linux foundation lfca practice test

Linux Foundation Certified IT Associate

Last exam update: Nov 18 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 60

Question 1

Which of the following commands can be used to lock a user’s account so that they cannot log into a
Linux server without removing any files, folders, or data?

  • A. lock
  • B. usermod
  • C. userdel
  • D. chmod
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following technologies is supported by the majority of cloud providers in order to
support the orchestration of containerized applications?

  • A. Kubernetes
  • B. Vagrant
  • C. Ansible
  • D. Terraform
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

An IT team is currently implementing a custom software platform to address some key needs of the
company. Which of the following is considered a functional requirement?

  • A. Identifying the purpose of the proposed system
  • B. Identifying the users of the proposed system
  • C. Identifying the development methodology
  • D. Identifying the technology stack of the proposed system
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

A server on the network is unreachable. What is the best method to verify connectivity between
your computer and the remote server?

  • A. lookup
  • B. find
  • C. ping
  • D. netstat
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?

  • A. The script executes using Bob's account.
  • B. The script executes, but Alice cannot see the results.
  • C. The script executes and Bob is notified.
  • D. The script fails to execute; Alice is not on the sales team.
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

A software development team uses a single physical server for testing the latest code in multiple
environments: development, pre-production, and production.
What is the recommended approach to maintain the basic security of these environments?

  • A. Assign different developers on the team to work on test, pre-prod. and prod code.
  • B. Implement peer review for all the changes deployed into any of the environments
  • C. Develop and deploy each environment with its own set of software tools.
  • D. Use different user/group IDs for deploying and running workload in each environment.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which utility is used to create public and private key pairs for SSH authentication?

  • A. adduser
  • B. ssh-keyqen
  • C. keyqen
  • D. ssh
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What does LVM stand for?

  • A. Logical Virtualization Manager
  • B. Linux Volume Manager
  • C. Logical Volume Manager
  • D. Linux Virtualization Manager
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Encryption that uses both a private key and public key is known as what?

  • A. Key Pair Encryption (symmetric cryptography)
  • B. HMAC Cryptography (hash based message authentication]
  • C. Public Key Cryptography (asymmetric cryptography)
  • D. DPE (dual-phased hybrid encryption]
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

An IT associate would find the log files for syslog in which of the following directories?

  • A. /var/log
  • B. /usr/local/logs
  • C. /home/logs
  • D. /etc/logs
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following deployment environments is accessed by customers/end-users in a live or
real-time fashion?

  • A. Production
  • B. Runtime
  • C. Staging
  • D. Website
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which port is normally required to be open for secure remote interactive shell access to Linux
systems?

  • A. 443/tcp
  • B. 23/tcp
  • C. 22/tcp
  • D. 25/tcp
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What is the underlying technology that allows containers to be restricted to defined limits for system
resource usage such as CPU, memory, and network bandwidth?

  • A. climits
  • B. UnionFS
  • C. Namespaces
  • D. cqroups
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which option will cause ls to display hidden files and folders?

  • A. ls -v
  • B. ls -l
  • C. ls -a
  • D. ls -t
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

In which file are system and user account passwords stored?

  • A. /etc/passwd
  • B. /etc/login.defs
  • C. /etc/shadow
  • D. /etc/secure
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2