View Mode
Q: 11
An administrator deployed a Linux server that is running a web application on port 6379/tcp. SELinux is in enforcing mode based on organization policies. The port is open on the firewall. Users who are trying to connect to a local instance of the web application receive Error 13, Permission denied. The administrator ran some commands that resulted in the following output: Linux+ XK0-005 question Which of the following commands should be used to resolve the issue?
Options
Q: 12
A systems administrator is troubleshooting connectivity issues and trying to find out why a Linux server is not able to reach other servers on the same subnet it is connected to. When listing link parameters, the following is presented: Linux+ XK0-005 question Based on the output above, which of following is the MOST probable cause of the issue?
Options
Q: 13

DRAG DROP As a Systems Administrator, to reduce disk space, you were tasked to create a shell script that does the following: Add relevant content to /tmp/script.sh, so that it finds and compresses rotated files in /var/log without recursion. INSTRUCTIONS Fill the blanks to build a script that performs the actual compression of rotated log files. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Linux+ XK0-005 question

Drag & Drop
Q: 14

DRAG DROP You have been asked to parse a log file of logins to determine various information about who is logging in and when. INSTRUCTIONS Open and inspect the Login log file. Drag and drop the correct commands onto the output that was generated from that command. Tokens can be used only once and not all will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Drag & Drop
Q: 15
HOTSPOT A new drive was recently added to a Linux system. Using the environment and tokens provided, complete the following tasks: • Create an appropriate device label. • Format and create an ext4 file system on the new partition. The current working directory is /. Linux+ XK0-005 question
Your Answer
Q: 16
SIMULATION A senior administrator has placed a private key for user admin in your home directory. The server you need to remotely access is server1 and SSH is listening on port 2222. INSTRUCTIONS Part 1 Review the command output and build the correct command to place the private key into your SSH folder. Part 2 Review the command output and build the correct command to set the file permissions. Part 3 Review the command output and build the correct command to set the correct ownership. In each part, click on objects to build a complete command. Command objects may be used more than once, but not all will be used. Use _ as the spacebar. Click the arrow to remove any unwanted objects from your command. Part 4 Select the proper file to edit for remote server access. Then, build the correct configuration output based on the server name, ports, and files. Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question Linux+ XK0-005 question
Your Answer
Q: 17
SIMULATION Junior system administrator had trouble installing and running an Apache web server on a Linux server. You have been tasked with installing the Apache web server on the Linux server and resolving the issue that prevented the junior administrator from running Apache. INSTRUCTIONS Install Apache and start the service. Verify that the Apache service is running with the defaults. Typing “help” in the terminal will show a list of relevant event commands. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Linux+ XK0-005 question
Your Answer
Q: 18
Which of the following is a way to enable a production web server's communications with strong encryption and identity verification?
Options
Q: 19
A systems administrator is trying to track down a rogue process that has a TCP listener on a network interface for remote command-and-control instructions. Which of the following commands should the systems administrator use to generate a list of rogue process names? (Select two).
Options
Q: 20
A Linux administrator needs to expand a volume group using a new disk. Which of the following options presents the correct sequence of commands to accomplish the task?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE