Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO correct answers.)
A. More than one container requires access to block devices available in the host system.
B. Remote access via SSH is required to all containers.
C. Each container needs to have its own user accounts and user groups.
D. Administrators of containers must be able to install customized Linux kernels.
E. Different operating systems are to be used within containers on the same virtualization host.
Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)
A. Creation of new instances can be automated by using scripts or APIs and service interfaces.
B. The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
C. Each and every user of an IaaS cloud has exactly one computing instance.
D. Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's data.
E. Instances may be created when needed and destroyed when they become obsolete.
Which of the following commands are needed to establish a private network between two (or more) KVM virtual machines that is not visible to other KVM instances on the same KVM host? (Choose THREE correct answers.)
A. ifconfig
B. brctl
C. tunctl
D. ipconfig
E. ebtables
Which of the following statements describes fencing resources in a high availability cluster?
A. Fencing is the automated stop and restart of cluster services that suffer from software errors.
B. Fencing is the disconnection of a failed cluster node from any other cluster resources.
C. Fencing is the forwarding of incoming network connections to backend servers.
D. Fencing is the assignment of services to different cluster nodes to avoid interference of the services.
E. Fencing is the accounting and limitation of disk usage on shared storage.
Which of the following sections are found in the Pacemaker configuration XML file?
A.
B.
C.
D.
E.
Which one of the following options represents a valid declaration of a backend server with HAProxy?
A. host server_x 10.1.0.1:80 cookie server_x
B. backend server_x 10.1.0.1:80
C. server server_x 10.1.0.1:80 check
D. pool server_x 10.1.0.1:80
How can the state of the backing storage disks of a DRBD device be checked? (Choose TWO correct answers.)
A. cat /proc/drdb/status
B. cat /proc/drdb
C. drbdadm dstate all
D. drbdadm diskstatus all
E. drbdadm state --disk all
Which one of the following should NOT be used as a lowlevel device for DRBD?
A. A LVM logical volume
B. A physical hard disk
C. A EVMS volume
D. A loop device
What is the purpose of the Cluster Configuration System (CCS)?
A. It manages the cluster configuration information file.
B. It fences a dropped node.
C. It manages ACLs for cluster service access.
D. It manages the network topology and settings for the cluster.
Where are paravirtualized device drivers installed?
A. In the Guest OS
B. In the Host OS
C. Compiled into the hypervisor
D. No special drivers are required for paravirtualization.