Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

LFCA Linux Foundation Certified IT Associate Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Linux Foundation LFCA Linux Foundation Certified IT Associate certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Which of the following Git commands creates a new, empty Git repository?

A.

git clone

B.

git fork

C.

git pull

D.

git in it

Which port is normally required to be open for secure remote interactive shell access to Linux systems?

A.

443/tcp

B.

23/tcp

C.

22/tcp

D.

25/tcp

Which of these providers host repositories of container images?

A.

Docker Hub

B.

GitHub

C.

Container Index

D.

GitLab

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database host. What open source technology would be used to encrypt the data?

A.

MD5

B.

LUKS

C.

BitLocker

D.

ext4

What open source tool is used to manage instances in the cloud using infrastructure as code?

A.

SystemsDeplover

B.

Vault

C.

Terraform

D.

Docker

Which of the following is a solution to providing Internet access to a private network using only a single public IPv4 address?

A.

Routing gateway

B.

NAT gateway

C.

Local area network

D.

Virtual private network

The Linux kernel uses a:

A.

dual architecture

B microkernel architecture

B.

monolithic architecture

C.

hybrid microkernel architecture

What does LVM stand for?

A.

Logical Virtualization Manager

B.

Linux Volume Manager

C.

Logical Volume Manager

D.

Linux Virtualization Manager

Which of the following commands is used to display SELinux status?

A.

svstemctl

B.

sestatus

C.

firewall-cmd

D.

sudo

After installing the package ‘postfix’, what command would you run in order to ensure that Postfix is started on reboot?

A.

/etc/init.d/enable postfix

B.

enable postfix on

C.

postfix -onboot yes

D.

svstemctl enable postfix

Which of the following best describes the technical term “Elasticity”?

A.

The degree to which a system can adapt to dynamic computing demands

B.

The degree to which a business accommodates larger loads just by adding resources

C.

The degree to which a system consistently performs according to its specifications

D.

The ability to meet the business's needs through a variety of cloud offerings

When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?

A.

Files absent from the remote directory will be restored from the local directory.

B.

Files present in the local directory, but not present in the remote directory, will be deleted.

C.

Files absent from the local directory will be restored from the remote directory.

D.

Files present in the remote directory, but not present in the local directory, will be deleted.

A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?

A.

lookup

B.

find

C.

ping

D.

netstat

Which of the following would be the most appropriate use-case for a Function as a Service (FaaS) implementation?

A.

An application that requires a local file system

B.

An application that continuously polls for work to process

C.

An event-driven application with dynamic scaling

D.

An application that requires a regionally- or globally-distributed file system

Which option will cause ls to display hidden files and folders?

A.

ls -v

B.

ls -l

C.

ls -a

D.

ls -t

In which file are system and user account passwords stored?

A.

/etc/passwd

B.

/etc/login.defs

C.

/etc/shadow

D.

/etc/secure

A software development team uses a single physical server for testing the latest code in multiple environments: development, pre-production, and production.

What is the recommended approach to maintain the basic security of these environments?

A.

Assign different developers on the team to work on test, pre-prod. and prod code.

B.

Implement peer review for all the changes deployed into any of the environments

C.

Develop and deploy each environment with its own set of software tools.

D.

Use different user/group IDs for deploying and running workload in each environment.

An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?

A.

Increase the minimum to 2

B.

Change to scale based on number of requests

C.

Decrease the AZs to 2

D.

Increase the maximum to 6

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved