Exam4Training

CompTIA XK0-004 CompTIA Linux+ Certification Exam Online Training

Question #1

Which of the following is the purpose of the vmlinux file on a Linux system?

  • A . To prevent a Linux kernel panic
  • B . To start a Linux virtual machine
  • C . To provide the executable kernel for the system
  • D . To enable resource access to the network

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://en.wikipedia.org/wiki/Vmlinux

Question #2

A configuration management tool running every minute is enforcing the service HTTPd to be started.

To perform maintenance, which of the following series of commands can be used to prevent the service from being started?

  • A . systemctl stop httpd && systemctl mask httpd
  • B . systemctl disable httpd && systemctl mask httpd
  • C . systemctl stop httpd && systemctl hide httpd
  • D . systemctl disable httpd && systemctl hide httpd

Reveal Solution Hide Solution

Correct Answer: A
Question #3

A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor.

To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?

  • A . OWASP
  • B . VDI
  • C . VMDK
  • D . OVA

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://docs.vmware.com/en/VMware-Fusion/11/com.vmware.fusion.using.doc/GUID-16E390B1-829D-4289-8442-270A474C106A.html

Question #4

All users are reporting that they cannot connect to the SFTP server.

The administrator runs a scan:

Which of the following would allow the administrator to fix the problem?

  • A . Allow SFTP connections on port 22 using /etc/sysconfig/iptables.
  • B . Allow SFTP connections on port 20 and 21 using /etc/sysconfig/iptables.
  • C . Allow SFTP connections on port 25 using /etc/sysconfig/iptables.
  • D . Allow SFTP connections on port 1456 using /etc/sysconfig/iptables.

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Two specific users need access to a directory owned by root where backups are located.

Which of the following commands would BEST ensure the specified users can access the backup files?

  • A . umask
  • B . chcon
  • C . chmod
  • D . setfacl

Reveal Solution Hide Solution

Correct Answer: D
Question #6

A junior systems administrator is upgrading a package that was installed on a Red Hat-based system.

The administrator is tasked with the following:

– Update and install the new package.

– Verify the new package version is installed.

Which of the following should be done to BEST accomplish these task? (Choose two.)

  • A . yum install <package name>
  • B . yum upgrade
  • C . rpm Ce <package name>
  • D . rpm Cqa
  • E . apt-get <package name>
  • F . apt-get upgrade

Reveal Solution Hide Solution

Correct Answer: A,D
A,D

Explanation:

Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/ch-yum

Question #7

A systems administrator observes high latency values when reaching a remote web server.

Which of the following commands will help determine and isolate issues on the network side?

  • A . mtr
  • B . dig
  • C . netstat
  • D . route

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.keycdn.com/support/what-is-latency

Question #8

A junior Linux administrator needs to access production servers using a secure SSH protocol.

Which of the following files should contain the public key to gain remote access to the server?

  • A . ~/ssh/authorized-keys
  • B . /etc/authorized_keys
  • C . /etc/sshd/ssh.conf
  • D . ~/.ssh/authorized_keys

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.linode.com/docs/security/securing-your-server/

Question #9

A systems administrator is configuring options on a newly installed Linux VM that will be deployed to the Pacific time zone.

Which of the following sets of commands should the administrator execute to accurately configure the correct time settings?

  • A . cd /etcln Cs /usr/share/zoneinfo/US/Pacific localtime
  • B . cd /usr/localln Cs /usr/share/zoneinfo/US/Pacific zoneinfo
  • C . cd /etc/localln Cs /usr/share/zoneinfo/US/Pacific localtime
  • D . cd /usr/share/localln Cs /usr/share/zoneinfo/US/Pacific localectl

Reveal Solution Hide Solution

Correct Answer: A
Question #10

A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication. to which of the following files should the RSA token be added to allow this access?

  • A . authorized_keys
  • B . ~/.ssh/ssh_config
  • C . id_rsa.pub
  • D . known_hosts

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on-a-linux-server

Question #11

An administrator notices a directory on a web server named /var/www/html/old_reports that should no

longer be accessible on the web.

Which of the following commands will accomplish this task?

  • A . chmod 000 /var/www/html/old_reports
  • B . chgrp root /var/www/html/old_reports
  • C . chown apache /var/www/html/old_reports
  • D . setenforce apache /var/www/html/old_reports

Reveal Solution Hide Solution

Correct Answer: D
Question #12

A Linux administrator must identify a user with high disk usage.

The administrator runs the # du Cs /home/* command and gets the following output:

Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space.

Which of the following commands will accomplish this task?

  • A . df Ck /home/User/files.txt
  • B . du Ca /home/User3/*
  • C . du Csh /home/User/
  • D . find . Cname /home/User3 -print

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://unix.stackexchange.com/questions/37221/finding-files-that-use-the-most-disk-space

Question #13

A systems administrator wants to deploy several applications to the same server quickly. Each application should be abstracted from the host with its own dependencies and libraries and utilize a minimal footprint.

Which of the following would be BEST in this scenario?

  • A . Virtual machines
  • B . Type 2 hypervisor
  • C . Chroot jails
  • D . Containers

Reveal Solution Hide Solution

Correct Answer: D
Question #14

Given that a company’s policy states that users cannot install third-party tools on Window servers, which of the following protocols will allow a Linux GUI to connect to a Windows server?

  • A . VNC
  • B . NX
  • C . RDP
  • D . X11

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://phoenixnap.com/kb/ssh-to-connect-to-remote-server-linux-or-windows

Question #15

A Linux administrator is adding a static IP address to a network interface on a Linux system.

The administrator modifies the ifcfg- eth0 configuration file with the following settings:

After the administrator restarts the Linux server, the system is not connected to the network.

Which of the following configuration settings needs to be changed?

  • A . Set BOOTPROTO to BOOTP and USERCTL to yes.
  • B . Set BOOTPROTO to NONE and ONBOOT to yes.
  • C . Set USERCTL to yes and ONBOOT to no.
  • D . Set NETMASK to 255.255.0.0 and ONBOOT to yes.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.tecmint.com/set-add-static-ip-address-in-linux/

Question #16

Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?

  • A . UEFI
  • B . PXE
  • C . NFS
  • D . GRUB

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://access.redhat.com/documentation/en-

us/red_hat_enterprise_linux/6/html/installation_guide/ch-boot-x86

Question #17

Which of the following will provide a list of all flash, external, internal, and SSD drives?

  • A . lspci
  • B . lsmod
  • C . lsblk
  • D . lsusb

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.linux.com/learn/intro-to-linux/2017/3/how-format-storage-devices-linux

Question #18

An engineer is working on a production application deployment that requires changing a web application property file called server.property that is managed by the Git version control system. A cloned copy of the remote repository in which the server.property file exists is on the local desktop computer. The engineer makes appropriate changes to the files, saves it as server.property, and executes git commit Cm “changed the property file” server.property.

Which of the following commands did the engineer fail to perform?

  • A . git init server.property
  • B . git merge server.property
  • C . git add server.property
  • D . git push server.property

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.earthdatascience.org/workshops/intro-version-control-git/basic-git-commands/

Question #19

A systems administrator wants to know the current status of a series of dd jobs that were started in the background three hours ago.

Which of the following commands will achieve this task?

  • A . sudo killall CHUP dd
  • B . sudo killall dd
  • C . sudo killall CTERM dd
  • D . sudo killall -USR1 dd

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://askubuntu.com/questions/215505/how-do-you-monitor-the-progress-of-dd

Question #20

DRAG DROP

The lead Linux has added a disk, /dev/sdd, to a VM that is running out of disk space.

Place the following steps in the correct order from first (1) to last (4) to add the disk to the existing LVM.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, application

Description automatically generated


Question #21

A Linux administrator needs to take stock of USB devices attached to the system.

Which of the following commands would be BEST to complete this task?

  • A . lspci
  • B . lsusb
  • C . cat /proc/USB
  • D . modprobe -Cusb

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://linuxhint.com/list-usb-devices-linux/

Question #22

A systems administrator is troubleshooting an intermittent network connection at the IP address 192.168.1.23.

The administrator wishes to monitor the connection at five-minute intervals for one hour.

Which of the following commands will accomplish this task?

  • A . ping -i 5 192.168.1.23
  • B . ping -c 12 192.168.1.23
  • C . ping -c 12 -i 300 192.168.1.23
  • D . ping -c 60 -i 100 192.168.1.23

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://linuxize.com/post/linux-ping-command/

Question #23

Which of the following are Linux desktop managers? (Choose two.)

  • A . KDE
  • B . GNOME
  • C . GUI
  • D . VNC
  • E . X11
  • F . SPICE

Reveal Solution Hide Solution

Correct Answer: D,E
Question #24

A system administrator has deployed a Linux server based on an Anaconda process with all packages and custom configurations necessary to install a web server role.

Which of the following could be used to install more Linux servers with the same characteristics?

  • A . /etc/sysconfig/anaconda/cfg
  • B . /root/anaconda.auto
  • C . /root/anaconda-ks.cfg
  • D . /etc/sysconfig/installation.cfg

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/installation_guide/sn-automating-installation

Question #25

A user has connected a Bluetooth mouse to a computer, but it is not working properly.

Which of the following commands should the systems administrator use to fix the issue?

  • A . lsmod Ci bluetooth
  • B . insmod bluetooth
  • C . modprobe Cr bluetooth
  • D . depmod Ci bluetooth

Reveal Solution Hide Solution

Correct Answer: C
Question #26

An administrator needs to mount the shared NFS file system testhost:/testvolume to mount point /mnt/testvol and make the mount persistent after reboot.

Which of the following BEST demonstrates the commands necessary to accomplish this task?

A)

B)

C)

D)

  • A . Option A
  • B . Option B
  • C . Option C
  • D . Option D

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Which of the following would be the BEST solution for a systems administrator to access the graphical user environment of a Linux machine remotely?

  • A . VNC
  • B . KDE
  • C . X11
  • D . RPC

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.sfu.ca/computing/about/support/tips/remote-to-linux-with-gui.html

Question #28

A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate.

The administrator uses the command renice -n -5 -p2864, but it does not solve the issue.

Which of the following commands should the administrator execute to correct the issue?

  • A . nice -n 5 -p 2864
  • B . nice -n -5 -p 2864
  • C . renice -n 10 -p 2864
  • D . renice -n -10 -p 2864

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

A higher value of priority actually makes the process lower priority; it means the process demands fewer system resources (and therefore is a "nicer" process). A lower priority value means the process demands more resources, possibly denying those resources to processes that are "nicer".

Question #29

A Linux systems administrator installed a new web server, which failed while attempting to start. The administrator suspects that SELinux is causing an issue and wants to temporarily put the system into permissive mode.

Which of the following would allow the administrator to accomplish this?

  • A . echo SELINUX=PERMISSIVE >> /etc/sysconfig/selinux
  • B . setenforce 0
  • C . sestatus 0
  • D . chcon httpd_sys_content_t /var/

Reveal Solution Hide Solution

Correct Answer: B
Question #30

CORRECT TEXT

A junior system administrator had trouble installing and running an Apache web server on a

Linux server. You have been tasked with installing the Apache web server on the Linux server and resolving the issue that prevented the junior administrator from running Apache.

INSTRUCTIONS

Install Apache and start the service. Verify that the Apache service is running with the defaults.

Typing “help” in the terminal will show a list of relevant commands.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CentOS Command Prompt

Reveal Solution Hide Solution

Correct Answer: Solution below.



Question #31

A junior Linux administrator is installing patches using YUM.

The administrator issues the following command: yum list installed

The output of the command is as follows:

Given this scenario and the output, which of the following should the administrator do to address this issue?

  • A . renice Cn 9 Cp 5180
  • B . killall yum
  • C . ps Cef | grep yum
  • D . top | grep yum

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.thegeekdiary.com/yum-command-fails-with-another-app-is-currently-holding-the-yum-lock-in-centos-rhel-7/

Question #32

A Linux systems administrator needs to copy the contents of a directory named “working” on the local working system to a folder /var/www/html on a server named “corporate-web”.

Which of the following commands will allow the administrator to copy all the contents to the web server?

  • A . scp Cr working/* webuser@corporate-web:/var/www/html
  • B . tar working/* webuser@corporate-web:/var/www/html
  • C . cp Cr working/* webuser@corporate-web:/var/www/html
  • D . mv working webuser@corporate-web:/var/www/html

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://unix.stackexchange.com/questions/232946/how-to-copy-all-files-from-a-directory-to-a-remote-directory-using-scp

Question #33

Which of the following server roles would assign a host IP address?

  • A . DHCP
  • B . NTP
  • C . DNS
  • D . SSH

Reveal Solution Hide Solution

Correct Answer: A
Question #34

A junior Linux administrator is optimizing a system in which an application needs to take priority 0 when running the process.

The administrator runs the ps command and receives the following output:

Given this scenario, which of the following steps will address this issue?

  • A . Issue the command ronice Cn 0 Cp 8481
  • B . Issue the command renice Cp 8481
  • C . Issue the command renice Cp 0 ~n 8481
  • D . Issue the command renice Cn 8481

Reveal Solution Hide Solution

Correct Answer: D
Question #35

A Linux administrator is using a public cloud provider to host servers for a company’s website. Using the provider’s tools, the administrator wrote a JSON file to define how to deploy the servers.

Which of the following techniques did the administrator use?

  • A . Infrastructure as code
  • B . Build automation
  • C . Platform as a service
  • D . Automated configuration

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://cloud.google.com/cloud-build/docs/build-config

Question #36

Given the output below:

Which of the following commands can be used to remove MyPhoto.jpg from the current directory?

  • A . unlink ./MyPhoto.jpg
  • B . del Pictures/photo.jpg
  • C . rm Crf ./Pictures
  • D . rm Cf MyPhoto.jpg
  • E . ln Crm ./Pictures/photo.jpg

Reveal Solution Hide Solution

Correct Answer: E
Question #37

An administrator needs to see a list of the system user’s encrypted passwords.

Which of the following Linux files does the administrator need to read?

  • A . /etc/shadow
  • B . /etc/skel
  • C . /etc/passwd
  • D . /etc/pw

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.cyberciti.biz/faq/where-are-the-passwords-of-the-users-located-in-linux/

Question #38

Ann, a junior Linux administrator, needs to copy software from her local machine to assist in developing a software application on a remote machine with the IP address 192.168.3.22. The file needs to be placed on the /tmp directory.

After downloading the RPM to the local machine, which of the following commands would be BEST to use to copy the software?

  • A . scp ~/software.rpm USER@192.168.3.22:/tmp
  • B . scp ~/software.rpm USER@192.168.3.22: /tmp
  • C . wget USER@192.168.3.22:/tmp -f ~/software.rpm
  • D . scp USER@192.168.3.22 ~/software.rpm :/tmp

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://linuxize.com/post/wget-command-examples/

Question #39

A networked has been crashing intermittently. A Linux administrator would like to write a shell script that will attempt to ping the server and email an alert if the server fails to respond. The script will later be scheduled via cron job.

Which of the following scripts would BEST accomplish this task?

  • A . Option A
  • B . Option B
  • C . Option C
  • D . Option D

Reveal Solution Hide Solution

Correct Answer: D
Question #40

An administrator needs to create a shared directory in which all users are able, write, and execute its content but none of the regular users are able to delete any content.

Which of the following permissions should be applied to this shared directory?

  • A . rwxrwxrwt
  • B . rwxrwxrws
  • C . rwxrwxrwx
  • D . rwxrwxrw*

Reveal Solution Hide Solution

Correct Answer: C

Question #41

A Linux administrator implemented a new HTTP server using the default configuration. None of the users on the network can access the server.

If there is no problem on the network or with the users’ workstations, which of the following steps will BEST analyze and resolve the issue?

  • A . Run netstat to ensure the port is correctly bound, and configure the firewall to allow access on ports 80 and 443
  • B . Run route to ensure the port is correctly bound, and configure the firewall to allow access on ports 80 and 443
  • C . Run netcat to ensure the port is correctly bound, and configure a static route to the web to allow access on ports 80 and 443
  • D . Run route to ensure the port is correctly bound, and configure SELinux to allow access on ports 80 and 443

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.varonis.com/blog/netcat-commands/

Question #42

A junior systems is configuring localization option environment variables.

The administrator is given a checklist of tasks with the following requirements:

View current settings of the LC_ALL environment variable only.

Modify the LANG environment variable to US English Unicode.

Given this scenario, which of the following should be performed to meet these requirements? (Choose two.)

  • A . echo $LC_ALL
  • B . locale
  • C . cat $LC_ALL
  • D . export LANG = en_US.UTF-8
  • E . export $LANG = en_US.UTF
  • F . stty

Reveal Solution Hide Solution

Correct Answer: B,D
B,D

Explanation:

Reference: https://www.tecmint.com/set-system-locales-in-linux/

Question #43

A system administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used.

Which of the following files should be watched by the agents?

  • A . /var/log/audit/audit.log
  • B . /var/log/kern.log
  • C . /var/log/monitor
  • D . /etc/rsyslog.conf

Reveal Solution Hide Solution

Correct Answer: D
Question #44

A Linux administrator needs to schedule a cron job to run at 1:15 p.m. every Friday to report the amount of free disk space on the system and to send the output to a file named “freespace”.

Which of the following would meet this requirement?

  • A . 13 15 * * 5 df > /freespace
  • B . 15 13 * * 5 df > /freespace
  • C . 15 1 * * 6 df > /freespace
  • D . 15 13 6 * * df > /freespace

Reveal Solution Hide Solution

Correct Answer: A
Question #45

An administrator needs to see the type of CPU that a server is running.

Which of the following files contains this information?

  • A . /proc/cpuinfo
  • B . /etc/devices/info.conf
  • C . /dev/proc/cpu
  • D . /sys/dev/cpuinfo

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.binarytides.com/linux-cpu-information/

Question #46

A Linux system is running normally when the systems administrator receives an alert that one application spawned many processes. The application is consuming a lot of memory, and it will soon cause the machine to become unresponsive.

Which of the following commands will stop each application process?

  • A . kill ‘pidof application’
  • B . killall application
  • C . kill -9 ‘ps Caux | grep application’
  • D . pkill -9 application

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://www.tecmint.com/how-to-kill-a-process-in-linux/

Question #47

CORRECT TEXT

Find the file named core and remove it from the system.

INSTRUCTIONS

Type “help” to display a list of available commands.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Reveal Solution Hide Solution

Correct Answer: Solution as



Question #48

A systems administrator wants to download a package from a remote server.

Which of the following are the BEST commands to use for this task? (Choose two.)

  • A . curl
  • B . wget
  • C . make
  • D . tar
  • E . zip
  • F . nc

Reveal Solution Hide Solution

Correct Answer: B,F
B,F

Explanation:

Reference:

https://www.linuxtechi.com/nc-ncat-command-examples-linux-systems/

https://www.unifiedremote.com/tutorials/how-to-install-unified-remote-server-deb-via-terminal

Question #49

An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set.

Which of the following commands would prevent the script from being killed?

  • A . nohup service network restart
  • B . service network restart &
  • C . echo “service network restart” | at now
  • D . dg service network restart

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Ann, a user, has created a new directory and noticed that permissions on the new directory are as follows:

drwx——. 1 ann ann 0 Jun 11 08:20 work

Which of the following should the administrator do to restore default permissions for newly created directories?

  • A . Change umask value in /etc/profile.
  • B . Run chmod command to update permissions.
  • C . Modify directory ownership to ann:ann with chown.
  • D . Execute chattr command to restore default access.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://geek-university.com/linux/set-the-default-permissions-for-newly-created-files/

Question #51

An administrator is analyzing a Linux server which was recently hacked.

Which of the following will the administrator use to find all unsuccessful login attempts?

  • A . nsswitch
  • B . faillock
  • C . pam_tally2
  • D . passwd

Reveal Solution Hide Solution

Correct Answer: C
Question #52

A Linux administrator wants to fetch a Git repository from a remote Git server.

Which of the following is the BEST command to perform this task?

  • A . git checkout
  • B . git clone
  • C . git merge
  • D . git config

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://git-scm.com/book/en/v2/Git-Basics-Working-with-Remotes

Question #53

A Linux administrator built a GitLab server. Later that day, a software engineer tried to access the server to upload the repository during the final step of installation. The software engineer could not access the website.

Which of the following firewall rules would allow access to this site?

  • A . iptables CA INPUT Cp tcp Cm multiport –dports 80,443 Cm conntrack Ccstate NEW, ESTABLISHED Cj ACCEPT
  • B . iptables CA INPUT Cp tcp Cm multiport –dports 80,443 Cm conntrack Ccstate ESTABLISHED Cj ACCEPT
  • C . iptables CA INPUT Cp tcp Cm multiport –dports 80,443 Cm conntrack Ccstate RELATED, ESTABLISHED Cj ACCEPT
  • D . iptables CA INPUT Cp tcp Cm multiport –dports 80,443 Cm conntrack Ccstate NEW, ESTABLISHED Cj REJECT

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://serverfault.com/questions/578730/when-using-iptables-firewall-rules-why-assert-new-state-on-all-allowed-ports

Question #54

Which of the following statements BEST represents what the term “agentless” means regarding orchestration?

  • A . Installation of a tool is not required on the remote system to perform orchestration tasks
  • B . It facilitates version control when using infrastructure as code during orchestration
  • C . It automatically removes malware from the remote system during orchestration
  • D . A tool can only be accessed remotely to perform orchestration tasks

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://whatis.techtarget.com/definition/agentless

Question #55

A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts URL.

Which of the following commands would allow the administrator to download the current contents of the URL before updating?

  • A . curl www.comptia.org/contacts
  • B . dig www.comptia.org/contacts
  • C . apt-get www.comptia.org/contacts
  • D . yum list www.comptia.org/contacts

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.thegeekstuff.com/2012/04/curl-examples/

Question #56

Which of the following is a difference between YAML and JSON?

  • A . Users can comment in YAML but not in JSON
  • B . JSON only curly brackets, while YAML only uses square brackets
  • C . JSON is used in web development, while YAML is used solely in back-end systems.
  • D . YAML has been deprecated for JSON.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.json2yaml.com/yaml-vs-json

Question #57

A four-drive Linux NAS has been improperly configured. Each drive has a capacity of 6TB, for a total storage capacity of 24TB.

To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID configuration?

  • A . RAID 01
  • B . RAID 03
  • C . RAID 10
  • D . RAID 50

Reveal Solution Hide Solution

Correct Answer: C
Question #58

A Linux administrator needs every new file created on a directory to maintain the group permissions of the same directory.

Which of the following commands would satisfy this requirement?

  • A . chmod o+s <directory>
  • B . chmod u+s <directory>
  • C . chmod +s <directory>
  • D . chmod g+s <directory>

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://unix.stackexchange.com/questions/115631/getting-new-files-to-inherit-group-permissions-on-linux

Question #59

Which of the following BEST describes running on a Linux system?

  • A . Containers only need the namespaces functionally to run on a Linux system available since kernel 2.6.
  • B . Containers need a hypervisor to run a Linux system. Cgroups namespaces are functionalities used for the kernel but not for running containers.
  • C . Containers only need the cgroups functionality for running on a Linux system. Namespaces is not a Linux kernel functionality needed for creating and managing containers.
  • D . Containers use the cgroups and namespaces functionalities to isolate processes and assign hardware resources to each of those isolated processes.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.linuxjournal.com/content/everything-you-need-know-about-linux-containers-part-ii-working-linux-containers-lxc

Question #60

A Linux administrator wants to obtain a list of files and subdirectories in the /etc directory that contain the word “services”. Once the files and subdirectories are discovered, they should be listed alphabetically in the /var/tmp/foundservices file.

Which of the following shell scripts will accomplish this task?

  • A . #/bin/bashfind /etc Cname services | sort > /var/tmp/foundservices
  • B . #/bin/bashlocate /etc Csort Cname services > /var/tmp/foundservices
  • C . #/bin/bashfind Cname services Csort </var/tmp/foundservices
  • D . #/bin/bashfind /etc Cname services Csort > /var/tmp/foundservices

Reveal Solution Hide Solution

Correct Answer: B

Question #61

An administrator receives a warning about a file system filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the file system.

Which of the following commands would BEST assists the administrator in identifying the problem?

  • A . lsof | grep largelogfile
  • B . pkill /tmp/largelogfile
  • C . pgrep largelogfile
  • D . ps Cef | grep largelogfile

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://access.redhat.com/solutions/2316

Question #62

A company wants to ensure that all newly created files can be modified only by their owners and that all new directory content can be changed only by the creator of the directory.

Which of the following commands will help achieve this task?

  • A . umask 0022
  • B . umask 0012
  • C . chmod CR 0644 /
  • D . chmod CR 0755 /

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.computerhope.com/unix/uumask.htm

Question #63

Joe, a member of the accounting group on a Linux system, is unable to write a file called “taxes” in the accounting shared directory.

The ownership and permissions on the directory and file are as follows:

accounting drwxrw-r– user = ann, group = accounting taxes -rw-r–r–, user = ann, group = accounting

Which of the following commands would allow Joe to write to the file? (Choose two.)

  • A . chmod g+x accounting
  • B . chmod 777 taxes
  • C . chgrp taxes accounting
  • D . chgrp accounting taxes
  • E . chmod 774 accounting
  • F . chmod u+x accounting

Reveal Solution Hide Solution

Correct Answer: A,F
A,F

Explanation:

Reference: https://www.pluralsight.com/blog/it-ops/linux-file-permissions

Question #64

A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space.

Which of the following BEST describes a possible cause for this error?

  • A . The /tmp directory is not mounted.
  • B . The filesystem is formatted with a 4MB block size.
  • C . the filesystem ran out of inodes.
  • D . The /tmp directory has been set with an immutable attribute.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.maketecheasier.com/fix-linux-no-space-left-on-device-error/

Question #65

In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.

Which of the following files should be edited to accomplish this?

  • A . /etc/ssh/sshd_config
  • B . /etc/ssh/ssh_config
  • C . ~/.ssh/ssh_config
  • D . /etc/ssh/known_hosts

Reveal Solution Hide Solution

Correct Answer: A
Question #66

A systems administrator is unable to reach other devices on the network and the Internet. The server is configured with the IP address 192.169.1.50/24 on eth0. The server’s router is 192.168.1.1.

The administrator reviews the output of route Cn:

Which of the following commands should the administrator run to correct the issue?

  • A . route del default gw 192.168.2.1 eth0; route add default gw 192.168.1.1 eth0
  • B . route add Cnet 192.168.10.0 netmask 255.255.255.0 gw 192.168.2.1 eth0
  • C . route add 192.168.1.1 default 192.168.1.50 eth0
  • D . route host gw 192.168.1.1 eth0

Reveal Solution Hide Solution

Correct Answer: B
Question #67

Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue.

The administrator examines the /etc/passwd file and discovers the following entry: joe:x:505:505::/home/joe:/bin/false

Which of the following commands should the administrator execute to resolve the problem?

  • A . usermod Cs /bin/bash joe
  • B . passwd Cu joe
  • C . useradd Cs /bin/bash joe
  • D . chage CE -1 joe

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://doc.lagout.org/security/McGraw-Hill%20-%20Hacking%20Exposed%2C%203rd%20Ed%20-%20Hacking%20Exposed%20Win2.pdf (303)

Question #68

A systems administrator configured a new kernel module, but it stopped working after reboot.

Which of the following will allow the systems administrator to check for module problems during server startup?

  • A . lsmod
  • B . modprobe
  • C . modinfo
  • D . dmesg

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/sec-displaying_information_about_a_module

Question #69

A Linux administrator has installed a web application firewall in front of a web server running on HTTP port 8080 and successfully started the HTTP server. However, after opening the application URL in an Internet browser, the administrator discovered that the application does not work.

The administrator performed the following diagnostic steps:

Output of sysctl -a command:

Output of iptables -L command:

Output of netstat Cnltop | grep "8080":

Which of the following is the NEXT step the administrator should perform to permanently fix the issue at the kernel level?

  • A . sysctl -w net.ipv4.ip_forward=1 then run sysctl -w /etc/sysctl.conf to enable the change
  • B . Edit /etc/sysctl.conf file and add net.ipv4.ip_forward = 1 then run sysctl -p /etc/ sysctl.conf to enable the change
  • C . Add iptables rule iptables -A INPUT -m state –state NEW -p tcp –dport 8080 -j then restart httpd daemon
  • D . Add iptables rule iptables -A FORWARD-m state –state NEW -p tcp –dport 8080 Cj ACCEPT then restart httpd daemon

Reveal Solution Hide Solution

Correct Answer: D
Question #70

A Linux administrator is testing connectivity to a remote host on a shared terminal. The administrator wants to allow other users to access the terminal while the command is executing.

Which of the following commands should the administrator use?

  • A . bg ping remotehost
  • B . fg ping remotehost
  • C . ping remotehost < results
  • D . ping remotehost &

Reveal Solution Hide Solution

Correct Answer: C

Question #70

A Linux administrator is testing connectivity to a remote host on a shared terminal. The administrator wants to allow other users to access the terminal while the command is executing.

Which of the following commands should the administrator use?

  • A . bg ping remotehost
  • B . fg ping remotehost
  • C . ping remotehost < results
  • D . ping remotehost &

Reveal Solution Hide Solution

Correct Answer: C
Question #72

0.0.1 localhost

Which of the following actions should the administrator perform to accomplish this task?

  • A . Modify the /etc/hosts file, and add the ipv6 localhost entry to the file.
  • B . Modify the /etc/hosts file, and add the::1 localhost entry to the file.
  • C . Modify the /etc/hosts file, and add the ipv4 localhost entry to the file.
  • D . Modify the /etc/hosts file, and add the 0.0.0.0 localhost entry to the file.

Reveal Solution Hide Solution

Correct Answer: D
Question #73

A Linux administration is using a Linux system as a router. During the tests, the administrator discovers that IP packets are not being sent between the configured interfaces.

Which of the following commands enables this feature for IPv4 networks?

  • A . cat /proc/sys/net/ipv4/ip_route > 1
  • B . echo “1” > /proc/sys/net/ipv4/ip_forward
  • C . echo “1” > /proc/sys/net/ipv4/ip_route
  • D . echo “1” > /proc/sys/net/ipv4/ip_net

Reveal Solution Hide Solution

Correct Answer: B
Question #74

A user attempts to use the mount -a command but gets the following error:

mount: mount point /mnt/test does not exist

Which of the following commands best describes the action the Linux administrator should take NEXT?

  • A . mount Ca /mnt/test
  • B . mkdir Cp /mnt/test
  • C . mdadm Cp /mnt/test
  • D . mkfs /mnt/test
  • E . touch /mnt/test

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://serverfault.com/questions/751113/mount-point-does-not-exist-despite-creating-it

Question #75

A Linux administrator needs the “tech” account to have the option to run elevated commands as root.

Which of the following commands would BEST meet this goal?

  • A . $ su C tech Cc “/bin/bash”
  • B . # usermod CaG wheel tech
  • C . # sudo CI tech
  • D . # groupadd Cu tech Cg root

Reveal Solution Hide Solution

Correct Answer: C
Question #76

While creating a file on a volume, the Linux administrator receives the following message: No space left on device. Running the df Cm command, the administrator notes there is still 50% of usage left.

Which of the following is the NEXT step the administrator should take to analyze the issue without losing data?

  • A . Run the df Ci command and notice the inode exhaustion
  • B . Run the df Ch command and notice the space exhaustion
  • C . Run the df CB command and notice the block size
  • D . Run the df Ck command and notice the storage exhaustion

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.tecmint.com/how-to-check-disk-space-in-linux/

Question #77

A new corporate policy states that Bluetooth should be disabled on all company laptops.

Which of the following commands would disable the use of Bluetooth?

  • A . echo “blacklist bluetooth” > /etc/modprobe.d/blacklist-bluetooth
  • B . echo “kill bluetooth” > /etc/modprobe.d/kill-bluetooth
  • C . echo “modprobe bluetooth” > /etc/modprobe.d/modprbe-bluetooth
  • D . echo “rmod bluetooth” > /etc/modprobe.d/rmmod-bluetooth

Reveal Solution Hide Solution

Correct Answer: C
Question #78

An administrator needs to generate a list of services that are listening on TCP and/or UDP ports.

Which of the following tools should the administrator use?

  • A . ethtool
  • B . route
  • C . netstat
  • D . portmap

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.tecmint.com/find-open-ports-in-linux/

Question #79

An analyst is trying to determine which public IP addresses are managed by Company A, but the script is not working correctly.

Which of the following explains what is wrong with the script?

  • A . $(cat ip-list.txt) should be changed to `cat ip-list.txt` in the for statement.
  • B . The for should be changed to while in the loop.
  • C . The > should be changed to 2> in the do statement.
  • D . The -ne flag should be changed to -eq in the if statement.

Reveal Solution Hide Solution

Correct Answer: D
Question #80

A systems administrator needs to install a new piece of hardware that requires a new driver. The driver should be manually installed.

Which of the following describes the order of commands required to obtain module information, install the module, and check the log for any errors during module installation?

  • A . lsmod, modprobe, modinfo
  • B . modinfo, insmod, modprobe
  • C . modinfo, insmod, dmesg
  • D . lsmod, insmod, dmesg

Reveal Solution Hide Solution

Correct Answer: A

Question #81

The development team has automated their software build process so each time a change is submitted to the source code repository, a new software build is compiled. They are requesting that the Linux operations team look into automating the deployment of the software build into the test environment.

Which of the following is the benefit to the development team for implementing deployment automation?

  • A . To ensure the build commits are also deployed to the test environment
  • B . To enable notifications when builds are deployed to the test environment
  • C . To ensure software builds in test are not accidentally deployed to production
  • D . To streamline the deployment process for deploying builds into test environments

Reveal Solution Hide Solution

Correct Answer: D
Question #82

A Linux administrator installed a new network adapter and temporarily disabled the network service from starting on boot.

The partial output of chkconfig is as follows:

Which of the following commands BEST describes how the administrator should re-enable the network service?

  • A . chkconfig –level 0 network on
  • B . chkconfig –level 0-6 network on
  • C . chkconfig –level 6 network on
  • D . chkconfig –level 12 network on
  • E . chkconfig –level 345 network on

Reveal Solution Hide Solution

Correct Answer: E
E

Explanation:

Reference: https://www.thegeekdiary.com/how-to-enable-or-disable-service-on-boot-with-chkconfig/

Question #83

Which of the following commands would show the default printer on a Linux system?

  • A . lpr
  • B . lpq
  • C . lpstat
  • D . lspci

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

https://staff.eecis.udel.edu/docs/printing/linux/#:~:text=To%20find%20the%20default%20printer,want%20Asto%20make%20the%20default. https://www.computerhope.com/unix/ulpstat.htm

Question #84

A Linux server has multiple IPs. A Linux administrator needs to verify if the HTTP server port is bound to the correct IP.

Which of the following commands would BEST accomplish this task?

  • A . route
  • B . host
  • C . nslookup
  • D . netstat
  • E . ip

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.tecmint.com/find-listening-ports-linux/

Question #85

A Linux engineer is troubleshooting a newly added SCSI device for a Linux server that needed more disk space without rebooting. The engineer discovers that the new device is not visible by the Linux kernel in fdisk -l output.

Which of the following commands should be used to rescan the entire SCSI bus?

  • A . echo "- – -" > /sys/class/scsi_host/host0/scan
  • B . echo ”> /sys/class/scsi_host/host0/scan
  • C . echo "- – -" > /sys/scsi/scsi_host/host0/scan
  • D . echo "scan" > /sys/class/scsi_host/host0/scan

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://geekpeek.net/rescan-scsi-bus-on-linux-system/

Question #86

Which of the following is the template for the grub.cfg file?

  • A . /etc/default/grub
  • B . /etc/grub2.cfg
  • C . /etc/sysct1.conf
  • D . /boot/efi

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://geek-university.com/linux/grub-version-2/

Question #87

A junior administrator of a physical server receives log messages indicating the out-of-memory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file.

Which of the following should the administrator use to reduce the output of memory messages?

  • A . free : swapoff / swapfile ; swapon -a
  • B . mkswap /swapfile; swapon Ca
  • C . fallocate Cl 2G /swapfile && swapon Ca
  • D . echo “1” > /proc/meninfo ; swapon / swapfile

Reveal Solution Hide Solution

Correct Answer: A
Question #88

Ann, a junior systems administrator, is required to add a line to the /etc/yum.conf file.

However, she receives the following error message when she tries to add the line:

Ann performs some diagnostics to attempt to find the root cause:

Which of the following commands should Ann execute to write content to /etc/yum?

  • A . chmod 755 /etc/yum.conf
  • B . setfacl Cm m:rw /etc/yum.conf
  • C . chattr CI /etc/yum.conf
  • D . setenforce 0

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

https://www.linuxtoday.com/upload/5-chattr-commands-to-make-important-files-immutable-unchangeable-in-linux-141004025008.html

Question #89

A new HTTPS web service is being deployed on a server.

Which of the following commands should the Linux administrator use to ensure traffic is able to flow through the system firewall to the new service?

  • A . iptables CI OUTPUT Cp tcp –sport 443 Cj ACCEPT
  • B . iptables CA INPUT Cp tcp –dport 443 Cj ACCEPT
  • C . iptables CI INPUT –dport 443 Cj ACCEPT
  • D . iptables CA OUTPUT Cp tcp –dport 443 Cj ACCEPT

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.linode.com/docs/security/firewalls/control-network-traffic-with-iptables/

Question #90

A Linux administrator needs to switch from text mode to GUI.

Which of the following runlevels will start the GUI by default?

  • A . Runlevel 3
  • B . Runlevel 4
  • C . Runlevel 5
  • D . Runlevel 6

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: http://www.linfo.org/runlevel_def.html

Question #91

A junior Linux administrator is trying to verify connectivity to the remote host host1 and display round-trip statistics for ten ICMP.

Which of the following commands should the administrator execute?

  • A . ping Cc 10 host1
  • B . traceroute Cc 10 host1
  • C . netstat host1
  • D . pathping Cc 10 host1

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://shapeshed.com/unix-ping/

Question #92

A systems administrator wants to mount an ISO to access its content. Using /mnt as a mount point, which of the following is the correct syntax?

  • A . mount -o iso9660 /dev/sr0 /mnt
  • B . mount -o loop -t iso /mnt
  • C . mount -o loop /tmp/image.iso /mnt
  • D . mount -o loop /dev/kvm /mnt

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.cyberciti.biz/tips/how-to-mount-iso-image-under-linux.html

Question #93

An administrator is tasked with increasing the size of the volume /dev/vg/lv to 20GB.

Which of the following BEST illustrates the steps the administrator should take?

  • A . vgextend CL20G /dev/vg/lv; resizelv /dev/vg/lv
  • B . parted CL20G /dev/vg/lv; remount /dev/vg/lv
  • C . mkfs CL20G /dev/vg/lv; tune2fs /dev/vg/lv
  • D . lvextend CL20G /dev/vg/lv; resize2fs /dev/vg/lv

Reveal Solution Hide Solution

Correct Answer: D
Question #94

A systems administrator has received reports of intermittent network connectivity to a particular website.

Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?

  • A . mtr www.comptia.org
  • B . tracert www.comptia.org
  • C . ping www.comptia.org
  • D . netstat www.comptia.org

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://www.lifewire.com/traceroute-linux-command-4092586

Question #95

An administrator needs to look at a log for an application on a systemd-based system. There is no log for this application in /var/log.

Which of the following is another way to view the application log on this system?

  • A . tail -f /var/log/secure
  • B . journalctl Cu application
  • C . systemctl application.service
  • D . watch /var/lib/application/

Reveal Solution Hide Solution

Correct Answer: C
Question #96

An administrator has written the following Bash script:

All necessary files exist in the correct locations.

However, when the administrator executes /home/user/test.sh the following error is received:

No such file or directory

Which of the following is the MOST likely cause of the error?

  • A . The shebang points to the wrong path.
  • B . The script is not executable.
  • C . The formatting of the file is incorrect.
  • D . Nslookup is not installed.

Reveal Solution Hide Solution

Correct Answer: A
Question #97

Joe, a user, reports that he is no longer able to write files to his home directory. Upon inspection, the Linux administrator discovers that attempting to create a new file gives the following error: No space left on device. However, the disk and partition are not full.

Which of the following commands would be BEST for the administrator to use to continue troubleshooting this problem?

  • A . rm -Rf ~/.*
  • B . fsck -y /dev/sda1
  • C . df -i
  • D . fdisk /dev/sda

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.linuxtechi.com/11-df-command-examples-in-linux/

Question #98

A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment.

Which of the following commands should be run on each of the testing systems to BEST meet this goal?

  • A . # hostnamectl set-hostname “192.168.1.100 production.company.com”
  • B . # grep Ci IP “${ip addr show} production.company.com” > /etc/resolv.conf
  • C . # ip addr add 192.168.1.100/24 dev eth0 && rndc reload production.company.com
  • D . # echo “192.168.1.100 production.company.com” >> /etc/hosts

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/networking_guide/sec_configuring_host_names_using_ hostnamectl

Question #99

A company wants to provide internal identity verification services for networked devices.

Which of the following servers should be installed?

  • A . SSH
  • B . VPN
  • C . CA
  • D . DHCP
  • E . DNS

Reveal Solution Hide Solution

Correct Answer: C
Question #100

A Linux administrator opens a ticket to have an external hard drive mounted. As a security policy, external storage kernel modules are disabled.

Which of the following is the BEST command for adding the proper kernel module to enable external storage modules?

  • A . rmmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko
  • B . modinfo /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko
  • C . depmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko
  • D . insmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.cyberciti.biz/faq/linux-how-to-load-a-kernel-module-automatically-at-boot-time/

Question #101

An administrator reviews the following configuration file provided by a DevOps engineer:

Which of the following would the application parsing this file MOST likely have to support?

  • A . YAML
  • B . AJAX
  • C . JSON
  • D . SOAP

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version