Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 304-200 has been withdrawn. The new exam code is 305-300

304-200 Practice Exam Questions with Answers LPI Level 3 Exam 304 Certification

Question # 6

Which of the following commands can be used to change properties such as the number of node slots or the label of an existing OCFS2 filesystem?

A.

ocfs2.setprops

B.

ocfs2tool

C.

crm_edit

D.

tunefs.ocfs2

E.

o2cbtool

Full Access
Question # 7

When used with KVM, which of the following block device image formats support snapshots?

A.

qcow

B.

dmg

C.

qed

D.

qcow2

E.

raw

Full Access
Question # 8

Which of the following statements are true regarding resource management for full virtualization? (Choose TWO correct answers.)

A.

The hypervisor may provide fine-grained limits to internal elements of the guest operating system such as the number of processes.

B.

Full virtualization cannot pose any limits to virtual machines and always assigns the host system's resources in a first-come-first-serve manner.

C.

It is up to the virtual machine to use its assigned hardware resources and create, for example, an arbitrary amount of network sockets.

D.

The hypervisor provides each virtual machine with hardware of a defined capacity that limits the resources of the virtual machine.

E.

All processes created within the virtual machines are transparently and equally scheduled in the host system for CPU and I/O usage.

Full Access
Question # 9

What is libvirt?

A.

An identity manager used to provide Single-Sign-On for different operating systems.

B.

A driver package used to support 3D printers.

C.

A cluster manager used to handle node access to shared storage.

D.

A combined interface to several virtualization products.

E.

A Linux-based virtualization hypervisor.

Full Access
Question # 10

When using direct Linux booting to start Linux within a KVM virtual machine, which KVM parameter is used to specify parameters for the Linux Kernel? (Specify ONLY the option name without any values or parameters.)

Full Access
Question # 11

Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO correct answers.)

A.

More than one container requires access to block devices available in the host system.

B.

Remote access via SSH is required to all containers.

C.

Each container needs to have its own user accounts and user groups.

D.

Administrators of containers must be able to install customized Linux kernels.

E.

Different operating systems are to be used within containers on the same virtualization host.

Full Access
Question # 12

Which of the following statements are true for full virtualization? (Choose TWO correct answers.)

A.

Full virtualization does not require changes to the guest operating systems.

B.

Full virtualization has no performance impact compared to a non-virtualized bare-metal installation on the same machine.

C.

Full virtualization has a severe performance impact and should not be used in production environments.

D.

Full virtualization may be supported by special CPU extensions that provide better performance.

E.

Full virtualization always requires additional software components and cannot be done using Linux only.

Full Access
Question # 13

Using Linux Virtual Server (LVS) without any additional tools provides which of the following features?

A.

Balancing network connections across several backend servers.

B.

Automatically taking over the services of failed nodes.

C.

Restarting failed services on the backend servers.

D.

Checking the integrity of services on backend servers.

E.

Starting and stopping backend servers as needed.

Full Access
Question # 14

Which of the following device classes are commonly used STONITH devices? (Choose THREE correct answers.)

A.

Uninterruptable Power Supplies, UPS

B.

CPU frequency management tools

C.

Blade Control Devices

D.

Remote Management Services like iLO or DRAC

E.

Local node storage

Full Access
Question # 15

In case one service in a Pacemaker cluster depends on another service running on the same node, which score should be assigned to the constraint describing that dependency?

A.

-1

B.

0

C.

1

D.

FORCE

E.

INFINITY

Full Access
Question # 16

How does high availability clustering relate to periodic storage backup? (Choose TWO correct answers.)

A.

Regular backups become generally unnecessary as any data loss or corruption is automatically recovered by the high availability cluster.

B.

Regular backups remain vital as they allow restoration of data that was accidentally deleted or corrupted.

C.

Regular backups may be reduced to the cluster configuration and cluster state data as this information is sufficient to recover any state of the cluster, including data, at any time.

D.

Backups should be located only on the local storage of the cluster and should not be backed up in order to prevent bandwidth congestion.

E.

Backup procedures may have to be adapted to the cluster to ensure complete and recoverable backups.

Full Access
Question # 17

Which of the following situations can result in a split brain situation in a high availability cluster?

A.

The load balancer of a load balanced cluster fails.

B.

The communication between the cluster nodes is interrupted.

C.

Cluster services are moved between cluster nodes.

D.

More than one node is active in a load balanced cluster.

E.

A cluster node has successfully been fenced.

Full Access
Question # 18

When using HAProxy to load balance requests over a set of web servers, what directive is needed in the HAProxy configuration in order to be able to log, on the backend web servers, the IP address of the client making a request?

A.

option reverseproxy

B.

option forwardfor

C.

option clientlog

D.

option exposeclient

Full Access