Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the LPI LPIC Level 3 305-300 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the purpose of the commandvagrant init?

Options:

A.

It executes a provisioning tool in a running box.


B.

It starts a Vagrant box.


C.

It creates a Vagrant configuration file.


D.

It installs Vagrant on a Linux host.


E.

It downloads a Vagrant box.


Expert Solution
Questions # 2:

The commandvirsh vol-list vmsreturns the following error:

error: failed to get pool 'vms'

error: Storage pool not found: no storage pool with matching name 'vms '

Given that the directory/vmsexists, which of the following commands resolves this issue?

Options:

A.

dd if=/dev/zero of=/vms bs=1 count=0 flags=name:vms


B.

libvirt-poolctl new –-name=/vms –-type=dir –-path=/vms


C.

qemu-img pool vms:/vms


D.

virsh pool-create-as vms dir --target /vms


E.

touch /vms/.libvirtpool


Expert Solution
Questions # 3:

Which of the following commands lists all differences between the disk images vm1-snap.img and vm1.img?

Options:

A.

virt-delta -a vm1-snap.img -A vm1.img


B.

virt-cp-in -a vm1-snap.img -A vm1.img


C.

virt-cmp -a vm1-snap.img -A vm1.img


D.

virt-history -a vm1-snap.img -A vm1.img


E.

virt-diff -a vm1-snap.img -A vm1.img


Expert Solution
Questions # 4:

In order to use the optiondom0_memto limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?

Options:

A.

In the bootloader configuration, when Xen is booted.


B.

In any of Xen’s global configuration files.


C.

In its .config file, when the Domain-0 kernel is built.


D.

In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.


E.

In its Makefile, when Xen is built.


Expert Solution
Questions # 5:

What happens when the following command is executed twice in succession?

docker run -tid -v data:/data debian bash

Options:

A.

The container resulting from the second invocation can only read the content of /data/ and cannot change it.


B.

Each container is equipped with its own independent data volume, available at /data/ in the respective container.


C.

Both containers share the contents of the data volume, have full permissions to alter its content and mutually see their respective changes.


D.

The original content of the container image data is available in both containers, although changes stay local within each container.


E.

The second command invocation fails with an error stating that the volume data is already associated with a running container.


Expert Solution
Questions # 6:

Which of the following tasks are part of a hypervisor’s responsibility? (Choose two.)

Options:

A.

Create filesystems during the installation of new virtual machine quest operating systems.


B.

Provide host-wide unique PIDs to the processes running inside the virtual machines in order to ease inter-process communication between virtual machines.


C.

Map the resources of virtual machines to the resources of the host system.


D.

Manage authentication to network services running inside a virtual machine.


E.

Isolate the virtual machines and prevent unauthorized access to resources of other virtual machines.


Expert Solution
Questions # 7:

What is the default provider of Vagrant?

Options:

A.

lxc


B.

hyperv


C.

virtualbox


D.

vmware_workstation


E.

docker


Expert Solution
Questions # 8:

Which of the following statements are true about container-based virtualization? (Choose two.)

Options:

A.

Each container runs its own operating system kernel.


B.

Different containers may use different distributions of the same operating system.


C.

Container-based virtualization relies on hardware support from the host system's CPU.


D.

All containers run within the operating system kernel of the host system.


E.

Linux does not support container-based virtualization because of missing kernel APIs.


Expert Solution
Questions # 9:

What is the purpose of capabilities in the context of container virtualization?

Options:

A.

Map potentially dangerous system calls to an emulation layer provided by the container virtualization.


B.

Restrict the disk space a container can consume.


C.

Enable memory deduplication to cache files which exist in multiple containers.


D.

Allow regular users to start containers with elevated permissions.


E.

Prevent processes from performing actions which might infringe the container.


Expert Solution
Questions # 10:

Which of the following types of guest systems does Xen support? (Choose two.)

Options:

A.

Foreign architecture guests (FA)


B.

Paravirtualized quests (PVI


C.

Emulated guests


D.

Container virtualized guests


E.

Fully virtualized guests


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions