LPI LPIC-3 (305-300) Certification Sample Questions

LPIC-3 Dumps, 305-300 Dumps, 305-300 PDF, LPIC-3 VCE, LPI 305-300 VCE, LPI LPIC-3 305 PDFThe purpose of this Sample Question Set is to provide you with information about the LPI Virtualization and Containerization exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 305-300 certification test. To get familiar with real exam environment, we suggest you try our Sample LPI LPIC-3 Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual LPIC-3 Virtualization and Containerization certification exam.

These sample questions are simple and basic questions that represent likeness to the real LPI 305-300 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium LPI LPIC-3 Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

LPI 305-300 Sample Questions:

01. Which of the following statements are true regarding IaaS computing instances?
(Choose TWO correct answers.)
a) Creation of new instances can be automated by using scripts or APIs and service interfaces.
b) The root file system of a computing instance is always persistent and can be accessed after the instance is destroyed.
c) Each and every user of an IaaS cloud has exactly one computing instance.
d) Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's data.
e) Instances may be created when needed and destroyed when they become obsolete.
02. In order to use the option dom0_mem to limit the amount of memory assigned to the Xen Domain-0, where must this option be specified?
a) In its Makefile, when Xen is built.
b) In the configuration file /etc/xen/Domain-0.cfg, when Xen starts.
c) In the bootloader configuration, when Xen is booted.
d) In its .config file, when the Domain-0 kernel is built.
e) In any of Xen's global configuration files.
03. How can data be shared between several virtual machines running on the same Linux-based host system?
a) By mounting other VM's file systems from /dev/virt-disks/remote/.
b) By using a network file system or file transfer protocol.
c) By default, Linux-based virtualization products provide full access to the host system to all virtual machines.
d) By setting up a ramdisk in one virtual machine and mounting it using its UUID in the other VMs.
e) By attaching the same virtual hard disk to all virtual machines and activating EXT4 sharing extensions on it.
04. When preparing a public machine image for the provisioning of new cloud computing instances, which of the following steps should be done?
(Choose TWO correct answers.)
a) Remove all default users and groups, including root and nobody.
b) Remove all configuration files from /etc/ that were not manually modified.
c) Remove all confidential data from the image.
d) Remove all remote login services (i.e. SSH) from the image.
e) Remove all private SSH keys from the image.
05. What does IaaS stand for?
a) Integration as a Service
b) Intelligence as a Service
c) Instances as a Service
d) Infrastructure as a Service
e) Information as a Service
06. Which options to the xl command will deactivate a running Xen virtual machine?
(Choose TWO correct answers.)
a) destroy
b) remove
c) shutdown
d) stop
e) halt
07. What is the usual way to gain command line access to computing instances in an IaaS cloud?
a) By providing a public SSH key to the cloud management system and using the matching private SSH key to log into the instances.
b) Usually computing instances are accessed through a web frontend and do not allow command line access.
c) By either telnet or SSH using the credentials of the cloud management system account with administrative privileges.
d) By using a telnet session with the credentials set and publicized by the creator of the computing instance's system image.
e) By using a VNC console which does not require authentication when it is invoked via the cloud management system.
08. Within the graphical output of a KVM virtual machine, which key sequence switches to the KVM monitor of the VM?
a) Ctrl-Alt-1
b) Ctrl-Alt-0
c) Ctrl-Alt-4
d) Ctrl-Alt-2
e) Ctrl-Alt-3
09. When KVM is launched with the parameter -boot order=n, which of the following devices will be searched for a bootable operating system?
a) All floppy, CDROM, and hard disk drives in that order.
b) All network interfaces attached to the VM.
c) No devices are searched and the user is prompted to choose the boot device.
d) All hard disks and no other devices.
e) No devices are searched in order to support directly booting a Linux kernel.
10. When used with KVM, which of the following block device image formats support snapshots?
a) qcow
b) dmg
c) qcow2
d) qed
e) raw


Question: 01
Answer: a, e
Question: 02
Answer: c
Question: 03
Answer: b
Question: 04
Answer: c, e
Question: 05
Answer: d
Question: 06
Answer: a, c
Question: 07
Answer: a
Question: 08
Answer: d
Question: 09
Answer: b
Question: 10
Answer: c

Note: For any error in LPIC-3 Virtualization and Containerization (305-300) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.8 / 5 (83 votes)