Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

XK0-006 CompTIA Linux+ V8 Exam Questions and Answers

Questions 4

Which of the following best describes a use case for playbooks in a Linux system?

Options:

A.

To provide a set of tasks and configurations to deploy an application

B.

To provide the instructions for implementing version control on a repository

C.

To provide the security information required for a container

D.

To provide the storage volume information required for a pod

Buy Now
Questions 5

Which of the following commands should a Linux administrator use to determine the version of a kernel module?

Options:

A.

modprobe bluetooth

B.

lsmod bluetooth

C.

depmod bluetooth

D.

modinfo bluetooth

Buy Now
Questions 6

Which of the following utilities supports the automation of security compliance and vulnerability management?

Options:

A.

SELinux

B.

Nmap

C.

AIDE

D.

OpenSCAP

Buy Now
Questions 7

A systems administrator manages multiple Linux servers and needs to set up a reliable and secure way to handle the complexity of managing event records on the OS and application levels. Which of the following should the administrator do?

Options:

A.

Create an automated process to retrieve logs from the server by demand.

B.

Implement a centralized log aggregation solution.

C.

Configure daily automatic backups of logs to remote storage.

D.

Deploy log rotation procedures to manage the records.

Buy Now
Questions 8

A systems administrator needs to open the DNS TCP port on a Linux system from network 10.0.0.0/24. Which of the following commands should the administrator use for this task?

Options:

A.

ufw allow dns/tcp to 10.0.0.0/24

B.

ufw enable 53/tcp from 10.0.0.0/24

C.

ufw allow 53/tcp from 10.0.0.0/24

D.

ufw disable from 10.0.0.0/24

Buy Now
Questions 9

While hardening a system, an administrator runs a port scan with Nmap, which returned the following output:

XK0-006 Question 9

Which of the following is the best way to address this security issue?

Options:

A.

Configuring a firewall to block traffic on port 23 on the server

B.

Changing the system administrator's password to prevent unauthorized access

C.

Closing port 80 on the network switch to block traffic

D.

Disabling and removing the Telnet service on the server

Buy Now
Questions 10

An administrator is investigating the reason a Linux workstation is not resolving the website http://www.comptia.org. The administrator executes some commands and receives the following output:

XK0-006 Question 10

Which of the following is the most likely cause?

Options:

A.

The static entry needs to be removed from /etc/hosts.

B.

The remote website does not support IPv6, and the workstation requires it.

C.

The firewall needs to be modified to allow outbound HTTP and HTTPS.

D.

The nameserver in /etc/resolv.conf needs to be updated to 8.8.8.8

Buy Now
Questions 11

Which of the following is the main reason for setting up password expiry policies?

Options:

A.

To avoid using the same passwords repeatedly

B.

To mitigate the use of exposed passwords

C.

To force usage of passwordless authentication

D.

To increase password strength and complexity

Buy Now
Questions 12

A systems administrator attempts to edit a file as root, but receives the following error:

XK0-006 Question 12

Which of the following commands allows the administrator to edit the file?

Options:

A.

chown root /etc/resolv.conf

B.

chattr -i /etc/resolv.conf

C.

chmod 750 /etc/resolv.conf

D.

chgrp root /etc/resolv.conf

Buy Now
Questions 13

An administrator added a new disk to expand the current storage. Which of the following commands should the administrator run first to add the new disk to the LVM?

Options:

A.

vgextend

B.

lvextend

C.

pvcreate

D.

pvresize

Buy Now
Questions 14

Which of the following is a characteristic of Python 3?

Options:

A.

It is closed source.

B.

It is extensible through modules.

C.

It is fully backwards compatible.

D.

It is binary compatible with Java.

Buy Now
Questions 15

A Linux administrator receives reports about MySQL service availability issues. The administrator observes the following information:

    uptime -p shows the system has been up for only 2 minutes

    journalctl shows messages indicating:mysqld invoked oom-killermysqld cpuset=/ mems_allowed=0

Which of the following explains why the server was offline?

Options:

A.

The process exhausted server memory.

B.

The process was intentionally terminated by a privileged user.

C.

The process crashed because of a filesystem error.

D.

A network outage caused a service availability issue.

Buy Now
Questions 16

A Linux systems administrator is running an important maintenance task that consumes a large amount of CPU, causing other applications to slow. Which of the following actions should the administrator take to help alleviate the issue?

Options:

A.

Increase the available CPU time with pidstat.

B.

Lower the priority of the maintenance task with renice.

C.

Run the maintenance task with nohup.

D.

Execute the other applications with the bg utility.

Buy Now
Questions 17

An administrator needs to verify the user ID, home directory, and assigned shell for the user named "accounting." Which of the following commands should the administrator use to retrieve this information?

Options:

A.

getent passwd accounting

B.

id accounting

C.

grep accounting /etc/shadow

D.

who accounting

Buy Now
Questions 18

A systems administrator wants to review the amount of time the NetworkManager service took to start. Which of the following commands accomplishes this goal?

Options:

A.

resolvectl

B.

journalctl

C.

systemctl daemon-reload

D.

systemd-analyze blame

Buy Now
Questions 19

An administrator must secure an account for a user who is going on extended leave. Which of the following steps should the administrator take? (Choose two)

Options:

A.

Set the user’s files to immutable.

B.

Instruct the user to log in once per week.

C.

Delete the user’s /home folder.

D.

Run the command passwd -l user.

E.

Change the date on the /home folder to that of the expected return date.

F.

Change the user’s shell to /sbin/nologin.

Buy Now
Questions 20

A Linux administrator tries to install Ansible in a Linux environment. One of the steps is to change the owner and the group of the directory /opt/Ansible and its contents. Which of the following commands will accomplish this task?

Options:

A.

groupmod -g Ansible -n /opt/Ansible

B.

chown -R Ansible:Ansible /opt/Ansible

C.

usermod -aG Ansible /opt/Ansible

D.

chmod -c /opt/Ansible

Buy Now
Questions 21

An administrator updates the network configuration on a server but wants to ensure the change will not cause an outage if something goes wrong. Which of the following commands allows the administrator to accomplish this goal?

Options:

A.

netplan try

B.

netplan rebind

C.

netplan ip

D.

netplan apply

Buy Now
Questions 22

A Linux administrator is making changes to local files that are part of a Git repository. The administrator needs to retrieve changes from the remote Git repository. Which of the following commands should the administrator use to save the local modifications for later review?

Options:

A.

git stash

B.

git pull

C.

git merge

D.

git fetch

Buy Now
Questions 23

An administrator is trying to terminate a process that is not responding. Which of the following commands should the administrator use in order to force the termination of the process?

Options:

A.

kill PID

B.

kill -1 PID

C.

kill -9 PID

D.

kill -15 PID

Buy Now
Questions 24

On a Kubernetes cluster, which of the following resources should be created in order to expose a port so it is publicly accessible on the internet?

Options:

A.

Deployment

B.

Network

C.

Service

D.

Pod

Buy Now
Questions 25

In the echo "profile-$num-$name" line of a shell script, the variable $num seems to not be expanding during execution. Which of the following notations ensures the value is expanded?

Options:

A.

echo "profile-$(num)-$name"

B.

echo 'profile-$num-$name'

C.

echo "profile-'$num'-$name"

D.

echo "profile-${num}-$name"

Buy Now
Questions 26

Which of the following most accurately describes a webhook?

Options:

A.

An authentication method for web-server communication

B.

An SNMP-based API for network device monitoring

C.

A means to transmit sensitive information between systems

D.

An HTTP-based callback function

Buy Now
Exam Code: XK0-006
Exam Name: CompTIA Linux+ V8 Exam
Last Update: Jan 26, 2026
Questions: 87

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now XK0-006 testing engine

PDF (Q&A)

$43.57  $124.49
buy now XK0-006 pdf