Comptia (XK0-004) Exam Questions And Answers page 20
An administrator is trying to optimize a connection to an off-site NFS server.
Which of the following commands would BEST display the problems with packet sizes between hops on the network?
Which of the following commands would BEST display the problems with packet sizes between hops on the network?
ping
tracert
nmap
Networking Fundamentals
How does TOGAF define an enterprise?
Single Choice
Which of the following best describes how TOGAF defines an enterprise?
Any collection of organizations that has a common set of goals
Any corporation with more than 10,000 employees
Any organization involved in commerce
Any organization whose stock is traded
Any set of organizations based at the same geographic location
Essential System Services
Networking Fundamentals
A Linux systems administrator is troubleshooting an issue with the /home directory running out of space. The administrator needs to determine which /home directories are using the most space. Which of the following commands should be used?
du
lvs
df
fsck
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Shells, Scripting, and Data Management
Which of the following commands will let a Linux user know the PCI devices that are installed in the system?
cat /proc/sys/dev
cat /proc/devices/pci
lspci
lsdev
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Networking Fundamentals
A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?
OWASP
VDI
VMDK
OVA
Scripting and Automation
Networking Fundamentals
In which of the following Linux GUI environments would the Konsole application MOST likely be found?
Gnome
KDE
Cinnamon
Unity
MATE
User Interfaces and Desktops
A corporate server security policy states, Ensure password hashes are not readable by non-administrative users. The administrator should check the permissions on which of the following files to ensure the server satisfies this policy?
/etc/shadow
/etc/passwd
/etc/group
/etc/security/limits.conf
Command Line Interface
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
An administrator completed the configuration of the in-addr.arpa zone files for an organization.
Which of the following commands should the administrator use to verify the configuration is working as expected?
Which of the following commands should the administrator use to verify the configuration is working as expected?
ping -n 192.168.1.100
host in-add.arpa
dig -x 192.168.1.100
nslookup in-addr.arpa
tracepath -n 192.168.1.100
Networking Fundamentals
A Linux administrator tries to ping a hostname in a network but receives the message: hostname not found. The administrator is sure the name exists on the network and wants to verify if the DNS server is correctly configured on the client. Which of the following files should the administrator use to verify this information?
/etc/named.conf
/etc/resolv.conf
/etc/nsswitch.conf
/etc/network
Networking Fundamentals
According to TOGAF, Which of the following best describes the purpose of a Compliance Assessment?
To ensure that architecture information is communicated to the right stakeholders at the right time
To govern the architecture throughout its implementation process
To provide a high-level view of the end architecture product
To show progression of change from the Baseline Architecture to the Target Architecture
Security
Comments