<< Prev Question Next Question >>

Question 8/28

A clone of a previously used virtual machine should be created. All VM specific information, such as user accounts, shell histories and SSH host keys should be removed from the cloned disk image. Which of the following tools can perform these tasks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (28q)
Question 1: What is true aboutcontainerd?
Question 2: Which of the following resources can be limited by libvirt f...
Question 3: Which CPU flag indicates the hardware virtualization capabil...
Question 4: Which of the following resources can be limited by libvirt f...
Question 5: Which directory is used bycloud-initto store status informat...
Question 6: Which of the following statements are true about container-b...
Question 7: Which of the following statements are true about sparse imag...
Question 8: A clone of a previously used virtual machine should be creat...
Question 9: Which of the following commands boots a QEMU virtual machine...
Question 10: Which of the following values are valid in the type attribut...
Question 11: What kind of virtualization is implemented by LXC?...
Question 12: Which command within virsh lists the virtual machines that a...
Question 13: Which of the following statements are true regarding resourc...
Question 14: Which of the following types of guest systems does Xen suppo...
Question 15: After setting up a data container using the following comman...
Question 16: Virtualization of which hardware component is facilitated by...
Question 17: Which of the following commands deletes all volumes which ar...
Question 18: What is the purpose of the packer inspect subcommand?...
Question 19: Ifdocker stackis to be used to run a Docker Compose file on ...
Question 20: What happens when the following command is executed twice in...
Question 21: Which file format is used by libvirt to store configuration ...
Question 22: FILL BLANK What command is used to run a process in a new Li...
Question 23: Which of the following values are valid in thefirmwareattrib...
Question 24: After creating a new Docker network using the following comm...
Question 25: What is the purpose of capabilities in the context of contai...
Question 26: Which of the following statements about the commandlxc-check...
Question 27: Which of the following tasks are part of a hypervisor's resp...
Question 28: Which statement is true regarding the Linux kernel module th...