Certification Provider: Lpi
Exam Name: LPIC-3 Exam 304: Virtualization & High Availability, version 2.0
Exam Code: 304-200
Official Exam Time: 90 mins
Number of questions in the Official Exam: 60 Q&As
Latest update time in our database: June 05,2023
304-200 Official Exam Topics:
  • Topic1 :  Pros and Cons of Virtualization
  • Topic2 :  Hardware Virtual Machine (HVM) /  /proc/cpuinfo
  • Topic3 :  IaaS, PaaS, SaaS / Description: Candidates should be able to install, configure, maintain, migrate and troubleshoot Xen installations. The focus is on Xen version 4.x.
  • Topic4 :  Xen configuration / Description: Candidates should be able to install, configure, maintain, migrate and troubleshoot KVM installations.
  • Topic5 : Terms and Utilities: /  VirtualBox
  • Topic6 :  Operational considerations of high availability /  Split brain
  • Topic7 :  Service Level Agreement (SLA) /  Disaster Recovery
  • Topic8 :  Understanding of HAProxy /  Configuration and Management of corosync in conjunction with Pacemaker
  • Topic9 :  corosync-quorumtool /  Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.
  • Topic10 :  Understanding of DRBD resources, states and replication modes /  Integration of DRBD with Pacemaker
  • Topic11 : Terms and Utilities: /  Primary, Secondary
  • Topic12 :  Three-way replication /  vgchange, vgs
  • Topic13 :  mkfs.gfs2 /

Which of the following KVM monitor commands changes the image file in the first IDE CDROM drive of a virtual machine?

Which of the following KVM monitor commands changes the image file in the first IDE CDROM drive of a virtual machine?
A . change ide1-cd0 /tmp/linux.iso
B . update ide1-cd0 /tmp/linux.iso
C . set ide1-cd0=/tmp/linux.iso
D . eject –reconnect ide1-cd0 /tmp/linux.iso
E . disc file=/tmp/linux.iso,device=/dev/sr0

Answer: A

Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)

Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)
A . Creation of new instances can be automated by using scripts or APIs and service interfaces.
B . The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
C . Each and every user of an IaaS cloud has exactly one computing instance.
D . Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance’s data.
E . Instances may be created when needed and destroyed when they become obsolete.

Answer: AE

What is the usual way to gain command line access to computing instances in an IaaS cloud?

What is the usual way to gain command line access to computing instances in an IaaS cloud?
A . By providing a public SSH key to the cloud management system and using the matching private SSH
key to log into the instances.

B . Usually computing instances are accessed through a web frontend and do not allow command line access.
C . By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.
D . By using a telnet session with the credentials set and publicized by the creator of the computing instance’s system image.
E . By using a VNC console which does not require authentication when it is invoked via the cloud management system.

Answer: A

What action does the virsh restore command perform?

What action does the virsh restore command perform?
A . It restores a virtual machine that was stopped by a kernel panic.
B . It restores a virtual machine from a state file.
C . It reverts a virtual machine, including its storage devices, to a previously saved state.
D . It wakes up a virtual machine that was hibernated by the operating system running inside the virtual machine.

Answer: B

In order to use the option dom0_mem to limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?

In order to use the option dom0_mem to limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?
A . In its Makefile, when Xen is built.
B . In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.
C . In the bootloader configuration, when Xen is booted.
D . In its .config file, when the Domain-0 kernel is built.
E . In any of Xen’s global configuration files.

Answer: C

Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO

Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO

correct answers.)
A . More than one container requires access to block devices available in the host system.
B . Remote access via SSH is required to all containers.
C . Each container needs to have its own user accounts and user groups.
D . Administrators of containers must be able to install customized Linux kernels.
E . Different operating systems are to be used within containers on the same virtualization host.

Answer: DE

When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?

When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?
A . All floppy, CDROM, and hard disk drives in that order.
B . No devices are searched and the user is prompted to choose the boot device.
C . All network interfaces attached to the V
E . All hard disks and no other devices.
F . No devices are searched in order to support directly booting a Linux kernel.

Answer: C