SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Editing the /etc/xinetd.d/tftp file and enabling the service are the same as running the chkconfig tftp on command. Both of these actions...
createrepo
have the same effect
serve both files and printers to users
entering rescue mode and repairing the problem.
2. What port must be opened on the firewall for DNS?
DNS uses port 53.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
lvdisplay
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
3. What three components are needed to fully automate a kickstart installation?
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
No. Red Hat Enterprise Linux 6 uses a different key to sign its packages.
4. To grow a file system
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
Use the resize2fs command to grow a file system.
SSH is used for secure remote management of Linux systems.
When the system enters into runlevel 2 - the rsyslog service has a priority of 12 when starting. Anything with a lower number (or the same number and lower first letter) starts before the rsyslog service.
5. What happens to jobs that are scheduled to run while the system is off?
atq
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
enabled by default
6. How can you change the security context of a directory to work with Apache?
Using the chcon command - you can change the context of a file to work with Apache.
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
The /var/log/audit/audit.log file contains all policy violations.
amount of RAM
7. FTP is one of three protocols ______________. The other two protocols are NFS and HTTP.
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
used for kickstart and/or network installs
atq
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
8. Runlevel 0 ___________. Runlevel 6 reboots the system.
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
Version 2 is the latest and most secure version of SSH.
halts the system
9. How would you view all Boolean options for the HTTP service?
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
You should never allow remote root access. Should your root account become compromised and you use the same password - someone could gain access to all your systems. You also don't want the most powerful user of your system (with no accountability) l
getsebool -a | grep http
mkfs.ext4
10. Before you work with quotas - what do you need to do to the file system?
getfacl
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
chcon
export one or all resources
11. What port does the rndc utility listen on by default?
The lastlog and faillog commands are used to view user login-related events?
By default - the rndc utility listens on port 953.
createrepo
serve both files and printers to users
12. Should you allow remote root access - Why or why not?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. What command disables the SSH service from running when the system boots?
chkconfig sshd off
SSH is used for secure remote management of Linux systems.
By using centralized authentication - you don't need to re-create or maintain multiple accounts across every system in your organization.
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
14. What command do you use to report information on quota usage?
repquota
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
The /etc/fstab file.
The SMTP service runs on TCP port 110.
15. What command can you use to create a new SSL certificate?
support for TCP Wrappers
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
16. What are the three different types of RAID described in this chapter?
The service command is used to start - stop - and manage system services.
generates errors under Red Hat Enterprise Linux 6
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
browseable option
17. The virt-install package allows you to manage virtual machines _____________. The virt-manager package allows you to manage virtual machines via a GUI interface.
enabled by default
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
via the command line
VNC is used to control a remote desktop session.
18. The old SysInit scripts have been replaced in Red Hat Enterprise Linux 6 for what new boot utility?
SELinux Booleans provide restrictions to different aspects of a service.
Use the ps command to view processes and their CPU usage.
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
19. What command can you use to check the config file of the DHCP server?
chkconfig—list
service dhcpd configtest
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
By using centralized authentication - you don't need to re-create or maintain multiple accounts across every system in your organization.
20. What command and options can you use to update the time?
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
You have the flexibility to resize and add new volumes on the fly. With basic partitions - any time that you want to make a change - you need to destroy the partition and create it again.
service dhcpd configtest
semanage boolean -l
21. What two commands are used for package management?
The yum and rpm commands are used for package management.
The lastlog and faillog commands are used to view user login-related events?
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
halts the system
22. What command can be used to easily list all the options in the FTP main config file?
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
The rpm command can operate in install - query - or verify modes.
service sshd statuts
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
23. What command-line program can you use to check your mail?
Typing the mail or mutt command allows you to read mail from the command line.
support for TCP Wrappers
The four types of DNS servers are master - slave - caching-only - and forwarding.
The virsh command is used to manage virtual guests.
24. The default SMTP service has been changed from _________ to Postfix in Red Hat Enterprise Linux 6.
via the command line
getsebool
Sendmail
DNS uses port 53.
25. What command is used to show all services being controlled by the xinetd daemon?
The du and df commands are used to view available space on the system.
SELinux provides enhanced granular security for the Linux operating system.
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
chkconfig xinetd --list
26. In Red Hat Enterprise Linux 6 - the default for SELinux is _______________ (which can be changed after the installation completes). For Red Hat Enterprise Linux 5 - you were able to choose what mode you wanted SELinux to start in.
Enforcing during installation
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
A virtual host is a way of hosting multiple sites using a single IP address.
27. What file is used to maintain custom parameters for the kernel during system boot?
The four types of DNS servers are master - slave - caching-only - and forwarding.
The /etc/sysctl.conf file maintains a list of custom kernel parameters that should be applied during system boot.
chkconfig xinetd --list
By default - Squid runs on port 3128.
28. What command do you use to change the permissions on a file or directory - To change ownership?
No. Red Hat Enterprise Linux 6 uses a different key to sign its packages.
halts the system
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
You have the flexibility to resize and add new volumes on the fly. With basic partitions - any time that you want to make a change - you need to destroy the partition and create it again.
29. What benefit does a web proxy provide to your network?
The -t nfs option is used with the mount command to mount NFS resources.
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
setsebool -P nfs_export_all_rw=1
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
30. What command can be used to view the queue for at service jobs?
The tcpdump command is used to monitor network connections on different interfaces.
atq
load balancing and redundancy benefits
No. Red Hat Enterprise Linux 6 uses a different key to sign its packages.
31. Is it possible to share files among groups - What permissions would you set on the directory to accomplish file sharing if possible?
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
Use the setgid flag to create the appropriate permissions (chmod 2770).
You can use the authconfig-tui command or the authconfig command.
chkconfig—list
32. The package selection screen allows you to install any software you want during the installation process as long as...
chkconfig xinetd --list
you have access to the correct packages or repositories.
The /etc/fstab file.
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
33. What option at the GRUB boot menu can you use to append something to a kernel?
Network installations can be performed using the HTTP - FTP - and NFS protocols.
The virsh command is used to manage virtual guests.
The anonymous_enable=YES option in the main config file allows anonymous uploads.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
34. The ____________ is available for each share.
VNC is used to control a remote desktop session.
The four types of DNS servers are master - slave - caching-only - and forwarding.
browseable option
have the same effect
35. You must dictate the ____________ you want allocated to your virtual machine when you create it.
amount of RAM
The /etc/exports file needs to contain any directory that you want to export - including which options you'd like to use as well.
The four types of DNS servers are master - slave - caching-only - and forwarding.
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
36. What command can you use to create a file system?
A user's home directory is created under the /home directory.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
ifconfig
mkfs.ext4
37. What command can you use to test connectivity to another host?
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
The ping command can be used to verify connectivity to another host.
38. What does the rdnc-confgen command do?
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
The /etc/fstab file.
The ping command can be used to verify connectivity to another host.
39. What command is used to create an RPM package?
Version 2 is the latest and most secure version of SSH.
The print option is used with both the fdisk and parted commands to display the current partition tables.
The testparm command allows you to check for syntax errors in the /etc/samba/smb.conf file.
rpmbuild
40. What are the five required directories when building RPMS?
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
The DHCP server listens on port 67 by default.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
The user_list file can be used to limit which users have access to the FTP server.
41. What is a gateway used for on a network?
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
chkconfig xinetd --list
42. What option is used to allow anonymous uploads to the FTP server?
When the system enters into runlevel 2 - the rsyslog service has a priority of 12 when starting. Anything with a lower number (or the same number and lower first letter) starts before the rsyslog service.
The anonymous_enable=YES option in the main config file allows anonymous uploads.
The ping command can be used to verify connectivity to another host.
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
43. What critical step must you take after updating the kernel to a newer version?
The print option is used with both the fdisk and parted commands to display the current partition tables.
The superblock is a structure that contains metadata of the file system. If this becomes corrupt - you are in trouble.
The /etc/sysctl.conf file maintains a list of custom kernel parameters that should be applied during system boot.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
44. What is a virtual host?
SELinux Booleans provide restrictions to different aspects of a service.
A virtual host is a way of hosting multiple sites using a single IP address.
SELinux provides enhanced granular security for the Linux operating system.
Public/private key authentication provides an additional layer of security because you need the correct key instead of just knowing someone's password. Passwords combined with public/private keys take the security one additional step.
45. The portmap service was replaced by the ______________ in Red Hat Enterprise Linux 6.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
For Apache to run a secure site - the mod_ssl package is required to be installed.
rpcbind service
Apache uses port 80 for HTTP and port 443 for HTTPS.
46. What three commands can you use to help verify that the DNS server is functioning properly?
export one or all resources
The dig - host - and ping commands can be used to test DNS server functionality.
The virsh command is used to manage virtual guests.
The DHCP server listens on port 67 by default.
47. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?
Use the setgid flag to create the appropriate permissions (chmod 2770).
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
user's home directory in the /etc/skel directory
atq
48. The INPUT chain being used is the default under Red Hat Enterprise Linux 5. This rule...
support TCP Wrappers
The lftp command can be used on a client to test FTP server connections.
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
generates errors under Red Hat Enterprise Linux 6
49. What command can you use to view mounted Samba shares?
You should never allow remote root access. Should your root account become compromised and you use the same password - someone could gain access to all your systems. You also don't want the most powerful user of your system (with no accountability) l
The smbstatus command shows you currently mounted Samba resources.
The yum and rpm commands are used for package management.
useradd -c "Jr Admin" George
50. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?
load balancing and redundancy benefits
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.