XK0-005 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
Are you preparing for the XK0-005 certification exam? Kickstart your success with our XK0-005 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.
Practicing with XK0-005 practice questions free gives you a powerful edge by allowing you to:
- Understand the exam structure and question formats
- Discover your strong and weak areas
- Build the confidence you need for test day success
Below, you will find 50 free XK0-005 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.
In which of the following filesystems are system logs commonly stored?
A. /var
B. /tmp
C. /etc
D. /opt
A Linux systems administrator needs to copy files and directories from Server A to Server B. Which of the following commands can be used for this purpose? (Choose two.)
A. rsyslog
B. cp
C. rsync
D. reposync
E. scp
F. ssh
A Linux administrator cloned an existing Linux server and built a new server from that clone. The administrator encountered the following error after booting the cloned server:The administrator performed the commands listed below to further troubleshoot and mount the missing filesystem:
Which of the following should administrator use to resolve the device mismatch issue and mount the disk?
A. mount disk by device-id
B. fsck -A
C. mount disk by-label
D. mount disk by-blkid
A user generated a pair of private-public keys on a workstation. Which of the following commands will allow the user to upload the public key to a remote server and enable passwordless login?
A. scp ~/.ssh/id_rsa user@server:~/
B. rsync ~ /.ssh/ user@server:~/
C. ssh-add user server
D. ssh-copy-id user@server
A Linux administrator needs to connect securely to a remote server in order to install application software. Which of the following commands would allow this connection?
A. scp “ABC-key.pem” root@10.0.0.1
B. sftp root@10.0.0.1
C. telnet 10.0.0.1 80
D. ssh -i “ABC-key.pem” root@10.0.0.1
E. sftp “ABC—key.pem” root@10.0.0.1
A Linux administrator is troubleshooting SSH connection issues from one of the workstations. When users attempt to log in from the workstation to a server with the IP address 104.21.75.76, they receive the following message:The administrator reviews the information below:
![]()
Which of the following is causing the connectivity issue?
A. The workstation has the wrong IP settings.
B. The sshd service is disabled.
C. The server’s firewall is preventing connections from being made.
D. The server has an incorrect default gateway configuration.
An administrator needs to get network information from a group of statically assigned workstations before they are reconnected to the network. Which of the following should the administrator use to obtain this information?
A. ip show
B. ifcfg -a
C. ifcfg -s
D. ifname -s
A user is asking the systems administrator for assistance with writing a script to verify whether a file exists. Given the following:Which of the following commands should replace the string?
A. if [ -f “$filename” ]; then
B. if [ -d “$filename” ]; then
C. if [ -f “$filename” ] then
D. if [ -f “$filename” ]; while
A Linux administrator booted up the server and was presented with a non-GUI terminal. The administrator ran the command systemctl isolate graphical.target and rebooted the system by running systemctl reboot, which fixed the issue. However, the next day the administrator was presented again with a non-GUI terminal. Which of the following is the issue?
A. The administrator did not reboot the server properly.
B. The administrator did not set the default target to basic.target.
C. The administrator did not set the default target to graphical.target.
D. The administrator did not shut down the server properly.
An administrator attempts to rename a file on a server but receives the following error.The administrator then runs a few commands and obtains the following output:
Which of the following commands should the administrator run NEXT to allow the file to be renamed by any user?
A. chgrp reet files
B. chacl -R 644 files
C. chown users files
D. chmod -t files
A Linux administrator is troubleshooting a memory-related issue. Based on the output of the commands:Which of the following commands would address the issue?
A. top -p 8321
B. kill -9 8321
C. renice -10 8321
D. free 8321
Ann, a security administrator, is performing home directory audits on a Linux server. Ann issues the su Joe command and then issues the ls command. The output displays files that reside in Ann's home directory instead of Joe's. Which of the following represents the command Ann should have issued in order to list Joe's files?
A. su – Joe
B. sudo Joe
C. visudo Joe
D. pkexec Joe
A systems administrator has been tasked with disabling the nginx service from the environment to prevent it from being automatically and manually started. Which of the following commands will accomplish this task?
A. systemctl cancel nginx
B. systemctl disable nginx
C. systemctl mask nginx
D. systemctl stop nginx
A cloud engineer is installing packages during VM provisioning. Which of the following should the engineer use to accomplish this task?
A. Cloud-init
B. Bash
C. Docker
D. Sidecar
A systems administrator pressed Ctrl+Z after starting a program using the command line, and the shell prompt was presented. In order to go back to the program, which of the following commands can the administrator use?
A. fg
B. su
C. bg
D. ed
A Linux systems administrator needs to persistently enable IPv4 forwarding in one of the Linux systems. Which of the following commands can be used together to accomplish this task? (Choose two.)
A. sysctl net.ipv4.ip_forward
B. sysctl -w net.ipv4.ip_forward=1
C. echo “net.ipv4.ip_forward=1” >> /etc/sysctl.conf
D. echo 1 > /proc/sys/net/ipv4/ip_forward
E. sysctl –p
F. echo “net.ipv6.conf.all.forwarding=l” >> /etc/sysctl.conf
A Linux administrator is adding a new configuration file to a Git repository. Which of the following describes the correct order of Git commands to accomplish the task successfully?
A. pull -> push -> add -> checkout
B. pull -> add -> commit -> push
C. checkout -> push -> add -> pull
D. pull -> add -> push -> commit
A Linux administrator is scheduling a system job that runs a script to check available disk space every hour. The Linux administrator does not want users to be able to start the job. Given the following:The Linux administrator attempts to start the timer service but receives the following error message:
Which of the following is MOST likely the reason the timer will not start?
A. The checkdiskspace.timer unit should be enabled via systemctl.
B. The timers.target should be reloaded to get the new configuration.
C. The checkdiskspace.timer should be configured to allow manual starts.
D. The checkdiskspace.timer should be started using the sudo command.
After installing some RPM packages, a systems administrator discovers the last package that was installed was not needed. Which of the following commands can be used to remove the package?
A. dnf remove packagename
B. apt-get remove packagename
C. rpm -i packagename
D. apt remove packagename
A new disk was presented to a server as /dev/sdd. The systems administrator needs to check if a partition table is on that disk. Which of the following commands can show this information?
A. lsscsi
B. fdisk
C. blkid
D. partprobe
To harden one of the servers, an administrator needs to remove the possibility of remote administrative login via the SSH service. Which of the following should the administrator do?
A. Add the line DenyUsers root to the /etc/hosts.deny file.
B. Set PermitRootLogin to no in the /etc/ssh/sshd_config file.
C. Add the line account required pam_nologin. so to the /etc/pam.d/sshd file.
D. Set PubKeyAuthentication to no in the /etc/ssh/ssh_config file.
Which of the following technologies can be used as a central repository of Linux users and groups?
A. LDAP
B. MFA
C. SSO
D. PAM
A Linux engineer has been notified about the possible deletion of logs from the file /opt/app/logs. The engineer needs to ensure the log file can only be written into without removing previous entries.Which of the following commands would be BEST to use to accomplish this task?
A. chattr +a /opt/app/logs
B. chattr +d /opt/app/logs
C. chattr +i /opt/app/logs
D. chattr +c /opt/app/logs
Users are experiencing high latency when accessing a web application served by a Linux machine. A systems administrator checks the network interface counters and sees the following:Which of the following is the most probable cause of the observed latency?
A. The network interface is disconnected.
B. A connection problem exists on the network interface.
C. No IP address is assigned to the interface.
D. The gateway is unreachable.
Which of the following commands is used to configure the default permissions for new files?
A. setenforce
B. sudo
C. umask
D. chmod
At what point is the Internal Certificate Authority (ICA) created?
A. During the primary Security Management Server installation process.
B. Upon creation of a certificate.
C. When an administrator decides to create one.
D. When an administrator initially logs into SmartConsole.
Based on an organization’s new cybersecurity policies, an administrator has been instructed to ensure that, by default, all new users and groups that are created fall within the specified values below.To which of the following configuration files will the required changes need to be made?
A. /etc/login.defs
B. /etc/security/limits.conf
C. /etc/default/useradd
D. /etc/profile
A Linux administrator needs to create a symlink for /usr/local/bin/app-a, which was installed in /usr/local/share/app-a. Which of the following commands should the administrator use?
A. ln -s /usr/local/bin/app-a /usr/local/share/app-a
B. mv -f /usr/local/share/app-a /usr/local/bin/app-a
C. cp -f /usr/local/share/app-a /usr/local/bin/app-a
D. rsync -a/usr/local/share/app-a /usr/local/bin/app-a
Which of the following tools is commonly used for creating CI/CD pipelines?
A. Chef
B. Puppet
C. Jenkins
D. Ansible
A Linux administrator needs to remove software from the server. Which of the following RPM options should be used?
A. rpm -s
B. rрm -d
C. rpm -q
D. rpm -e
Which of the following actions are considered good security practices when hardening a Linux server? (Choose two.)
A. Renaming the root account to something else
B. Removing unnecessary packages
C. Changing the default shell to /bin/csh
D. Disabling public key authentication
E. Disabling the SSH root login possibility
F. Changing the permissions on the root filesystem to 600
A systems engineer is adding a new 1GB XFS filesystem that should be temporarily mounted under /ops/app. Which of the following is the correct list of commands to achieve this goal?
A.
B.
C.
D.
A Linux system fails to start and delivers the following error message:Which of the following commands can be used to address this issue?
A. fsck.ext4 /dev/sda1
B. partprobe /dev/sda1
C. fdisk /dev/sda1
D. mkfs.ext4 /dev/sda1
A systems administrator frequently connects to a remote host via SSH and a non-standard port. The systems administrator would like to avoid passing the port parameter on the command line every time. Which of the following files can be used to set a different port value for that host?
A. /etc/ssh/sshd_config
B. /etc/ssh/moduli
C. ~/.ssh/config
D. ~/.ssh/authorized_keys
A Linux administrator was tasked with deleting all files and directories with names that are contained in the sobelete.txt file. Which of the following commands will accomplish this task?
A. xargs -f cat toDelete.txt -rm
B. rm -d -r -f toDelete.txt
C. cat toDelete.txt | rm -frd
D. cat toDelete.txt | xargs rm -rf
Joe, a user, is unable to log in to the Linux system. Given the following output:Which of the following commands would resolve the issue?
A. usermod -s /bin/bash joe
B. pam_tally2 -u joe -r
C. passwd -u joe
D. chage -E 90 joe
DRAG DROP - You have been asked to parse a log file of logins to determine various information about who is logging in and when. INSTRUCTIONS - Open and inspect the Login log file. Drag and drop the correct commands onto the output that was generated from that command. Tokens can be used only once and not all will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
An administrator installed an application from source into /opt/operations1/ and has received numerous reports that users are not able to access the application without having to use the full path /opt/operations1/bin/*. Which of the following commands should be used to resolve this issue?
A. echo ‘export PATH=$PATH:/opt/operations1/bin’ >> /etc/profile
B. echo ‘export PATH=/opt/operations1/bin’ >> /etc/profile
C. echo ‘export PATH=$PATH/opt/operations1/bin’ >> /etc/profile
D. echo ‘export $PATH:/opt/operations1/bin’ >> /etc/profile
Which of the following technologies provides load balancing, encryption, and observability in containerized environments?
A. Virtual private network
B. Sidecar pod
C. Overlay network
D. Service mesh
A systems administrator requires that all files that are created by the user named web have read-only permissions by the owner. Which of the following commands will satisfy this requirement?
A. chown web:web /home/web
B. chmod -R 400 /home/web
C. echo “umask 377” >> /home/web/.bashrc
D. setfacl read /home/web
Due to low disk space, a Linux administrator finding and removing all log files that were modified more than 180 days ago. Which of the following commands will accomplish this task?
A. find /var/log -type d -mtime +180 -print -exec rm {} ;
B. find /var/log -type f -modified +180 -rm
C. find /var/log -type f -mtime +180 -exec rm {}
D. find /var/log -type c -atime +180 –remove
Following the migration from a disaster recovery site, a systems administrator wants a server to require a user to change credentials at initial login. Which of the following commands should be used to ensure the aging attribute?
A. chage -d 2 user
B. chage -d 0 user
C. chage -E 0 user
D. chage -d 1 user
Which of the following commands will display the operating system?
A. uname -n
B. uname -s
C. uname -o
D. uname -m
An engineer needs to insert a character at the end of the current line in the vi text editor. Which of the following will allow the engineer to complete this task?
A. p
B. r
C. bb
D. A
E. i
A systems administrator is checking the system logs. The administrator wants to look at the last 20 lines of a log. Which of the following will execute the command?
A. tail -v 20
B. tail -n 20
C. tail -c 20
D. tail -l 20
A systems administrator wants to back up the directory /data and all its contents to /backup/data on a remote server named remote. Which of the following commands will achieve the desired effect?
A. scp -p /data remote:/backup/data
B. ssh -i /remote:/backup/ /data
C. rsync -a /data remote:/backup/
D. cp -r /data /remote/backup/
An administrator deployed a Linux server that is running a web application on port 6379/tcp. SELinux is in enforcing mode based on organization policies. The port is open on the firewall. Users who are trying to connect to a local instance of the web application receive Error 13, Permission denied. The administrator ran some commands that resulted in the following output:Which of the following commands should be used to resolve the issue?
A. semanage port -d -t http_port_t -p tcp 6379
B. semanage port -a -t http_port_t -p tcp 6379
C. semanage port -a http_port_t -p top 6379
D. semanage port -l -t http_port_tcp 6379
A systems administrator is encountering performance issues. The administrator runs a command with the following output: 09:10:18 up 457 days, 32min, 5 users, load average: 4.22 6.63 5.58 The Linux server has the following system properties: CPU 4 vCPU - Memory: 50GB - Which of the following accurately describes this situation?
A. The system is under CPU pressure and will require additional vCPUs.
B. The system has been running for over a year and requires a reboot.
C. Too many users are currently logged in to the system.
D. The system requires more memory.
A user is unable to remotely log on to a server using the server name server1 and port 22. The Linux engineer troubleshoots the issue and gathers the following information:Which of the following is most likely causing the issue?
A. server1 is not in the DNS.
B. sshd is running on a non-standard port.
C. sshd is not an active service.
D. server1 is using an incorrect IP address.
A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?
A. systemctl stop sshd
B. systemctl mask sshd
C. systemctl reload sshd
D. systemctl start sshd
Free Access Full XK0-005 Practice Questions Free
Want more hands-on practice? Click here to access the full bank of XK0-005 practice questions free and reinforce your understanding of all exam objectives.
We update our question sets regularly, so check back often for new and relevant content.
Good luck with your XK0-005 certification journey!