Comptia (XK0-004) Exam Questions And Answers page 19
A junior Linux administrator is optimizing a system in which an application needs to take priority 0 when running the process. The administrator runs the ps command and receives the following output:
Given this scenario, which of the following steps will address this issue?
Given this scenario, which of the following steps will address this issue?
Issue the command renice p 8481
Issue the command renice p 0 -n 8481
Issue the command renice n 8481
Command Line Interface
Shells, Scripting, and Data Management
Users in the sales department are unable to create new files in the shared directory /Sales. A junior Linux administrator determines the permissions on the /Sales directory are set to rwxr-----, and sales is the group owner of the directory.
Which of the following is the BEST command for the junior administrator to issue to allow the users to create new files?
Which of the following is the BEST command for the junior administrator to issue to allow the users to create new files?
umask 002
chmod 770 /Sales
chmod g+s /Sales
chmod 777 /Sales
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Shells, Scripting, and Data Management
What are the truths about TOGAF Building Blocks?
Single Choice
Which one of the following statements about TOGAF Building Blocks is NOT true?
They are a package of functionality intended to meet the business needs across the organization
They should have stable, published interfaces that allow other building blocks to interoperate with them
They are equivalent to software component objects or web services
They may have multiple implementations but with different, interdependent Building Blocks
They may be assembled from other Building Blocks
Essential System Services
Security
Complete the sentence. According to the TOGAF document, a ___________ is a representation of a system from the perspective of a related set of _______________.
viewpoint, views
viewpoint, stakeholders
view, concerns
view, stakeholders
view, requirements
System Configuration and Management
Administrative Tasks
A Linux administrator needs to prevent the Postfix mail transfer agent from starting on boot.
Which of the following commands will accomplish this task?
Which of the following commands will accomplish this task?
systemctl stop postfix.service
/etc/init.d/postfix stop
systemctl disable postfix.service
/etc/init.d/postfix disable
Command Line Interface
Shells, Scripting, and Data Management
A systems administrator received a request to change the hostname to a new name. Which of the following file configurations should be changed to fix the hostname in the server?
/etc/sysconfig/network
/etc/hosts
/etc/resolv.conf
/etc/sysconfig/nsswitch.conf
System Configuration and Management
Complete the sentence. The Integrated Information Infrastructure Reference Model (III-RM) is an example of a (n) ______ Architecture reference model
Application
Business
Data
Technology
Networking Fundamentals
Which of the following is described by the TOGAF Architecture Content Framework as a type of artifact that shows relationships between things?
Building Block
Catalog
Diagram
Matrix
Deliverable
Networking Fundamentals
Security
A Linux administrator must identify a user with high disk usage. The administrator runs the # du s /home/* command and gets the following output:
Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space.
Which of the following commands will accomplish this task?
Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space.
Which of the following commands will accomplish this task?
df k /home/User3/files.txt
du a /home/User3/*
du sh /home/User/
find . name /home/User3 -print
Scripting and Automation
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
An administrator is uncomfortable allowing users to log in as root. Which of the following ensures that root logins are disallowed?
usermod -L root
usermod -G root
usermod -B root
usermod -U root
User Interfaces and Desktops
Administrative Tasks
Comments