Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?

A.

setcap

B.

auditd

C.

chmod

D.

chown

Which of the following authentication method types would include using a password in combination with a hardware token?

A.

Multi-Factor Authentication

B.

Multi-Staged Security

C.

Hardware Encryption Authentication

D.

Multi-Step Analysis

Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?

A.

/var/log/boot.log

B.

/var/log/kern.log

C.

/var/log/svslog

D.

/var/log/auth.log

An IT associate is researching technology options to use at a company. The company’s application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?

A.

Containers

B.

Hybrid Cloud

C.

Physical hardware

D.

Virtualization

An IT associate is creating a business case to adopt a DevOps approach in an organization. Which of the following is a benefit of DevOps to include in the business case?

A.

The DevOps tool framework reduces the mean time to recovery and number of outaqes, which results in increased sales.

B.

Developers take on the work of the operations team. The operations team, therefore, needs fewer people, reducing the number of people the organization needs to pay.

C.

The frequency and stability of software deployments will be increased, which can lead to faster time to market.

D.

The new DevOps team takes over the work the development team does not have time to complete. The developers then have time to create new features.

An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?

A.

Increase the minimum to 2

B.

Change to scale based on number of requests

C.

Decrease the AZs to 2

D.

Increase the maximum to 6

Which of the following commands is used to display SELinux status?

A.

svstemctl

B.

sestatus

C.

firewall-cmd

D.

sudo

What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?

A.

DockerBuild

B.

Dockerfile

C.

BuildFile

D.

ImageFile