Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

304-200 Questions and Answers

Note! Following 304-200 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 305-300

304-200 Questions and Answers

Question # 6

When migrating a physical machine to a full virtualized machine, which of the following properties should be expected to change from the perspective of the guest operating system? (Choose TWO correct answers.)

A.

The user accounts within the guest operating system.

B.

The properties of the CPU and other hardware devices.

C.

The MAC address of the network interfaces.

D.

The version of the guest operating system.

E.

The software and applications installed on the guest system.

Full Access
Question # 7

How does high availability clustering relate to periodic storage backup? (Choose TWO correct answers.)

A.

Regular backups become generally unnecessary as any data loss or corruption is automatically recovered by the high availability cluster.

B.

Regular backups remain vital as they allow restoration of data that was accidentally deleted or corrupted.

C.

Regular backups may be reduced to the cluster configuration and cluster state data as this information is sufficient to recover any state of the cluster, including data, at any time.

D.

Backups should be located only on the local storage of the cluster and should not be backed up in order to prevent bandwidth congestion.

E.

Backup procedures may have to be adapted to the cluster to ensure complete and recoverable backups.

Full Access
Question # 8

When running a Linux Virtual Server (LVS) cluster, what is the purpose of a nanny process?

A.

Each nanny process checks the state of one configured service on one real server, and tells LVS if the service on that real server is malfunctioning.

B.

The nanny process powers off a nonfunctional backend server.

C.

The nanny process restarts the daemon of a failed service on a real server node.

D.

The nanny process changes the IP routing table in the Linux kernel according to the LVS configuration.

Full Access
Question # 9

Which of the following commands displays only the resources of the cluster information base of a pacemaker cluster?

A.

cibquery -o resources

B.

cibadmin -R

C.

cibadmin -Q -o resources

D.

cibquery -L resources

E.

cib_admin -L resources

Full Access
Question # 10

Which actions should be taken in a load balanced cluster in order to protect the load balancer against outages?

A.

Load balancers cannot be protected against outages which is why they should always be built on dedicated hardware.

B.

No actions are necessary as a load balancer cannot become a single point of failure.

C.

Two or more load balancers should be deployed as a cascade that passes packets from one to the other.

D.

Two load balancers should be deployed as a failover cluster.

E.

Load balancers are used for performance and scalability reasons only and cannot be used to archive high availability clusters.

Full Access
Question # 11

What is the name and path of the configuration file for the O2CB cluster that coordinates the nodes using OCFS2 filesystems?

A.

/etc/ocfs2/cluster.conf

B.

/etc/ocfs/cluster.conf

C.

/etc/ocfs2.conf

D.

/etc/cluster.conf

Full Access
Question # 12

Which parameter of vgchange controls whether a volume group is shared within a shared storage cluster? (Specify ONLY the option name without any values or parameters.)

Full Access
Question # 13

Which one of the following is NOT a required component for running an OCFS2 filesystem resource in a Pacemaker cluster?

A.

A clone resource for the OCFS2 file system.

B.

A shared storage device accessible by all nodes using the OCFS2 filesystem.

C.

The distributed lock manager (DLM).

D.

The cluster logical volume manager (CLVM).

E.

The O2CB service.

Full Access
Question # 14

How can the state of the backing storage disks of a DRBD device be checked? (Choose TWO correct answers.)

A.

cat /proc/drdb/status

B.

cat /proc/drdb

C.

drbdadm dstate all

D.

drbdadm diskstatus all

E.

drbdadm state --disk all

Full Access
Question # 15

When using DRBD in a Pacemaker cluster, which configuration objects must be managed in order to use the DRBD device as storage for other cluster services? (Choose TWO correct answers.)

A.

A security resource in order to permit other cluster services to access the data on the DRBD device.

B.

A health resource in order to check the integrity of the file system.

C.

A file system resource to mount the device.

D.

A replication resource that synchronizes the DRBD device's data to all nodes that may take over the device after a failover.

E.

A constraint to ensure the device is mounted before the dependent services are started.

Full Access
Question # 16

Which of the following statements are true regarding OCFS2? (Choose TWO correct answers.)

A.

OCFS2 is an integral part of Pacemaker and relies on Pacemaker services for functionality.

B.

To avoid the need for shared storage, OCFS2 can replicate the content of its filesystems via the network.

C.

When using OCFS2 with additional cluster software, OCFS2 must be integrated into the overall cluster manager to ensure consistent cluster behaviour.

D.

OCFS2 can be used without any additional software as it contains its own cluster manager, O2CB.

E.

In addition to filesystems, OCFS2 can handle other cluster services such as IP addresses and server daemons.

Full Access
Question # 17

What is true for a virtual IP address in the context of keepalived? (Choose TWO correct answers.)

A.

The distinct IP addresses of all backend servers are called virtual IP addresses.

B.

Every server running keepalived has exactly one virtual IP address and cannot have any additional virtual IP addresses.

C.

The virtual IP address is the address to which incoming connections are made in order to reach the load balancer.

D.

keepalived uses VRRP to ensure the availability of the virtual IP address.

E.

Within the whole LVS cluster managed by keepalived, the virtual IP address never appears on any network interface.

Full Access
Question # 18

Which of the following statements is true regarding the quorum in a two node Pacemaker cluster?

A.

Clusters with one or two nodes cannot have a quorum and require no quorum configuration.

B.

In a two node cluster, quorum can be determined and handled just as in a cluster with a higher number of nodes.

C.

In a two node cluster the quorum is always held by the node that first started the cluster software.

D.

The default quorum policy in a two node cluster must be set to ignore in order to configure a working cluster.

Full Access