Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

XK0-006 Sample Questions Answers

Questions 4

Which of the following commands should an administrator use to convert a KVM disk file to a different format?

Options:

A.

qemu-kvm

B.

qemu-nq

C.

qemu-io

D.

qemu-img

Buy Now
Questions 5

An administrator receives reports that a web service is not responding. The administrator reviews the following outputs:

Which of the following is the reason the web service is not responding?

Options:

A.

The private key needs to be renamed from server.crt to server, key so the service can find it.

B.

The private key does not match the public key, and both keys should be replaced.

C.

The private key is not in the correct location and needs to be moved to the correct directory.

D.

The private key has the incorrect permissions and should be changed to 0755 for the service.

Buy Now
Questions 6

A Linux administrator needs to change the server name to comptia1. Which of the following commands should the administrator use?

Options:

A.

export HOSTNAME=comptia1

B.

echo " comptia1 " > > /etc/resolv.conf

C.

hostnamectl set-hostname comptia1

D.

systemctl daemon-reload -H comptia1

Buy Now
Questions 7

An administrator added a new disk to expand the current storage. Which of the following commands should the administrator run first to add the new disk to the LVM?

Options:

A.

vgextend

B.

lvextend

C.

pvcreate

D.

pvresize

Buy Now
Questions 8

A user reports Issues v/hen trying to connect to one ot the Linux servers. The server administrator reviews the following outputs:

Output 1:

Kernel panic not syncing: Fatal Machine check

Fid: 0, comm; swapper Tainted: G M ------------------ 4.18.0-553.8.1.cl8_10.x86_64 #1

Call Trace:

< #mc > [rrrrrrrrs:4er..i4i] ? panic+ox7n/oxi43

[] ? mcc_panic+0x21f/0x240

[] ? do_machine_check+0xal8/0xae0

[] ? intel idie+0xbi/0xi70

[] ? machino_check+0xlc/0x30

[] ? intel_idle+0xbl/0xl70

«EOE» [] ? hrtimer 8tart+0xlB/0x20

[] ? cpuidle_idle_cail+0xa7/0xl40

I| ? cpu_idle+0xbfc/0xll0

[] ? Start_secondary+0x202/0x245

Output 2:

[325926.243631] mce: [Error] : CPU 22: Machine Check Exception: 7 Bank 0: bd80000000000134

1325926.247004| nice: (Error): Machine check events logged

[325991.358038] race: [Error] : KIP 10: < ffffffff83584719* (copy user enhanced fast strir.q+0x9/0x20)

[325991.358038] mce: [Error] : tsc 31ea89256a735 ADDR 3cdl889000 MISC 8c

[325991.350033] mce: [Error] : PROCESSOR 0:50657 TIME 15945B1695 SOCKET 0 APTC 16 microcode rrrrtrrr

[325991.358038] mce: [Error] : Run the above through ' rr.ccloq —ascii*

[325991.358038] mce: [Error] : Machine check: Action required: unknown MCACOD

[325991.3511038] Kernel panic not syncing: Fatal machine check

Which of the following statements describes the cause and resolution for this issue?

Options:

A.

The current kernel is corrupted and should be reinstalled.

B.

The messages point to a hardware issue that should be addressed by the server team.

C.

The system has crashed and needs to be rebooted to fix the issue.

D.

All available CPUs have been exhausted, and a new CPU should be added.

Buy Now
Questions 9

A systems administrator needs to set the IP address of a new DNS server. Which of the following files should the administrator modify to complete this task?

Options:

A.

/etc/whois.conf

B.

/etc/resolv.conf

C.

/etc/nsswitch.conf

D.

/etc/dnsmasq.conf

Buy Now
Questions 10

Application owners are reporting that their application stops responding after several days of running, and they need to restart it. A Linux administrator obtains the following details from the dmesg command:

invoked oom-killer

Call Trace:

out_of_memory

oom_kill_process

The application owners mentioned that resources to the system have been increased, and the error takes longer to appear. Which of the following best describes the reason the process is being terminated by OOM?

Options:

A.

The CPU type is incompatible with the application.

B.

The kernel has panicked.

C.

The application might have a memory leak.

D.

The swap configuration is not correctly sized.

Buy Now
Questions 11

An administrator receives a report that a user is unable to execute the runreports utility. The administrator logs in as the user, runs the following commands, and receives the following output:

$ runreports

runreports: command not found

$ ls -l /usr/local/bin

-rwxr-xr-x 1 root root 29 May 10 11:31 runreports

$ echo $PATH

/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin

Which of the following best describes the issue and how to resolve it?

Options:

A.

The runreports utility is not in the user ' s path. The administrator should modify the .bash_profile file.

B.

The runreports utility is a shell script but not owned by the user. The administrator should use chown.

C.

The user does not have the correct SELinux context. The administrator should modify the SELinux template.

D.

The runreports utility does not have execute permissions. The administrator should add execute permissions.

Buy Now
Questions 12

A systems administrator receives reports about connection issues to a secure web server. Given the following firewall and web server outputs:

Firewall output:

Status: active

To Action From

443/tcp DENY Anywhere

443/tcp (v6) DENY Anywhere (v6)

Web server output:

tcp LISTEN 0 4096 *:443 :

Which of the following commands best resolves this issue?

Options:

A.

ufw disable

B.

ufw allow 80/tcp

C.

ufw delete deny https/tcp

D.

ufw allow 4096/tcp

Buy Now
Questions 13

A systems administrator needs to restore a backup to the /usr/app/data directory. Which of the following commands should the administrator use for this task?

Options:

A.

tar -xvzf /tmp/backup.tar.gz -C /usr/app/data

B.

tar -xvf /tmp/backup.tar.gz /usr/app/data

C.

tar -xvzf /usr/app/data /tmp/backup.tar.gz

D.

tar -xvzf /tmp/backup.tar.gz > /usr/app/data

Buy Now
Questions 14

Which of the following commands should an administrator use to convert a KVM disk file to a different format?

Options:

A.

qemu-kvm

B.

qemu-ng

C.

qemu-io

D.

qemu-img

Buy Now
Questions 15

Which of the following Ansible components contains a list of hosts and host groups?

Options:

A.

Fact

B.

Inventory

C.

Playbook

D.

Collection

Buy Now
Questions 16

To perform a live migration, which of the following must match on both host servers? (Choose two)

Options:

A.

USB ports

B.

Network speed

C.

Available swap

D.

CPU architecture

E.

Available memory

F.

Disk storage path

Buy Now
Questions 17

An administrator wants to search a file named myFile and look for all occurrences of strings containing at least five characters, where characters two and five are i, but character three is not b. Which of the following commands should the administrator execute to get the intended result?

Options:

A.

grep .a*^b-.a myFile

B.

grep .a., [a] myFile

C.

grepa^b*a myFile

D.

grep .i[^b].i myFile

Buy Now
Questions 18

The security manager at a company notifies a systems administrator of open vulnerabilities on the Linux system. The administrator receives the following information while logged in to the server:

$ date

Thu Jul 11 16:12:42 UTC 2024

$ getenforce

Enforcing

$ dnf history

ID | Command Line | Date and time | Action(s) | Altered

45 | update -y | 2023-07-09 | Update | 27

46 | install httpd | 2023-01-11 | Install | 9

47 | update -y | 2023-08-08 | Upgrade | 44

Which of the following is the most likely security concern?

Options:

A.

The server has not been updated in a year and should be patched.

B.

The system has httpd installed and needs to be removed.

C.

The system is configured to use UTC time and should be set to EDT.

D.

The system has SELinux set to enforcing and needs to be disabled.

Buy Now
Questions 19

Which of the following commands is used to verify whether a port is open on a remote host?

Options:

A.

ip

B.

ping

C.

nc

D.

netstat

Buy Now
Questions 20

Which of the following most accurately describes a webhook?

Options:

A.

An authentication method for web-server communication

B.

An SNMP-based API for network device monitoring

C.

A means to transmit sensitive information between systems

D.

An HTTP-based callback function

Buy Now
Questions 21

An administrator wants to start an Ubuntu terminal in a container. Which of the following will allow the administrator to complete the task?

Options:

A.

podman pull ubuntu /bin/bash

B.

docker run -it ubuntu

C.

containerd /usr/bin/sh ubuntu

D.

runc exec -it ubuntu

Buy Now
Questions 22

Which of the following commands should an administrator use to see a full hardware inventory of a Linux system?

Options:

A.

dmidecode

B.

lsmod

C.

dmesg

D.

lscpu

Buy Now
Questions 23

A Linux administrator receives reports that an application hosted in a system is not completing tasks in the allocated time. The administrator connects to the system and obtains the following details:

Which of the following actions can the administrator take to help speed up the jobs?

Options:

A.

Increase the amount of free memory available to the system.

B.

Increase the amount of CPU resources available to the system.

C.

Increase the amount of swap space available to the system.

D.

Increase the amount of disks available to the system.

Buy Now
Questions 24

Which of the following describes PEP 8?

Options:

A.

The style guide for Python code

B.

Python virtual environments

C.

A package installer for Python

D.

A Python variable holding octal values

Buy Now
Questions 25

Which of the following Ansible components is used to define groups and individual hosts and can include variables specific to each host or group?

Options:

A.

Modules

B.

Inventory

C.

Playbooks

D.

Handlers

Buy Now
Questions 26

Joe, a user, has taken a position previously held by Ann. As a systems administrator, you

need to archive all the files from Ann ' s home directory and extract them into Joe ' s home

directory.

INSTRUCTIONS

Within each tab, click on an object to form the appropriate commands. Command objects may only be used once, but the spacebar _ object may be used multiple times. Not all objects will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 27

A systems administrator receives reports from users who are having issues while trying to modify newly created files in a shared directory. The administrator sees the following outputs:

Which of the following provides the best resolution to this issue?

Options:

A.

Adding a setuid bit to the user in the shared folder

B.

Manually changing the group of the newly created files

C.

Changing all directory contents to be writable and readable for everyone

D.

Adding a setgid bit to the group in the shared folder

Buy Now
Questions 28

An administrator needs to remove the directory /home/user1/data and all of its contents. Which of the following commands should the administrator use?

Options:

A.

rmdir -p /home/user1/data

B.

ln -d /home/user1/data

C.

rm -r /home/user1/data

D.

cut -d /home/user1/data

Buy Now
Questions 29

A Linux administrator installed a new program inside $HOME/.local/bin and is trying to execute it without using an absolute path. Which of the following should the administrator use for this task?

Options:

A.

export PATH=PATH:$HOME/.local/bin

B.

export $PATH=PATH:$HOME/.local/bin

C.

export PATH=$PATH:$HOME/.local/bin

D.

export $PATH=$PATH:$HOME/.local/bin

Buy Now
Questions 30

A technician wants to temporarily use a Linux virtual machine as a router for the network segment 10.10.204.0/24. Which of the following commands should the technician issue? (Select three).

Options:

A.

echo " 1 " > /proc/sys/net/ipv4/ip_forward

B.

iptables -A FORWARD -j ACCEPT

C.

iptables -A PREROUTING -j ACCEPT

D.

iptables -t nat -s 10.10.204.0/24 -p tcp -A PREROUTING -j MASQUERADE

E.

echo " 0 " > /proc/sys/net/ipv4/ip_forward

F.

echo " 1 " > /proc/net/tcp

G.

iptables -t nat -s 10.10.204.0/24 -A POSTROUTING -j MASQUERADE

Buy Now
Questions 31

A Linux administrator observes low network throughput. The administrator gathers the following output:

$ ip link show eth0

eth0: < BROADCAST,MULTICAST,UP,RUNNING > mtu 9000 ...

$ ping -s 1472 -M do 192.168.10.2

PING 192.168.10.2(192.168.10.2) 1472(1500) bytes of data.

From 10.10.9.72 icmp_seq=1 frag needed and DF set

Which of the following is the cause of the low network throughput?

Options:

A.

Hardware limitations

B.

Driver issue

C.

Duplex configuration issue

D.

MTU mismatch

Buy Now
Questions 32

Which of the following commands can be used to display real-time running processes on a Linux system?

Options:

A.

ps

B.

top

C.

df

D.

free

Buy Now
Questions 33

A Linux administrator receives reports about MySQL service availability issues. The administrator observes the following information:

uptime -p shows the system has been up for only 2 minutes

journalctl shows messages indicating:

mysqld invoked oom-killer

mysqld cpuset=/ mems_allowed=0

Which of the following explains why the server was offline?

Options:

A.

The process exhausted server memory.

B.

The process was intentionally terminated by a privileged user.

C.

The process crashed because of a filesystem error.

D.

A network outage caused a service availability issue.

Buy Now
Questions 34

A systems administrator is creating a backup copy of the /home/ directory. Which of the following commands allows the administrator to archive and compress the directory at the same time?

Options:

A.

cpio -o /backups/home.tar.xz /home/

B.

rsync -z /backups/home.tar.xz /home/

C.

tar -cJf /backups/home.tar.xz /home/

D.

dd of=/backups/home.tar.xz if=/home/

Buy Now
Questions 35

An administrator must secure an account for a user who is going on extended leave. Which of the following steps should the administrator take? (Choose two)

Options:

A.

Set the user’s files to immutable.

B.

Instruct the user to log in once per week.

C.

Delete the user’s /home folder.

D.

Run the command passwd -l user.

E.

Change the date on the /home folder to that of the expected return date.

F.

Change the user’s shell to /sbin/nologin.

Buy Now
Questions 36

Following the completion of monthly server patching, a Linux administrator receives reports that a critical application is not functioning. Which of the following commands should help the administrator determine which packages were installed?

Options:

A.

dnf history

B.

dnf list

C.

dnf info

D.

dnf search

Buy Now
Questions 37

Which of the following is the first step when starting a new Python project on a Linux system?

Options:

A.

python -m venv /path/to/project

B.

python -m pip install -r /path/to/project

C.

export PYTHON_PATH=/path/to/project

D.

python -m source /path/to/project

Buy Now
Questions 38

Which of the following describes how a user ' s public key is used during SSH authentication?

Options:

A.

The user ' s public key is used to hash the password during SSH authentication.

B.

The user ' s public key is verified against a list of authorized keys. If it is found, the user is allowed to log in.

C.

The user ' s public key is used instead of a password to allow server access.

D.

The user ' s public key is used to encrypt the communication between the client and the server.

Buy Now
Questions 39

Which of the following statements best describes Ansible?

Options:

A.

A tool used for monitoring cloud infrastructure

B.

A software configuration tool with its own declarative, Ruby-based language

C.

A CI/CD tool that allows automation using pipelines

D.

A tool that provides automation using playbooks written in YAML

Buy Now
Questions 40

Which of the following describes what Ansible is used for in the context of IT infrastructure?

Options:

A.

Database management

B.

Configuration management

C.

Process management

D.

Asset management

Buy Now
Questions 41

A systems administrator is working on configuration changes and needs to replace a hostname in a specific file. Which of the following commands should the administrator use to complete this task?

Options:

A.

cut -d oldhostname /etc/configuration.file | vi newhostname

B.

sed -i ' s/oldhostname/newhostname/ ' /etc/configuration.file

C.

cat /etc/configuration.file | grep oldhostname > newhostname

D.

grep oldhostname /etc/configuration.file | awk ' {print $1 newhostname} '

Buy Now
Questions 42

A Linux administrator wants to make the enable_auth variable set to 1 and available to the environment of subsequently executed commands. Which of the following should the administrator use for this task?

Options:

A.

let ENABLE_AUTH=1

B.

ENABLE_AUTH=1

C.

ENABLE_AUTH=$(echo $ENABLE_AUTH)

D.

export ENABLE_AUTH=1

Buy Now
Questions 43

Which of the following commands should a Linux administrator use to determine the version of a kernel module?

Options:

A.

modprobe bluetooth

B.

lsmod bluetooth

C.

depmod bluetooth

D.

modinfo bluetooth

Buy Now
Questions 44

A Linux administrator is making changes to local files that are part of a Git repository. The administrator needs to retrieve changes from the remote Git repository. Which of the following commands should the administrator use to save the local modifications for later review?

Options:

A.

git stash

B.

git pull

C.

git merge

D.

git fetch

Buy Now
Exam Code: XK0-006
Exam Name: CompTIA Linux+ V8 Exam
Last Update: May 6, 2026
Questions: 149
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now XK0-006