أرشيف أسئلة الاختبار
اختبار شهادة انظمة اللينكس CompTIA Linux+ XK0-005
هذه الصفحة مخصصة للأرشفة وتعرض جميع أسئلة الاختبار وروابط كل سؤال مع الخيارات والنقاشات.
تنبيه مهم
هذه الصفحة للأرشفة فقط. إذا كنت تريد التجربة الحقيقية للاختبار والدخول إلى واجهة الاختبار الأصلية فانتقل إلى صفحة الاختبار من الرابط التالي.
الانتقال إلى صفحة الاختبار الفعلية
الأسئلة
122 سؤال- A Linux administrator needs to transfer a local file named accounts.pdf to a remote /tmp directory of a server with the IP address 10.10.10.80. Which of the fol ...
- An administrator accidentally deleted the /boot/vmlinuz file and must resolve the issue before the server is rebooted. Which of the following commands should th ...
- A systems administrator wants to check for running containers. Which of the following commands can be used to show this information?
- A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing ent ...
- A systems administrator received a request to change a user's credentials. Which of the following commands will grant the request?
- A systems administrator installed a new software program on a Linux server. When the systems administrator tries to run the program, the following message appea ...
- A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing ent ...
- A cloud engineer is installing packages during VM provisioning. Which of the following should the engineer use to accomplish this task?
- A systems administrator received a request to change a user's credentials. Which of the following commands will grant the request?
- Due to performance issues on a server, a Linux administrator needs to terminate an unresponsive process. Which of the following commands should the administrato ...
- An administrator needs to restrict a file's permission set in the following ways: The file needs to be read and write, but it should not be executable to the f ...
- A Linux administrator deployed a large-scale application service as a containerized pod. The Linux administrator needs to continually send the application's log ...
- Users in the human resources department are trying to access files in a newly created directory. Which of the following commands will allow the users access to ...
- A junior administrator updated the PostgreSQL service unit file per the database administrator's recommendation. The service has been restarted, but changes hav ...
- A systems administrator is working on a security report from the Linux servers. Which of the following commands can the administrator use to display all the fir ...
- A systems administrator is tasked with changing the default shell of a system account in order to disable iterative logins. Which of the following is the best o ...
- A Linux administrator is creating a new sudo profile for the accounting user. Which of the following should be added by the administrator to the sudo configurat ...
- A Linux administrator created a virtual clone of a physical server and would like to remove any existing entries related to SSH keys from outside entities on th ...
- User1 is a member of the accounting group. Members of this group need to be able to execute but not make changes to a script maintained by user2. The script sho ...
- An administrator needs to make an application change via a script that must be run only in console mode. Which of the following best represents the sequence the ...
- The group owner of the /home/test directory would like to preserve all group permissions on files created in the directory. Which of the following commands shou ...
- Users are reporting that writes on a system configured with SSD drives have been taking longer than expected, but reads do not seem to be affected. A Linux syst ...
- A systems administrator creates a public key for authentication. Which of the following tools is most suitable to use when uploading the key to the remote serve ...
- An administrator runs ping comptia.org. The result of the command is: ping: comptia.org: Name or service not known Which of the following files should the adm ...
- A junior systems administrator recently installed an HBA card in one of the servers that is deployed for a production environment. Which of the following comman ...
- A systems administrator wants to list all local accounts in which the UID is greater than 500. Which of the following commands will give the correct output?
- A Linux administrator needs to obtain a list of all volumes that are part of a volume group. Which of the following commands should the administrator use to acc ...
- Which of the following actions are considered good security practices when hardening a Linux server? (Select two).
- A systems administrator is trying to track down a rogue process that has a TCP listener on a network interface for remote command-and-control instructions. Whic ...
- Some servers in an organization have been compromised. Users are unable to access the organization's web page and other services. While reviewing the system log ...
- A Linux administrator needs to give the correct permission on a file called exam.txt. The owner needs to have full permissions to the file, the group only needs ...
- A systems administrator detected corruption in the /data filesystem. Given the following output: Which of the following commands can the administrator use to b ...
- A systems administrator intends to use a UUID to mount a new partition permanently on a Linux system. Which of the following commands can the administrator run ...
- A systems administrator is investigating a service that is not starting up. Given the following information: Which of the following systemd commands should the ...
- A new Linux systems administrator just generated a pair of SSH keys that should allow connection to the servers. Which of the following commands can be used to ...
- A Linux engineer needs to block an incoming connection from the IP address 2.2.2.2 to a secure shell server and ensure the originating IP address receives a res ...
- A systems engineer has deployed a new application server, but the server cannot communicate with the backend database hostname. The engineer confirms that the a ...
- A systems administrator receives reports that several virtual machines in a host are responding slower than expected. Upon further investigation, the administra ...
- A systems administrator is installing various software packages using a package manager. Which of the following commands would the administrator use on the Linu ...
- Following the migration from a disaster recovery site, a systems administrator wants a server to require a user to change credentials at initial login. Which of ...
- A junior administrator updated the PostgreSQL service unit file per the database administrator's recommendation. The service has been restarted, but changes hav ...
- A systems administrator is gathering information about a file type and the contents of a file. Which of the following commands should the administrator use to a ...
- Which of the following would significantly help to reduce data loss if more than one drive fails at the same time?
- A cloud engineer needs to block the IP address 192.168.10.50 from accessing a Linux server. Which of the following commands will achieve this goal?
- A systems administrator wants to permit access temporarily to an application running on port 1234/TCP on a Linux server. Which of the following commands will pe ...
- A systems administrator is tasked with mounting a USB drive on a system. The USB drive has a single partition, and it has been mapped by the system to the devic ...
- A Linux administrator found many containers in an exited state. Which of the following commands will allow the administrator to clean up the containers in an ex ...
- A systems administrator wants to check for running containers. Which of the following commands can be used to show this information?
- A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing ent ...
- As part of the requirements for installing a new application, the swappiness parameter needs to be changed to 0. This change needs to persist across reboots and ...
- A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following ...
- A systems administrator wants to upgrade /bin/someapp to a new version, but the administrator does not know the package name. Which of the following will show t ...
- A user is unable to remotely log on to a server using the server name server1 and port 22. The Linux engineer troubleshoots the issue and gathers the following ...
- Ann, a security administrator, is performing home directory audits on a Linux server. Ann issues the su Joe command and then issues the ls command. The output d ...
- A database administrator requested the installation of a custom database on one of the servers. Which of the following should the Linux administrator configure ...
- A systems administrator wants to be sure the sudo rules just added to /etc/sudoers are valid. Which of the following commands can be used for this task?
- A new disk was presented to a server as /dev/sdd. The systems administrator needs to check if a partition table is on that disk. Which of the following commands ...
- A systems administrator is investigating an issue in which one of the servers is not booting up properly. The journalctl entries show the following: Which of t ...
- User1 is a member of the accounting group. Members of this group need to be able to execute but not make changes to a script maintained by user2. The script sho ...
- While inspecting a recently compromised Linux system, the administrator identified a number of processes that should not have been running: Which of the follow ...
- After making a configuration change to an Apache web server, an administrator needs to reload the service. However, sudo access was only granted to the killall ...
- Joe, a user, is unable to log in to the Linux system. Given the following output: Which of the following commands would resolve the issue?
- A Linux administrator is installing a web server and needs to check whether web traffic has already been allowed through the firewall. Which of the following co ...
- A developer needs to launch an Nginx image container, name it Web001, and expose port 8080 externally while mapping to port 80 inside the container. Which of th ...
- The applications team is reporting issues when trying to access the web service hosted in a Linux system. The Linux systems administrator is reviewing the follo ...
- An administrator needs to get network information from a group of statically assigned workstations before they are reconnected to the network. Which of the foll ...
- Which of the following specifications is used to perform disk encryption in a Linux system?
- A developer wants to ensure that all files and folders created inside a shared folder named /Group00DEV inherit the group name of the parent folder. Which of th ...
- A Linux administrator needs to create a symlink for /usr/local/bin/app-a, which was installed in /usr/local/share/app-a. Which of the following commands should ...
- A systems administrator is notified that the mysqld process stopped unexpectedly. The systems administrator issues the following command: sudo grep -i -r 'out ...
- A Linux administrator is troubleshooting an issue in which an application service failed to start on a Linux server. The administrator runs a few commands and g ...
- Users are unable to create new files on the company's FTP server, and an administrator is troubleshooting the issue. The administrator runs the following comman ...
- A Linux systems administrator is troubleshooting an I/O latency on a single CPU server. The administrator runs a top command and receives the following output: ...
- A user reported issues when trying to log in to a Linux server. The following outputs were received: Given the outputs above, which of the following is the rea ...
- A Linux systems administrator is troubleshooting an I/O latency on a single CPU server. The administrator runs a top command and receives the following output: ...
- A Linux systems administrator receives reports from various users that an application hosted on a server has stopped responding at similar times for several day ...
- The security team has identified a web service that is running with elevated privileges. A Linux administrator is working to change the systemd service file to ...
- The group named support is unable to make changes to the config file. An administrator is reviewing the permissions and sees the following: $ ls -l config -rw ...
- A Linux engineer set up two local DNS servers (10.10.10.10 and 10.10.10.20) and was testing email connectivity to the local mail server using the mail command o ...
- A Linux administrator is troubleshooting an issue in which users are not able to access https://portal.comptia.org from a specific workstation. The administrato ...
- A Linux administrator is trying to start the database service on a Linux server but is not able to run it. The administrator executes a few commands and receive ...
- A systems administrator is enabling LUKS on a USB storage device with an ext4 filesystem format. The administrator runs dmesg and notices the following output: ...
- A Linux user is trying to execute commands with sudo but is receiving the following error: The following output is provided: # grep root /etc/shadow root:*LO ...
- A user created the following script file: #!/bin/bash # FILENAME: /home/user/script.sh echo "hello world" exit 1 However, when the user tried to run the sc ...
- After starting an Apache web server, the administrator receives the following error: Which of the following commands should the administrator use to further tr ...
- A systems administrator is trying to track down a rogue process that has a TCP listener on a network interface for remote command-and-control instructions. Whic ...
- A systems administrator wants to check for running containers. Which of the following commands can be used to show this information?
- The applications team is reporting issues when trying to access the web service hosted in a Linux system. The Linux systems administrator is reviewing the follo ...
- A Linux engineer needs to block an incoming connection from the IP address 2.2.2.2 to a secure shell server and ensure the originating IP address receives a res ...
- A systems administrator is adding a Linux-based server and removing a Windows-based server from a cloud-based environment. The changes need to be validated befo ...
- A systems administrator wants to permit access temporarily to an application running on port 1234/TCP on a Linux server. Which of the following commands will pe ...
- A systems administrator is notified that the mysqld process stopped unexpectedly. The systems administrator issues the following command: sudo grep -i-r 'out ...
- A Linux engineer needs to block an incoming connection from the IP address 2.2.2.2 to a secure shell server and ensure the originating IP address receives a res ...
- A systems administrator is configuring a Linux system so the network traffic from the internal network 172.17.0.0/16 going out through the eth0 interface would ...
- Which of the following actions are considered good security practices when hardening a Linux server? (Select two).
- A new disk was presented to a server as /dev/sdd. The systems administrator needs to check if a partition table is on that disk. Which of the following commands ...
- An administrator needs to get network information from a group of statically assigned workstations before they are reconnected to the network. Which of the foll ...
- Which of the following would significantly help to reduce data loss if more than one drive fails at the same time?
- A new Linux systems administrator just generated a pair of SSH keys that should allow connection to the servers. Which of the following commands can be used to ...
- Which of the following specifications is used to perform disk encryption in a Linux system?
- A developer needs to launch an Nginx image container, name it Web001, and expose port 8080 externally while mapping to port 80 inside the container. Which of th ...
- A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following ...
- A systems administrator is investigating a service that is not starting up. Given the following information: Which of the following systemd commands should the ...
- A Linux administrator needs to create a symlink for /usr/local/bin/app-a, which was installed in /usr/local/share/app-a. Which of the following commands should ...
- A senior Linux administrator has created several scripts that will be used to install common system applications. These scripts are published to a repository to ...
- User1 is a member of the accounting group. Members of this group need to be able to execute but not make changes to a script maintained by user2. The script sho ...
- A Linux administrator provisioned a new web server with custom administrative permissions for certain users. User1 is unable to restart the Apache web service. ...
- After starting an Apache web server, the administrator receives the following error: Which of the following commands should the administrator use to further ...
- Joe, a user, is unable to log in to the Linux system. Given the following output: Which of the following commands would resolve the issue?
- An engineer needs to insert a character at the end of the current line in the vi text editor. Which of the following will allow the engineer to complete this ta ...
- A systems administrator created a user cron to run a scheduled database backup cronjob on the server at 1 a.m. every day. The following is the cronjob syntax: ...
- A junior administrator updated the PostgreSQL service unit file per the database administrator's recommendation. The service has been restarted, but changes hav ...
- Users are experiencing high latency when accessing a web application served by a Linux machine. A systems administrator checks the network interface counters an ...
- A systems administrator needs to remove a disk from a Linux server. The disk size is 500G, and it is the only one that size on that machine. Which of the follow ...
- A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing ent ...
- A cloud engineer needs to block the IP address 192.168.10.50 from accessing a Linux server. Which of the following commands will achieve this goal?
- Following the migration from a disaster recovery site, a systems administrator wants a server to require a user to change credentials at initial login. Which of ...
- As part of the requirements for installing a new application, the swappiness parameter needs to be changed to 0. This change needs to persist across reboots and ...
- Ann, a security administrator, is performing home directory audits on a Linux server. Ann issues the su Joe command and then issues the ls command. The output d ...
- An administrator failed to create another 500 M partition on disk /dev/nvme lnl. Given the following: Which of the following is the root cause of the issue b ...
- A Linux administrator copied a Git repository locally, created a feature branch, and committed some changes to the feature branch. Which of the following Git ac ...
- The development team wants to prevent a file from being modified by all users in a Linux system, including the root account. Which of the following commands can ...