An IT associate is creating a business case to adopt a DevOps approach in an organization. Which of the following is a benefit of DevOps to include in the business case?
Which port is normally required to be open for secure remote interactive shell access to Linux systems?
An IT associate would find the log files for syslog in which of the following directories?
Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?
Which of the following best describes the DevOps methodology of Continuous Delivery?
A team just developed a new feature on the company’s main web application. An IT associate wants to test this new feature by making it available for only 10% of the users. If everything works without any problems for a week, the associate will then make it available for all users. Which release type should be used to achieve this goal?
What is the underlying technology that allows containers to be restricted to defined limits for system resource usage such as CPU, memory, and network bandwidth?
A host seems to be running slowly. What command would help diagnose which processes are using system resources?
What is an appropriate cost consideration when implementing serverless functions in the cloud?
Which of the following authentication method types would include using a password in combination with a hardware token?
A company’s IT associate lists the contents of a directory and sees this line:
-rwsr-x--x 2 bob sales 2047 Oct 10 09:44 sales-report
What happens when Alice from the accounting team tries to execute this file?
Which of the following standard log files would provide the most detailed information on why a recently upgraded custom kernel failed to boot?
Which of the following commands is used to detach a mounted filesystem or storage device?