Text Material Preview
306-300 Exam Name: LPIC-3: High Availability and Storage Clusters - Exam 306, version 3.0 Full version: 200 Q&As Full version of 306-300 Dumps Share some 306-300 exam dumps below. 1. Which command is used to mount an OCFS2 file system? A. mkfs.ocfs2 B. mount.ocfs2 C. fsck.ocfs2 1 / 8 https://www.certqueen.com/306-300.html D. tunefs.ocfs2 Answer: B 2. Which utility is used to manage iSCSI targets and initiators in Linux? A. tgtadm B. iscsiadm C. targets.conf D. iscsid.conf Answer: B 3. What is the purpose of mdadm monitoring and reporting? A. To track the CPU usage of the RAID devices. B. To monitor the temperature of the RAID disks. C. To receive notifications about RAID array failures. D. To optimize the performance of the RAID array. Answer: C 4. What is the purpose of integrating DRBD with Pacemaker? A. To provide high availability and automatic failover capabilities B. To configure networking connections and meshes for DRBD C. To manage replication modes in DRBD D. To monitor the health and status of DRBD devices Answer: A 5. Which utility is used to resize a GFS2 file system? A. mkfs.gfs2 B. mount.gfs2 C. fsck.gfs2 D. gfs2_grow Answer: D 6. What is the purpose of the sysfs file /sys/class/net/bond*/bonding/miimon in network bonding? A. It displays the status of network interfaces in bonding mode. B. It configures the monitor interval for link status checking. C. It manages the master-slave relationship between network interfaces. 2 / 8 D. The file /sys/class/net/bond*/bonding/miimon does not exist. Answer: B 7. Which aspect of high availability focuses on maintaining consistent user sessions during failover? A. Load balancing B. Replication C. Session handling D. Redundancy Answer: C 8. How can the integrity of a DRBD device be restored and verified after an outage? A. By running drbdmeta verify command B. By restarting the DRBD service on all nodes C. By modifying the /etc/drbd.conf file D. By reconfiguring the networking connections and meshes Answer: A 9. Which components of Ceph are responsible for managing storage devices in the cluster? A. OSD and MGR B. MGR and MON C. MON and MDS D. OSD and MON Answer: A 10. Which of the following device classes are commonly used STONITH devices? (Choose THREE correct answers.) A. Uninterruptable Power Supplies, UPS B. CPU frequency management tools C. Blade Control Devices D. Remote Management Services like iLO or DRAC E. Local node storage Answer: ACD 11. Which of the following situations can result in a split brain situation in a high availability cluster? 3 / 8 A. The load balancer of a load balanced cluster fails. B. The communication between the cluster nodes is interrupted. C. Cluster services are moved between cluster nodes. D. More than one node is active in a load balanced cluster. E. A cluster node has successfully been fenced. Answer: B 12. What is the purpose of managing clustered LVM? A. To provide network connectivity for servers B. To store and retrieve data from remote block storage devices C. To manage file systems on distributed storage D. To manage logical volumes on clustered storage Answer: D 13. Which one of the following should NOT be used as a lowlevel device for DRBD? A. A LVM logical volume B. A physical hard disk C. A EVMS volume D. A loop device Answer: D 14. Which of the following best describes the goal of High Availability (HA) and Site Reliability Engineering (SRE)? A. Maximizing downtime for critical systems B. Minimizing downtime for critical systems C. Increasing complexity in cluster architectures D. Reducing redundancy in cluster designs Answer: B 15. What is an LVM pool? A. A group of physical volumes combined to create a logical volume. B. A storage area for storing LVM snapshots. C. A mechanism for allocating storage space on-demand within a volume group. D. A redundant array of independent disks created using LVM. Answer: C 4 / 8 16. What is the purpose of monitoring S.M.A.R.T values using smartmontools? A. To monitor the system's CPU usage. B. To monitor the system's memory usage. C. To monitor the health of storage devices. D. To monitor network bandwidth usage. Answer: C 17. What are metadata formats and RAID geometries in the context of RAID arrays? A. They refer to the file systems used on the RAID devices. B. They describe the layout and configuration of the RAID array. C. They determine the size and capacity of the RAID devices. D. They specify the encryption algorithms used for data security. Answer: B 18. Which bond mode in network bonding provides fault tolerance by using one active interface and one standby interface? A. Active-Backup B. Balance-TLB C. Balance-ALB D. 802.3ad Answer: A 19. What is the purpose of the Cluster Configuration System (CCS)? A. It manages the cluster configuration information file. B. It fences a dropped node. C. It manages ACLs for cluster service access. D. It manages the network topology and settings for the cluster. Answer: A 20. HAProxy is commonly used as a load balancer in Load Balanced Clusters. What is the primary function of HAProxy? A. Backend server networking B. Connection scheduling algorithms C. Load balancing and proxying D. IP address failover Answer: C 5 / 8 21. What is the purpose of configuring DRBD networking connections and meshes? A. To specify the replication modes used by DRBD B. To define the IP addresses and ports used for communication between nodes C. To manage split brain situations D. To configure automatic recovery and error handling Answer: B 22. Which command is used to edit and display the running Linux Virtual Server (LVS) configuration? (Specify ONLY the command without any path or parameters.) Solution: ipvsadm Determine whether the given solution is correct? A. Correct B. Incorrect Answer: A 23. What is the purpose of configuring system shutdown at specific UPS events? A. To prevent data loss during power outages. B. To optimize system performance during high resource usage. C. To automatically restart the system after a hardware failure. D. To extend the lifespan of storage devices. Answer: A 24. Which utility is used to generate and manage hash tables for load balancing in a Load Balanced Cluster? A. genhash B. HAProxy C. Syncd D. ldirectord Answer: A 25. Which component of a Failover Cluster is responsible for managing cluster resources and making resource-related decisions? A. CIB B. CRMd 6 / 8 C. PEngine D. LRMd Answer: C 26. How can you add additional storage capacity to a GlusterFS cluster? A. By creating new trusted storage pools B. By adding bricks to existing volumes C. By increasing the number of peers in the cluster D. By creating new volumes Answer: B 27. Which of the following are not valid load balancing algorithms for HAProxy? A. leastconn B. source C. weightedrr Answer: C 28. What is the purpose of the nvme-cli utility? A. To monitor network interfaces. B. To configure NVMe storage devices. C. To manage power supply events. D. To monitor system memory usage. Answer: B 29. What is network bonding? A. Combining multiple network interfaces into a single logical interface. B. Configuring VLANs on network interfaces for traffic separation. C. Enabling redundant networking connections for high availability. D. Establishing a secure connection between two networks. Answer: A 30. Load Balanced Clusters commonly utilize which of the following algorithms to distribute incoming traffic among backend servers? A. ACLs B. VRRP C. Syncd 7 / 8 D. Connection scheduling algorithms Answer: D More Hot Exams are available. 350-401 ENCOR Exam Dumps 350-801 CLCOR Exam Dumps 200-301 CCNA Exam Dumps Poweredby TCPDF (www.tcpdf.org) 8 / 8 https://www.certqueen.com/promotion.asp https://www.certqueen.com/350-401.html https://www.certqueen.com/350-801.html https://www.certqueen.com/200-301.html http://www.tcpdf.org