SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
The lftp command can be used on a client to test FTP server connections.
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
2. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?
Use the resize2fs command to grow a file system.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
3. What port does the rndc utility listen on by default?
The /etc/fstab file.
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
halts the system
By default - the rndc utility listens on port 953.
4. What is the name of the package used to install an FTP?
choose which mode you'd like it to operate in
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
The vsftpd package is used to install an FTP server.
The testparm command allows you to check for syntax errors in the /etc/samba/smb.conf file.
5. Which file shows you all the client IP addresses?
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
entering rescue mode and repairing the problem.
The lastlog and faillog commands are used to view user login-related events?
Apache uses port 80 for HTTP and port 443 for HTTPS.
6. Runlevel 0 ___________. Runlevel 6 reboots the system.
The dig - host - and ping commands can be used to test DNS server functionality.
halts the system
The -t nfs option is used with the mount command to mount NFS resources.
Enforcing during installation
7. What is the main config file for the DHCP service?
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
The user_list file can be used to limit which users have access to the FTP server.
service httpd configtest
The du and df commands are used to view available space on the system.
8. There are four types of DNS servers. Name them.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
The du and df commands are used to view available space on the system.
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
The four types of DNS servers are master - slave - caching-only - and forwarding.
9. To create a RAID or LVM partition using kickstart
The virsh command is used to manage virtual guests.
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
Kickstart supports both basic and advanced partitioning (RAID/LVM).
enabled by default
10. The default SMTP service has been changed from _________ to Postfix in Red Hat Enterprise Linux 6.
getsebool -a | grep http
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
amount of RAM
Sendmail
11. What file needs to be edited so that the system will mount a file system at boot time?
load balancing and redundancy benefits
schedule one-time-only jobs
The /etc/fstab file.
service dhcpd configtest
12. What is the point of using SELinux?
The /etc/fstab file.
SELinux provides enhanced granular security for the Linux operating system.
The ping command can be used to verify connectivity to another host.
SSH is used for secure remote management of Linux systems.
13. What option is used to allow anonymous uploads to the FTP server?
kickstart installations to work
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
The SMTP service runs on TCP port 110.
The anonymous_enable=YES option in the main config file allows anonymous uploads.
14. What command can you use to create a file system?
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
enabled by default
mkfs.ext4
generates errors under Red Hat Enterprise Linux 6
15. The ____________ is available for each share.
Version 2 is the latest and most secure version of SSH.
browseable option
rpmbuild
The user_list file can be used to limit which users have access to the FTP server.
16. What command can you use to check the config file of the DHCP server?
This chapter described tdbsm and smbpasswd back-end authentication.
service dhcpd configtest
For Apache to run a secure site - the mod_ssl package is required to be installed.
createrepo
17. Samba servers can...
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
kickstart installations to work
By default - Squid runs on port 3128.
serve both files and printers to users
18. What command (and options) can be used to create a user named George with the description "Jr Admin"?
useradd -c "Jr Admin" George
getsebool
Enforcing during installation
lvdisplay
19. What command can you use to create a new SSL certificate?
service named configtest
You add your action to the end of the /home/user01/.bashrc file.
Physical volumes - volume groups - and logical volumes.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
20. Most boot issues can be resolved by...
mkfs.ext4
Enforcing during installation
Use the route command with the add option to create a static route.
entering rescue mode and repairing the problem.
21. Can you name the two commands that can be used to view the free space on the system?
The last rule is always an implicit deny statement rejecting anything that wasn't matched by previous rules.
The du and df commands are used to view available space on the system.
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
22. What command can you use to create a password-protected page?
The htpasswd command can be used to password-protect a web page.
service named configtest
support TCP Wrappers
getsebool
23. What command can you use to query information from the kernel about RAID arrays?
useradd -c "Jr Admin" George
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
cat /proc/mdstat
The nfsstat command can be used to view NFS statistics.
24. What is the top command used for?
The dig - host - and ping commands can be used to test DNS server functionality.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
This is actually a trick question because the answer could go either way. In this chapter - we discussed only software RAID setups - in which case the answer is no. If - however - you were using a hardware RAID 5 - the answer would be yes.
Use the top command to view CPU and memory usage.
25. What is the superblock used for?
Use the top command to view CPU and memory usage.
The superblock is a structure that contains metadata of the file system. If this becomes corrupt - you are in trouble.
rpcbind service
This command reboots virtual guest Client04.
26. How would you go about creating a static route?
repquota
The tcpdump command is used to monitor network connections on different interfaces.
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
Use the route command with the add option to create a static route.
27. How can you check the currently mounted file systems?
The mount command lists all currently mounted file systems.
The /etc/sysctl.conf file maintains a list of custom kernel parameters that should be applied during system boot.
A virtual host is a way of hosting multiple sites using a single IP address.
The four types of DNS servers are master - slave - caching-only - and forwarding.
28. What is the benefit to using centralized authentication?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. What command can you use to monitor and troubleshoot network connections?
Use the route command with the add option to create a static route.
chkconfig sshd off
The tcpdump command is used to monitor network connections on different interfaces.
The service command is used to start - stop - and manage system services.
30. What happens if you call the command from question 3 with the -c option after it has already been run?
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
export one or all resources
31. By default - what is the path to a user's home directory?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What is a gateway used for on a network?
repquota
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
The three utilities are: route - ping - and nslookup.
The TFTP server uses UDP port 69.
33. Should you allow remote root access - Why or why not?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. What is a virtual host?
A virtual host is a way of hosting multiple sites using a single IP address.
Use the resize2fs command to grow a file system.
Use the top command to view CPU and memory usage.
lvdisplay
35. What command do you use to change the permissions on a file or directory - To change ownership?
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
generates errors under Red Hat Enterprise Linux 6
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
support TCP Wrappers
36. What port does NFS use by default?
choose which mode you'd like it to operate in
This command reboots virtual guest Client04.
The smbstatus command shows you currently mounted Samba resources.
The NFS service uses TCP port 2049 by default.
37. What port must be opened on the firewall for DNS?
The TFTP server uses UDP port 69.
DNS uses port 53.
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
SSH is used for secure remote management of Linux systems.
38. Does a DHCP server allow reserved IP addresses - If so - how?
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
kickstart installations to work
39. What command can you use to view NFS statistics?
A user's home directory is created under the /home directory.
Kickstart supports both basic and advanced partitioning (RAID/LVM).
load balancing and redundancy benefits
The nfsstat command can be used to view NFS statistics.
40. What commands can you use to add a client machine to an LDAP server?
You can use the authconfig-tui command or the authconfig command.
amount of RAM
entering rescue mode and repairing the problem.
The mount command lists all currently mounted file systems.
41. What command is used to create an RPM package?
rpmbuild
service sshd statuts
getsebool
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
42. Can you put your /boot partition on a RAID 5 array?
The smbstatus command shows you currently mounted Samba resources.
A virtual host is a way of hosting multiple sites using a single IP address.
This is actually a trick question because the answer could go either way. In this chapter - we discussed only software RAID setups - in which case the answer is no. If - however - you were using a hardware RAID 5 - the answer would be yes.
The rpm command can operate in install - query - or verify modes.
43. What does virsh reboot Client04 do?
This chapter described tdbsm and smbpasswd back-end authentication.
This command reboots virtual guest Client04.
The last rule is always an implicit deny statement rejecting anything that wasn't matched by previous rules.
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
44. What command can be used to view the queue for at service jobs?
The print option is used with both the fdisk and parted commands to display the current partition tables.
alternatives --config mta
atq
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
45. What is the name of the section used to run scripts after a kickstart installation?
Use the route command with the add option to create a static route.
By defining a %post section - you can run scripts after a kickstart installation is complete.
The htpasswd command can be used to password-protect a web page.
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
46. To grow a file system
semanage boolean -l
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
entering rescue mode and repairing the problem.
Use the resize2fs command to grow a file system.
47. It is possible to run scripts before a kickstart installation. This is done by...
export one or all resources
defining a %pre section although it is rarely used
The two main config files are master.cf and main.cf.
LUKS encryption
48. The exportfs command is used to...
Physical volumes - volume groups - and logical volumes.
export one or all resources
getsebool
Use the setgid flag to create the appropriate permissions (chmod 2770).
49. What command is used to show all services being controlled by the xinetd daemon?
The rpm command can operate in install - query - or verify modes.
user's home directory in the /etc/skel directory
chkconfig xinetd --list
By default - Squid runs on port 3128.
50. What does it mean if you ping a host and you receive the response Destination Unreachable?
serve both files and printers to users
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
via the command line
run on any port you'd like (provided that port is available)