Which of the following commands can be used to lock a user's account so that they cannot log into a Linux server without removing any files, folders, or data?
Answer(s): B
Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?
Answer(s): A
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?
Answer(s): C
Post your Comments and Discuss Linux Foundation LFCA exam prep with other Community members:
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the LFCA content, but please register or login to continue.