Month End Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

XK0-004 CompTIA Linux+ Certification Exam Questions and Answers

Questions 4

An administrator is writing a Bash script to audit SSH logins. Which of the following logs would the administrator parse to find the needed information?

Options:

A.

/var/log/secure/

B.

/var/log/messages

C.

/var/log/firewalld

D.

/var/log/sssd

Buy Now
Questions 5

A developer has contacted a systems administrator because an application is not receiving a response from the client. The application must purge the message queue before terminating. Which of the following should the systems administrator perform in order to BEST address the issue?

Options:

A.

Send the SIGHUP signal with the kill command.

B.

Send the signal with the command.

C.

Send the SIGSTOP signal with the kill command.

D.

Send the SIGTERN signal with the kill command.

Buy Now
Questions 6

A systems administrator would like to back up all of the'. conf' files on a server The administrator runs the command:

Find / --name ‘’*conf’’ > backup,tar

After investigating the backup, tar file the administrator realizes that the contents of the configuration files were not backed up property. Which of the following would BEST accomplish this task?

Options:

A.

find / -name ''*conf'' | xargs -- verbose tar xvf backup,tar

B.

find/ -name ''*conf'' exec echo { } \; > backup.tar

C.

find / -name ''*conf'' | cpio -o --format=tar > backup.tar

D.

tar -jtf -<<$(find /-name ''*conf'')

Buy Now
Questions 7

A newly deployed application is not able to reach the database that is running on a Linux server. The connection should occur at port 1521/tcp from appsrv 192.168.1.11 to dbsrv

192.168.1.12.

A server administrator runs a few diagnostic commands with following results:

The same command when run from the application server gives the following result:

Both machines are in the same IP subnet, so no external network device is causing the issue.

Which of the following commands BEST solves the connectivity issue at the dbsrv machine? (Select TWO).

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

F.

Option F

Buy Now
Questions 8

A user needs to modify the IP address of a laptop. Which of the following files can be used to configure the network interface named eth0?

Options:

A.

/etc/sysconfig/network/interfaces.cnf

B.

/system/config/interfaces

C.

/etc/sysconfig/network-scripts/ifcfg-eth0

D.

/system/networking/ifconfig

E.

/etc/interfaces/eth0.conf

Buy Now
Questions 9

A junior systems administrator is scanning archive.tar files with an antivirus scanner. The administrator is given the following tasks:

  • List all files that are in the archive.tar files.
  • Extract all files from the archive.tar files.

Which of the following actions should be performed to meet these requirements? (Choose two.)

Options:

A.

tar -tvf archive.tar

B.

tar -xf archive.tar

C.

tar -A archive.tar

D.

tar -av archive.tar

E.

tar -r archive.tar

F.

tar -uvz archive.tar

Buy Now
Questions 10

A Linux administrator updated the graphics drivers using a package manager but now the server does not boot. Which of the following is the BEST way to get the server back into an operational state?

Options:

A.

Use a system recovery disk to copy the server data to a new system.

B.

Reboot the server with an older kernel version.

C.

Kickstart the server and restore to the last system backup.

D.

Boot a live CD mount and cferoot the boot partition, and run fsck.

Buy Now
Questions 11

Which of the following is a file that can define how to build, deploy, and install various components for a Linux application hosted in a cloud environment?

Options:

A.

OVF

B.

YAML

C.

Virsh

D.

VMM

Buy Now
Questions 12

A Linux administrator needs to schedule a backup job to run every Friday at 2 15 a.m. Which of the following lines should the administrator add to the crontab file?

Options:

A.

15 2 * * 5 /bin/backup_job.sh

B.

2 15 * * 5 /bin/backup_job.sh

C.

2 * * 15 5 /bin/backup_job.sh

D.

2 * 5 15 * /bin/backup_job.sh

Buy Now
Questions 13

A systems administrator wants to disable the Linux Kernel WatchDog Timer Driver for security purposes.

Which of the following will accomplish this task?

Options:

A.

Add blacklist watchdog to the /etc/modprobe.d/blacklist file.

B.

Rename the /etc/modprobe.d/watchdog file to watchdog.off instead.

C.

Remove the watchdog=1 from the /usr/modules/watchdog.conf file.

D.

Add watchdog=0 to the /etc/modprobe.conf file.

Buy Now
Questions 14

A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user’s account?

Options:

A.

pam_tally2 --user=user --reset

B.

passwd -u user -G root

C.

usermod -u user -G root

D.

chage -1 user=user --reset

Buy Now
Questions 15

A Linux administrator is testing a new web application on a local laptop and consistently shows the following 403 errors in the laptop’s logs”

The web server starts properly, but an error is generated in the audit log. Which of the following settings should be enabled to prevent this audit message?

Options:

A.

httpd_can_network_connect = 1

B.

httpd_enable_scripting = 1

C.

httpd_enable_homedirs = 1

D.

httpd_enable_cgi = 1

Buy Now
Questions 16

A Linux administrator is configuring a server to log security events for the ping command while allowing the request to occur. The Linux server is using AppArmor to manage its security services.

Which of the following commands is the BEST option?

Options:

A.

aa-complain /bin/ping

B.

aa-disable /bin/ping

C.

aa-unconfined /bin/ping

D.

aa-enforce /bin/ping

Buy Now
Questions 17

A systems administrator needs to install a new piece of hardware that requires a new driver. The driver should be manually installed. Which of the following describes the order of commands required to obtain module information, install the module, and check the log for any errors during module installation?

Options:

A.

lsmod, modprobe, modinfo

B.

modinfo, insmod, modprobe

C.

modinfo, insmod, dmesg

D.

lsmod, insmod, dmesg

Buy Now
Questions 18

Which of the following is used on the client to boot a Linux system from a TFTP server?

Options:

A.

HTTP

B.

GRUB

C.

EFI

D.

PXE

Buy Now
Questions 19

A technician suspects a company's border firewall is down, thus blocking Internet access. The technician executes the following commands:

#ping -c 1 firewall.company.com

64 bytes from firewall.company.com (192.168.1.1): icmp_seq=1 ttl=64 time=0.061ms

#ping -c 16 www.comptia.com

16 packets transmitted, 0 received, 100% packet loss, time 14999ms

Which of the following commands should the technician use to BEST determine the source of this outage?

Options:

A.

tcpdump

B.

nmap

C.

dig

D.

traceroute

Buy Now
Questions 20

A systems administrator uses a remote execution engine to iterate through each IP address in a network and run a script on remote hosts. The script captures the remote system's hostname, IP address, OS distribution, and system uptime. The output of the script gets saved to the administrator's local workstation for future processing.

Which of the following is this an example of?

Options:

A.

Performance monitoring

B.

Inventory

C.

Agentless

D.

Infrastructure as code

E.

Build automation

Buy Now
Questions 21

A file server is sharing a directory called /share between team members inside a company. The fileshare

needs to be moved from serverA to /newshare located on serverB with all permissions and attributes

preserved. Which of the following commands would BEST achieve this task?

Options:

A.

rsync -aHAX /share/* serverB:/newshare

B.

dd if=/share/* of=serverB:/newshare

C.

tar -cvf /share/* serverB:/newshare

D.

mirrorlv /share/* serverB:/newshare

Buy Now
Questions 22

A directory called /employee is shared with many employees in a company. New hardware was acquired, and the systems administrator needs to back up all files in /employee before the server is replaced.

Which of the following commands should be used to back up all the files and compress them to use little space in the filesystem?

Options:

A.

tar -zcvf backup.tar.gz /employee

B.

tar -zxvf backup.tar.gz /employee

C.

tar -Cvf backup.tar.gz /employee

D.

tar -Tpf backup.tar.gz /employee

Buy Now
Questions 23

In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.

Which of the following files should be edited to accomplish this?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh_config

C.

~/.ssh/ssh_config

D.

/etc/ssh/known_hosts

Buy Now
Questions 24

A junior Linux administrator needs to create 16 empty files quickly that will contain sales information for each

quarter for the past four years. Which of the following commands will meet this requirement?

Options:

A.

touch {2015,2016,2017,2018}.{q1,q2,q3,q4}

B.

touch [2015,2016,2017,2018].[q1,q2,q3,q4]

C.

touch ‘2015,2016,2017,2018‘.‘q1,q2,q3,q4‘

D.

touch {2015.2016.2017.2018}.{q1.q2.q3.q4}

Buy Now
Questions 25

A user receives an access_denied error when trying to modify a file, even though the file permissions are set

to 777. Which of the following commands should be used to view additional file permissions?

Options:

A.

getsebool

B.

getenforce

C.

ls -z

D.

ps -z

Buy Now
Questions 26

A Linux administrator tries to ping a hostname in a network but receives the message: hostname not found. The administrator is sure the name exists on the network and wants to verify if the DNS server is correctly configured on the client. Which of the following files should the administrator use to verify this information?

Options:

A.

/etc/named.conf

B.

/etc/resolv.conf

C.

/etc/nsswitch.conf

D.

/etc/network

Buy Now
Questions 27

An administrator notices a directory on a web server named /var/www/html/old_reports that should no

longer be accessible on the web. Which of the following commands will accomplish this task?

Options:

A.

chmod 000 /var/www/html/old_reports

B.

chgrp root /var/www/html/old_reports

C.

chown apache /var/www/html/old_reports

D.

setenforce apache /var/www/html/old_reports

Buy Now
Questions 28

A junior administrator is installing kernel modules. The administrator is given a checklist that outlines the

following tasks to be completed:

Display currently installed module version.

Display which modules loaded at startup.

Which of the following commands would be used to accomplish these tasks? (Choose two.)

Options:

A.

cat /etc/issue

B.

insmod

C.

lsmod

D.

rmmod

E.

depmod

F.

dmesg

Buy Now
Questions 29

A systems administrator downloads an application’s source files, compiles the application, and installs it per

the application’s installation instructions. When trying to run the application, the system states:

$ occmd

bash: occmd: command not found…

Running the locate command shows it does exist in the following location:

/opt/occmd/bin/occmd

Which of the following should the administrator do to allow the command to run properly? (Choose two.)

Options:

A.

sudo ln –s /opt/occmd/bin/occmd /usr/local/bin/occmd

B.

echo “export PATH=$PATH:/opt/occmd/bin” >> ~/.bashrc

C.

mv /opt/occmd ~/ && ln –s ~/occmd/bin/occmd ./occmd

D.

echo “#!/bin/bash \n ${which occmd}” > /usr/bin/occmd.sh

E.

sudo mv /opt/occmd/bin/occmd /etc/bin/

F.

cd /opt/occmd/bin && chmod +x ./occmd && restorecon –rv *

Buy Now
Questions 30

An administrator needs to see the type of CPU that a server is running. Which of the following files contains this information?

Options:

A.

/proc/cpuinfo

B.

/etc/devices/info.conf

C.

/dev/proc/cpu

D.

/sys/dev/cpuinfo

Buy Now
Questions 31

A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?

Options:

A.

OWASP

B.

VDI

C.

VMDK

D.

OVA

Buy Now
Questions 32

A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task?

Options:

A.

Use curl to copy each user’s public key file to the respective system

B.

Use cp to copy each user’s public key file to the respective system

C.

Use ssh-copy-id to copy each user’s public key file to the respective system

D.

Use ssh-copy-id to copy each user’s private key file to the respective system

Buy Now
Questions 33

Which of the following BEST describes running on a Linux system?

Options:

A.

Containers only need the namespaces functionally to run on a Linux system available since kernel 2.6.

B.

Containers need a hypervisor to run a Linux system. Cgroups namespaces are functionalities used for the kernel but not for running containers.

C.

Containers only need the cgroups functionality for running on a Linux system. Namespaces is not a Linux kernel functionality needed for creating and managing containers.

D.

Containers use the cgroups and namespaces functionalities to isolate processes and assign hardware resources to each of those isolated processes.

Buy Now
Questions 34

A Linux administrator is restoring the SELinux contexts on an entire system. Which of the following commands

is the BEST option to complete this task?

Options:

A.

setenforce 0 && reboot

B.

setfacl –bR / && reboot

C.

touch /.autorelabel && reboot

D.

restorecon / && reboot

Buy Now
Questions 35

A Linux storage administrator wants to create a logical volume group. Which of the following commands is required to start the process?

Options:

A.

pvcreate

B.

vgcreate

C.

lvcreate

D.

mkfs.xfs

Buy Now
Questions 36

A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file.

Which of the following is the BEST reason to do this?

Options:

A.

To document the infrastructure so it can be included in the system security plan

B.

To ensure the administrator follows the planning phase of the system development life cycle

C.

To define the infrastructure so it can be provisioned consistently with minimal manual tasks

D.

To validate user requirements have been met within each regional datacenter for compliance

Buy Now
Questions 37

A junior system administrator had trouble installing and running an Apache web server on a Linux server. You have been tasked with installing the Apache web server on the Linux server and resolving the issue that prevented the junior administrator from running Apache.

INSTRUCTIONS

Install Apache and start the service. Verify that the Apache service is running with the defaults.

Typing “help” in the terminal will show a list of relevant commands.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CentOS Command Prompt

Options:

Buy Now
Questions 38

An administrator is analyzing a Linux server which was recently hacked.

Which of the following will the administrator use to find all unsuccessful login attempts?

Options:

A.

nsswitch

B.

faillock

C.

pam_tally2

D.

passwd

Buy Now
Questions 39

A Linux user wants to give read-only permissions to a directory and its contents. Which of the following

commands will allow the user to accomplish this task?

Options:

A.

chmod –R 400 /new_directory/

B.

chmod –R 600 /new_directory/

C.

chmod 400 /new_directory/

D.

chmod 600 /new_directory/

Buy Now
Questions 40

A Linux administrator needs to prevent the Postfix mail transfer agent from starting on boot.

Which of the following commands will accomplish this task?

Options:

A.

systemctl stop postfix.service

B.

/etc/init.d/postfix stop

C.

systemctl disable postfix.service

D.

/etc/init.d/postfix disable

Buy Now
Questions 41

An administrator is troubleshooting an issue where end users are waiting a very long times for processes to respond. The top command reveals that multiple processes seem to be m a non-responsive state or have become zombies. Which of the administrator use to clean up the system?

Options:

A.

Pkill –o 15m

B.

Killall –n

C.

Pkill –x

D.

Killall –o 15m

Buy Now
Questions 42

A Linux administrator opens a ticket to have an external hard drive mounted. As a security policy, external storage kernel modules are disabled.

Which of the following is the BEST command for adding the proper kernel module to enable external storage modules?

Options:

A.

rmmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko

B.

modinfo /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko

C.

depmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko

D.

insmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko

Buy Now
Questions 43

A junior administrator needs to unload an older video kernel module.

Which of the following commands would BEST accomplish this task?

Options:

A.

modprobe

B.

insmod

C.

rmmod

D.

chmod

Buy Now
Questions 44

A systems administrator must clean up all application files in the directory /var/log/app. However, the company’s security policy requires the files to be kept on the backup server for one year. The Linux server has only the tar and bzip2 packages installed.

Which of the following commands will package and compress the files?

Options:

A.

tar –zcvf applicationfiles.tar.bz2 /var/log/app/*

B.

tar –jcvf applicationfiles.tar.bz2 /var/log/app/*

C.

tar –cvf applicationfiles.tar.bz2 /var/log/app/*

D.

tar –xvf applicationfiles.tar.bz2 /var/log/app/*

Buy Now
Questions 45

A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?

Options:

A.

mtr www.comptia.org

B.

tracert www.comptia.org

C.

ping www.comptia.org

D.

netstat www.comptia.org

Buy Now
Questions 46

A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?

Options:

A.

free, fack, partprobe

B.

lsof, lvcreate, mdadm

C.

df, du, rmmod

D.

fdisk, mkswap, swapon -a

Buy Now
Questions 47

Which of the following will MOST likely fix the issue?

Options:

A.

Add more CPUs to the server

B.

Replace the network cable

C.

Add a second web server and a load balancer

D.

Add more RAM to the server

E.

Exclude the web root directory from antivirus scanning

Buy Now
Questions 48

A Linux administrator needs to ensure a service no longer starts when a system running SysVinit is booted. Which of the following commands should the administrator use?

Options:

A.

systemctl disable application

B.

chkconfig application off

C.

echo "manual" > /etc/ init/ application/override

D.

service application Stop

Buy Now
Questions 49

A Linux administrator is confirming information on a system. The administrator issues a series of commands and gets the following output:

Which of the following did the administrator issue?

Options:

A.

Ismod | sort

B.

dmesg | more

C.

insmod video > dev/ttyS0

D.

modprobe video ismod

Buy Now
Questions 50

A security audit concludes that an organization's database servers need to be hardened As a result, an administrator obtans tie fofcjwwng partial Nmap output from a database server.

Which of the following commands should the administrator execute to mitigate security risks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 51

Which of the following should the systems administrator use to ensure the test account is disabled after 24 hours if the account's password has expired?

Options:

A.

passwd -1 test —t 24

B.

passwd -i 1 test

C.

passwd -e test 24

D.

passwd -d -l —n 1 test

Buy Now
Questions 52

The grub2-mXconfig command is used to generate a new GRUB2 configuration after:

Options:

A.

resizing the /best filesystem

B.

changing the/etc/default/grub file

C.

changing the /boat/grub2/grub.cfg file

D.

installing new software from a package

Buy Now
Questions 53

A Linux administrator created a new log file in /var/log/newlog to monitor a newly installed application. The administrator is now configuring paramters of the file so it will be rotated on a weekly basis or when it becomes larger than 1MB in...

should exist in the /var/log directory. Which of the following should be added to he /etc/ logrotate.conf file to meet this objectives?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 54

A Linux administrator wants to load the KVM module into the kernel. Which of the following commands should the administrator use?

Options:

A.

modporbe kvm

B.

rmmod kvm

C.

insmod kvm

D.

depmod kvm

Buy Now
Questions 55

A system administrator needs to bootstrap a series of Ubuntu images for a public provider. The administrator must ensure at the images contain the exact same updates, custom. Configure files after their first and then automatically. Which of the following tools the administrator user?

Options:

A.

Ansible

B.

Docker

C.

Cloud-init

D.

Anaconda

Buy Now
Questions 56

A Linux administrator needs to know the MAC address of the server’s gateway.

Which of the following commands should the administrator run to obtain this information?

Options:

A.

arp -gw

B.

arp -a

C.

arp -gwi

D.

arp -gtw

Buy Now
Questions 57

A Linux administrator is configuring a web server that connects to an external SQL database. However, after starting the web application, the logs are showing an error message:

Which of the following is the BEST way to resolve this issue?

Options:

A.

echo 0 > seLinux/enforce

B.

restorecon -rv /var/www/ html

C.

sed -1 s/'SELINUX. */SELINUX’’permissive// etc/selinux/config

D.

setseboo1 -p http-can-network_connect_db 1

Buy Now
Questions 58

A systems administrator is attempting to access a server by SSH. The Linux administrator ensures that the SSH keys on the remote server were unable to connect. The following error message is being displayed:

Which of the following needs to be changed on order for the administrator to access the server via SSH?

Options:

A.

Password

B.

SSL

C.

SELinux

D.

OpenSSH

Buy Now
Questions 59

An administrator receives a USB drive and wants to make an exact copy of the disk before starting to work on it. One of the partitions on the USB drive was mounted as /dev/sdc1.

Which of the following commands should the administrator use?

Options:

A.

dd if=/dev/sdc of=~/usb_copy.img bs=512

B.

dd if=/dev/sdc1 of=~/usb_copy.img count=1024

C.

dd if=/dev/sdc1 of=~/usb_copy.img bs=1024

D.

dd of=/dev/sdc if=~/usb_copy.img bs=1M

Buy Now
Questions 60

An administrator wants to be able to access a remote server. After creating an SSH key pair, which of the following describes where the public key should be placed to allow for key-based authentication?

Options:

A.

-/, ssh/authorized_keys

B.

-/ssh/id_ras.pub

C.

-/.ssh/known_hosts

D.

-/.ssh/config

Buy Now
Questions 61

A network administrator installed a web server on a Linux host and added a firevalid command to open port tcp/80. The web server worked without error until an updated and patch kernel was installed on the system a month later. Now users are unable to access the web server even though the service is running, which of the following would fix the issue?

Options:

A.

Use the firevalid command to open the HTTP application service rather than the port.

B.

Change the firevalid zone t private and open port tcp/80.

C.

Issue an additional firevalid command to open up port tcp/443 as well as port tcp/80.

D.

Use the firevalid command to open tcp/80 both with and without the –permanent switch.

Buy Now
Questions 62

Which of the following is commonly implemented in external devices to provide unique event-based two-factor authentication credentials when a system is already implementing username and password authentication?

Options:

A.

TACACS+

B.

HOTP

C.

Biometrics

D.

LDAP

E.

PIN

Buy Now
Questions 63

Which of the following command should an administrator use to prevent users from starting the httpd service on a system-based Linux system?

Options:

A.

Systemct1 mask httpd

B.

Systemct1 disables httpd

C.

Chkconfig httpd off

D.

Systemctl stop httpd

Buy Now
Questions 64

A systems administrator needs to install software packages on a server from an Internet-based repository. The server does not have Internet connectivity.

Which of the following can be used to allow the server to connect to the Internet through the systems administrator’s desktop?

Options:

A.

Local package repository

B.

UUCP

C.

Remote SSH port forwarding

D.

X11 forwarding

Buy Now
Questions 65

A server administrator is given the hash of an account password that needs to be synchronized across all servers.

Which of the following will allow the server administrator to configure the account password?

Options:

A.

Edit the password file.

B.

Use the usermod command.

C.

Edit the shadow file.

D.

Use the passwd command.

Buy Now
Questions 66

A systems administrator a retting an HTTPO server on a Lnux server and configuring as a proxy server The administrator runs the following commands to venfy that the service is running:

However, the arjminrstraior is getting a 503 error when browsing to portal.company. internal. After reviewing the logs, the following error information is discovered:

Which of the following commands BEST resolves the issue?

Options:

A.

sentforce 0

B.

susearch -m USER_LOGIN -sv no

C.

grep http /var/log/audit/audit,log| audit2why

D.

setsebool -p httpd_can_network_connect 1

Buy Now
Questions 67

Vytvcft of the following a a fie that can define how to build deploy and mstaf various components for a Linux application hosted m a cloud environment?

Options:

A.

OVF

B.

YAML

C.

Virsh

D.

VMM

Buy Now
Questions 68

Which of the following is the MOST common method used to access Windows systems that are running in a cloud provider from a Linux system?

Options:

A.

SSH

B.

NX

C.

XRDP

D.

VNC

Buy Now
Questions 69

An administrator is setting UP a NAT gateway. Two interfaces have been configured:

The firewall configuration has been completed:

The IP forwarding configuration parameter is:

When testing the NAT from a workstation, the administrator encounters an issue:

Which of the following is the MOST likely cause of the packet loss?

Options:

A.

The MASQUERADE source and destination are in the incorrect order,

B.

The firewall is blocking the connection.

C.

The etho interface is wrong.

D.

IPv4 forwarding has not been enabled on the NAT gateway

Buy Now
Questions 70

A user wants to configure the application “myapp” to start on runlevels 2, 3, 4, and 5 every time the system starts.

Which of the following commands will accomplish this task?

Options:

A.

chkconfig --level 2345 myapp on

B.

systemctl myapp on 2345

C.

chkcinfig myapp --levels 2-5

D.

systemctl --levels 2345 on

Buy Now
Questions 71

Which of the following directories will help an administrator identify the specifications of a Linux server in term of resources?

Options:

A.

/sys

B.

/Proc

C.

/Var

D.

/usr

Buy Now
Questions 72

A systems administrator is editing a service file for the web server. In order to continue testing, all web server processes must be shut down. The administrator accomplishes this with the following commands:

Based on the command output above, which of the following BEST explains how this was accomplished?

Options:

A.

Killing the parent process with -15 gives it a chance to kill all of the child processes.

B.

The -15 signal will allow the kill command to automatically seek out all child processes and kill them as well.

C.

The -15 signal tells the kill command to kill all processes matching the Apache string.

D.

The -15 signal gracefully kills the process and all Its parent and child processes.

Buy Now
Exam Code: XK0-004
Exam Name: CompTIA Linux+ Certification Exam
Last Update: Mar 18, 2023
Questions: 483
XK0-004 pdf

XK0-004 PDF

$28  $80
XK0-004 Engine

XK0-004 Testing Engine

$33.25  $95
XK0-004 PDF + Engine

XK0-004 PDF + Testing Engine

$45.5  $130