Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

LFCA Exam Dumps - Linux Foundation Certified IT Associate

Question # 4

On systemd-based Linux systems, what are runlevels called?

A.

Services

B.

Targets

C.

Units

D.

Modes

Full Access
Question # 5

Which of the following is considered a best practice for hardening SSHD?

A.

Using portknocking to protect ssh access for root

B.

Completely disabling ssh access

C.

Disabling ssh access for root

D.

Renaming root to a random name

Full Access
Question # 6

A company’s IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?

A.

su single

B.

init singleuser

C.

Isu 1

D.

linit 1

Full Access
Question # 7

By default, the Linux operating system uses what access control to manage files/users?

A.

Discretionary Access Control

B.

Mandatory Access Control

C.

Least Privilege

D.

Full Control

Full Access
Question # 8

Which of the following is a non-functional requirement?

A.

The system must allow the administrator to disable user accounts.

B.

The system must provide the user the option to enable multi-factor authentication.

C.

The system must allow the user to upload a profile image.

D.

The system must adhere to all security requirements and regulations.

Full Access
Question # 9

What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?

A.

DockerBuild

B.

Dockerfile

C.

BuildFile

D.

ImageFile

Full Access
Question # 10

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

A.

MD5

B.

LUKS

C.

BitLocker

D.

ext4

Full Access
Question # 11

What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?

A.

climits

B.

UnionFS

C.

Namespaces

D.

cqroups

Full Access
Question # 12

Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?

A.

OpenVPN

B.

GNUVPN

C.

NordVPN

D.

VPNConnect

Full Access
Question # 13

A company’s IT associate lists the contents of a directory and sees this line:

-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report

What happens when Alice from the accounting team tries to execute this file?

A.

The script executes using Bob's account.

B.

The script executes, but Alice cannot see the results.

C.

The script executes and Bob is notified.

D.

The script fails to execute; Alice is not on the sales team.

Full Access
Question # 14

Which option will cause ls to display hidden files and folders?

A.

ls -v

B.

ls -l

C.

ls -a

D.

ls -t

Full Access
Question # 15

Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?

A.

Kubernetes

B.

Vagrant

C.

Ansible

D.

Terraform

Full Access
Question # 16

Which of the following Git commands creates a new, empty Git repository?

A.

git clone

B.

git fork

C.

git pull

D.

git in it

Full Access
Question # 17

When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?

A.

Files absent from the remote directory will be restored from the local directory.

B.

Files present in the local directory, but not present in the remote directory, will be deleted.

C.

Files absent from the local directory will be restored from the remote directory.

D.

Files present in the remote directory, but not present in the local directory, will be deleted.

Full Access