Exam Logo

Comptia (XK0-004) Exam Questions And Answers page 41

Which section of the TOGAF template for Architecture Principles highlights the requirements for carrying out the principle?
Administrative Tasks Essential System Services
While creating a file on a volume, the Linux administrator receives the following message: No space left on device. Running the df m command, the administrator notes there is still 50% of usage left. Which of the following is the NEXT step the administrator should take to analyze the issue without losing data?
Devices, Linux Filesystems, and Filesystem Hierarchy Standard Essential System Services
Which of the following architectures in the Architecture Continuum contains the most re-usable architecture elements?
Devices, Linux Filesystems, and Filesystem Hierarchy Standard Shells, Scripting, and Data Management
Which one of the following statements about TOGAF Building Blocks is NOT true?
Essential System Services Security
Complete the sentence. All of the following are parts of the conceptual structure of the TOGAF Architecture Governance Framework, except ______
Administrative Tasks Security
Which of the following is the template for the grub.cfg file?
Command Line Interface Essential System Services
A systems administrator downloads an application s source files, compiles the application, and installs it per the application s installation instructions. When trying to run the application, the system states:

$ occmd
bash: occmd: command not found&

Running the locate command shows it does exist in the following location:

/opt/occmd/bin/occmd

Which of the following should the administrator do to allow the command to run properly? (Choose two.)
Command Line Interface Shells, Scripting, and Data Management
A systems administrator wants to download a package from a remote server. Which of the following are the BEST commands to use for this task? (Choose two.)
Command Line Interface Scripting and Automation
An administrator is attempting to block SSH connections to 192.168.10.24 using the Linux firewall. After implementing a rule, a connection refused error is displayed when attempting to SSH to 192.168.10.24.

Which of the following rules was MOST likely implemented?
Networking Fundamentals Security
An administrator needs to mount the shared NFS file system testhost:/testvolume to mount point /mnt/testvol and make the mount persistent after reboot.

Which of the following BEST demonstrates the commands necessary to accomplish this task?
Devices, Linux Filesystems, and Filesystem Hierarchy Standard Essential System Services