Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

XK0-005 Exam Dumps - CompTIA Linux+ Exam

Go to page:
Question # 105

A Linux administrator would like to measure possible packet loss between a workstation and a remote web application that is running on port 443. Which of the following would be the best command for the administrator to use to display this information?

A.

ping -c 50

B.

tcpdump -p 443

C.

mtr -T -P 443

D.

traceroute -p 443

Full Access
Question # 106

A Linux administrator is creating a user that can run the FTP service but cannot log in to the system. The administrator sets /bin/false as a login shell for the user. When the user tries to run the FTP service, it is rejected with an "invalid shell: /bin/false" message. Which of the following is the best way to resolve the issue?

A.

Change ownership of /bin/false to the FTP user

B.

Add /bin/false entry to the /etc/shells file

C.

Make /bin/false an executable file

D.

Change the user’s default shell to /bin/bash

Full Access
Question # 107

The development team wants to prevent a file from being modified by all users in a Linux system, including the root account. Which of the following commands can be used to accomplish this objective?

A.

chmod / app/conf/file

B.

setenforce / app/ conf/ file

C.

chattr +i /app/conf/file

D.

chmod 0000 /app/conf/file

Full Access
Question # 108

A developer wants to ensure that all files and folders created inside a shared folder named /GroupOODEV inherit the group name of the parent folder. Which of the following commands will help achieve this goal?

A.

chmod g+X / GroupOODEV/

B.

chmod g+W / GroupOODEV/

C.

chmod g+r / GroupOODEV/

D.

chmod g+s / GroupOODEV/

Full Access
Question # 109
A.

iptables -L -s 192.168.10.22 -j ACCEPT

B.

iptables -D INPUT -s 192.168.10.22 -j ACCEPT

C.

iptables -A INPUT -s 192.168.10.22 -j ACCEPT

D.

iptables -A OUTPUT -S 192.168.10.22 -j ACCEPT

Full Access
Question # 110

The security team has identified a web service that is running with elevated privileges A Linux administrator is working to change the systemd service file to meet security compliance standards. Given the following output:

Which of the following remediation steps will prevent the web service from running as a privileged user?

A.

Removing the ExecStarWusr/sbin/webserver -D SOPTIONS from the service file

B.

Updating the Environment File line in the [Service] section to/home/webservice/config

C.

Adding the User-webservice to the [Service] section of the service file

D.

Changing the:nulti-user.target in the [Install] section to basic.target

Full Access
Question # 111

Users are reporting that a Linux server is responding slowly. A systems administrator troubleshooting the server issue sees the following:

# iostat -m 2

Linux 3.10.0-1160.66.1.el7.x86_64 (myhost) 10/19/2022 x86_64 (4 CPU)

avg-cpu: %user %nice %system %iowait %steal %idle

24.30 0.01 0.29 50.38 4.00 19.01

Device: tps MB_read/s MB_wrtn/s MB_read MB_wrtn

sdd 15.65 0.48 0.83 4936250 8513501

# df -h

Filesystem Size Used Avail Use% Mounted on

devtmpfs 16G 0 16G 0% /dev

tmpfs 16G 64K 16G 1% /dev/shm

/dev/mapper/root 35G 8.8G 26G 26% /

/dev/sda2 497M 144M 354M 29% /boot

/dev/mapper/tmp 10G 38M 10G 1% /tmp

/dev/mapper/var 15G 13G 2.2G 86% /var

/dev/mapper/varlib 650G 397G 254G 62% /var/lib

/dev/mapper/varlog 15G 9.5G 5.5G 64% /var/log

/dev/mapper/varaudit 15G 72M 15G 1% /var/log/audit

Which of the following is most likely the issue?

A.

The CPU is mostly waiting for I/O operations.

B.

/ filesystem does not have enough storage allocated.

C.

/var filesystem is almost full.

D.

The CPU capacity is inadequate.

Full Access
Question # 112

A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing entries in uppercase or lowercase letters should be included in the list. Which of the following commands should the administrator use to accomplish this task?

A.

find . -type f -print | xrags grep -ln denied

B.

find . -type f -print | xrags grep -nv denied

C.

find . -type f -print | xrags grep -wL denied

D.

find . -type f -print | xrags grep -li denied

Full Access
Go to page: