ExamGecko

Linux Foundation LFCA Practice Test - Questions Answers, Page 2

Question list
Search
Search

A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?

A.
lookup
A.
lookup
Answers
B.
find
B.
find
Answers
C.
ping
C.
ping
Answers
D.
netstat
D.
netstat
Answers
Suggested answer: C

A company's IT associate lists the contents of a directory and sees this line:

-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report

What happens when Alice from the accounting team tries to execute this file?

A.
The script executes using Bob's account.
A.
The script executes using Bob's account.
Answers
B.
The script executes, but Alice cannot see the results.
B.
The script executes, but Alice cannot see the results.
Answers
C.
The script executes and Bob is notified.
C.
The script executes and Bob is notified.
Answers
D.
The script fails to execute; Alice is not on the sales team.
D.
The script fails to execute; Alice is not on the sales team.
Answers
Suggested answer: A

A software development team uses a single physical server for testing the latest code in multiple environments: development, pre-production, and production.

What is the recommended approach to maintain the basic security of these environments?

A.
Assign different developers on the team to work on test, pre-prod. and prod code.
A.
Assign different developers on the team to work on test, pre-prod. and prod code.
Answers
B.
Implement peer review for all the changes deployed into any of the environments
B.
Implement peer review for all the changes deployed into any of the environments
Answers
C.
Develop and deploy each environment with its own set of software tools.
C.
Develop and deploy each environment with its own set of software tools.
Answers
D.
Use different user/group IDs for deploying and running workload in each environment.
D.
Use different user/group IDs for deploying and running workload in each environment.
Answers
Suggested answer: D

Which utility is used to create public and private key pairs for SSH authentication?

A.
adduser
A.
adduser
Answers
B.
ssh-keyqen
B.
ssh-keyqen
Answers
C.
keyqen
C.
keyqen
Answers
D.
ssh
D.
ssh
Answers
Suggested answer: B

What does LVM stand for?

A.
Logical Virtualization Manager
A.
Logical Virtualization Manager
Answers
B.
Linux Volume Manager
B.
Linux Volume Manager
Answers
C.
Logical Volume Manager
C.
Logical Volume Manager
Answers
D.
Linux Virtualization Manager
D.
Linux Virtualization Manager
Answers
Suggested answer: C

An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?

A.
Identifying the purpose of the proposed system
A.
Identifying the purpose of the proposed system
Answers
B.
Identifying the users of the proposed system
B.
Identifying the users of the proposed system
Answers
C.
Identifying the development methodology
C.
Identifying the development methodology
Answers
D.
Identifying the technology stack of the proposed system
D.
Identifying the technology stack of the proposed system
Answers
Suggested answer: A

Encryption that uses both a private key and public key is known as what?

A.
Key Pair Encryption (symmetric cryptography)
A.
Key Pair Encryption (symmetric cryptography)
Answers
B.
HMAC Cryptography (hash based message authentication]
B.
HMAC Cryptography (hash based message authentication]
Answers
C.
Public Key Cryptography (asymmetric cryptography)
C.
Public Key Cryptography (asymmetric cryptography)
Answers
D.
DPE (dual-phased hybrid encryption]
D.
DPE (dual-phased hybrid encryption]
Answers
Suggested answer: C

An IT associate would find the log files for syslog in which of the following directories?

A.
/var/log
A.
/var/log
Answers
B.
/usr/local/logs
B.
/usr/local/logs
Answers
C.
/home/logs
C.
/home/logs
Answers
D.
/etc/logs
D.
/etc/logs
Answers
Suggested answer: A

Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?

A.
Production
A.
Production
Answers
B.
Runtime
B.
Runtime
Answers
C.
Staging
C.
Staging
Answers
D.
Website
D.
Website
Answers
Suggested answer: A

Which port is normally required to be open for secure remote interactive shell access to Linux systems?

A.
443/tcp
A.
443/tcp
Answers
B.
23/tcp
B.
23/tcp
Answers
C.
22/tcp
C.
22/tcp
Answers
D.
25/tcp
D.
25/tcp
Answers
Suggested answer: C
Total 60 questions
Go to page: of 6