Practice Free 305-300 Exam Online Questions
Which of the following tasks are part of a hypervisor’s responsibility? (Choose two.)
- A . Create filesystems during the installation of new virtual machine quest operating systems.
- B . Provide host-wide unique PIDs to the processes running inside the virtual machines in order to ease inter-process communication between virtual machines.
- C . Map the resources of virtual machines to the resources of the host system.
- D . Manage authentication to network services running inside a virtual machine.
- E . Isolate the virtual machines and prevent unauthorized access to resources of other virtual machines.
C, E
Explanation:
A hypervisor is a software that creates and runs virtual machines (VMs) by separating the operating system and resources from the physical hardware. One of the main tasks of a hypervisor is to map the resources of VMs to the resources of the host system, such as CPU, memory, disk, and network. This allows the hypervisor to allocate and manage the resources among multiple VMs and ensure that they run efficiently and independently123. Another important task of a hypervisor is to isolate the VMs and prevent unauthorized access to resources of other VMs. This ensures the security and privacy of the VMs and their data, as well as the stability and performance of the host system. The hypervisor can use various techniques to isolate the VMs, such as virtual LANs, firewalls, encryption, and access control145.
The other tasks listed are not part of a hypervisor’s responsibility, but rather of the guest operating system or the application running inside the VM. A hypervisor does not create filesystems during the installation of new VMs, as this is done by the installer of the guest operating system6. A hypervisor does not provide host-wide unique PIDs to the processes running inside the VMs, as this is done by the kernel of the guest operating system7. A hypervisor does not manage authentication to network services running inside a VM, as this is done by the network service itself or by a directory service such as LDAP or Active Directory8.
Reference: 1 (search for “What is a hypervisor?”), 2 (search for
“How does a hypervisor work?”), 3 (search for “The hypervisor gives each virtual machine the resources that have been allocated”), 4 (search for “Benefits of hypervisors”), 5 (search for “Isolate the virtual machines and prevent unauthorized access”), 6 (search for “Create filesystems during the installation of new virtual machine quest operating systems”), 7 (search for “Provide host-wide unique PIDs to the processes running inside the virtual machines”), 8 (search for “Manage authentication to network services running inside a virtual machine”).
What are the key benefits of using cloud management tools?
- A . Streamlined billing and invoicing
- B . Automated scaling of virtual machines
- C . Efficient resource allocation
- D . Enhanced security through encryption
C
Explanation:
Cloud management tools are primarily designed to optimize and control cloud-based resources in virtualized and containerized environments. According to virtualization and containerization documentation, one of the most significant benefits of these tools is efficient resource allocation. Cloud management platforms enable administrators to dynamically assign compute, storage, and network resources based on workload demand, ensuring optimal utilization of infrastructure.
These tools continuously monitor resource consumption across virtual machines and containers, helping prevent underutilization and resource contention. By leveraging centralized dashboards, policy-based management, and automation, cloud management tools ensure that workloads receive appropriate resources while minimizing waste. This capability is especially critical in private, public, and hybrid cloud environments where scalability and cost control are essential.
While features such as automated scaling, billing integration, and security enhancements may be supported by specific cloud platforms, they are secondary capabilities rather than the core function. Encryption, for example, is typically handled by underlying security services rather than cloud management tools themselves. Similarly, billing and invoicing are more closely associated with cloud service provider platforms.
Virtualization notes consistently emphasize that efficient resource allocation is the foundational benefit that enables performance optimization, cost efficiency, and scalability in cloud-managed environments.
Which of the following commands deletes all volumes which are not associated with a container?
- A . docker volume cleanup
- B . docker volume orphan -d
- C . docker volume prune
- D . docker volume vacuum
- E . docker volume garbage-collect
C
Explanation:
The command that deletes all volumes which are not associated with a container is docker volume prune. This command removes all unused local volumes, which are those that are not referenced by any containers. By default, it only removes anonymous volumes, which are those that are not given a specific name when they are created. To remove both unused anonymous and named volumes, the — all or -a flag can be added to the command. The command will prompt for confirmation before deleting the volumes, unless the –force or -f flag is used to bypass the prompt. The command will also show the total reclaimed space after deleting the volumes12.
The other commands listed in the question are not valid or do not have the same functionality as docker volume prune. They are either made up, misspelled, or have a different purpose. These commands are:
docker volume cleanup: This command does not exist in Docker. There is no cleanup subcommand for docker volume.
docker volume orphan -d: This command does not exist in Docker. There is no orphan subcommand for docker volume, and the -d flag is not a valid option for any docker volume command.
docker volume vacuum: This command does not exist in Docker. There is no vacuum subcommand for docker volume.
docker volume garbage-collect: This command does not exist in Docker. There is no garbage-collect subcommand for docker volume.
Reference: docker volume prune | Docker Docs
How to Remove all Docker Volumes – YallaLabs.
What is Xen’s role in paravirtualization?
- A . None of the above
- B . Requires modified guest operating systems for improved performance
- C . It only supports fully virtualized guests
- D . It fully virtualizes hardware
B
Explanation:
In paravirtualization, the guest operating system is aware that it is running in a virtualized environment and is modified to interact efficiently with the hypervisor. According to Xen documentation, Xen was originally designed as a paravirtualization-focused hypervisor, requiring modified guest operating systems to achieve better performance.
These modifications allow the guest OS to replace sensitive hardware instructions with hypercalls, reducing the overhead associated with hardware emulation. This results in improved CPU, memory, and I/O performance compared to early full virtualization techniques.
Xen does support fully virtualized (HVM) guests, but that is not its role in paravirtualization.
Therefore, option B correctly describes Xen’s role.
What is Xen’s role in paravirtualization?
- A . None of the above
- B . Requires modified guest operating systems for improved performance
- C . It only supports fully virtualized guests
- D . It fully virtualizes hardware
B
Explanation:
In paravirtualization, the guest operating system is aware that it is running in a virtualized environment and is modified to interact efficiently with the hypervisor. According to Xen documentation, Xen was originally designed as a paravirtualization-focused hypervisor, requiring modified guest operating systems to achieve better performance.
These modifications allow the guest OS to replace sensitive hardware instructions with hypercalls, reducing the overhead associated with hardware emulation. This results in improved CPU, memory, and I/O performance compared to early full virtualization techniques.
Xen does support fully virtualized (HVM) guests, but that is not its role in paravirtualization.
Therefore, option B correctly describes Xen’s role.
What is the purpose of a .dockerignore file?
- A . It lists files existing in a Docker image which should be excluded when building a derivative image.
- B . It specifies files that Docker does not submit to the Docker daemon when building a Docker image
- C . It exists in the root file system of containers that should ignore volumes and ports provided by
Docker. - D . It must be placed in the top level directory of volumes that Docker should never attach automatically to a container
- E . It specifies which parts of a Dockerfile should be ignored when building a Docker image.
B
Explanation:
The purpose of a .dockerignore file is to specify files that Docker does not submit to the Docker daemon when building a Docker image. A .dockerignore file is a text file that contains a list of files or directories that should be excluded from the build context, which is the set of files and folders that are available for use in a Dockerfile. By using a .dockerignore file, you can avoid sending files or directories that are large, contain sensitive information, or are irrelevant to the Docker image to the daemon, which can improve the efficiency and security of the build process. The other options are incorrect because they do not describe the function of a .dockerignore file. Option A is wrong because a .dockerignore file does not affect the files existing in a Docker image, but only the files sent to the daemon during the build. Option C is wrong because a .dockerignore file does not exist in the root file system of containers, but in the same directory as the Dockerfile. Option D is wrong because a .dockerignore file does not affect the volumes that Docker attaches to a container, but only the files included in the build context. Option E is wrong because a .dockerignore file does not affect the parts of a Dockerfile that are executed, but only the files available for use in a Dockerfile.
Reference: What are .dockerignore files, and why you should use them?
Dockerfile reference | Docker Docs
How to use .dockerignore and its importance – Shisho Cloud
What is the purpose of the command vagrant init?
- A . It executes a provisioning tool in a running box.
- B . It starts a Vagrant box.
- C . It creates a Vagrant configuration file.
- D . It installs Vagrant on a Linux host.
- E . It downloads a Vagrant box.
C
Explanation:
The command vagrant init is used to initialize the current directory to be a Vagrant environment by creating an initial Vagrantfile if one does not already exist1. The Vagrantfile contains the configuration settings for the Vagrant box, such as the box name, box URL, network settings, synced folders, provisioners, etc. The command vagrant init does not execute any provisioning tool, start any box, install Vagrant on a Linux host, or download any box. Those actions are performed by other Vagrant commands, such as vagrant provision, vagrant up, vagrant install, and vagrant box add, respectively.
Reference: 1: vagrant init – Command-Line Interface | Vagrant | HashiCorp Developer
What is oVirt?
- A . An extension to the Linux Kernel used to provide container virtualization similar to LXC and OpenVZ
- B . A comprehensive management infrastructure for Linux-based virtualization
- C . An approach used to eliminate the need for virtualization called Zero-Virt
- D . A Linux-based hypervisor similar to KVM and Xen
- E . A library that provides access to several different virtualization technologies in a common manner
B
Explanation:
oVirt is an open-source virtualization management platform that provides a comprehensive infrastructure for managing Linux-based virtualization environments. According to official oVirt and Red Hat documentation, oVirt acts as a management layer on top of KVM, offering centralized control over hosts, virtual machines, storage, and networking.
oVirt itself is not a hypervisor; instead, it relies on KVM as the underlying virtualization technology. It provides both a web-based management interface and REST APIs, enabling administrators to manage large-scale virtualization deployments efficiently. Features include VM lifecycle management, live migration, high availability, storage domain management, and integration with directory services.
Option E describes libvirt, not oVirt. Options A, C, and D do not match oVirt’s documented purpose.
Therefore, the correct answer is B.
What is the primary advantage of container virtualization compared to traditional virtualization?
- A . Lower resource utilization
- B . Faster startup times
- C . Greater hardware compatibility
- D . Improved isolation between applications
B
Explanation:
The primary advantage of container virtualization is faster startup times. Containers share the host OS kernel and do not require booting a full guest operating system, allowing them to start in seconds or milliseconds.
While containers also use fewer resources, the most commonly cited primary benefit in documentation is rapid startup and scalability, making B the correct answer.
What is the typical format for cloud-init configuration files?
- A . .xml
- B . .json
- C . .ini
- D . .yaml
D
Explanation:
Cloud-init configuration files are typically written in YAML (Yet Another Markup Language) format. Official cloud-init documentation specifies that cloud-config files use YAML syntax, which is human-readable and well suited for declarative configuration.
YAML files allow administrators to define users, packages, services, networking, and commands in a structured and consistent way. While cloud-init can process shell scripts and MIME multipart data, YAML remains the standard and recommended format.
Thus, the correct answer is D.
