ExamGecko

Linux Foundation LFCA Practice Test - Questions Answers, Page 3

Question list
Search
Search

Question 21

Report
Export
Collapse

What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?

A.
climits
A.
climits
Answers
B.
UnionFS
B.
UnionFS
Answers
C.
Namespaces
C.
Namespaces
Answers
D.
cqroups
D.
cqroups
Answers
Suggested answer: D
asked 18/09/2024
Mercedes Gonzalez Riera
39 questions

Question 22

Report
Export
Collapse

Which option will cause ls to display hidden files and folders?

A.
ls -v
A.
ls -v
Answers
B.
ls -l
B.
ls -l
Answers
C.
ls -a
C.
ls -a
Answers
D.
ls -t
D.
ls -t
Answers
Suggested answer: C
asked 18/09/2024
John Doe
34 questions

Question 23

Report
Export
Collapse

In which file are system and user account passwords stored?

A.
/etc/passwd
A.
/etc/passwd
Answers
B.
/etc/login.defs
B.
/etc/login.defs
Answers
C.
/etc/shadow
C.
/etc/shadow
Answers
D.
/etc/secure
D.
/etc/secure
Answers
Suggested answer: C
asked 18/09/2024
Richard Villanueva
34 questions

Question 24

Report
Export
Collapse

Which of these providers host repositories of container images?

A.
Docker Hub
A.
Docker Hub
Answers
B.
GitHub
B.
GitHub
Answers
C.
Container Index
C.
Container Index
Answers
D.
GitLab
D.
GitLab
Answers
Suggested answer: A
asked 18/09/2024
muhammad ikram
32 questions

Question 25

Report
Export
Collapse

What is an appropriate cost consideration when implementing serverless functions in the cloud?

A.
vCPU resources and disk cache
A.
vCPU resources and disk cache
Answers
B.
Elapsed lime of function execution and memory used
B.
Elapsed lime of function execution and memory used
Answers
C.
Virtual machine configuration and memory allocation
C.
Virtual machine configuration and memory allocation
Answers
D.
Runtime environment and container configuration
D.
Runtime environment and container configuration
Answers
Suggested answer: B
asked 18/09/2024
cheitram patel
34 questions

Question 26

Report
Export
Collapse

Which of the following best describes open source compliance?

A.
A process by which software components are compiled in a development environment, pushed to staging, and then finally moved to production
A.
A process by which software components are compiled in a development environment, pushed to staging, and then finally moved to production
Answers
B.
A process in which various users of open source software observe copyright notices and satisfy license obligations for their open source software components
B.
A process in which various users of open source software observe copyright notices and satisfy license obligations for their open source software components
Answers
C.
A process by which users of open source software evaluate each line of their code against an open source dictionary to determine which components have been plagiarized
C.
A process by which users of open source software evaluate each line of their code against an open source dictionary to determine which components have been plagiarized
Answers
D.
A process by which open source software is first initiated by a requirements analysis, followed by design and then implementation, with a final testing step
D.
A process by which open source software is first initiated by a requirements analysis, followed by design and then implementation, with a final testing step
Answers
Suggested answer: B
asked 18/09/2024
Haitham Hanash
27 questions

Question 27

Report
Export
Collapse

What open source tool is used to manage instances in the cloud using infrastructure as code?

A.
SystemsDeplover
A.
SystemsDeplover
Answers
B.
Vault
B.
Vault
Answers
C.
Terraform
C.
Terraform
Answers
D.
Docker
D.
Docker
Answers
Suggested answer: C
asked 18/09/2024
Henri Geimer
36 questions

Question 28

Report
Export
Collapse

Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?

A.
OpenVPN
A.
OpenVPN
Answers
B.
GNUVPN
B.
GNUVPN
Answers
C.
NordVPN
C.
NordVPN
Answers
D.
VPNConnect
D.
VPNConnect
Answers
Suggested answer: A
asked 18/09/2024
Rey Geric Villafranca
43 questions

Question 29

Report
Export
Collapse

What does IaaS stand for?

A.
IT as a Service
A.
IT as a Service
Answers
B.
Integration as a Service
B.
Integration as a Service
Answers
C.
Infrastructure as a Service
C.
Infrastructure as a Service
Answers
D.
Information as a Service
D.
Information as a Service
Answers
Suggested answer: C
asked 18/09/2024
William Takashi Chan
34 questions

Question 30

Report
Export
Collapse

Which is a common best practice to automatically reduce disk usage associated with the storage of log files?

A.
Use the loqrotate utility to periodically rotate the loq files.
A.
Use the loqrotate utility to periodically rotate the loq files.
Answers
B.
Create a cron job that deletes all log files in the folder every day.
B.
Create a cron job that deletes all log files in the folder every day.
Answers
C.
Delete the Vvar/log' directory so the log files are prevented from being created.
C.
Delete the Vvar/log' directory so the log files are prevented from being created.
Answers
D.
Manually empty the log files every day of the week.
D.
Manually empty the log files every day of the week.
Answers
Suggested answer: A
asked 18/09/2024
Md. Soyaeb Hossain
33 questions
Total 60 questions
Go to page: of 6