A company's IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?
A. su single
B. init singleuser
C. Isu 1
D. linit 1
An IT associate is researching technology options to use at a company. The company's application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?
A. Containers
B. Hybrid Cloud
C. Physical hardware
D. Virtualization
Which of the following is a non-functional requirement?
A. The system must allow the administrator to disable user accounts.
B. The system must provide the user the option to enable multi-factor authentication.
C. The system must allow the user to upload a profile image.
D. The system must adhere to all security requirements and regulations.
Which of the following authentication method types would include using a password in combination with a hardware token?
A. Multi-Factor Authentication
B. Multi-Staged Security
C. Hardware Encryption Authentication
D. Multi-Step Analysis
Which of the following would be the most appropriate use-case for a Function as a Service (FaaS) implementation?
A. An application that requires a local file system
B. An application that continuously polls for work to process
C. An event-driven application with dynamic scaling
D. An application that requires a regionally- or globally-distributed file system
Which utility is used to create public and private key pairs for SSH authentication?
A. adduser
B. ssh-keyqen
C. keyqen
D. ssh
What command is used to view new content as it is written to a log file?
A. cat
B. grep -f
C. cut -f1-5
D. tail -f
What is the Linux kernel?
A. It is the core interface between a computer's hardware and its processes.
B. It is another name for the operating system.
C. It contains all the applications and software installed on the computer.
D. It is the firmware for the computer's processor.
Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?
A. OpenVPN
B. GNUVPN
C. NordVPN
D. VPNConnect
Which of the following best describes the technical term "Elasticity"?
A. The degree to which a system can adapt to dynamic computing demands
B. The degree to which a business accommodates larger loads just by adding resources
C. The degree to which a system consistently performs according to its specifications
D. The ability to meet the business's needs through a variety of cloud offerings