New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA XK0-004 Dumps Questions Answers

Page: 1 / 18
Total 483 questions

CompTIA Linux+ Certification Exam Questions and Answers

Question 1

A Linux administration is using a Linux system as a router. During the tests, the administrator discovers that IP packets are not being sent between the configured interfaces.

Which of the following commands enables this feature for IPv4 networks?

Options:

A.

cat /proc/sys/net/ipv4/ip_route > 1

B.

echo “1” > /proc/sys/net/ipv4/ip_forward

C.

echo “1” > /proc/sys/net/ipv4/ip_route

D.

echo “1” > /proc/sys/net/ipv4/ip_net

Buy Now
Question 2

A new HTTPS web service is being deployed on a server. Which of the following commands should the Linux administrator use to ensure traffic is able to flow through the system firewall to the new service?

Options:

A.

iptables –I OUTPUT –p tcp --sport 443 –j ACCEPT

B.

iptables –A INPUT –p tcp --dport 443 –j ACCEPT

C.

iptables –I INPUT --dport 443 –j ACCEPT

D.

iptables –A OUTPUT –p tcp --dport 443 –j ACCEPT

Question 3

A systems administrator needs to retrieve specific fields from a csv file. Which of the following tools would accomplish this task?

Options:

A.

awk

B.

sort

C.

print

D.

echo

Question 4

Which of the following is modified to reconfigure the boot environment?

Options:

A.

grub-mkconfig

B.

grub.cfg

C.

update-grub

D.

grub2-mkconfig

Question 5

A junior administrator of a physical server receives log messages indicating the out-of-memory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file.

Which of the following should the administrator use to reduce the output of memory messages?

Options:

A.

free : swapoff / swapfile ; swapon -a

B.

mkswap /swapfile; swapon –a

C.

fallocate –l 2G /swapfile && swapon –a

D.

echo “1” > /proc/meninfo ; swapon / swapfile

Question 6

A Linux administrator needs to remotely update the contents of the URL.

Which of the following commands would allow the administrator to download the current contents of the URL before updating?

Question 7

An engineer is working on a production application deployment that requires changing a web application property file called server.property that is managed by the Git version control system. A cloned copy of the remote repository in which the server.property file exists is on the local desktop computer. The engineer makes appropriate changes to the files, saves it as server.property, and executes git commit –m “changed the property file” server.property. Which of the following commands did the engineer fail to perform?

Options:

A.

git init server.property

B.

git merge server.property

C.

git add server.property

D.

git push server.property

Question 8

A systems administrator is configuring options on a newly installed Linux VM that will be deployed to the Pacific time zone. Which of the following sets of commands should the administrator execute to accurately configure the correct time settings?

Options:

A.

cd /etcln –s /usr/share/zoneinfo/US/Pacific localtime

B.

cd /usr/localln –s /usr/share/zoneinfo/US/Pacific zoneinfo

C.

cd /etc/localln –s /usr/share/zoneinfo/US/Pacific localtime

D.

cd /usr/share/localln –s /usr/share/zoneinfo/US/Pacific localectl

Question 9

Which of the following statements BEST represents what the term “agentless” means regarding orchestration?

Options:

A.

Installation of a tool is not required on the remote system to perform orchestration tasks

B.

It facilitates version control when using infrastructure as code during orchestration

C.

It automatically removes malware from the remote system during orchestration

D.

A tool can only be accessed remotely to perform orchestration tasks

Question 10

A Linux administrator has configured a Linux system to be used as a router. The administrator confirms that two network adapters are properly installed and functioning correctly. In addition, the output of the iptables –L command appears to contain a complete firewall configuration.

Which of the following commands does the administrator need to issue for the router to be fully functional?

Options:

A.

echo “1” > /proc/sys/net/ipv4/ip_forward

B.

echo “0” > /proc/sys/net/ipv4/tcp_abort_on_overflow

C.

echo “0” > /proc/sys/net/ipv4/max_connections

D.

echo “1” > /proc/sys/net/ipv4/ip_default_ttl

Question 11

An administrator needs to see the type of CPU that a server is running. Which of the following files contains this information?

Options:

A.

/proc/cpuinfo

B.

/etc/devices/info.conf

C.

/dev/proc/cpu

D.

/sys/dev/cpuinfo

Question 12

A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file.

Which of the following is the BEST reason to do this?

Options:

A.

To document the infrastructure so it can be included in the system security plan

B.

To ensure the administrator follows the planning phase of the system development life cycle

C.

To define the infrastructure so it can be provisioned consistently with minimal manual tasks

D.

To validate user requirements have been met within each regional datacenter for compliance

Question 13

A junior systems administrator is creating a cron job. The cron job requirements are as follows:

Run the hello.sh script every hour (24 times in one day).

Run it on Monday only.

Given this scenario, which of the following crontab options should be configured to meet these requirements?

Options:

A.

0 *** 1 hello.sh

B.

0 24 ** Monday hello.sh

C.

24 *** Monday hello.sh

D.

1 *** 0 hello.sh

Question 14

A Linux administrator retrieved a repository of files from a Git server using git clone. The administrator wants to see if a configuration file was added to the repository. Which of the following Git arguments should be used to see the recent modifications?

Options:

A.

fetch

B.

log

C.

init

D.

pull

Question 15

A systems administrator observes high latency values when reaching a remote web server. Which of the following commands will help determine and isolate issues on the network side?

Options:

A.

mtr

B.

dig

C.

netstat

D.

route

Question 16

A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?

Options:

B.

tracert www.comptia.org

D.

netstat www.comptia.org

Question 17

A company wants to provide internal identity verification services for networked devices. Which of the following servers should be installed?

Options:

A.

SSH

B.

VPN

C.

CA

D.

DHCP

E.

DNS

Question 18

Given that a company’s policy states that users cannot install third-party tools on Window servers, which of the following protocols will allow a Linux GUI to connect to a Windows server?

Options:

A.

VNC

B.

NX

C.

RDP

D.

X11

Question 19

An administrator needs to run the rescript. sh script stored on the /nr.t/disk Wesystem. but permission is denied;

The system options are:

The script properties are:

Which of the following will resolve the issue?

Options:

A.

mount -o remount, rw /mnt/disk

B.

chcon-u system_u -t admin_home_/mnt/disk/ myscript.sh

C.

mount -o remount, exec .mnt/disk

D.

setenforce permissive

Question 20

A security audit concludes that an organization's database servers need to be hardened As a result, an administrator obtans tie fofcjwwng partial Nmap output from a database server.

Which of the following commands should the administrator execute to mitigate security risks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 21

A Linux administrator needs to configure a user account to notify the user ten days before the password will expire. Which of the following commands would BEST accomplish this task?

Options:

A.

chage

B.

vipw

C.

password

D.

usermod

Question 22

A Linux administrator is creating a new local Linux user account for a web application The account has the following requirements:

• Use/var/www as the home directory

• Have the service_accounts group as its pnmary group

• Have the www user group as a secondary group

• Disable the account when the password expires

Which of the following BEST meets these requirements?

Options:

A.

useradd -D/var/www/-g service_accounts -G www -c 0

B.

useradd -d/var/www/-g service_accounts -f www -g 0

C.

useradd -D/var/www/-g service_accounts -g www -c 0

D.

useradd -d/var/www/-g service_accounts -G www -f 0

Question 23

A Linux administrator added storage to an XFS-formatted filesystem at /dev/mapper/vgslash-lvLog device using the LVM tools. However, the additional space does not show up when the administrator runs the df - h command. Which of the following commands should the administrator run to resolve this issue?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 24

A Linux administrator configured several network interfaces to be used for backup. The administrator entered the following commands:

After the last command, a new interlace appeared as connected and worked until the Linux system was rebooted. After the reboot, the Interface did not connect properly. Which of the following configuration changes are needed to ensure that the Interface connects automatically?

Options:

A.

The backup Interface should be reconfigured with a / 2 4 subnet mask.

B.

autoconnect yes should be added to the interface configuration.

C.

mcli conn up backup should be executed

D.

ip link set eth1 should be performed.

Question 25

An administrator is writing a Bash script to audit SSH logins. Which of the following logs would the administrator parse to find the needed information?

Options:

A.

/var/log/secure/

B.

/var/log/messages

C.

/var/log/firewalld

D.

/var/log/sssd

Question 26

A Linux systems administrator wants to see the current processes that are being run by each individual user who is logged on to the server. Which of the following is the BEST way to gather this information?

Options:

A.

wall

B.

who

C.

which

D.

watch

E.

w

Question 27

Some Bash scripts arc being versioned and stored in a Git repository Which of the following commands should the Linux administrator use to exclude tmp Wes from being added to the repository during any code adds and commits?

Options:

A.

export GIT_IGNORE=,tmp

B.

alias git=git commit --ignore=, tmp

C.

echo .gitignore >> * tmp

D.

git config -- blacklist = tmp

Question 28

An administrator needs to allow additional specific users and groups to have access to a foWer without removing the original owner or group. Which of the following commands should the administrator use to complete this task?

Options:

A.

sentenforce

B.

setfac1

C.

chmod

D.

chown

Question 29

A Linux administrator executed 1vextend to expand disk space to a partition from 8GB to 40GB However, the filesystem is not showing the additional space The administrator runs several commands and rectyes the following output:

Which of the following commands should the administrator run to resolve the issue?

Options:

A.

mXfs.extt /dev/mapper/VolQroup00-LogVo100

B.

mkfa_growffa /dev/mapper/Vci;r=.:p00-LogVo100

C.

reaize2ffa /dev/mapper/VolGroup00-LogVo100

D.

parted -a opt /dev/mapper/VolGroup00-LogVo100

Question 30

An administrator wants to use a Linux server's GUI remotely but is limited by security to using TCP ports 5900—5999. Which Of the following is the BEST choice for installation on the Linux server to enable this functionality?

Options:

A.

VNC

B.

rdesktop

C.

XRDP

D.

SPICE

Question 31

A Linux administrator needs to archive all the *.log files in the /var/log directory. The directory has several symbolic link files that need to be included in the car file. Which of the following commands should the administrator run to create

Options:

A.

tar -tvz logarchive.tgz /var/log/".log

B.

tar -xhz Icgarchive.tgz /var/log/*.log

C.

tar -czh logarchive.tgz /var/log/*.log

D.

tar -cpz logarchive.tgz /var/log/*.log

Question 32

A Linux administrator needs to schedule a backup job to run every Friday at 2 15 a.m. Which of the following lines should the administrator add to the crontab file?

Options:

A.

15 2 * * 5 /bin/backup_job.sh

B.

2 15 * * 5 /bin/backup_job.sh

C.

2 * * 15 5 /bin/backup_job.sh

D.

2 * 5 15 * /bin/backup_job.sh

Question 33

A user cannot reach the internet from a workstation. A systems administrator performs diagnostics with the following results:

Which of the following is the cause for lack of internet connectivity?

Options:

A.

The workstation is not using a DNS server.

B.

The network gateway is not reachable from the workstation.

C.

The incorrect network mask is set for the interface enp2so on the workstation.

D.

The company's firewall is blocking connections from the workstation to the internet.

Question 34

A user does not want Bluetooth to start up event time the system starts. Which of the following commands should the user execute to accomplish this task?

Options:

A.

systemctl disabled bluetcc-h.service

B.

systemctl disable bluetccth.service

C.

systemctl stop bluetooth.service

D.

systemctl stepped bluetccth.service

Question 35

A technician needs to install the package, tar,gz, which contains the source code of custom software The technician downloaded the file in /crap Which of the following commands should the technician use to install the executable? (Select Two.)

Options:

A.

tar

B.

gunzip

C.

Idd

D.

configure

E.

apt

F.

make

G.

yum

Question 36

A junior Linux administrator receives a help desk ticket from a user who reports being unable to reach the website Which of the following commands should the administrator use to verify proper DNS

configuration?

Options:

C.

hostname www.comptia.org

D.

netstat www.comptia.org

Question 37

Joe is no longer employed by a company and Ann is tatang over his protects several team members work out of the project directory inducing Ann. The administrator needs to assign ownership of all of Joe's files in the /project directory to Ann. Which of the following should the administrator run to accomplish this task?

Options:

A.

Restorecon –f joe ann –r /projects

B.

Chown –R joe,ann /projects

C.

Find /project –user joe –exec chown ann { } /;

D.

Locate / projects | grep joe | chown –R jeo –f-

Question 38

An administrator wants to be able to access a remote server. After creating an SSH key pair, which of the following describes where the public key should be placed to allow for key-based authentication?

Options:

A.

-/, ssh/authorized_keys

B.

-/ssh/id_ras.pub

C.

-/.ssh/known_hosts

D.

-/.ssh/config

Question 39

An administrator needs to set the time of a VM that has no network connectivity to an NTP server. The VM’s host, however, is synchronized with NTP.

Which of the following allows the administrator to synchronize the time of the VM with the host?

Options:

A.

time

B.

date

C.

hwclock

D.

ntpdate

Question 40

Which of the following will boot from a network-hosted ISO image at power on?

Options:

A.

PXE

B.

FTP

C.

iSCSI

D.

NFS

Question 41

Which of the following command should an administrator use to prevent users from starting the httpd service on a system-based Linux system?

Options:

A.

Systemct1 mask httpd

B.

Systemct1 disables httpd

C.

Chkconfig httpd off

D.

Systemctl stop httpd

Question 42

A system administrator recently installed and configure a web proxy server with the IP address 192.68 address. What is the should be implemented on then proxy server to ensure traffic is processes.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 43

A systems administrator wants to increase the existing drive space on a Linux server with a software RAID. After physically adding the new drive to the system, and then adding the drive to the RAID array,

the administrator notices the available drive space has not increased. A status of the array shows the new drive and the original storage space:

md0 : active Raid sdd1[3]S sdc1[2] sdb1[1] sda1[0]

954585654 blocks level5 64K chunk algorithm 2 [3/3] [UUU]

Which of the following should the administrator do to make all storage space available on the RAID array?

Options:

A.

Run hdparm to alert the kernel to a new drive.

B.

Convert the new drive to a hot spare.

C.

Set the RAID type to a RAID 1.

D.

Grow the array size to four members.

Question 44

A new packages repository named repo10 has been installed on mirror site. A Linux administrator wants to use this new repository for local package installations. In which of the following locations should the administrator store the configuration information for the repo10 repository?

Options:

A.

/etc/yum.reps.d/repo10.Repo

B.

/etc/yum_repo.d/repo10

C.

/etc/yum.reps.d/repo10

D.

/etc/yum.conf

Question 45

A Linux administrator needs to run a few virtual machines and containers on the physical machines with a single network interface. Which of the following networking would allow the administrator to connect with the outside world?

Options:

A.

Bridging

B.

VLAN

C.

Bonding/teaming

D.

VPN

Question 46

An administrator is utilizing an automation engine that engine that uses SSH to run command on remote systems. Which of the following does this describe?

Options:

A.

Inventory

B.

Agentless architecture

C.

Build automation

D.

Version control

Question 47

A user wants to configure the application “myapp” to start on runlevels 2, 3, 4, and 5 every time the system starts.

Which of the following commands will accomplish this task?

Options:

A.

chkconfig --level 2345 myapp on

B.

systemctl myapp on 2345

C.

chkcinfig myapp --levels 2-5

D.

systemctl --levels 2345 on

Question 48

Which of the following commands should a Linux administrator use to open the firewall to allow incoming database connections?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 49

A Linux administrator is running a script that runs a Java application but receives the following error:

Error: Java_Home is not set

Java is installed on the Linux server and java –version returns a value. Which of the following should the administrator add to the script to resolve this issue?

Options:

A.

Export PATH-$PATH: $JAVA_HOME

B.

Echo ‘which java > $JAVA_HOME

C.

Export Java_Home which java

D.

Set JAVA_HOME –which java

Question 50

A systems administrator needs to install software packages on a server from an Internet-based repository. The server does not have Internet connectivity.

Which of the following can be used to allow the server to connect to the Internet through the systems administrator’s desktop?

Options:

A.

Local package repository

B.

UUCP

C.

Remote SSH port forwarding

D.

X11 forwarding

Question 51

A Linux administrator needs to know the MAC address of the server’s gateway.

Which of the following commands should the administrator run to obtain this information?

Options:

A.

arp -gw

B.

arp -a

C.

arp -gwi

D.

arp -gtw

Question 52

An administrator is adding an existing user named ‘’buddy’’ to the Apache group. Which of the following should the administrator perform to accomplish this task?

Options:

A.

sseradd –g apache buddy

B.

ssermod –g apche buddy

C.

sudo useradd –g apache buddy

D.

sudo usermod –g apachebuddy

Question 53

A system administrator has discovered a drive is malfunctioning and needs to be replaced in a server. The administrator lists properties of the exiting storage before attempting the replacement:

After replacing the malfunctioning drive, which of the following is the BEST way to create the proper partition table on the new drive?

Options:

A.

Parted –a optimal /dev/sdb primary 0% 2000MB

B.

Fdis.dev/sdb< echo p; echo d; eacho w)

C.

Mkpart primary 1MB 2000MB /dev/sdb

D.

Sfdisk –dev/sda| sfdisk/dev/sdb

Question 54

A Linux administrator created a new log file in /var/log/newlog to monitor a newly installed application. The administrator is now configuring parameters of the file so it will be rotated on a weekly basis or when it becomes larger than 1MB in size. In addition, five rotations of the file should exist in the /var/log directory.

Which of the following should be added to the /etc/logrotate.conf file to meet this objective?

Options:

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Question 55

A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user’s account?

Options:

A.

pam_tally2 --user=user --reset

B.

passwd -u user -G root

C.

usermod -u user -G root

D.

chage -1 user=user --reset

Question 56

A Linux administrator looks at the /etc/timezone file and determines the need to change the time zone from California to New York temporarily. Which of the following commands will accomplish this?

Options:

A.

sed -f TZ=America/New_York

B.

cat TZ=America/New_York

C.

export TZ=America/New_York

D.

printf TZ=America/New_York

Question 57

A junior systems administrator is tasked with providing the network_administrators group the ability to

perform sudo without prompting for a password. Which of the following steps should the administrator perform

to accomplish this task? (Choose two.)

Options:

A.

Use visudo to edit the /etc/sudoers file and add network_administrators to the “wheel” group

B.

Use vi to edit the /etc/sudo file and add network_administrators to the “wheel” group

C.

Provide all network_administrators with the “root” account password

D.

Add the network_administrators ALL=(ALL) NOPASSWD: ALL directive to the /etc/sudoers file

E.

Add the network_administrators =(ALL) NOEXEC: ALL directive to the /etc/sudoers file

Question 58

A Linux administrator tried to copy files to a remote server but received an error message indicating a lack of

free space on the disk. The administrator issued a df command and verified adequate free space and inodes

on the filesystem.

Which of the following commands is the BEST way to diagnose the issue?

Options:

A.

cat /proc/meminfo

B.

lsof -nP | grep deleted

C.

find / -type f -size +50M

D.

du -a / | sort -n -r | head -n 30

Question 59

A Linux administrator recently reprovisioned a new corporate web server to replace a legacy one. To minimize

the impact on the company's users, the administrator modified the network and DNS settings of the new server

to be the same as the legacy server.

When attempting to log in to the new server remotely over SSH, the following error message is displayed:

WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!

Which of the following should the administrator do to resolve the issue?

Options:

A.

Restart the network services on both the remote server and the local machine.

B.

Remove the entry for the web server from the known_hosts file on the local machine.

C.

Update the /etc/hosts file on the remote server and local machine.

D.

Add the administrator's public key to the authorized_keys on the remote server.

Question 60

Which of the following is used on the client to boot a Linux system from a TFTP server?

Options:

A.

HTTP

B.

GRUB

C.

EFI

D.

PXE

Question 61

An administrator is using a configuration management tool to define a system’s configuration. The defined configuration can be used to provision new systems, rebuild existing systems, or roll back systems

to their original baseline configurations.

Which of the following BEST describes what the administrator is doing?

Options:

A.

Build automation

B.

Containerization

C.

Infrastructure as code

D.

Test automation

Question 62

A technician suspects a company's border firewall is down, thus blocking Internet access. The technician executes the following commands:

#ping -c 1 firewall.company.com

64 bytes from firewall.company.com (192.168.1.1): icmp_seq=1 ttl=64 time=0.061ms

#ping -c 16

16 packets transmitted, 0 received, 100% packet loss, time 14999ms

Which of the following commands should the technician use to BEST determine the source of this outage?

Options:

A.

tcpdump

B.

nmap

C.

dig

D.

traceroute

Question 63

A systems administrator uses a remote execution engine to iterate through each IP address in a network and run a script on remote hosts. The script captures the remote system's hostname, IP address, OS distribution, and system uptime. The output of the script gets saved to the administrator's local workstation for future processing.

Which of the following is this an example of?

Options:

A.

Performance monitoring

B.

Inventory

C.

Agentless

D.

Infrastructure as code

E.

Build automation

Question 64

A user requested a USB serial device to be added to a desktop computer. The device has built-in kernel driver

support. The administrator tested the device installation and access, but the user cannot access the serial port.

Each time the user attempts to access the device, an error log is created that shows the user does not have

permission to use the serial port. Which of the following will add a user to the group that has serial port

capabilities?

Options:

A.

usermod –a –G serialport $USER

B.

usermod –a –G modem $USER

C.

usermod –a –G dialout $USER

D.

usermod –a –G root $USER

Question 65

Which of the following is used in unattended server installation via PXE?

Options:

A.

Kickstart

B.

YAML

C.

Cloud-init

D.

Container image

Question 66

An administrator notices the HISTSIZE variable is 50, using the commands below:

HISTSIZE=50

export HISTSIZE

The administrator rechecks the HISTSIZE value using echo HISTSIZE but gets no value. Which of the

following commands should the administrator use to retrieve its value?

Options:

A.

printenv | grep $HISTSIZE

B.

echo HISTSIZE

C.

printf HISTSIZE

D.

grep $HISTSIZE

Question 67

An administrator needs to download a monitoring agent called node_exporter.0.16.0-Linux.amd64 from the internal web page The server does not have graphical interface.

Which of the following commands will accomplish this task?

Question 68

A user is reporting unusual slowness when trying to transfer a large file to an NFS server from a workstation. The administrator runs tracepath and gets the following output:

Which of the following BEST describes the issue and a possible solution?

Options:

A.

The path MTU is lower than the source MTU. Reduce the source MTU setting.

B.

There is latency at the storage device. Work with the storage team to correct the issue.

C.

There is latency on an intermediate router. Increase the path MTU to compensate.

D.

There are dropped packets at an intermediate router. Work with the network team to correct the issue.

Question 69

An administrator is installing a Linux VM on a personal hypervisor. The administrator wants to have the VM’s IP address on the same network as the hypervisor host so the VM has the same network properties as the physical interface of the host. To which of the following should the administrator set the network properties?

Options:

A.

Host-only network

B.

NAT network

C.

Bridge network

D.

Overlay network

Question 70

The following tools help maintain consistency across different systems in an infrastructure:

SUSE Manager

Red Hat Satellite

Spacewalk

If a system file is changed, the tools roll back the file to a predefined configuration.

Which of the following concepts BEST describes this behavior?

Options:

A.

Build automation

B.

Infrastructure as code

C.

Automated configuration management

D.

Agentless system management

Question 71

Given the output below:

[root@appserver ~]# rm config.txt

rm: remove regular file 'config.txt'? yes

rm: cannot remove 'config.txt': Operation not permitted

Which of the following might be the cause?

Options:

A.

The file config.txt does not have the user write bit set.

B.

The file config.txt does not exist.

C.

The file config.txt has the immutable attribute set.

D.

The file config.txt has an ACL that does not permit deletion by others.

Question 72

When requesting SSH access to a remote system, a user accidentally emailed the id_rsa key to the

administrator. Which of the following should the user do NEXT?

Options:

A.

Run the ssh-add command to add the remote system to known_hosts.

B.

Ask the administrator to run chmod 600 id_rsa on the remote system.

C.

Delete id_rsa key file and send the id_rsa.pub key file instead.

D.

Stop using that key and run ssh-keygen to generate a new key pair.

Page: 1 / 18
Total 483 questions