LPI Level 1 Exam 101 - Junior Level Linux Certification - Part 1 of 2
LPI Level 1 Exam 102 - Junior Level Linux Certification - Part 2 of 2
LPIC-3 Exam 303: Security - 2.0
Linux Essentials Certificate Exam - version 1.5
LPIC-2 Exam 201, Part 1 of 2, version 4.5
LPIC-2 - Exam 202 (part 2 of 2), version 4.5
Linux Essentials Certificate Exam - version 1.6
LPIC-1 Exam 101, Part 1 of 2, version 5.0
LPIC-1 Exam 102, Part 2 of 2, version 5.0
Linux Professional Institute BSD Specialist
Which of the following statements regarding microservices are true? (Choose three correct answers.)
Microservices facilitate the replacement of the implementation of a specific functionality.
Microservices applications are hard to scale because microservice architecture allow only one instance of each microservice.
Integration tests for microservices are not possible until all microservices forming a specific application are completely developed.
Interaction between microservices can be slower that the interaction of similar components within a monolithic application.
Within one application, individual microservices can be updated and redeployed independent of the remaining microservices.
How does Vagrant run virtual machines?
Vagrant uses a vagrant-specific hypervisor called VagrantVM.
Vagrant has to be run within a running virtual machine which is not controlled by Vagrant.
Vagrant ships with an embedded version of VirtualBox.
Vagrant uses so-called provides which control external hypervisors such as VirtualBox.
Vagrant generates virtual machine images but does not provide a mechanism to run them.
How is a Docker container image retrieved from a Docker registry?
Docker retrieves a ZIP archive which is extracted into the container’s root file system.
Multiple stacked images are retrieved and layered on top of each other.
A flat hard disk image is downloaded once per container and mounted as the root file system.
The registry merger all components of the image into one file which is shipped to Docker.
The container is built from an ISO file along with a configuration for an unattended installation.
Reference