ExamGecko
Home Home / CompTIA / XK0-005

CompTIA XK0-005 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











A systems administrator has been unable to terminate a process. Which of the following should the administrator use to forcibly stop the process?

A.
kill -1
A.
kill -1
Answers
B.
kill -3
B.
kill -3
Answers
C.
kill -15
C.
kill -15
Answers
D.
kill -HUP
D.
kill -HUP
Answers
E.
kill -TERM
E.
kill -TERM
Answers
Suggested answer: E

Explanation:

The administrator should use the command kill -TERM to forcibly stop the process. The kill command is a tool for sending signals to processes on Linux systems. Signals are messages that inform the processes about certain events and actions. The processes can react to the signals by performing predefined or user-defined actions, such as terminating, suspending, resuming, or ignoring. The -TERM option specifies the signal name or number that the kill command should send. The TERM signal, which stands for terminate, is the default signal that the kill command sends if no option is specified. The TERM signal requests the process to terminate gracefully, by closing any open files, releasing any resources, and performing any cleanup tasks. However, if the process does not respond to the TERM signal, the kill command can send a stronger signal, such as the KILL signal, which forces the process to terminate immediately, without any cleanup. The administrator should use the command kill -TERM to forcibly stop the process. This is the correct answer to the question. The other options are incorrect because they either do not terminate the process (kill -1 or kill -3) or do not terminate the process forcibly (kill -15 or kill -HUP). Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 14: Managing Processes, page 431.

A systems administrator is compiling a report containing information about processes that are listening on the network ports of a Linux server. Which of the following commands will allow the administrator to obtain the needed information?

A.
ss -pint
A.
ss -pint
Answers
B.
tcpdump -nL
B.
tcpdump -nL
Answers
C.
netstat -pn
C.
netstat -pn
Answers
D.
lsof -It
D.
lsof -It
Answers
Suggested answer: A

Explanation:

The command ss -pint will allow the administrator to obtain the needed information about processes that are listening on the network ports of a Linux server. The ss command is a tool for displaying socket statistics on Linux systems. Sockets are endpoints of network communication that allow processes to exchange data over the network. The ss command can show various information about the sockets, such as the state, address, port, protocol, and process. The -pint option specifies the filters and flags that the ss command should apply. The -p option shows the process name and ID that owns the socket. The -i option shows the internal information about the socket, such as the send and receive queue, the congestion window, and the retransmission timeout. The -n option shows the numerical address and port, instead of resolving the hostnames and service names. The -t option shows only the TCP sockets, which are the most common type of sockets used for network communication. The command ss -pint will display the socket statistics for the TCP sockets, along with the process name and ID, the numerical address and port, and the internal information. This will allow the administrator to obtain the needed information about processes that are listening on the network ports of a Linux server. This is the correct command to use to obtain the needed information. The other options are incorrect because they either do not show the socket statistics (tcpdump -nL or lsof -It) or do not show the process name and ID (netstat -pn). Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 12: Managing Network Connections, page 389.

User1 is a member of the accounting group. Members of this group need to be able to execute but not make changes to a script maintained by User2. The script should not be accessible to other users or groups. Which of the following will give proper access to the script?

A.
chown user2:accounting script.shchmod 750 script.sh
A.
chown user2:accounting script.shchmod 750 script.sh
Answers
B.
chown user1:accounting script.shchmod 777 script.sh
B.
chown user1:accounting script.shchmod 777 script.sh
Answers
C.
chown accounting:user1 script.shchmod 057 script.sh
C.
chown accounting:user1 script.shchmod 057 script.sh
Answers
D.
chown user2:accounting script.shchmod u+x script.sh
D.
chown user2:accounting script.shchmod u+x script.sh
Answers
Suggested answer: A

Explanation:

The commands that will give proper access to the script are:

chown user2:accounting script.sh: This command will change the ownership of the script to user2 as the owner and accounting as the group. The chown command is a tool for changing the owner and group of files and directories on Linux systems. The user2:accounting is the user and group name that the command should assign to the script. The script.sh is the name of the script that the command should modify. The command chown user2:accounting script.sh will ensure that user2 is the owner of the script and accounting is the group of the script, which will allow user2 to maintain the script and the accounting group to access the script.

chmod 750 script.sh: This command will change the permissions of the script to 750, which means read, write, and execute for the owner; read and execute for the group; and no access for others.

The chmod command is a tool for changing the permissions of files and directories on Linux systems.

The permissions are represented by three digits in octal notation, where each digit corresponds to the owner, group, and others. Each digit can have a value from 0 to 7, where each value represents a combination of read, write, and execute permissions. The 750 is the permission value that the command should assign to the script. The script.sh is the name of the script that the command should modify. The command chmod 750 script.sh will ensure that only the owner and the group can execute the script, but not make changes to it, and that the script is not accessible to other users or groups.

The commands that will give proper access to the script are chown user2:accounting script.sh and chmod 750 script.sh. This is the correct answer to the question. The other options are incorrect because they either do not give proper access to the script (chown user1:accounting script.sh or chown accounting:user1 script.sh) or do not change the permissions of the script (chmod 777 script.sh or chmod u+x script.sh). Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 11: Managing File Permissions and Ownership, pages 346-348.

A systems administrator needs to verify whether the built container has the app.go file in its root directory. Which of the following can the administrator use to verify the root directory has this file?

A.
docker image inspect
A.
docker image inspect
Answers
B.
docker container inspect
B.
docker container inspect
Answers
C.
docker exec <container_name> ls
C.
docker exec <container_name> ls
Answers
D.
docker ps <container_name>
D.
docker ps <container_name>
Answers
Suggested answer: C

Explanation:

The docker exec <container_name> ls command can be used to verify whether the built container has the app.go file in its root directory. This command will run the ls command inside the specified container and list the files and directories in its root directory. If the app.go file is present, it will be displayed in the output. The docker image inspect command will display information about an image, not a container, and it will not list the files inside the image. The docker container inspect command will display information about a container, not its files. The docker ps <container_name> command is invalid, as ps does not accept a container name as an argument. Reference: CompTIA

Linux+ (XK0-005) Certification Study Guide, Chapter 16: Virtualization and Cloud Technologies, page 499.

Joe, a user, is unable to log in to the Linux system. Given the following output:

Which of the following commands would resolve the issue?

A.
usermod -s /bin/bash joe
A.
usermod -s /bin/bash joe
Answers
B.
pam_tally2 -u joe -r
B.
pam_tally2 -u joe -r
Answers
C.
passwd -u joe
C.
passwd -u joe
Answers
D.
chage -E 90 joe
D.
chage -E 90 joe
Answers
Suggested answer: B

Explanation:

The command pam_tally2 -u joe -r will resolve the issue of Joe being unable to log in to the Linux system. The pam_tally2 command is a tool for managing the login counter for the PAM (Pluggable Authentication Modules) system. PAM is a framework for managing authentication and authorization on Linux systems. PAM allows the administrator to define the rules and policies for accessing various system resources and services, such as login, sudo, ssh, or cron. PAM also supports different types of authentication methods, such as passwords, tokens, biometrics, or smart cards. PAM can be used to implement login restrictions, such as limiting the number of failed login attempts, locking the account after a certain number of failures, or enforcing a minimum or maximum time between login attempts. The pam_tally2 command can display, reset, or unlock the login counter for the users or hosts. The -u joe option specifies the user name that the command should apply to. The -r option resets the login counter for the user. The command pam_tally2 -u joe -r will reset the login counter for Joe, which will unlock his account and allow him to log in to the Linux system. This will resolve the issue of Joe being unable to log in to the Linux system. This is the correct command to use to resolve the issue. The other options are incorrect because they either do not unlock the account (usermod -s /bin/bash joe or passwd -u joe) or do not affect the login counter (chage -E 90 joe). Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 17: Implementing Basic Security, page 517.

Users have been unable to save documents to /home/tmp/temp and have been receiving the following error:

Path not found

A junior technician checks the locations and sees that /home/tmp/tempa was accidentally created instead of /home/tmp/temp. Which of the following commands should the technician use to fix this issue?

A.
cp /home/tmp/tempa /home/tmp/temp
A.
cp /home/tmp/tempa /home/tmp/temp
Answers
B.
mv /home/tmp/tempa /home/tmp/temp
B.
mv /home/tmp/tempa /home/tmp/temp
Answers
C.
cd /temp/tmp/tempa
C.
cd /temp/tmp/tempa
Answers
D.
ls /home/tmp/tempa
D.
ls /home/tmp/tempa
Answers
Suggested answer: B

Explanation:

The mv /home/tmp/tempa /home/tmp/temp command will fix the issue of the misnamed directory.

This command will rename the directory /home/tmp/tempa to /home/tmp/temp, which is the expected path for users to save their documents. The cp /home/tmp/tempa /home/tmp/temp command will not fix the issue, as it will copy the contents of /home/tmp/tempa to a new file named /home/tmp/temp, not a directory. The cd /temp/tmp/tempa command will not fix the issue, as it will change the current working directory to /temp/tmp/tempa, which does not exist. The ls /home/tmp/tempa command will not fix the issue, as it will list the contents of /home/tmp/tempa, not rename it. Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 12:

Managing Files and Directories, page 413.

A database administrator requested the installation of a custom database on one of the servers.

Which of the following should the Linux administrator configure so the requested packages can be installed?

A.
/etc/yum.conf
A.
/etc/yum.conf
Answers
B.
/etc/ssh/sshd.conf
B.
/etc/ssh/sshd.conf
Answers
C.
/etc/yum.repos.d/db.repo
C.
/etc/yum.repos.d/db.repo
Answers
D.
/etc/resolv.conf
D.
/etc/resolv.conf
Answers
Suggested answer: C

Explanation:

The Linux administrator should configure /etc/yum.repos.d/db.repo so that the requested packages can be installed. This file defines a custom repository for yum, which is a package manager for RPMbased systems. The file should contain information such as the name, baseurl, gpgcheck, and enabled options for the repository. By creating this file and enabling the repository, the administrator can use yum to install packages from the custom repository. The /etc/yum.conf file is the main configuration file for yum, but it does not define repositories. The /etc/ssh/sshd.conf file is the configuration file for sshd, which is a daemon that provides secure shell access to remote systems.

The /etc/resolv.conf file is the configuration file for DNS resolution, which maps domain names to IP addresses. Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 19: Managing Packages and Software, page 559.

At what point is the Internal Certificate Authority (ICA) created?

A.
During the primary Security Management Server installation process.
A.
During the primary Security Management Server installation process.
Answers
B.
Upon creation of a certificate.
B.
Upon creation of a certificate.
Answers
C.
When an administrator decides to create one.
C.
When an administrator decides to create one.
Answers
D.
When an administrator initially logs into SmartConsole.
D.
When an administrator initially logs into SmartConsole.
Answers
Suggested answer: A

Explanation:

The Internal Certificate Authority (ICA) is created during the primary Security Management Server installation process. The ICA is a component of Check Point's Public Key Infrastructure (PKI) that issues and manages certificates for Security Gateways and administrators. The ICA is automatically installed and initialized when the primary Security Management Server is installed. The ICA is not created upon creation of a certificate, when an administrator decides to create one, or when an administrator initially logs into SmartConsole. Reference: Check Point Certified Security Administrator (CCSA) R80.x Study Guide, Chapter 3: Check Point Security Management Architecture, page 32.

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?

A.
Centos Linux
A.
Centos Linux
Answers
B.
Gaia embedded
B.
Gaia embedded
Answers
C.
Gaia
C.
Gaia
Answers
D.
Red Hat Enterprise Linux version 5
D.
Red Hat Enterprise Linux version 5
Answers
Suggested answer: B

Explanation:

Rugged appliances are small appliances with ruggedized hardware that use Gaia embedded as their operating system. Gaia embedded is a version of Gaia that is optimized for embedded devices such as Rugged appliances and Quantum Spark appliances. Gaia embedded supports features such as VPN, firewall, identity awareness, application control, URL filtering, and anti-bot. Gaia embedded does not use Centos Linux, Gaia, or Red Hat Enterprise Linux version 5 as their operating system. Reference: Check Point Rugged Appliance Datasheet, page 1.

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

A.
Windows Management Instrumentation (WMI)
A.
Windows Management Instrumentation (WMI)
Answers
B.
Hypertext Transfer Protocol Secure (HTTPS)
B.
Hypertext Transfer Protocol Secure (HTTPS)
Answers
C.
Lightweight Directory Access Protocol (LDAP)
C.
Lightweight Directory Access Protocol (LDAP)
Answers
D.
Remote Desktop Protocol (RDP)
D.
Remote Desktop Protocol (RDP)
Answers
Suggested answer: C

Explanation:

Using AD Query, the security gateway connects to the Active Directory Domain Controllers using Lightweight Directory Access Protocol (LDAP). LDAP is a protocol that provides access to directory services over a network. AD Query uses LDAP queries to retrieve information about users and groups from Active Directory Domain Controllers without installing any software on them. AD Query does not use Windows Management Instrumentation (WMI), Hypertext Transfer Protocol Secure (HTTPS), or Remote Desktop Protocol (RDP) to connect to Active Directory Domain Controllers. Reference: Check Point Certified Security Administrator (CCSA) R80.x Study Guide, Chapter 5: User Management and Authentication, page 69.

Total 371 questions
Go to page: of 38