XK0-005 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the XK0-005 certification? Our XK0-005 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective XK0-005 exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic XK0-005 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
A systems administrator is deploying three identical, cloud-based servers. The administrator is using the following code to complete the task:Which of the following technologies is the administrator using?
A. Ansible
B. Puppet
C. Chef
D. Terraform
A Linux systems administrator receives a notification that one of the server’s filesystems is full. Which of the following commands would help the administrator to identify this filesystem?
A. lsblk
B. fdisk
C. df -h
D. du -ah
A Linux administrator is troubleshooting an issue in which users are not able to access https://portal.comptia.org from a specific workstation. The administrator runs a few commands and receives the following output: # cat /etc/hosts 10.10.10.55 portal.comptia.org # host portal.comptia.org portal.comptia.org has address 192.168.1.55 #cat /etc/resolv.conf nameserver 10.10.10.5 Which of the following tasks should the administrator perform to resolve this issue?
A. Update the name server in resolv.conf to use an external DNS server.
B. Remove the entry for portal.comptia.org from the local hosts file.
C. Add a network route from the 10.10.10.0/24 to the 192.168.0.0/16.
D. Clear the local DNS cache on the workstation and rerun the host command.
A systems administrator is troubleshooting connectivity issues and trying to find out why a Linux server is not able to reach other servers on the same subnet it is connected to. When listing link parameters, the following is presented:Based on the output above, which of following is the MOST probable cause of the issue?
A. The address ac:00:11:22:33:cd is not a valid Ethernet address.
B. The Ethernet broadcast address should be ac:00:11:22:33:ff instead.
C. The network interface eth0 is using an old kernel module.
D. The network interface cable is not connected to a switch.
In order to copy data from another VLAN, a systems administrator wants to temporarily assign IP address 10.0.6.5/24 to the newly added network interface enpls0f1. Which of the following commands should the administrator run to achieve the goal?
A. ip addr add 10.0.6.5/24 dev enpls0f1
B. echo “IPV4_ADDRESS=10.0.6.5/24” > /etc/sysconfig/network-scripts/ifcfg-enpls0f1
C. ifconfig 10.0.6.5/24 enpsls0f1
D. nmcli conn add ipv4.address=10.0.6.5/24 if name snpls0f1
A Linux administrator needs to create a symlink for /usr/local/bin/app-a, which was installed in /usr/local/share/app-a. Which of the following commands should the administrator use?
A. ln -s /usr/local/bin/app-a /usr/local/share/app-a
B. mv -f /usr/local/share/app-a /usr/local/bin/app-a
C. cp -f /usr/local/share/app-a /usr/local/bin/app-a
D. rsync -a/usr/local/share/app-a /usr/local/bin/app-a
A Linux system is failing to boot. The following error is displayed in the serial console: [[1;33mDEPEND[Om] Dependency failed for /data. [[1;33mDEPEND[Om] Dependency failed for Local File Systems ... Welcome to emergency mode! After logging in, type "journalctl -xb" to viewsystem logs, "systemctl reboot" to reboot, "systemctl default" to try again to boot into default mode. Give root password for maintenance (or type Control-D to continue} Which of the following files will need to be modified for this server to be able to boot again?
A. /etc/mtab
B. /dev/sda
C. /etc/fstab
D. /ete/grub.conf
A junior administrator updated the PostgreSQL service unit file per the database administrator's recommendation. The service has been restarted, but changes have not been applied. Which of the following should the administrator run for the changes to take effect?
A. systemctl get-default
B. systemctl daemon-reload
C. systemctl enable postgresql
D. systemctl mask postgresql
Which of the following commands will display the operating system?
A. uname -n
B. uname -s
C. uname -o
D. uname -m
A cloud engineer is asked to copy the file deployment.yaml from a container to the host where the container is running. Which of the following commands can accomplish this task?
A. docker cp container_id/deployment.yaml deployment.yaml
B. docker cp container_id:/deployment.yaml deployment.yaml
C. docker cp deployment.yaml local://deployment.yaml
D. docker cp container_id/deployment.yaml local://deployment.yaml
To harden one of the servers, an administrator needs to remove the possibility of remote administrative login via the SSH service. Which of the following should the administrator do?
A. Add the line DenyUsers root to the /etc/hosts.deny file.
B. Set PermitRootLogin to no in the /etc/ssh/sshd_config file.
C. Add the line account required pam_nologin. so to the /etc/pam.d/sshd file.
D. Set PubKeyAuthentication to no in the /etc/ssh/ssh_config file.
A Linux administrator found many containers in an exited state. Which of the following commands will allow the administrator to clean up the containers in an exited state?
A. docker rm –all
B. docker rm $(docker ps -aq)
C. docker images prune *
D. docker rm –state exited
A user is unable to log on to a Linux workstation. The systems administrator executes the following command:The command results in the following output:
Which of the following should the systems administrator execute to fix the issue?
A. chown -R user1:user1 /home/user1
B. sed -i ‘/:::/::/g’ /etc/shadow
C. chgrp user1:user1 /home/user1
D. passwd -u user1
A Linux administrator is trying to remove the ACL from the file /home/user/data. txt but receives the following error message:Given the following analysis:
Which of the following is causing the error message?
A. The administrator is not using a highly privileged account.
B. The filesystem is mounted with the wrong options.
C. SELinux file context is denying the ACL changes.
D. File attributes are preventing file modification.
A Linux engineer is setting the sticky bit on a directory called devops with 755 file permission. Which of the following commands will accomplish this task?
A. chown -s 755 devops
B. chown 1755 devops
C. chmod -s 755 devops
D. chmod 1755 devops
A Linux administrator needs to resolve a service that has failed to start. The administrator runs the following command:The following output is returned
Which of the following is MOST likely the issue?
A. The service does not have permissions to read write the startupfile.
B. The service startupfile size cannot be 81k.
C. The service startupfile cannot be owned by root.
D. The service startupfile should not be owned by the root group.
Employees in the finance department are having trouble accessing the file /opt/work/file. All IT employees can read and write the file. Systems administrator reviews the following output:Which of the following commands would permanently fix the access issue while limiting access to IT and finance department employees?
A. chattr +i file
B. chown it:finance file
C. chmod 666 file
D. setfacl -m g:finance:rw file
After installing some RPM packages, a systems administrator discovers the last package that was installed was not needed. Which of the following commands can be used to remove the package?
A. dnf remove packagename
B. apt-get remove packagename
C. rpm -i packagename
D. apt remove packagename
A systems administrator frequently connects to a remote host via SSH and a non-standard port. The systems administrator would like to avoid passing the port parameter on the command line every time. Which of the following files can be used to set a different port value for that host?
A. /etc/ssh/sshd_config
B. /etc/ssh/moduli
C. ~/.ssh/config
D. ~/.ssh/authorized_keys
A systems administrator installed a new software program on a Linux server. When the systems administrator tries to run the program, the following message appears on the screen.Which of the following commands will allow the systems administrator to check whether the system supports virtualization?
A. dmidecode -s system-version
B. lscpu
C. sysctl -a
D. cat /sys/device/system/cpu/possible
At what point is the Internal Certificate Authority (ICA) created?
A. During the primary Security Management Server installation process.
B. Upon creation of a certificate.
C. When an administrator decides to create one.
D. When an administrator initially logs into SmartConsole.
A systems administrator wants to upgrade /bin/someapp to a new version, but the administrator does not know the package name. Which of the following will show the RPM package name that provides that binary file?
A. rpm -qf /bin/someapp
B. rpm -Vv /bin/someapp
C. rpm -p /bin/someapp
D. rpm -i /bin/someapp
A Linux administrator is troubleshooting the root cause of a high CPU load and average.Which of the following commands will permanently resolve the issue?
A. renice -n -20 6295
B. pstree -p 6295
C. iostat -cy 1 5
D. kill -9 6295
A developer reported an incident involving the application configuration file /etc/httpd/conf/httpd.conf that is missing from the server. Which of the following identifies the RPM package that installed the configuration file?
A. rpm -qf /etc/httpd/conf/httpd.conf
B. rpm -ql /etc/httpd/conf/httpd.conf
C. rpm –query /etc/httpd/conf/httpd.conf
D. rpm -q /etc/httpd/conf/httpd.conf
A systems administrator created a web server for the company and is required to add a tag for the API so end users can connect. Which of the following would the administrator do to complete this requirement?
A. hostnamectl status –no-ask-password
B. hostnamectl set-hostname “$(perl -le “print” “A” x 86)”
C. hostnamectl set-hostname Comptia-WebNode -H root@192.168.2.14
D. hostnamectl set-hostname Comptia-WebNode –transient
A systems administrator wants to back up the directory /data and all its contents to /backup/data on a remote server named remote. Which of the following commands will achieve the desired effect?
A. scp -p /data remote:/backup/data
B. ssh -i /remote:/backup/ /data
C. rsync -a /data remote:/backup/
D. cp -r /data /remote/backup/
The applications team is reporting issues when trying to access the web service hosted in a Linux system. The Linux systems administrator is reviewing the following outputs: Output 1:Output 2:
Which of the following statements best describe the root cause? (Choose two.)
A. The httpd service is currently started.
B. The httpd service is enabled to auto start at boot time, but it failed to start.
C. The httpd service was manually stopped.
D. The httpd service is not enabled to auto start at boot time.
E. The httpd service runs without problems.
F. The httpd service did not start during the last server reboot.
A Linux administrator deployed a large-scale application service as a containerized pod. The Linux administrator needs to continually send the application's log file to the company's central log store. Which of the following should the Linux administrator do to efficiently perform this task?
A. Configure a sidecar to perform log shipping.
B. Run docker exec to access the logs within the container.
C. Execute docker inspect and run a log rsync replication.
D. Set up a custom task scheduler via kubectl.
When trying to log in remotely to a server, a user receives the following message:The server administrator is investigating the issue on the server and receives the following outputs:
Which of the following is causing the issue?
A. The wrong permissions are on the user’s home directory.
B. The account was locked out due to three failed logins.
C. The user entered the wrong password.
D. The user has the wrong shell assigned to the account.
A systems administrator is trying to track down a rogue process that has a TCP listener on a network interface for remote command-and-control instructions. Which of the following commands should the systems administrator use to generate a list of rogue process names? (Choose two.)
A. netstat -antp | grep LISTEN
B. lsof -iTCP | grep LISTEN
C. lsof -i:22 | grep TCP
D. netstat -a | grep TCP
E. nmap -p1-65535 | grep -i tcp
F. nmap -sS 0.0.0.0/0
Users have been unable to reach www.comptia.org from a Linux server. A systems administrator is troubleshooting the issue and does the following:Based on the information above, which of the following is causing the issue?
A. The name www.comptia.org does not point to a valid IP address.
B. The server 192.168.168.53 is unreachable.
C. No default route is set on the server.
D. The network interface eth0 is disconnected.
A systems administrator is tasked with creating a cloud-based server with a public IP address. The code is as follows:Which of the following technologies did the systems administrator use to complete this task?
A. Puppet
B. Git
C. Ansible
D. Terraform
While inspecting a recently compromised Linux system, the administrator identified a number of processes that should not have been running:Which of the following commands should the administrator use to terminate all of the identified processes?
A. pkill -9 -f “upload*.sh”
B. kill -9 “upload*.sh”
C. killall -9 “upload*.sh”
D. skill -9 “upload*.sh”
Which of the following data structures is written in JSON?
A.
B.
C.
D.
Ann, a security administrator, is performing home directory audits on a Linux server. Ann issues the su Joe command and then issues the ls command. The output displays files that reside in Ann's home directory instead of Joe's. Which of the following represents the command Ann should have issued in order to list Joe's files?
A. su – Joe
B. sudo Joe
C. visudo Joe
D. pkexec Joe
A junior systems administrator recently installed an HBA card in one of the servers that is deployed for a production environment. Which of the following commands can the administrator use to confirm on which server the card was installed?
A. lspci | egrep ‘hba|fibr’
B. lspci | zgrep ‘hba|fibr’
C. lspci | pgrep ‘hba|fibr’
D. lspci | ‘hba|fibr’
Users are reporting that writes on a system configured with SSD drives have been taking longer than expected, but reads do not seem to be affected. A Linux systems administrator is investigating this issue and working on a solution. Which of the following should the administrator do to help solve the issue?
A. Run the corresponding command to trim the SSD drives.
B. Use fsck on the filesystem hosted on the SSD drives.
C. Migrate to high-density SSD drives for increased performance.
D. Reduce the amount of files on the SSD drives.
A Linux administrator has logged in to a server for the first time and needs to know which services are allowed through the firewall. Which of the following options will return the results for which the administrator is looking?
A. firewall-cmd –get-services
B. firewall-cmd –check-config
C. firewall-cmd –list-services
D. systemctl status firewalld
A user is unable to remotely log on to a server using the server name server1 and port 22. The Linux engineer troubleshoots the issue and gathers the following information:Which of the following is most likely causing the issue?
A. server1 is not in the DNS.
B. sshd is running on a non-standard port.
C. sshd is not an active service.
D. server1 is using an incorrect IP address.
A Linux administrator is providing a new Nginx image from the registry to local cache. Which of the following commands would allow this to happen?
A. docker pull nginx
B. docker attach nginx
C. docker commit nginx
D. docker import nginx
A Linux administrator needs to obtain a list of all volumes that are part of a volume group. Which of the following commands should the administrator use to accomplish this task?
A. vgs
B. lvs
C. fdisk -1
D. pvs
A junior administrator is trying to set up a passwordless SSH connection to one of the servers. The administrator follows the instructions and puts the key in the authorized_key file at the server, but the administrator is still asked to provide a password during the connection. Given the following output:Which of the following commands would resolve the issue and allow an SSH connection to be established without a password?
A. restorecon -rv .ssh/authorized_key
B. mv .ssh/authorized_key .ssh/authorized_keys
C. systemctl restart sshd.service
D. chmod 600 mv .ssh/authorized_key
A systems administrator needs to clone the partition /dev/sdc1 to /dev/sdd1. Which of the following commands will accomplish this task?
A. tar -cvzf /dev/sdd1 /dev/sdc1
B. rsync /dev/sdc1 /dev/sdd1
C. dd if=/dev/sdc1 of=/dev/sdd1
D. scp /dev/sdc1 /dev/sdd1
A developer wants to ensure that all files and folders created inside a shared folder named /Group00DEV inherit the group name of the parent folder. Which of the following commands will help achieve this goal?
A. chmod g+x /Group00DEV/
B. chmod g+w /Group00DEV/
C. chmod g+r /Group00DEV/
D. chmod g+s /Group00DEV/
A Linux system is failing to start due to issues with several critical system processes. Which of the following options can be used to boot the system into the single user mode? (Choose two.)
A. Execute the following command from the GRUB rescue shell: mount -o remount, ro/sysroot.
B. Interrupt the boot process in the GRUB menu and add systemd.unit=single in the kernel line.
C. Interrupt the boot process in the GRUB menu and add systemd.unit=rescue.target in the kernel line.
D. Interrupt the boot process in the GRUB menu and add single=user in the kernel line.
E. Interrupt the boot process in the GRUB menu and add init=/bin/bash in the kernel line.
F. Interrupt the boot process in the GRUB menu and add systemd.unit=single.target in the kernel line.
A DevOps engineer needs to allow incoming traffic to ports in the range of 4000 to 5000 on a Linux server. Which of the following commands will enforce this rule?
A. iptables -f filter -I INPUT -p tcp –dport 4000:5000 -A ACCEPT
B. iptables -t filter -A INPUT -p tcp –dport 4000:5000 -j ACCEPT
C. iptables filter -A INPUT -p tcp –dport 4000:5000 -D ACCEPT
D. iptables filter -S INPUT -p tcp –dport 4000:5000 -A ACCEPT
A Linux administrator has physically added a new RAID adapter to a system. Which of the following commands should the Linux administrator run to confirm that the device has been recognized? (Choose two.)
A. rmmod
B. ls -ll /etc
C. lshw -class disk
D. pvdisplay
E. rmdir /dev
F. dmesg
An administrator started a long-running process in the foreground that needs to continue without interruption. Which of the following keystrokes should the administrator use to continue running the process in the background?
A. bg
B. bg
C. jobs -1
D. bg &
Which of the following files holds the system configuration for journal when running systemd?
A. /etc/systemd/journald.conf
B. /etc/systemd/systemd-journalctl.conf
C. /usr/lib/systemd/journalctl.conf
D. /etc/systemd/systemd-journald.conf
A cloud engineer is installing packages during VM provisioning. Which of the following should the engineer use to accomplish this task?
A. Cloud-init
B. Bash
C. Docker
D. Sidecar
Access Full XK0-005 Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of XK0-005 exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your XK0-005 certification journey!