Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 304-200 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 305-300

304-200 Exam Dumps - LPI Level 3 Exam 304

Go to page:
Question # 9

Which of the following commands are needed to establish a private network between two (or more) KVM virtual machines that is not visible to other KVM instances on the same KVM host? (Choose THREE correct answers.)

A.

ifconfig

B.

brctl

C.

tunctl

D.

ipconfig

E.

ebtables

Full Access
Question # 10

Which of the following products use container-based virtualization? (Choose THREE correct answers.)

A.

KVM

B.

Linux VServer

C.

LXC

D.

OpenVZ

E.

Xen

Full Access
Question # 11

Which of the following statements are true regarding VirtualBox?

A.

It supports only Linux as a guest operating system.

B.

It is available for Linux only.

C.

It provides both a graphical user interface and command line tools to administer virtual machines.

D.

It requires dedicated shared storage as it cannot store virtual machine disk images locally on block devices of the virtualization host.

E.

It is a special kernel booted before the first regular operating system.

Full Access
Question # 12

Which of the following statements is true regarding the quorum in a two node Pacemaker cluster?

A.

Clusters with one or two nodes cannot have a quorum and require no quorum configuration.

B.

In a two node cluster, quorum can be determined and handled just as in a cluster with a higher number of nodes.

C.

In a two node cluster the quorum is always held by the node that first started the cluster software.

D.

The default quorum policy in a two node cluster must be set to ignore in order to configure a working cluster.

Full Access
Question # 13

Which actions should be taken in a load balanced cluster in order to protect the load balancer against outages?

A.

Load balancers cannot be protected against outages which is why they should always be built on dedicated hardware.

B.

No actions are necessary as a load balancer cannot become a single point of failure.

C.

Two or more load balancers should be deployed as a cascade that passes packets from one to the other.

D.

Two load balancers should be deployed as a failover cluster.

E.

Load balancers are used for performance and scalability reasons only and cannot be used to archive high availability clusters.

Full Access
Question # 14

Which of the following statements is true regarding XenStore?

A.

It is a web interface used to provide self-service domain provisioning to users with sufficient privileges.

B.

It saves the persistent configuration of all defined Xen domains and restores them when the host system is started.

C.

It manages disk file images on behalf of all virtual machines and provides them as virtual devices to guest domains.

D.

It stores run time information regarding Xen and its domains using hierarchical namespaces shared between domains.

E.

It is a software repository located within the host system used to provide software packages to the guest domains.

Full Access
Question # 15

In order to determine if a virtualization host offers Intel VT-x support, which CPU flag must be searched for in the file /proc/cpuinfo? (Specify the name of the CPU flag as it is mentioned in the given file only without any additional information.)

Full Access
Question # 16

What is the usual way to gain command line access to computing instances in an IaaS cloud?

A.

By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances.

B.

Usually computing instances are accessed through a web frontend and do not allow command line access.

C.

By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.

D.

By using a telnet session with the credentials set and publicized by the creator of the computing instance's system image.

E.

By using a VNC console which does not require authentication when it is invoked via the cloud management system.

Full Access
Go to page: