Pass the Linux Foundation Certified IT Associate (LFCA) LFCA Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

Options:

A.

MD5


B.

LUKS


C.

BitLocker


D.

ext4


Questions # 2:

When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?

Options:

A.

Files absent from the remote directory will be restored from the local directory.


B.

Files present in the local directory, but not present in the remote directory, will be deleted.


C.

Files absent from the local directory will be restored from the remote directory.


D.

Files present in the remote directory, but not present in the local directory, will be deleted.


Questions # 3:

Which utility is used to create public and private key pairs for SSH authentication?

Options:

A.

adduser


B.

ssh-keyqen


C.

keyqen


D.

ssh


Questions # 4:

Which of the following best describes the technical term “Elasticity”?

Options:

A.

The degree to which a system can adapt to dynamic computing demands


B.

The degree to which a business accommodates larger loads just by adding resources


C.

The degree to which a system consistently performs according to its specifications


D.

The ability to meet the business's needs through a variety of cloud offerings


Questions # 5:

In which file are system and user account passwords stored?

Options:

A.

/etc/passwd


B.

/etc/login.defs


C.

/etc/shadow


D.

/etc/secure


Questions # 6:

What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?

Options:

A.

climits


B.

UnionFS


C.

Namespaces


D.

cqroups


Questions # 7:

A host seems to be running slowly. What command would help diagnose which processes are using system resources?

Options:

A.

df


B.

free


C.

uptime


D.

lop


Questions # 8:

An IT team needs to synchronize large amounts of data between two nodes on the company’s local network. This data changes daily and it is not feasible to copy the entire directory tree each time. Which is the best option to securely copy files in the most timely and efficient manner?

Options:

A.

rsync


B.

scp


C.

fsync


D.

netcp


Questions # 9:

Which measures can be taken to prevent unauthorized access to cloud instances and services?

Options:

A.

Use multi-factor authentication, implement firewall rules, and back up data off-site.


B.

Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.


C.

Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.


D.

Implement firewall rules, authentication, authorization, and encrypted protocols.


Questions # 10:

When using vi or vim to edit a file, how do you exit without saving?

Options:

A.

:q!


B.

ZZ


C.

:wq!


D.

:exit


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions