Which method is used to extend virtual networks between physical locations?
Aencapsulations
Bencryption
Cclustering
Dload-balancing
You must install a basic Kubernetes cluster.
Which tool would you use in this situation?
Akubeadm
Bkubectl apply
Ckubectl create
Ddashboard
You want to create a template that defines the CPU, RAM, and disk space properties that a VM will use when instantiated.
In this scenario, which OpenStack object should you create?
Arole
Bimage
Cproject
Dflavor
Which component of Kubernetes runs on all nodes and ensures that the containers are running in a pod?
Akubelet
Bkube-proxy
Ccontainer runtime
Dkube controller
Question 6
Cloud Orchestration with Kubernetes
0
Question 7
Cloud Orchestration with OpenShift
Question 8
Cloud Orchestration with OpenShift
Question 9
Cloud Orchestration with Kubernetes
Question 10
Cloud Orchestration with Kubernetes
Question 11
Cloud Infrastructure (NFV and SDN)
Question 12
Network Virtualization
Question 13
Cloud Virtualization
Question 14
Network Virtualization
Question 15
Network Virtualization
Question 16
Cloud Virtualization
Question 17
Cloud Orchestration with Kubernetes
Question 18
Cloud Orchestration with Kubernetes
Question 19
Cloud Virtualization
Question 20
Cloud Fundamentals
Question 21
Cloud Fundamentals
Question 22
Network Virtualization
Question 23
Cloud Fundamentals
Question 24
Cloud Infrastructure (NFV and SDN)
Question 25
Cloud Virtualization
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
You have built a Kubernetes environment offering virtual machine hosting using KubeVirt.
Which type of service have you created in this scenario?
ASoftware as a Service (SaaS)
BPlatform as a Service (PaaS)
CInfrastructure as a Service (IaaS)
DBare Metal as a Service (BMaaS)
What are two available installation methods for an OpenShift cluster? (Choose two.)
Ainstaller-provisioned infrastructure
Bkubeadm
Cuser-provisioned infrastructure
Dkubespray
When considering OpenShift and Kubernetes, what are two unique resources of OpenShift? (Choose two.)
Aroutes
Bbuild
Cingress
Dservices
Which Kubernetes component guarantees the availability of ReplicaSet pods on one or more nodes?
Akube-proxy
Bkube-scheduler
Ckube controller
Dkubelet
Your organization has legacy virtual machine workloads that need to be managed within a Kubernetes deployment.
Which Kubernetes add-on would be used to satisfy this requirement?
AADOT
BCanal
CKubeVirt
DRomana
Which two statements are correct about Network Functions Virtualization (NFV)? (Choose two.)
Athe NFV framework explains how VNFs fits into the whole solution.
BThe NFV Infrastructure (NFVI) is a component of NFV.
CThe NFV Infrastructure (NFVI) is not a component of NFV.
DThe NFV framework is defined by the W3C.
Which term identifies to which network a virtual machine interface is connected?
Avirtual network ID (VNID)
Bmachine access control (MAC)
CVirtual Extensible LAN (VXLAN)
Dvirtual tunnel endpoint (VTEP)
Which virtualization method requires less duplication of hardware resources?
AOS-level virtualization
Bhardware-assisted virtualization
Cfull virtualization
Dparavirtualization
Which encapsulation protocol uses tunneling to provide a Layer 2 overlay over an underlying Layer 3 network?
AVLAN
BIPsec
CVXLAN
DGRE
You are asked to support an application in your cluster that uses a non-IP protocol.
In this scenario, which type of virtual network should you create to support this application?
Aa Layer 3 virtual network
Ba Layer 2 virtual network
Can Ethernet VPN (EVPN) Type 5 virtual network
Da virtual network router connected to the virtual network
Which two statements about containers are true? (Choose two.)
AContainers contain executables, libraries, configuration files, and an operating system.
BContainers package the entire runtime environment of an application, including its dependencies.
CContainers can only run on a system with a Type 2 hypervisor.
DContainers share the use of the underlying system’s kernel.
Which type of virtualization provides containerization and uses a microservices architecture?
Ahardware-assisted virtualization
BOS-level virtualization
Cfull virtualization
Dparavirtualization
Click the Exhibit button.
Referring to the exhibit, which port number would external users use to access the WEB application?
A80
B8080
C31000
D5000
Which feature of Linux enables kernel-level isolation of global resources?
Aring protection
Bstack protector
Cnamespaces
Dshared libraries
Which two statements describe a multitenant cloud? (Choose two.)
ATenants are aware of other tenants using their shared resources.
BServers, network, and storage are separated per tenant.
CThe entities of each tenant are isolated from one another.
DMultiple customers of a cloud vendor have access to their own dedicated hardware.
Which Linux protection ring is the least privileged?
A0
B1
C2
D3
Which two statements are correct about an underlay network? (Choose two.)
AAn underlay network can be built using either Layer 2 or Layer 3 connectivity.
BA Layer 3 underlay network uses routing protocols to provide IP connectivity.
CThe underlay network is the virtual network used to connect multiple virtual machines (VMs).
DThe underlay network is built using encapsulations tunnels.
You are asked to deploy a cloud solution for a customer that requires strict control over their resources and data. The deployment must allow the customer to implement and manage precise security controls to protect their data.
Which cloud deployment model should be used in this situation?
Aprivate cloud
Bhybrid cloud
Cdynamic cloud
Dpublic cloud
What are the two characteristics of the Network Functions Virtualization (NFV) framework? (Choose two.)
AIt implements virtualized tunnel endpoints.
BIt decouples the network software from the hardware.
CIt implements virtualized network functions.
DIt decouples the network control plane from the forwarding plane.