Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you run a command with elevated privileges?






2. Do you need to write changes to the disk when using the parted command? What about fdisk?






3. What are the five required directories when building RPMS?






4. The package selection screen allows you to install any software you want during the installation process as long as...






5. What is the name of the package used to install an FTP?






6. What option is used to allow anonymous uploads to the FTP server?






7. How would you disable SELinux protection for NFS - allowing shares to be read/write?






8. What are the two config files for Postfix called?






9. The default SMTP service has been changed from _________ to Postfix in Red Hat Enterprise Linux 6.






10. Does a DHCP server allow reserved IP addresses - If so - how?






11. What commands can you use to add a client machine to an LDAP server?






12. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?






13. Place all files you want added to a _______________ during creation.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. How would you go about creating a static route?






15. What command do you use to change the permissions on a file or directory - To change ownership?






16. What is the difference between an A record and a PTR record?






17. What are SELinux Booleans?






18. What command can you use to monitor and troubleshoot network connections?






19. What does the partprobe command do?






20. What is the top command used for?






21. What three protocols can you use to perform network installations?






22. It is possible to run scripts before a kickstart installation. This is done by...






23. What port does NFS use by default?






24. What option at the GRUB boot menu can you use to append something to a kernel?






25. What two commands are used for package management?






26. What protocols are used with Dovecot?






27. What port does the rndc utility listen on by default?






28. What command can you use to get information about logical volumes?






29. What is the /var/lib/nfs/etab file used for?






30. What is the superblock used for?






31. What command can you use to view the current ACL on a file?






32. What is the xinetd service used for?






33. What command can you use to create a file system?






34. What does the testparm command do?






35. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?






36. What option is used with both the fdisk and parted commands to display the current partition tables?






37. What does the rdnc-confgen command do?






38. What port does the SMTP service run on?






39. What command can you use to check the config file of the DHCP server?






40. What command can be used to easily list all the options in the FTP main config file?






41. What command would you use to create a group - to add the user George to the group?






42. What does it mean if you ping a host and you receive the response Destination Unreachable?






43. What does S12rsyslog in the /etc/rc.d/rc2.d directory mean?






44. Through its main config file - SSH can be configured to...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. What command can you use to manage system services?






46. The INPUT chain being used is the default under Red Hat Enterprise Linux 5. This rule...






47. What are the two types of back-end authentication mechanisms discussed in this chapter?






48. What command can you use to view system processes and their CPU usage?






49. What options with the yum command would you use to remove a package?






50. The virt-install package allows you to manage virtual machines _____________. The virt-manager package allows you to manage virtual machines via a GUI interface.