Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?
Answer : B
Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?
Answer : A
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?
Answer : A
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?
Answer : C
A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
Answer : A