Practice Free XK0-005 Exam Online Questions
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
- A . Windows Management Instrumentation (WMI)
- B . Hypertext Transfer Protocol Secure (HTTPS)
- C . Lightweight Directory Access Protocol (LDAP)
- D . Remote Desktop Protocol (RDP)
C
Explanation:
Using AD Query, the security gateway connects to the Active Directory Domain Controllers using Lightweight Directory Access Protocol (LDAP). LDAP is a protocol that provides access to directory services over a network. AD Query uses LDAP queries to retrieve information about users and groups from Active Directory Domain Controllers without installing any software on them. AD Query does not use Windows Management Instrumentation (WMI), Hypertext Transfer Protocol Secure (HTTPS), or Remote Desktop Protocol (RDP) to connect to Active Directory Domain Controllers. : Check Point Certified Security Administrator (CCSA) R80.x Study Guide, Chapter 5: User Management and Authentication, page 69.
At what point is the Internal Certificate Authority (ICA) created?
- A . During the primary Security Management Server installation process.
- B . Upon creation of a certificate.
- C . When an administrator decides to create one.
- D . When an administrator initially logs into SmartConsole.
A
Explanation:
The Internal Certificate Authority (ICA) is created during the primary Security Management Server installation process. The ICA is a component of Check Point’s Public Key Infrastructure (PKI) that issues and manages certificates for Security Gateways and administrators. The ICA is automatically installed and initialized when the primary Security Management Server is installed. The ICA is not created upon creation of a certificate, when an administrator decides to create one, or when an administrator initially logs into SmartConsole. : Check Point Certified Security Administrator (CCSA) R80.x Study Guide, Chapter 3: Check Point Security Management Architecture, page 32.
A Linux administrator is configuring a log collector agent to monitor logs in /var/log/collector. The agent is reporting that it cannot write to the directory. The agent runs as the logger user account.
The administrator runs a few commands and reviews the following output:
Output 1:
drwxr-xr-x. 1 root root 0 Oct 20:13 collector
Output 2:
file: /var/log/collector
owner: root
group: root
user::rwx
group::r-x
mask::rwx
other::r-x
Output 3:
uid=1010(logger) gid=1010(monitor) groups=1010(monitor)
Which of the following is the best way to resolve the issue?
- A . setfacl -Rm u:logger/var/log/collector
- B . usermod -aG root logger
- C . chmod 644 /var/log/collector
- D . chown -R logger/var/log
A
Explanation:
The issue is that the logger user does not have write permissions to /var/log/collector. Using setfacl (Access Control Lists) allows fine-grained control over file permissions, granting the logger user the necessary read-write access to the directory without changing the owner or group.
A Linux administrator is troubleshooting connectivity issues and receives the following outputs:
python
Copy
$ ping comptia.org
ping: comptia.org: Temporary failure in name resolution
$ ping 104.18.17.29
64 bytes from 104.18.17.29: icmp_seq=1 ttl=63 time=31.4 ms
…
Which of the following describes the issue?
- A . A DNS has not been configured in the /etc/resolv.conf file
- B . A name server IP address has not been added in the /etc/protocols file
- C . The network interface is disabled
- D . A gateway IP address has not been configured on the network interface’s configuration file
A
Explanation:
The IP ping works, but DNS resolution fails, indicating that a DNS server is not configured properly in /etc/resolv.conf. That file is responsible for DNS resolution.
Source: CompTIA Linux+ XK0-005 Study Guide C Chapter 9: Networking
Reference: man resolv.conf
Application code is stored in Git. Due to security concerns, the DevOps engineer does not want to keep a sensitive configuration file, app. conf, in the repository.
Which of the following should the engineer do to prevent the file from being uploaded to the repository?
- A . Run git exclude app. conf.
- B . Run git stash app. conf.
- C . Add app. conf to. exclude.
- D . Add app. conf to. gitignore.
D
Explanation:
This will prevent the file app.conf from being tracked by Git and uploaded to the repository. The .gitignore file is a special file that contains patterns of files and directories that Git should ignore. Any file that matches a pattern in the .gitignore file will not be staged, committed, or pushed to the remote repository. The .gitignore file should be placed in the root directory of the repository and committed along with the other files.
The other options are incorrect because:
A systems administrator created a new directory with specific permissions.
Given the following output:
arduino
$ ls -ld /comptia
drwxr-x— 2 root root 4096 Oct 20 20:13 /comptia
$ getfacl /comptia
# file: /comptia
# owner: root
# group: root user::rwx group::r-x other::—
default:user::rwx default:group::r-x default:group:wheel:rwx default:mask::rwx default:other::—
Which of the following permissions are enforced on /comptia?
- A . Members of the wheel group can read files in /comptia.
- B . Newly created files in /comptia will have the sticky bit set.
- C . Other users can create files in /comptia.
- D . Only root can create files in /comptia.
A
Explanation:
According to the getfacl output, the default ACL for the group wheel is set to rwx, meaning members of the wheel group have read, write, and execute permissions. Therefore, they can access and manage files in the /comptia directory. Other users (other::—) have no permissions on this directory.
User1 reports "access denied" errors while trying to execute app. Given the following outputs:
Which of the following options will remediate this issue?
- A . Providing execute permissions to user1 in the ACL
- B . Modifying the permissions for others to grant read, write, and execute
- C . Adding user1 to the wheel group
- D . Moving app to a different folder
A systems administrator needs to validate that the dm_multipath driver was loaded in a Linux system.
Which of the following commands should the administrator use?
- A . lsmod | grep dm_multipath
- B . modinfo | grep dm_multipath
- C . insmod | grep dm_multipath
- D . modprobe | grep dm_multipath
A
Explanation:
To verify whether a kernel module is currently loaded, use:
bash
lsmod | grep dm_multipath
lsmod lists all loaded modules.
modinfo shows module information, not whether it’s loaded.
insmod and modprobe are used to load modules, not list them.
Reference: CompTIA Linux+ XK0-005 Official Study Guide, Domain 1.5 C Storage
“Use lsmod to list all loaded kernel modules. Combine with grep to check for a specific module like dm_multipath.”
Joe, a user, is unable to log in to the Linux system Given the following output:
Which of the following command would resolve the issue?
- A . usermod -s /bin/bash joe
- B . pam_tally2 -u joe -r
- C . passwd -u joe
- D . chage -E 90 joe
B
Explanation:
Based on the output of the image sent by the user, Joe is unable to log in to the Linux system because his account has been locked due to too many failed login attempts. The pam_tally2 -u joe -r command will resolve this issue by resetting Joe’s failed login counter to zero and unlocking his account. This command uses the pam_tally2 module to manage user account locking based on login failures. The usermod -s /bin/bash joe command will change Joe’s login shell to /bin/bash, but this will not unlock his account. The passwd -u joe command will unlock Joe’s password if it has been locked by passwd -l joe, but this will not reset his failed login counter or unlock his account if it has been locked by pam_tally2. The chage -E 90 joe command will set Joe’s account expiration date to 90 days from today, but this will not unlock his account or reset his failed login counter. CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 18: Securing Linux Systems, page 537.
A systems engineer deploys a new application server, but the server cannot communicate with the back-end database hostname. The engineer confirms that the application server can ping the database server’s IP address.
Which of the following is the most likely cause of the issue?
- A . Incorrect DNS servers
- B . Unreachable default gateway
- C . Missing route configuration
- D . Misconfigured subnet mask
A
Explanation:
If the application server can ping the database server by its IP address but not by its hostname, it indicates a DNS resolution issue. The most likely cause is incorrect DNS server configuration. The engineer should verify the DNS settings in /etc/resolv.conf or the network configuration.