Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Linux Foundation LFCA - Linux Foundation Certified IT Associate

Page: 1 / 2
Total 60 questions

Which is a common best practice to automatically reduce disk usage associated with the storage of log files?

A.

Use the loqrotate utility to periodically rotate the loq files.

B.

Create a cron job that deletes all log files in the folder every day.

C.

Delete the Vvar/log" directory so the log files are prevented from being created.

D.

Manually empty the log files every day of the week.

What does IaaS stand for?

A.

IT as a Service

B.

Integration as a Service

C.

Infrastructure as a Service

D.

Information as a Service

Which of the following best describes open source compliance?

A.

A process by which software components are compiled in a development environment, pushed to staging, and then finally moved to production

B.

A process in which various users of open source software observe copyright notices and satisfy license obligations for their open source software components

C.

A process by which users of open source software evaluate each line of their code against an open source dictionary to determine which components have been plagiarized

D.

A process by which open source software is first initiated by a requirements analysis, followed by design and then implementation, with a final testing step

An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?

A.

Identifying the purpose of the proposed system

B.

Identifying the users of the proposed system

C.

Identifying the development methodology

D.

Identifying the technology stack of the proposed system

Which of the following commands is used to detach a mounted filesystem or storage device?

A.

umount

B.

mount

C.

mkfs

D.

fsck

Which of the following is a solution to providing Internet access to a private network using only a single public IPv4 address?

A.

Routing gateway

B.

NAT gateway

C.

Local area network

D.

Virtual private network

Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?

A.

lock

B.

usermod

C.

userdel

D.

chmod

What command is used to set or change permission attributes of files (such as read, write, execute)?

A.

chacl

B.

chmod

C.

chown

D.

setattr

Which of the following authentication method types would include using a password in combination with a hardware token?

A.

Multi-Factor Authentication

B.

Multi-Staged Security

C.

Hardware Encryption Authentication

D.

Multi-Step Analysis

Which of the following best describes the DevOps methodology of Continuous Delivery?

A.

The focus is on coding, building, integrating, and testing software.

B.

The focus is on automating releases of projects as soon as possible.

C.

The focus is on configuration management and continuous monitoring.

D.

The focus is on product releases but also includes coding, building, integrating and testing software