Comptia (XK0-004) Exam Questions And Answers page 18
An administrator is trying to access a server in a cloud via SSH but is unable to log in. The administrator determines the company s IP address has been blocklisted on the server.
Which of the following should the administrator do to prevent being blocked in the future?
Which of the following should the administrator do to prevent being blocked in the future?
Modify the cloud provider security rules to allow all connectors form the company s IP address.
Add the company s IP address from the /etc/hosts.allow.
Turn on SELinux and enable the SSH context.
Networking Fundamentals
Security
A junior Linux administrator is updating local name resolution to support IPv6. The administrator issues the command cat /etc/hosts and receives the following output:
127.0.0.1 localhost
Which of the following actions should the administrator perform to accomplish this task?
127.0.0.1 localhost
Which of the following actions should the administrator perform to accomplish this task?
Modify the /etc/hosts file, and add the ipv6 localhost entry to the file.
Modify the /etc/hosts file, and add the ::1 localhost entry to the file.
Modify the /etc/hosts file, and add the ipv4 localhost entry to the file.
Modify the /etc/hosts file, and add the 0.0.0.0 localhost entry to the file.
Networking Fundamentals
Complete the sentence. The Architecture Board is typically responsible and accountable for achieving all of the following goals except ___________
ensuring consistency between sub-architectures
approving the strategic business plans proposed by individual organization units within the enterprise
enforcement of architecture compliance
identifying and approving components for reuse
providing the basis for all decision-making with regard to changes to the architecture
System Configuration and Management
Administrative Tasks
All users are reporting that they cannot connect to the SFTP server. The administrator runs a scan:
Which of the following would allow the administrator to fix the problem?
Which of the following would allow the administrator to fix the problem?
Allow SFTP connections on port 22 using /etc/sysconfig/iptables.
Allow SFTP connections on port 20 and 21 using /etc/sysconfig/iptables.
Allow SFTP connections on port 25 using /etc/sysconfig/iptables.
Allow SFTP connections on port 1456 using /etc/sysconfig/iptables.
Networking Fundamentals
Security
In which of the following ADM Phases do building blocks become implementation-specific?
Phase A
Phase B
Phase C
Phase D
Phase E
Essential System Services
A systems administrator documents the instructions on the internal wiki regarding how to turn the company's code into Debian packages. The instructions include the commands used to compile, what tests need to be run, the commands to convert the raw code into a package that apt or dpkg can manage, as well as an explanation of each command.
Which of the following is this an example of?
Which of the following is this an example of?
Infrastructure as code
Attributes
Procedures
Configuration management
Scripting and Automation
Shells, Scripting, and Data Management
Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry:
joe:x:505:505::/home/joe:/bin/false
Which of the following commands should the administrator execute to resolve the problem?
joe:x:505:505::/home/joe:/bin/false
Which of the following commands should the administrator execute to resolve the problem?
usermod s /bin/bash joe
passwd u joe
useradd s /bin/bash joe
chage E -l joe
Command Line Interface
Administrative Tasks
Complete the sentence. TOGAF defines five criteria for a good set of principles: Understandable, Robust, Complete, Consistent and_____.
Agile
Dynamic
Comprehensive
Rational
Stable
System Configuration and Management
Administrative Tasks
A systems administrator is implementing disk quotas on /home. During the process, the administrator receives the following error:
Cannot find filesystem to check or filesystem not mounted with user quota option.
Which of the following is the correct order of steps the administrator should follow to resolve this error?
Cannot find filesystem to check or filesystem not mounted with user quota option.
Which of the following is the correct order of steps the administrator should follow to resolve this error?
1. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it.
2. Remount /home.
3. Create the quota database files and generate the disk usage table.
4. Assign user quota policies.
2. Remount /home.
3. Create the quota database files and generate the disk usage table.
4. Assign user quota policies.
1. Create the quota database files and generate the disk usage table.
2. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it.
3. Remount /home.
4. Assign user quota policies.
2. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it.
3. Remount /home.
4. Assign user quota policies.
1. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it.
2. Create the quota database files and generate the disk usage table.
3. Remount /home.
4. Assign user quota policies.
2. Create the quota database files and generate the disk usage table.
3. Remount /home.
4. Assign user quota policies.
1. Assign user quota policies.
2. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it.
3. Create the quota database files and generate the disk usage table.
4. Remount /home.
2. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it.
3. Create the quota database files and generate the disk usage table.
4. Remount /home.
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Essential System Services
You have been asked to parse a log file of logins to determine various information about who is logging in and when.
INSTRUCTIONS
Open and inspect the Login log file.
Drag and drop the correct commands onto the output that was generated from that command.
Tokens can be used only once and not all will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
INSTRUCTIONS
Open and inspect the Login log file.
Drag and drop the correct commands onto the output that was generated from that command.
Tokens can be used only once and not all will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Command Line Interface
Shells, Scripting, and Data Management
Comments