Valentine Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Linux Foundation LFCA Linux Foundation Certified IT Associate Exam Practice Test

Page: 1 / 6
Total 60 questions

Linux Foundation Certified IT Associate Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$36  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$31.5  $104.99
Question 1

Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?

Options:

A.

Production

B.

Runtime

C.

Staging

D.

Website

Question 2

Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?

Options:

A.

lock

B.

usermod

C.

userdel

D.

chmod

Question 3

A company’s IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?

Options:

A.

su single

B.

init singleuser

C.

Isu 1

D.

linit 1

Question 4

When using vi or vim to edit a file, how do you exit without saving?

Options:

A.

:q!

B.

ZZ

C.

:wq!

D.

:exit

Question 5

Which of the following is a non-functional requirement?

Options:

A.

The system must allow the administrator to disable user accounts.

B.

The system must provide the user the option to enable multi-factor authentication.

C.

The system must allow the user to upload a profile image.

D.

The system must adhere to all security requirements and regulations.

Question 6

Which of the following is a solution to providing Internet access to a private network using only a single public IPv4 address?

Options:

A.

Routing gateway

B.

NAT gateway

C.

Local area network

D.

Virtual private network

Question 7

When working on a Linux system with firewalld enabled, how can other systems be allowed to access the HTTPS port on the system in the default firewall zone so that the access is granted immediately and persists across reboots?

Options:

A.

firewallctl --add-port=https --reload

B.

iptables --add-service=https --permanent

C.

firewalld --add-service=https

D.

firewall-cmd --add-service=https --permanent --reload

Question 8

Which is a common best practice to automatically reduce disk usage associated with the storage of log files?

Options:

A.

Use the loqrotate utility to periodically rotate the loq files.

B.

Create a cron job that deletes all log files in the folder every day.

C.

Delete the Vvar/log" directory so the log files are prevented from being created.

D.

Manually empty the log files every day of the week.

Question 9

An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?

Options:

A.

Increase the minimum to 2

B.

Change to scale based on number of requests

C.

Decrease the AZs to 2

D.

Increase the maximum to 6

Question 10

What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?

Options:

A.

DockerBuild

B.

Dockerfile

C.

BuildFile

D.

ImageFile

Question 11

Which measures can be taken to prevent unauthorized access to cloud instances and services?

Options:

A.

Use multi-factor authentication, implement firewall rules, and back up data off-site.

B.

Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.

C.

Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.

D.

Implement firewall rules, authentication, authorization, and encrypted protocols.

Question 12

Which of the following authentication method types would include using a password in combination with a hardware token?

Options:

A.

Multi-Factor Authentication

B.

Multi-Staged Security

C.

Hardware Encryption Authentication

D.

Multi-Step Analysis

Question 13

Which type of cloud computing combines on-premise infrastructure with a public cloud?

Options:

A.

Super cloud

B.

Combination cloud

C.

Hybrid cloud

D.

Mixed cloud

Question 14

When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?

Options:

A.

Files absent from the remote directory will be restored from the local directory.

B.

Files present in the local directory, but not present in the remote directory, will be deleted.

C.

Files absent from the local directory will be restored from the remote directory.

D.

Files present in the remote directory, but not present in the local directory, will be deleted.

Question 15

What does LVM stand for?

Options:

A.

Logical Virtualization Manager

B.

Linux Volume Manager

C.

Logical Volume Manager

D.

Linux Virtualization Manager

Question 16

Which of the following best describes the technical term “Elasticity”?

Options:

A.

The degree to which a system can adapt to dynamic computing demands

B.

The degree to which a business accommodates larger loads just by adding resources

C.

The degree to which a system consistently performs according to its specifications

D.

The ability to meet the business's needs through a variety of cloud offerings

Question 17

What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?

Options:

A.

climits

B.

UnionFS

C.

Namespaces

D.

cqroups

Question 18

What is the Linux kernel?

Options:

A.

It is the core interface between a computer's hardware and its processes.

B.

It is another name for the operating system.

C.

It contains all the applications and software installed on the computer.

D.

It is the firmware for the computer's processor.

Page: 1 / 6
Total 60 questions