What command do you use to view the structure of system directory hierarchies?
An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?
By default, the Linux operating system uses what access control to manage files/users?
A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
Which of the following authentication method types would include using a password in combination with a hardware token?
Which of the following would be the most appropriate use-case for a Function as a Service (FaaS) implementation?
A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?
After installing the package ‘postfix’, what command would you run in order to ensure that Postfix is started on reboot?
An IT associate would find the log files for syslog in which of the following directories?
Which of the following deployment environments is accessed by customers/end-users in a live or real-time fashion?
Which utility is used to create public and private key pairs for SSH authentication?