What command is used to set or change permission attributes of files (such as read, write, execute)?
A. chacl
B. chmod
C. chown
D. setattr
Which option will cause ls to display hidden files and folders?
A. ls -v
B. ls -l
C. ls -a
D. ls -t
Which type of cloud computing combines on-premise infrastructure with a public cloud?
A. Super cloud
B. Combination cloud
C. Hybrid cloud
D. Mixed cloud
A company's IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?
A. su single
B. init singleuser
C. Isu 1
D. linit 1
An IT associate is researching technology options to use at a company. The company's application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?
A. Containers
B. Hybrid Cloud
C. Physical hardware
D. Virtualization
When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?
A. Files absent from the remote directory will be restored from the local directory.
B. Files present in the local directory, but not present in the remote directory, will be deleted.
C. Files absent from the local directory will be restored from the remote directory.
D. Files present in the remote directory, but not present in the local directory, will be deleted.
Which of the following authentication method types would include using a password in combination with a hardware token?
A. Multi-Factor Authentication
B. Multi-Staged Security
C. Hardware Encryption Authentication
D. Multi-Step Analysis
After installing the package `postfix', what command would you run in order to ensure that Postfix is started on reboot?
A. /etc/init.d/enable postfix
B. enable postfix on
C. postfix -onboot yes
D. svstemctl enable postfix
An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?
A. setcap
B. auditd
C. chmod
D. chown
An IT associate is working with a video streaming provider. What is a common approach to reduce bandwidth cost while supporting the same or an increasing number of video streams and customers?
A. Stop serving the video streams when a certain price limit is reached.
B. Reduce the bitrate to reduce the size of the video streams.
C. Serve the video streams only to a limited number of users at a time.
D. Use a content delivery network to distribute the streams.
Which of the following commands is used to detach a mounted filesystem or storage device?
A. umount
B. mount
C. mkfs
D. fsck
Which of the following best describes the DevOps methodology of Continuous Delivery?
A. The focus is on coding, building, integrating, and testing software.
B. The focus is on automating releases of projects as soon as possible.
C. The focus is on configuration management and continuous monitoring.
D. The focus is on product releases but also includes coding, building, integrating and testing software
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?
A. Identifying the purpose of the proposed system
B. Identifying the users of the proposed system
C. Identifying the development methodology
D. Identifying the technology stack of the proposed system
An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?
A. Increase the minimum to 2
B. Change to scale based on number of requests
C. Decrease the AZs to 2
D. Increase the maximum to 6
What command is used to view new content as it is written to a log file?
A. cat
B. grep -f
C. cut -f1-5
D. tail -f