Red Hat Certification

EX374 — OpenStack Administrator Study Guide

60 practice questions with correct answers and detailed explanations. Use this guide to review concepts before taking the practice exam.

▶ Take Practice Exam 60 questions  ·  Free  ·  No registration

About the EX374 Exam

The Red Hat OpenStack Administrator (EX374) certification validates professional expertise in Red Hat technologies. This study guide covers all 60 practice questions from our EX374 practice test, complete with correct answers and explanations to help you understand each concept thoroughly.

Review each question and explanation below, then test yourself with the full interactive practice exam to measure your readiness.

60 Practice Questions & Answers

Q1 Medium

When configuring Cinder volume backend storage, which parameter defines the physical location where volumes are stored?

  • A volume_backend_device
  • B volume_driver
  • C volume_backend_name ✓ Correct
  • D backends
Explanation

The volume_backend_name parameter specifies the logical name of a storage backend, which identifies where volumes will be created and stored. This is essential for multi-backend Cinder deployments.

Q2 Medium

Which OpenStack service is responsible for managing container orchestration and lifecycle?

  • A Sahara
  • B Trove
  • C Zaqar
  • D Magnum ✓ Correct
Explanation

Magnum is the OpenStack service that manages Kubernetes and other container orchestration engines as first-class resources. The other services handle messaging, data processing, and database services respectively.

Q3 Medium

In Keystone, what is the primary purpose of using application credentials instead of user passwords?

  • A To store passwords in a more secure database location
  • B To enable long-lived API access with limited scope without exposing user credentials ✓ Correct
  • C To increase the password complexity requirements for all users
  • D To eliminate the need for token expiration in OpenStack deployments
Explanation

Application credentials provide a secure alternative for API access with restricted permissions and optional expiration dates, reducing the exposure of user passwords while maintaining security boundaries.

Q4 Easy

Which command-line tool is used to manage Glance image properties and metadata?

  • A glance image-update
  • B nova image-property-set
  • C openstack image set ✓ Correct
  • D cinder metadata-set
Explanation

The OpenStack CLI unified command 'openstack image set' is the standard way to modify Glance image properties and metadata. While legacy tools like glance CLI exist, the openstack CLI is the recommended approach.

Q5 Hard

When setting up Nova's PCI passthrough, what is the critical first step in the compute node configuration?

  • A Launch instances with the --pci-device-id flag
  • B Configure neutron to recognize PCI hardware addresses in network settings
  • C Create a PCI alias in nova.conf pointing to the device UUID
  • D Enable IOMMU in BIOS and kernel parameters, then identify and whitelist PCI devices ✓ Correct
Explanation

PCI passthrough requires IOMMU (Input/Output Memory Management Unit) to be enabled in the system BIOS and kernel, followed by device identification and whitelisting in Nova configuration. This is the prerequisite before any instance configuration.

Q6 Hard

What is the recommended approach for updating Nova compute nodes in a production environment without service interruption?

  • A Update Nova API first, then sequentially update compute nodes with service restart
  • B Use nova-manage cell_v2 discover_hosts followed by rolling updates with evacuation ✓ Correct
  • C Execute nova service-restart on all compute nodes in parallel with the conductor running
  • D Disable all instances, update all compute nodes simultaneously, then restart instances
Explanation

Rolling updates with instance evacuation on each compute node minimizes service disruption. The nova-manage command registers new hosts with the cell, and instances are migrated away before updates occur.

Q7 Medium

In Neutron, which mechanism allows you to isolate tenant traffic using VLAN tagging on a physical network?

  • A Flat network type with segmentation ID configuration
  • B VLAN network type with network_vlan_ranges configuration ✓ Correct
  • C VxLAN network type with vni assignment
  • D GRE tunnel network type with tunnel ID ranges
Explanation

VLAN network type with properly configured network_vlan_ranges in the ML2 plugin enables tenant isolation using 802.1q VLAN tagging on physical network interfaces. Flat networks don't support tagging, while VxLAN and GRE are overlay technologies.

Q8 Medium

When configuring Cinder backup, what must be verified to ensure proper functionality with a Swift backend?

  • A All Cinder volumes must be in 'available' state before backup can be initiated
  • B The backup_swift_url parameter matches exactly with the Swift endpoint URL
  • C Backup scheduling must be configured in cron jobs on all Cinder services
  • D Swift credentials are configured and Cinder service has appropriate permissions to create containers ✓ Correct
Explanation

For Swift-backed Cinder backups, proper credentials must be configured and the Cinder service account requires permissions to create and manage Swift containers. The other options are either false or not specific requirements for Swift backup functionality.

Q9 Easy

Which Heat parameter type is used for complex data structures with multiple properties and validation rules?

  • A json ✓ Correct
  • B map
  • C string
  • D object with constraints
Explanation

The 'json' parameter type in Heat allows you to define complex data structures with nested properties, providing validation capabilities for structured data. This is more appropriate than simple string types for complex configurations.

Q10 Medium

In Ironic, what is the significance of configuring the 'ipmi_address' parameter in node driver data?

  • A It sets the DHCP server address that will provision the bare metal node
  • B It specifies the network address for the node's BMC (Baseboard Management Controller) for out-of-band management ✓ Correct
  • C It defines the primary IP address assigned to the node's operating system network interface
  • D It configures the storage network address for IPMI log collection across the cluster
Explanation

The ipmi_address in Ironic node driver data specifies the BMC network address, allowing out-of-band management and control of the physical server independent of the operating system.

Q11 Medium

When troubleshooting Horizon dashboard performance issues, which log file should be examined first?

  • A /var/log/keystone/keystone.log
  • B /var/log/nova/nova-api.log
  • C /var/log/apache2/error.log (or httpd error log depending on distribution) ✓ Correct
  • D /var/log/horizon/dashboard.log
Explanation

The Apache/httpd error log contains Horizon's application errors and performance issues since Horizon runs as a web application served by Apache. While other logs provide context, the web server log is the primary source for Horizon-specific issues.

Q12 Easy

Which network plugin configuration in Neutron allows for provider network creation without VLAN or overlay segmentation?

  • A Shared networks with admin privileges only
  • B Port security networks with MAC filtering
  • C Flat provider networks with no segmentation ID ✓ Correct
  • D External networks with gateway routing enabled
Explanation

Flat provider networks allow network creation using a single physical interface without any segmentation mechanism, useful for direct layer-2 connectivity. This differs from segmented approaches like VLANs or overlays.

Q13 Hard

In Nova, what happens when an instance is in 'STOPPED' state versus 'SHELVED' state?

  • A STOPPED keeps instance files on disk; SHELVED moves files to Glance and deallocates compute resources ✓ Correct
  • B Both states are identical and used interchangeably in Nova terminology
  • C STOPPED is a transient state; SHELVED is a permanent state requiring image export
  • D STOPPED deallocates all resources; SHELVED keeps minimal resources allocated on hypervisor
Explanation

STOPPED keeps instance data and resources allocated on the compute node, while SHELVED (shelve-offload) moves the instance to Glance and deallocates compute resources, useful for long-term pause scenarios and resource optimization.

Q14 Easy

Which Glance setting determines the maximum size of images that can be uploaded to the service?

  • A image_member_quota limit setting
  • B image_size_cap in glance-api.conf ✓ Correct
  • C image_location_quota_size parameter
  • D max_image_upload_size configuration parameter
Explanation

The image_size_cap setting in glance-api.conf specifies the maximum allowed image size in bytes. This prevents extremely large uploads from consuming excessive resources.

Q15 Hard

When configuring Cinder volume encryption, which component performs the actual encryption of data?

  • A The encryption key manager (Barbican) with the volume backend driver ✓ Correct
  • B The Glance image service during volume snapshot creation
  • C The Nova compute service on the client side only
  • D The network layer through Neutron security groups
Explanation

Cinder volume encryption involves Barbican (key manager) for key management and the Cinder volume driver for actual encryption operations at the storage layer, creating encrypted volumes at rest.

Q16 Medium

Which command correctly evacuates instances from a Nova compute node during maintenance?

  • A openstack compute service set source-host nova-compute --disable
  • B nova evacuate instance-id target-host --force
  • C openstack server evacuate --host=target-host source-host instances ✓ Correct
  • D nova-manage compute migrate_vm source-host target-host
Explanation

The 'openstack server evacuate' command is the proper way to move instances from a source compute host to another host, with proper syntax for specifying target and source hosts. Option B uses deprecated nova CLI.

Q17 Hard

In Keystone, what is the difference between implicit and explicit role inheritance?

  • A Implicit inheritance requires manual role propagation; explicit inheritance is automatic through role hierarchy configuration ✓ Correct
  • B Implicit inheritance is deprecated; explicit inheritance is the only supported method
  • C Both terms are synonymous and used interchangeably in Keystone documentation
  • D Implicit inheritance applies globally; explicit inheritance applies only to specific projects
Explanation

Explicit role inheritance uses Keystone's role hierarchy configuration to automatically grant child roles when parent roles are assigned. Implicit inheritance does not provide this automatic mechanism.

Q18 Medium

Which Neutron component is responsible for managing the actual configuration of network devices on compute nodes?

  • A Neutron DHCP agent for all network configuration
  • B Neutron server with ML2 plugin
  • C Neutron L2 agent (e.g., openvswitch-agent or linuxbridge-agent) ✓ Correct
  • D Nova network metadata service
Explanation

The Neutron L2 agent running on compute nodes configures the actual network devices (bridges, ports, VLANs) on the hypervisor based on Neutron server directives.

Q19 Hard

When using Placement API for scheduling, what does the 'generation' field in a resource provider represent?

  • A The number of virtual machines running on that resource provider
  • B The NUMA generation supported by the processor
  • C The hardware generation model of the physical server
  • D A version number that changes when resource provider data is modified ✓ Correct
Explanation

The generation field is a version counter in the Placement API that changes whenever resource provider data (like traits or resource classes) is modified, preventing concurrent update conflicts.

Q20 Medium

What is the primary function of the Nova conductor service in an OpenStack deployment?

  • A Run database operations and filter/weigh scheduler decisions to improve performance and security ✓ Correct
  • B Maintain persistent connections to all hypervisors for real-time monitoring
  • C Handle all incoming API requests from users
  • D Directly manage VM instance lifecycle on compute nodes
Explanation

The Nova conductor performs database operations and acts as an intermediary for scheduler decisions, reducing the database load on compute nodes and enhancing security by preventing direct database access from compute services.

Q21 Hard

In a multi-region OpenStack deployment, which Keystone component must be synchronized across regions?

  • A Keystone tokens must be generated in the primary region and propagated to secondary regions
  • B The identity backend (LDAP/SQL) for user and project data, while tokens are region-specific ✓ Correct
  • C Only the token validation cache needs synchronization; identities are always local
  • D All service catalogs must be identical across every region's Keystone instance
Explanation

In multi-region deployments, the identity backend (users, projects, roles) must be synchronized or shared across regions, but tokens and service catalogs can be region-specific to reflect local services.

Q22 Easy

Which tool is used to validate and troubleshoot OpenStack configuration files syntax before deployment?

  • A Ansible playbook syntax checking with --syntax-check
  • B openstack-config-validator or manual validation with configuration file parsers ✓ Correct
  • C The openstack CLI with the --validate-config flag
  • D Python's configparser module directly without additional tools
Explanation

While openstack-config-validator exists for some validations, configuration syntax is typically validated through direct parsing and error messages during service startup. The openstack CLI and Ansible are not configuration validators.

Q23 Hard

When setting up volume snapshots in Cinder, what consideration must be made for encrypted volumes?

  • A The Glance service automatically handles snapshot encryption independently
  • B Encrypted volumes cannot be snapshotted and require volume cloning instead
  • C Snapshots must be encrypted with a different key than the source volume
  • D Snapshots inherit the encryption settings from the source volume; decryption keys must remain accessible ✓ Correct
Explanation

Snapshots of encrypted volumes inherit the encryption configuration, and the encryption key must remain available for both snapshot creation and restoration. The snapshot maintains the same encryption properties as the source.

Q24 Medium

Which Horizon setting enables you to customize the dashboard's appearance and branding for different organizations?

  • A LOCAL_SETTINGS.py with custom CSS and logo configuration in HORIZON_CONFIG dictionary ✓ Correct
  • B Keystone domain-specific configurations that apply styling per domain
  • C The dashboard_branding.conf file in /etc/openstack-dashboard/
  • D Nova image metadata tags that control Horizon visual themes automatically
Explanation

Horizon customization is done through LOCAL_SETTINGS.py where you can configure HORIZON_CONFIG dictionary with custom logos, CSS, and branding options for different organizations.

Q25 Medium

In Ironic, what is the purpose of the 'power state' field versus the 'provisioning state' field?

  • A Power state manages hypervisor power; provisioning state manages storage allocation
  • B Power state is for the BMC controller; provisioning state is for the operating system kernel
  • C Both fields serve the same purpose and can be used interchangeably
  • D Power state indicates hardware power status; provisioning state indicates the OS deployment progress ✓ Correct
Explanation

In Ironic, power state represents the actual hardware power status (on/off), while provisioning state tracks the deployment lifecycle (active, deploying, deployed, error), providing distinct visibility into hardware and software state.

Q26 Medium

You need to create a new project in OpenStack with specific resource quotas. Which command-line tool would you use to manage project creation and quota assignment?

  • A horizon dashboard only, CLI tools cannot set quotas
  • B keystone tenant-create with glance quota-manage
  • C nova project-create followed by cinder quota-update
  • D openstack project create with openstack quota set ✓ Correct
Explanation

The openstack project create command creates projects, and openstack quota set configures resource limits. These are the modern, unified OpenStack CLI tools for this task.

Q27 Medium

An instance is in an ERROR state and needs to be recovered. What is the first diagnostic step you should take?

  • A Check the instance console log and nova-compute logs for error messages ✓ Correct
  • B Migrate the instance to another compute node
  • C Delete the instance and launch a new one
  • D Immediately hard reboot the instance
Explanation

Checking console logs and nova-compute logs provides the root cause of the error state, allowing for targeted troubleshooting rather than destructive actions.

Q28 Hard

You are configuring Neutron with ML2 plugin. Which of the following correctly describes the role of mechanism drivers?

  • A Mechanism drivers handle authentication and authorization for network API requests
  • B Mechanism drivers manage the core network segmentation and VLAN assignment at the database level
  • C Mechanism drivers implement the actual configuration on networking hardware and virtual switching infrastructure ✓ Correct
  • D Mechanism drivers filter incoming network traffic and enforce security policies on the control plane
Explanation

Mechanism drivers are responsible for translating logical network configurations into actual device configurations on switches, hypervisors, and other network infrastructure.

Q29 Medium

When configuring Cinder for multi-backend support, how do you specify which backend a volume should be created on?

  • A Through the scheduler_default_filters configuration option
  • B By setting the default_volume_backend parameter in cinder.conf
  • C Using the --backend flag when running cinder volume-create
  • D Through the volume_backend_name in the volume type extra specs ✓ Correct
Explanation

The volume_backend_name property in volume type extra specs is the standard way to direct volume creation to a specific backend in a multi-backend Cinder deployment.

Q30 Medium

Your OpenStack deployment experiences intermittent connectivity issues between instances on different compute nodes. What is the most likely cause?

  • A The nova-conductor service is overloaded
  • B The Glance image cache is full
  • C Insufficient RAM allocated to instances
  • D Network connectivity or VXLAN/tunnel configuration issues between compute nodes and network nodes ✓ Correct
Explanation

Inter-node instance connectivity depends on proper overlay network configuration (VXLAN tunnels) and network node connectivity; issues here directly cause intermittent cross-node communication problems.

Q31 Medium

Which of the following statements about OpenStack role-based access control (RBAC) is correct?

  • A All users in a project automatically have admin role permissions for that project
  • B A user can be assigned different roles in different projects or domains ✓ Correct
  • C Roles are defined globally and cannot be customized per project
  • D The member role has the same permissions as the admin role but with read-only access
Explanation

Keystone supports flexible role assignment where users can have different roles across different projects and domains, allowing fine-grained access control.

Q32 Easy

You need to migrate a running instance from one compute node to another with zero downtime. Which migration method should you use?

  • A Snapshot and restore, which captures the instance state and rebuilds it
  • B Live migration, which keeps the instance running throughout the migration process ✓ Correct
  • C Cold migration, which pauses the instance briefly during transfer
  • D Evacuation, which terminates and restarts the instance on the target node
Explanation

Live migration (also called true migration) maintains instance uptime by transferring memory and disk state while the instance continues running, ensuring zero-downtime migration.

Q33 Medium

In Keystone, what is the primary purpose of a domain?

  • A To configure SSL certificates and TLS encryption for API endpoints
  • B To create an isolated namespace for projects, users, and roles with separate authentication ✓ Correct
  • C To manage compute resource allocation and scheduling policies
  • D To define network subnets and routing policies for instances
Explanation

Domains in Keystone provide administrative isolation and separate authentication namespaces, allowing multiple independent project hierarchies within a single OpenStack deployment.

Q34 Hard

What is the correct order of operations for safely shutting down a compute node in OpenStack?

  • A Remove the node from the availability zone, wait 30 minutes, then shut down services
  • B Shut down all instances, then stop the nova-compute service
  • C Disable the node, migrate or evacuate instances, stop nova-compute, perform maintenance ✓ Correct
  • D Stop nova-compute immediately, then manually migrate all instances
Explanation

The correct procedure is to disable the node first (preventing new instance scheduling), then migrate running instances away, and finally stop services to ensure a clean shutdown.

Q35 Hard

You are configuring Swift for a highly available deployment. Which component is responsible for ensuring data replication across multiple servers?

  • A The Ring and the Replicator daemon ✓ Correct
  • B The Container Server only
  • C The Dispatcher service with load balancing configuration
  • D The Swift Proxy Server
Explanation

The Ring defines data placement across the cluster, and the Replicator daemon actively maintains replicas by copying objects across devices and servers to maintain the desired replication factor.

Q36 Easy

An image in Glance is marked as 'protected'. What is the primary effect of this setting?

  • A The image is encrypted and requires a password to access
  • B The image cannot be downloaded or used to launch instances
  • C The image is read-only and cannot be modified by any user
  • D The image cannot be deleted unless the protected flag is removed ✓ Correct
Explanation

The protected flag in Glance prevents accidental deletion of critical images; the image remains fully usable but cannot be deleted while the flag is active.

Q37 Medium

When configuring Nova with placement service, what is the primary function of placement?

  • A To encrypt instance data at rest using encryption keys
  • B To track resource inventory and make scheduling decisions based on available resources ✓ Correct
  • C To monitor instance performance metrics and health status
  • D To manage instance networking and assign IP addresses dynamically
Explanation

The Placement service maintains real-time inventory of compute resources and helps Nova's scheduler make intelligent decisions about instance placement based on available resources.

Q38 Medium

Your organization requires that all block storage volumes be encrypted. Where should this be configured?

  • A In the volume type definition with encryption settings and key manager configuration ✓ Correct
  • B At the hypervisor level in libvirt configuration files
  • C In Horizon dashboard under Project Settings > Storage Encryption
  • D In the instance launch parameters using the --encrypted flag
Explanation

Volume encryption is configured through volume type definitions in Cinder, specifying the encryption algorithm and integration with a key manager like Barbican.

Q39 Easy

What is the relationship between Nova flavors and compute node resources?

  • A Flavors specify instance resource requests that must fit within available compute node resources ✓ Correct
  • B Flavors automatically scale compute node resources when instances exceed flavor specifications
  • C Flavors are purely cosmetic and do not affect resource allocation
  • D Flavors define guaranteed resource allocations that supersede actual physical resources
Explanation

Flavors define vCPU, memory, and disk requirements for instances; the scheduler uses these specifications to ensure instances are placed on compute nodes with sufficient resources.

Q40 Hard

In an OpenStack deployment with multiple regions, how are user credentials and authentication shared across regions?

  • A A centralized Keystone service issues tokens that are valid across all regions ✓ Correct
  • B Users must re-authenticate separately for each region they access
  • C Regions use federated identity with SAML or OpenID Connect
  • D Each region maintains separate Keystone deployments with replicated user databases
Explanation

In a multi-region deployment, a centralized Keystone issues tokens with cross-region validity, allowing users to access resources across regions with a single authentication.

Q41 Medium

When configuring Neutron security groups, which direction of traffic does a security group rule control by default?

  • A Only ingress traffic; egress is controlled separately ✓ Correct
  • B Neither, security groups only control east-west traffic between instances
  • C Both ingress and egress traffic in a single rule
  • D Only egress traffic; ingress requires network ACLs
Explanation

Security group rules explicitly control either ingress or egress traffic; each rule specifies its direction, and default behavior typically denies all traffic unless explicitly allowed.

Q42 Hard

You need to reclaim disk space from a Cinder volume that has been deleted. What operation should be performed on the underlying storage backend?

  • A Run the cinder-manage volume purge command
  • B Execute filesystem garbage collection and TRIM/UNMAP commands on the storage ✓ Correct
  • C Manually delete volume files using SSH access to the storage controller
  • D Restart the cinder-volume service to clear the cache
Explanation

After volume deletion, filesystem-level operations like TRIM/UNMAP commands inform the storage that blocks are no longer in use, allowing the backend to reclaim space.

Q43 Easy

What is the primary advantage of using Heat orchestration templates in OpenStack?

  • A To bypass Keystone authentication for faster resource provisioning
  • B To define and provision complete infrastructure stacks as code with version control ✓ Correct
  • C To graphically design instance networks without writing code
  • D To automatically encrypt all resources created by the template
Explanation

Heat templates enable infrastructure-as-code, allowing complex multi-resource applications to be defined declaratively, version controlled, and repeatedly deployed consistently.

Q44 Hard

In a Neutron deployment using DVR (Distributed Virtual Routing), where does routing occur for instances?

  • A Routing is determined by external hardware switches and cannot be modified
  • B All routing is centralized on the network node controller
  • C Routing occurs on each compute node where instances are running, with only centralized SNAT ✓ Correct
  • D Each instance performs its own routing using internal virtual routing software
Explanation

DVR distributes routing to compute nodes for improved scalability and performance; the network node handles only SNAT for external traffic, reducing a critical bottleneck.

Q45 Easy

Which service is responsible for managing and provisioning bare metal nodes in OpenStack?

  • A Ironic ✓ Correct
  • B Magnum
  • C Glance
  • D Senlin
Explanation

Ironic is the OpenStack service dedicated to provisioning and managing bare metal servers, providing PXE boot, hardware inventory, and lifecycle management.

Q46 Medium

When backing up OpenStack metadata, which database contains the most critical information that should be protected?

  • A The Glance image cache database
  • B The MariaDB/MySQL database used by Keystone, Nova, Neutron, and Cinder ✓ Correct
  • C The Swift container metadata database
  • D The Placement service SQLite database
Explanation

The central relational database stores all OpenStack service metadata including authentication, projects, instances, networks, and volumes; its loss would be catastrophic.

Q47 Medium

You are troubleshooting a port that appears to be down in Neutron. What is the first command to check the port status and details?

  • A neutron port-show <port-id>
  • B openstack port show <port-id> ✓ Correct
  • C ovs-vsctl get Interface <port-id> status
  • D ip link show <port-name>
Explanation

The openstack port show command (modern CLI) retrieves comprehensive port status and configuration details from Neutron, making it the first diagnostic step.

Q48 Medium

In OpenStack, what is the purpose of availability zones in Nova?

  • A To enforce network isolation between different user projects
  • B To define different SLA levels for instance availability guarantees
  • C To separate different cloud providers within a single OpenStack deployment
  • D To group compute nodes for redundancy and allow instance placement across failure domains ✓ Correct
Explanation

Availability zones group compute nodes (typically by physical location or failure domain), allowing users to distribute instances across zones to improve fault tolerance.

Q49 Hard

A user reports that they cannot create a snapshot of a running instance. What is the most likely cause?

  • A The user lacks the member role in the project containing the instance
  • B The volume_backend_name is not configured in the instance flavor
  • C The instance has insufficient available disk space in its root volume
  • D The instance is using a file-based image format that does not support live snapshots ✓ Correct
Explanation

Live snapshots of running instances may fail if the backing image uses formats that don't support consistent snapshots; cold snapshots after instance pause often work better.

Q50 Hard

When configuring OpenStack with Keystone using fernet tokens, what is a critical operational requirement?

  • A Fernet keys must be manually rotated every 24 hours to maintain security
  • B Fernet requires external PKI infrastructure and cannot be self-contained
  • C Fernet keys must be identical on all Keystone nodes and rotated periodically using keystone-manage ✓ Correct
  • D Fernet tokens require synchronous database replication for validity checking
Explanation

Fernet tokens require synchronized keys across all Keystone instances and periodic rotation; key distribution and management is critical for multi-node Keystone deployments.

Q51 Medium

You need to configure Neutron to support multiple external networks for different tenant projects. Which mechanism driver combination best supports this requirement?

  • A ML2 with linuxbridge and VLAN segmentation only
  • B ML2 with OVN and distributed gateway ports
  • C monolithic plugin with single flat network provider
  • D ML2 with Open vSwitch and multiple bridge mappings ✓ Correct
Explanation

ML2 driver with OVS supports multiple external networks through bridge mappings that connect different physical networks to different external network providers. This is the standard approach for multi-external-network setups.

Q52 Medium

An instance fails to launch with error 'No valid host was found.' You suspect Nova scheduler filter issues. Which file should you examine first?

  • A /etc/nova/nova.conf scheduler section and enabled_filters parameter ✓ Correct
  • B The Glance image properties for missing hw_architecture metadata tags
  • C The hypervisor's libvirt.conf configuration for resource definitions
  • D /var/log/nova/nova-conductor.log for placement service errors
Explanation

The scheduler filters in nova.conf determine which hosts are eligible for instance placement. The enabled_filters parameter controls which filters are active, making this the first place to verify scheduler configuration.

Q53 Hard

You are implementing role-based access control in Keystone. A user should be able to list instances across all projects but only modify instances in their own project. How should this be configured?

  • A Create a separate Keystone domain for read-only access and assign the user to both domains
  • B Grant the user 'reader' role on admin project and 'member' role on their own project
  • C Create a custom policy in /etc/nova/policy.json that uses scope and project_id in the rule definitions ✓ Correct
  • D Assign 'admin' role globally and configure Nova to filter results based on project membership
Explanation

Nova policy.json allows fine-grained control using scope-based policies that can grant read access across projects while restricting write operations to a user's own project. This is the proper way to implement scoped RBAC in OpenStack.

Q54 Medium

During a Cinder backup operation, the backup fails with 'Insufficient space in backup backend.' Which configuration parameter controls where backups are stored?

  • A backup_share parameter in cinder.conf defines the NFS mount for backup storage
  • B backup_volume_host is set in cinder.conf to point to a dedicated backup volume
  • C backup_driver in cinder.conf specifies the backend, but the actual path is determined by the driver's mount point ✓ Correct
  • D The backup_driver determines both the backend type and implicitly the storage location through driver-specific configuration
Explanation

The backup_driver parameter selects the backup backend driver (e.g., NFS, Ceph, Swift), but the actual storage path depends on how that specific driver is configured, typically through mount points or backend credentials.

Q55 Easy

Your Glance image service is experiencing slow uploads. You suspect the backend storage is the issue. Which storage backend would provide the fastest upload performance for large images?

  • A Ceph RBD backend with slow network connectivity
  • B Filesystem backend with local SSD storage ✓ Correct
  • C Swift backend with multiple replica locations
  • D HTTP backend pulling from remote web servers
Explanation

Filesystem backend with local SSD provides the lowest latency and highest throughput for image uploads, making it ideal for performance-critical scenarios. Remote and distributed backends introduce network latency.

Q56 Hard

You need to enable live migration for instances with attached Cinder volumes. Which configuration must be verified on the compute nodes?

  • A The block_migration flag must be set to true and iSCSI initiator must be configured on all compute hosts
  • B The cinder_api_insecure parameter must be set to true to allow volume attachment during migration
  • C Shared storage between compute nodes is required; alternatively block_migration allows non-shared storage if enabled ✓ Correct
  • D libvirt_live_migration_flag must include VIR_MIGRATE_PERSIST_DEST and compute nodes must have identical CPU models
Explanation

For live migration with Cinder volumes, you either need shared storage between compute nodes or must enable block_migration. Block migration allows copying instance storage during migration without requiring shared storage.

Q57 Medium

A tenant reports they cannot create security groups in a particular project. The project quota for security groups shows 10/10 used. What is the most likely cause?

  • A The quota was intentionally set to zero by the administrator in quotas.conf
  • B Security groups from deleted instances are not being automatically removed from quota counts
  • C The security group driver is misconfigured and preventing quota updates
  • D The default security group is consuming one of the quota limits for this project ✓ Correct
Explanation

Each project automatically gets a default security group created during project initialization, which counts against the security group quota. If the quota is 10 and 10 are used, the default group is likely occupying one slot.

Q58 Medium

You are configuring Heat to manage infrastructure as code. A Heat template fails to deploy because it references a resource that Heat cannot find in any catalog. Which file defines available Heat resource types?

  • A The heat.conf parameter resource_plugins lists directories where custom resource plugins are loaded
  • B Heat discovers resources dynamically from registered plugins; missing resources indicate the plugin package is not installed ✓ Correct
  • C /usr/share/heat/heat-resource-registry.yaml defines standard and custom Heat resource mappings
  • D The heat-api-cfn service automatically syncs available resources from AWS CloudFormation specifications
Explanation

Heat loads resource types from installed plugins. If a resource cannot be found, it indicates the required plugin package is missing. This is determined at runtime, not through static configuration files.

Q59 Hard

Your Ironic bare metal provisioning is failing with 'Failed to clean node.' Which Ironic conductor configuration is most likely the cause?

  • A The cleaning_network_uuid parameter is not set or points to an invalid network that the node cannot reach ✓ Correct
  • B The parallel_deploy_threads parameter is configured to a value higher than the number of available system threads
  • C The image_cache_size is set too low to store the cleaning image needed for the operation
  • D The enabled_hardware_types parameter does not include the correct hardware type for the node's IPMI interface
Explanation

Bare metal node cleaning requires a valid network where the node can boot and access cleaning tools. If cleaning_network_uuid is not configured or invalid, the cleaning operation will fail.

Q60 Medium

A Keystone token has expired and the user receives a 401 Unauthorized response. Which Keystone configuration parameter controls how long tokens remain valid before expiration?

  • A token_expiration in keystone.conf sets the default validity period for all token types in seconds ✓ Correct
  • B Each token type has its own expiration setting; Fernet uses fernet_token_expiry and UUID uses uuid_token_expiry in keystone.conf
  • C token_cache_time controls both the token validity period and how long tokens are cached in memcached
  • D The expiration time is determined by the token provider and varies: Fernet tokens use token_expiration, while UUID tokens use token_life_duration
Explanation

The token_expiration parameter in keystone.conf specifies the default validity duration for tokens in seconds, typically 3600 seconds (1 hour) by default. This applies across token types unless overridden.

Ready to test your knowledge?

You've reviewed all 60 questions. Take the interactive practice exam to simulate the real test environment.

▶ Start Practice Exam — Free