<< Prev Question Next Question >>

Question 15/28

An IT associate is responsible for protecting and maintaining the integrity of a set of configuration files. What command could be used to prevent users from modifying these files?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (28q)
Question 1: What is an appropriate cost consideration when implementing ...
Question 2: Which port is normally required to be open for secure remote...
Question 3: Which port is normally required to be open for secure remote...
Question 4: A supervisor instructs an IT associate to encrypt all data o...
Question 5: Which of the following is a solution to providing Internet a...
Question 6: In which file are system and user account passwords stored?...
Question 7: After installing the package 'postfix', what command would y...
Question 8: An IT associate has a web application running on multiple se...
Question 9: Which of the following would be the most appropriate use-cas...
Question 10: An IT associate is creating a business case to adopt a DevOp...
Question 11: Which of the following standard log files would provide the ...
Question 12: Which of the following best describes serverless computing?...
Question 13: Which of the following Git commands creates a new, empty Git...
Question 14: Which of the following best describes the technical term "El...
Question 15: An IT associate is responsible for protecting and maintainin...
Question 16: Which of the following technologies is supported by the majo...
Question 17: What command is used to view new content as it is written to...
Question 18: By default, the Linux operating system uses what access cont...
Question 19: Which measures can be taken to prevent unauthorized access t...
Question 20: What does IaaS stand for?
Question 21: Which option will cause ls to display hidden files and folde...
Question 22: Which of the following best describes the DevOps methodology...
Question 23: Which of the following is a commonly used open source softwa...
Question 24: What command is used to set or change permission attributes ...
Question 25: Encryption that uses both a private key and public key is kn...
Question 26: An IT associate is researching technology options to use at ...
Question 27: Which of the following commands can be used to lock a user's...
Question 28: Which of the following commands can be used to lock a user's...