Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It is possible to run scripts before a kickstart installation. This is done by...






2. What command can be used to view the queue for at service jobs?






3. What happens to jobs that are scheduled to run while the system is off?






4. What is the top command used for?






5. What benefit does a web proxy provide to your network?






6. How can you verify the status of the SSH service after the system has booted?






7. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?






8. Before you work with ACLs - what do you need to do to the file system?






9. How would you view all Boolean options for the HTTP service?






10. How do you run a command with elevated privileges?






11. To grow a file system






12. What command can you use to test connectivity to another host?






13. What command can you use to query Boolean values?






14. What is the rndc utility used for?






15. What two ports should be opened on the firewall for the FTP server to function properly?






16. What directory is used to represent the virtual file system created by the kernel?






17. How would you disable SELinux protection for NFS - allowing shares to be read/write?






18. What port does the SMTP service run on?






19. GRUB has three stages. Can you name them?






20. What are SELinux Booleans?






21. What command is used to show all services being controlled by the xinetd daemon?






22. What command can be used to easily list all the options in the FTP main config file?






23. What command can you use to create a password-protected page?






24. How can you display all virtual guests after they're connected to a hypervisor?






25. Which remote management service is installed by default?Can you name the port that it uses?






26. What command do you use to change the permissions on a file or directory - To change ownership?






27. What command is used to change the mail server from Sendmail to Postfix (useful only if you have both installed)?






28. How would you go about creating a static route?






29. What commands can you use to add a client machine to an LDAP server?






30. What file needs to be edited so that the system will mount a file system at boot time?






31. What happens if you call the command from question 3 with the -c option after it has already been run?






32. What is the benefit of using public/private key authentication?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. What does it mean if you ping a host and you receive the response Destination Unreachable?






34. What happens if a host changes its IP address and the keys don't match?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. What is the difference between an A record and a PTR record?






36. Does a DHCP server allow reserved IP addresses - If so - how?






37. What does S12rsyslog in the /etc/rc.d/rc2.d directory mean?






38. What command can you use to test the config files before starting the DNS service?






39. What command is used to create an RPM package?






40. Editing the /etc/xinetd.d/tftp file and enabling the service are the same as running the chkconfig tftp on command. Both of these actions...






41. What command would you use to create a group - to add the user George to the group?






42. What is the point of using SELinux?






43. Which log file is used to keep track of policy violations?






44. What command do you use to report information on quota usage?






45. Can you name three utilities that can be used for network or DNS client troubleshooting?






46. What command can you use to check the config file of the DHCP server?






47. Can you put your /boot partition on a RAID 5 array?






48. What is the superblock used for?






49. For Red Hat Enterprise Linux 6 - SELinux comes set up in enforcing mode. When installing Red Hat Enterprise Linux 5 - you have the option to...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


50. Through its main config file - SSH can be configured to...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183