New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What command do you use to view the structure of system directory hierarchies?

A.

tree

B.

fee | ls /etc

C.

ls -t

D.

ls tree

Full Access
Question # 5

An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?

A.

setcap

B.

auditd

C.

chmod

D.

chown

Full Access
Question # 6

By default, the Linux operating system uses what access control to manage files/users?

A.

Discretionary Access Control

B.

Mandatory Access Control

C.

Least Privilege

D.

Full Control

Full Access
Question # 7

A company’s IT associate lists the contents of a directory and sees this line:

-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report

What happens when Alice from the accounting team tries to execute this file?

A.

The script executes using Bob's account.

B.

The script executes, but Alice cannot see the results.

C.

The script executes and Bob is notified.

D.

The script fails to execute; Alice is not on the sales team.

Full Access
Question # 8

In which file are system and user account passwords stored?

A.

/etc/passwd

B.

/etc/login.defs

C.

/etc/shadow

D.

/etc/secure

Full Access
Question # 9

Which of the following is a non-functional requirement?

A.

The system must allow the administrator to disable user accounts.

B.

The system must provide the user the option to enable multi-factor authentication.

C.

The system must allow the user to upload a profile image.

D.

The system must adhere to all security requirements and regulations.

Full Access
Question # 10

Which of the following authentication method types would include using a password in combination with a hardware token?

A.

Multi-Factor Authentication

B.

Multi-Staged Security

C.

Hardware Encryption Authentication

D.

Multi-Step Analysis

Full Access
Question # 11

Which of the following would be the most appropriate use-case for a Function as a Service (FaaS) implementation?

A.

An application that requires a local file system

B.

An application that continuously polls for work to process

C.

An event-driven application with dynamic scaling

D.

An application that requires a regionally- or globally-distributed file system

Full Access
Question # 12

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

A.

MD5

B.

LUKS

C.

BitLocker

D.

ext4

Full Access
Question # 13

After installing the package ‘postfix’, what command would you run in order to ensure that Postfix is started on reboot?

A.

/etc/init.d/enable postfix

B.

enable postfix on

C.

postfix -onboot yes

D.

svstemctl enable postfix

Full Access
Question # 14

An IT associate would find the log files for syslog in which of the following directories?

A.

/var/log

B.

/usr/local/logs

C.

/home/logs

D.

/etc/logs

Full Access
Question # 15

Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?

A.

Production

B.

Runtime

C.

Staging

D.

Website

Full Access
Question # 16

Which utility is used to create public and private key pairs for SSH authentication?

A.

adduser

B.

ssh-keyqen

C.

keyqen

D.

ssh

Full Access