What happens when Alice from the accounting team tries to execute this file?

A company’s IT associate lists the contents of a directory and sees this line: -rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report What happens when Alice from the accounting team tries to execute this file?A . The script executes using Bob's account.B . The script executes, but Alice cannot...

November 25, 2023 No Comments READ MORE +

Which port is normally required to be open for secure remote interactive shell access to Linux systems?

Which port is normally required to be open for secure remote interactive shell access to Linux systems?A . 443/tcpB . 23/tcpC . 22/tcpD . 25/tcpView AnswerAnswer: C

November 24, 2023 No Comments READ MORE +

Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?

Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?A . lockB . usermodC . userdelD . chmodView AnswerAnswer: B

November 23, 2023 No Comments READ MORE +

In which file are system and user account passwords stored?

In which file are system and user account passwords stored?A . /etc/passwdB . /etc/login.defsC . /etc/shadowD . /etc/secureView AnswerAnswer: C

November 22, 2023 No Comments READ MORE +

An IT associate would find the log files for syslog in which of the following directories?

An IT associate would find the log files for syslog in which of the following directories?A . /var/logB . /usr/local/logsC . /home/logsD . /etc/logsView AnswerAnswer: A

November 21, 2023 No Comments READ MORE +

Encryption that uses both a private key and public key is known as what?

Encryption that uses both a private key and public key is known as what?A . Key Pair Encryption (symmetric cryptography)B . HMAC Cryptography (hash based message authentication]C . Public Key Cryptography (asymmetric cryptography)D . DPE (dual-phased hybrid encryption]View AnswerAnswer: C

November 21, 2023 No Comments READ MORE +

What is the best method to verify connectivity between your computer and the remote server?

A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?A . lookupB . findC . pingD . netstatView AnswerAnswer: C

November 20, 2023 No Comments READ MORE +

Which of the following best describes open source compliance?

Which of the following best describes open source compliance?A . A process by which software components are compiled in a development environment, pushed to staging, and then finally moved to productionB . A process in which various users of open source software observe copyright notices and satisfy license obligations for...

November 19, 2023 No Comments READ MORE +

What is an appropriate cost consideration when implementing serverless functions in the cloud?

What is an appropriate cost consideration when implementing serverless functions in the cloud?A . vCPU resources and disk cacheB . Elapsed lime of function execution and memory usedC . Virtual machine configuration and memory allocationD . Runtime environment and container configurationView AnswerAnswer: B

November 18, 2023 No Comments READ MORE +

Which utility is used to create public and private key pairs for SSH authentication?

Which utility is used to create public and private key pairs for SSH authentication?A . adduserB . ssh-keyqenC . keyqenD . sshView AnswerAnswer: B

November 14, 2023 No Comments READ MORE +