Comptia (XK0-004) Exam Questions And Answers page 22
A Linux systems administrator is implementing Source Code Management for the web application server configuration files located in /etc/httpd/. Which of the following steps should the administrator perform FIRST?
Create a new repository using git init
Retrieve the remote changes using git commit
Configure the directory for git using git config
Scripting and Automation
Shells, Scripting, and Data Management
Which of the following statements about TOGAF Building Blocks and their use in the ADM cycle is correct?
Building Blocks become more implementation-specific in Phase E
Building Blocks in phases D, E and F are evolved to a common pattern of steps
Building Blocks should be identified in abstract form as part of the Preliminary Phase
Building Blocks should be first selected in Phase D
System Configuration and Management
Administrative Tasks
All users are reporting that they cannot connect to the SFTP server. The administrator runs a scan:
Which of the following would allow the administrator to fix the problem?
Which of the following would allow the administrator to fix the problem?
Allow SFTP connections on port 22 using /etc/sysconfig/iptables.
Allow SFTP connections on port 20 and 21 using /etc/sysconfig/iptables.
Allow SFTP connections on port 25 using /etc/sysconfig/iptables.
Allow SFTP connections on port 1456 using /etc/sysconfig/iptables.
Networking Fundamentals
Security
A systems administration team has decided to treat their systems as immutable instances. They keep the desired state of each of their systems in version control and apply automation whenever they provision a new instance. If there is an issue with one of their servers, instead of troubleshooting the issue, they terminate the instance and rebuild it using automation.
Which of the following is this an example of?
Which of the following is this an example of?
Inventory
Orchestration
Infrastructure as code
Agentless deployment
Command Line Interface
Scripting and Automation
What are the characteristics of Type 2 hypervisors?
Single Choice
Which of the following is true about Type 2 hypervisors?
Type 2 hypervisors run on top of another general purpose OS.
Type 2 hypervisors are often called bare-metal or native hypervisors.
Type 2 hypervisors offer a performance increase to the guests in comparison to a Type 1 hypervisor.
Only Type 2 hypervisors allow direct access to CPU virtualization features.
Essential System Services
Networking Fundamentals
An administrator is troubleshooting to determine why backups are failing on a particular server. The administrator runs the ps command and analyzes the following output.
The administrator runs kill -9 10112 yet the process remains.
Which of the following BEST describes the issue and how to fix it?
The administrator runs kill -9 10112 yet the process remains.
Which of the following BEST describes the issue and how to fix it?
The backup process is still running and needs to be killed with kill -9 --force 10112.
The backup process is a zombie process, and the system needs to be rebooted.
The backup process is out of memory, and more memory needs to be added to the system.
The backup process is using 100% of system resources and needs to be rescheduled with renice.
Command Line Interface
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Complete the sentence. The TOGAF risk categorization after the implementation of mitigating actions is known as the level of risk.
Critical
Initial
Intermediate
Residual
Unmitigated
Security
The Requirements Management Phase is responsible for which one of the following activities?
Addressing requirements
Disposal of resolved requirements
Generating requirements
Managing the flow of requirements
Prioritizing requirements
System Configuration and Management
Administrative Tasks
Which of the following is the BEST reason for not storing database files in the /var directory?
The /var filesystem is not fast enough for database files.
The number of files in /var is limited by the available inodes.
Files in /var do not have strict file permissions.
If log files fill up /var, it might corrupt the database.
Networking Fundamentals
Security
Joe, a user, reports there is data missing after a reboot of the system he is using. The data he was working on was located in /opt/data/user1. A Linux administrator runs the following commands and receives the resulting output.
Which of the following should the administrator perform to resolve the issue?
Which of the following should the administrator perform to resolve the issue?
The administrator can conclude Joe no longer has permissions to his data and needs to change the data ownership to Joe.
The administrator can conclude the data is gone from the system and needs to be restored from a backup.
The administrator can conclude Joe has been using the wrong folder and should be using /opt/data/user2.
The administrator can conclude the drive is not mounted properly and should be remounted.
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Shells, Scripting, and Data Management
Comments