Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?

A.

Production

B.

Runtime

C.

Staging

D.

Website

Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?

A.

OpenVPN

B.

GNUVPN

C.

NordVPN

D.

VPNConnect

When working on a Linux system with firewalld enabled, how can other systems be allowed to access the HTTPS port on the system in the default firewall zone so that the access is granted immediately and persists across reboots?

A.

firewallctl --add-port=https --reload

B.

iptables --add-service=https --permanent

C.

firewalld --add-service=https

D.

firewall-cmd --add-service=https --permanent --reload

Which of the following best describes the technical term “Elasticity”?

A.

The degree to which a system can adapt to dynamic computing demands

B.

The degree to which a business accommodates larger loads just by adding resources

C.

The degree to which a system consistently performs according to its specifications

D.

The ability to meet the business's needs through a variety of cloud offerings

A software development team uses a single physical server for testing the latest code in multiple environments: development, pre-production, and production.

What is the recommended approach to maintain the basic security of these environments?

A.

Assign different developers on the team to work on test, pre-prod. and prod code.

B.

Implement peer review for all the changes deployed into any of the environments

C.

Develop and deploy each environment with its own set of software tools.

D.

Use different user/group IDs for deploying and running workload in each environment.

Which utility is used to create public and private key pairs for SSH authentication?

A.

adduser

B.

ssh-keyqen

C.

keyqen

D.

ssh

Which measures can be taken to prevent unauthorized access to cloud instances and services?

A.

Use multi-factor authentication, implement firewall rules, and back up data off-site.

B.

Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.

C.

Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.

D.

Implement firewall rules, authentication, authorization, and encrypted protocols.

The Linux kernel uses a:

A.

dual architecture

B microkernel architecture

B.

monolithic architecture

C.

hybrid microkernel architecture

What command is used to set or change permission attributes of files (such as read, write, execute)?

A.

chacl

B.

chmod

C.

chown

D.

setattr

After installing the package ‘postfix’, what command would you run in order to ensure that Postfix is started on reboot?

A.

/etc/init.d/enable postfix

B.

enable postfix on

C.

postfix -onboot yes

D.

svstemctl enable postfix