Which of the following tools is used to interact with XenStore?
Which of the following tools is used to interact with XenStore? A. xenstore-ls B. xendo C. xs D. xl store E. xstore
Which of the following tools is used to interact with XenStore? A. xenstore-ls B. xendo C. xs D. xl store E. xstore
Which of the following components are parts of XAPI? (Choose TWO correct answers.) A. The XADB configuration management database. B. The XAPI virtual file system available at /xen. C. The xm command. D. The xe command. E. The xapi daemon.
SIMULATION Which sub-command of xl changes the media inside a virtual CD-ROM drive of a Xen guest domain? (Specify ONLY the sub-command without any path or parameters.)
SIMULATION Which value must be set in the option builder in the configuration file of a Xen guest domain in order to create a fully virtualized machine instead of a paravirtualized one? (Specify ONLY the value without any option name,…
Which of the following directives is used in the configuration file of a Xen guest domain in order to define network interfaces? A. vif B. eth C. vnet D. vbr E. net
Which of the following statements are true regarding Xen domains? (Choose TWO correct answers.) A. Fully virtualized and paravirtualized domains are managed using the same tools and commands. B. Xen domains of all types require virtualization extensions in the host…
Which of the following technologies is the most important component of IaaS clouds? A. Database replication B. DNS delegation C. Emulation D. Mandatory Access Control E. Virtualization
Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.) A. Creation of new instances can be automated by using scripts or APIs and service interfaces. B. The root file system of a computing instance…
When migrating a physical machine to a full virtualized machine, which of the following properties should be expected to change from the perspective of the guest operating system? (Choose TWO correct answers.) A. The user accounts within the guest operating…
Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO correct answers.) A. More than one container requires access to block devices available in the host system. B. Remote access via SSH is required to all…