Which of the following is NOT a valid method to install Terraform on a Linux system?
Think about the package managers and installation tools commonly used for Terraform.
Terraform is not installed via Python's pip package manager. It is distributed as a binary or through OS package managers or container images.
After installing Terraform on your system, which command will correctly display the installed Terraform version?
Try the command that is commonly used to check version for many CLI tools.
The correct command to check Terraform version is 'terraform --version'. Other options are invalid commands and will cause errors.
You want to use Terraform in a CI/CD pipeline that runs on ephemeral Linux containers. Which approach ensures Terraform is available every time the pipeline runs without manual installation steps?
Consider the benefits of container images for repeatable environments.
Using a Docker image with Terraform pre-installed ensures the pipeline environment always has Terraform without extra setup. Manual installs or caching add complexity or are not reliable in ephemeral containers.
Which practice improves security when installing Terraform on a production server?
Think about how to ensure the downloaded software is authentic and untampered.
Verifying the checksum ensures the binary is exactly what HashiCorp published, preventing tampering or corruption. Downloading from untrusted sources or disabling security checks is risky.
You have Terraform version 1.4.0 installed. You run a configuration that requires version >= 1.5.0. What will happen when you run terraform init?
Consider how Terraform enforces version constraints specified in configuration files.
Terraform checks the required version constraint during initialization and fails if the installed version does not meet it. It does not upgrade itself or ignore the requirement.