A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
AThe script executes using Bob’s account.
BThe script executes, but Alice cannot see the results.
CThe script executes and Bob is notified.
DThe script fails to execute; Alice is not on the sales team.
0
Question 2
Linux Fundamentals
0
Question 3
Cloud Computing Fundamentals
0
Question 4
System Administration Fundamentals
0
Question 5
IT Project Management Fundamentals
0
That's the end of the Preview
This exam has 60 community-verified practice questions. Create a free account to access all questions, comments, and explanations.
Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?
Alock
Busermod
Cuserdel
Dchmod
Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?
AKubernetes
BVagrant
CAnsible
DTerraform
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?
Alookup
Bfind
Cping
Dnetstat
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?
AIdentifying the purpose of the proposed system
BIdentifying the users of the proposed system
CIdentifying the development methodology
DIdentifying the technology stack of the proposed system
Question 6
Security Fundamentals
0
Question 7
Security Fundamentals
Question 8
Linux Fundamentals
Question 9
Security Fundamentals
Question 10
Linux Fundamentals
Question 11
Cloud Computing Fundamentals
Question 12
Security Fundamentals
Question 13
DevOps Fundamentals
Question 14
Linux Fundamentals
Question 15
Security Fundamentals
Question 16
Cloud Computing Fundamentals
Question 17
Cloud Computing Fundamentals
Question 18
Security Fundamentals
Question 19
Cloud Computing Fundamentals
Question 20
Security Fundamentals
Question 21
Cloud Computing Fundamentals
Question 22
System Administration Fundamentals
Question 23
System Administration Fundamentals
Question 24
Linux Fundamentals
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
A software development team uses a single physical server for testing the latest code in multiple environments: development, pre-production, and production.
What is the recommended approach to maintain the basic security of these environments?
AAssign different developers on the team to work on test, pre-prod, and prod code.
BImplement peer review for all the changes deployed into any of the environments.
CDevelop and deploy each environment with its own set of software tools.
DUse different user/group IDs for deploying and running workload in each environment.
Which utility is used to create public and private key pairs for SSH authentication?
Aadduser
Bssh-keygen
Ckeygen
Dssh
What does LVM stand for?
ALogical Virtualization Manager
BLinux Volume Manager
CLogical Volume Manager
DLinux Virtualization Manager
Encryption that uses both a private key and public key is known as what?
AKey Pair Encryption (symmetric cryptography)
BHMAC Cryptography (hash based message authentication)
An IT associate would find the log files for syslog in which of the following directories?
A/var/log
B/usr/local/logs
C/home/logs
D/etc/logs
Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?
AProduction
BRuntime
CStaging
DWebsite
Which port is normally required to be open for secure remote interactive shell access to Linux systems?
A443/tcp
B23/tcp
C22/tcp
D25/tcp
What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?
Aclimits
BUnionFS
CNamespaces
Dcgroups
Which option will cause ls to display hidden files and folders?
Als -v
Bls -l
Cls -a
Dls -t
In which file are system and user account passwords stored?
A/etc/passwd
B/etc/login.defs
C/etc/shadow
D/etc/secure
Which of these providers host repositories of container images?
ADocker Hub
BGitHub
CContainer Index
DGitLab
What is an appropriate cost consideration when implementing serverless functions in the cloud?
AvCPU resources and disk cache
BElapsed time of function execution and memory used
CVirtual machine configuration and memory allocation
DRuntime environment and container configuration
Which of the following best describes open source compliance?
AA process by which software components are compiled in a development environment, pushed to staging, and then finally moved to production
BA process in which various users of open source software observe copyright notices and satisfy license obligations for their open source software components
CA process by which users of open source software evaluate each line of their code against an open source dictionary to determine which components have been plagiarized
DA process by which open source software is first initiated by a requirements analysis, followed by design and then implementation, with a final testing step
What open source tool is used to manage instances in the cloud using infrastructure as code?
ASystemsDeployer
BVault
CTerraform
DDocker
Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?
AOpenVPN
BGNUVPN
CNordVPN
DVPNConnect
What does IaaS stand for?
AIT as a Service
BIntegration as a Service
CInfrastructure as a Service
DInformation as a Service
Which is a common best practice to automatically reduce disk usage associated with the storage of log files?
AUse the logrotate utility to periodically rotate the log files.
BCreate a cron job that deletes all log files in the folder every day.
CDelete the “/var/log” directory so the log files are prevented from being created.
DManually empty the log files every day of the week.
When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?
AFiles absent from the remote directory will be restored from the local directory.
BFiles present in the local directory, but not present in the remote directory, will be deleted.
CFiles absent from the local directory will be restored from the remote directory.
DFiles present in the remote directory, but not present in the local directory, will be deleted.
A host seems to be running slowly. What command would help diagnose which processes are using system resources?