Exam Logo

Comptia (XK0-004) Exam Questions And Answers page 26

Which of the following boot methods can a Linux administrator use to boot a Linux server remotely via a network interface card instead of a local disk?
Networking Fundamentals Security
An operator finds a user is having issues with opening certain files.

Which of the following commands would allow the security administrator to list and check the SELinux context?
Devices, Linux Filesystems, and Filesystem Hierarchy Standard Security
A user is reporting unusual slowness when trying to transfer a large file to an NFS server from a workstation. The administrator runs tracepath and gets the following output:


Which of the following BEST describes the issue and a possible solution?
Networking Fundamentals Security
A Linux administrator needs to back up the folder /usr/domain, and the output must be a gzip compressed tar. Which of the following commands should be used?
Scripting and Automation Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Which of the following best describes the following?

You review the applicable Architecture Contract for each location, ensuring that it addresses the project objectives, effectiveness metrics, acceptance criteria, and risk management. In cases where the contract is issued to an external party, you ensure that it is a legally enforceable contractual change categorized as a re-architecting change.
System Configuration and Management Command Line Interface
A Linux administrator receives a call from the network operations team that one of the database applications is down on a Linux server. The Linux server is configured with RAID 1 for redundancy, and the array /dev/md0 consists of two devices called /dev/sda1 and /dev/sdb1. After looking at the status of the RAID 1 array in the /proc/mdstat file, the administrator discovers the RAID 1 array is degraded and the disk /dev/sdb1 on which the database application was installed appears to have failed.


Which of the following steps should the administrator take to remove the device /dev/sdb1 from the RAID array md0? (Choose two.)
Command Line Interface Devices, Linux Filesystems, and Filesystem Hierarchy Standard
In which ADM phase is the goal to ensure that the architecture achieves its original target business value?
System Configuration and Management Administrative Tasks
An administrator needs to see a list of the system user s encrypted passwords. Which of the following Linux files does the administrator need to read?
Shells, Scripting, and Data Management User Interfaces and Desktops
An administrator received a request from a security officer to eliminate a blacklisting set called internal-blocked the company is using in the iptables firewall.

Which of the following commands will complete the task?
Networking Fundamentals Security
A storage administrator in a virtualized environment has been told by a user that there is no space left on the volume to which the user can write. However, a check reveals that there is 20GB of unused space. Which of the following explains the discrepancy?
Devices, Linux Filesystems, and Filesystem Hierarchy Standard Shells, Scripting, and Data Management