Comptia (XK0-004) Exam Questions And Answers page 32
A systems administrator wants to disable the Linux Kernel WatchDog Timer Driver for security purposes. Which of the following will accomplish this task?
Rename the /etc/modprobe.d/watchdog file to watchdog.off instead.
Remove the watchdog=1 from the /usr/modules/watchdog.conf file.
Add watchdog=0 to the /etc/modprobe.conf file.
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Essential System Services
Complete the sentence. In TOGAF, legacy systems and processes that are going to be used again in the future are considered ______
Architecture Building Blocks
Components
Patterns
Re-usable Building Blocks
Solution Building Blocks
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Administrative Tasks
Users are reporting collaborate.company.com is inaccessible from the user VLAN, but there is no issue connecting to the system s web page from the DMZ. Given the following outputs from commands run on the system:
Which of the following explains why users are unable to access the system from the user VLAN, and how can the administrator remediate this issue?
Which of the following explains why users are unable to access the system from the user VLAN, and how can the administrator remediate this issue?
Users cannot access the system because the IP subnet mask is /24. The remediation for this issue is to set the IP subnet mask to /16.
Users cannot access the system because the DNS server has the incorrect IP address. The remediation for this issue is to edit the DNS configuration to point to the correct IP.
Users cannot access the system because the connectivity port is running on the incorrect IP. The remediation for this issue is to edit the configuration file to listen on all interfaces.
Users cannot access the system because the default gateway has the wrong interface. The remediation for this issue is to set the default gateway to the proper interface.
Networking Fundamentals
Security
An administrator is tasked with increasing the size of the volume /dev/vg/lv to 20GB. Which of the following BEST illustrates the steps the administrator should take?
vgextend L20G /dev/vg/lv; resizelv /dev/vg/lv
parted L20G /dev/vg/lv; remount /dev/vg/lv
mkfs L20G /dev/vg/lv; tune2fs /dev/vg/lv
lvextend L20G /dev/vg/lv; resize2fs /dev/vg/lv
Scripting and Automation
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
In which of the following directories is the vmlinuz file located?
/boot
/etc
/bin
/proc
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
On a UEFI-based system, which of the following invokes GRUB2 from the EFI command prompt?
boot//EFI/grub2.efi
EFI/grub2.efi
/boot/EFI/grub2.efi
/grub2.efi
Command Line Interface
Networking Fundamentals
A user, jsmith, needs access to database files located on a server. Which of the following will add jsmith to the dba group and preserve existing group memberships?
usermod a G dba jsmith
usermod g dba jsmith
useradd g dba jsmith
groupmod dba u jsmith
Command Line Interface
Shells, Scripting, and Data Management
A systems administrator needs to retrieve specific fields from a CSV file. Which of the following tools would accomplish this task?
print
echo
awk
sort
Command Line Interface
Scripting and Automation
A systems administrator wants to deploy several applications to the same server quickly. Each application should be abstracted from the host with its own dependencies and libraries and utilize a minimal footprint.
Which of the following would be BEST in this scenario?
Which of the following would be BEST in this scenario?
Virtual machines
Type 2 hypervisor
Chroot jails
Containers
Scripting and Automation
Shells, Scripting, and Data Management
A user has connected a Bluetooth mouse to a computer, but it is not working properly. Which of the following commands should the systems administrator use to fix the issue?
lsmod i bluetooth
insmod bluetooth
modprobe r bluetooth
depmod i bluetooth
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Networking Fundamentals
Comments