Act now and download your LPI 304-200 test today! Do not waste time for the worthless LPI 304-200 tutorials. Download Renovate LPI LPIC-3 Virtualization & High Availability exam with real questions and answers and begin to learn LPI 304-200 with a classic professional.

Q49. After the Xen guest configuration file debian.cfg has been created and successfully tested, which additional action must be performed in order to make this Xen guest start automatically every time the host system boots? 

A. It is necessary to add xendomains_auto = yes to the virtual machine configuration file. 

B. It is necessary to add an entry for debian.cfg to the file /etc/xen/guesttab. 

C. It is necessary to run the command xl autostart debian.cfg. 

D. It is necessary to add a symbolic link to the configuration file in the /etc/xen/auto/ directory. 

E. It is not possible to use Xen and its tools to start virtual machines automatically. 

Answer:


Q50. What is oVirt? 

A. An extension to the Linux Kernel used to provide container virtualization similar to LXC and OpenVZ. 

B. A library that provides access to several different  virtualization  technologies in a common manner. 

C. A comprehensive management infrastructure for Linux-based virtualization. 

D. An approach used to eliminate the need for virtualization called Zero-Virt. E. A Linux-based hypervisor similar to KVM and Xen. 

Answer:


Q51. Which of the following statements describes fencing resources in a high availability cluster? 

A. Fencing is the automated stop and restart of cluster services that suffer from software errors. 

B. Fencing is the disconnection of a failed cluster node from any other cluster resources. 

C. Fencing is the forwarding of incoming network connections to backend servers. 

D. Fencing is the assignment of services to different cluster nodes to avoid interference of the services. 

E. Fencing is the accounting and limitation of disk usage on shared storage. 

Answer:


Q52. What is the usual way to gain command line access to computing instances in an IaaS cloud? 

A. By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances. 

B. Usually computing instances are accessed through a web frontend and do not allow command line access. 

C. By either telnet or SSH using the credentials of the cloud management system account with administrative privileges. 

D. By using a telnet session with the credentials set and publicized by the creator of the computing instance's system image. 

E. By using a VNC console which does not require authentication when it is invoked via the cloud management system. 

Answer:


Q53. What is the purpose of fencing in a high availability cluster? 

A. Prevent failed nodes from interfering with the remaining intact part of the cluster. 

B. Ensure a consistent assignment of all network connections from a client to the same cluster server. 

C. Define constraints on which services may run on the same cluster node. 

D. Enforce storage quota and other resource limitations for each service provided by the cluster. 

E. Provide multi-tenancy cluster configuration for cloud computing. 

Answer:


Q54. Which of the following commands provides a detailed list of all image files contained in the libvirt storage pool vol1? 

A. virsh list --volumes --pool vol1 --details 

B. virsh vol-details vol1 

C. virsh --show-pool vol1 --details 

D. virsh vol-list vol1 --details 

E. virsh volumes --source vol1–details 

Answer:


Q55. Which of the following statements are true about container-based virtualization? (Choose TWO correct answers.) 

A. All containers run within the operating system kernel of the host system. 

B. Different containers may use different distributions of the same operating system. 

C. Each container runs its own operating system kernel. 

D. Container-based virtualization relies on hardware support from the host systems CPU. 

E. Linux does not support container-based virtualization because of missing kernel APIs. 

Answer: A, B 


Q56. Which of the following Messaging Layers are supported by Pacemaker? (Choose TWO correct answers.) 

A. Heartbeat 

B. OpenAIS 

C. DRBD 

D. SCMP 

E. Slurm 

Answer: A, B