This page was exported from Free Exams Dumps Materials [ http://exams.dumpsmaterials.com ] Export date:Thu Nov 21 20:31:44 2024 / +0000 GMT ___________________________________________________ Title: 2024 Realistic LFCA Dumps Latest Linux Foundation Practice Tests Dumps [Q21-Q40] --------------------------------------------------- 2024 Realistic LFCA Dumps Latest Linux Foundation Practice Tests Dumps LFCA Dumps PDF - LFCA Real Exam Questions Answers QUESTION 21Which port is normally required to be open for secure remote interactive shell access to Linux systems?  25/tcp  22/tcp  23/tcp  443/tcp QUESTION 22A team just developed a new feature on the company’s main web application. An IT associate wants to test this new feature by making it available for only 10% of the users. If everything works without any problems for a week, the associate will then make it available for all users. Which release type should be used to achieve this goal?  Canary release  Experimental release  Alpha release  Beta release QUESTION 23Which measures can be taken to prevent unauthorized access to cloud instances and services?  Use multi-factor authentication, implement firewall rules, and back up data off-site.  Implement block-chain tokens, use encrypted protocols, and encrypt the data on storage systems.  Replicate data to another datacenter, use multi-factor authentication, and encrypt data on storage systems.  Implement firewall rules, authentication, authorization, and encrypted protocols. QUESTION 24Which of the following best describes serverless computing?  A model of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another  A model where a provider manages the back-end infrastructure management tasks, such as provisioning, scaling, scheduling, and patching  An abstraction layer over computer hardware that allows the hardware elements of a single computer-processors, memory, storage, and more-to be divided into multiple segments  A solution comprised of sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet QUESTION 25On systemd-based Linux systems, what are runlevels called?  Services  Targets  Units  Modes QUESTION 26Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?  Kubernetes  Vagrant  Ansible  Terraform QUESTION 27By default, the Linux operating system uses what access control to manage files/users?  Discretionary Access Control  Mandatory Access Control  Least Privilege  Full Control QUESTION 28Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?  Production  Runtime  Staging  Website QUESTION 29Encryption that uses both a private key and public key is known as what?  Key Pair Encryption (symmetric cryptography)  HMAC Cryptography (hash based message authentication]  Public Key Cryptography (asymmetric cryptography)  DPE (dual-phased hybrid encryption] QUESTION 30When using rsync to mirror a local directory to a remote server, what is the significance of the –delete option?  Files absent from the remote directory will be restored from the local directory.  Files present in the local directory, but not present in the remote directory, will be deleted.  Files absent from the local directory will be restored from the remote directory.  Files present in the remote directory, but not present in the local directory, will be deleted. QUESTION 31An IT team needs to synchronize large amounts of data between two nodes on the company’s local network. This data changes daily and it is not feasible to copy the entire directory tree each time. Which is the best option to securely copy files in the most timely and efficient manner?  rsync  scp  fsync  netcp QUESTION 32What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?  climits  UnionFS  Namespaces  cqroups QUESTION 33An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?  setcap  auditd  chmod  chown QUESTION 34In which file are system and user account passwords stored?  /etc/passwd  /etc/login.defs  /etc/shadow  /etc/secure QUESTION 35Which of the following would be the most appropriate use-case for a Function as a Service (FaaS) implementation?  An application that requires a local file system  An application that continuously polls for work to process  An event-driven application with dynamic scaling  An application that requires a regionally- or globally-distributed file system QUESTION 36An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?  Identifying the purpose of the proposed system  Identifying the users of the proposed system  Identifying the development methodology  Identifying the technology stack of the proposed system QUESTION 37An IT associate is researching technology options to use at a company. The company’s application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?  Containers  Hybrid Cloud  Physical hardware  Virtualization QUESTION 38Which of the following commands is used to detach a mounted filesystem or storage device?  umount  mount  mkfs  fsck QUESTION 39Which of the following is considered a best practice for hardening SSHD?  Using portknocking to protect ssh access for root  Completely disabling ssh access  Disabling ssh access for root  Renaming root to a random name QUESTION 40Which of the following Git commands creates a new, empty Git repository?  git clone  git fork  git pull  git in it  Loading … Linux Foundation LFCA Exam Syllabus Topics: TopicDetailsTopic 1Security Fundamentals Supporting Applications and DeveloperTopic 2Cloud Computing Fundamentals System Administration FundamentalsTopic 3Linux Operating System General Networking Commands System CommandsTopic 4System Administration Tasks File Management CommandsTopic 5Software Project Management Open-source Software and LicensingTopic 6Cloud Costs and Budgeting Software Application Architecture   LFCA Premium Exam Engine pdf Download: https://www.dumpsmaterials.com/LFCA-real-torrent.html --------------------------------------------------- Images: https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2024-03-10 16:04:57 Post date GMT: 2024-03-10 16:04:57 Post modified date: 2024-03-10 16:04:57 Post modified date GMT: 2024-03-10 16:04:57