Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Linux Foundation > Certified IT Associate (LFCA) > LFCA

LFCA Linux Foundation Certified IT Associate Question and Answers

Question # 4

What technology could be used to address software dependency conflicts between applications on the same host operating system?

A.

Type 1 hvpervisors

B.

Type 2 hvpervisors

C.

Containers

D.

cgroups

Full Access
Question # 5

Which is a common best practice to automatically reduce disk usage associated with the storage of log files?

A.

Use the loqrotate utility to periodically rotate the loq files.

B.

Create a cron job that deletes all log files in the folder every day.

C.

Delete the Vvar/log" directory so the log files are prevented from being created.

D.

Manually empty the log files every day of the week.

Full Access
Question # 6

Which of the following best describes serverless computing?

A.

A model of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another

B.

A model where a provider manages the back-end infrastructure management tasks, such as provisioning, scaling, scheduling, and patching

C.

An abstraction layer over computer hardware that allows the hardware elements of a single computer-processors, memory, storage, and more-to be divided into multiple segments

D.

A solution comprised of sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet

Full Access
Question # 7

Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?

A.

lock

B.

usermod

C.

userdel

D.

chmod

Full Access
Question # 8

A team just developed a new feature on the company’s main web application. An IT associate wants to test this new feature by making it available for only 10% of the users. If everything works without any problems for a week, the associate will then make it available for all users. Which release type should be used to achieve this goal?

A.

Canary release

B.

Experimental release

C.

Alpha release

D.

Beta release

Full Access
Question # 9

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

A.

MD5

B.

LUKS

C.

BitLocker

D.

ext4

Full Access
Question # 10

Encryption that uses both a private key and public key is known as what?

A.

Key Pair Encryption (symmetric cryptography)

B.

HMAC Cryptography (hash based message authentication]

C.

Public Key Cryptography (asymmetric cryptography)

D.

DPE (dual-phased hybrid encryption]

Full Access
Question # 11

An IT associate is creating a business case to adopt a DevOps approach in an organization. Which of the following is a benefit of DevOps to include in the business case?

A.

The DevOps tool framework reduces the mean time to recovery and number of outaqes, which results in increased sales.

B.

Developers take on the work of the operations team. The operations team, therefore, needs fewer people, reducing the number of people the organization needs to pay.

C.

The frequency and stability of software deployments will be increased, which can lead to faster time to market.

D.

The new DevOps team takes over the work the development team does not have time to complete. The developers then have time to create new features.

Full Access
Question # 12

Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?

A.

Kubernetes

B.

Vagrant

C.

Ansible

D.

Terraform

Full Access
Question # 13

What is an appropriate cost consideration when implementing serverless functions in the cloud?

A.

vCPU resources and disk cache

B Elapsed lime of function execution and memory used

B.

Virtual machine configuration and memory allocation

C.

Runtime environment and container configuration

Full Access
Question # 14

Which option will cause ls to display hidden files and folders?

A.

ls -v

B.

ls -l

C.

ls -a

D.

ls -t

Full Access
Question # 15

A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?

A.

lookup

B.

find

C.

ping

D.

netstat

Full Access
Question # 16

A host seems to be running slowly. What command would help diagnose which processes are using system resources?

A.

df

B.

free

C.

uptime

D.

lop

Full Access
Question # 17

What does LVM stand for?

A.

Logical Virtualization Manager

B.

Linux Volume Manager

C.

Logical Volume Manager

D.

Linux Virtualization Manager

Full Access