[Latest Update] CompTIA XK0-005 Actual Exam Practice Questions Shared Online PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: [Latest Update] CompTIA XK0-005 Actual Exam Practice Questions Shared Online


1
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
XK0-005QAs CompTIA Linux Certification
Exam Pass CompTIA XK0-005 Exam with 100
Guarantee Free Download Real Questions Answers
PDF and VCE file from https//www.leads4pass.com
/xk0-005.html 100 Passing Guarantee 100 Money
Back Assurance Following Questions and Answers
are all new published by CompTIA Official Exam
Center
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
2
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
  • QUESTION 1
  • A Linux administrator generated a list of users
    who have root-level command-line access to the
    Linux server to meet an audit requirement. The
    administrator analyzes the following /etc/passwd
    and /etc/sudoers files cat /etc/passwd rootx
    00 /home/root /bin/bash lee x 500 500
    /home/lee/bin/tcsh malloryx 501501
    /root/bin/bash evex 502 502
  • /home/eve/bin/nologin carlx0503
    /home/carl/bin/sh bobx 504 504
    /home/bob/bin/ksh alicex 505505
  • /home/alice/bin/rsh cat /etc/sudoers
    Cmnd_Alias SHELLS /bin/tcsh, /bin/sh, /bin/bash
    Cmnd_Alias SYSADMIN
  • /usr/sbin/tcpdump ALL (ALL) ALL ALL NOPASSWD
    SYSADMIN Which of the following users, in
    addition to the root user, should be listed in
    the audit report as having root-level
    command-line access? (Select two).
  • Carl
  • Lee
  • Mallory
  • Eve
  • Bob
  • Alice

QUESTION 2 A systems administrator installed a
new software program on a Linux server. When the
systems administrator tries to run the program,
the following message appears on the screen.
Which of the following commands will allow the
systems administrator to check whether the system
supports virtualization? A. dmidecode -s
system-version
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
3
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
B. lscpu C. sysctl -a D. cat /sys/device/system/c
pu/possible Correct Answer B Explanation The
command that will allow the systems administrator
to check whether the system supports
virtualization is lscpu. This command will
display information about the CPU architecture,
such as the number of CPUs, cores, sockets,
threads, model name, frequency, cache size, and
flags. One of the flags is vmx (for Intel
processors) or svm (for AMD processors), which
indicates that the CPU supports hardware
virtualization. If the flag is present, it means
that the system supports virtualization. If the
flag is absent, it means that the system does not
support virtualization or that it is disabled in
the BIOS settings. The other options are not
correct commands for checking whether the system
supports virtualization. The dmidecode -s
system-version command will display the version
of the system, such as the product name or serial
number, but not the CPU information. The sysctl
-a command will display all the kernel
parameters, but not the CPU flags. The cat
/sys/devices/system/cpu/possible command will
display the range of possible CPUs that can be
online or offline, but not the CPU features.
References lscpu(1) - Linux manual page How To
Check If Virtualization is Enabled in Windows 10
/ 11
  • QUESTION 3
  • A user is unable to log on to a Linux
    workstation. The systems administrator executes
    the following command cat /etc/shadow grep
    user1
  • The command results in the following output
  • user1 ! 6QERgAsdvojadv4asdvaarC/9dj34GdafGVareg
    mkdsfa188750999997 Which of the following
    should the systems administrator execute to fix
    the issue?
  • chown -R userluser1 /home/user1
  • sed -i \\'/ / /g\\' /etc/shadow
  • chgrp user1user1 /home/user1
  • passwd -u user1 Correct Answer D
  • The output shows that the user1 account has a
    locked password, indicated by the exclamation
    point (!) in the second field of the /etc/shadow
    file1. To unlock the password and allow the user
    to log in, the systems administrator should use
    the passwd command with the -u (unlock) option2.
    References 1 Understanding the /etc/shadow File
    2 How To Use The Passwd Command In Linux

QUESTION 4 A systems administrator is tasked
with changing the default shell of a system
account in order to disable iterative logins.
Which of the following is the best option for the
administrator to use as the new shell? A.
/sbin/nologin
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
4
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
B. /bin/ sh C. /sbin/ setenforce D. /bin/bash
Correct Answer A The /sbin/nologin shell is a
special shell that prevents the user from logging
into an interactive session. It is commonly used
for system accounts that are not meant to be
accessed by users, such as daemon or service
accounts. When a user tries to log in with this
shell, they will see a message like "This account
is currently not available" and the login will
fail. References The /sbin/nologin shell is
listed as one of the valid shells in the
/etc/shells file1. The CompTIA Linux
Certification Exam Objectives mention that the
candidate should be able to "configure and manage
system accounts and groups, including password
aging and restricted shells" as part of the
Hardware and System Configuration domain2. The
usermod command can be used to change the
user\\'s login shell with the -s or --shell
option3. For example, to change the shell of a
user named daemon to /sbin/nologin, the command
would be sudo usermod -s /sbin/nologin daemon
QUESTION 5 DRAG DROP You have been asked to
parse a log file of logins to determine various
information about who is logging in and when.
INSTRUCTIONS Open and inspect the Login log
file. Drag and drop the correct commands onto the
output that was generated from that
command. Tokens can be used only once and not
all will be used. If at any time you would like
to bring back the initial state of the
simulation, please click the Reset All button.
Select and Place
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
5
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
6
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
Correct Answer
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
7
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
8
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
  • QUESTION 6
  • Which of the following commands is used to
    configure the default permissions for new files?
  • setenforce
  • sudo
  • umask
  • chmod
  • Correct Answer C
  • Explanation The command that is used to
    configure the default permissions for new files
    is umask. The umask command is a tool for setting
    the default permissions for new files and
    directories on Linux systems. The umask value is
    a four-digit octal number that represents the
    permissions that are subtracted from the default
    permissions. The default permissions for files
    are 666, which means read and write for owner,
    group, and others. The default permissions for
    directories are 777, which means read, write, and
    execute for owner, group, and others. The umask
    value consists of four digits the first digit is
    for special permissions, such as setuid, setgid,
    and sticky bit the second digit is for the owner
    permissions the third digit is for the group
    permissions and the fourth digit is for the
    others permissions. The umask value can be
    calculated by subtracting the desired permissions
    from the default permissions. For example, if the
    desired permissions for files are 664, which
    means read and write for owner and group, and
    read for others, then the umask value is 002,
    which is 666 - 664. The command umask 002 will
    set the umask value to 002, which will ensure
    that only file owners and group members can
    modify new files by default. The command that is
    used to configure the default permissions for new
    files is umask. This is the correct answer to the
    question. The other options are incorrect because
    they either do not set the default permissions
    for new files (setenforce, sudo, or chmod) or do
    not exist (kill -HUP or kill
  • -TERM). References CompTIA Linux (XK0-005)
    Certification Study Guide, Chapter 11 Managing
    File Permissions and Ownership, page 349.
  • QUESTION 7
  • A Linux engineer needs to download a ZIP file and
    wants to set the nice of value to -10 for this
    new process. Which of the following commands will
    help to accomplish the task?
  • nice -v -10 wget https//foo.com/installation.zi
    p
  • renice -v -10 wget https//foo.com/installation.
    2ip
  • renice -10 wget https//foo.com/installation.zip
  • nice -10 wget https//foo.com/installation.zip
    Correct Answer D
  • Explanation The nice -10 wget https//foo.com/ins
    tallation.zip command will help to accomplish the
    task of downloading a ZIP file and setting the
    nice value to -10 for this new process. The nice
    command can be used to run a program with a
  • modified scheduling priority, which affects how
    much CPU time the process receives. The nice
    value ranges from -20 (highest priority) to 19
    (lowest priority), and the default value is 0.
    The -10 option specifies the nice value to be
    used for the

XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
9
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
wget command, which will download the ZIP file
from the given URL. The nice -v -10 wget
https//foo.com/installation.zip command is
incorrect, as -v is not a valid option for nice.
The renice -v -10 wget https//foo.com/installatio
n.zip command is incorrect, as renice is used
to change the priority of an existing process,
not a new one. The renice -10 wget
https//foo.com/installation.zip command is
incorrect for the same reason as above.
References CompTIA Linux (XK0-005) Certificatio
n Study Guide, Chapter 15 Managing Memory and
Process Execution, page 469.
QUESTION 8 A systems administrator is enabling
LUKS on a USB storage device with an ext4
filesystem format. The administrator runs dmesg
and notices the following output
  • Given this scenario, which of the following
    should the administrator perform to meet these
    requirements? (Select three).
  • gpg /dev/sdcl
  • pvcreate /dev/sdc
  • mkfs . ext4 /dev/mapper/LUKSCJ001 - L ENCRYPTED
  • umount / dev/ sdc
  • fdisk /dev/sdc
  • mkfs . vfat /dev/mapper/LUKS0001 -- L ENCRYPTED
  • wipefs --a/dev/sdbl
  • cryptsetup IuksFormat /dev/ sdcl Correct Answer
    CDH
  • To enable LUKS on a USB storage device with an
    ext4 filesystem format, the administrator needs
    to perform the following steps

XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
10
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
How to Encrypt USB Drive on Ubuntu 18.04
  • QUESTION 9
  • The applications team is reporting issues when
    trying to access the web service hosted in a
    Linux system. The Linux systems administrator is
    reviewing the following outputs
  • Output 1
  • httpd.service The Apache HTTPD Server
  • Loaded loaded (/usr/lib/systemd/system/httpd.serv
    ice disabled vendor preset disabled) Active
    inactive (dead)
  • Docs manhttpd(8) manapachectl(8) Output 2
  • 165116 up 28 min, 1 user, load average 0.00,
    0.00, 0.07
  • Which of the following statements best describe
    the root cause? (Select two).
  • The httpd service is currently started.
  • The httpd service is enabled to auto start at
    boot time, but it failed to start.
  • The httpd service was manually stopped.
  • QUESTION 10
  • Users are reporting that writes on a system
    configured with SSD drives have been taking
    longer than expected, but reads do not seem to be
    affected. A Linux systems administrator is
    investigating this issue and working on a
    solution. Which of the following should the
    administrator do to help solve the issue?
  • Run the corresponding command to trim the SSD
    drives.
  • Use fsck on the filesystem hosted on the SSD
    drives.

XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
11
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
C. Migrate to high-density SSD drives for
increased performance. D. Reduce the amount of
files on the SSD drives. Correct Answer A TRIM
is a feature that allows the operating system to
inform the SSD which blocks of data are no longer
in use and can be wiped internally. This helps to
maintain the SSD\\'s performance and endurance by
preventing unnecessary write operations and
reducing write amplification12. Running the
corresponding command to trim the SSD drives,
such as fstrim or blkdiscard on Linux, can help
to solve the issue of slow writes by freeing up
space and optimizing the SSD\\'s internal garbage
collection34. References 1 What is SSD TRIM,
why is it useful, and how to check whether it is
turned on 2 How to Trim SSD in Windows 10 3 How
to run fsck on an external drive with OS X? 4
How to Use the fsck Command on Linux
  • QUESTION 11
  • A Linux engineer finds multiple failed login
    entries in the security log file for application
    users. The Linux engineer performs a security
    audit and discovers a security issue. Given the
    following
  • grep -iE \\'wwwdb\\' /etc/passwd
  • www-datax502502www-data/var/www/bin/bash
    dbx 505505db /opt/db/bin/bash
  • Which of the following commands would resolve the
    security issue?
  • usermod -d /srv/www-data www-data andand usermod
    -d /var/lib/db db
  • passwd -u www-data andand passwd -u db
  • renice -n 1002 -u 502 andand renice -n 1005 -u
    505
  • chsh -s /bin/false www-data andand chsh -s
    /bin/false db Correct Answer D
  • This command will use the chsh tool to change the
    login shell of the users www-data and db to
    /bin/false, which means they will not be able to
    log in to the system1. This will prevent
    unauthorized access attempts and improve
    security.
  • References 1 Replacing /bin/bash with
    /bin/false in /etc/passwd file
  • QUESTION 12
  • Which of the following is the best tool for
    dynamic tuning of kernel parameters?
  • tuned
  • tune2fs
  • tuned-adm
  • turbostat

XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
12
https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
Correct Answer A The tuned application is the
best tool for dynamic tuning of kernel
parameters, as it monitors the system and
optimizes the performance under different
workloads. It provides a number of predefined
profiles for typical use cases, such as power
saving, low latency, high throughput, virtual
machine performance, and so on. It also allows
users to create, modify, and delete profiles, and
to switch between them on the fly. The tuned
application uses the sysctl command and the
configuration files in the /etc/sysctl.d/
directory to adjust the kernel parameters at
runtime. References Chapter 2. Getting started
with TuneD - Red Hat Customer Portal, paragraph 1
Kernel tuning with sysctl - Linux.com, paragraph 1
  • QUESTION 13
  • A Linux administrator is creating a primary
    partition on the replacement hard drive for an
    application server. Which of the following
    commands should the administrator issue to verify
    the device name of this partition?
  • sudo fdisk /dev/sda
  • sudo fdisk -s /dev/sda
  • sudo fdisk -l
  • sudo fdisk -h Correct Answer C
  • Explanation The command sudo fdisk -l should be
    issued to verify the device name of the
    partition. The sudo command allows the
    administrator to run commands as the superuser or
    another user. The fdisk command is a tool for
    manipulating disk partitions on Linux systems.
    The -l option lists the partitions on all disks
    or a specific disk. The command sudo fdisk -l
    will show the device names, sizes, types, and
    other information of the partitions on all disks.
    The administrator can identify the device name of
    the partition by looking at the output. This is
    the correct command to use to accomplish the
    task. The other options are incorrect because
    they either do not list the partitions (sudo
    fdisk /dev/sda or sudo fdisk -h) or do not exist
    (sudo fdisk -s /dev/sda). References CompTIA
    Linux (XK0-005) Certification Study Guide,
    Chapter 10 Managing Storage, page 317.

XK0-005 PDF Dumps
XK0-005 VCE Dumps
XK0-005 Study Guide
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
Write a Comment
User Comments (0)
About PowerShow.com