Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

Note! The XK0-004 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the XK0-005 Exam.

XK0-004 CompTIA Linux+ Certification Exam Questions and Answers

Questions 4

A Linux administrator executed 1vextend to expand disk space to a partition from 8GB to 40GB However, the filesystem is not showing the additional space The administrator runs several commands and rectyes the following output:

XK0-004 Question 4

Which of the following commands should the administrator run to resolve the issue?

Options:

A.

mXfs.extt /dev/mapper/VolQroup00-LogVo100

B.

mkfa_growffa /dev/mapper/Vci;r=.:p00-LogVo100

C.

reaize2ffa /dev/mapper/VolGroup00-LogVo100

D.

parted -a opt /dev/mapper/VolGroup00-LogVo100

Buy Now
Questions 5

The grub2-mXconfig command is used to generate a new GRUB2 configuration after:

Options:

A.

resizing the /best filesystem

B.

changing the/etc/default/grub file

C.

changing the /boat/grub2/grub.cfg file

D.

installing new software from a package

Buy Now
Questions 6

After running an Nmap scan on a local area network, a penetration tester notices several older Linux servers have port 23 open Which of the following should the systems administrator do as a secunty best practice?

Options:

A.

Use a non-standard port for Telnet

B.

Disable and umnstall the Telnet service

C.

Ensure the kernels are up to date with the latest patches

D.

Configure the firewall to allow Telnet access only from trusted networks

Buy Now
Questions 7

A junior Linux administrator receives a help desk ticket from a user who reports being unable to reach the website www.comptia.org. Which of the following commands should the administrator use to verify proper DNS

configuration?

Options:

A.

dig www.comptia.org

B.

ping www.comptia.org

C.

hostname www.comptia.org

D.

netstat www.comptia.org

Buy Now
Questions 8

Which of the following is an M.2 drive device name?

Options:

A.

sr0

B.

hda

C.

nvmeOn0

D.

sda

Buy Now
Questions 9

A Systems administrator needs to examine the output of all kernel-related events since the system was booted. Which of the following would BEST display this information?

Options:

A.

dmesg

B.

modinfo

C.

systemctl

D.

logger

Buy Now
Questions 10

A Linux administrator is creating a new local Linux user account for a web application The account has the following requirements:

• Use/var/www as the home directory

• Have the service_accounts group as its pnmary group

• Have the www user group as a secondary group

• Disable the account when the password expires

Which of the following BEST meets these requirements?

Options:

A.

useradd -D/var/www/-g service_accounts -G www -c 0

B.

useradd -d/var/www/-g service_accounts -f www -g 0

C.

useradd -D/var/www/-g service_accounts -g www -c 0

D.

useradd -d/var/www/-g service_accounts -G www -f 0

Buy Now
Questions 11

A Linux administrator needs to archive all the *.log files in the /var/log directory. The directory has several symbolic link files that need to be included in the car file. Which of the following commands should the administrator run to create

Options:

A.

tar -tvz logarchive.tgz /var/log/".log

B.

tar -xhz Icgarchive.tgz /var/log/*.log

C.

tar -czh logarchive.tgz /var/log/*.log

D.

tar -cpz logarchive.tgz /var/log/*.log

Buy Now
Questions 12

A user tries to log in to the Linux console and receives the following message:

Your account has expired; Please contact your system administrator.

Which of the following commands was MOST likely run to create this behavior?

Options:

A.

passwd

B.

usermod

C.

userdel

D.

chage

Buy Now
Questions 13

Which of the following techniques would BEST ensure the setup and desired state of a server are consistently maintained?

Options:

A.

Configuration management

B.

Network automation

C.

Test automation

D.

Change control management

Buy Now
Questions 14

An administrator has a CSV file named hosts.csv. The contents of hosts.csv include the following:

192.168.2.57,lnx1prd.example.com,Linux,Production

192.168.2.58,lnx2prd.example.com,Linux,Production

192.168.1.4,server15.example.com,Windows,Development

The administrator needs to create a second comma-separated list of only the Linux server IP addresses.

Which of the following commands would achieve this need?

Options:

A.

for ip in $(grep “Linux” hosts.csv | cut –d”,” –f1); do echo –n “$ip,”; done

B.

for ip in $( cut –d”,” –f1 hosts.csv | grep “Linux”); do echo –n “$ip,”; done

C.

for ip in $(grep “Linux” hosts.csv | sed “/$1//’); do echo –n “$ip,”; done

D.

for ip in $(awk –F, ‘{print $1}’ hosts.csv | grep “Linux”); do echo –n “$ip,”; done

Buy Now
Questions 15

After cloning a remote repository, a new feature of that project needs to be developed and integrated into the next major release.

Which of the following is the first Git operation to run to begin working on this new feature immediately after the clone?

Options:

A.

merge

B.

init

C.

diff

D.

branch

Buy Now
Questions 16

A systems administrator needs to see if a mail server is listening on port 25. Which of the following is the BEST command for the administrator to run on the mail server to see if the port is listening for connections?

Options:

A.

netatat -punta1 I grep 25

B.

telnet lecalhost -P 25

C.

ps aux I grap 25

D.

nslookup localhost 25

Buy Now
Questions 17

A systems administrator wants to install a new application that requires the newmod kernel module. Which of

the following commands should the systems administrator use?

Options:

A.

lsof newmod

B.

modinfo newmod

C.

lsmod newmod

D.

modprobe newmod

Buy Now
Questions 18

A user receives an access_denied error when trying to modify a file, even though the file permissions are set

to 777. Which of the following commands should be used to view additional file permissions?

Options:

A.

getsebool

B.

getenforce

C.

ls -z

D.

ps -z

Buy Now
Questions 19

A junior systems administrator is scanning archive.tar files with an antivirus scanner. The administrator is given the following tasks:

  • List all files that are in the archive.tar files.
  • Extract all files from the archive.tar files.

Which of the following actions should be performed to meet these requirements? (Choose two.)

Options:

A.

tar -tvf archive.tar

B.

tar -xf archive.tar

C.

tar -A archive.tar

D.

tar -av archive.tar

E.

tar -r archive.tar

F.

tar -uvz archive.tar

Buy Now
Questions 20

An administrator needs a bootable USB for installing a new Linux machine. The administrator downloaded the

image file and named it as Linux_OS.iso in the /tmp directory. Which of the following commands will

accomplish that task?

Options:

A.

dd input=/tmp/Linux_OS.iso of=/dev/sda bs=512

B.

dd in=/tmp/Linux_OS.iso out=/dev/sdb bs=512

C.

dd if=/tmp/Linux_OS.iso of=/dev/sda bs=512

D.

dd if=/tmp/Linux_OS.iso out=/dev/sdb1 bs=512

Buy Now
Questions 21

A Linux administrator needs to prevent the Postfix mail transfer agent from starting on boot.

Which of the following commands will accomplish this task?

Options:

A.

systemctl stop postfix.service

B.

/etc/init.d/postfix stop

C.

systemctl disable postfix.service

D.

/etc/init.d/postfix disable

Buy Now
Questions 22

A Linux administrator receives a call from the network operations team that one of the database applications is down on a Linux server. The Linux server is configured with RAID 1 for redundancy, and the array /dev/md0 consists of two devices called /dev/sda1 and /dev/sdb1. After looking at the status of the RAID 1 array in the /proc/mdstat file, the administrator discovers the RAID 1 array is degraded and the disk /dev/sdb1 on which the database application was installed appears to have failed.

XK0-004 Question 22

Which of the following steps should the administrator take to remove the device /dev/sdb1 from the RAID array md0? (Choose two.)

Options:

A.

mdadm /dev/md0 --remove /dev/sdb1

B.

mdadm /dev/sdb1 --fail /dev/md0

C.

mdadm /dev/md0 --fail /dev/sdb1

D.

mdadm /dev/sdb1 --remove /dev/md0

E.

racadm --remove /dev/sdb1

F.

racadm --fail /dev/sdb1

Buy Now
Questions 23

A user requested a USB serial device to be added to a desktop computer. The device has built-in kernel driver

support. The administrator tested the device installation and access, but the user cannot access the serial port.

Each time the user attempts to access the device, an error log is created that shows the user does not have

permission to use the serial port. Which of the following will add a user to the group that has serial port

capabilities?

Options:

A.

usermod –a –G serialport $USER

B.

usermod –a –G modem $USER

C.

usermod –a –G dialout $USER

D.

usermod –a –G root $USER

Buy Now
Questions 24

A Linux administrator has downloaded the network-tools-12.1-17.i386.rpm package for installation to a local system. The administrator issues the rpm -ivh nerwork-cools-12.1-17.i386.rpm command to

install the package. After attempting to use the newly installed package, the administrator realizes the package for the system’s architecture was not installed correctly.

Which of the following commands should the administrator use to remove the package from the system?

Options:

A.

rpm -e network-tools

B.

rpm -U network-tools-12.1-17.i386.rpm

C.

rpm -ivh network-tools-12.1-17.i686.rpm

D.

rpm -r network-tools

Buy Now
Questions 25

Which of the following BEST describes the difference between a container and a VM?

Options:

A.

Containers share host OS libraries and a kernel, while VMs have their own libraries and kernel.

B.

Containers are larger than VMs.

C.

VMs share host libraries and a kernel, while containers have their own libraries and kernel.

D.

VMs are larger than containers.

Buy Now
Questions 26

A Linux systems administrator is implementing Source Code Management for the web application server

configuration files located in /etc/httpd/. Which of the following steps should the administrator perform

FIRST?

Options:

A.

Clone the remote repository using ‘git clone’

B.

Create a new repository using ‘git init’

C.

Retrieve the remote changes using ‘git commit’

D.

Configure the directory for git using ‘git config’

Buy Now
Questions 27

Which of the following would allow remote users to access a corporate server? (Choose two.)

Options:

A.

VPN server

B.

SMTP server

C.

NTP server

D.

SSH server

E.

DHCP server

F.

File server

Buy Now
Questions 28

An administrator notices a website hosted on an httpd web server is not loading. Upon further inspection, the

administrator learns there are no httpd processes running. When starting the service, the site operates correctly for a few minutes before the process disappears again.

Which of the following should the administrator consider as the MOST likely possibility before troubleshooting the issue?

Options:

A.

The CPU has too much load, causing it to overheat, and the kernel is automatically killing the processes to

keep the CPU cool.

B.

An external database to which the web server connects is offline, causing httpd to die due to execution

errors.

C.

Shared libraries, which were recently updated, are causing compatibility issues and httpd to die due to

version mismatch.

D.

The out-of-memory killer was activated due to low available memory, causing the kernel to kill the

processes automatically.

E.

The server is intermittently losing access to the network, causing socket errors that trigger httpd to die.

Buy Now
Questions 29

Joe is no longer employed by a company, and Ann is taking over his projects. Several team members work out Of the directory, including Ann. The administrator needs to assign ownership Of all of Joe's files in the /projects directory to Ann. Which of the following should the administrator run to accomplish this task?

XK0-004 Question 29

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

A systems administrator has scheduled a system update for a server. The update includes a resynchronization

of the package database and updates to the current packages and the system distribution packages. Which of

the following commands contains the proper order of this update?

Options:

A.

apt-get upgrade, apt-get dist-upgrade, apt-get update

B.

apt-get update, apt-get upgrade, apt-get dist-upgrade

C.

apt-get dist-upgrade, apt-get upgrade, apt-get update

D.

apt-get update, apt-get dist-upgrade, apt-get upgrade

Buy Now
Questions 31

While trying to access a website hosted on the server, the systems administrator receives the following error message:

XK0-004 Question 31

The administrator then performs some diagnostics:

XK0-004 Question 31

Which of the following commands should the administrator use to fix the issue?

Options:

A.

chown -R www:www /var/www/website

B.

chcon -t httpd_sys_content_t /etc/httpd

C.

chmod -R 777 /var/www/website

D.

restorecon /var/www/html/website/index.html

Buy Now
Questions 32

Joe, a user, creates a short shell script, shortscript.sh, and saves it in his home directory with default

permissions and paths. He then attempts to run the script by typing ./shortscript.sh, but the command

fails to execute.

Which of the following commands would have allowed the script to run?

Options:

A.

chmod u+x shortscript.sh

B.

source ./shortscript.sh

C.

chmod 155 ~/shortscript.sh

D.

chgrp shortscript.sh Joe

Buy Now
Questions 33

A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal?

Options:

A.

# hostnamectl set-hostname “192.168.1.100 production.company.com”

B.

# grep –i IP “${ip addr show} production.company.com” > /etc/resolv.conf

C.

# ip addr add 192.168.1.100/24 dev eth0 && rndc reload production.company.com

D.

# echo “192.168.1.100 production.company.com” >> /etc/hosts

Buy Now
Questions 34

A Linux administrator retrieved a repository of files from a Git server using git clone. The administrator wants to see if a configuration file was added to the repository. Which of the following Git arguments should be used to see the recent modifications?

Options:

A.

fetch

B.

log

C.

init

D.

pull

Buy Now
Questions 35

A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task?

Options:

A.

Use curl to copy each user’s public key file to the respective system

B.

Use cp to copy each user’s public key file to the respective system

C.

Use ssh-copy-id to copy each user’s public key file to the respective system

D.

Use ssh-copy-id to copy each user’s private key file to the respective system

Buy Now
Questions 36

Which of the following is a difference between YAML and JSON?

Options:

A.

Users can comment in YAML but not in JSON

B.

JSON only curly brackets, while YAML only uses square brackets

C.

JSON is used in web development, while YAML is used solely in back-end systems.

D.

YAML has been deprecated for JSON.

Buy Now
Questions 37

A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?

Options:

A.

/etc/services

B.

/etc/issue

C.

/etc/hosts

D.

/etc/motd

Buy Now
Questions 38

Which of the following is true about Type 2 hypervisors?

Options:

A.

Type 2 hypervisors run on top of another general purpose OS.

B.

Type 2 hypervisors are often called bare-metal or native hypervisors.

C.

Type 2 hypervisors offer a performance increase to the guests in comparison to a Type 1 hypervisor.

D.

Only Type 2 hypervisors allow direct access to CPU virtualization features.

Buy Now
Questions 39

A configuration management tool running every minute is enforcing the service HTTPd to be started. To

perform maintenance, which of the following series of commands can be used to prevent the service from

being started?

Options:

A.

systemctl stop httpd && systemctl mask httpd

B.

systemctl disable httpd && systemctl mask httpd

C.

systemctl stop httpd && systemctl hide httpd

D.

systemctl disable httpd && systemctl hide httpd

Buy Now
Questions 40

A systems administrator is configuring options on a newly installed Linux VM that will be deployed to the Pacific time zone. Which of the following sets of commands should the administrator execute to accurately configure the correct time settings?

Options:

A.

cd /etcln –s /usr/share/zoneinfo/US/Pacific localtime

B.

cd /usr/localln –s /usr/share/zoneinfo/US/Pacific zoneinfo

C.

cd /etc/localln –s /usr/share/zoneinfo/US/Pacific localtime

D.

cd /usr/share/localln –s /usr/share/zoneinfo/US/Pacific localectl

Buy Now
Questions 41

An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set.

Which of the following commands would prevent the script from being killed?

Options:

A.

nohup service network restart

B.

service network restart &

C.

echo “service network restart” | at now

D.

dg service network restart

Buy Now
Questions 42

An administrator needs to deploy 100 identical CentOS workstations via PXE boot. Which of the following should the administrator use to minimize the amount of interaction with the consoles needed?

Options:

A.

Kickstart script

B.

Ghost image on a distribution server

C.

Hard disk duplicator

D.

Hard disk duplicator

E.

Ubiquity script

Buy Now
Questions 43

A systems administrator installs a simple package, but the Linux system returns the following error: rpmdb open fails. To verify if there is a problem in the RPM database, the systems administrator runs the following command:

XK0-004 Question 43

Which of the following commands should the systems administrator run NEXT to resolve this issue?

Options:

A.

cd/var/lib/rpm; rpm --rebuilddb ; rm -f _db*; yum clean all

B.

cd/var/lib/rpm; rpm -qd; rpm --rebuilddb; yum clean all

C.

cd/var/lib/rpm; rpm -qa; rm -f _db*; yum clean all

D.

cd/var/lib/rpm; rm -f _db*; rpm --rebuilddb; yum clean all

Buy Now
Questions 44

A junior Linux administrator is trying to verify connectivity to the remote host host1 and display round-trip statistics for ten ICMP.

Which of the following commands should the administrator execute?

Options:

A.

ping –c 10 host1

B.

traceroute –c 10 host1

C.

netstat host1

D.

pathping –c 10 host1

Buy Now
Questions 45

An administrator is uncomfortable allowing users to log in as root. Which of the following ensures that root logins are disallowed?

Options:

A.

usermod -L root

B.

usermod -G root

C.

usermod -B root

D.

usermod -U root

Buy Now
Questions 46

A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space.

Which of the following BEST describes a possible cause for this error?

Options:

A.

The /tmp directory is not mounted.

B.

The filesystem is formatted with a 4MB block size.

C.

the filesystem ran out of inodes.

D.

The /tmp directory has been set with an immutable attribute.

Buy Now
Questions 47

A Linux server needs to be accessed, but the root password is not available.

Which of the following would BEST allow an administrator to regain access and set a new known password at the same time?

Options:

A.

Boot into a single-user mode and reset the password via the passwd command.

B.

Boot into a single-user mode and reset the password by editing the /etc/passwd file.

C.

Boot into a single-user mode and reset the password by editing the /etc/shadow file.

D.

Boot into a single-user mode and reset the password via the chage command.

Buy Now
Questions 48

After starting a long-running script, a systems administrator needs to verify the frequency of what is filling up the /var partition and kill it because it is consuming too much space.

Which of the following is the correct sequence given only a terminal is available?

Options:

A.

1. CTRL-C2. bg3. watch df /var4. CTRL-C5. fg6. CTRL-Z

B.

1. CTRL-C2. fg3. watch df /var4. CTRL-Z5. bg6. CTRL-Z

C.

1. CTRL-Z2. bg3. watch df /var4. CTRL-C5. fg6. CTRL-C

D.

1. CTRL-Z2. bg3. watch df /var4. CTRL-Z5. fg6. CTRL-C

Buy Now
Questions 49

Which of the following commands will verify the size of a swap partition? (Seled TWO).

Options:

A.

lsscsi

B.

cat /proc/meminfo

C.

cat /proc/icports

D.

lausb

E.

lscpu

F.

lablk

Buy Now
Questions 50

An administrator needs to copy files from a Samba share where the server name is accounting. local, the share is reports, and the username is admin. Assuming local directories exist, which of the following commands would connect to the share?

XK0-004 Question 50

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 51

A file server is sharing a directory called /share between team members inside a company. The fileshare

needs to be moved from serverA to /newshare located on serverB with all permissions and attributes

preserved. Which of the following commands would BEST achieve this task?

Options:

A.

rsync -aHAX /share/* serverB:/newshare

B.

dd if=/share/* of=serverB:/newshare

C.

tar -cvf /share/* serverB:/newshare

D.

mirrorlv /share/* serverB:/newshare

Buy Now
Questions 52

A systems administrator copied the latest archive Of the corporate application, corpapp.tar.gz, to a new server. The backup software lists the following entry in the log file:

XK0-004 Question 52

Which of the following should the administrator run to verify the archive copied correctly without corruption?

XK0-004 Question 52

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 53

Which of the following can cause a kernel panic message after a system reboot?

Options:

A.

Processor failure

B.

PXE boot failure

C.

USB device failure

D.

Drive failure

Buy Now
Questions 54

Which of the following commands should a Linux administrator use to open the firewall to allow incoming database connections?

A)

XK0-004 Question 54

B)

XK0-004 Question 54

C)

XK0-004 Question 54

D)

XK0-004 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

A systems administrator a retting an HTTPO server on a Lnux server and configuring as a proxy server The administrator runs the following commands to venfy that the service is running:

XK0-004 Question 55

However, the arjminrstraior is getting a 503 error when browsing to portal.company. internal. After reviewing the logs, the following error information is discovered:

XK0-004 Question 55

Which of the following commands BEST resolves the issue?

Options:

A.

sentforce 0

B.

susearch -m USER_LOGIN -sv no

C.

grep http /var/log/audit/audit,log| audit2why

D.

setsebool -p httpd_can_network_connect 1

Buy Now
Questions 56

A systems administrator needs to prevent the root account from being used to log in to a Linux server via SSH. Which of the following configuration ies does the systems administrator need to edit to perform this task?

Options:

A.

/etc/passwd

B.

/etc/sshd/config

C.

-/.ssh/config

D.

/etc/ayaconfig/sshd

Buy Now
Questions 57

A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file.

Which of the following is the BEST reason to do this?

Options:

A.

To document the infrastructure so it can be included in the system security plan

B.

To ensure the administrator follows the planning phase of the system development life cycle

C.

To define the infrastructure so it can be provisioned consistently with minimal manual tasks

D.

To validate user requirements have been met within each regional datacenter for compliance

Buy Now
Questions 58

Ann, a Linux administrator, is storing scripts in a private Git repository. Which of the following commands should Ann use to avoid entering the login and password every time Ann commits change?

Options:

A.

Git init shared-true

B.

Echo authe n tapprove ‘’>> .git/config

C.

Git credential approve

D.

Git config credential.help cache

Buy Now
Questions 59

A Linux administrator is configuring a group directory in which all members in the Admins group can share and edit files and create subdirectories with the same attributes. The administrator creates the directory as follows:

Mkdir /shared

Chgrp Admins /shared

Which of the following command should the administrator execute so users can work in the directory as required?

Options:

A.

Chmod g+t /shared

B.

Chmod 0666 /shared

C.

Chown Admins /shared

D.

Chmod g+s /shared

Buy Now
Questions 60

A systems administrator has retrieved the latest copy of the system backup files, which had been stored offsite at a third-party vendor. The systems administrator wants to validate that the data was not

modified since the backup.

Which of the following would BEST verify that the data remained the same?

Options:

A.

Perform a MD5 hash on the data.

B.

Perform a SCP from the backup.

C.

Perform rsync.

D.

Restore from the last full backup.

Buy Now
Questions 61

An administrator received a request from a security officer to eliminate a blacklisting set called internal-blocked the company is using in the iptables firewall.

Which of the following commands will complete the task?

Options:

A.

ipset swap internal-blocked none

B.

ipset destroy internal-blocked

C.

ipset del internal-blocked

D.

ipset remove internal-blocked

Buy Now
Questions 62

A system administrator needs to bootstrap a series of Ubuntu images for a public provider. The administrator must ensure at the images contain the exact same updates, custom. Configure files after their first and then automatically. Which of the following tools the administrator user?

Options:

A.

Ansible

B.

Docker

C.

Cloud-init

D.

Anaconda

Buy Now
Questions 63

A Linux administrator needs to know the MAC address of the server’s gateway.

Which of the following commands should the administrator run to obtain this information?

Options:

A.

arp -gw

B.

arp -a

C.

arp -gwi

D.

arp -gtw

Buy Now
Questions 64

A Lunix administrator added storage to an XFS-formatted filesystem at /dev/mapper/vgSlash-lvLog device using the LVM tools. However the additional space does not show up when the administrator runs the df -h command. Which of the following commands should the adiministrator run to resolve thrs issue?

Options:

A.

Xfs-growfs/dev/mapper/vgSlash-lvLog

B.

dd if=dev/zero of=/dev/mapper/vgSlash-IvLog bs=IN

C.

resize2fs /dev/mapper/vgSlash-IvLog

D.

Ivextend –n IvLog VgSlash –L+10G

Buy Now
Questions 65

A remote server reverts to the incorrect time when it is restarted. Which of the following will save the correct time to the BIOS clock once the time and date have been set on the server?

Options:

A.

btime -- settime

B.

btime -- setdate

C.

hwclock -- systohc

D.

date -- setclock

Buy Now
Questions 66

A systems administrator needs to write a script that performs unattended package upgrades. Which of the folowing flags should be used with either yum or apt to meet this goal?

Options:

A.

-u

B.

-q

C.

-y

D.

-d

Buy Now
Questions 67

A Linux administrator needs to change the permission on a script so that the owner has permission to execute. Which of the following BEST accomplishes this task?

Options:

A.

Chmod ug=script,sh

B.

Chmod u+x script,sh

C.

Chmod –x script,sh

D.

Chmod 0644 script,sh

Buy Now
Questions 68

An administrator is utilizing an automation engine that engine that uses SSH to run command on remote systems. Which of the following does this describe?

Options:

A.

Inventory

B.

Agentless architecture

C.

Build automation

D.

Version control

Buy Now
Questions 69

Which of the following commands will result in the HIGHEST compression level when using gzig to compress a file name file, txt?

Options:

A.

Gzip -9 file. text

B.

Gzip -100-file. Text

Crip –high file.txt

C.

Gzip -5 file.txt

D.

Gzip –fast file. text

Buy Now
Questions 70

Which of the following is the MOST common method used to access Windows systems that are running in a cloud provider from a Linux system?

Options:

A.

SSH

B.

NX

C.

XRDP

D.

VNC

Buy Now
Questions 71

An administrator needs to examine two text files and select identical lines from the files. Which of the following commands wooW BEST accomplish this task?

Options:

A.

cat report1 report2 | awk ' {print $2}' | wc -1

B.

cat report1 report2 | sort | uniq -d

C.

cat report1 report2 | grep -v < report1

D.

cat report1 report2 | sort -u | diff

Buy Now
Questions 72

A systems administrator is installing an HTTPD server on a Linux server and configuring it as a proxy server. The administrator runs the following commands to verify that the service is running:

XK0-004 Question 72

However, the administrator is getting a 503 error when browsing to portal . company. internal. After reviewing the logs, the following error information is discovered:

XK0-004 Question 72

Which Of the following commands BEST resolves the issue?

XK0-004 Question 72

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: XK0-004
Exam Name: CompTIA Linux+ Certification Exam
Last Update: Dec 11, 2023
Questions: 483