Exam Details

  • Exam Code
    :701-100
  • Exam Name
    :DevOps Tools Engineer Exam
  • Certification
    :DevOps Tools Engineer
  • Vendor
    :Lpi
  • Total Questions
    :120 Q&As
  • Last Updated
    :May 15, 2024

Lpi DevOps Tools Engineer 701-100 Questions & Answers

  • Question 11:

    Which of the following sections must exist in a Packer template?

    A. images

    B. provisioners

    C. builders

    D. variables

    E. post-processsors

  • Question 12:

    How is cloud-init integrated with a managed system image?

    A. cloud-init provides the cloud-init-worker command which has to be invoked periodically within the running instance.

    B. cloud-init provides systemd units which must be included in several stages of the booting process of the instance.

    C. cloud-init provides its own startup mechanism which replaces the instance's original init system, such as systemd.

    D. cloud-init provides a Linux kernel module that must be included and loaded in the instance's initramfs.

    E. cloud-init provides the cloud-init-daemon service which is launched during startup and keeps the instance in sync with the desired configuration.

  • Question 13:

    What must be the first line of a plain text user-data configuration containing YAML configuration for cloud-init?

    A. cloud-config:

    B. --- cloud-config

    C. #!/usr/bin/cloud-init

    D. [cloud-config]

    E. #cloud-config

  • Question 14:

    How does Vagrant run virtual machines?

    A. Vagrant uses a vagrant-specific hypervisor called VagrantVM.

    B. Vagrant has to be run within a running virtual machine which is not controlled by Vagrant.

    C. Vagrant ships with an embedded version of VirtualBox.

    D. Vagrant uses so-called provides which control external hypervisors such as VirtualBox.

    E. Vagrant generates virtual machine images but does not provide a mechanism to run them.

  • Question 15:

    Which security issues exist for most publicly available Vagrant boxes? (Choose three correct answers.)

    A. They accept SSH logins from the user vagrant with the password vagrant.

    B. They accept SSH logins from the user vagrant with a publicly available SSH key pair.

    C. The vagrant user can use sudo to obtain root privileges without additional authentication.

    D. Their whole file system, including configuration files, is writable by any user, including vagrant.

    E. They export their file system via NFS with full write permissions without any additional restrictions.

  • Question 16:

    Which of the following statements is true about load balancers?

    A. Load balancers are a security risk because they obfuscate the origin of connections.

    B. Load balancer help to improve the availability and scalability of a service.

    C. Load balancers are a single point of failure because they cannot be deployed redundantly.

    D. Load balancer require access to private keys in order to be able to forward HTTPS traffic.

    E. Load balancers cannot use connection content, such as HTTP cookies, to route traffic.

  • Question 17:

    What does the command packer validate template.json do?

    A. The command verifies that the latest build of the template can be run without downloading additional images or artifacts.

    B. The command verifies that the file template.json is a syntactically correct and complete Packer template.

    C. The command verifies that all existing artifacts generated by template.json have their original checksums.

    D. The command verifies that all source images referenced in template.json are available and have valid cryptographic signatures.

    E. The command verifies that images generated previously by template.json still use the most recent source images.

  • Question 18:

    A service should be provided to arbitrary clients on the Internet using HTTPS. Any standard client on the Internet should be able to consume the service without further configuration.

    Which of the following approaches can be used to implement these requirements? (Choose three correct answers.)

    A. Configure the web servers to not use a server certificate when serving HTTPS.

    B. Generate a self-signed certificates during the deployment of each backend server.

    C. Use a certificate issuing service to request certificates during each server deployment.

    D. Use a load balancer that decrypts incoming requests and passes them on in plain HTTP.

    E. Install a wildcard certificate and the respective private key on all the backend servers.

  • Question 19:

    How does Prometheus gather information about monitored hosts and services?

    A. It implements the ICMP and SNMP protocols to ping and query remote services.

    B. It opens a webhook where monitored applications have to submit various metrics.

    C. It uses HTTP to retrieve JSON encoded metrics from the monitored objects.

    D. It queries a relational database for metrics written to the database by monitored applications.

    E. It runs scripts on the Prometheus server which perform tests and return various metrics.

  • Question 20:

    Which sections can exist in a Logstash configuration file? (Choose three correct answers.)

    A. output

    B. filter

    C. input

    D. forward

    E. generate

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Lpi exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 701-100 exam preparations and Lpi certification application, do not hesitate to visit our Vcedump.com to find your solutions here.