When used with KVM, which of the following block device image formats support snapshots?
A . qcow
B . dmg
C . qed
D . qcow2
E . raw
Answer: D
304-200 LPIC-3 Exam 304: Virtualization & High Availability, version 2.0 exam is a hot Lpi certification exam, Exam4Training offers you the latest free online 304-200 dumps to practice. You can get online training in the following questions, all these questions are verified by Lpi experts. If this exam changed, we will share new update questions.
When used with KVM, which of the following block device image formats support snapshots?
A . qcow
B . dmg
C . qed
D . qcow2
E . raw
Answer: D
Which of the following KVM monitor commands changes the image file in the first IDE CDROM drive of a virtual machine?
A . change ide1-cd0 /tmp/linux.iso
B . update ide1-cd0 /tmp/linux.iso
C . set ide1-cd0=/tmp/linux.iso
D . eject –reconnect ide1-cd0 /tmp/linux.iso
E . disc file=/tmp/linux.iso,device=/dev/sr0
Answer: A
Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)
A . Creation of new instances can be automated by using scripts or APIs and service interfaces.
B . The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
C . Each and every user of an IaaS cloud has exactly one computing instance.
D . Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance’s data.
E . Instances may be created when needed and destroyed when they become obsolete.
Answer: AE
What is the usual way to gain command line access to computing instances in an IaaS cloud?
A . By providing a public SSH key to the cloud management system and using the matching private SSH
key to log into the instances.
B . Usually computing instances are accessed through a web frontend and do not allow command line access.
C . By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.
D . By using a telnet session with the credentials set and publicized by the creator of the computing instance’s system image.
E . By using a VNC console which does not require authentication when it is invoked via the cloud management system.
Answer: A
What action does the virsh restore command perform?
A . It restores a virtual machine that was stopped by a kernel panic.
B . It restores a virtual machine from a state file.
C . It reverts a virtual machine, including its storage devices, to a previously saved state.
D . It wakes up a virtual machine that was hibernated by the operating system running inside the virtual machine.
Answer: B
In order to use the option dom0_mem to limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?
A . In its Makefile, when Xen is built.
B . In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.
C . In the bootloader configuration, when Xen is booted.
D . In its .config file, when the Domain-0 kernel is built.
E . In any of Xen’s global configuration files.
Answer: C
Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO
correct answers.)
A . More than one container requires access to block devices available in the host system.
B . Remote access via SSH is required to all containers.
C . Each container needs to have its own user accounts and user groups.
D . Administrators of containers must be able to install customized Linux kernels.
E . Different operating systems are to be used within containers on the same virtualization host.
Answer: DE
Within the graphical output of a KVM virtual machine, which key sequence switches to the KVM monitor of the VM?
A . Ctrl-Alt-1
B . Ctrl-Alt-0
C . Ctrl-Alt-4
D . Ctrl-Alt-2
E . Ctrl-Alt-3
Answer: D
Fill in the blank.
Which subcommand of virsh opens the XML configuration of a virtual network in an editor in order to make changes to that configuration? (Specify ONLY the subcommand without any parameters.)
Answer: virsh net-edit -or- net-edit
When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?
A . All floppy, CDROM, and hard disk drives in that order.
B . No devices are searched and the user is prompted to choose the boot device.
C . All network interfaces attached to the V
E . All hard disks and no other devices.
F . No devices are searched in order to support directly booting a Linux kernel.
Answer: C