Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

LPI 305-300 LPIC-3: Virtualization and Containerization - Exam 305, version 3.0 Exam Practice Test

Demo: 18 questions
Total 121 questions

LPIC-3: Virtualization and Containerization - Exam 305, version 3.0 Questions and Answers

Question 1

What happens when the following command is executed twice in succession?

docker run -tid -v data:/data debian bash

Options:

A.

The container resulting from the second invocation can only read the content of /data/ and cannot change it.

B.

Each container is equipped with its own independent data volume, available at /data/ in the respective container.

C.

Both containers share the contents of the data volume, have full permissions to alter its content and mutually see their respective changes.

D.

The original content of the container image data is available in both containers, although changes stay local within each container.

E.

The second command invocation fails with an error stating that the volume data is already associated with a running container.

Question 2

FILL BLANK

What LXC command lists containers sorted by their CPU, block I/O or memory consumption? (Specify ONLY the command without any path or parameters.)

Options:

Question 3

Virtualization of which hardware component is facilitated by CPUs supporting nested page table extensions, such as Intel Extended Page Table (EPT) or AMD Rapid Virtualization Indexing (RVI)?

Options:

A.

Memory

B.

Network Interfaces

C.

Host Bus Adapters

D.

Hard Disks

E.

IO Cache

Question 4

Which of the following tasks are part of a hypervisor’s responsibility? (Choose two.)

Options:

A.

Create filesystems during the installation of new virtual machine quest operating systems.

B.

Provide host-wide unique PIDs to the processes running inside the virtual machines in order to ease inter-process communication between virtual machines.

C.

Map the resources of virtual machines to the resources of the host system.

D.

Manage authentication to network services running inside a virtual machine.

E.

Isolate the virtual machines and prevent unauthorized access to resources of other virtual machines.

Question 5

What kind of virtualization is implemented by LXC?

Options:

A.

System containers

B.

Application containers

C.

Hardware containers

D.

CPU emulation

E.

Paravirtualization

Question 6

How can data be shared between several virtual machines running on the same Linux-based host system?

Options:

A.

By writing data to the file system since all virtual machines on the same host system use the same file system.

B.

By mounting other virtual machines' file systems from /dev/virt-disks/remote/.

C.

By setting up a ramdisk in one virtual machine and mounting it using its UUID in the other VMs.

D.

By using a network file system or file transfer protocol.

E.

By attaching the same virtual hard disk to all virtual machines and activating EXT4 sharing extensions on it.

Question 7

What is the purpose of a .dockerignore file?

Options:

A.

It lists files existing in a Docker image which should be excluded when building a derivative image.

B.

It specifies files that Docker does not submit to the Docker daemon when building a Docker image

C.

It exists in the root file system of containers that should ignore volumes and ports provided by Docker.

D.

It must be placed in the top level directory of volumes that Docker should never attach automatically to a container

E.

It specifies which parts of a Dockerfile should be ignored when building a Docker image.

Question 8

Which file format is used by libvirt to store configuration data?

Options:

A.

INI-style text files

B.

SQLite databases

C.

XML files

D.

Java-like properties files

E.

Text files containing key/value pairs

Question 9

Which of the following statements in aDockerfileleads to a container which outputs hello world? (Choose two.)

Options:

A.

ENTRYPOINT "echo Hello World"

B.

ENTRYPOINT [ "echo hello world" ]

C.

ENTRYPOINT [ "echo", "hello", "world" ]

D.

ENTRYPOINT echo Hello World

E.

ENTRYPOINT "echo", "Hello", "World*

Question 10

A clone of a previously used virtual machine should be created. All VM specific information, such as user accounts, shell histories and SSH host keys should be removed from the cloned disk image. Which of the following tools can perform these tasks?

Options:

A.

virc-reset

B.

virt-sparsi

C.

virt-rescue

D.

virt-svspre

E.

sysprep

F.

vire-wipe

Question 11

Which of the following services can QEMU provide in a user network? (Choose three.)

Options:

A.

DHCP

B.

BGP

C.

CIFS

D.

AppleTalk

E.

TFTP

Question 12

Which of the following values are valid in thefirmwareattribute of aelement in a libvirt domain definition?(Choose two.)

Options:

A.

scsi

B.

virtio

C.

efi

D.

bios

E.

pcie

Question 13

In an IaaS cloud, what is a common method for provisioning new computing instances with an operating system and software?

Options:

A.

Each new instance is connected to the installation media of a Linux distribution and provides access to the installer by logging in via SSH.

B.

Each new instance is created based on an image file that contains the operating system as well as software and default configuration for a given purpose.

C.

Each new instance is a clone of another currently running instance that includes all the software, data and state of the original instance.

D.

Each new instance is connected via a VPN with the computer that started the provisioning and tries to PXE boot from that machine.

E.

Each new instance contains a minimal live system running from a virtual CD as the basis from which the administrator deploys the target operating system.

Question 14

Which command within virsh lists the virtual machines that are running on the current host?

Options:

A.

I view

B.

list-vm

C.

list

D.

show

E.

list-all

Question 15

Which of the following commands lists all differences between the disk images vm1-snap.img and vm1.img?

Options:

A.

virt-delta -a vm1-snap.img -A vm1.img

B.

virt-cp-in -a vm1-snap.img -A vm1.img

C.

virt-cmp -a vm1-snap.img -A vm1.img

D.

virt-history -a vm1-snap.img -A vm1.img

E.

virt-diff -a vm1-snap.img -A vm1.img

Question 16

Which of the following are true regarding the CPU of a QEMU virtual machine? (Choose two.)

Options:

A.

The CPU architecture of a QEMU virtual machine is independent of the host system's architecture.

B.

Each QEMU virtual machine can only have one CPU with one core.

C.

For each QEMU virtual machine, one dedicated physical CPU core must be reserved.

D.

QEMU uses the concept of virtual CPUs to map the virtual machines to physical CPUs.

E.

QEMU virtual machines support multiple virtual CPUs in order to run SMP systems.

Question 17

After creating a new Docker network using the following command:

docker network create --driver bridge isolated_nw

which parameter must be added todocker createin order to attach a container to the network?

Options:

A.

--eth0=isolated_nw

B.

--alias=isolated_nw

C.

--ethernet=isolated_nw

D.

--network=isolated_nw

E.

--attach=isolated_nw

Question 18

Which of the following devices exist by default in an LXC container? (Choose three.)

Options:

A.

/dev/log

B.

/dev/console

C.

/dev/urandom

D.

/dev/kmem

E.

/dev/root

Demo: 18 questions
Total 121 questions