DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CompTIA XK0-005 Exam Essentials: Exam Questions & Practice Tests, CompTIA Linux+ Certification | SPOTO

Master the CompTIA Linux+ XK0-005 certification with our comprehensive exam essentials. Identify strengths and weaknesses through our extensive bank of online exam questions, sample questions, and exam dumps. Access verified exam questions and answers to ensure thorough preparation for the latest XK0-005 objectives. Test your skills with our free mock exams, designed to simulate the real certification experience faced by early career Linux systems administrators. Leverage our interactive exam practice resources, including detailed explanations and performance tracking, to reinforce your understanding. Stay ahead of the curve with our continually updated exam materials, including practice tests covering real-world scenarios. Validate your Linux proficiency and boost your confidence with our exam essentials.

Take other online exams

Question #1
Joe, a user, is unable to log in to the Linux system. Given the following output: Which of the following commands would resolve the issue? The commandpam_tally2 -u joe -rwill resolve the issue of Joe being unable to log in to the Linux system. Thepam_tally2command is a tool for managing the login counter for the PAM (Pluggable Authentication Modules) system. PAM is a framework for managing authentication and authorization on Linux systems. PAM allows the administrator to define the rules and policies for a
A. sermod -s /bin/bash joe
B. am_tally2 -u joe -r
C. asswd -u joe
D. hage -E 90 joe
View answer
Correct Answer: B
Question #2
A cloud engineer needs to launch a container named web-01 in background mode. Which of the following commands will accomplish this task?
A. docker builder -f --name web-01 httpd
B. docker load --name web-01 httpd
C. docker ps -a --name web-01 httpd
D. docker run -d --name web-01 httpd
View answer
Correct Answer: D
Question #3
A systems administrator is tasked with preventing logins from accounts other than root, while the file /etc/nologin exists. Which of the following PAM modules will accomplish this task?
A. pam_login
B. pam_access
View answer
Correct Answer: D
Question #4
A Linux administrator was asked to run a container with the httpd server inside. This containershould be exposed at port 443 of a Linux host machine while it internally listens on port 8443. Whichof the following commands will accomplish this task?
A. podman run -d -p 443:8443 httpd
B. podman run -d -p 8443:443 httpd C
View answer
Correct Answer: A
Question #5
A Linux administrator has physically added a new RAID adapter to a system. Which of the following commands should the Linux administrator run to confirm that the device has been recognized? (Select TWO). The following commands can help you confirm that the new RAID adapter has been recognized by the Linux system: dmesg: This command displays the kernel messages, which can show the information about the newly detected hardware device. You can usedmesg | grep -i raidto filter the output for RAID-related messa
A. mmod
B. s -11 /etc
C. shw ---class disk
D. vdisplay
E. mdir /dev
F. mesg
View answer
Correct Answer: CF
Question #6
A cloud engineer needs to change the secure remote login port from 22 to 49000. Which of the following files should the engineer modify to change the port number to the desired value?
A. /etc/host
B. /etc/hostname C
View answer
Correct Answer: D
Question #7
A new file was added to a main Git repository. An administrator wants to synchronize a local copy with the contents of the main repository. Which of the following commands should the administrator use for this task?
A. git reflog
B. git pull C
View answer
Correct Answer: B
Question #8
A systems administrator is checking the system logs. The administrator wants to look at the last 20 lines of a log. Which of the following will execute the command? A.tail -v 20
B. tail -n 20 C
View answer
Correct Answer: B
Question #9
A Linux administrator is tasked with creating resources using containerization. When deciding how to create this type of deployment, the administrator identifies some key features, including portability, high availability, and scalability in production. Which of the following should the Linux administrator choose for the new design?
A. Docker
B. On-premises systems
C. Cloud-based systems
D. Kubernetes
View answer
Correct Answer: D
Question #10
Several users reported that they were unable to write data to the /oracle1 directory. The following output has been provided: Which of the following commands should the administrator use to diagnose the issue?
A. df -i /oracle1
B. fdisk -1 /dev/sdb1 C
View answer
Correct Answer: A
Question #11
A systems administrator is compiling a report containing information about processes that are listening on the network ports of a Linux server. Which of the following commands will allow the administrator to obtain the needed information?
A. ss -plnt
B. tcpdump -nL
C. netstat -pn
D. lsof -lt
View answer
Correct Answer: C
Question #12
The security team has identified a web service that is running with elevated privileges A Linux administrator is working to change the systemd service file to meet security compliance standards. Given the following output: Which of the following remediation steps will prevent the web service from running as a privileged user?
A. Removing the ExecStarWusr/sbin/webserver -D SOPTIONS from the service file
B. Updating the Environment File line in the [Service] section to/home/webservice/config
C. Adding the User-webservice to the [Service] section of the service file
D. Changing the:nulti-user
View answer
Correct Answer: A
Question #13
An administrator attempts to rename a file on a server but receives the following error. The administrator then runs a few commands and obtains the following output: Which of the following commands should the administrator run NEXT to allow the file to be renamed by any user?
A. chgrp reet files
B. chacl -R 644 files C
View answer
Correct Answer: D
Question #14
Which of the following files holds the system configuration for journal when running systemd?
A. /etc/systemd/journald
B. /etc/systemd/systemd-journalctl
View answer
Correct Answer: A
Question #15
A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?
A. systemctl stop sshd
B. systemctl mask sshd
C. systemctl reload sshd
D. systemctl start sshd
View answer
Correct Answer: C
Question #16
Which of the following commands will display the operating system?
A. uname -n
B. uname -s C
View answer
Correct Answer: C
Question #17
A Linux administrator needs to analyze a failing application that is running inside a container. Which of the following commands allows the Linux administrator to enter the running container and analyze the logs that are stored inside?
A. docker run -ti app /bin/sh
B. podman exec -ti app /bin/sh C
View answer
Correct Answer: B
Question #18
At what point is the Internal Certificate Authority (ICA) created?
A. During the primary Security Management Server installation process
B. Upon creation of a certificate
C. When an administrator decides to create one
D. When an administrator initially logs into SmartConsole
View answer
Correct Answer: A
Question #19
An administrator needs to make some changes in the IaC declaration templates. Which of the following commands would maintain version control?
A. git clone https://github
B. git clone https://qithub
View answer
Correct Answer: D
Question #20
A systems administrator needs to clone the partition /dev/sdc1 to /dev/sdd1. Which of the following commands will accomplish this task?
A. tar -cvzf /dev/sdd1 /dev/sdc1
B. rsync /dev/sdc1 /dev/sdd1 C
View answer
Correct Answer: C
Question #21
A systems administrator is troubleshooting a connectivity issue pertaining to access to a system named db.example.com. The system IP address should be 192.168.20.88. The administrator issues the dig command and receives the following output:The administrator runs grep db.example.com /etc/hosts and receives the following output:Given this scenario, which of the following should the administrator do to address this issue?
A. Modify the /etc/hosts file and change the db
B. Modify the /etc/network file and change the db
C. Modify the /etc/network file and change the db
D. Modify the /etc/hosts file and change the db
View answer
Correct Answer: A
Question #22
A Linux administrator is troubleshooting an issue in which an application service failed to start on a Linux server. The administrator runs a few commands and gets the following outputs: Based on the above outputs, which of the following is the MOST likely action the administrator should take to resolve this issue?
A. Enable the logsearch
B. Increase the TimeoutStartUSec configuration for the logsearch
View answer
Correct Answer: B
Question #23
A user is attempting to log in to a Linux server that has Kerberos SSO enabled. Which of the following commands should the user run to authenticate and then show the ticket grants? (Select TWO). The following commands can help the user to authenticate and show the ticket grants using Kerberos SSO on a Linux server: kinit: This command obtains and caches an initial ticket-granting ticket (TGT) for the user from the Kerberos key distribution center (KDC).The user needs to enter their password or use a keytab file to authenticate1. klist: This command lists the cached tickets, including the TGT and any service tickets, for the user.It also shows the expiration time and flags for each ticket2. For example, the user can run the following commands to log in and view their tickets: $ kinit username@REALM Password for username@REALM: $ klist Ticket cache: FILE:/tmp/krb5cc_1000 Default principal: username@REALM Valid starting Expires Service principal 04/06/2023 16:06:59 04/07/2023 02:06:59 krbtgt/REALM@REALM renew until 04/13/2023 16:06:59 kinit(1) - Linux man page, section ''Description''. klist(1) - Linux man page, section ''Description''.
A. init
B. list
C. exec
D. ioad
E. kexec
F. ealm
View answer
Correct Answer: AB
Question #24
A systems administrator has been tasked with disabling the nginx service from the environment to prevent it from being automatically and manually started. Which of the following commands will accomplish this task?
A. systemctl cancel nginx
B. systemctl disable nginx C
View answer
Correct Answer: C
Question #25
A systems administrator configured firewall rules using firewalld. However, after the system is rebooted, the firewall rules are not present:The systems administrator makes additional checks:Which of the following is the reason the firewall rules are not active?
A. iptables is conflicting with firewalld
B. The wrong system target is activated
C. FIREWALL_ARGS has no value assigned
D. The firewalld service is not enabled
View answer
Correct Answer: D
Question #26
After installing some RPM packages, a systems administrator discovers the last package that was installed was not needed. Which of the following commands can be used to remove the package?
A. dnf remove packagename
B. apt-get remove packagename C
View answer
Correct Answer: A
Question #27
An administrator is provisioning an Apache web server. When the administrator visits the server website, the browser displays a message indicating the website cannot be reached. Which of the following commands should the administrator use to verify whether the service Is running? systemctl status httpd is the correct option to check if the Apache web server (httpd) is running. The systemctl status command provides detailed information about the service, including whether it is active and running.
A. ystemctl status httpd
B. ystemctl mask httpd
C. ystemctl reload httpd
D. ystemctl restart httpd
View answer
Correct Answer: A
Question #28
A systems administrator is deploying three identical, cloud-based servers. The administrator is using the following code to complete the task: Which of the following technologies is the administrator using? A.Ansible
B. Puppet C
View answer
Correct Answer: D
Question #29
When trying to log in remotely to a server, a user receives the following message: The server administrator is investigating the issue on the server and receives the following outputs: Which of the following is causing the issue?
A. The wrong permissions are on the user’s home directory
B. The account was locked out due to three failed logins
View answer
Correct Answer: D
Question #30
A systems administrator wants to back up the directory /data and all its contents to /backup/data on a remote server named remote. Which of the following commands will achieve the desired effect?
A. scp -p /data remote:/backup/data B
View answer
Correct Answer: C
Question #31
An administrator accidentally deleted the /boot/vmlinuz file and must resolve the issue before the server is rebooted. Which of the following commands should the administrator use to identify the correct version of this file?
A. rpm -qa | grep kernel; uname -a
B. yum -y update; shutdown -r now C
View answer
Correct Answer: A
Question #32
The journald entries have filled a Linux machine's /var volume. Which of the following is the best command for a systems administrator to use to free up the disk space occupied by these entries? systemctl stop systemd-journald systemctl start systemd-journald is the best approach among the given options. Stopping and starting the systemd-journald service can help in managing the disk space used by journal logs without manually deleting log files or using more aggressive cleanup methods. This method ensures
A. ournalctl ---rotatejournalctl --vacuum-time=ls
B. ystemctl stop systemd-journald systemctl start systemd-journald
C. m -rf /var/log/journal systemctl restart systemd-journald
D. kill -HUP systemd-journald systemctl restart systemd-journald
View answer
Correct Answer: B
Question #33
A systems administrator is troubleshooting connectivity issues and trying to find out why a Linux server is not able to reach other servers on the same subnet it is connected to. When listing link parameters, the following is presented: Based on the output above, which of following is the MOST probable cause of the issue?
A. The address ac:00:11:22:33:cd is not a valid Ethernet address
B. The Ethernet broadcast address should be ac:00:11:22:33:ff instead
View answer
Correct Answer: D
Question #34
A Linux administrator is tasked with creating resources using containerization. When deciding how to create this type of deployment, the administrator identifies some key features, including portability, high availability, and scalability in production. Which of the following should the Linux administrator choose for the new design? A.Docker
B. On-premises systems C
View answer
Correct Answer: D
Question #35
A systems administrator created a web server for the company and is required to add a tag for the API so end users can connect. Which of the following would the administrator do to complete this requirement?
A. hostnamectl status --no-ask-password
B. hostnamectl set-hostname "$(perl -le "print" "A" x 86)" C
View answer
Correct Answer: C
Question #36
A Linux administrator is troubleshooting SSH connection issues from one of the workstations. When users attempt to log in from the workstation to a server with the IP address 104.21.75.76, they receive the following message: The administrator reviews the information below: Which of the following is causing the connectivity issue?
A. The workstation has the wrong IP settings
B. The sshd service is disabled
View answer
Correct Answer: B
Question #37
In order to copy data from another VLAN, a systems administrator wants to temporarily assign IP address 10.0.6.5/24 to the newly added network interface enpls0f1. Which of the following commands should the administrator run to achieve the goal?
A. ip addr add 10
B. echo "IPV4_ADDRESS=10
C. ifconfig 10
D. nmcli conn add ipv4
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: