EnsurepassQUESTION 81 Which of the following authentication types does keepalived support for syncing between failover servers? (Select TWO correct answers) A. PASS B. KRB5 C. AH D. NONE E. KEY Answer: A,C QUESTION 82 Which of the following Messaging Layers are supported by Pacemaker? (Select TWO correct answers) A. Heartbeat B. OpenAIS C. DRBD D. Red Hat Cluster Suite E. Slurm Answer: A,B QUESTION 83 Which statements are true about container based virtualization? (Select TWO correct Read more [...]
EnsurepassQUESTION 71 Xen was correctly installed, configured and initialized. Some virtual machines have been successfully started, and after that, the xend daemon has been stopped by issuing the command /etc/init.d/xend stop. In this scenario, what is the impact of stopping the xend daemon? A. Virtual machines will not start automatically on the next boot. B. All of the running virtual machines will be turned off. C. The xm command will stop working. D. The Domain0 will halt. E. The hypervisor Read more [...]
EnsurepassQUESTION 61 Which one of the following is NOT a valid STONITH device in a Pacemaker environment? A. SSH B. SCSI C. DRAC D. RILO E. RackPDU Answer: B QUESTION 62 Which command will show the status of the initial full synchronization when using DRBD? A. cat /proc/sys/fs/status B. cat /proc/drbd/status C. cat /proc/drbd/currentstatus D. cat /proc/drbd E. cat /proc/fs/drdb Answer: D QUESTION 63 What is the purpose of the Cluster Configuration System (CCS)? A. It manages the Read more [...]
EnsurepassQUESTION 51 Which of the following configuration settings specify that keepalived is to use the round robin algorithm? A. lb_mode rr B. lb_algo rr C. loadbalancer_mode=rr D. algorithm=round robin E. lb_algorithm=rr Answer: B QUESTION 52 In order to use HAProxy to balance incoming connections to a pool of email servers, which one of the following modes should be used? A. mode tcp B. mode mailproxy C. mode smtp D. mode email Answer: A QUESTION 53 Which command should be used Read more [...]
EnsurepassQUESTION 41 Which option to the xm command will deactivate a live Xen virtual machine? (Select TWO correct answers) A. destroy B. remove C. shutdown D. stop E. halt Answer: A,C QUESTION 42 How is the AMDV extension made available in a KVM environment? A. modprobe qemu_kvm B. modprobe kvm_intel C. modprobe kvm_amd D. modprobe kvm_amd_v E. modprobe kvm_any Answer: C QUESTION 43 You have created a configuration file named /etc/xen/debian.cfg for a virtual machine. The virtual Read more [...]
EnsurepassQUESTION 31 A server with Xen installed has hardware and software requirements for full virtualization. What commands can tell you about the availability of full virtualization on the server? (Select TWO correct answers) A. dmesg |grep i intel|grep i vt; dmesg |grep i amd|grep i v B. egrep '(vmx|svm)' /proc/cpuinfo C. xm dmesg | grep i hvm D. grep i "Full Virtualization" /proc/xen E. grep i "Full Virtualization" /etc/xen/* Answer: B,C QUESTION 32 Which kernel boot option should Read more [...]
EnsurepassQUESTION 21 When using the user mode network stack with qemu, TCP and UDP connections work fine but ping does not work. Why is this? A. The Qemu user mode network stack does not implement ICMP. B. The problem is caused by incorrect routing. C. The Qemu user mode network stack blocks all ICMP traffic. D. The Qemu user mode network stack requires explicit permission for ping to work. Answer: A QUESTION 22 When using Xen, each VM will have a configuration file matching the name of Read more [...]
EnsurepassQUESTION 11 Which one of the following statements about STONITH is NOT true? A. You can use hardware devices such as HP ILO or Dell DRAC management boards for STONITH. B. Resources will migrate only after a STONITH operation has been issued successfully. C. It is recommended to use STONITH to increase the integrity of the cluster. D. Null STONITH is a good solution if you have guaranteed the integrity of the file systems used in your cluster in another way. E. When setting up SSHSTONITH, Read more [...]
EnsurepassQUESTION 1 Which one of the following statements is true about the live migration feature of Xen? A. It requires that the source and destination hosts have access, with same rights, to the device that exports the virtual machine file system. B. It is used to migrate the file system of virtual machines between two hosts on the same network segment, ensuring data integrity during the migration process. C. It is recommended that the virtual machines be restarted after migration to ensure Read more [...]