An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?
Which of the following authentication method types would include using a password in combination with a hardware token?
Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?
An IT associate is researching technology options to use at a company. The company’s application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?
An IT associate is creating a business case to adopt a DevOps approach in an organization. Which of the following is a benefit of DevOps to include in the business case?
An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?
Which of the following commands is used to display SELinux status?
What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?