A company’s IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?
By default, the Linux operating system uses what access control to manage files/users?
What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?
A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?
What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?
Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?
A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?
When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?