Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following XK0-004 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is XK0-005

XK0-004 CompTIA Linux+ Certification Exam Questions and Answers

Questions 4

A Linux administrator needs to configure a user account to notify the user ten days before the password will expire. Which of the following commands would BEST accomplish this task?

Options:

A.

chage

B.

vipw

C.

password

D.

usermod

Buy Now
Questions 5

A company wants to ensure that all newly created files can be modified only by their owners and that all new directory content can be changed only by the creator of the directory. Which of the following commands will help achieve this task?

Options:

A.

umask 0022

B.

umask 0012

C.

chmod –R 0644 /

D.

chmod –R 0755 /

Buy Now
Questions 6

Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?

Options:

A.

UEFI

B.

PXE

C.

NFS

D.

GRUB

Buy Now
Questions 7

A junior Linux administrator is installing patches using YUM. The administrator issues the following command:

yum list installed

The output of the command is as follows:

Given this scenario and the output, which of the following should the administrator do to address this issue?

Options:

A.

renice –n 9 –p 5180

B.

killall yum

C.

ps –ef | grep yum

D.

top | grep yum

Buy Now
Questions 8

A Linux administrator is getting an error message indicating a device does not have any space left on it. However, the administrator runs the following commands and receives the output below:

Which of the following is the MOST likely cause of the issue?

Options:

A.

The resized command needs to be run on the filessystem.

B.

Files need to be removed in order to free up file handles.

C.

The skfs,ext3 command needs to be run to change the inode size.

D.

The block size needs to be adjusted to >4KIB blocks

Buy Now
Questions 9

Which of the following is commonly implemented in external devices to provide unique event-based two-factor authentication credentials when a system is already implementing username and password authentication?

Options:

A.

TACACS+

B.

HOTP

C.

Biometrics

D.

LDAP

E.

PIN

Buy Now
Questions 10

Ann, a Linux administrator, wants to edit a configuration management file. When she opens the file to edit, her text editor reports that the file has been opened in read-only mode. She then tries to edit the file as root by elevating via sudo and is still unable to save any changes. The error message in her text editor says that the read-only option is set on the file. Ann checks the permissions on the file and sees the following:

-rw-rw-r-- 1 root wheel 30 Jun 13 15:38 infrastructure.yml

Which of the following commands is the BEST option to allow her to successfully modify the file?

Options:

A.

chmod 600 infrastructure.yml

B.

chown root: infrastructure.yml

C.

chattr -i infrastructure.yml

D.

chmod o+w infrastructure.yml

Buy Now
Questions 11

A Linux system is running normally when the systems administrator receives an alert that one application spawned many processes. The application is consuming a lot of memory, and it will soon cause the machine to become unresponsive. Which of the following commands will stop each application process?

Options:

A.

kill ‘pidof application’

B.

killall application

C.

kill -9 ‘ps –aux | grep application’

D.

pkill -9 application

Buy Now
Questions 12

An administrator receives a warning about a file system filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the file system.

Which of the following commands would BEST assists the administrator in identifying the problem?

Options:

A.

lsof | grep largelogfile

B.

pkill /tmp/largelogfile

C.

pgrep largelogfile

D.

ps –ef | grep largelogfile

Buy Now
Questions 13

A user does not want Bluetooth to start up every tme the system starts. Which of the following commands should the user execute to accomplish this task?

Options:

A.

Systemctl disabled Bluetooth.service

B.

Systemctl disable Bluetooth. Service

C.

System stop Bluetooth.service

D.

System stopped Bluetooth.service

Buy Now
Questions 14

A systems administrator needs to retrieve specific fields from a csv file. Which of the following tools would accomplish this task?

Options:

A.

awk

B.

sort

C.

print

D.

echo

Buy Now
Questions 15

A systems administrator is unable to reach other devices on the network and the Internet. The server is configured with the IP address 192.169.1.50/24 on eth0. The server’s router is 192.168.1.1. The administrator reviews the output of route –n:

Which of the following commands should the administrator run to correct the issue?

Options:

A.

route del default gw 192.168.2.1 eth0; route add default gw 192.168.1.1 eth0

B.

route add –net 192.168.10.0 netmask 255.255.255.0 gw 192.168.2.1 eth0

C.

route add 192.168.1.1 default 192.168.1.50 eth0

D.

route host gw 192.168.1.1 eth0

Buy Now
Questions 16

A Linux administration is using a Linux system as a router. During the tests, the administrator discovers that IP packets are not being sent between the configured interfaces.

Which of the following commands enables this feature for IPv4 networks?

Options:

A.

cat /proc/sys/net/ipv4/ip_route > 1

B.

echo “1” > /proc/sys/net/ipv4/ip_forward

C.

echo “1” > /proc/sys/net/ipv4/ip_route

D.

echo “1” > /proc/sys/net/ipv4/ip_net

Buy Now
Questions 17

A systems administrator is attempting to access a server by SSH. The Linux administrator ensures that the SSH keys on the remote server were unable to connect. The following error message is being displayed:

Which of the following needs to be changed on order for the administrator to access the server via SSH?

Options:

A.

Password

B.

SSL

C.

SELinux

D.

OpenSSH

Buy Now
Questions 18

A security team informs the Linux administrator that a specific sever is acting as a n pen relay. To which of the following is the security team referring?

Options:

A.

The server it running the SSH service and is open to the internet allowing outside sources to log in to the server without source IP address filtering.

B.

The server is acting as an unmanaged router, open to the internal and is allowing outside internet traffic into the network with on filtering.

C.

The server is acting as a web proxy and allowing outside unauthenticated sources to connect to the server, effectively hiding tie source's IP address for malicious activities.

D.

The server has an email service configured to allow outside sources to send email to other external parties on the internet without validation.

Buy Now
Questions 19

An administrator needs to set the time of a VM that has no network connectivity to an NTP server. The VM’s host, however, is synchronized with NTP.

Which of the following allows the administrator to synchronize the time of the VM with the host?

Options:

A.

time

B.

date

C.

hwclock

D.

ntpdate

Buy Now
Questions 20

Which of the following configuration files should be modified to disable Ctrl-Alt-Del in Linux?

Options:

A.

/etc/inittab

B.

~/.bash_profile

C.

/etc/securetty

D.

/etc/security/limits.conf

Buy Now
Questions 21

An administrator notices that a long-running script, /home/user/script.sh, is taking up a large number of system resources. The administrator does not know the script’s function. Which of the following commands should the administrator use to minimize the script’s impact on system resources?

Options:

A.

renice

B.

kill

C.

bg

D.

nohup

Buy Now
Questions 22

A Linux server hosts Kerberos and LDAP, which of the following is the MOST likely role of this server?

Options:

A.

Certificate authority

B.

Clustering

C.

Database

D.

Authentication

Buy Now
Questions 23

Which of the following server roles is MOST appropriate to route files to multifunction devices?

Options:

A.

Proxy

B.

Router

C.

Print server

D.

Web server

Buy Now
Questions 24

A systems administrator is investigating low performance a server. After executing some diagnostic commands, the administrator analyzes the data:

Which of the following is the cause of low performance on the server?

Options:

A.

Lack of swap space

B.

Lack of available memory

C.

User processes have taken up all the available CPU time

D.

High disk activity

Buy Now
Questions 25

An administrator is utilizing an automation engine that engine that uses SSH to run command on remote systems. Which of the following does this describe?

Options:

A.

Inventory

B.

Agentless architecture

C.

Build automation

D.

Version control

Buy Now
Questions 26

A Linux administrator has configured a local named caching server to reduce the amount of time to resolve common DNS addresses. The server resolves using the external server, however; the administrator wants to avoid this configuration. The administrator verifies the named, conf settings to confirm the following relevant settings:

The administrator then runs dig twice to look up an external address and receives the following relevant output the second time.

Which of the following should the administrator do to correct the configuration?

Options:

A.

Modify /etc/resolve.config and set nameserver to 127.0.0.1

B.

Add 1270.0.1 to the forwards in the named confi file.

C.

Alias the dig commands to use nslookup instead.

D.

Configure the name service in system to be masked

Buy Now
Questions 27

A Linux systems administrator needs to set permissions on an application with the following parameters:

The owner of the application should be able to read, write, and execute the application.

Members of the group should be able to read and execute the application.

Everyone else should not have access to the application.

Which of the following commands would BEST accomplish these tasks?

Options:

A.

chmod 710

B.

chmod 730

C.

chmod 750

D.

chmod 760

Buy Now
Questions 28

Joe is no longer employed by a company and Ann is tatang over his protects several team members work out of the project directory inducing Ann. The administrator needs to assign ownership of all of Joe's files in the /project directory to Ann. Which of the following should the administrator run to accomplish this task?

Options:

A.

Restorecon –f joe ann –r /projects

B.

Chown –R joe,ann /projects

C.

Find /project –user joe –exec chown ann { } /;

D.

Locate / projects | grep joe | chown –R jeo –f-

Buy Now
Questions 29

A four-drive Linux NAS has been improperly configured. Each drive has a capacity of 6TB, for a total storage capacity of 24TB. To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID configuration?

Options:

A.

RAID 01

B.

RAID 03

C.

RAID 10

D.

RAID 50

Buy Now
Questions 30

An administrator is logged on as an unprivileged user and needs to compile and installed an application from source. Which of the following BEST represents how to complete this task?

Options:

A.

cd ; sudo ./configure $$ make $$ make install

B.

cd ; ./configure $$ sudo make $$ make install

C.

cd ; ./configure $$ make $$ make install

D.

cd ; ./configure $$ make $$ make install

Buy Now
Questions 31

Which of the following is the purpose of the vmlinux file on a Linux system?

Options:

A.

To prevent a Linux kernel panic

B.

To start a Linux virtual machine

C.

To provide the executable kernel for the system

D.

To enable resource access to the network

Buy Now
Questions 32

A new packages repository named repo10 has been installed on mirror site. A Linux administrator wants to use this new repository for local package installations. In which of the following locations should the administrator store the configuration information for the repo10 repository?

Options:

A.

/etc/yum.reps.d/repo10.Repo

B.

/etc/yum_repo.d/repo10

C.

/etc/yum.reps.d/repo10

D.

/etc/yum.conf

Buy Now
Questions 33

When logging in, an administrator must use a temporary six-digit code that is displayed on a key fob.

Which of the following has been implemented?

Options:

A.

Biometrics

B.

HOTP

C.

PKI

D.

Software token

Buy Now
Questions 34

A systems administrator a retting an HTTPO server on a Lnux server and configuring as a proxy server The administrator runs the following commands to venfy that the service is running:

However, the arjminrstraior is getting a 503 error when browsing to portal.company. internal. After reviewing the logs, the following error information is discovered:

Which of the following commands BEST resolves the issue?

Options:

A.

sentforce 0

B.

susearch -m USER_LOGIN -sv no

C.

grep http /var/log/audit/audit,log| audit2why

D.

setsebool -p httpd_can_network_connect 1

Buy Now
Questions 35

Joe, a user, creates a short shell script, shortscript.sh, and saves it in his home directory with default

permissions and paths. He then attempts to run the script by typing ./shortscript.sh, but the command

fails to execute.

Which of the following commands would have allowed the script to run?

Options:

A.

chmod u+x shortscript.sh

B.

source ./shortscript.sh

C.

chmod 155 ~/shortscript.sh

D.

chgrp shortscript.sh Joe

Buy Now
Questions 36

A junior systems administrator needs to make a packet capture file that will only capture HTTP protocol data to a file called test.pcap.

Which of the following commands would allow the administrator to accomplish this task?

Options:

A.

netcat -p 80 -w test.pcap

B.

tshark -r test.pcap -o http

C.

tcpdump -i eth0 port 80 -r test.pcap

D.

tcpdump -i eth0 port 80 -w test.pcap

Buy Now
Questions 37

A user wants to alias dir so it always returns the contents of the ls -la command. However, the user has to

reset the alias with every login.

Which of the following is the BEST action the user can take to ensure the command is always available?

Options:

A.

echo "alias dir=ls -la" > /etc/profile

B.

echo "alias dir=ls -la" >> /etc/skel

C.

echo "alias dir=ls -la" >> ~/.profile

D.

echo "alias dir=ls -la" > ~/.bashrc

Buy Now
Questions 38

A user requested a USB serial device to be added to a desktop computer. The device has built-in kernel driver

support. The administrator tested the device installation and access, but the user cannot access the serial port.

Each time the user attempts to access the device, an error log is created that shows the user does not have

permission to use the serial port. Which of the following will add a user to the group that has serial port

capabilities?

Options:

A.

usermod –a –G serialport $USER

B.

usermod –a –G modem $USER

C.

usermod –a –G dialout $USER

D.

usermod –a –G root $USER

Buy Now
Questions 39

On a UEFI-based system, which of the following invokes GRUB2 from the EFI command prompt?

Options:

A.

boot//EFI/grub2.efi

B.

EFI/grub2.efi

C.

/boot/EFI/grub2.efi

D.

/grub2.efi

Buy Now
Questions 40

An administrator needs to kill the oldest Bash shell running in the system. Which of the following commands

should be issued to accomplish this task?

Options:

A.

ps axjf | grep bash to obtain PID

kill -9 PID

B.

ps –eo pid,etime,cmd | grep bash (to obtain PID)

kill -9 PID

C.

ps –eo pid,etime| grep bash (to obtain PID)

killall -9 PID

D.

killall -15 -o bash

Buy Now
Questions 41

A Linux administrator needs to disable the Sendmail service on a Linux server and prevent it from being started manually and during boot.

Which of the following is the BEST command to do this?

Options:

A.

systemctl reset-failed sendmail

B.

systemctl mask sendmail

C.

systemctl stop sendmail

D.

systemctl disable sendmail

Buy Now
Questions 42

A security team informs the Linux administrator that a specific server is acting as an open relay.

To which of the following is the security team referring?

Options:

A.

The server is running the SSH service and is open to the Internet, allowing outside sources to log into the server without source IP address filtering.

B.

The server is acting as an unmanaged router, open to the Internet, and is allowing outside Internet traffic into the network with no filtering.

C.

The server is acting as a web proxy and allowing outside unauthenticated sources to connect to the server, effectively hiding the source’s IP address for malicious activities.

D.

The server has an email service configured to allow outside sources to send email to other external parties on the Internet without validation.

Buy Now
Questions 43

A Linux user wants to give read-only permissions to a directory and its contents. Which of the following

commands will allow the user to accomplish this task?

Options:

A.

chmod –R 400 /new_directory/

B.

chmod –R 600 /new_directory/

C.

chmod 400 /new_directory/

D.

chmod 600 /new_directory/

Buy Now
Questions 44

A systems administrator is receiving errors while trying to install a popular virtualization software. The software

specifications state the processor needs to support virtualization with Intel instructions. Additional requirements

state the processor must accelerate encryption/decryption and use hyperthreading. Given the following output

about the processor:

fpu ume depse tsu msr pae mce cx8 apic sep mtrr pae mca cmov pat pse36 cflusm mmx

fxsr sse sse2 ht syscall nx rdtscp lm constant_tsc rep_good nopl xtopology

nonstop_tsc pni pclmulqdq ssse3 cx16 pcid sse4_1 sse4_2 x2apic popcnt aes xsave

avx rdrand hypervisor lahf_lm fsgsbase

Which of the following is the MOST likely reason for the errors?

Options:

A.

The processor supports AMD instructions rather than Intel.

B.

The processor cannot accelerate decryption.

C.

The processor does not support hyperthreading.

D.

The processor is running inside a virtual machine.

Buy Now
Questions 45

A new IO card has been added to the security server to log the opening and closing of the main entrance. A

switch is attached, so the interface card returns a 1 when the door is opened and a 0 when the door is closed.

Which of the following describes the Linux device to which this switch is attached?

Options:

A.

/dev/tty0

B.

/dev/port

C.

/dev/gpio

D.

/dev/sg0

Buy Now
Questions 46

A Linux administrator is testing a configuration script and wants to change the hostname of a workstation temporarily, but it must return to its assigned workstation name after reboot. Which of the following is the BEST command for the administrator to use?

Options:

A.

Hostnamet1 set-hostname –transient tempname

B.

Hostnamect1 –H localhost tempname

C.

Hostnamect1 set-hostname tempname

D.

Hostnamect1 set-hostname –static tempname

Buy Now
Questions 47

Which of the following Linux server roles should be installed to monitor and log local web traffic?

Options:

A.

Proxy server

B.

AAA server

C.

SSH server

D.

HTTP server

E.

Name server

Buy Now
Questions 48

A systems administrator wants to disable the isofs module on the server.

Which of the following will allow the administrator to check if the isofs module is currently in use?

Options:

A.

modprobe

B.

insmod

C.

rmmod

D.

lsmod

Buy Now
Questions 49

A technician wants to secure a sensitive workstation by ensuring network traffic is kept within the local subnet. To accomplish this task, the technician executes the following command:

echo 0 > /proc/sys/net/ipv4/ip_default_ttl

Which of the following commands can the technician use to confirm the expected results? (Choose two.)

Options:

A.

tcpdump

B.

traceroute

C.

route

D.

iperf

E.

ip

F.

arp

Buy Now
Questions 50

In which of the following Linux GUI environments would the Konsole application MOST likely be found?

Options:

A.

Gnome

B.

KDE

C.

Cinnamon

D.

Unity

E.

MATE

Buy Now
Questions 51

A Linux administrator is developing a Bash script to close specific ports on a server firewall. The administrator is not certain of the default port for the Internet Message Access Protocol.

Which of the following files should the administrator check to determine the default port?

Options:

A.

/etc/network

B.

/etc/default/ufw

C.

/etc/resolv.conf

D.

/etc/services

Buy Now
Questions 52

A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?

Options:

A.

OWASP

B.

VDI

C.

VMDK

D.

OVA

Buy Now
Questions 53

After cloning a remote repository, a new feature of that project needs to be developed and integrated into the next major release.

Which of the following is the first Git operation to run to begin working on this new feature immediately after the clone?

Options:

A.

merge

B.

init

C.

diff

D.

branch

Buy Now
Questions 54

A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?

Options:

A.

/etc/services

B.

/etc/issue

C.

/etc/hosts

D.

/etc/motd

Buy Now
Questions 55

Which of the following commands allow an administrator to determine if the current system is a virtual machine?

Options:

A.

lspci

B.

mdadm

C.

vmstat

D.

vgdisplay

Buy Now
Questions 56

An administrator needs to examine two text files and select identical lines from the files. Which of the following commands wooW BEST accomplish this task?

Options:

A.

cat report1 report2 | awk ' {print $2}' | wc -1

B.

cat report1 report2 | sort | uniq -d

C.

cat report1 report2 | grep -v < report1

D.

cat report1 report2 | sort -u | diff

Buy Now
Questions 57

An administrator needs to copy files from a Samba share where the server name is accounting. local, the share is reports, and the username is admin. Assuming local directories exist, which of the following commands would connect to the share?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 58

A systems administrator needs to prevent the root account from being used to log in to a Linux server via SSH. Which of the following configuration ies does the systems administrator need to edit to perform this task?

Options:

A.

/etc/passwd

B.

/etc/sshd/config

C.

-/.ssh/config

D.

/etc/ayaconfig/sshd

Buy Now
Questions 59

A systems administrator would like to back up all of the'. conf' files on a server The administrator runs the command:

Find / --name ‘’*conf’’ > backup,tar

After investigating the backup, tar file the administrator realizes that the contents of the configuration files were not backed up property. Which of the following would BEST accomplish this task?

Options:

A.

find / -name ''*conf'' | xargs -- verbose tar xvf backup,tar

B.

find/ -name ''*conf'' exec echo { } \; > backup.tar

C.

find / -name ''*conf'' | cpio -o --format=tar > backup.tar

D.

tar -jtf -<<$(find /-name ''*conf'')

Buy Now
Questions 60

A Linux administrator needs to schedule a backup job to run every Friday at 2 15 a.m. Which of the following lines should the administrator add to the crontab file?

Options:

A.

15 2 * * 5 /bin/backup_job.sh

B.

2 15 * * 5 /bin/backup_job.sh

C.

2 * * 15 5 /bin/backup_job.sh

D.

2 * 5 15 * /bin/backup_job.sh

Buy Now
Questions 61

A Linux administrator executed 1vextend to expand disk space to a partition from 8GB to 40GB However, the filesystem is not showing the additional space The administrator runs several commands and rectyes the following output:

Which of the following commands should the administrator run to resolve the issue?

Options:

A.

mXfs.extt /dev/mapper/VolQroup00-LogVo100

B.

mkfa_growffa /dev/mapper/Vci;r=.:p00-LogVo100

C.

reaize2ffa /dev/mapper/VolGroup00-LogVo100

D.

parted -a opt /dev/mapper/VolGroup00-LogVo100

Buy Now
Questions 62

A developer has contacted a systems administrator because an application is not receiving a response from the client. The application must purge the message queue before terminating. Which of the following should the systems administrator perform in order to BEST address the issue?

Options:

A.

Send the SIGHUP signal with the kill command.

B.

Send the signal with the command.

C.

Send the SIGSTOP signal with the kill command.

D.

Send the SIGTERN signal with the kill command.

Buy Now
Questions 63

A systems administrator is creating a new volume opt _ app in a volume group app_vg. The new volume should utilize all the available disk space from the newly added disk device /dev/ sdb. Which of the following will achieve

the task, assuming the app_vg volume group does not exist yet and the disk device was added but not configured?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 64

Which of the following will MOST likely fix the issue?

Options:

A.

Add more CPUs to the server

B.

Replace the network cable

C.

Add a second web server and a load balancer

D.

Add more RAM to the server

E.

Exclude the web root directory from antivirus scanning

Buy Now
Questions 65

Whenever an administrator merges the feature branch into master, a binary is created and saved in the artifact repository. Which of the following does this desenbe?

Options:

A.

Build automation

B.

Infrastructure as code

C.

Agentiess architecture

D.

Inventory

Buy Now
Questions 66

An end user is trying to execute a file within a different directory The end user executes the following command:

Which of the following commands should the Linux administrator use to run the shell scnpt within that folder?

Options:

A.

chmod 0644

B.

chmod g-x myabc.sh

C.

chmod 0755

D.

chmod u-x myabc,sh

Buy Now
Questions 67

A developer wrote a custom version of the /bin/password command and placed it in /usr/local/bin/password. The new command needs to write to the /etc/paaawd file even when executed by a regular user. Which of the following commands should the administrator run to set the proper file permissions on this file?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 68

A user is unable to execute the command sudo su -on a newly provisioned system. Which of the following should the Linux administrator do to allow the user to execute that command?

Options:

A.

Change the user's UID to 100

B.

Add the user to the wheel group

C.

Run restorecon to update SELinux contexts

D.

Set the execute bit on the sudc command

Buy Now
Questions 69

Which of the following is a file that can define how to build, deploy, and install various components for a Linux application hosted in a cloud environment?

Options:

A.

OVF

B.

YAML

C.

Virsh

D.

VMM

Buy Now
Questions 70

Which of the following techniques would BEST ensure the setup and desired state of a server are consistently maintained?

Options:

A.

Configuration management

B.

Network automation

C.

Test automation

D.

Change control management

Buy Now
Questions 71

A security audit concludes that an organization's database servers need to be hardened As a result, an administrator obtans tie fofcjwwng partial Nmap output from a database server.

Which of the following commands should the administrator execute to mitigate security risks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

An administrator is troubleshooting an issue where end users are waiting a very long times for processes to respond. The top command reveals that multiple processes seem to be m a non-responsive state or have become zombies. Which of the administrator use to clean up the system?

Options:

A.

Pkill –o 15m

B.

Killall –n

C.

Pkill –x

D.

Killall –o 15m

Buy Now
Exam Code: XK0-004
Exam Name: CompTIA Linux+ Certification Exam
Last Update: Apr 14, 2023
Questions: 483