Which of the following technologies provides load balancing, encryption, and observability in containerized environments?
Which of the following technologies provides load balancing, encryption, and observability in containerized environments?A . Virtual private networkB . Sidecar podC . Overlay networkD . Service meshView AnswerAnswer: D Explanation: "A service mesh controls the delivery of service requests in an application. Common features provided by a service mesh include...
Which of the following commands could the engineer use to query the DNS server to get mail server information?
A Linux engineer set up two local DNS servers (10.10.10.10 and 10.10.10.20) and was testing email connectivity to the local mail server using the mail command on a local machine when the following error appeared: The local machine DNS settings are: Which of the following commands could the engineer use...
Which of the following is MOST likely the issue?
A Linux administrator needs to resolve a service that has failed to start. The administrator runs the following command: The following output is returned Which of the following is MOST likely the issue?A . The service does not have permissions to read write the startupfile.B . The service startupfile size...
Which of the following commands can be used to show this information?
A systems administrator wants to check for running containers. Which of the following commands can be used to show this information?A . docker pullB . docker statsC . docker psD . docker listView AnswerAnswer: C Explanation: The command that can be used to check for running containers is docker ps....
Which of the following commands should be run on the DNS forwarder server to accomplish this task?
A Linux administrator has set up a new DNS forwarder and is configuring all internal servers to use the new forwarder to look up external DNS requests. The administrator needs to modify the firewall on the server for the DNS forwarder to allow the internal servers to communicate to it...
Which of the following commands should be used to apply the configuration changes?
A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?A . systemct1 stop sshdB . systemct1 mask sshdC . systemct1 reload sshdD . systemct1 start sshdView AnswerAnswer: C Explanation: The systemct1 reload sshd command can be used to apply...
Which of the following is most likely causing the issue?
A user is unable to remotely log on to a server using the server name server1 and port 22. The Linux engineer troubleshoots the issue and gathers the following information: Which of the following is most likely causing the issue?A . server 1 is not in the DNS.B . sshd...
Which of the following commands would allow this connection?
A Linux administrator needs to connect securely to a remote server in order to install application software. Which of the following commands would allow this connection?A . scp "ABC-key.pem" [email protected] . sftp rooteiO.0.0.1C . telnet 10.0.0.1 80D . ssh -i "ABC-key.pem" [email protected] . sftp "ABC-key.pem" [email protected] AnswerAnswer: D Explanation: The...
Which of the following commands can the administrator use to verify this information?
An administrator thinks that a package was installed using a snap. Which of the following commands can the administrator use to verify this information?A . snap listB . snap findC . snap installD . snap tryView AnswerAnswer: A Explanation: The snap list command is used to display the installed snaps...
Which of the following command sequences is most commonly used to rebuild this type of module?
An administrator has source code and needs to rebuild a kernel module. Which of the following command sequences is most commonly used to rebuild this type of module? A. ./configure make make install B. wget gcc cp C. tar xvzf build cp D. build install configureView AnswerAnswer: A Explanation: The...