2

Reveal Solution Hide Solution

Correct Answer: B
Question #69

When using HAProxy to load balance requests over a set of web servers, what directive is needed in the HAProxy configuration in order to be able to log, on the backend web servers, the IP address of the client making a request?

  • A . option reverseproxy
  • B . option forwardfor
  • C . option clientlog
  • D . option exposeclient

Reveal Solution Hide Solution

Correct Answer: B
Question #70

What is the purpose of configuring DRBD networking connections and meshes?

  • A . To specify the replication modes used by DRBD
  • B . To define the IP addresses and ports used for communication between nodes
  • C . To manage split brain situations
  • D . To configure automatic recovery and error handling

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version