Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Create a free account to unlock all questions for this exam.
Log In / Sign UpA company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?
Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?
A software development team uses a single physical server for testing the latest code in multiple environments: development, pre-production, and production.
What is the recommended approach to maintain the basic security of these environments?
Which utility is used to create public and private key pairs for SSH authentication?
What does LVM stand for?
Encryption that uses both a private key and public key is known as what?
An IT associate would find the log files for syslog in which of the following directories?
Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?
Which port is normally required to be open for secure remote interactive shell access to Linux systems?