Which statement is true regarding the Linux kernel module that must be loaded in order to use KVM?
Which statement is true regarding the Linux kernel module that must be loaded in order to use KVM?A . It must be loaded into the kernel of each virtual machine to provide paravirtualization which is required by KVC . It must be loaded into the kernel of the host system...
What is the usual way to gain command line access to computing instances in an IaaS cloud?
What is the usual way to gain command line access to computing instances in an IaaS cloud?A . By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances.B . Usually computing instances are accessed through a web...
When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done? (Choose TWO correct answers.)
When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done? (Choose TWO correct answers.)A . Remove all default users and groups, including root and nobody.B . Remove all configuration files from /etc/ that were not manually modified.C ....
Which command within virsh lists the virtual machines that are available on the current host?
Which command within virsh lists the virtual machines that are available on the current host?A . viewB . showC . list-vmD . listE . list-allView AnswerAnswer: D
Which of the following restrictions is true when using KVM with the User Network?
Which of the following restrictions is true when using KVM with the User Network?A . Virtual Machines must use a SOCKS proxy to connect to the internet.B . Virtual Machines can communicate with the host system and with other virtual machines using User Network.C . Virtual Machines can only communicate...
Which of the following technologies is the most important component of IaaS clouds?
Which of the following technologies is the most important component of IaaS clouds?A . Database replicationB . DNS delegationC . EmulationD . Mandatory Access ControlE . VirtualizationView AnswerAnswer: E
Which one of the following tools can NOT be used to create virtual machines, including their configuration in a libvirt-based KVM environment?
Which one of the following tools can NOT be used to create virtual machines, including their configuration in a libvirt-based KVM environment?A . virt-cloneB . virt-installC . virt-imgD . virt-managerView AnswerAnswer: C
Which of the following is true regarding the CPU of a KVM virtual machine? (Choose TWO correct answers.)
Which of the following is true regarding the CPU of a KVM virtual machine? (Choose TWO correct answers.)A . Each KVM virtual machine can only have one CPU with one core.B . KVM virtual machines support multiple virtual CPUs in order to run SMP systems.C . The CPU architecture of...
A configuration file for a Xen virtual machine was created with file name slack.cfg withinXen's configuration directory.Which of the following commands starts the virtual machine defined in this configuration file and opens the virtual machine's console on the current command line?
A configuration file for a Xen virtual machine was created with file name slack.cfg withinXen's configuration directory.Which of the following commands starts the virtual machine defined in this configuration file and opens the virtual machine's console on the current command line?A . xl start slackB . xl create slack.cfg --show-consoleC...
Which command in the KVM monitor ejects the first IDE CDROM drive?
CORRECT TEXT. Which command in the KVM monitor ejects the first IDE CDROM drive? (Specify the KVM monitor command INCLUDING ALL REQUIRED PARAMETERS.)A . eject ide1-cd0, eject -f ide1-cd0View AnswerAnswer: A