Linux Foundation Certified IT Associate Questions and Answers
What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?
What is an appropriate cost consideration when implementing serverless functions in the cloud?
Encryption that uses both a private key and public key is known as what?
What does IaaS stand for?
The Linux kernel uses a:
Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?
After installing the package ‘postfix’, what command would you run in order to ensure that Postfix is started on reboot?
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?
Which of the following best describes the technical term “Elasticity”?
What command is used to set or change permission attributes of files (such as read, write, execute)?
Which of these providers host repositories of container images?
An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?
What open source tool is used to manage instances in the cloud using infrastructure as code?
Which of the following authentication method types would include using a password in combination with a hardware token?
What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?
Which of the following best describes serverless computing?
A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?
Which is a common best practice to automatically reduce disk usage associated with the storage of log files?