Winter Sale - Special Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 44314956B5

Good News !!! XK0-005 CompTIA Linux+ Exam is now Stable and Pass

XK0-005 CompTIA Linux+ Exam Question and Answers

CompTIA Linux+ Exam

Last Update 1 week ago
Total Questions : 176

XK0-005 Exam is stable now with all latest questions are added 1 week ago. Just download our Full package and start your journey with CompTIA Linux+ Exam certification. All these CompTIA Exam XK0-005 questions are real and verified by our Experts in the related industry fields.

XK0-005 PDF

XK0-005 PDF (Printable)
$54
$119.99

XK0-005 Testing Engine

XK0-005 PDF (Printable)
$63
$139.99

XK0-005 PDF + Testing Engine

XK0-005 PDF (Printable)
$79.65
$176.99
Question # 1

Which of the following files holds the system configuration for journal when running systemd?

Options:

A.  

/etc/systemd/journald.conf

B.  

/etc/systemd/systemd-journalctl.conf

C.  

/usr/lib/systemd/journalctl.conf

D.  

/etc/systemd/systemd-journald.conf

Discussion 0
Question # 2

A Linux administrator is adding a new configuration file to a Git repository. Which of the following describes the correct order of Git commands to accomplish the task successfully?

Options:

A.  

pull -> push -> add -> checkout

B.  

pull -> add -> commit -> push

C.  

checkout -> push -> add -> pull

D.  

pull -> add -> push -> commit

Discussion 0
Question # 3

Which of the following directories is the mount point in a UEFI system?

Options:

A.  

/sys/efi

B.  

/boot/efi

C.  

/efi

D.  

/etc/efi

Discussion 0
Question # 4

Junior system administrator had trouble installing and running an Apache web server on a Linux server. You have been tasked with installing the Apache web server on the Linux server and resolving the issue that prevented the junior administrator from running Apache.

INSTRUCTIONS

Install Apache and start the service. Verify that the Apache service is running with the defaults.

Typing “help” in the terminal will show a list of relevant event commands.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 4

Options:

Discussion 0
Question # 5

The security team has identified a web service that is running with elevated privileges A Linux administrator is working to change the systemd service file to meet security compliance standards. Given the following output:

Question # 5

Which of the following remediation steps will prevent the web service from running as a privileged user?

Options:

A.  

Removing the ExecStarWusr/sbin/webserver -D SOPTIONS from the service file

B.  

Updating the Environment File line in the [Service] section to/home/webservice/config

C.  

Adding the User-webservice to the [Service] section of the service file

D.  

Changing the:nulti-user.target in the [Install] section to basic.target

Discussion 0
Question # 6

A systems administrator wants to be sure the sudo rules just added to /etc/sudoers are valid. Which of the following commands can be used for this task?

Options:

A.  

visudo -c

B.  

test -f /etc/sudoers

C.  

sudo vi check

D.  

cat /etc/sudoers | tee test

Discussion 0
Question # 7

A Linux administrator is tasked with creating resources using containerization. When deciding how to create this type of deployment, the administrator identifies some key features, including portability, high availability, and scalability in production. Which of the following should the Linux administrator choose for the new design?

Options:

A.  

Docker

B.  

On-premises systems

C.  

Cloud-based systems

D.  

Kubernetes

Discussion 0
Question # 8

A systems administrator is tasked with setting up key-based SSH authentication. In which of the following locations should the administrator place the public keys for the server?

Options:

A.  

~/.sshd/authkeys

B.  

~/.ssh/keys

C.  

~/.ssh/authorized_keys

D.  

~/.ssh/keyauth

Discussion 0
Question # 9

In order to copy data from another VLAN, a systems administrator wants to temporarily assign IP address 10.0.6 5/24 to the newly added network interface enp1s0f1. Which of the following commands should the administrator run to achieve the goal?

Options:

A.  

ip addr add 10.0.6.5/24 dev enpls0f1

B.  

echo "IPV4_ADDRESS=10.0.6.5/24" > /etc/sysconfig/network-scripts/ifcfg-enplsOfl

C.  

ifconfig 10.0.6.5/24 enpsIs0f1

D.  

nmcli conn add lpv4.address-10.0.6.5/24 ifname enpls0f1

Discussion 0
Question # 10

A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing entries in uppercase or lowercase letters should be included in the list. Which of the following commands should the administrator use to accomplish this task?

Options:

A.  

find . -type f -print | xrags grep -ln denied

B.  

find . -type f -print | xrags grep -nv denied

C.  

find . -type f -print | xrags grep -wL denied

D.  

find . -type f -print | xrags grep -li denied

Discussion 0
Question # 11

A Linux administrator is troubleshooting SSH connection issues from one of the workstations.

When users attempt to log in from the workstation to a server with the IP address 104.21.75.76, they receive the following message:

Question # 11

The administrator reviews the information below:

Question # 11

Question # 11

Which of the following is causing the connectivity issue?

Options:

A.  

The workstation has the wrong IP settings.

B.  

The sshd service is disabled.

C.  

The server’s firewall is preventing connections from being made.

D.  

The server has an incorrect default gateway configuration.

Discussion 0
Question # 12

A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following commands will allow the technician to execute those services and continue deploying other microservices within the same terminal section?

Options:

A.  

gedit & disown

B.  

kill 9 %1

C.  

fg %1

D.  

bg %1 job name

Discussion 0
Question # 13

Which of the following technologies can be used as a central repository of Linux users and groups?

Options:

A.  

LDAP

B.  

MFA

C.  

SSO

D.  

PAM

Discussion 0
Question # 14

A systems administrator wants to back up the directory /data and all its contents to /backup/data on a remote server named remote. Which of the following commands will achieve the desired effect?

Options:

A.  

scp -p /data remote:/backup/data

B.  

ssh -i /remote:/backup/ /data

C.  

rsync -a /data remote:/backup/

D.  

cp -r /data /remote/backup/

Discussion 0
Question # 15

Developers have requested implementation of a persistent, static route on the application server. Packets sent over the interface eth0 to 10.0.213.5/32 should be routed via 10.0.5.1. Which of the following commands should the administrator run to achieve this goal?

Options:

A.  

route -i etho -p add 10.0.213.5 10.0.5.1

B.  

route modify eth0 +ipv4.routes "10.0.213.5/32 10.0.5.1"

C.  

echo "10.0.213.5 10.0.5.1 eth0" > /proc/net/route

D.  

ip route add 10.0.213.5/32 via 10.0.5.1 dev eth0

Discussion 0
Question # 16

A Linux systems administrator is setting up a new web server and getting 404 - NOT FOUND errors while trying to access the web server pages from the browser. While working on the diagnosis of this issue, the Linux systems administrator executes the following commands:

Question # 16

Which of the following commands will BEST resolve this issue?

Options:

A.  

sed -i 's/SELINUX=enforcing/SELINUX=disabled/' /etc/selinux/config

B.  

restorecon -R -v /var/www/html

C.  

setenforce 0

D.  

setsebool -P httpd_can_network_connect_db on

Discussion 0
Question # 17

A systems administrator is tasked with creating a cloud-based server with a public IP address.

Question # 17

Which of the following technologies did the systems administrator use to complete this task?

Options:

A.  

Puppet

B.  

Git

C.  

Ansible

D.  

Terraform

Discussion 0
Question # 18

A Linux administrator found many containers in an exited state. Which of the following commands will allow the administrator to clean up the containers in an exited state?

Options:

A.  

docker rm --all

B.  

docker rm $(docker ps -aq)

C.  

docker images prune *

D.  

docker rm --state exited

Discussion 0
Question # 19

A Linux administrator was notified that a virtual server has an I/O bottleneck. The Linux administrator analyzes the following output:

Question # 19

Given there is a single CPU in the sever, which of the following is causing the slowness?

Options:

A.  

The system is running out of swap space.

B.  

The CPU is overloaded.

C.  

The memory is exhausted.

D.  

The processes are paging.

Discussion 0
Question # 20

A Linux administrator is tasked with adding users to the system. However, the administrator wants to ensure the users’ access will be disabled once the project is over. The expiration date should be 2021-09-30. Which of the following commands will accomplish this task?

Options:

A.  

sudo useradd -e 2021-09-30 Project_user

B.  

sudo useradd -c 2021-09-30 Project_user

C.  

sudo modinfo -F 2021-09-30 Project_uses

D.  

sudo useradd -m -d 2021-09-30 Project_user

Discussion 0
Question # 21

User1 is a member of the accounting group. Members of this group need to be able to execute but not make changes to a script maintained by User2. The script should not be accessible to other users or groups. Which of the following will give proper access to the script?

Options:

A.  

chown user2:accounting script.sh

chmod 750 script.sh

B.  

chown user1:accounting script.sh

chmod 777 script.sh

C.  

chown accounting:user1 script.sh

chmod 057 script.sh

D.  

chown user2:accounting script.sh

chmod u+x script.sh

Discussion 0
Question # 22

A cloud engineer is asked to copy the file deployment.yaml from a container to the host where the container is running. Which of the following commands can accomplish this task?

Options:

A.  

docker cp container_id/deployment.yaml deployment.yaml

B.  

docker cp container_id:/deployment.yaml deployment.yaml

C.  

docker cp deployment.yaml local://deployment.yaml

D.  

docker cp container_id/deployment.yaml local://deployment.yaml

Discussion 0
Question # 23

Which of the following tools is commonly used for creating CI/CD pipelines?

Options:

A.  

Chef

B.  

Puppet

C.  

Jenkins

D.  

Ansible

Discussion 0
Question # 24

A systems administrator is compiling a report containing information about processes that are listening on the network ports of a Linux server. Which of the following commands will allow the administrator to obtain the needed information?

Options:

A.  

ss -pint

B.  

tcpdump -nL

C.  

netstat -pn

D.  

lsof -It

Discussion 0
Question # 25

A systems administrator is tasked with preventing logins from accounts other than root, while the file /etc/nologin exists. Which of the following PAM modules will accomplish this task?

Options:

A.  

pam_login.so

B.  

pam_access.so

C.  

pam_logindef.so

D.  

pam_nologin.so

Discussion 0
Question # 26

A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?

Options:

A.  

systemctl stop sshd

B.  

systemctl mask sshd

C.  

systemctl reload sshd

D.  

systemctl start sshd

Discussion 0