Linux Foundation LFCA - Linux Foundation Certified IT Associate Exam

Page:    1 / 12   
Total 60 questions

Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?

  • A. lock
  • B. usermod
  • C. userdel
  • D. chmod


Answer : B

Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?

  • A. Kubernetes
  • B. Vagrant
  • C. Ansible
  • D. Terraform


Answer : A

An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?

  • A. Identifying the purpose of the proposed system
  • B. Identifying the users of the proposed system
  • C. Identifying the development methodology
  • D. Identifying the technology stack of the proposed system


Answer : A

A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?

  • A. lookup
  • B. find
  • C. ping
  • D. netstat


Answer : C

A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?

  • A. The script executes using Bob’s account.
  • B. The script executes, but Alice cannot see the results.
  • C. The script executes and Bob is notified.
  • D. The script fails to execute; Alice is not on the sales team.


Answer : A

Page:    1 / 12   
Total 60 questions