Which option will cause ls to display hidden files and folders?
A. ls -v
B. ls -l
C. ls -a
D. ls -t
Which type of cloud computing combines on-premise infrastructure with a public cloud?
A. Super cloud
B. Combination cloud
C. Hybrid cloud
D. Mixed cloud
A team just developed a new feature on the company's main web application. An IT associate wants to test this new feature by making it available for only 10% of the users. If everything works without any problems for a week, the associate will then make it available for all users. Which release type should be used to achieve this goal?
A. Canary release
B. Experimental release
C. Alpha release
D. Beta release
A company's IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?
A. su single
B. init singleuser
C. Isu 1
D. linit 1
An IT associate is creating a business case to adopt a DevOps approach in an organization. Which of the following is a benefit of DevOps to include in the business case?
A. The DevOps tool framework reduces the mean time to recovery and number of outaqes, which results in increased sales.
B. Developers take on the work of the operations team. The operations team, therefore, needs fewer people, reducing the number of people the organization needs to pay.
C. The frequency and stability of software deployments will be increased, which can lead to faster time to market.
D. The new DevOps team takes over the work the development team does not have time to complete. The developers then have time to create new features.
What does IaaS stand for?
A. IT as a Service
B. Integration as a Service
C. Infrastructure as a Service
D. Information as a Service
What does LVM stand for?
A. Logical Virtualization Manager
B. Linux Volume Manager
C. Logical Volume Manager
D. Linux Virtualization Manager
Encryption that uses both a private key and public key is known as what?
A. Key Pair Encryption (symmetric cryptography)
B. HMAC Cryptography (hash based message authentication]
C. Public Key Cryptography (asymmetric cryptography)
D. DPE (dual-phased hybrid encryption]
An IT associate would find the log files for syslog in which of the following directories?
A. /var/log
B. /usr/local/logs
C. /home/logs
D. /etc/logs
What technology could be used to address software dependency conflicts between applications on the same host operating system?
A. Type 1 hvpervisors
B. Type 2 hvpervisors
C. Containers
D. cgroups