linux foundation LFCA Exam Questions

Questions for the LFCA were updated on : Nov 21 ,2025

Page 1 out of 4. Viewing questions 1-15 out of 60

Question 1

What file is created to assemble a Docker image, which contains all the commands a user has to run
to make the image from start to finish?

  • A. DockerBuild
  • B. Dockerfile
  • C. BuildFile
  • D. ImageFile
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

What command is used to set or change permission attributes of files (such as read, write, execute)?

  • A. chacl
  • B. chmod
  • C. chown
  • D. setattr
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What command is used to view new content as it is written to a log file?

  • A. cat
  • B. grep -f
  • C. cut -f1-5
  • D. tail -f
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

A supervisor instructs an IT associate to encrypt all data on a particular partition on a Linux database
host. What open source technology would be used to encrypt the data?

  • A. MD5
  • B. LUKS
  • C. BitLocker
  • D. ext4
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What is the Linux kernel?

  • A. It is the core interface between a computer's hardware and its processes.
  • B. It is another name for the operating system.
  • C. It contains all the applications and software installed on the computer.
  • D. It is the firmware for the computer's processor.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following authentication method types would include using a password in combination
with a hardware token?

  • A. Multi-Factor Authentication
  • B. Multi-Staged Security
  • C. Hardware Encryption Authentication
  • D. Multi-Step Analysis
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

The Linux kernel uses a:

  • A. dual architecture B microkernel architecture
  • C. monolithic architecture
  • D. hybrid microkernel architecture
Answer:

C

User Votes:
A
50%
C
50%
D
50%
Discussions
vote your answer:
A
C
D
0 / 1000

Question 8

A team just developed a new feature on the company’s main web application. An IT associate wants
to test this new feature by making it available for only 10% of the users. If everything works without
any problems for a week, the associate will then make it available for all users. Which release type
should be used to achieve this goal?

  • A. Canary release
  • B. Experimental release
  • C. Alpha release
  • D. Beta release
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following is considered a best practice for hardening SSHD?

  • A. Using portknocking to protect ssh access for root
  • B. Completely disabling ssh access
  • C. Disabling ssh access for root
  • D. Renaming root to a random name
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What command do you use to view the structure of system directory hierarchies?

  • A. tree
  • B. fee | ls /etc
  • C. ls -t
  • D. ls tree
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

On systemd-based Linux systems, what are runlevels called?

  • A. Services
  • B. Targets
  • C. Units
  • D. Modes
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which type of cloud computing combines on-premise infrastructure with a public cloud?

  • A. Super cloud
  • B. Combination cloud
  • C. Hybrid cloud
  • D. Mixed cloud
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What software application architecture allows teams to iterate quickly and to develop software
applications to scale rapidly?

  • A. Serverless architecture
  • B. Container architecture
  • C. SOA architecture
  • D. Micro-service architecture
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

What technology could be used to address software dependency conflicts between applications on
the same host operating system?

  • A. Type 1 hvpervisors
  • B. Type 2 hvpervisors
  • C. Containers
  • D. cgroups
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

An IT associate has a web application running on multiple servers, configured to scale based on CPU
usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed
to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an
entire AZ went down, and the application experienced downtime. What can the IT associate do to
increase the availability of the application?

  • A. Increase the minimum to 2
  • B. Change to scale based on number of requests
  • C. Decrease the AZs to 2
  • D. Increase the maximum to 6
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2