Linux Foundation Certified IT Associate v1.0

Page:    1 / 4   
Exam contains 60 questions

A company’s IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?

  • A. su single
  • B. init singleuser
  • C. su 1
  • D. init 1


Answer : D

Which measures can be taken to prevent unauthorized access to cloud instances and services?

  • A. Use multi-factor authentication, implement firewall rules, and back up data off-site.
  • B. Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.
  • C. Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.
  • D. Implement firewall rules, authentication, authorization, and encrypted protocols.


Answer : D

When working on a Linux system with firewalld enabled, how can other systems be allowed to access the HTTPS port on the system in the default firewall zone so that the access is granted immediately and persists across reboots?

  • A. firewallctl --add-port=https --reload
  • B. iptables --add-service=https --permanent
  • C. firewalld --add-service=https
  • D. firewall-cmd --add-service=https --permanent --reload


Answer : D

An IT team needs to synchronize large amounts of data between two nodes on the company’s local network. This data changes daily and it is not feasible to copy the entire directory tree each time. Which is the best option to securely copy files in the most timely and efficient manner?

  • A. rsync
  • B. scp
  • C. fsync
  • D. netcp


Answer : A

An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?

  • A. setcap
  • B. auditd
  • C. chmod
  • D. chown


Answer : C

Which of the following is a non-functional requirement?

  • A. The system must allow the administrator to disable user accounts.
  • B. The system must provide the user the option to enable multi-factor authentication.
  • C. The system must allow the user to upload a profile image.
  • D. The system must adhere to all security requirements and regulations.


Answer : D

By default, the Linux operating system uses what access control to manage files/users?

  • A. Discretionary Access Control
  • B. Mandatory Access Control
  • C. Least Privilege
  • D. Full Control


Answer : A

Which of the following Git commands creates a new, empty Git repository?

  • A. git clone
  • B. git fork
  • C. git pull
  • D. git init


Answer : D

Which of the following best describes the technical term “Elasticity”?

  • A. The degree to which a system can adapt to dynamic computing demands
  • B. The degree to which a business accommodates larger loads just by adding resources
  • C. The degree to which a system consistently performs according to its specifications
  • D. The ability to meet the business’s needs through a variety of cloud offerings


Answer : A

Which of the following is a solution to providing Internet access to a private network using only a single public IPv4 address?

  • A. Routing gateway
  • B. NAT gateway
  • C. Local area network
  • D. Virtual private network


Answer : B

Which of the following commands is used to detach a mounted filesystem or storage device?

  • A. umount
  • B. mount
  • C. mkfs
  • D. fsck


Answer : A

Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?

  • A. /var/log/boot.log
  • B. /var/log/kern.log
  • C. /var/log/syslog
  • D. /var/log/auth.log


Answer : B

Which of the following best describes serverless computing?

  • A. A model of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another
  • B. A model where a provider manages the back-end infrastructure management tasks, such as provisioning, scaling, scheduling, and patching
  • C. An abstraction layer over computer hardware that allows the hardware elements of a single computer-processors, memory, storage, and more-to be divided into multiple segments
  • D. A solution comprised of sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet


Answer : B

When using vi or vim to edit a file, how do you exit without saving?

  • A. :q!
  • B. ZZ
  • C. :wq!
  • D. :exit


Answer : A

Which of the following best describes the DevOps methodology of Continuous Delivery?

  • A. The focus is on coding, building, integrating, and testing software.
  • B. The focus is on automating releases of projects as soon as possible.
  • C. The focus is on configuration management and continuous monitoring.
  • D. The focus is on product releases but also includes coding, building, integrating and testing software.


Answer : B

Page:    1 / 4   
Exam contains 60 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy