ExamGecko

Linux Foundation LFCA Practice Test - Questions Answers

Question list
Search
Search

By default, the Linux operating system uses what access control to manage files/users?

A.
Discretionary Access Control
A.
Discretionary Access Control
Answers
B.
Mandatory Access Control
B.
Mandatory Access Control
Answers
C.
Least Privilege
C.
Least Privilege
Answers
D.
Full Control
D.
Full Control
Answers
Suggested answer: A

Which of the following Git commands creates a new, empty Git repository?

A.
git clone
A.
git clone
Answers
B.
git fork
B.
git fork
Answers
C.
git pull
C.
git pull
Answers
D.
git in it
D.
git in it
Answers
Suggested answer: D

Which of the following best describes the technical term ''Elasticity''?

A.
The degree to which a system can adapt to dynamic computing demands
A.
The degree to which a system can adapt to dynamic computing demands
Answers
B.
The degree to which a business accommodates larger loads just by adding resources
B.
The degree to which a business accommodates larger loads just by adding resources
Answers
C.
The degree to which a system consistently performs according to its specifications
C.
The degree to which a system consistently performs according to its specifications
Answers
D.
The ability to meet the business's needs through a variety of cloud offerings
D.
The ability to meet the business's needs through a variety of cloud offerings
Answers
Suggested answer: A

Which of the following is a solution to providing Internet access to a private network using only a single public IPv4 address?

A.
Routing gateway
A.
Routing gateway
Answers
B.
NAT gateway
B.
NAT gateway
Answers
C.
Local area network
C.
Local area network
Answers
D.
Virtual private network
D.
Virtual private network
Answers
Suggested answer: B

Which of the following commands is used to detach a mounted filesystem or storage device?

A.
umount
A.
umount
Answers
B.
mount
B.
mount
Answers
C.
mkfs
C.
mkfs
Answers
D.
fsck
D.
fsck
Answers
Suggested answer: A

Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?

A.
/var/log/boot.log
A.
/var/log/boot.log
Answers
B.
/var/log/kern.log
B.
/var/log/kern.log
Answers
C.
/var/log/svslog
C.
/var/log/svslog
Answers
D.
/var/log/auth.log
D.
/var/log/auth.log
Answers
Suggested answer: B

Which of the following best describes serverless computing?

A.
A model of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another
A.
A model of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another
Answers
B.
A model where a provider manages the back-end infrastructure management tasks, such as provisioning, scaling, scheduling, and patching
B.
A model where a provider manages the back-end infrastructure management tasks, such as provisioning, scaling, scheduling, and patching
Answers
C.
An abstraction layer over computer hardware that allows the hardware elements of a single computer-processors, memory, storage, and more-to be divided into multiple segments
C.
An abstraction layer over computer hardware that allows the hardware elements of a single computer-processors, memory, storage, and more-to be divided into multiple segments
Answers
D.
A solution comprised of sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet
D.
A solution comprised of sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet
Answers
Suggested answer: B

When using vi or vim to edit a file, how do you exit without saving?

A.
:q!
A.
:q!
Answers
B.
ZZ
B.
ZZ
Answers
C.
:wq!
C.
:wq!
Answers
D.
:exit
D.
:exit
Answers
Suggested answer: A

Which of the following commands can be used to lock a user's account so that they cannot log into a Linux server without removing any files, folders, or data?

A.
lock
A.
lock
Answers
B.
usermod
B.
usermod
Answers
C.
userdel
C.
userdel
Answers
D.
chmod
D.
chmod
Answers
Suggested answer: B

Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?

A.
Kubernetes
A.
Kubernetes
Answers
B.
Vagrant
B.
Vagrant
Answers
C.
Ansible
C.
Ansible
Answers
D.
Terraform
D.
Terraform
Answers
Suggested answer: A
Total 60 questions
Go to page: of 6