A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?
When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?
Which utility is used to create public and private key pairs for SSH authentication?
Which of the following best describes the technical term “Elasticity”?
In which file are system and user account passwords stored?
What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?
A host seems to be running slowly. What command would help diagnose which processes are using system resources?
An IT team needs to synchronize large amounts of data between two nodes on the company’s local network. This data changes daily and it is not feasible to copy the entire directory tree each time. Which is the best option to securely copy files in the most timely and efficient manner?
Which measures can be taken to prevent unauthorized access to cloud instances and services?
When using vi or vim to edit a file, how do you exit without saving?