Exam Logo

Comptia (XK0-004) Exam Questions And Answers page 4

A Linux administrator wants to configure log messages of critical or higher severity levels from the cron utility to be logged to the console. Which of the following will accomplish this objective?
Command Line Interface Shells, Scripting, and Data Management
Which of the following best describes the TOGAF Technical Reference Model?
Essential System Services Networking Fundamentals
A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate. The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?
Command Line Interface Devices, Linux Filesystems, and Filesystem Hierarchy Standard
A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?
Networking Fundamentals
A junior systems administrator has generated a PKI certificate for SSH sessions. The administrator would like to configure authentication without passwords to remote systems. Which of the following should the administrator perform?
Command Line Interface Scripting and Automation
A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error: No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space.

Which of the following BEST describes a possible cause for this error?
Command Line Interface Networking Fundamentals
Which one of the following categories from the Document Categorization model consists of the normative parts of TOGAF which are considered central to its usage?
System Configuration and Management Administrative Tasks
Which of the following would allow remote users to access a corporate server? (Choose two.)
Networking Fundamentals Security
Which of the following best describes a purpose of the Business Scenarios technique?
System Configuration and Management Administrative Tasks
Which of the following best describes the concept of Boundaryless Information Flow?
Networking Fundamentals Security