What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?
Which of the following best describes the DevOps methodology of Continuous Delivery?
Which type of cloud computing combines on-premise infrastructure with a public cloud?
Which measures can be taken to prevent unauthorized access to cloud instances and services?
What file is created to assemble a Docker image, which contains all the commands a user has to run to make the image from start to finish?
Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?
When working on a Linux system with firewalld enabled, how can other systems be allowed to access the HTTPS port on the system in the default firewall zone so that the access is granted immediately and persists across reboots?
A host seems to be running slowly. What command would help diagnose which processes are using system resources?
By default, the Linux operating system uses what access control to manage files/users?
An IT associate would find the log files for syslog in which of the following directories?
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?