Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

701-100 LPI DevOps Tools Engineer Free Practice Exam Questions (2025 Updated)

Prepare effectively for your LPI 701-100 DevOps Tools Engineer certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Which Ansible command is used to manage and store sensitive data in encrypted files? (Specify ONLY the command without any path or parameters.)

If a Dockerfile references the container’s base image without a specific version tag, which tag of that image is used to create the container?

A.

latest

B.

default

C.

current

D.

nightly

E.

lts

Which of the following statements regarding microservices are true? (Choose three correct answers.)

A.

Microservices facilitate the replacement of the implementation of a specific functionality.

B.

Microservices applications are hard to scale because microservice architecture allow only one instance of each microservice.

C.

Integration tests for microservices are not possible until all microservices forming a specific application are completely developed.

D.

Interaction between microservices can be slower that the interaction of similar components within a monolithic application.

E.

Within one application, individual microservices can be updated and redeployed independent of the remaining microservices.

A recently installed application writes log data to /opt/app/log/info.log. If Filebeat is already installed and set up for communication with a remote Logstash, what has to be done in order to submit the log data of the new application to Logstash?

A.

Add an additional input channel with the option source => “/opt/app/log/info.log” to the Logstash configuration.

B.

Configure logrotate to execute filebeat –I /opt/app/log/info.log 0 after each rotation of /opt/app/log/info.log.

C.

Add the log file to the path option within the log prospector in the Filebeat configuration and restart Filebeat.

D.

Add a new cron job that invokes filebeat –i /opt/app/log/info.log periodically.

E.

Replace /opt/app/log/info.log by a symbolic link to /dev/filebeat and restart the new application.

Which of the following container names could have been assigned automatically by Docker?

A.

docker-c00001

B.

2.0.17.172

C.

container

D.

c0023817

E.

clever_ritchie

Which statements are true regarding databases during the deployment of a new release of a service using canary deployment? (Choose two correct answers.)

A.

Changes to the database schema can take long and reduce the database performance.

B.

Traffic to the database will significantly increase because of the additional service instance.

C.

The database schema must be compatible to all running versions of a service.

D.

The database is locked while its content is copied to the canary database.

E.

Canary deployments require two synchronized instances of each database.

Which of the following Ansible tasks copies the file example.txt to a manage system?

A.

– rsync:src: example.txtdst: /tmp/example.txt

B.

– copy:src: example.txtdest: /tmp/example.txt

C.

– retrieve:src: example.txtdest: /tmp/example.txt

D.

- cp:source: example.txtdst: /tmp/example.txt

E.

- transfer:src: example.txtdest: /tmp/example.txt

A Dockerfile contains the statements:

COPY data/ /data/

VOLUME /data

What happens when the resulting container is started without any additional volume configuration? (Choose two correct answers.)

A.

Files existing in /data/ in the image are not available in the running container.

B.

Changes to files within /data/ affect the Docker image and all other containers derived from it.

C.

Existing files from /data/ in the image are copied to the new volume.

D.

An error is raised because /data/ already contains data when the volume is mounted.

E.

A new volume is created and mounted to /data/ within the new container.

Which Ansible modules can be used to change the contents of a file? (Choose three correct answers.)

A.

lineinfile

B.

replace

C.

patch

D.

insert

E.

modify

Which of the following goals are favored by agile software development methodologies? (Choose two correct answers.)

A.

Self-organization of teams.

B.

Central governance and control.

C.

Flexibility of processes.

D.

Absolute planning adherence.

E.

Long-term release and feature management.

Which of the following mechanisms are used for service discovery in a container environment? (Choose two correct answers.)

A.

The container platform offers a command like docker service discover which should be run within a container.

B.

The container platform sets environment variables containing service information within the containers.

C.

The container platform lists localhost ports assigned to containers in each container’s /etc/services file.

D.

The container platform mounts the sockets for all available services into the container’s file systems.

E.

The container platforms maintains DNS records which point to containers offering a specific service.

Consider the following Kubernetes Deployment:

With the ReplicaSet:

And the Pods:

What happens if one of the Pods is terminated with the command kubect1 pod delete?

A.

The remaining Pods are stopped and the Deployment switches to the state Failed.

B.

The number of replicas in the ReplicaSet is changed to 4.

C.

The ReplicaSet immediately starts a new replacement Pod.

D.

The remaining Pods are stopped and a new ReplicaSet is started.

E.

The Deployment switches to the state Degraded.

Which of the following statements describes the principal concept behind test driven development?

A.

Tests may not be written by the same development team that wrote the tested code.

B.

All tests are generated automatically from the tested source code.

C.

Tests are written before the function / method is implemented.

D.

The only acceptable reason to write a test is to prevent fixed bugs from occurring again.

E.

Instead of testing software automatically, manual tests are performed and logged daily.

The following command is issued on two docker nodes:

docker network create --driver bridge isolated_nw

Afterwards, one container is started at each node with the parameter --network=isolated_nw. It turns out that the containers can not interact with each other. What must be done in order to allow the containers to interact with each other? (Choose two correct answers.)

A.

Use a host network instead of a bridged network.

B.

Add the option --inter-container to the docker network create command.

C.

Start the containers on the same node.

D.

Change the --network parameter of docker create to --network=isolated_nw,nofence.

E.

Use an overlay network instead of a bridged network.

Which of the following statements are true about Jenkins? (Choose two correct answers.)

A.

Jenkins is specific to Java based applications.

B.

Jenkins can delegate tasks to slave nodes.

C.

Jenkins only works on local files and cannot use SCM repositories.

D.

Jenkins’ functionality is determined by plugins.

E.

Jenkins includes a series of integrated testing suites.

What is the Puppet equivalent to an Ansible Playbook called?

A.

A Puppet Catalog

B.

A Puppet Playbook

C.

A Puppet Factsheet

D.

A Puppet Declaration

E.

A Puppet Manifest

Which configuration option in the Ansible inventory is issued control privilege escalation of the remote user?

A.

priv_user

B.

elevate

C.

super

D.

become

E.

sudo

What does the command packer validate template.json do?

A.

The command verifies that the latest build of the template can be run without downloading additional images or artifacts.

B.

The command verifies that the file template.json is a syntactically correct and complete Packer template.

C.

The command verifies that all existing artifacts generated by template.json have their original checksums.

D.

The command verifies that all source images referenced in template.json are available and have valid cryptographic signatures.

E.

The command verifies that images generated previously by template.json still use the most recent source images.

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved