Comptia (XK0-004) Exam Questions And Answers page 4
A Linux administrator wants to configure log messages of critical or higher severity levels from the cron utility to be logged to the console. Which of the following will accomplish this objective?
Edit the /etc/rsyslog.conf file to include the line cron.emerg.* /dev/console
Edit the /etc/logrotate.conf file to include the line cron.emerg.* /dev/console
Edit the /etc/rsyslog.d/conf file to include the line cron.emerg.* /dev/console
Command Line Interface
Shells, Scripting, and Data Management
Which of the following best describes the TOGAF Technical Reference Model?
It is a detailed data model that can be tailored to specific industries
It is an example of a Common Systems Architecture
It is a fundamental architecture upon which more specific architectures can be based
It is a model of application components and application services software, including brokering applications
Essential System Services
Networking Fundamentals
A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate. The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?
nice -n 5 -p 2864
nice -n -5 -p 2864
renice -n 10 -p 2864
renice -n -10 -p 2864
Command Line Interface
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?
echo blacklist bluetooth > /etc/modprobe.d/blacklist-bluetooth
echo kill bluetooth > /etc/modprobe.d/kill-bluetooth
echo modprobe bluetooth > /etc/modprobe.d/modporbe-bluetooth
echo rmmod bluetooth > /etc/modprobe.d/rmmod-bluetooth
Networking Fundamentals
A junior systems administrator has generated a PKI certificate for SSH sessions. The administrator would like to configure authentication without passwords to remote systems. Which of the following should the administrator perform?
Add the content of id_rsa.pub file to the remote system ~/.ssh/authorized_keys location.
Add the content of id_rsa file to the remote system ~/.ssh/authorized_keys location.
Add the content of id_rsa file to the remote system ~/.ssh/known_hosts location.
Add the content of id_rsa.pub file to the remote system ~/.ssh/known_hosts location.
Command Line Interface
Scripting and Automation
A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error: No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space.
Which of the following BEST describes a possible cause for this error?
Which of the following BEST describes a possible cause for this error?
The /tmp directory is not mounted.
The filesystem is formatted with a 4MB block size.
the filesystem ran out of inodes.
The /tmp directory has been set with an immutable attribute.
Command Line Interface
Networking Fundamentals
Which one of the following categories from the Document Categorization model consists of the normative parts of TOGAF which are considered central to its usage?
TOGAF Core
TOGAF Mandated
TOGAF Recommended
TOGAF Referenced
TOGAF Supporting
System Configuration and Management
Administrative Tasks
What are two ways for remote users to access a corporate server?
Multiple Choice
Which of the following would allow remote users to access a corporate server? (Choose two.)
VPN server
SMTP server
NTP server
SSH server
DHCP server
File server
Networking Fundamentals
Security
What is the purpose of the Business Scenarios technique?
Single Choice
Which of the following best describes a purpose of the Business Scenarios technique?
To catch errors in a project architecture early
To guide decision making throughout the enterprise
To help identify and understand requirements
To highlight shortfalls between the baseline and target architectures
To mitigate risk when implementing an architecture project
System Configuration and Management
Administrative Tasks
Which of the following best describes the concept of Boundaryless Information Flow?
Enabling the vision of an integrated information infrastructure
Getting information to the right people at the right time in a secure, reliable and timely manner
Enabling effective global communications between countries
Enabling the flow of information to all stakeholders
Providing a visual representation of information provider, consumer and brokering applications
Networking Fundamentals
Security
Comments