post page top logo

Get Access to Free CompTIA Linux+ (Plus) Exam Dumps 2022 Updated, Practice on Free CompTIA Linux+ (Plus) XK0-004 Practice Exam

2022 Refreshed CompTIA Linx+ Plus Dumps with Valid XK0-004 Exam Questions, Certspilot Provide Real Exam questions for CompTIA Linux+ Exam which help you in passing your exam easily. Below are Free Practice Exam questions for the XK0-004 Exam. just Practice on Our Free XK0-004 Dumps and check what is actually included in our Premium Dumps. Download XK0+004 PDF Dumps with Detailed Answers explanations and Pass your exam on the first attempt.

Free CompTIA Linux+ (Plus) XK0-004 Dumps Are Below To Let You Check The Updated Dumps

1. A Linux administrator has installed a web application firewall in front of a web server running on HTTP port 8080 and successfully started the HTTP server. However, after opening the application URL in an Internet browser, the administrator discovered that the application does not work. The administrator performed the following diagnostic steps: Output of sysctl -a command:                                                                                                 

Output of iptables -L command:                                                                                                                         

Output of netstat –nltop | grep "8080":                                                                                                       

Which of the following is the NEXT step the administrator should perform to permanently fix the issue at the kernel level?

2. A member of the production group issues the following command:

echo "Monday through Friday" > /production_docs/days

The command fails to execute, so the user obtains the following output:

drwxr--r-- root production 0 Jun 16 2018 production

-rw-r--r-- production production 4096 Jun 14 2018 days

Which of the following commands should the user execute to BEST fix the issue?

3. A junior systems administrator created a new filesystem /dev/sda1 with mountpoint /data and added it to the /etc/fstab for auto-mounting.

When the systems administrator tries to mount the file system, the system refuses. Given the output below:

Which of the following steps is necessary?

4. A user wants to list the lines of a log, adding a correlative number at the beginning of each line separated by a set of dashes from the actual message. Which of the following scripts will complete this task?

5. An analyst is trying to determine which public IP addresses are managed by Company A, but the script is not working correctly.

Which of the following explains what is wrong with the script?

6. All users are reporting that they cannot connect to the SFTP server. The administrator runs a scan:

Which of the following would allow the administrator to fix the problem?

7. A Linux systems administrator installed a new web server, which failed while attempting to start. The

administrator suspects that SELinux is causing an issue and wants to temporarily put the system into permissive mode. Which of the following would allow the administrator to accomplish this?

8. A Linux systems administrator installed a new web server, which failed while attempting to start. The

administrator suspects that SELinux is causing an issue and wants to temporarily put the system into permissive mode. Which of the following would allow the administrator to accomplish this?

9. A configuration management tool running every minute is enforcing the service HTTPd to be started. To perform maintenance, which of the following series of commands can be used to prevent the service from being started?

10. An administrator has written the following Bash script:                                                                                 

All necessary files exist in the correct locations. However, when the administrator executes /home/user/ test.sh the following error is received:

No such file or directory

Which of the following is the MOST likely cause of the error?

11. An administrator is troubleshooting an application that has failed to start after the server was rebooted. Noticing the data volume is not mounted, the administrator attempts to mount it and receives this error:                                               

Upon checking the logical volume status, the administrator receives this information:                         

Which of the following can be said about the data logical volume, and how can this problem be resolved?

12. A four-drive Linux NAS has been improperly configured. Each drive has a capacity of 6TB, for a total storage capacity of 24TB. To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID configuration?

13. A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate.

The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?

14. A systems administrator wants to download a package from a remote server. Which of the following are the BEST commands to use for this task? (Choose two.)

15. A systems administrator wants to download a package from a remote server. Which of the following are the BEST commands to use for this task? (Choose two.)

16. An administrator is logged into a server remotely and wants to determine if the system is a VM. Which of the following commands would assist with this?

17. Ann, a Linux administrator, wants to edit a configuration management file. When she opens the file to edit, her text editor reports that the file has been opened in read-only mode. She then tries to edit the file as root by elevating via sudo and is still unable to save any changes. The error message in her text editor says that the read-only option is set on the file. Ann checks the permissions on the file and sees the following:

-rw-rw-r-- 1 root wheel 30 Jun 13 15:38 infrastructure.yml

Which of the following commands is the BEST option to allow her to successfully modify the file?

18. Joe, a member of the accounting group on a Linux system, is unable to write a file called “taxes†     in the accounting shared directory. The ownership and permissions on the directory and file are as follows: accounting drwxrw-r-- user = ann, group = accounting

taxes -rw-r--r-- , user = ann, group = accounting

Which of the following commands would allow Joe to write to the file? (Choose two.)

19. An administrator needs to generate a list of services that are listening on TCP and/or UDP ports. Which of the following tools should the administrator use?

20. Ann, a user, has created a new directory and noticed that permissions on the new directory are as follows: drwx            -. 1 ann ann 0 Jun 11 08:20 work

Which of the following should the administrator do to restore default permissions for newly created directories?

21. A Linux engineer is troubleshooting a newly added SCSI device for a Linux server that needed more disk space without rebooting. The engineer discovers that the new device is not visible by the Linux kernel in fdisk -l output. Which of the following commands should be used to rescan the entire SCSI bus?

22. A systems administrator is troubleshooting an intermittent network connection at the IP address 192.168.1.23. The administrator wishes to monitor the connection at five-minute intervals for one hour. Which of the following commands will accomplish this task?

23. A systems administrator wants to mount an ISO to access its content. Using /mnt as a mount point, which of the following is the correct syntax?

24. An administrator is uncomfortable allowing users to log in as root. Which of the following ensures that root logins are disallowed?

25. A systems administrator installs a simple package, but the Linux system returns the following error: rpmdb open fails. To verify if there is a problem in the RPM database, the systems administrator runs the following command:

Which of the following commands should the systems administrator run NEXT to resolve this issue?

26. Joe, a user, reports that he is no longer able to write files to his home directory. Upon inspection, the Linux administrator discovers that attempting to create a new file gives the following error: No space left on

device. However, the disk and partition are not full. Which of the following commands would be BEST for the administrator to use to continue troubleshooting this problem?

27. A Linux administrator is adding a static IP address to a network interface on a Linux system. The administrator modifies the ifcfg- eth0 configuration file with the following settings:                                                                                                             

After the administrator restarts the Linux server, the system is not connected to the network. Which of the following configuration settings needs to be changed?

28. A company wants to provide internal identity verification services for networked devices. Which of the following servers should be installed?

29. An administrator notices a directory on a web server named /var/www/html/old_reports that should no longer be accessible on the web. Which of the following commands will accomplish this task?

30. A Linux administrator wants to configure log messages of critical or higher severity levels from the cron utility to be logged to the console. Which  of the following will accomplish this objective?

31. A file server is sharing a directory called /share between team members inside a company. The fileshare needs to be moved from serverA to /newshare located on serverB with all permissions and attributes preserved. Which of the following commands would BEST achieve this task?

32. An administrator needs to look at a log for an application on a systemd-based system. There is no log for this application in /var/log. Which of the following is another way to view the application log on this system?

33. Which of the following is true about Type 2 hypervisors?

34. A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?

35. Using which of the following control mode commands is the correct way to substitute all occurrences of /dev/

sdc with /dev/sdd while editing a file in vi?

36. A user needs to modify the IP address of a laptop. Which of the following files can be used to configure the network interface named eth0?

37. A user wants to use terminal services from a Windows workstation to manage a Linux server. Which of the following should be installed on the Linux server to enable this functionality?

38. On a UEFI-based system, which of the following invokes GRUB2 from the EFI command prompt?

39. A systems administrator notices a large number of autoloaded device modules are no longer needed and decides to do a cleanup of them. Which of the following commands will accomplish this task?

40. A Linux administrator looks at the /etc/timezone file and determines the need to change the time zone from California to New York temporarily. Which of the following commands will accomplish this?

41. A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user’s account?

42. A systems administrator receives a report that the web server is not running after a planned system reboot.

After starting the web server manually, which of the following commands should the administrator issue to ensure the web server starts at boot time?

43. An administrator is reviewing updates in the master online Git repository and notices a file named .htaccess. The file contains passwords and should only be in the administrator’s local repository, not the online one. Which of the following would prevent this file from appearing online in the future?

44. A technician wants to secure a sensitive workstation by ensuring network traffic is kept within the local subnet. To accomplish this task, the technician executes the following command:

echo 0 > /proc/sys/net/ipv4/ip_default_ttl

Which of the following commands can the technician use to confirm the expected results? (Choose two.)

45. An administrator needs to create a file named hello in the home directory that contains the following text: it's me!

Which of the following commands would accomplish this goal?

46. Which of the following commands will let a Linux user know the PCI devices that are installed in the system?

47. A Linux administrator is updating iptables rules and is given the following tasks: Output a list of iptables rules.

Remove all iptables rules.

Which of the following actions should be performed from the terminal console to accomplish these tasks? (Choose two.)

48. A junior Linux administrator is performing version control on a Git repository. The administrator is given a list of tasks to complete:

List the currently installed Git release.

Show the status reporting of the clone.

Which of the following commands would allow the administrator to complete these tasks? (Choose two.)

49. A systems administrator needs to allow the Linux server to receive HTTP connections from Internet hosts. By default, the port for HTTP connections is blocked. Which of the following rules should be added in the firewall to allow this type of connection?

50. A Linux administrator attempts to install the package newprogram.x86_64.rpm using a package manager. The administrator receives a warning indicating the command that was run was using a deprecated package manager. Which of the following commands should the administrator use to avoid the warning and install the newprogram.x86_64.rpm program?

51. Which of the following would allow remote users to access a corporate server? (Choose two.)

52. A junior administrator is configuring local name lookups for fully qualified domain names in an isolated environment. The administrator is given a checklist and must accomplish the following tasks:

Add localhost with loopback address.

Add 192.168.192.12/24 to resolve to database01.comptia.org

Given this scenario, which of the following steps should the administrator perform to accomplish these tasks?

53. An administrator is reviewing suspicious activity on a server and needs to determine which users logged into the system within the past 24 hours. Which of the following commands should the administrator run to determine this?

54. During the final step of staging new Linux hardware, GRUB2 is installed to the system drive. Which of the

following BEST describes the role of GRUB2 in a new Linux installation?

55. A site reliability engineer updated the latest configuration management scripts and committed them to a workstream called either test or patch. A Linux administrator wants to ensure these latest workstreams are able to be retrieved to the server. Which of the following is the BEST Git attribute to use?

56. A systems administrator wants to disable the Linux Kernel WatchDog Timer Driver for security purposes. Which of the following will accomplish this task?

57. In which of the following Linux GUI environments would the Konsole application MOST likely be found?

58. A new user has been added to a Linux machine. Which of the following directories would contain the user’s default files?

59. An issue was discovered on a testing branch of a Git repository. A file was inadvertently modified and needs to be reverted to the master branch version. Which of the following is the BEST option to resolve the issue?

60. A junior systems administrator has generated a PKI certificate for SSH sessions. The administrator would like to configure authentication without passwords to remote systems. Which of the following should the administrator perform?

61. A junior systems administrator is scanning archive.tar files with an antivirus scanner. The administrator is given the following tasks:

List all files that are in the archive.tar files. Extract all files from the archive.tar files.

Which of the following actions should be performed to meet these requirements? (Choose two.)

62. A corporate server security policy states, “Ensure password hashes are not readable by non-administrative users.†         The administrator should check the permissions on which of the following files to ensure the server

satisfies this policy?

63. A Linux systems administrator is implementing Source Code Management for the web application server configuration files located in /etc/httpd/. Which of the following steps should the administrator perform FIRST?

64. A junior systems administrator is tasked with providing the network_administrators group the ability to perform sudo without prompting for a password. Which of the following steps should the administrator perform to accomplish this task? (Choose two.)

65. A storage administrator in a virtualized environment has been told by a user that there is no space left on the volume to which the user can write. However, a check reveals that there is 20GB of unused space. Which of the following explains the discrepancy?

66. A systems administrator has scheduled a system update for a server. The update includes a resynchronization of the package database and updates to the current packages and the system distribution packages. Which of the following commands contains the proper order of this update?

67. An administrator receives the following message on a remote server: Cannot open display. Which of the following should the administrator have used to log in to the server?

68. A junior administrator is installing kernel modules. The administrator is given a checklist that outlines the following tasks to be completed:

Display currently installed module version. Display which modules loaded at startup.

Which of the following commands would be used to accomplish these tasks? (Choose two.)

69. An administrator wants to know the amount of memory installed on a Linux server. Which of the following commands can be used to accomplish this task?

70. A Linux administrator is helping the security team troubleshoot an SELinux policy violation incident. Which of the following would be the BEST utility command to display SELinux violation and AVC denial messages?

71. A systems administrator received a request to change the hostname to a new name. Which of the following file configurations should be changed to fix the hostname in the server?

72. An administrator notices the HISTSIZE variable is 50, using the commands below:

HISTSIZE=50

export HISTSIZE

The administrator rechecks the HISTSIZE value using echo HISTSIZE but gets no value. Which of the following commands should the administrator use to retrieve its value?

73. Users in the payroll department are not configured to use DNS due to security concerns. The users ask the junior Linux administrator to configure their workstations to access the payroll server at 192.168.204.11 by the name “Payroll†. Which of the following commands should the administrator issue to meet this request?

74. A systems administrator downloads an application’s source files, compiles the application, and installs it per the application’s installation instructions. When trying to run the application, the system states:

$ occmd

bash: occmd: command not found…

Running the locate command shows it does exist in the following location:

/opt/occmd/bin/occmd

Which of the following should the administrator do to allow the command to run properly? (Choose two.)

75. A Linux administrator tries to ping a hostname in a network but receives the message: hostname not found. The administrator is sure the name exists on the network and wants to verify if the DNS server is correctly configured on the client. Which of the following files should the administrator use to verify this

information?

76. Users are unable to connect to a server using HTTPS. The administrator runs the following command on the remote system:                                                                                                                                                                          Then, the administrator runs the following command from a local workstation:                                                                           

Which of the following steps should the administrator take to address the issue?

77. A Linux administrator is restoring the SELinux contexts on an entire system. Which of the following commands is the BEST option to complete this task?


 

Download full version

Related Exams

Are Splunk certifications worth it?

Splunk is a popular software platform used for searching, analyzing, and visualizing machine-generated data. It’s commonly used in fields such as IT, security, and finance to help organizations make data-driven decisions. One way to increase

About The Author

Certspilot

Certspilot is a platform where you can get to access to free Practice test questions for all IT certification like Microsoft, AWS, CompTIA, Salesforce, Cisco, CISSP and others certifications exam, you can download Updated and Valid Exam Dumps in PDF format and prepare yourself for certification exam in very short time. If you have any other question or need assistance regarding to your certification exam, click on Live Chat Icon and get in touch with our customer support agent, we are available 24/7 for customer support or send email at
[email protected].

Leave a Comment