Cloud Computing and Linux (Final Set)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is always the first line of code in Bash scripts files?

#!/bin/bash

Which of the following commands searches all files in the exercise/practice directory that are modified within the last 5 days?

$ find exercise/practice -mtime -5

Which of the following commands searches all files in the current directory that are more than 1k in size?

$ find-size + 1k

A quick way to see what privileges are associated with specific users in your system is to run ____________ (assuming the user is larry).

$ id larry

The _______ command allows you to view all system messages that were generated in the last 15 minutes.

$ journalctl --since "15 minutes ago"

Which of the following command runs a process called "yes" with the nice value of 10?

$ nice -10 yes

Which of the following commands can be used to see the state of all the storage devices currently mounted to your system and get a summary of available and used disk space of the file system?

$df

Which of the following commands can be used to see how much memory, including the swap, are utilized?

$free

If everything feels right with your ISP, you may want to see if any processes are greedily grabbing too much if the bandwidth share from your end. One tool that does this job is ________.

$iftop

Which of the following command forcefully close a process?

$kill

The ________ command with no arguments will display any processes running within the current shell

$ps

The ________ command will display all active processes across the entire system.

$ps aux

The ________ command allows you to search for a process called sshd process across the entire system.

$ps aux | grep sshd

The _________ command allows you to estimate number of active processes across the entire system.

$ps aux | wc

Which of the following commands can be used to view how the hardware is actually being utilized by the system right now?

$top

Which of the following operator makes a process in Ubuntu to run in the background?

&

The nice value of a process in Ubuntu can range from ___________.

-20 to 19

Suppose script1.sh is executable. Which of the following command will run the script?

./script1.sh

Whenever you open a terminal window from a Linux desktop, a new shell session is created for you using the default settings in a special hidden file in your home directory called _________.

.bashrc

If you want to search a term in a document by using Regexp search, you can type __________

/

The ________ directory contains the binary files needed to run all the basic programs used on Linux, including many navigation and file manipulation tools.

/bin

The ________ directory is home to the Linux images and boot configuration files that are needed to control successful system startup.

/boot

The ________ contains files representing and providing control over all physical and virtual devices in use by the system.

/dev

The ________ is where configuration files controlling software in use by the system are kept. If you need to configure a service on a Linux system, or change networking or other core settings, this is the first place to look.

/etc

The _____ directory contains directories where the owners of user accounts can store their private files.

/home

The ________ directory is used for software libraries needed by binary programs.

/lib

A lot of key system information is kept within virtual files in the _______ directory.

/proc

The _______ directory is used by the root user, although for security reasons admins normally won't log in as the root user, so this is a directory that won't normally get a lot of use.

/root

The main difference between the /bin and /sbin is that the ________ directory is intended for system binaries, or binaries that administrators will use to manage the system.

/sbin

The ______ directory is meant for files whose content is likely to be updated often. This includes logs, email messages, and application cache

/var

The process with the nice value of _______ will the fastest among the following numbers

1

In the 10-character metadata of object permission, the first block takes up _______ character(s) and indicates whether the object is a(n)_________.

1, directory

A version 6 IP address is a(n) _________ -bit integer.

128

What is the typical port number for SSH?

22

IN the 10-character metadata of object permission, the third block takes up _______ character(s) and indicates __________ rights.

3, group's

In the 10-character metadata of object permission, the fourth block takes up ________ character(s) and indicates __________ rights.

3, other user's

In the 10-character metadata of object permission, the second block takes up _______ character(s) and indicates __________ rights.

3, owner's

A version 4 IP address is a(n) ________ - integer that can be expressed in hexadecimal notation.

32

The process with the nice value of ________ will run the slowest among the following numbers/

4

Cloud providers have a lot of robust options to help you in managing your resources. There are automation tools like CloudFormation templates on ______.

AWS

What will the following command do? $ chmod 777 homework.txt

Add all users all rights to the homework.txt

What will the following command do? $ chmod o+x homework.txt

Add other users execute rights to the homework.txt

In Ubuntu, what does the following command do? $ sudo chmod +t

Add the sticky bit to the current directory

In addition to graph monitoring metrics, a good monitoring solution allows you to set ____ for customizable thresholds and receive notifications.

Alerts

The nmap command allows you to scan _______.

All of these (local host, local network, remote host)

Ther are many versions of Linux OS. The most famous is _____ operating system for phones.

Android

What does the following command do? $ cat test 2 >> test3

Append the content of test2 file to the test3 file

DevOps solution is centered around automation. The _____ plays an important role in the process.

Application programming interface

_________ is a contract that defines the ways two or more components and services, on the cloud or on-premise, can talk to each other.

Application programming interface

API uses HHTP/HTTPS methods like GET and POST that indicate the actions to be done on the resources ________ values can be passed with URL if GET method is used.

Attribute

The cloud ______ refers to the cloud uptime and the cloud capability to operate continuously.

Availability

Cloud providers have a lot of robust options to help you in managing your resources. There are automation tools like ARM templates to implement IaC on ________.

Azure

Some cloud vendors allow you to transfer existing licenses to save costs. This is called __________.

BYOL

What type of shell do you learn in this book?

Bash shell

Which of the following is NOT true about Linux?

Best for video games

Which of the following statements about Linux desktop interface is true?

Both graphical user interface and command line interface

Which of the following is NOT an element of Creative Commons (CC) copyright licenses?

Copyleft

Which of the following is NOT an element of Creative Commons (CC) copyright licenses?

Copyright-free

In Ubuntu, what does the following command do? $ sudo 1n -s /home/larry/exercise/script.sh/var/cs101

Create a symbolic link in the cs101 directory

The _______ license allows creators of any intellectual properties to choose exactly the rights they wish to reserve themselves. They can select between any combination of four elements.

Creative Commons (CC) copyright licenses

One tool in risk management in AWS is System Manager. A similar too in Azure is _______.

Data Discovery & Classification

Which of the following is NOT a major technology that support data portability in the cloud?

Data agility

Data sovereignty can also be defined as providing ________ with full control over their data and their digital identities.

Data owners

According to the author of the book, which of the following is the highest ranked cloud threat?

Data tampering and leakage

_______ is a way of thinking that is an extended version of the agile software development mindset.

DevOps

Providing highly available services in cloud computing is essential for maintaining customer confidence and satisfaction, preventing revenue losses, and most importantly, __________.

Ensuring business continuity

Linux users have difficulty finding the applications they want because of limited resources.

False

To apply updates or patches on Ubuntu, you have to use command line.

False

The Linux kernel is released onto the GPL, which is under ________ group of licenses.

Free Software Foundation (FSF)

The ______ wants software to be free so that it allows users the freedom to do whatever they like with it.

Free Software Foundation (FSF)

Which group of permission is the same?

Full permission, rwx, 7

When an OS-specific bootloader is identified, it is read into memory and takes over the boot process. The bootloader in Linux is called _________.

GRand Unified Bootloader (GRUB)

With _______ scaling, you scale out by adding more instances of a deployment. A typical case is when you have a web application in the cloud and you spin up more instances to handle extra user requests.

Horizontal

To be properly connected to a network, a device must be identified by a unique _______ address.

IP

Enterprises must meet regulatory and compliance for their business. On-premise, it is the job of _____ to ensure their data canters and /or workloads mee these regulatory and compliance certifications

IT and security teams

On-premise operating procedure governance in many organizations based on _____. It is a good practice if you can continue to follow the framework for managing information technology on cloud.

ITIL

________ is a commonly utilized IT service management execution technique that helps IT services to be planned, designed, selected, operated and continuously improved.

ITIL

________ producers are utilized to measure to measure the efficiency of IT service management procedures and their association with the accelerated system development on cloud.

ITIL

Which of the following cloud service models require the most extensive monitoring?

IaaS

In AWS, access control is provided by _________.

Identity and Access Management (IAM)

For "while" loop or "if" statement, where do you put the testing condition?

Inside a pair of square brackets []

What does the following command do? $ sudo apt install locate

Install the locate program

What does the following command do? $ wget www.google.com 2> errorfile.txt

Instead of displaying errors on the screen, it redirects any errors generated by the command to the errorfile.txt.

Which of the following is NOT a major FOSS license group?

International Free Software (IFS)

There are international policies to follow in the cloud. The policies are set up by ________.

International Organization for Standardization

Enterprise must meet regulatory and compliance for their business. Which of the following is a correct statement about the current certification process?

It depends on the auditor's skills

What will the command "history" do in Linux command line?

It displays all commands you issued up to 1000.

Enterprises must meet regulatory and compliance for their business. Which of the following is a correct statement about the current certification process?

It is complex

Enterprise must meet regulatory and compliance for their business. Which of the following is a correct statement about the current certification process?

It is expensive

Which of the following is NOT a benefit for risk documentation?

It minimizes the risk

IaC is a practice where cloud infrastructure is outlined is descriptive machine-readable files containing a resource hierarchy and are often in _______ format.

JSON

There are many versions of Linux OS. If you are learning network security testing and management you will see ________.

Kali Linux

New releases of Linux come out frequently. The ________ release are built to be as stable as possible using only fully tested software and configurations. The reliability of such configurations makes it possible for the distro managers to continue to provide security and feature updates to a release for as long as 5 years.

LTS

The original Linux kernel was created by ________ in the _______ and then donated to the public.

Linus Torvalds, early 1990's

The Linux environment consists of three kinds of software: _________.

Linux kernel, desktop interface, and customizations

Which of the following is NOT true about Linux?

Linux will replace Windows OS as number one in the market in a couple of years

In the context of the cloud, ________ is recording of system events and of messages that are sent between services and components.

Logging

_________ is a way to virtualize storage devices. It turns multiple physical drives on your system into a single large volume group first. Then, you can create logical volumes from that large volume group. It avoids wasted left over storage space.

Logical Volume Manager (LVM)

What does the following command do? $ chmod +x script1.sh

Make the script1.sh file executable

_______ are very scalable, lightweight, and loosely coupled services and fit well in a DevOps.

Microservices

Among the three cloud service models, different models require different levels of _________.

Monitoring

Business on the Cloud require detailed _____ to keep track of all details of their platform in real-time.

Monitoring

The ________ believes that there should be more flexible licensing arrangements available if open-source software is to achieve the greatest impact possible on the software market. It focuses on the availability of the source code and an unrestricted community driven development.

Open-Source Initiative

Licenses that closely align with _________ goals include the Berkeley Software Distribution (BSD), which require little more than that redistributions display the original software's copyright notice and disclaimer.

Open-Source Initiative (OSI)

Cloud _______ is the process of eliminating cloud resource waste by selecting, provisioning, and right-sizing the resources you spend.

Optimization

__________ is a process that automating a series of tasks running on multiple servers or hosts to work together.

Orchestration

If a service provider does not have a region in the country you want, it may have the technology to run on-premise or a colocation data center on your physical location. The technology is called _______ in AWS

Outposts

The main goal of right-sizing is to save costs by preventing _________.

Over-provisioning

Where would you least likely see Linux in use (percentage)?

Personal Computers

When a computer is powered on, the firmware first performs the ________ then runs the ________ code.

Power-On-Self-Test (POST), Unified Extensible Firmware Interface (UEFI)

What is the software that you installed in this book for SSH client on Windows called?

PuTTY

There are many versions of Linux OS. For refrigerators, light, door locks, and other Internet of Things (IoT) devices, you want ___________.

Raspbian

What is the field name of a risk register for the following description? "where does this risk fall on your priority list, in a 1 to 10 scale?"

Rating

Which group of permission is the same?

Read/Execute, r-x, 5

What does the following command do? $ cat test2 > test3

Replace the content of test3 with the content of test2 file

In Ubuntu APT, the sources.list file divides available into multiple repositories that fall into one or more of the four types. _________ packages are officially supported but are built with closed-source software (CSS). Proprietary graphics drivers will often fall into this category.

Restricted

Besides scaling, ________ plays an important part in optimizing resource usage.

Right-sizing

The _________ is the process of analyzing the utilization and performance of your resources, examining the efficiency, adjusting the services as needed. This is a continuous process.

Right-sizing

________ is a process of identification, assessment, and prioritization of likelihood of assets exposing to danger, followed by the coordination of actions and deployment of resources to minimize, monitor, and control the probability and impact of such danger.

Risk management

If your business is a financial institution, such as bank or insurance company, you will have many compliance requirements to meet. Which of the following is among the requirements?

SOX and GLBA

Which of the following software is required to make SSH work?

SSH server and SSH client

_________ describes how all components of IT service management work together as a system to enable value creation with collaboration among stakeholders.

SVS

Which of the following cloud service models require the least extensive monitoring?

SaaS

Cloud optimization is about ________ the right amount of resources to meet your business requirements.

Scaling

There are many versions of Linux OS. There is a distribution specially optimized for scientific and advanced mathematical applications called _______.

Scientific Linux

Which of the following is an advantage of command line interface (CLI) over graphical interface (GUI)?

Script Automation

What does the following command do? locate -i test10 test11

Search for files called test10 or test11

Which of the following is one of the most important knowledge a Linux system administrator should know?

Secure the network ports

When preparing __________ with a cloud provider, business continuity process must be defined to meet the availability requirement of the business.

Service Leve Agreement

_______ is an operating model which outlines the key activities required to respond to demand and facilitate value realization through the creation and management of cloud resources and services.

Service value chain

In Ubunutu, what information will the following command show? $ host www.google.com

Show IPv4 and IPv6 addresses of google.com

In Ubuntu, what information will the following command show? $ ip route show

Show your computer IP address and its gateway IP address

To make easier to use their APIs, many publishers of API provide ______ in different programming languages that act as a convenient wrapper around the HTTP calls.

Software development kits

If a service provider does not have a region in the country you want, it may have the technology to run on-premise or a colocation data center on your physical location. The technology is called _______ in Azure.

Stack Hub

The auto-complete in Bash is a technique you should know. bash watches what you are typing and can often anticipate what it is you are after. You can take advantage of Bash to autocomplete by pushing the ______ key.

Tab

Which of the following statements about Linux kernel is true?

The Linux kernel is handled by the installation and update processes used by the distribution you choose

Cloud computing is virtual, businesses never need to worry about where the physical location of the hardware is. Is this correct?

This is true if the business in a country without data related to laws

_________ is a way to identify these threats in the cloud and neutralize these threats early on.

Threat intelligence

Which of the following activities require the root permission?

To decrease the nice value

What is the program for managing a net filter firewall on Ubuntu called?

UFW

There are many ways to install Linux and even more ways to pick a distribution. In this book, you learned how to install ______ on ________.

Ubuntu, Oracle VM VirtualBox

Computers need firmware to load a boot loader program that will load the whole OS kernel in stages. Modern Linux uses ________ for that purpose. The older technique is called ________.

Unified Extensible Firmware Interface (UEFI), Basic Input Output System (BIOS)

With ______ scaling, you scale up by adding more resources to an existing deployment, for example, by configuring more memory or processing power for a virtual machine.

Vertical

The _______ characteristic of cloud makes elasticity possible.

Virtualization

A good monitoring solution lets you ________ monitoring metrics in near real time.

Visualize

Data sovereignty means that when you're generating or even collecting data through some services in cloud, that data has to stay within certain boundaries. The certain boundaries can be _______.

a country, indigenous populations, consumers of a product (All of the above)

The major cloud providers publish ________ of their certifications that they hold and that you will receive as a part of running your workloads on their cloud.

a long list

"There is a potential risk that a cloud provider may go out of business, but you choose to migrate to the cloud anyway." What type of risk response is this?

acceptance

In Azure, ________ is an identity provider.

active directory

For most vendors, port scanning penetration testing on your own applications is often _________.

allowed without permission

The DevOps and CI/CD are related but not the same. DevOps is ______ while CI/CD is _________.

an agile mindset, an implementation of DevOps

Which of the following is NOT an activity of SVS service value chain?

analysis

What will the following Linux command do? $ nano test1

append content to test 1 if that name exists

For some commands, just the name on its own is enough to return a result. However, you often need to add some combination of ________ to get the most of a command.

arguments and parameters

As a system administrator, for security, you should _________.

assign the administration powers needed by each user only to those who absolutely need them

The ______ of Creative Commons allows redistribution and modification as long as the creator attribution is included.

attribution

In Ubuntu, the authentication related events are logged to the ________ file.

auth.log

Continuous integration (CI) uses software tools, including cloud services, to implement the DevOps principles in an _______ pipeline.

automated

DevOps relies greatly on ________ to catch software issues at an early stage.

automated testing

DevOps environment on cloud ______ the change enablement.

automates

The ________ feature of the cloud is an ideal environment for DevOps.

automation

"You do not migrate the services to any cloud will not have any risks related to the cloud computing." What type of risk response is this?

avoidance

The programming code of any Linux component will _________ for anyone to download, modify, and do just about anything they want with it, even profiting from their own customized versions.

be freely available

In ________, the system's actual behavior from the end user's perspective is tested.

behavior-driven development

UEFI searches the system storage for a partition that includes ________ and other utilities.

bootloaders

If your business is in healthcare, you will have many compliance requirements to meet. Which of the following is among the requirements?

both HIPAA and HITECH

Which of the following is a goal for monitoring the system?

both to identify any rogue or orphan processes and to know whether it is time for a hardware upgrade

The _______ file tells about the capacity and specifications of the CPU. Those files are mostly useful for understanding your system specifications.

capinfo

When you move your operations to the cloud, the cost shifts from _______ to ______ expenditures.

capital, operating

The commands and object names in Bash shell are ___________. Most common will use lowercase.

case-sensitive

The _____ tracking on cloud portal helps you get to the root cause of issues and see what is going on across the servers and environments.

change

In Linux terminal command line, "cd" stands for _________.

change directory

Change enablement of ITIL seeks to maximize the number of successful services and product ________ with minimize the _________ associated with changes.

changes, risk

In Ubuntu, the _______ command assigns memberships to a directory.

chown

There are three lines of defense against network intrusion. Which of the following is such a defense?

close unused ports

The ISO/IEC 17788 provides an overview of _______ computing, a set of terms and definitions, along with security best practices.

cloud

Automatic resource provisioning relies on a concept called Infrastructure as ______.

code

Infrastructure as _______ is a method to infrastructure automation based on practices from software development. It emphasizes consistent, repeatable procedures for provisioning and changing systems and their configuration.

code

Which of the following is the most expensive category of cloud computing?

compute

One of the problems DevOps tries to solve is __________, which arises from using different methods for configuring and deploying resources, often involving automation.

configuration complexity

DevOps aims at providing high-quality software via _______ integration, delivery, improvement, faster feedback and better security.

continuous

DevOps relies heavily on _______ testing to ensure applications work as expected.

continuous

After successful merging and testing phase, a new version of the application can be deployed in the ______ stage of the CI/CD.

continuous delivery (CD)

Humble and Farley (2010) define _______ as a set of practices, which enables to speed up, automate, and optimize the delivery of software to the customer with higher quality and lower risks in a continuous manner.

continuous delivery (CD)

The monitoring stage of ______ will detect any issues like errors and unexpected resource usage. Problems are evaluated, and will result in new updates and bug fixes, thus completing the DevOps loop.

continuous delivery (CD)

_________ is the process of automatically compiling, building, and testing code changes in the hope of catching bugs as they are introduced into the code base.

continuous integration (CI)

DevOps is a set of principles aimed at delivering quality software in small, frequent steps. One way to put these ideas into practice is with __________.

continuous integration and continuous delivery (CI/CD)

What will the following Linux command do? $ cp test1 practice2

copy a file called test1 to practice2 directory

The creative commons share-alike condition and FSF's GPL are related to the ______ distribution system.

copyleft

The book discusses three aspects if cloud security. "Encrypt your data at rest or in transit." Is about which aspect?

core architecture

What does the following command do? $ cat > test1

create a file called test1 and await keyboard input for the content of the file

What will the following Linux command do? $ nano test1

create a new file called test1 if that name is not used

In Bash, what does a single dot (.) mean?

current directory

What will the following Linux command do? $ rm -r practice3

delete a directory called practice3

What will the following Linux command do? $ rm

delete all files in the current directory

What will the following Linux command do? $ rmdir practice3

delete an empty directory called practice3

The monitoring solution from major cloud service providers lets you ______ problems across all your services.

detect and diagnose

In Linux terminal command line, "less" __________.

displays the content of a file, one page at a time

Because Linux is open source, many individuals and groups have created their own versions of the OS, known as _________ or _________ for short, to fit their specialized needs.

distributions, distros

Which of the following is an advantage of command line interface (CLI) over graphical interface (GUI)?

efficiency

Compare to change management, change ______ of ITIL allows IT service to practice in more flexible and less rigid environments.

enablement

If you want to see system-wide shell settings, the file in the ________ directory called __________.

etc, bash.bashrc

Which of the following is NOT an activity of SVS service value chain?

evaluation

Distributions are often grouped into ___________. Rather than having to re-invent the wheel, other communities might fork _________ versions of that parent distro, add their own customizations, and distribute it under a new name.

families, derivative

The locate command is ________ than the find command.

faster

In traditional SDLC, customers are often not satisfied with the result because they don't get to see incremental updates and they cannot give _______.

feedback

The locate command has _________ than that of the find command.

fewer options

In Bash scripts, how do you terminate an if statement?

fi

Change enablement of ITIL allows IT service to practice in more _______ environment.

flexible

Replication between two geographically distant locations is called _______.

geo-redundancy

Inside SVS, ______ is (are) the way(s) in which the organization is directed and controlled.

governance

Without ______ in place, individual business unit and teams have the ability to go out and purchase their own cloud services from a cloud provider.

governance

The __________ command allows you to display the names of files that contain a particular string of characters that matches your search query.

grep

In Ubuntu, the etc/___________ file contains the group name and group id.

group

One efficient way to limit users' system access to just those resources they absolutely need and no more is to assign authority over those resources to a __________, and then add the necessary users as ___________ of the group, allowing them to act with the full powers of the group itself.

group, members

In, Ubuntu, the _______ command creates a new group.

groupadd

The key elements of the SVS are ________, governance, service value chain, practice, and continual improvement.

guiding principles

The operating system is a piece of software in a computer that manages all of the ________, such as keyboard, mouse, printer, and RAM and all of the other ___________.

hardware, software

To see what IP address is mapped to "localhost", you can open the _______ file in the ________ directory.

hosts, etc

If a service provider does not have a region in the country you want, it may have the technology to run on-premise or a colocation data center on your physical location. The technology is called _______ in GCP.

hybrid cloud platform

Oracle VM VirtualBox is cross-platform virtualization software, also known as ________. It allows users to extend a computer to run multiple operating systems at the same time.

hypervisor

Access in the cloud is typically handled by a(n) _______ and ________ service.

identity provider, role-based access control

A problem that DevOps tries to solve is development team and operations team work ________. The problem is common in traditional systems development life cycle (SDLC).

independently from each other

Each _____ has its own set of needs and compliance and regulatory requirements that must be met with the technology stack. Major cloud providers offer solutions to meet the requirements.

industry

If you need in-line documentation help for using a command, say wget, which of the following command would you issue?

info wget

The first step in risk management is asset ____. You need to know what assets are in your environment before you can secure them properly.

inventory

A(n) _______ file can contain a complete OS image.

iso

There are tons of free software in Ubuntu Software Center and It is easy to get help on the Internet because of the _________.

large community

The ________ command gives you a list of all system logins since the beginning of the month

last

Data sovereignty does not always exist in the context of ________. It may be related to information technology architecture or research.

legislation

Data sovereignty does not always exist in the context of _________. The context can be information technology _________ or research.

legislation, architecture

In Linux terminal command line, "ls" stands for _________.

list

If you want to see all files in a directory, including hidden files, use which of the following command?

list -a

If you want to know which spelling dictionary the Ubuntu to check your spelling, which command would you use?

locale

Most commands in Bash shell use ____________.

lowercase

In Ubuntu, the __________ command with -__________ allows you to display the directory attributes.

ls, dl

In Ubuntu, the ________ command with-_________ allows you to display the files attributes.

ls, l

Which of the following Linux terminal command displays all top-level directories?

ls/

In Ubuntu APT, the sources.list file divides available software into multiple repositories that fall into one or more of the four types. Packages available through ________ are officially supported by Canonical (publisher of Ubuntu) and consist exclusively of open source software.

main

There are several ways to avoid cloud provider lock-in. Which of the following is NOT such as way?

make sure the provider is the industry leader

If you need in-line documentation help for using a command, say wget, which of the following command would you issue?

man wget

The _______ file contains information about the capacity and usage of the system memory.

meminfo

"You implement automated disaster recovery on critical servers across cloud regions, When a server in one region is down, another one takes its place automatically." What type of risk response is this?

mitigation

Which of the following command will create a new directory called "exercise"?

mkdir exercise

Before you could make an intelligent decision about improving your system performance, you should______________.

monitor the system

In Bash, there are often more than one way to do something. Providing alternatives make command arguments more accessible for more people. Some people remember things better through ________ while others can enjoy the speed of _________.

more complete descriptions, a single-letter argument

TO keep disk space usage manageable, __________ logs will be deleted altogether after a designated amount of time.

most

Enterprises must meet regulatory and compliance for their business. On cloud, cloud providers are responsible for _________.

most of such requirements

What will the following Linux command do? $ mv test1 practice3

move a file called test1 to practice3 directory

In Ubuntu APT, the sources.list file divides available software into multiple repositories that fall into one or more of the four types. The ________ is a community repo containing software whose use within the open source community is controversial, mostly due to what some feel to be overly restrictive patent protections or complicated legality.

multiverse

The priority of a process in Ubuntu is determined by the _________ value.

nice

To see what software is actually running so you can shut it down, use ________ command.

nmap

For most vendors, denial-of-service attacks penetration testing on your own applications is ________.

not allowed

As a system administrator, for security, you should ___________.

not log in with administrator or root powers

The ________ activity of SVC is to ensure that cloud service components are available when and where they are needed, and that they meet agreed specifications.

obtain/build

What is the software that is required for SSH on Ubuntu called?

openssh-server

DevOps ties software development and ________ instead of having them as separate islands.

operations

In ITIL, the inputs of the SVS are ________.

opportunity and demand

DevOps centralizes configuration in repository and uses _______ to automatically configure services when they're deployed

orchestration

A region ______ is a combination of two regions within the same geography. They never have platform updates done at the same time to minimize the risk of update failure that affects both at the same time.

pair

In Ubunutu, the etc/_________ file no longer contains the password information that once gave it the name. It holds account data for each user and system account

passwd

The _____ command can create a password for a user

passwd

The security issues of using weak passwords, clicking on suspicious links, and disclosing authentication credentials are all related to _______.

people

Non-copy left open-source licenses are often referred to as _________.

permissive

The _________ licenses will typically not require adherence to any parent restrictions as long as the original work is attributed in derivatives. Examples of such licenses are the BSD, MIT, and Apache licenses.

permissive

Which of the following is the least likely a part of communication policy?

phone numbers of all stakeholders.

The _______ command serves two purposes: verifying that the target host is available and determining round-trip time (RTT) or latency

ping

A continuous integration (CI) _________ is a series of steps that must be performed in order to make the increment ready for deployment.

pipeline

The deployment _______ incorporates all activities from CI plus quality assurance (QA) testing activities like integration, performance, and security testing. All these tasks are executed in a defined order of stages.

pipeline

Which of the following is NOT a typical step of continuous integration (CI)?

pipeline

Azure has ______ resource. It is able to help you meet some industry specific requirements.

policy

The ability for data owners to easily move data in and out of the cloud is called data _________.

portability

Inside the SVS, _______ is (are) sets of organizational resources designed for performing work or accomplishing an objective.

practice

By following ITIL, a business can prevent cloud sprawl and instability, reduce the likelihood of service interruption and optimize customer loyalty by merging humans, _______ and technologies into hybrid environments.

procedures

A CI/CD pipeline depends on automatic resource ________ to deploy applications repeatedly and consistently.

provisioning

________ is used by operations to refer to getting computers or virtual hosts ready to use by installing needed libraries or services on the infrastructure.

provisioning

To find where you are within your file systems directory tree at any given time, which command would you use?

pwd

Disaster _______ is the coordinated process of restoring IT infrastructure, including data that is required to support ongoing business services, after a disaster occurs.

recovery

Which of the following are benefits of using SSH?

remote access with secure commnication

What will the following Linux command do? $ rm practice3

remove a file called practice3

You can change the nice value of a running process by using _________.

renice

In addition to the disaster recovery purpose, _______ minimizes latency by bringing data closer to the user.

replication

In addition to publishing their certifications, many cloud providers also have on-demand __________ for you to give your auditors.

reporting

DevOps centralizes configuration in _____ and uses orchestration to automatically configure services when they're deployed.

repository

Continuous integration (CI) is centered around a source code management ______ with frequent _______ of code changes.

repository, merges

Which of the following is NOT a use of Azure Policy?

require payment for reesources

In the context of the cloud, a(n) ______ is any service or component that is managed by the cloud infrastructure.

resource

The risk _________ is the process of controlling the identified risks (Spacey, 2017). Is the strategic process of how stakeholders handling the risks.

response

The last step in risk management is to determine the _________. An asset that is on the Internet has more risk than that on-premise only.

risk around the assets

Which of the following command will remove all content from the current directory?

rm*

The nmap command with the -________ option will scan using the TCP protocol.

sT

On Linux, Bash ________ is (are) like programming code with Bash command as instructions.

scripts

What will the following Linux command do? $ find exercise/practice -iname test**

search any files with file name begins with "test" in the exercise/practice directory

What will the following Linux command do? $ find exercise/practice -empty

search the exercise/practice directory for all empty files

When a business unit or team buy their own cloud, they may not have _________ as a priority or are able to handle ________ issues.

security, security

As a system administrator, for security, you should _________.

separate accounts with unique authentication for each user

There are three lines of defense against network intrusion. Which of the following is such a defense?

service configuration

Among the five components of SVS, the central element is the ________.

service value chain

Inside the SVS, _______ is(are) a set of interconnected activities an organization performs to deliver values to its consumers and to facilitate realization of value.

service value chain

The key elements of the SVS are guiding principles, governance, ________, practice, and continual improvement.

service value chain

In Ubuntu, the etc/__________ file contains encrypted versions of all user passwords.

shadow

The _______ of Creative Commons requires the original license conditions to be included in all future distributions and copies.

share-like

DevOps use ________ to push updates and bug fixes to production in short time intervals, which improves productivity with faster services.

short-release cycles

When a new user is added with a new directory in the home tree with the user's name, the default files in the new directory are copied from the etc/__________ directory.

skel

The _____ file that lives in the etc/apt directory contains all the repository information the APT system will need to do its job.

sources.list

Data ______ means that when you're generating or even collecting data through some services in cloud, that data has to stay within certain boundaries.

sovereignty

Which of the following is likely the least expensive cloud computing payment plan?

spot

The security communication policies deal with who, what, when, and how an incident or outage of a service should be announced. The policy should be well documented and announced to ________.

stakeholders

Since the contents of directory can be edited by any member of the group with execute right, you might be worried that someone might delete another member's files. A solution is adding something called a _________ bit value to the directory permissions.

sticky

In Ubuntu, the _________ command allows you to switch users.

su

A ______ license is one that you periodically to get temporary access.

subscription

In Linux command line, the _______ allows you to elevate your current user account to have root privileges temporarily.

sudo

In Linux command line, using _______ is a good practice to protect the user's computer from being used as a tool for exploration. Whenever a user tries to install, remove or change any piece of software, she has to have the root privileges to perform such tasks.

sudo

User account belongs to the _______ system group could invoke admin powers for just a single command.

sudo

The ________ command allows you to start and stop SSH and other application on Ubuntu.

systemctl

The _______ command can show you how things are currently configured for you, including the DNS server's data.

systemd-resolve --status

You can either create an IaC _______ from scratch with a code editor or use command line tools on the cloud portal to export based on an existing resource.

template

Orchestration relies on IaC ______ and settings that are retrieved from a repository

templates

In _________, the automated tests are described before the coding starts.

test-driven development

Which file(s) will be copied with the following command? $ cp test? practice2

test1 and testa only

What file(s) will be copied with the following command? $ cp test* practice2

test1, test10, testa, or testb

In traditional SDLC, software _________ is ineffective because operational constraints, which are limitations that derive from business requirements and enterprise policies, are not fully implemented due to the lack of customer involvements.

testing

In Linux, nano is a tool for __________.

text editing

The cloud providers are certifying ______ that are running in the clouds.

the architecture and the services

In Bash, what does two dots (..) mean?

the directory one level above the current directory

Which of the following Linux commands would display your time zone?

timedatectl

Which of the following is a goal for monitoring the system?

to identify any rogue or orphan processes

Which of the following is a goal for monitoring the system?

to know whether it is time for hardware upgrade

In Linux terminal command line, "/" indicates ________ directory.

top-level root

Which of the following command will create a new file called "new file" in the current directory?

touch "new file"

"You can acquire cyber insurance to cover the risk." What type of risk response is this?

transfer

In _________, you run in an isolated environment. Whatever happens there, won't disturb other systems.

unit testing

In Ubuntu APT, the sources.list file divides available software into multiple repositories that fall into one or more of the four types. The _______ repo contains open source software maintained by the larger community, not by Canonical.

universe

Keep you linux _________ is an important first step toward security.

updated and patched

You can add new users to your system by ________ command. Add -__________ option to tell Ubuntu to create a new directory in the home tree with the user's name.

useradd, m

In Ubuntu, the ________ command adds a user to a group.

usermod

SVS describes how all components of IT service management work together as a system to enable ______ with collaboration among stakeholders.

value creation

In ITIL, the outputs of the SVS are the ________ to the stakeholders.

values

The text-only log files managed by the syslogd system are saved to the ________ directory

var/log

An organization incurs high cost or major challenges to move to another vendor from a current vendor for its products and services describes ________.

vendor lock-in

Major cloud providers, such as Azure, AWS, and GCP, have global foot print with regions all over the world. It is ______ that they have a region in the country you want that has sovereignty laws

very likely

The ________ files are not persistent and are created dynamically with each system booth and in response to system events.

virtual

The _______ command tells us not only who is logged in, but what they are currently doing.

w

There are three lines of defense against network intrusion. Which of the following is such a defense?

well-designed firewall

If you need in-line documentation help for using a command, say wget, which of the following command would you issue?

wget --help

The _______ command tells us which users are currently logged in, when their sessions began, and where they came from.

who

Cloud vendors divide the ________ into regions, and each region is divided into zones with one or more data centers.

world

The locate command reads a precompiled index of all the files and directories on the system. If you look for files just added, __________.

you may not find it


संबंधित स्टडी सेट्स

LP 10 - Methods in Microbial Ecology

View Set

Econ 360 Exam 1 homework study guide

View Set