ExamGecko

Linux Foundation LFCA Practice Test - Questions Answers, Page 5

Question list
Search
Search

When working on a Linux system with firewalld enabled, how can other systems be allowed to access the HTTPS port on the system in the default firewall zone so that the access is granted immediately and persists across reboots?

A.
firewallctl --add-port=https --reload
A.
firewallctl --add-port=https --reload
Answers
B.
iptables --add-service=https --permanent
B.
iptables --add-service=https --permanent
Answers
C.
firewalld --add-service=https
C.
firewalld --add-service=https
Answers
D.
firewall-cmd --add-service=https --permanent --reload
D.
firewall-cmd --add-service=https --permanent --reload
Answers
Suggested answer: D

An IT team needs to synchronize large amounts of data between two nodes on the company's local network. This data changes daily and it is not feasible to copy the entire directory tree each time. Which is the best option to securely copy files in the most timely and efficient manner?

A.
rsync
A.
rsync
Answers
B.
scp
B.
scp
Answers
C.
fsync
C.
fsync
Answers
D.
netcp
D.
netcp
Answers
Suggested answer: A

An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?

A.
setcap
A.
setcap
Answers
B.
auditd
B.
auditd
Answers
C.
chmod
C.
chmod
Answers
D.
chown
D.
chown
Answers
Suggested answer: C

Which of the following is a non-functional requirement?

A.
The system must allow the administrator to disable user accounts.
A.
The system must allow the administrator to disable user accounts.
Answers
B.
The system must provide the user the option to enable multi-factor authentication.
B.
The system must provide the user the option to enable multi-factor authentication.
Answers
C.
The system must allow the user to upload a profile image.
C.
The system must allow the user to upload a profile image.
Answers
D.
The system must adhere to all security requirements and regulations.
D.
The system must adhere to all security requirements and regulations.
Answers
Suggested answer: D

Which of the following is considered a best practice for hardening SSHD?

A.
Using portknocking to protect ssh access for root
A.
Using portknocking to protect ssh access for root
Answers
B.
Completely disabling ssh access
B.
Completely disabling ssh access
Answers
C.
Disabling ssh access for root
C.
Disabling ssh access for root
Answers
D.
Renaming root to a random name
D.
Renaming root to a random name
Answers
Suggested answer: C

A team just developed a new feature on the company's main web application. An IT associate wants to test this new feature by making it available for only 10% of the users. If everything works without any problems for a week, the associate will then make it available for all users. Which release type should be used to achieve this goal?

A.
Canary release
A.
Canary release
Answers
B.
Experimental release
B.
Experimental release
Answers
C.
Alpha release
C.
Alpha release
Answers
D.
Beta release
D.
Beta release
Answers
Suggested answer: A

The Linux kernel uses a:

A.
dual architecture B microkernel architecture
A.
dual architecture B microkernel architecture
Answers
B.
monolithic architecture
B.
monolithic architecture
Answers
C.
hybrid microkernel architecture
C.
hybrid microkernel architecture
Answers
Suggested answer: C

Which of the following authentication method types would include using a password in combination with a hardware token?

A.
Multi-Factor Authentication
A.
Multi-Factor Authentication
Answers
B.
Multi-Staged Security
B.
Multi-Staged Security
Answers
C.
Hardware Encryption Authentication
C.
Hardware Encryption Authentication
Answers
D.
Multi-Step Analysis
D.
Multi-Step Analysis
Answers
Suggested answer: A

What is the Linux kernel?

A.
It is the core interface between a computer's hardware and its processes.
A.
It is the core interface between a computer's hardware and its processes.
Answers
B.
It is another name for the operating system.
B.
It is another name for the operating system.
Answers
C.
It contains all the applications and software installed on the computer.
C.
It contains all the applications and software installed on the computer.
Answers
D.
It is the firmware for the computer's processor.
D.
It is the firmware for the computer's processor.
Answers
Suggested answer: A

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

A.
MD5
A.
MD5
Answers
B.
LUKS
B.
LUKS
Answers
C.
BitLocker
C.
BitLocker
Answers
D.
ext4
D.
ext4
Answers
Suggested answer: C
Total 60 questions
Go to page: of 6