ExamGecko

Linux Foundation LFCA Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?

A.
Files absent from the remote directory will be restored from the local directory.
A.
Files absent from the remote directory will be restored from the local directory.
Answers
B.
Files present in the local directory, but not present in the remote directory, will be deleted.
B.
Files present in the local directory, but not present in the remote directory, will be deleted.
Answers
C.
Files absent from the local directory will be restored from the remote directory.
C.
Files absent from the local directory will be restored from the remote directory.
Answers
D.
Files present in the remote directory, but not present in the local directory, will be deleted.
D.
Files present in the remote directory, but not present in the local directory, will be deleted.
Answers
Suggested answer: D

A host seems to be running slowly. What command would help diagnose which processes are using system resources?

A.
df
A.
df
Answers
B.
free
B.
free
Answers
C.
uptime
C.
uptime
Answers
D.
lop
D.
lop
Answers
Suggested answer: D

Which of the following would be the most appropriate use-case for a Function as a Service (FaaS) implementation?

A.
An application that requires a local file system
A.
An application that requires a local file system
Answers
B.
An application that continuously polls for work to process
B.
An application that continuously polls for work to process
Answers
C.
An event-driven application with dynamic scaling
C.
An event-driven application with dynamic scaling
Answers
D.
An application that requires a regionally- or globally-distributed file system
D.
An application that requires a regionally- or globally-distributed file system
Answers
Suggested answer: C

An IT associate is creating a business case to adopt a DevOps approach in an organization. Which of the following is a benefit of DevOps to include in the business case?

A.
The DevOps tool framework reduces the mean time to recovery and number of outaqes, which results in increased sales.
A.
The DevOps tool framework reduces the mean time to recovery and number of outaqes, which results in increased sales.
Answers
B.
Developers take on the work of the operations team. The operations team, therefore, needs fewer people, reducing the number of people the organization needs to pay.
B.
Developers take on the work of the operations team. The operations team, therefore, needs fewer people, reducing the number of people the organization needs to pay.
Answers
C.
The frequency and stability of software deployments will be increased, which can lead to faster time to market.
C.
The frequency and stability of software deployments will be increased, which can lead to faster time to market.
Answers
D.
The new DevOps team takes over the work the development team does not have time to complete. The developers then have time to create new features.
D.
The new DevOps team takes over the work the development team does not have time to complete. The developers then have time to create new features.
Answers
Suggested answer: C

After installing the package 'postfix', what command would you run in order to ensure that Postfix is started on reboot?

A.
/etc/init.d/enable postfix
A.
/etc/init.d/enable postfix
Answers
B.
enable postfix on
B.
enable postfix on
Answers
C.
postfix -onboot yes
C.
postfix -onboot yes
Answers
D.
svstemctl enable postfix
D.
svstemctl enable postfix
Answers
Suggested answer: D

An IT associate is working with a video streaming provider. What is a common approach to reduce bandwidth cost while supporting the same or an increasing number of video streams and customers?

A.
Stop serving the video streams when a certain price limit is reached.
A.
Stop serving the video streams when a certain price limit is reached.
Answers
B.
Reduce the bitrate to reduce the size of the video streams.
B.
Reduce the bitrate to reduce the size of the video streams.
Answers
C.
Serve the video streams only to a limited number of users at a time.
C.
Serve the video streams only to a limited number of users at a time.
Answers
D.
Use a content delivery network to distribute the streams.
D.
Use a content delivery network to distribute the streams.
Answers
Suggested answer: D

Which of the following commands is used to display SELinux status?

A.
svstemctl
A.
svstemctl
Answers
B.
sestatus
B.
sestatus
Answers
C.
firewall-cmd
C.
firewall-cmd
Answers
D.
sudo
D.
sudo
Answers
Suggested answer: B

An IT associate is researching technology options to use at a company. The company's application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?

A.
Containers
A.
Containers
Answers
B.
Hybrid Cloud
B.
Hybrid Cloud
Answers
C.
Physical hardware
C.
Physical hardware
Answers
D.
Virtualization
D.
Virtualization
Answers
Suggested answer: A

A company's IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?

A.
su single
A.
su single
Answers
B.
init singleuser
B.
init singleuser
Answers
C.
Isu 1
C.
Isu 1
Answers
D.
linit 1
D.
linit 1
Answers
Suggested answer: D

Which measures can be taken to prevent unauthorized access to cloud instances and services?

A.
Use multi-factor authentication, implement firewall rules, and back up data off-site.
A.
Use multi-factor authentication, implement firewall rules, and back up data off-site.
Answers
B.
Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.
B.
Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.
Answers
C.
Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.
C.
Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.
Answers
D.
Implement firewall rules, authentication, authorization, and encrypted protocols.
D.
Implement firewall rules, authentication, authorization, and encrypted protocols.
Answers
Suggested answer: D
Total 60 questions
Go to page: of 6