Which of the following commands can be used to lock a user’s account so that they cannot log into a
Linux server without removing any files, folders, or data?
Question No 2
Which of the following technologies is supported by the majority of cloud providers in order to
support the orchestration of containerized applications?
Question No 3
An IT team is currently implementing a custom software platform to address some key needs of the
company. Which of the following is considered a functional requirement?
Question No 4
A server on the network is unreachable. What is the best method to verify connectivity between
your computer and the remote server?
Question No 5
A company’s IT associate lists the contents of a directory and sees this line
- rwsr - x - - x 2 bob sales 2047 Oct 10 0944 sales - report
What happens when Alice from the accounting team tries to execute this file?