How is cloud-init integrated with a managed system image?
D
Which of the following sections must exist in a Packer template?
B
What must be the first line of a plain text user-data configuration containing YAML configuration for
cloud-init?
A. cloud-config:
B. --- cloud-config
C. #!/usr/bin/cloud-init
D. [cloud-config]
E. #cloud-config
E
Reference
//cloudinit.readthedocs.io/en/latest/topics/examples.html
How does Vagrant run virtual machines?
D
Which security issues exist for most publicly available Vagrant boxes? (Choose three correct
answers.)
A. They accept SSH logins from the user vagrant with the password vagrant.
B. They accept SSH logins from the user vagrant with a publicly available SSH key pair.
C. The vagrant user can use sudo to obtain root privileges without additional authentication.
D. Their whole file system, including configuration files, is writable by any user, including vagrant.
E. They export their file system via NFS with full write permissions without any additional
restrictions.
A,B,C
Reference
//www.vagrantup.com/docs/boxes/base.html
What does the command packer validate template.json do?
A. The command verifies that the latest build of the template can be run without downloading
additional images or artifacts.
B. The command verifies that the file template.json is a syntactically correct and complete Packer
template.
C. The command verifies that all existing artifacts generated by template.json have their original
checksums.
D. The command verifies that all source images referenced in template.json are available and have
valid cryptographic signatures.
E. The command verifies that images generated previously by template.json still use the most recent
source images.
B
Reference
//www.packer.io/docs/commands/validate.html
Which of the following statements is true about load balancers?
B
A service should be provided to arbitrary clients on the Internet using HTTPS. Any standard client on
the Internet should be able to consume the service without further configuration. Which of the
following approaches can be used to implement these requirements? (Choose three correct
answers.)
B,C,D
How does Prometheus gather information about monitored hosts and services?
A. It implements the ICMP and SNMP protocols to ping and query remote services.
B. It opens a webhook where monitored applications have to submit various metrics.
C. It uses HTTP to retrieve JSON encoded metrics from the monitored objects.
D. It queries a relational database for metrics written to the database by monitored applications.
E. It runs scripts on the Prometheus server which perform tests and return various metrics.
E
Reference
//dzone.com/articles/monitoring-with-prometheus
Which sections can exist in a Logstash configuration file? (Choose three correct answers.)
A. output
B. filter
C. input
D. forward
E. generate
A,B,C
Reference
//www.elastic.co/guide/en/logstash/current/configuration-file-structure.html
A recently installed application writes log data to /opt/app/log/info.log. If Filebeat is already
installed and set up for communication with a remote Logstash, what has to be done in order to
submit the log data of the new application to Logstash?
E
Which of the log messages below matches the following Logstash grok filter?
grok {
match => [message, %{SYSLOGBASE} new node %{IPORHOST:node} ]
}
C
Which section of the Prometheus configuration defines which nodes are monitored?
A. scrape_config
B. targets
C. rules
D. listener
E. nodes
A
A Dockerfile contains the statements:
COPY data/ /data/
VOLUME /data
What happens when the resulting container is started without any additional volume configuration?
(Choose two correct answers.)
C,E
Consider the following Kubernetes Deployment:
With the ReplicaSet:
And the Pods:
What happens if one of the Pods is terminated with the command kubect1 pod delete?
B
cloud-init provides the cloud-init-daemon service which is launched during startup and keeps the instance in sync with the desired configuration.