Which of the following commands can be used to lock a user’s account so that they cannot log into a Linux server without removing any files, folders, or data?
Correct Answer:
B
🗳️
Which of the following technologies is supported by the majority of cloud providers in order to support the orchestration of containerized applications?
Correct Answer:
A
🗳️
An IT team is currently implementing a custom software platform to address some key needs of the company. Which of the following is considered a functional requirement?
Correct Answer:
A
🗳️
A server on the network is unreachable. What is the best method to verify connectivity between your computer and the remote server?
Correct Answer:
C
🗳️