Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

XK0-006 Questions and Answers

Question # 6

Which of the following is a characteristic of Python 3?

A.

It is closed source.

B.

It is extensible through modules.

C.

It is fully backwards compatible.

D.

It is binary compatible with Java.

Full Access
Question # 7

A Linux administrator attempts to log in to a server over SSH as root and receives the following error message: Permission denied, please try again. The administrator is able to log in to the console of the server directly with root and confirms the password is correct. The administrator reviews the configuration of the SSH service and gets the following output:

Based on the above output, which of the following will most likely allow the administrator to log in over SSH to the server?

A.

Log out other user sessions because only one is allowed at a time.

B.

Enable PAM and configure the SSH module.

C.

Modify the SSH port to use 2222.

D.

Use a key to log in as root over SSH.

Full Access
Question # 8

Users report that a Linux system is unresponsive and simple commands take too long to complete. The Linux administrator logs in to the system and sees the following: Output 1:

10:06:29 up 235 day, 19:23, 2 users, load average: 8.71, 8.24, 7.71

Which of the following is the system experiencing?

A.

High latency

B.

High uptime

C.

High CPU load

D.

High I/O wait times

Full Access
Question # 9

A systems administrator receives reports about connection issues to a secure web server. Given the following firewall and web server outputs:

Firewall output:

Status: active

To Action From

443/tcp DENY Anywhere

443/tcp (v6) DENY Anywhere (v6)

Web server output:

tcp LISTEN 0 4096 *:443 :

Which of the following commands best resolves this issue?

A.

ufw disable

B.

ufw allow 80/tcp

C.

ufw delete deny https/tcp

D.

ufw allow 4096/tcp

Full Access
Question # 10

While hardening a system, an administrator runs a port scan with Nmap, which returned the following output:

Which of the following is the best way to address this security issue?

A.

Configuring a firewall to block traffic on port 23 on the server

B.

Changing the system administrator's password to prevent unauthorized access

C.

Closing port 80 on the network switch to block traffic

D.

Disabling and removing the Telnet service on the server

Full Access
Question # 11

Which of the following utilities supports the automation of security compliance and vulnerability management?

A.

SELinux

B.

Nmap

C.

AIDE

D.

OpenSCAP

Full Access
Question # 12

A Linux administrator wants to add a user to the Docker group without changing the user’s primary group. Which of the following commands should the administrator use to complete this task?

A.

sudo groupmod docker user

B.

sudo usermod -g docker user

C.

sudo usermod -aG docker user

D.

sudo groupmod -G docker user

Full Access
Question # 13

A systems administrator attempts to edit a file as root, but receives the following error:

Which of the following commands allows the administrator to edit the file?

A.

chown root /etc/resolv.conf

B.

chattr -i /etc/resolv.conf

C.

chmod 750 /etc/resolv.conf

D.

chgrp root /etc/resolv.conf

Full Access
Question # 14

A Linux administrator wants to make the enable_auth variable set to 1 and available to the environment of subsequently executed commands. Which of the following should the administrator use for this task?

A.

let ENABLE_AUTH=1

B.

ENABLE_AUTH=1

C.

ENABLE_AUTH=$(echo $ENABLE_AUTH)

D.

export ENABLE_AUTH=1

Full Access
Question # 15

An administrator wants to search a file named myFile and look for all occurrences of strings containing at least five characters, where characters two and five are i, but character three is not b. Which of the following commands should the administrator execute to get the intended result?

A.

grep .a*^b-.a myFile

B.

grep .a., [a] myFile

C.

grepa^b*a myFile

D.

grep .i[^b].i myFile

Full Access
Question # 16

A systems administrator is reconfiguring existing user accounts in a Linux system. Which of the following commands should the administrator use to include "myuser" in the finance group?

A.

groupadd finance myuser

B.

groupmod finance myuser

C.

useradd -g finance myuser

D.

usermod -aG finance myuser

Full Access
Question # 17

An administrator receives reports that a web service is not responding. The administrator reviews the following outputs:

Which of the following is the reason the web service is not responding?

A.

The private key needs to be renamed from server.crt to server, key so the service can find it.

B.

The private key does not match the public key, and both keys should be replaced.

C.

The private key is not in the correct location and needs to be moved to the correct directory.

D.

The private key has the incorrect permissions and should be changed to 0755 for the service.

Full Access
Question # 18

Which of the following describes PEP 8?

A.

The style guide for Python code

B.

Python virtual environments

C.

A package installer for Python

D.

A Python variable holding octal values

Full Access
Question # 19

An administrator added a new disk to expand the current storage. Which of the following commands should the administrator run first to add the new disk to the LVM?

A.

vgextend

B.

lvextend

C.

pvcreate

D.

pvresize

Full Access
Question # 20

Which of the following is a reason multiple password changes on the same day are not allowed?

A.

To avoid brute-forced password attacks by making them too long to perform

B.

To increase password complexity and the system's security

C.

To stop users from circulating through the password history to return to the originally used password

D.

To enforce using multifactor authentication with stronger encryption algorithms instead of passwords

Full Access
Question # 21

In the echo "profile-$num-$name" line of a shell script, the variable $num seems to not be expanding during execution. Which of the following notations ensures the value is expanded?

A.

echo "profile-$(num)-$name"

B.

echo 'profile-$num-$name'

C.

echo "profile-'$num'-$name"

D.

echo "profile-${num}-$name"

Full Access
Question # 22

An administrator is trying to terminate a process that is not responding. Which of the following commands should the administrator use in order to force the termination of the process?

A.

kill PID

B.

kill -1 PID

C.

kill -9 PID

D.

kill -15 PID

Full Access
Question # 23

Which of the following passwords is the most complex?

A.

H3sa1dt01d

B.

he$@ID$heTold

C.

H3s@1dSh3t0|d

D.

HeSaidShetold

Full Access
Question # 24

A user states that an NFS share Is reporting random disconnections. The systems administrator obtains the following information

Which of the following best explains the symptoms that are being reported?

A.

The mount point is incorrect for the NFS share.

B.

The IP address of the NFS share is incorrect.

C.

The filesystem is nearly full and is reporting errors.

D.

The interface is reporting a high number of errors and dropped packets.

Full Access
Question # 25

A Linux systems administrator is running an important maintenance task that consumes a large amount of CPU, causing other applications to slow. Which of the following actions should the administrator take to help alleviate the issue?

A.

Increase the available CPU time with pidstat.

B.

Lower the priority of the maintenance task with renice.

C.

Run the maintenance task with nohup.

D.

Execute the other applications with the bg utility.

Full Access
Question # 26

A systems administrator wants to review the logs from an Apache 2 error.log file in real time and save the information to another file for later review. Which of the following commands should the administrator use?

A.

tail -f /var/log/apache2/error.log > logfile.txt

B.

tail -f /var/log/apache2/error.log | logfile.txt

C.

tail -f /var/log/apache2/error.log >> logfile.txt

D.

tail -f /var/log/apache2/error.log | tee logfile.txt

Full Access