Which of the following commands can be used to lock a user’s account so that they cannot log into a
Linux server without removing any files, folders, or data?
B
Which of the following technologies is supported by the majority of cloud providers in order to
support the orchestration of containerized applications?
A
An IT team is currently implementing a custom software platform to address some key needs of the
company. Which of the following is considered a functional requirement?
A
A server on the network is unreachable. What is the best method to verify connectivity between
your computer and the remote server?
C
A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
A
A software development team uses a single physical server for testing the latest code in multiple
environments: development, pre-production, and production.
What is the recommended approach to maintain the basic security of these environments?
D
Which utility is used to create public and private key pairs for SSH authentication?
B
What does LVM stand for?
C
Encryption that uses both a private key and public key is known as what?
C
An IT associate would find the log files for syslog in which of the following directories?
A
Which of the following deployment environments is accessed by customers/end-users in a live or
real-time fashion?
A
Which port is normally required to be open for secure remote interactive shell access to Linux
systems?
C
What is the underlying technology that allows containers to be restricted to defined limits for system
resource usage such as CPU, memory, and network bandwidth?
D
Which option will cause ls to display hidden files and folders?
C
In which file are system and user account passwords stored?
C