Halloween Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Linux Foundation LFCA Dumps

Page: 1 / 6
Total 60 questions

Linux Foundation Certified IT Associate Questions and Answers

Question 1

What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?

Options:

A.

climits

B.

UnionFS

C.

Namespaces

D.

cqroups

Question 2

What is an appropriate cost consideration when implementing serverless functions in the cloud?

Options:

A.

vCPU resources and disk cache

B Elapsed lime of function execution and memory used

B.

Virtual machine configuration and memory allocation

C.

Runtime environment and container configuration

Question 3

Encryption that uses both a private key and public key is known as what?

Options:

A.

Key Pair Encryption (symmetric cryptography)

B.

HMAC Cryptography (hash based message authentication]

C.

Public Key Cryptography (asymmetric cryptography)

D.

DPE (dual-phased hybrid encryption]

Question 4

What does IaaS stand for?

Options:

A.

IT as a Service

B.

Integration as a Service

C.

Infrastructure as a Service

D.

Information as a Service

Question 5

The Linux kernel uses a:

Options:

A.

dual architecture

B microkernel architecture

B.

monolithic architecture

C.

hybrid microkernel architecture

Question 6

Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?

Options:

A.

/var/log/boot.log

B.

/var/log/kern.log

C.

/var/log/svslog

D.

/var/log/auth.log

Question 7

After installing the package ‘postfix’, what command would you run in order to ensure that Postfix is started on reboot?

Options:

A.

/etc/init.d/enable postfix

B.

enable postfix on

C.

postfix -onboot yes

D.

svstemctl enable postfix

Question 8

A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?

Options:

A.

lookup

B.

find

C.

ping

D.

netstat

Question 9

Which of the following best describes the technical term “Elasticity”?

Options:

A.

The degree to which a system can adapt to dynamic computing demands

B.

The degree to which a business accommodates larger loads just by adding resources

C.

The degree to which a system consistently performs according to its specifications

D.

The ability to meet the business's needs through a variety of cloud offerings

Question 10

What command is used to set or change permission attributes of files (such as read, write, execute)?

Options:

A.

chacl

B.

chmod

C.

chown

D.

setattr

Question 11

Which of these providers host repositories of container images?

Options:

A.

Docker Hub

B.

GitHub

C.

Container Index

D.

GitLab

Question 12

An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?

Options:

A.

setcap

B.

auditd

C.

chmod

D.

chown

Question 13

What open source tool is used to manage instances in the cloud using infrastructure as code?

Options:

A.

SystemsDeplover

B.

Vault

C.

Terraform

D.

Docker

Question 14

Which of the following authentication method types would include using a password in combination with a hardware token?

Options:

A.

Multi-Factor Authentication

B.

Multi-Staged Security

C.

Hardware Encryption Authentication

D.

Multi-Step Analysis

Question 15

What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?

Options:

A.

DockerBuild

B.

Dockerfile

C.

BuildFile

D.

ImageFile

Question 16

Which of the following best describes serverless computing?

Options:

A.

A model of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another

B.

A model where a provider manages the back-end infrastructure management tasks, such as provisioning, scaling, scheduling, and patching

C.

An abstraction layer over computer hardware that allows the hardware elements of a single computer-processors, memory, storage, and more-to be divided into multiple segments

D.

A solution comprised of sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet

Question 17

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

Options:

A.

MD5

B.

LUKS

C.

BitLocker

D.

ext4

Question 18

Which is a common best practice to automatically reduce disk usage associated with the storage of log files?

Options:

A.

Use the loqrotate utility to periodically rotate the loq files.

B.

Create a cron job that deletes all log files in the folder every day.

C.

Delete the Vvar/log" directory so the log files are prevented from being created.

D.

Manually empty the log files every day of the week.

Page: 1 / 6
Total 60 questions