What happens when Alice from the accounting team tries to execute this file?
A company’s IT associate lists the contents of a directory and sees this line: -rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report What happens when Alice from the accounting team tries to execute this file?A . The script executes using Bob's account.B . The script executes, but Alice cannot...
Which port is normally required to be open for secure remote interactive shell access to Linux systems?
Which port is normally required to be open for secure remote interactive shell access to Linux systems?A . 443/tcpB . 23/tcpC . 22/tcpD . 25/tcpView AnswerAnswer: C
Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?
Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?A . lockB . usermodC . userdelD . chmodView AnswerAnswer: B
In which file are system and user account passwords stored?
In which file are system and user account passwords stored?A . /etc/passwdB . /etc/login.defsC . /etc/shadowD . /etc/secureView AnswerAnswer: C
An IT associate would find the log files for syslog in which of the following directories?
An IT associate would find the log files for syslog in which of the following directories?A . /var/logB . /usr/local/logsC . /home/logsD . /etc/logsView AnswerAnswer: A
Encryption that uses both a private key and public key is known as what?
Encryption that uses both a private key and public key is known as what?A . Key Pair Encryption (symmetric cryptography)B . HMAC Cryptography (hash based message authentication]C . Public Key Cryptography (asymmetric cryptography)D . DPE (dual-phased hybrid encryption]View AnswerAnswer: C
What is the best method to verify connectivity between your computer and the remote server?
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?A . lookupB . findC . pingD . netstatView AnswerAnswer: C
Which of the following best describes open source compliance?
Which of the following best describes open source compliance?A . A process by which software components are compiled in a development environment, pushed to staging, and then finally moved to productionB . A process in which various users of open source software observe copyright notices and satisfy license obligations for...
What is an appropriate cost consideration when implementing serverless functions in the cloud?
What is an appropriate cost consideration when implementing serverless functions in the cloud?A . vCPU resources and disk cacheB . Elapsed lime of function execution and memory usedC . Virtual machine configuration and memory allocationD . Runtime environment and container configurationView AnswerAnswer: B
Which utility is used to create public and private key pairs for SSH authentication?
Which utility is used to create public and private key pairs for SSH authentication?A . adduserB . ssh-keyqenC . keyqenD . sshView AnswerAnswer: B