Title: [Latest Update] CompTIA XK0-005 Actual Exam Practice Questions Shared Online
1https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
XK0-005QAs CompTIA Linux Certification
Exam Pass CompTIA XK0-005 Exam with 100
Guarantee Free Download Real Questions Answers
PDF and VCE file from https//www.leads4pass.com
/xk0-005.html 100 Passing Guarantee 100 Money
Back Assurance Following Questions and Answers
are all new published by CompTIA Official Exam
Center
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
2https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
- QUESTION 1
- A Linux administrator generated a list of users
who have root-level command-line access to the
Linux server to meet an audit requirement. The
administrator analyzes the following /etc/passwd
and /etc/sudoers files cat /etc/passwd rootx
00 /home/root /bin/bash lee x 500 500
/home/lee/bin/tcsh malloryx 501501
/root/bin/bash evex 502 502 - /home/eve/bin/nologin carlx0503
/home/carl/bin/sh bobx 504 504
/home/bob/bin/ksh alicex 505505 - /home/alice/bin/rsh cat /etc/sudoers
Cmnd_Alias SHELLS /bin/tcsh, /bin/sh, /bin/bash
Cmnd_Alias SYSADMIN - /usr/sbin/tcpdump ALL (ALL) ALL ALL NOPASSWD
SYSADMIN Which of the following users, in
addition to the root user, should be listed in
the audit report as having root-level
command-line access? (Select two). - Carl
- Lee
- Mallory
- Eve
- Bob
- Alice
QUESTION 2 A systems administrator installed a
new software program on a Linux server. When the
systems administrator tries to run the program,
the following message appears on the screen.
Which of the following commands will allow the
systems administrator to check whether the system
supports virtualization? A. dmidecode -s
system-version
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
3https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
B. lscpu C. sysctl -a D. cat /sys/device/system/c
pu/possible Correct Answer B Explanation The
command that will allow the systems administrator
to check whether the system supports
virtualization is lscpu. This command will
display information about the CPU architecture,
such as the number of CPUs, cores, sockets,
threads, model name, frequency, cache size, and
flags. One of the flags is vmx (for Intel
processors) or svm (for AMD processors), which
indicates that the CPU supports hardware
virtualization. If the flag is present, it means
that the system supports virtualization. If the
flag is absent, it means that the system does not
support virtualization or that it is disabled in
the BIOS settings. The other options are not
correct commands for checking whether the system
supports virtualization. The dmidecode -s
system-version command will display the version
of the system, such as the product name or serial
number, but not the CPU information. The sysctl
-a command will display all the kernel
parameters, but not the CPU flags. The cat
/sys/devices/system/cpu/possible command will
display the range of possible CPUs that can be
online or offline, but not the CPU features.
References lscpu(1) - Linux manual page How To
Check If Virtualization is Enabled in Windows 10
/ 11
- QUESTION 3
- A user is unable to log on to a Linux
workstation. The systems administrator executes
the following command cat /etc/shadow grep
user1 - The command results in the following output
- user1 ! 6QERgAsdvojadv4asdvaarC/9dj34GdafGVareg
mkdsfa188750999997 Which of the following
should the systems administrator execute to fix
the issue? - chown -R userluser1 /home/user1
- sed -i \\'/ / /g\\' /etc/shadow
- chgrp user1user1 /home/user1
- passwd -u user1 Correct Answer D
- The output shows that the user1 account has a
locked password, indicated by the exclamation
point (!) in the second field of the /etc/shadow
file1. To unlock the password and allow the user
to log in, the systems administrator should use
the passwd command with the -u (unlock) option2.
References 1 Understanding the /etc/shadow File
2 How To Use The Passwd Command In Linux
QUESTION 4 A systems administrator is tasked
with changing the default shell of a system
account in order to disable iterative logins.
Which of the following is the best option for the
administrator to use as the new shell? A.
/sbin/nologin
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
4https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
B. /bin/ sh C. /sbin/ setenforce D. /bin/bash
Correct Answer A The /sbin/nologin shell is a
special shell that prevents the user from logging
into an interactive session. It is commonly used
for system accounts that are not meant to be
accessed by users, such as daemon or service
accounts. When a user tries to log in with this
shell, they will see a message like "This account
is currently not available" and the login will
fail. References The /sbin/nologin shell is
listed as one of the valid shells in the
/etc/shells file1. The CompTIA Linux
Certification Exam Objectives mention that the
candidate should be able to "configure and manage
system accounts and groups, including password
aging and restricted shells" as part of the
Hardware and System Configuration domain2. The
usermod command can be used to change the
user\\'s login shell with the -s or --shell
option3. For example, to change the shell of a
user named daemon to /sbin/nologin, the command
would be sudo usermod -s /sbin/nologin daemon
QUESTION 5 DRAG DROP You have been asked to
parse a log file of logins to determine various
information about who is logging in and when.
INSTRUCTIONS Open and inspect the Login log
file. Drag and drop the correct commands onto the
output that was generated from that
command. Tokens can be used only once and not
all will be used. If at any time you would like
to bring back the initial state of the
simulation, please click the Reset All button.
Select and Place
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
5https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
6https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
Correct Answer
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
7https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
8https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
- QUESTION 6
- Which of the following commands is used to
configure the default permissions for new files? - setenforce
- sudo
- umask
- chmod
- Correct Answer C
- Explanation The command that is used to
configure the default permissions for new files
is umask. The umask command is a tool for setting
the default permissions for new files and
directories on Linux systems. The umask value is
a four-digit octal number that represents the
permissions that are subtracted from the default
permissions. The default permissions for files
are 666, which means read and write for owner,
group, and others. The default permissions for
directories are 777, which means read, write, and
execute for owner, group, and others. The umask
value consists of four digits the first digit is
for special permissions, such as setuid, setgid,
and sticky bit the second digit is for the owner
permissions the third digit is for the group
permissions and the fourth digit is for the
others permissions. The umask value can be
calculated by subtracting the desired permissions
from the default permissions. For example, if the
desired permissions for files are 664, which
means read and write for owner and group, and
read for others, then the umask value is 002,
which is 666 - 664. The command umask 002 will
set the umask value to 002, which will ensure
that only file owners and group members can
modify new files by default. The command that is
used to configure the default permissions for new
files is umask. This is the correct answer to the
question. The other options are incorrect because
they either do not set the default permissions
for new files (setenforce, sudo, or chmod) or do
not exist (kill -HUP or kill - -TERM). References CompTIA Linux (XK0-005)
Certification Study Guide, Chapter 11 Managing
File Permissions and Ownership, page 349.
- QUESTION 7
- A Linux engineer needs to download a ZIP file and
wants to set the nice of value to -10 for this
new process. Which of the following commands will
help to accomplish the task? - nice -v -10 wget https//foo.com/installation.zi
p - renice -v -10 wget https//foo.com/installation.
2ip - renice -10 wget https//foo.com/installation.zip
- nice -10 wget https//foo.com/installation.zip
Correct Answer D - Explanation The nice -10 wget https//foo.com/ins
tallation.zip command will help to accomplish the
task of downloading a ZIP file and setting the
nice value to -10 for this new process. The nice
command can be used to run a program with a - modified scheduling priority, which affects how
much CPU time the process receives. The nice
value ranges from -20 (highest priority) to 19
(lowest priority), and the default value is 0.
The -10 option specifies the nice value to be
used for the
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
9https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
wget command, which will download the ZIP file
from the given URL. The nice -v -10 wget
https//foo.com/installation.zip command is
incorrect, as -v is not a valid option for nice.
The renice -v -10 wget https//foo.com/installatio
n.zip command is incorrect, as renice is used
to change the priority of an existing process,
not a new one. The renice -10 wget
https//foo.com/installation.zip command is
incorrect for the same reason as above.
References CompTIA Linux (XK0-005) Certificatio
n Study Guide, Chapter 15 Managing Memory and
Process Execution, page 469.
QUESTION 8 A systems administrator is enabling
LUKS on a USB storage device with an ext4
filesystem format. The administrator runs dmesg
and notices the following output
- Given this scenario, which of the following
should the administrator perform to meet these
requirements? (Select three). - gpg /dev/sdcl
- pvcreate /dev/sdc
- mkfs . ext4 /dev/mapper/LUKSCJ001 - L ENCRYPTED
- umount / dev/ sdc
- fdisk /dev/sdc
- mkfs . vfat /dev/mapper/LUKS0001 -- L ENCRYPTED
- wipefs --a/dev/sdbl
- cryptsetup IuksFormat /dev/ sdcl Correct Answer
CDH - To enable LUKS on a USB storage device with an
ext4 filesystem format, the administrator needs
to perform the following steps
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
10https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
How to Encrypt USB Drive on Ubuntu 18.04
- QUESTION 9
- The applications team is reporting issues when
trying to access the web service hosted in a
Linux system. The Linux systems administrator is
reviewing the following outputs - Output 1
- httpd.service The Apache HTTPD Server
- Loaded loaded (/usr/lib/systemd/system/httpd.serv
ice disabled vendor preset disabled) Active
inactive (dead) - Docs manhttpd(8) manapachectl(8) Output 2
- 165116 up 28 min, 1 user, load average 0.00,
0.00, 0.07 - Which of the following statements best describe
the root cause? (Select two). - The httpd service is currently started.
- The httpd service is enabled to auto start at
boot time, but it failed to start. - The httpd service was manually stopped.
- QUESTION 10
- Users are reporting that writes on a system
configured with SSD drives have been taking
longer than expected, but reads do not seem to be
affected. A Linux systems administrator is
investigating this issue and working on a
solution. Which of the following should the
administrator do to help solve the issue? - Run the corresponding command to trim the SSD
drives. - Use fsck on the filesystem hosted on the SSD
drives.
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
11https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
C. Migrate to high-density SSD drives for
increased performance. D. Reduce the amount of
files on the SSD drives. Correct Answer A TRIM
is a feature that allows the operating system to
inform the SSD which blocks of data are no longer
in use and can be wiped internally. This helps to
maintain the SSD\\'s performance and endurance by
preventing unnecessary write operations and
reducing write amplification12. Running the
corresponding command to trim the SSD drives,
such as fstrim or blkdiscard on Linux, can help
to solve the issue of slow writes by freeing up
space and optimizing the SSD\\'s internal garbage
collection34. References 1 What is SSD TRIM,
why is it useful, and how to check whether it is
turned on 2 How to Trim SSD in Windows 10 3 How
to run fsck on an external drive with OS X? 4
How to Use the fsck Command on Linux
- QUESTION 11
- A Linux engineer finds multiple failed login
entries in the security log file for application
users. The Linux engineer performs a security
audit and discovers a security issue. Given the
following - grep -iE \\'wwwdb\\' /etc/passwd
- www-datax502502www-data/var/www/bin/bash
dbx 505505db /opt/db/bin/bash - Which of the following commands would resolve the
security issue? - usermod -d /srv/www-data www-data andand usermod
-d /var/lib/db db - passwd -u www-data andand passwd -u db
- renice -n 1002 -u 502 andand renice -n 1005 -u
505 - chsh -s /bin/false www-data andand chsh -s
/bin/false db Correct Answer D - This command will use the chsh tool to change the
login shell of the users www-data and db to
/bin/false, which means they will not be able to
log in to the system1. This will prevent
unauthorized access attempts and improve
security. - References 1 Replacing /bin/bash with
/bin/false in /etc/passwd file
- QUESTION 12
- Which of the following is the best tool for
dynamic tuning of kernel parameters? - tuned
- tune2fs
- tuned-adm
- turbostat
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide
12https//www.leads4pass.com/xk0-005.html 2024
Latest leads4pass XK0-005 PDF and VCE dumps
Download
Correct Answer A The tuned application is the
best tool for dynamic tuning of kernel
parameters, as it monitors the system and
optimizes the performance under different
workloads. It provides a number of predefined
profiles for typical use cases, such as power
saving, low latency, high throughput, virtual
machine performance, and so on. It also allows
users to create, modify, and delete profiles, and
to switch between them on the fly. The tuned
application uses the sysctl command and the
configuration files in the /etc/sysctl.d/
directory to adjust the kernel parameters at
runtime. References Chapter 2. Getting started
with TuneD - Red Hat Customer Portal, paragraph 1
Kernel tuning with sysctl - Linux.com, paragraph 1
- QUESTION 13
- A Linux administrator is creating a primary
partition on the replacement hard drive for an
application server. Which of the following
commands should the administrator issue to verify
the device name of this partition? - sudo fdisk /dev/sda
- sudo fdisk -s /dev/sda
- sudo fdisk -l
- sudo fdisk -h Correct Answer C
- Explanation The command sudo fdisk -l should be
issued to verify the device name of the
partition. The sudo command allows the
administrator to run commands as the superuser or
another user. The fdisk command is a tool for
manipulating disk partitions on Linux systems.
The -l option lists the partitions on all disks
or a specific disk. The command sudo fdisk -l
will show the device names, sizes, types, and
other information of the partitions on all disks.
The administrator can identify the device name of
the partition by looking at the output. This is
the correct command to use to accomplish the
task. The other options are incorrect because
they either do not list the partitions (sudo
fdisk /dev/sda or sudo fdisk -h) or do not exist
(sudo fdisk -s /dev/sda). References CompTIA
Linux (XK0-005) Certification Study Guide,
Chapter 10 Managing Storage, page 317.
XK0-005 PDF Dumps
XK0-005 VCE Dumps
XK0-005 Study Guide
XK0-005 PDF Dumps XK0-005 VCE Dumps XK0-005
Study Guide