Deck 11: LPIC-3 Virtualization & High Availability

Full screen (f)
exit full mode
Question
Which of the following statements are true for full virtualization?

A) Full virtualization does not require changes to the guest operating systems.
B) Full virtualization has no performance impact compared to a non-virtualized bare-metal installation on the same machine.
C) Full virtualization has a severe performance impact and should not be used in production environments.
D) Full virtualization may be supported by special CPU extensions that provide better performance.
E) Full virtualization always requires additional software components and cannot be done using Linux only.
Use Space or
up arrow
down arrow
to flip the card.
Question
What is libvirt?

A) An identity manager used to provide Single-Sign-On for different operating systems.
B) A driver package used to support 3D printers.
C) A cluster manager used to handle node access to shared storage.
D) A combined interface to several virtualization products.
E) A Linux-based virtualization hypervisor.
Question
Which of the following products use container-based virtualization?

A) KVM
B) Linux VServer
C) LXC
D) OpenVZ
E) Xen
Question
When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?

A) All floppy, CDROM, and hard disk drives in that order.
B) No devices are searched and the user is prompted to choose the boot device.
C) All network interfaces attached to the VM.
D) All hard disks and no other devices.
E) No devices are searched in order to support directly booting a Linux kernel.
Question
When migrating a physical machine to a full virtualized machine, which of the following properties should be expected to change from the perspective of the guest operating system?

A) The user accounts within the guest operating system.
B) The properties of the CPU and other hardware devices.
C) The MAC address of the network interfaces.
D) The version of the guest operating system.
E) The software and applications installed on the guest system.
Question
Which statement is true regarding the Linux kernel module that must be loaded in order to use KVM?

A) It must be loaded into the kernel of each virtual machine to provide paravirtualization which is required by KVM.
B) It must be loaded into the kernel of the host system in order to use the virtualization extensions of the host system's CPU.
C) It must be loaded into the kernel of the host system only if the console of a virtual machine will be connected to a physical console of the host system.
D) It must be loaded into the kernel of each virtual machine that will access files and directories from the host system's file system.
E) It must be loaded into the kernel of the first virtual machine as it interacts with the KVM bare metal hypervisor and is required to trigger the start of additional virtual machines.
Question
When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done?

A) Remove all default users and groups, including root and nobody.
B) Remove all configuration files from /etc/ that were not manually modified.
C) Remove all confidential data from the image.
D) Remove all remote login services (i.e. SSH) from the image.
E) Remove all private SSH keys from the image.
Question
Which daemon applies the configuration and commands of libvirt to the virtualization components of the host system?

A) vmd
B) virtuald
C) libvirtmgr
D) libvirt-worker
E) libvirtd
Question
Which of the following statements are true regarding IaaS computing instances?

A) Creation of new instances can be automated by using scripts or APIs and service interfaces.
B) The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
C) Each and every user of an IaaS cloud has exactly one computing instance.
D) Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's data.
E) Instances may be created when needed and destroyed when they become obsolete.
Question
Which of the following technologies is the most important component of IaaS clouds?

A) Database replication
B) DNS delegation
C) Emulation
D) Mandatory Access Control
E) Virtualization
Question
Which of the following KVM parameters is identical to the KVM parameter -hdb file.img?

A) -drive bus=ide1,type=slave,image=file.img
B) -drive image=file.img,if=ide,device=hdb
C) -drive bus=hd,busid=b,src=file.img
D) -drive file=file.img,index=1,media=disk,if=ide
E) -drive type=loop,src=file.img,dst=disk:hdb
Question
Which of the following statements are true regarding Xen domains?

A) Fully virtualized and paravirtualized domains are managed using the same tools and commands.
B) Xen domains of all types require virtualization extensions in the host system's CPU.
C) All fully virtualized domains are called 'Dom0' while all paravirtualized domains are called 'DomU'.
D) Both paravirtualized and fully virtualized domains may run on the same host system.
E) Paravirtualized domains are significantly slower than fully virtualized domains.
Question
Which options to the xl command will deactivate a running Xen virtual machine?

A) destroy
B) remove
C) shutdown
D) stop
E) halt
Question
Which of the following is true regarding the CPU of a KVM virtual machine?

A) Each KVM virtual machine can only have one CPU with one core.
B) KVM virtual machines support multiple virtual CPUs in order to run SMP systems.
C) The CPU architecture of a KVM virtual machine is independent of the host system's architecture.
D) For each KVM virtual machine one dedicated physical CPU core must be reserved.
E) KVM uses the concept of virtual CPUs to map the virtual machines to physical CPUs.
Question
Which of the following tools is used to interact with XenStore?

A) xenstore-ls
B) xendo
C) xs
D) xl store
E) xstore
Question
Which of the following components are parts of XAPI?

A) The XADB configuration management database.
B) The XAPI virtual file system available at /xen.
C) The xm command.
D) The xe command.
E) The xapi daemon.
Question
Which CPU flag indicates the hardware virtualization capability on an AMD CPU?

A) SVM
B) VIRT
C) VMX
D) PVM
E) HVM
Question
Which of the following directives is used in the configuration file of a Xen guest domain in order to define network interfaces?

A) vif
B) eth
C) vnet
D) vbr
E) net
Question
What is the usual way to gain command line access to computing instances in an IaaS cloud?

A) By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances.
B) Usually computing instances are accessed through a web frontend and do not allow command line access.
C) By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.
D) By using a telnet session with the credentials set and publicized by the creator of the computing instance's system image.
E) By using a VNC console which does not require authentication when it is invoked via the cloud management system.
Question
Within the graphical output of a KVM virtual machine, which key sequence switches to the KVM monitor of the VM?

A) Ctrl-Alt-1
B) Ctrl-Alt-0
C) Ctrl-Alt-4
D) Ctrl-Alt-2
E) Ctrl-Alt-3
Question
Which of the following commands lists the snapshots existing in the disk image vm1.img?

A) qemu-info snapshots vm1.img
B) qemu-img snapshot -l vm1.img
C) qemu -hda snapshot -l vm1.img -noboot -list snapshots
D) qemu-snapshots -l vm1.img
E) qemu-monitor -snapshots -hda vm1.img
Question
How can data be shared between several virtual machines running on the same Linux-based host system?

A) By mounting other VM's file systems from /dev/virt-disks/remote/.
B) By using a network file system or file transfer protocol.
C) By default, Linux-based virtualization products provide full access to the host system to all virtual machines.
D) By setting up a ramdisk in one virtual machine and mounting it using its UUID in the other VMs.
E) By attaching the same virtual hard disk to all virtual machines and activating EXT4 sharing extensions on it.
Question
Which of the following are valid KVM parameters?

A) -drive file=iscsi:// user%password@fileserver/iqn.2001-04.com.example/1
B) -drive file=rsync:// user%password@fileserver:/tmp/file.iso,media=cdrom,readonly
C) -drive file=ssh:// user@host/tmp/file.img
D) -drive file=imap:// user:password@mailserver:/INBOX/Wufnc6MjYp@mailgate
E) -drive file=http:// user:password@fileserver/pub/linux.iso,media=cdrom,readonly
Question
What is oVirt?

A) An extension to the Linux Kernel used to provide container virtualization similar to LXC and OpenVZ.
B) A library that provides access to several different virtualization technologies in a common manner.
C) A comprehensive management infrastructure for Linux-based virtualization.
D) An approach used to eliminate the need for virtualization called Zero-Virt.
E) A Linux-based hypervisor similar to KVM and Xen.
Question
Which of the following commands can be used to determine whether the local machine is capable of running full virtualized Xen guests?

A) dmesg |grep -i intel|grep -i vt; dmesg |grep -i amd|grep -i v
B) egrep '(vmx|svm)' /proc/cpuinfo
C) xl dmesg | grep -i hvm
D) grep -i "Full Virtualization" /proc/xen
E) grep -i "Full Virtualization" /etc/xen/*
Question
How can data in a computing instance in an IaaS cloud be permanently saved and accessed even after the recreation of the computing instance?

A) By saving the data to the memory of the computing instance using tmpfs.
B) By saving the data anywhere in the computing instance's file system.
C) By saving the data to /cloud/persistent/ which is provided in all common IaaS clouds.
D) By saving the data to object stores provided by a separate service in the cloud.
E) By saving the data on persistent block devices that must be explicitly connected to the computing instance.
Question
Which of the following data should be copied to the virtual machine when migrating a physical machine to a virtual machine?

A) The block device buffers
B) The CPU flags
C) The file systems or their content
D) The CPU register's content
E) The memory
Question
Which of the following statements is true regarding XenStore?

A) It is a web interface used to provide self-service domain provisioning to users with sufficient privileges.
B) It saves the persistent configuration of all defined Xen domains and restores them when the host system is started.
C) It manages disk file images on behalf of all virtual machines and provides them as virtual devices to guest domains.
D) It stores run time information regarding Xen and its domains using hierarchical namespaces shared between domains.
E) It is a software repository located within the host system used to provide software packages to the guest domains.
Question
Which of the following statements are true about container-based virtualization?

A) All containers run within the operating system kernel of the host system.
B) Different containers may use different distributions of the same operating system.
C) Each container runs its own operating system kernel.
D) Container-based virtualization relies on hardware support from the host systems CPU.
E) Linux does not support container-based virtualization because of missing kernel APIs.
Question
Which file format is used by libvirt to store configuration data?

A) INI-style text files
B) Text files containing key/value pairs
C) Java-like .properties files
D) XML files
E) SQLite databases
Question
Which of the following statements is true regarding the following output of xl list:     Name          ID   Mem VCPUs      State   Time(s)     Domain-0       0   384     1     r-----    498.7       Debian         2   305     1     --p---    783.5       Slack          6    64     1     -b----    313.6       CentOS         7   512     2     r-----    455.1

A) It is necessary to use the xl command to change Slack's state to running.
B) CentOS is the domain which has consumed the most CPU time.
C) The domain with ID 2 uses paravirtualization.
D) Both Debian and Slack require xl commands to start running.
E) Slack is idle or waiting for I/O.
Question
Which of the following commands are needed to establish a private network between two (or more) KVM virtual machines that is not visible to other KVM instances on the same KVM host?

A) ifconfig
B) brctl
C) tunctl
D) ipconfig
E) ebtables
Question
Which of the following statements are true regarding a load balancer?

A) Failover clusters are not operational without at least one dedicated load balancer.
B) All response packages sent from a backend server to a client must pass through the load balancer.
C) The load balancer is usually deployed on one of the backend servers.
D) Load balancers may be able to analyze traffic.
E) All incoming connections to the cluster services are received by the load balancer.
Question
Which of the following statements describes the concept behind paravirtualization?

A) Guest operating systems are modified to actively cooperate with the hypervisor in order to ease virtualization costs and gain better performance.
B) Instead of running full virtual machines, containers are used to separate distinct parts of one commonly shared operating system that appear as a virtual machine.
C) To avoid the need for virtualization, special security measures are taken to allow different applications to coexist on one physical machine.
D) Each operating system is trusted to use only those resources assigned to it, thereby eliminating the need of an additional virtualization layer.
Question
Which of the following statements is true regarding VirtualBox?

A) VirtualBox uses container-based virtualization and can only run virtual machines using the operating system of the host system.
B) VirtualBox can only be run from a graphical desktop environment and not from the text console.
C) VirtualBox provides special device drivers for several operating systems to enhance the virtual machine's performance.
D) VirtualBox contains a hypervisor that runs independently from any other operating system on a bare metal host.
E) VirtualBox is part of the vanilla Linux kernel and does not require any additional software installation on recent Linux distributions.
Question
Which of the following statements are true regarding resource management for full virtualization?

A) The hypervisor may provide fine-grained limits to internal elements of the guest operating system such as the number of processes.
B) Full virtualization cannot pose any limits to virtual machines and always assigns the host system's resources in a first-come-first-serve manner.
C) It is up to the virtual machine to use its assigned hardware resources and create, for example, an arbitrary amount of network sockets.
D) The hypervisor provides each virtual machine with hardware of a defined capacity that limits the resources of the virtual machine.
E) All processes created within the virtual machines are transparently and equally scheduled in the host system for CPU and I/O usage.
Question
What is XAPI?

A) An extension of libvirt which adds live migration of virtual servers between arbitrary hypervisors.
B) A ReSTful API which is used by xl to communicate with the Xen hypervisor.
C) The communication interface between a paravirtualized Linux Kernel and the Xen hypervisor.
D) A high level tool chain which provides advanced management tools and interfaces for Xen.
E) The internal messaging system within the Xen hypervisor.
Question
Which of the following KVM monitor commands changes the image file in the first IDE CDROM drive of a virtual machine?

A) change ide1-cd0 /tmp/linux.iso
B) update ide1-cd0 /tmp/linux.iso
C) set ide1-cd0=/tmp/linux.iso
D) eject --reconnect ide1-cd0 /tmp/linux.iso
E) disc file=/tmp/linux.iso,device=/dev/sr0
Question
Which of the following resources are directly (i.e. without specialized machine images) available to users of an OpenStack cloud?

A) Database servers to store relational data.
B) Virtual machines for computing tasks.
C) Application servers for immediate deployment with Mono applications.
D) Object storage that is accessed through an API.
E) Block storage devices for persistent data storage.
Question
What action does the virsh restore command perform?

A) It restores a virtual machine that was stopped by a kernel panic.
B) It restores a virtual machine from a state file.
C) It reverts a virtual machine, including its storage devices, to a previously saved state.
D) It wakes up a virtual machine that was hibernated by the operating system running inside the virtual machine.
Question
Which one of the following options represents a valid declaration of a backend server with HAProxy?

A) host server_x 10.1.0.1:80 cookie server_x
B) backend server_x 10.1.0.1:80
C) server server_x 10.1.0.1:80 check
D) pool server_x 10.1.0.1:80
Question
What is the name and path of the configuration file for the O2CB cluster that coordinates the nodes using OCFS2 filesystems?

A) /etc/ocfs2/cluster.conf
B) /etc/ocfs/cluster.conf
C) /etc/ocfs2.conf
D) /etc/cluster.conf
Question
Which of the following statements is true regarding the quorum in a two node Pacemaker cluster?

A) Clusters with one or two nodes cannot have a quorum and require no quorum configuration.
B) In a two node cluster, quorum can be determined and handled just as in a cluster with a higher number of nodes.
C) In a two node cluster the quorum is always held by the node that first started the cluster software.
D) The default quorum policy in a two node cluster must be set to ignore in order to configure a working cluster.
Question
When running a Linux Virtual Server (LVS) cluster, what is the purpose of a nanny process?

A) Each nanny process checks the state of one configured service on one real server, and tells LVS if the service on that real server is malfunctioning.
B) The nanny process powers off a nonfunctional backend server.
C) The nanny process restarts the daemon of a failed service on a real server node.
D) The nanny process changes the IP routing table in the Linux kernel according to the LVS configuration.
Question
Which of the following can be used as a low level device for DRBD?

A) A LVM logical volume
B) A physical hard disk
C) A rewritable CD
D) A virtual tape library
E) A tape streamer
Question
Which of the following commands displays only the resources of the cluster information base of a pacemaker cluster?

A) cibquery -o resources
B) cibadmin -R
C) cibadmin -Q -o resources
D) cibquery -L resources
E) cib_admin -L resources
Question
Using Linux Virtual Server (LVS) without any additional tools provides which of the following features?

A) Balancing network connections across several backend servers.
B) Automatically taking over the services of failed nodes.
C) Restarting failed services on the backend servers.
D) Checking the integrity of services on backend servers.
E) Starting and stopping backend servers as needed.
Question
Which of the following are valid load balancing algorithms for HAProxy?

A) persistent
B) weightedrr
C) source
D) leastconn
E) destination
Question
Which actions should be taken in a load balanced cluster in order to protect the load balancer against outages?

A) Load balancers cannot be protected against outages which is why they should always be built on dedicated hardware.
B) No actions are necessary as a load balancer cannot become a single point of failure.
C) Two or more load balancers should be deployed as a cascade that passes packets from one to the other.
D) Two load balancers should be deployed as a failover cluster.
E) Load balancers are used for performance and scalability reasons only and cannot be used to archive high availability clusters.
Question
When using the gatewaying/direct routing forwarding method of Linux Virtual Server (LVS), which of the following statements is true?

A) The default route of all backend servers must point to the LVS host.
B) Every backend server must accept packets addressed to the IP address of the virtual service.
C) On the backend servers, all packets appear to originate from the IP address of the LVS host.
D) The link layer addresses of all backend servers must be included in the LVS configuration.
E) When using gatewaying/direct routing, only the round robin algorithm is available.
Question
Which of the following technologies are parts of the Red Hat Enterprise Linux High Availability Add-On?

A) DRBD
B) LVS
C) cLVM
D) Pacemaker
E) OCFS2
Question
Which of the following sections are found in the Pacemaker configuration XML file?

A) and
B) and
C) and
D) and
E) and
Question
While setting up a load-balanced HTTP service, Linux Virtual Server was configured with the commands: ipvsadm -A -t 198.51.100.2:80 -s rr ipvsadm -a -t 198.51.100.2:80 -r 192.168.10.1:80 -m ipvsadm -a -t 198.51.100.2:80 -r 192.168.10.2:80 -m and all backend servers are using the LVS host as the default router. Which additional command has to be issued on the LVS host in order to correctly handle incoming HTTP traffic?

A) echo "1" > /proc/sys/net/ipv4/ip_forward
B) iptables -t nat -Z
C) ipvsadmin -L -n
D) ipmasq -A 192.168.10.1 -A 192.168.10.2 -p tcp --dport www -j DEMASQ
E) netstat -r
Question
Which of the following situations can result in a split brain situation in a high availability cluster?

A) The load balancer of a load balanced cluster fails.
B) The communication between the cluster nodes is interrupted.
C) Cluster services are moved between cluster nodes.
D) More than one node is active in a load balanced cluster.
E) A cluster node has successfully been fenced.
Question
In a Pacemaker cluster, which one of the following commands shows the right syntax for fencing the node on port 3 using the APC rack PDU device which can be found at IP address 192.168.1.145?

A) apc_stonith -a 192.168.1.145 -l apc -n 3 -v -o shutdown -r now
B) fence_apc -a 192.168.1.145 -l apc -p apc -n 3 -v -o shutdown -r now
C) fence_apc -a 192.168.1.145 -l apc -p apc -n 3 -v -o reboot
D) apc_stonith -a 192.168.1.145 -l apc -p apc -n 3 -v -o reboot
Question
In case one service in a Pacemaker cluster depends on another service running on the same node, which score should be assigned to the constraint describing that dependency?

A) -1
B) 0
C) 1
D) FORCE
E) INFINITY
Question
Which of the following are tools or services that manage a Linux Virtual Server (LVS) setup?

A) keepalived
B) ldirectord
C) lvproxy
D) roundrobind
E) vserverd
Question
When using HAProxy to load balance requests over a set of web servers, what directive is needed in the HAProxy configuration in order to be able to log, on the backend web servers, the IP address of the client making a request?

A) option reverseproxy
B) option forwardfor
C) option clientlog
D) option exposeclient
Question
Which of the following statements is true regarding journals of a GFS2 filesystem?

A) Each GFS2 filesystem has exactly one journal.
B) Once a GFS2 filesystem is created, the number of journals cannot be changed.
C) Every node that simultaneously mounts the filesystem requires its own GFS2 journal.
D) Journals were heavily used in GFS and are deprecated and optional in GFS2.
E) The GFS Cluster Journal Daemon, GCJD, handles the journaling in a GFS2 cluster.
Question
Which of the following statements are true regarding the determination of the capacity of a high availability cluster?

A) The overall capacity of all components in the cluster doesn't have to be larger than the resources needed in a regular setup.
B) The number of nodes in a cluster has no effect on the availability as long as the sum of the available computing resources is equal.
C) Failover clusters can be used to scale a single service beyond the capacity of a single cluster node.
D) In regular cluster operation, not all resources are used.
E) In case of the failure of any component, enough resources must remain to provide all cluster services.
Question
Which of the following statements are true of full virtualization?

A) Full virtualization has superior I/O performance through the emulated device drivers.
B) Full virtualization is faster than paravirtualization.
C) Full virtualization requires time and system resources for emulation.
D) Full virtualization requires no modification to the Guest OS kernel.
E) Full virtualization works through CPU emulation.
Question
Which of the following tasks are parts of a hypervisor's responsibility?

A) Create filesystems during the installation of new VM guest operating systems.
B) Provide host-wide unique PIDs to the processes running inside the VMs in order to ease interprocess communication between virtual machines.
C) Map the resources of virtual machines to the resources of the host system.
D) Ensure isolation and eliminate any interference between virtual machines.
E) Manage authentication to network services running inside a virtual machine.
Question
Which function is not supported in a GFS2 filesystem?

A) repair
B) grow
C) shrink
D) withdraw
Question
When using the user mode network stack with qemu, TCP and UDP connections work fine but ping does not work. Why is this?

A) The Qemu user mode network stack does not implement ICMP.
B) The problem is caused by incorrect routing.
C) The Qemu user mode network stack blocks all ICMP traffic.
D) The Qemu user mode network stack requires explicit permission for ping to work.
Question
Which of the following commands can be used to change properties such as the number of node slots or the label of an existing OCFS2 filesystem?

A) ocfs2.setprops
B) ocfs2tool
C) crm_edit
D) tunefs.ocfs2
E) o2cbtool
Question
Which of the following statements are true regarding hardware based virtualization?

A) Hardware based virtualization requires special support in the host system's hardware which is present in all recent x86-based computers.
B) Hardware based virtualization implements a whole machine in software and therefore can run virtual machines of a given hardware platform on an arbitrary host system.
C) Hardware based virtualization relies on the host system's processor to call the hypervisor when critical instructions are executed by a virtual machine.
D) Hardware based virtualization is not available on x86-based CPU architectures and requires special virtualization host hardware.
Question
Which one of the following should NOT be used as a lowlevel device for DRBD?

A) A LVM logical volume
B) A physical hard disk
C) A EVMS volume
D) A loop device
Question
When used with KVM, which of the following block device image formats support snapshots?

A) qcow
B) dmg
C) qed
D) qcow2
E) raw
Question
Where are paravirtualized device drivers installed?

A) In the Guest OS
B) In the Host OS
C) Compiled into the hypervisor
D) No special drivers are required for paravirtualization.
Question
Which of the following restrictions is true when using KVM with the User Network?

A) Virtual Machines must use a SOCKS proxy to connect to the internet.
B) Virtual Machines can communicate with the host system and with other virtual machines using User Network.
C) Virtual Machines can only communicate with other virtual machines but not with the host system.
D) Virtual Machines cannot use ICMP.
E) Virtual Machines are restricted to only use IPv6 and not IPv4.
Question
Which of the following tasks is performed by Vagrant?

A) It migrates virtual machines automatically between host systems to distribute the load of all virtual machines equally to all hosts involved.
B) It automates the installation of a virtual machine according to a configuration file describing the desired VM.
C) It monitors the functionality of a virtual machine and restarts the VM in case of failure.
D) It is a hypervisor optimized for the usage in embedded systems based on the ARM CPU architecture.
E) It is a programming interface used to create reports from collected performance and resource usage data of a libvirt-based virtualization infrastructure.
Question
When setting up a KVM virtualization host, which one of the following components is NOT required?

A) libvirt
B) kvm kernel modules
C) bridgeutils
D) virsh
E) qemu
Question
Which of the following commands provides a detailed list of all image files contained in the libvirt storage pool vol1?

A) virsh list --volumes --pool vol1 --details
B) virsh vol-details vol1
C) virsh --show-pool vol1 --details
D) virsh vol-list vol1 --details
E) virsh volumes --source vol1 -details
Question
Which of the following statements are true regarding OCFS2?

A) OCFS2 is an integral part of Pacemaker and relies on Pacemaker services for functionality.
B) To avoid the need for shared storage, OCFS2 can replicate the content of its filesystems via the network.
C) When using OCFS2 with additional cluster software, OCFS2 must be integrated into the overall cluster manager to ensure consistent cluster behaviour.
D) OCFS2 can be used without any additional software as it contains its own cluster manager, O2CB.
E) In addition to filesystems, OCFS2 can handle other cluster services such as IP addresses and server daemons.
Question
Which of the following types of guest systems does Xen support?

A) Paravirtualized guests (PV)
B) Foreign architecture guests (FA)
C) Fully virtualized guests (HVM)
D) Container virtualized guests (CVM)
E) Emulated guests (EMU)
Question
A configuration file for a Xen virtual machine was created with file name slack.cfg within Xen's configuration directory. Which of the following commands starts the virtual machine defined in this configuration file and opens the virtual machine's console on the current command line?

A) xl start slack
B) xl create slack.cfg --show-console
C) xl create slack.cfg
D) xl start slack.cfg -c
E) xl create slack.cfg -c
Question
How can the state of the backing storage disks of a DRBD device be checked?

A) cat /proc/drdb/status
B) cat /proc/drdb
C) drbdadm dstate all
D) drbdadm diskstatus all
E) drbdadm state --disk all
Question
Which configuration setting ultimately determines which server will be the MASTER with keepalived?

A) advert_int
B) state
C) type
D) priority
Question
After the Xen guest configuration file debian.cfg has been created and successfully tested, which additional action must be performed in order to make this Xen guest start automatically every time the host system boots?

A) It is necessary to add xendomains_auto = yes to the virtual machine configuration file.
B) It is necessary to add an entry for debian.cfg to the file /etc/xen/guesttab.
C) It is necessary to run the command xl autostart debian.cfg.
D) It is necessary to add a symbolic link to the configuration file in the /etc/xen/auto/ directory.
E) It is not possible to use Xen and its tools to start virtual machines automatically.
Question
In keepalived, what keyword starts the configuration section for one of the failover servers?

A) lvs_server
B) virtual_server
C) vrrp_instance
D) vrrp_sync_group
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/119
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: LPIC-3 Virtualization & High Availability
1
Which of the following statements are true for full virtualization?

A) Full virtualization does not require changes to the guest operating systems.
B) Full virtualization has no performance impact compared to a non-virtualized bare-metal installation on the same machine.
C) Full virtualization has a severe performance impact and should not be used in production environments.
D) Full virtualization may be supported by special CPU extensions that provide better performance.
E) Full virtualization always requires additional software components and cannot be done using Linux only.
Full virtualization does not require changes to the guest operating systems.
Full virtualization may be supported by special CPU extensions that provide better performance.
2
What is libvirt?

A) An identity manager used to provide Single-Sign-On for different operating systems.
B) A driver package used to support 3D printers.
C) A cluster manager used to handle node access to shared storage.
D) A combined interface to several virtualization products.
E) A Linux-based virtualization hypervisor.
A combined interface to several virtualization products.
3
Which of the following products use container-based virtualization?

A) KVM
B) Linux VServer
C) LXC
D) OpenVZ
E) Xen
Linux VServer
LXC
OpenVZ
4
When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?

A) All floppy, CDROM, and hard disk drives in that order.
B) No devices are searched and the user is prompted to choose the boot device.
C) All network interfaces attached to the VM.
D) All hard disks and no other devices.
E) No devices are searched in order to support directly booting a Linux kernel.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
5
When migrating a physical machine to a full virtualized machine, which of the following properties should be expected to change from the perspective of the guest operating system?

A) The user accounts within the guest operating system.
B) The properties of the CPU and other hardware devices.
C) The MAC address of the network interfaces.
D) The version of the guest operating system.
E) The software and applications installed on the guest system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
6
Which statement is true regarding the Linux kernel module that must be loaded in order to use KVM?

A) It must be loaded into the kernel of each virtual machine to provide paravirtualization which is required by KVM.
B) It must be loaded into the kernel of the host system in order to use the virtualization extensions of the host system's CPU.
C) It must be loaded into the kernel of the host system only if the console of a virtual machine will be connected to a physical console of the host system.
D) It must be loaded into the kernel of each virtual machine that will access files and directories from the host system's file system.
E) It must be loaded into the kernel of the first virtual machine as it interacts with the KVM bare metal hypervisor and is required to trigger the start of additional virtual machines.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
7
When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done?

A) Remove all default users and groups, including root and nobody.
B) Remove all configuration files from /etc/ that were not manually modified.
C) Remove all confidential data from the image.
D) Remove all remote login services (i.e. SSH) from the image.
E) Remove all private SSH keys from the image.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
8
Which daemon applies the configuration and commands of libvirt to the virtualization components of the host system?

A) vmd
B) virtuald
C) libvirtmgr
D) libvirt-worker
E) libvirtd
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following statements are true regarding IaaS computing instances?

A) Creation of new instances can be automated by using scripts or APIs and service interfaces.
B) The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
C) Each and every user of an IaaS cloud has exactly one computing instance.
D) Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's data.
E) Instances may be created when needed and destroyed when they become obsolete.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following technologies is the most important component of IaaS clouds?

A) Database replication
B) DNS delegation
C) Emulation
D) Mandatory Access Control
E) Virtualization
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following KVM parameters is identical to the KVM parameter -hdb file.img?

A) -drive bus=ide1,type=slave,image=file.img
B) -drive image=file.img,if=ide,device=hdb
C) -drive bus=hd,busid=b,src=file.img
D) -drive file=file.img,index=1,media=disk,if=ide
E) -drive type=loop,src=file.img,dst=disk:hdb
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following statements are true regarding Xen domains?

A) Fully virtualized and paravirtualized domains are managed using the same tools and commands.
B) Xen domains of all types require virtualization extensions in the host system's CPU.
C) All fully virtualized domains are called 'Dom0' while all paravirtualized domains are called 'DomU'.
D) Both paravirtualized and fully virtualized domains may run on the same host system.
E) Paravirtualized domains are significantly slower than fully virtualized domains.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
13
Which options to the xl command will deactivate a running Xen virtual machine?

A) destroy
B) remove
C) shutdown
D) stop
E) halt
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true regarding the CPU of a KVM virtual machine?

A) Each KVM virtual machine can only have one CPU with one core.
B) KVM virtual machines support multiple virtual CPUs in order to run SMP systems.
C) The CPU architecture of a KVM virtual machine is independent of the host system's architecture.
D) For each KVM virtual machine one dedicated physical CPU core must be reserved.
E) KVM uses the concept of virtual CPUs to map the virtual machines to physical CPUs.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following tools is used to interact with XenStore?

A) xenstore-ls
B) xendo
C) xs
D) xl store
E) xstore
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following components are parts of XAPI?

A) The XADB configuration management database.
B) The XAPI virtual file system available at /xen.
C) The xm command.
D) The xe command.
E) The xapi daemon.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
17
Which CPU flag indicates the hardware virtualization capability on an AMD CPU?

A) SVM
B) VIRT
C) VMX
D) PVM
E) HVM
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following directives is used in the configuration file of a Xen guest domain in order to define network interfaces?

A) vif
B) eth
C) vnet
D) vbr
E) net
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
19
What is the usual way to gain command line access to computing instances in an IaaS cloud?

A) By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances.
B) Usually computing instances are accessed through a web frontend and do not allow command line access.
C) By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.
D) By using a telnet session with the credentials set and publicized by the creator of the computing instance's system image.
E) By using a VNC console which does not require authentication when it is invoked via the cloud management system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
20
Within the graphical output of a KVM virtual machine, which key sequence switches to the KVM monitor of the VM?

A) Ctrl-Alt-1
B) Ctrl-Alt-0
C) Ctrl-Alt-4
D) Ctrl-Alt-2
E) Ctrl-Alt-3
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following commands lists the snapshots existing in the disk image vm1.img?

A) qemu-info snapshots vm1.img
B) qemu-img snapshot -l vm1.img
C) qemu -hda snapshot -l vm1.img -noboot -list snapshots
D) qemu-snapshots -l vm1.img
E) qemu-monitor -snapshots -hda vm1.img
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
22
How can data be shared between several virtual machines running on the same Linux-based host system?

A) By mounting other VM's file systems from /dev/virt-disks/remote/.
B) By using a network file system or file transfer protocol.
C) By default, Linux-based virtualization products provide full access to the host system to all virtual machines.
D) By setting up a ramdisk in one virtual machine and mounting it using its UUID in the other VMs.
E) By attaching the same virtual hard disk to all virtual machines and activating EXT4 sharing extensions on it.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following are valid KVM parameters?

A) -drive file=iscsi:// user%password@fileserver/iqn.2001-04.com.example/1
B) -drive file=rsync:// user%password@fileserver:/tmp/file.iso,media=cdrom,readonly
C) -drive file=ssh:// user@host/tmp/file.img
D) -drive file=imap:// user:password@mailserver:/INBOX/Wufnc6MjYp@mailgate
E) -drive file=http:// user:password@fileserver/pub/linux.iso,media=cdrom,readonly
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
24
What is oVirt?

A) An extension to the Linux Kernel used to provide container virtualization similar to LXC and OpenVZ.
B) A library that provides access to several different virtualization technologies in a common manner.
C) A comprehensive management infrastructure for Linux-based virtualization.
D) An approach used to eliminate the need for virtualization called Zero-Virt.
E) A Linux-based hypervisor similar to KVM and Xen.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following commands can be used to determine whether the local machine is capable of running full virtualized Xen guests?

A) dmesg |grep -i intel|grep -i vt; dmesg |grep -i amd|grep -i v
B) egrep '(vmx|svm)' /proc/cpuinfo
C) xl dmesg | grep -i hvm
D) grep -i "Full Virtualization" /proc/xen
E) grep -i "Full Virtualization" /etc/xen/*
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
26
How can data in a computing instance in an IaaS cloud be permanently saved and accessed even after the recreation of the computing instance?

A) By saving the data to the memory of the computing instance using tmpfs.
B) By saving the data anywhere in the computing instance's file system.
C) By saving the data to /cloud/persistent/ which is provided in all common IaaS clouds.
D) By saving the data to object stores provided by a separate service in the cloud.
E) By saving the data on persistent block devices that must be explicitly connected to the computing instance.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following data should be copied to the virtual machine when migrating a physical machine to a virtual machine?

A) The block device buffers
B) The CPU flags
C) The file systems or their content
D) The CPU register's content
E) The memory
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following statements is true regarding XenStore?

A) It is a web interface used to provide self-service domain provisioning to users with sufficient privileges.
B) It saves the persistent configuration of all defined Xen domains and restores them when the host system is started.
C) It manages disk file images on behalf of all virtual machines and provides them as virtual devices to guest domains.
D) It stores run time information regarding Xen and its domains using hierarchical namespaces shared between domains.
E) It is a software repository located within the host system used to provide software packages to the guest domains.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following statements are true about container-based virtualization?

A) All containers run within the operating system kernel of the host system.
B) Different containers may use different distributions of the same operating system.
C) Each container runs its own operating system kernel.
D) Container-based virtualization relies on hardware support from the host systems CPU.
E) Linux does not support container-based virtualization because of missing kernel APIs.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
30
Which file format is used by libvirt to store configuration data?

A) INI-style text files
B) Text files containing key/value pairs
C) Java-like .properties files
D) XML files
E) SQLite databases
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following statements is true regarding the following output of xl list:     Name          ID   Mem VCPUs      State   Time(s)     Domain-0       0   384     1     r-----    498.7       Debian         2   305     1     --p---    783.5       Slack          6    64     1     -b----    313.6       CentOS         7   512     2     r-----    455.1

A) It is necessary to use the xl command to change Slack's state to running.
B) CentOS is the domain which has consumed the most CPU time.
C) The domain with ID 2 uses paravirtualization.
D) Both Debian and Slack require xl commands to start running.
E) Slack is idle or waiting for I/O.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following commands are needed to establish a private network between two (or more) KVM virtual machines that is not visible to other KVM instances on the same KVM host?

A) ifconfig
B) brctl
C) tunctl
D) ipconfig
E) ebtables
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following statements are true regarding a load balancer?

A) Failover clusters are not operational without at least one dedicated load balancer.
B) All response packages sent from a backend server to a client must pass through the load balancer.
C) The load balancer is usually deployed on one of the backend servers.
D) Load balancers may be able to analyze traffic.
E) All incoming connections to the cluster services are received by the load balancer.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following statements describes the concept behind paravirtualization?

A) Guest operating systems are modified to actively cooperate with the hypervisor in order to ease virtualization costs and gain better performance.
B) Instead of running full virtual machines, containers are used to separate distinct parts of one commonly shared operating system that appear as a virtual machine.
C) To avoid the need for virtualization, special security measures are taken to allow different applications to coexist on one physical machine.
D) Each operating system is trusted to use only those resources assigned to it, thereby eliminating the need of an additional virtualization layer.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following statements is true regarding VirtualBox?

A) VirtualBox uses container-based virtualization and can only run virtual machines using the operating system of the host system.
B) VirtualBox can only be run from a graphical desktop environment and not from the text console.
C) VirtualBox provides special device drivers for several operating systems to enhance the virtual machine's performance.
D) VirtualBox contains a hypervisor that runs independently from any other operating system on a bare metal host.
E) VirtualBox is part of the vanilla Linux kernel and does not require any additional software installation on recent Linux distributions.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements are true regarding resource management for full virtualization?

A) The hypervisor may provide fine-grained limits to internal elements of the guest operating system such as the number of processes.
B) Full virtualization cannot pose any limits to virtual machines and always assigns the host system's resources in a first-come-first-serve manner.
C) It is up to the virtual machine to use its assigned hardware resources and create, for example, an arbitrary amount of network sockets.
D) The hypervisor provides each virtual machine with hardware of a defined capacity that limits the resources of the virtual machine.
E) All processes created within the virtual machines are transparently and equally scheduled in the host system for CPU and I/O usage.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
37
What is XAPI?

A) An extension of libvirt which adds live migration of virtual servers between arbitrary hypervisors.
B) A ReSTful API which is used by xl to communicate with the Xen hypervisor.
C) The communication interface between a paravirtualized Linux Kernel and the Xen hypervisor.
D) A high level tool chain which provides advanced management tools and interfaces for Xen.
E) The internal messaging system within the Xen hypervisor.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following KVM monitor commands changes the image file in the first IDE CDROM drive of a virtual machine?

A) change ide1-cd0 /tmp/linux.iso
B) update ide1-cd0 /tmp/linux.iso
C) set ide1-cd0=/tmp/linux.iso
D) eject --reconnect ide1-cd0 /tmp/linux.iso
E) disc file=/tmp/linux.iso,device=/dev/sr0
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following resources are directly (i.e. without specialized machine images) available to users of an OpenStack cloud?

A) Database servers to store relational data.
B) Virtual machines for computing tasks.
C) Application servers for immediate deployment with Mono applications.
D) Object storage that is accessed through an API.
E) Block storage devices for persistent data storage.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
40
What action does the virsh restore command perform?

A) It restores a virtual machine that was stopped by a kernel panic.
B) It restores a virtual machine from a state file.
C) It reverts a virtual machine, including its storage devices, to a previously saved state.
D) It wakes up a virtual machine that was hibernated by the operating system running inside the virtual machine.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
41
Which one of the following options represents a valid declaration of a backend server with HAProxy?

A) host server_x 10.1.0.1:80 cookie server_x
B) backend server_x 10.1.0.1:80
C) server server_x 10.1.0.1:80 check
D) pool server_x 10.1.0.1:80
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
42
What is the name and path of the configuration file for the O2CB cluster that coordinates the nodes using OCFS2 filesystems?

A) /etc/ocfs2/cluster.conf
B) /etc/ocfs/cluster.conf
C) /etc/ocfs2.conf
D) /etc/cluster.conf
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following statements is true regarding the quorum in a two node Pacemaker cluster?

A) Clusters with one or two nodes cannot have a quorum and require no quorum configuration.
B) In a two node cluster, quorum can be determined and handled just as in a cluster with a higher number of nodes.
C) In a two node cluster the quorum is always held by the node that first started the cluster software.
D) The default quorum policy in a two node cluster must be set to ignore in order to configure a working cluster.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
44
When running a Linux Virtual Server (LVS) cluster, what is the purpose of a nanny process?

A) Each nanny process checks the state of one configured service on one real server, and tells LVS if the service on that real server is malfunctioning.
B) The nanny process powers off a nonfunctional backend server.
C) The nanny process restarts the daemon of a failed service on a real server node.
D) The nanny process changes the IP routing table in the Linux kernel according to the LVS configuration.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following can be used as a low level device for DRBD?

A) A LVM logical volume
B) A physical hard disk
C) A rewritable CD
D) A virtual tape library
E) A tape streamer
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following commands displays only the resources of the cluster information base of a pacemaker cluster?

A) cibquery -o resources
B) cibadmin -R
C) cibadmin -Q -o resources
D) cibquery -L resources
E) cib_admin -L resources
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
47
Using Linux Virtual Server (LVS) without any additional tools provides which of the following features?

A) Balancing network connections across several backend servers.
B) Automatically taking over the services of failed nodes.
C) Restarting failed services on the backend servers.
D) Checking the integrity of services on backend servers.
E) Starting and stopping backend servers as needed.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following are valid load balancing algorithms for HAProxy?

A) persistent
B) weightedrr
C) source
D) leastconn
E) destination
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
49
Which actions should be taken in a load balanced cluster in order to protect the load balancer against outages?

A) Load balancers cannot be protected against outages which is why they should always be built on dedicated hardware.
B) No actions are necessary as a load balancer cannot become a single point of failure.
C) Two or more load balancers should be deployed as a cascade that passes packets from one to the other.
D) Two load balancers should be deployed as a failover cluster.
E) Load balancers are used for performance and scalability reasons only and cannot be used to archive high availability clusters.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
50
When using the gatewaying/direct routing forwarding method of Linux Virtual Server (LVS), which of the following statements is true?

A) The default route of all backend servers must point to the LVS host.
B) Every backend server must accept packets addressed to the IP address of the virtual service.
C) On the backend servers, all packets appear to originate from the IP address of the LVS host.
D) The link layer addresses of all backend servers must be included in the LVS configuration.
E) When using gatewaying/direct routing, only the round robin algorithm is available.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following technologies are parts of the Red Hat Enterprise Linux High Availability Add-On?

A) DRBD
B) LVS
C) cLVM
D) Pacemaker
E) OCFS2
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following sections are found in the Pacemaker configuration XML file?

A) and
B) and
C) and
D) and
E) and
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
53
While setting up a load-balanced HTTP service, Linux Virtual Server was configured with the commands: ipvsadm -A -t 198.51.100.2:80 -s rr ipvsadm -a -t 198.51.100.2:80 -r 192.168.10.1:80 -m ipvsadm -a -t 198.51.100.2:80 -r 192.168.10.2:80 -m and all backend servers are using the LVS host as the default router. Which additional command has to be issued on the LVS host in order to correctly handle incoming HTTP traffic?

A) echo "1" > /proc/sys/net/ipv4/ip_forward
B) iptables -t nat -Z
C) ipvsadmin -L -n
D) ipmasq -A 192.168.10.1 -A 192.168.10.2 -p tcp --dport www -j DEMASQ
E) netstat -r
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following situations can result in a split brain situation in a high availability cluster?

A) The load balancer of a load balanced cluster fails.
B) The communication between the cluster nodes is interrupted.
C) Cluster services are moved between cluster nodes.
D) More than one node is active in a load balanced cluster.
E) A cluster node has successfully been fenced.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
55
In a Pacemaker cluster, which one of the following commands shows the right syntax for fencing the node on port 3 using the APC rack PDU device which can be found at IP address 192.168.1.145?

A) apc_stonith -a 192.168.1.145 -l apc -n 3 -v -o shutdown -r now
B) fence_apc -a 192.168.1.145 -l apc -p apc -n 3 -v -o shutdown -r now
C) fence_apc -a 192.168.1.145 -l apc -p apc -n 3 -v -o reboot
D) apc_stonith -a 192.168.1.145 -l apc -p apc -n 3 -v -o reboot
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
56
In case one service in a Pacemaker cluster depends on another service running on the same node, which score should be assigned to the constraint describing that dependency?

A) -1
B) 0
C) 1
D) FORCE
E) INFINITY
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following are tools or services that manage a Linux Virtual Server (LVS) setup?

A) keepalived
B) ldirectord
C) lvproxy
D) roundrobind
E) vserverd
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
58
When using HAProxy to load balance requests over a set of web servers, what directive is needed in the HAProxy configuration in order to be able to log, on the backend web servers, the IP address of the client making a request?

A) option reverseproxy
B) option forwardfor
C) option clientlog
D) option exposeclient
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following statements is true regarding journals of a GFS2 filesystem?

A) Each GFS2 filesystem has exactly one journal.
B) Once a GFS2 filesystem is created, the number of journals cannot be changed.
C) Every node that simultaneously mounts the filesystem requires its own GFS2 journal.
D) Journals were heavily used in GFS and are deprecated and optional in GFS2.
E) The GFS Cluster Journal Daemon, GCJD, handles the journaling in a GFS2 cluster.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following statements are true regarding the determination of the capacity of a high availability cluster?

A) The overall capacity of all components in the cluster doesn't have to be larger than the resources needed in a regular setup.
B) The number of nodes in a cluster has no effect on the availability as long as the sum of the available computing resources is equal.
C) Failover clusters can be used to scale a single service beyond the capacity of a single cluster node.
D) In regular cluster operation, not all resources are used.
E) In case of the failure of any component, enough resources must remain to provide all cluster services.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following statements are true of full virtualization?

A) Full virtualization has superior I/O performance through the emulated device drivers.
B) Full virtualization is faster than paravirtualization.
C) Full virtualization requires time and system resources for emulation.
D) Full virtualization requires no modification to the Guest OS kernel.
E) Full virtualization works through CPU emulation.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following tasks are parts of a hypervisor's responsibility?

A) Create filesystems during the installation of new VM guest operating systems.
B) Provide host-wide unique PIDs to the processes running inside the VMs in order to ease interprocess communication between virtual machines.
C) Map the resources of virtual machines to the resources of the host system.
D) Ensure isolation and eliminate any interference between virtual machines.
E) Manage authentication to network services running inside a virtual machine.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
63
Which function is not supported in a GFS2 filesystem?

A) repair
B) grow
C) shrink
D) withdraw
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
64
When using the user mode network stack with qemu, TCP and UDP connections work fine but ping does not work. Why is this?

A) The Qemu user mode network stack does not implement ICMP.
B) The problem is caused by incorrect routing.
C) The Qemu user mode network stack blocks all ICMP traffic.
D) The Qemu user mode network stack requires explicit permission for ping to work.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following commands can be used to change properties such as the number of node slots or the label of an existing OCFS2 filesystem?

A) ocfs2.setprops
B) ocfs2tool
C) crm_edit
D) tunefs.ocfs2
E) o2cbtool
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following statements are true regarding hardware based virtualization?

A) Hardware based virtualization requires special support in the host system's hardware which is present in all recent x86-based computers.
B) Hardware based virtualization implements a whole machine in software and therefore can run virtual machines of a given hardware platform on an arbitrary host system.
C) Hardware based virtualization relies on the host system's processor to call the hypervisor when critical instructions are executed by a virtual machine.
D) Hardware based virtualization is not available on x86-based CPU architectures and requires special virtualization host hardware.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
67
Which one of the following should NOT be used as a lowlevel device for DRBD?

A) A LVM logical volume
B) A physical hard disk
C) A EVMS volume
D) A loop device
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
68
When used with KVM, which of the following block device image formats support snapshots?

A) qcow
B) dmg
C) qed
D) qcow2
E) raw
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
69
Where are paravirtualized device drivers installed?

A) In the Guest OS
B) In the Host OS
C) Compiled into the hypervisor
D) No special drivers are required for paravirtualization.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following restrictions is true when using KVM with the User Network?

A) Virtual Machines must use a SOCKS proxy to connect to the internet.
B) Virtual Machines can communicate with the host system and with other virtual machines using User Network.
C) Virtual Machines can only communicate with other virtual machines but not with the host system.
D) Virtual Machines cannot use ICMP.
E) Virtual Machines are restricted to only use IPv6 and not IPv4.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following tasks is performed by Vagrant?

A) It migrates virtual machines automatically between host systems to distribute the load of all virtual machines equally to all hosts involved.
B) It automates the installation of a virtual machine according to a configuration file describing the desired VM.
C) It monitors the functionality of a virtual machine and restarts the VM in case of failure.
D) It is a hypervisor optimized for the usage in embedded systems based on the ARM CPU architecture.
E) It is a programming interface used to create reports from collected performance and resource usage data of a libvirt-based virtualization infrastructure.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
72
When setting up a KVM virtualization host, which one of the following components is NOT required?

A) libvirt
B) kvm kernel modules
C) bridgeutils
D) virsh
E) qemu
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following commands provides a detailed list of all image files contained in the libvirt storage pool vol1?

A) virsh list --volumes --pool vol1 --details
B) virsh vol-details vol1
C) virsh --show-pool vol1 --details
D) virsh vol-list vol1 --details
E) virsh volumes --source vol1 -details
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following statements are true regarding OCFS2?

A) OCFS2 is an integral part of Pacemaker and relies on Pacemaker services for functionality.
B) To avoid the need for shared storage, OCFS2 can replicate the content of its filesystems via the network.
C) When using OCFS2 with additional cluster software, OCFS2 must be integrated into the overall cluster manager to ensure consistent cluster behaviour.
D) OCFS2 can be used without any additional software as it contains its own cluster manager, O2CB.
E) In addition to filesystems, OCFS2 can handle other cluster services such as IP addresses and server daemons.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following types of guest systems does Xen support?

A) Paravirtualized guests (PV)
B) Foreign architecture guests (FA)
C) Fully virtualized guests (HVM)
D) Container virtualized guests (CVM)
E) Emulated guests (EMU)
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
76
A configuration file for a Xen virtual machine was created with file name slack.cfg within Xen's configuration directory. Which of the following commands starts the virtual machine defined in this configuration file and opens the virtual machine's console on the current command line?

A) xl start slack
B) xl create slack.cfg --show-console
C) xl create slack.cfg
D) xl start slack.cfg -c
E) xl create slack.cfg -c
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
77
How can the state of the backing storage disks of a DRBD device be checked?

A) cat /proc/drdb/status
B) cat /proc/drdb
C) drbdadm dstate all
D) drbdadm diskstatus all
E) drbdadm state --disk all
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
78
Which configuration setting ultimately determines which server will be the MASTER with keepalived?

A) advert_int
B) state
C) type
D) priority
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
79
After the Xen guest configuration file debian.cfg has been created and successfully tested, which additional action must be performed in order to make this Xen guest start automatically every time the host system boots?

A) It is necessary to add xendomains_auto = yes to the virtual machine configuration file.
B) It is necessary to add an entry for debian.cfg to the file /etc/xen/guesttab.
C) It is necessary to run the command xl autostart debian.cfg.
D) It is necessary to add a symbolic link to the configuration file in the /etc/xen/auto/ directory.
E) It is not possible to use Xen and its tools to start virtual machines automatically.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
80
In keepalived, what keyword starts the configuration section for one of the failover servers?

A) lvs_server
B) virtual_server
C) vrrp_instance
D) vrrp_sync_group
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 119 flashcards in this deck.