Comptia (XK0-004) Exam Questions And Answers page 26
Which of the following boot methods can a Linux administrator use to boot a Linux server remotely via a network interface card instead of a local disk?
PXE
NFS
Kickstart
Networking Fundamentals
Security
An operator finds a user is having issues with opening certain files.
Which of the following commands would allow the security administrator to list and check the SELinux context?
Which of the following commands would allow the security administrator to list and check the SELinux context?
ls D
ls a
ls Z
ls -1
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Security
A user is reporting unusual slowness when trying to transfer a large file to an NFS server from a workstation. The administrator runs tracepath and gets the following output:
Which of the following BEST describes the issue and a possible solution?
Which of the following BEST describes the issue and a possible solution?
The path MTU is lower than the source MTU. Reduce the source MTU setting.
There is latency at the storage device. Work with the storage team to correct the issue.
There is latency on an intermediate router. Increase the path MTU to compensate.
There are dropped packets at an intermediate router. Work with the network team to correct the issue.
Networking Fundamentals
Security
A Linux administrator needs to back up the folder /usr/domain, and the output must be a gzip compressed tar. Which of the following commands should be used?
tar cv domain.tar.gz /usr/domain
tar cvf /usr/domain domain.tar.gz
tar czvf domain.tar.gz /usr/domain
tar cxzv /usr/domain domain.tar.gz
Scripting and Automation
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Which of the following best describes the following?
You review the applicable Architecture Contract for each location, ensuring that it addresses the project objectives, effectiveness metrics, acceptance criteria, and risk management. In cases where the contract is issued to an external party, you ensure that it is a legally enforceable contractual change categorized as a re-architecting change.
You review the applicable Architecture Contract for each location, ensuring that it addresses the project objectives, effectiveness metrics, acceptance criteria, and risk management. In cases where the contract is issued to an external party, you ensure that it is a legally enforceable contractual change categorized as a re-architecting change.
A change to re-align with the business strategy.
A change to derive additional value from the existing investment.
A change to reduce costs.
A change to increase investment in order to create new value for exploitation.
System Configuration and Management
Command Line Interface
A Linux administrator receives a call from the network operations team that one of the database applications is down on a Linux server. The Linux server is configured with RAID 1 for redundancy, and the array /dev/md0 consists of two devices called /dev/sda1 and /dev/sdb1. After looking at the status of the RAID 1 array in the /proc/mdstat file, the administrator discovers the RAID 1 array is degraded and the disk /dev/sdb1 on which the database application was installed appears to have failed.
Which of the following steps should the administrator take to remove the device /dev/sdb1 from the RAID array md0? (Choose two.)
Which of the following steps should the administrator take to remove the device /dev/sdb1 from the RAID array md0? (Choose two.)
mdadm /dev/md0 --remove /dev/sdb1
mdadm /dev/sdb1 --fail /dev/md0
mdadm /dev/md0 --fail /dev/sdb1
mdadm /dev/sdb1 --remove /dev/md0
racadm --remove /dev/sdb1
racadm --fail /dev/sdb1
Command Line Interface
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
In which ADM phase is the goal to ensure that the architecture achieves its original target business value?
Phase E
Phase F
Phase G
Phase H
Preliminary Phase
System Configuration and Management
Administrative Tasks
An administrator needs to see a list of the system user s encrypted passwords. Which of the following Linux files does the administrator need to read?
/etc/shadow
/etc/skel
/etc/passwd
/etc/pw
Shells, Scripting, and Data Management
User Interfaces and Desktops
An administrator received a request from a security officer to eliminate a blacklisting set called internal-blocked the company is using in the iptables firewall.
Which of the following commands will complete the task?
Which of the following commands will complete the task?
ipset swap internal-blocked none
ipset destroy internal-blocked
ipset del internal-blocked
ipset remove internal-blocked
Networking Fundamentals
Security
A storage administrator in a virtualized environment has been told by a user that there is no space left on the volume to which the user can write. However, a check reveals that there is 20GB of unused space. Which of the following explains the discrepancy?
The drive is not formatted
The drive is thin provisioned
The drive is thick provision eager zeroed
The drive space is overallocated
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Shells, Scripting, and Data Management
Comments