Comptia (XK0-004) Exam Questions And Answers page 31
An administrator is reviewing updates in the master online Git repository and notices a file named .htaccess. The file contains passwords and should only be in the administrator s local repository, not the online one. Which of the following would prevent this file from appearing online in the future?
sed -i 's/#Preserve Hidden=True/Preserve Hidden=True/g' .git/config
chown nobody:nodoby .htaccess
echo ".htaccess" >> .gitignore
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Shells, Scripting, and Data Management
A user is reporting unusual slowness when trying to transfer a large file to an NFS server from a workstation. The administrator runs tracepath and gets the following output:
Which of the following BEST describes the issue and a possible solution?
Which of the following BEST describes the issue and a possible solution?
The path MTU is lower than the source MTU. Reduce the source MTU setting.
There is latency at the storage device. Work with the storage team to correct the issue.
There is latency on an intermediate router. Increase the path MTU to compensate.
There are dropped packets at an intermediate router. Work with the network team to correct the issue.
Networking Fundamentals
Security
A Linux administrator recently reprovisioned a new corporate web server to replace a legacy one. To minimize the impact on the company's users, the administrator modified the network and DNS settings of the new server to be the same as the legacy server.
When attempting to log in to the new server remotely over SSH, the following error message is displayed:
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
Which of the following should the administrator do to resolve the issue?
When attempting to log in to the new server remotely over SSH, the following error message is displayed:
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
Which of the following should the administrator do to resolve the issue?
Restart the network services on both the remote server and the local machine.
Remove the entry for the web server from the known_hosts file on the local machine.
Update the /etc/hosts file on the remote server and local machine.
Add the administrator's public key to the authorized_keys on the remote server.
Networking Fundamentals
Security
A user attempts to use the mount -a command but gets the following error:
mount: mount point /mnt/test does not exist
Which of the following commands best describes the action the Linux administrator should take NEXT?
mount: mount point /mnt/test does not exist
Which of the following commands best describes the action the Linux administrator should take NEXT?
mount a /mnt/test
mkdir p /mnt/test
mdadm p /mnt/test
mkfs /mnt/test
touch /mnt/test
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
The lead Linux admin has added a disk, /dev/sdd, to a VM that is running out of disk space. Place the following steps in the correct order from first (1) to last (4) to add the disk to the existing LVM.
Scripting and Automation
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Which of the following are Linux desktop managers? (Choose two.)
KDE
GNOME
GUI
VNC
X11
SPICE
User Interfaces and Desktops
Complete the sentence. The Solutions Continuum represents implementations of the architectures at corresponding levels of the _______________.
Architecture Capability
Architecture Continuum
Architecture Landscape
Architecture Metamodel
Architecture Repository
System Configuration and Management
Administrative Tasks
Joe, a user, asks a systems administrator to schedule the daily execution of a custom script.
Which of the following commands will allow the systems administrator to set up Joe s cron job?
Which of the following commands will allow the systems administrator to set up Joe s cron job?
crontab -r -u joe
crontab -e -u joe
crontab -n -u joe
crontab -l -u joe
Command Line Interface
Shells, Scripting, and Data Management
What is the objective of Phase B, Business Architecture?
Single Choice
Which of the following is an objective of Phase B, Business Architecture?
To confirm the ability of the enterprise to undergo change
To demonstrate how stakeholder concerns are addressed in the Business Architecture
To develop a Target Technology Architecture to support the business
To finalize the Architecture Vision and Architecture Definition documents
To maximize the business value from the architecture
System Configuration and Management
A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal?
# hostnamectl set-hostname 192.168.1.100 production.company.com
# grep i IP ${ip addr show} production.company.com > /etc/resolv.conf
# ip addr add 192.168.1.100/24 dev eth0 && rndc reload production.company.com
# echo 192.168.1.100 production.company.com >> /etc/hosts
Command Line Interface
Security
Comments