CompTIA Linux+ XK0-004 Exam 1

1. Which of the following commands provide below output

2. If you do not provide a DNS server name with the dig command, it references the /etc/dns.conf file
3. Which of the following file contains the name resolution specific information?
4. Which of the following command can be used to display information about the currently loaded modules in Linux system?
5. Which command is used as 'parted' sub-command to format a partition to a specific type file system?
6. Match the command with its usage
ping
Used to test the reachability of a host

Unselect

Used for DNS lookup operations

Unselect

Displays the established network connections on a system

Unselect

Used to manipulate a system's routing table

Unselect

netstat
Used to test the reachability of a host

Unselect

Used for DNS lookup operations

Unselect

Displays the established network connections on a system

Unselect

Used to manipulate a system's routing table

Unselect

route
Used to test the reachability of a host

Unselect

Used for DNS lookup operations

Unselect

Displays the established network connections on a system

Unselect

Used to manipulate a system's routing table

Unselect

host
Used to test the reachability of a host

Unselect

Used for DNS lookup operations

Unselect

Displays the established network connections on a system

Unselect

Used to manipulate a system's routing table

Unselect

7. Which of the following are block devices, capable of buffering output and storing data for retrieval?
8. Which of the following command provides below output

 
9. Which of the following can be used to install Red Hat Linux?
10. Which environment variable is used to control the display of the date and time?
11. Bridge uses the host adapter IP address for all network activity, while NAT enables the virtual machine to get its own IP
12. Which of the following are used to provide templates and configuration information?
13. Which of the following file contains user-specific instructions that are triggered when a user logs on to the system?
14. Which of the following command provides the below output?

15. Which of the following commands are used to create a new user with username 'newuser' and setting up '/tmp' directory as the home directory for this user?
16. Match the installation tool with its usage
apt
Used to install package RedHat and CentOS

Unselect

Used to install package on Ubuntu and Linux

Unselect

This command is used on SUSE and OpenSUSE

Unselect

yum
Used to install package RedHat and CentOS

Unselect

Used to install package on Ubuntu and Linux

Unselect

This command is used on SUSE and OpenSUSE

Unselect

zypper
Used to install package RedHat and CentOS

Unselect

Used to install package on Ubuntu and Linux

Unselect

This command is used on SUSE and OpenSUSE

Unselect

17. Which of the following commands can be used to restart SSH service and also check its status?
18. Which file contains information about users on a system and is readable by all users?
19. To view the contents of a package, which parameter should you use with the dpkg command?
20. Which of the command provides the below output?

21. What happens when below command is executed?

systemctl enable snmpd
22. Only two tar files are included in a .deb file. One of the files contains the control information and the second holds the installable files
23. You want to search for files and displays the count of matching entries based on the specified criteria. Which parameter you would use with the 'locate' command?
24. Which file contains the various runlevels and what to run at the given runlevel?
25. Which command provides the below output?

26. Which of the following can be configured to set up a server to server encryption?
27. You have a directory named DIR1, containing several files. You want to delete this directory along with the files. Which of the following commands you would use?
28. Which of the following file refers to the configuration file that allows making the changes in the features of SSH protocol?
29. Which of the following contains the list of published vulnerabilities for operating systems and applications?
30. Which two protocols are used by IPSec?
31. A self-signed certificate is signed by its own private key and it can be generated by anyone
32. Match the compression tool with its description
gzip
It uses the DEFLATE algorithm to compress data

Unselect

It uses the Burrows-Wheeler algorithm to compress data

Unselect

It uses LZMA2 algorithm to compress data

Unselect

It is an archiving utility

Unselect

bzip2
It uses the DEFLATE algorithm to compress data

Unselect

It uses the Burrows-Wheeler algorithm to compress data

Unselect

It uses LZMA2 algorithm to compress data

Unselect

It is an archiving utility

Unselect

xz
It uses the DEFLATE algorithm to compress data

Unselect

It uses the Burrows-Wheeler algorithm to compress data

Unselect

It uses LZMA2 algorithm to compress data

Unselect

It is an archiving utility

Unselect

tar
It uses the DEFLATE algorithm to compress data

Unselect

It uses the Burrows-Wheeler algorithm to compress data

Unselect

It uses LZMA2 algorithm to compress data

Unselect

It is an archiving utility

Unselect

33. Which file contains the global system messages, such as boot-up messages?
34. Which system facility receives messages from the kernel for logging purposes?
35. Which command provides the following output?

36. With the chmod value of 755, the owner will be able to read and write to the file. Group users and everyone else will have no permissions on the file
37. Which command can be used to change the priority of the running processes?
38. You want to run tcpdump to capture network traffic going through your system. Which parameter displays a list of available interfaces on which tcpdump can operate?
39. Which of the following commands can be used for troubleshooting network latency issues?
40. You have connected the new hardware to your Linux machine, which tool can be used to determine whether the system has detected the hardware?
41. Which command provides the following output?

42. Which of the following commands can be used to display memory statistics?
43. The ausearch command can be used to find recent violations of an SELinux policy
44. Which command displays the open ports along with the process that is using the port?
45. Which of the following command would make a variable named STRVAR global so that it can be used in any Bash session?
46. Adding '#' before the start of the command or text makes it a comment and makes the source code easier to understand
47. Which git command retrieves a copy of the repository for local use?
48. Which command shows the commit history that have occured along with the commit ID?
49. Which of the following refers to one or more commands that are executed on a client node as part of infrastructure automation?
50. Which of the following terms is most often used in orchestration to refer to the collection of devices under management?

 

Leave a comment