ExamGecko
Home Home / LPI / 305-300

LPI 305-300 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which of the following commands boots a QEMU virtual machine using hardware virtualization extensions?

A.
qvirt -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d -driver hvm
A.
qvirt -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d -driver hvm
Answers
B.
vm -kvm -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
B.
vm -kvm -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
Answers
C.
qemu-hw -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
C.
qemu-hw -create -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
Answers
D.
qemu -accel kvm -drive file-debian.img -cdrom debian.iso -m 1024 -boot d
D.
qemu -accel kvm -drive file-debian.img -cdrom debian.iso -m 1024 -boot d
Answers
E.
qvm start -vmx -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
E.
qvm start -vmx -drive file=debian.img -cdrom debian.iso -m 1024 -boot d
Answers
Suggested answer: D

Which of the following tasks are part of a hypervisor's responsibility? (Choose two.)

A.
Create filesystems during the installation of new virtual machine quest operating systems.
A.
Create filesystems during the installation of new virtual machine quest operating systems.
Answers
B.
Provide host-wide unique PIDs to the processes running inside the virtual machines in order to ease inter-process communication between virtual machines.
B.
Provide host-wide unique PIDs to the processes running inside the virtual machines in order to ease inter-process communication between virtual machines.
Answers
C.
Map the resources of virtual machines to the resources of the host system.
C.
Map the resources of virtual machines to the resources of the host system.
Answers
D.
Manage authentication to network services running inside a virtual machine.
D.
Manage authentication to network services running inside a virtual machine.
Answers
E.
Isolate the virtual machines and prevent unauthorized access to resources of other virtual machines.
E.
Isolate the virtual machines and prevent unauthorized access to resources of other virtual machines.
Answers
Suggested answer: C, E

Which of the following devices exist by default in an LXC container? (Choose three.)

A.
/dev/log
A.
/dev/log
Answers
B.
/dev/console
B.
/dev/console
Answers
C.
/dev/urandom
C.
/dev/urandom
Answers
D.
/dev/kmem
D.
/dev/kmem
Answers
E.
/dev/root
E.
/dev/root
Answers
Suggested answer: A, B, C

Which subcommand of virsh opens the XML configuration of a virtual network in an editor in order to make changes to that configuration? (Specify ONLY the subcommand without any parameters.)

A.
netedit
A.
netedit
Answers
Suggested answer: A

Which of the following statements is true regarding networking with libvirt?

A.
Libvirt's network functionality is limited to connecting virtual machines to a physical network interface of the host system.
A.
Libvirt's network functionality is limited to connecting virtual machines to a physical network interface of the host system.
Answers
B.
Libvirt assiqns the same MAC address to all virtual machines and isolates their network interfaces at the link layer.
B.
Libvirt assiqns the same MAC address to all virtual machines and isolates their network interfaces at the link layer.
Answers
C.
Libvirt networks appear, by default, as standard Linux bridges in the host system.
C.
Libvirt networks appear, by default, as standard Linux bridges in the host system.
Answers
D.
Libvirt requires a dedicated network interface that may not be used by the host system.
D.
Libvirt requires a dedicated network interface that may not be used by the host system.
Answers
E.
Libvirt supports exactly one virtual network and connects all virtual machines to it.
E.
Libvirt supports exactly one virtual network and connects all virtual machines to it.
Answers
Suggested answer: C

Which of the following are true regarding the CPU of a QEMU virtual machine? (Choose two.)

A.
The CPU architecture of a QEMU virtual machine is independent of the host system's architecture.
A.
The CPU architecture of a QEMU virtual machine is independent of the host system's architecture.
Answers
B.
Each QEMU virtual machine can only have one CPU with one core.
B.
Each QEMU virtual machine can only have one CPU with one core.
Answers
C.
For each QEMU virtual machine, one dedicated physical CPU core must be reserved.
C.
For each QEMU virtual machine, one dedicated physical CPU core must be reserved.
Answers
D.
QEMU uses the concept of virtual CPUs to map the virtual machines to physical CPUs.
D.
QEMU uses the concept of virtual CPUs to map the virtual machines to physical CPUs.
Answers
E.
QEMU virtual machines support multiple virtual CPUs in order to run SMP systems.
E.
QEMU virtual machines support multiple virtual CPUs in order to run SMP systems.
Answers
Suggested answer: A, E

Which of the following statements about the command lxc-checkpoint is correct?

A.
It creates a clone of a container.
A.
It creates a clone of a container.
Answers
B.
It doubles the memory consumption of the container.
B.
It doubles the memory consumption of the container.
Answers
C.
It only works on stopped containers.
C.
It only works on stopped containers.
Answers
D.
It writes the status of the container to a file.
D.
It writes the status of the container to a file.
Answers
E.
It creates a container image based on an existing container.
E.
It creates a container image based on an existing container.
Answers
Suggested answer: D

The command virsh vol-list vms returns the following error:

error: failed to get pool 'vms'

error: Storage pool not found: no storage pool with matching name 'vms '

Given that the directory /vms exists, which of the following commands resolves this issue?

A.
dd if=/dev/zero of=/vms bs=1 count=0 flags=name:vms
A.
dd if=/dev/zero of=/vms bs=1 count=0 flags=name:vms
Answers
B.
libvirt-poolctl new ---name=/vms ---type=dir ---path=/vms
B.
libvirt-poolctl new ---name=/vms ---type=dir ---path=/vms
Answers
C.
qemu-img pool vms:/vms
C.
qemu-img pool vms:/vms
Answers
D.
virsh pool-create-as vms dir --target /vms
D.
virsh pool-create-as vms dir --target /vms
Answers
E.
touch /vms/.libvirtpool
E.
touch /vms/.libvirtpool
Answers
Suggested answer: D

What is the purpose of the command vagrant init?

A.
It executes a provisioning tool in a running box.
A.
It executes a provisioning tool in a running box.
Answers
B.
It starts a Vagrant box.
B.
It starts a Vagrant box.
Answers
C.
It creates a Vagrant configuration file.
C.
It creates a Vagrant configuration file.
Answers
D.
It installs Vagrant on a Linux host.
D.
It installs Vagrant on a Linux host.
Answers
E.
It downloads a Vagrant box.
E.
It downloads a Vagrant box.
Answers
Suggested answer: C

In order to use the option dom0_mem to limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?

A.
In the bootloader configuration, when Xen is booted.
A.
In the bootloader configuration, when Xen is booted.
Answers
B.
In any of Xen's global configuration files.
B.
In any of Xen's global configuration files.
Answers
C.
In its .config file, when the Domain-0 kernel is built.
C.
In its .config file, when the Domain-0 kernel is built.
Answers
D.
In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.
D.
In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.
Answers
E.
In its Makefile, when Xen is built.
E.
In its Makefile, when Xen is built.
Answers
Suggested answer: A
Total 60 questions
Go to page: of 6