Pass4itsure > Lpi > LPI Certifications > 304-200 > 304-200 Online Practice Questions and Answers

304-200 Online Practice Questions and Answers

Questions 4

Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO correct answers.)

A. More than one container requires access to block devices available in the host system.

B. Remote access via SSH is required to all containers.

C. Each container needs to have its own user accounts and user groups.

D. Administrators of containers must be able to install customized Linux kernels.

E. Different operating systems are to be used within containers on the same virtualization host.

Buy Now
Questions 5

Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)

A. Creation of new instances can be automated by using scripts or APIs and service interfaces.

B. The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.

C. Each and every user of an IaaS cloud has exactly one computing instance.

D. Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's data.

E. Instances may be created when needed and destroyed when they become obsolete.

Buy Now
Questions 6

Which of the following commands are needed to establish a private network between two (or more) KVM virtual machines that is not visible to other KVM instances on the same KVM host? (Choose THREE correct answers.)

A. ifconfig

B. brctl

C. tunctl

D. ipconfig

E. ebtables

Buy Now
Questions 7

Which of the following statements describes fencing resources in a high availability cluster?

A. Fencing is the automated stop and restart of cluster services that suffer from software errors.

B. Fencing is the disconnection of a failed cluster node from any other cluster resources.

C. Fencing is the forwarding of incoming network connections to backend servers.

D. Fencing is the assignment of services to different cluster nodes to avoid interference of the services.

E. Fencing is the accounting and limitation of disk usage on shared storage.

Buy Now
Questions 8

Which of the following sections are found in the Pacemaker configuration XML file?

A. and

B. and

C. and

D. and

E. and

Buy Now
Questions 9

Which one of the following options represents a valid declaration of a backend server with HAProxy?

A. host server_x 10.1.0.1:80 cookie server_x

B. backend server_x 10.1.0.1:80

C. server server_x 10.1.0.1:80 check

D. pool server_x 10.1.0.1:80

Buy Now
Questions 10

How can the state of the backing storage disks of a DRBD device be checked? (Choose TWO correct answers.)

A. cat /proc/drdb/status

B. cat /proc/drdb

C. drbdadm dstate all

D. drbdadm diskstatus all

E. drbdadm state --disk all

Buy Now
Questions 11

Which one of the following should NOT be used as a lowlevel device for DRBD?

A. A LVM logical volume

B. A physical hard disk

C. A EVMS volume

D. A loop device

Buy Now
Questions 12

What is the purpose of the Cluster Configuration System (CCS)?

A. It manages the cluster configuration information file.

B. It fences a dropped node.

C. It manages ACLs for cluster service access.

D. It manages the network topology and settings for the cluster.

Buy Now
Questions 13

Where are paravirtualized device drivers installed?

A. In the Guest OS

B. In the Host OS

C. Compiled into the hypervisor

D. No special drivers are required for paravirtualization.

Buy Now
Exam Code: 304-200
Exam Name: LPIC-3 Virtualization and Containerization - Exam 304 - version 2.0
Last Update: Dec 16, 2024
Questions: 129
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99