Comptia (XK0-004) Exam Questions And Answers page 51
Which of the following does TOGAF describe as "a formal description of a system, or a detailed plan of the system at component level to guide its implementation"?
Artifact
Deliverable
Model
View
Scripting and Automation
Shells, Scripting, and Data Management
Joe, a member of the accounting group on a Linux system, is unable to write a file called taxes in the accounting shared directory. The ownership and permissions on the directory and file are as follows:
accounting drwxrw-r-- user = ann, group = accounting
taxes -rw-r--r-- , user = ann, group = accounting
Which of the following commands would allow Joe to write to the file? (Choose two.)
accounting drwxrw-r-- user = ann, group = accounting
taxes -rw-r--r-- , user = ann, group = accounting
Which of the following commands would allow Joe to write to the file? (Choose two.)
chmod g+x accounting
chmod 777 taxes
chgrp taxes accounting
chgrp accounting taxes
chmod 774 accounting
chmod u+x accounting
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Shells, Scripting, and Data Management
A technician wants to secure a sensitive workstation by ensuring network traffic is kept within the local subnet. To accomplish this task, the technician executes the following command:
echo 0 > /proc/sys/net/ipv4/ip_default_ttl
Which of the following commands can the technician use to confirm the expected results? (Choose two.)
echo 0 > /proc/sys/net/ipv4/ip_default_ttl
Which of the following commands can the technician use to confirm the expected results? (Choose two.)
tcpdump
traceroute
route
iperf
ip
arp
Networking Fundamentals
Security
The statement, "Getting information to the right people at the right time in a secure, reliable manner in order to support the operations that are core to the extended enterprise" describes the concept of_____
Boundaryless Information Flow
Interoperability
Portability
Service Oriented Architecture
Semantic Web
Administrative Tasks
Security
According to TOGAF, Which document should incorporate the actions arising from the Business Transformation Readiness Assessment technique?
Implementation Governance Model
Architecture Road map
Architecture Requirements Specification
Communications Plan
Implementation and Migration Plan
User Interfaces and Desktops
Administrative Tasks
Ann, a junior Linux administrator, needs to copy software from her local machine to assist in developing a software application on a remote machine with the IP address 192.168.3.22. The file needs to be placed on the /tmp directory. After downloading the RPM to the local machine, which of the following commands would be BEST to use to copy the software?
scp ~/software.rpm [email protected]:/tmp
scp ~/software.rpm [email protected]: /tmp
wget [email protected]:/tmp -f ~/software.rpm
scp [email protected] ~/software.rpm :/tmp
Command Line Interface
Devices, Linux Filesystems, and Filesystem Hierarchy Standard
Which of the following does TOGAF provide as a set of reference materials for establishing an architecture function within an organization?
Architecture Content Framework
Technical Reference Model
Integrated Information Infrastructure Reference Model
Architecture Development Method
Architecture Capability Framework
User Interfaces and Desktops
Essential System Services
Which of the following default files are typically used to contain a list of public keys from other computers? (Choose two.)
~/.ssh/authorized_keys
~/.ssh/config
~/.ssh/id_dsa.pub
~/.ssh/known_hosts
~/.ssh/id_rsa
~/.ssh/id_rsa.pub
Networking Fundamentals
Security
Which ADM phase starts with the receipt of a Request for Architecture Work from the sponsoring organization?
Phase A
Phase B
Phase H
Preliminary Phase
Requirements Management
Essential System Services
A technician suspects a company's border firewall is down, thus blocking Internet access. The technician executes the following commands:
#ping -c 1 firewall.company.com
64 bytes from firewall.company.com (192.168.1.1): icmp_seq=1 ttl=64 time=0.061ms
#ping -c 16 www.comptia.com
16 packets transmitted, 0 received, 100% packet loss, time 14999ms
Which of the following commands should the technician use to BEST determine the source of this outage?
#ping -c 1 firewall.company.com
64 bytes from firewall.company.com (192.168.1.1): icmp_seq=1 ttl=64 time=0.061ms
#ping -c 16 www.comptia.com
16 packets transmitted, 0 received, 100% packet loss, time 14999ms
Which of the following commands should the technician use to BEST determine the source of this outage?
tcpdump
nmap
dig
traceroute
Networking Fundamentals
Comments