Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?






2. The package selection screen allows you to install any software you want during the installation process as long as...






3. The INPUT chain being used is the default under Red Hat Enterprise Linux 5. This rule...






4. There are four types of DNS servers. Name them.






5. For Red Hat Enterprise Linux 6 - SELinux comes set up in enforcing mode. When installing Red Hat Enterprise Linux 5 - you have the option to...


6. What options with the yum command would you use to remove a package?






7. The portmap service was replaced by the ______________ in Red Hat Enterprise Linux 6.






8. How would you install a group of packages all at a single time?






9. Does a DHCP server allow reserved IP addresses - If so - how?






10. What happens if you call the command from question 3 with the -c option after it has already been run?






11. What command-line program can you use to check your mail?






12. How would you view all Boolean options for the HTTP service?






13. To create a RAID or LVM partition using kickstart






14. What is the difference between an ext2 and ext3 file system?


15. Editing the /etc/xinetd.d/tftp file and enabling the service are the same as running the chkconfig tftp on command. Both of these actions...






16. What option would you use to query an installed package using the rpm command?






17. What is the biggest benefit to using LVM over basic partitions?






18. Can you put your /boot partition on a RAID 5 array?






19. What command can you use to query Boolean values?






20. Which file contains all messages generated during installation that can be used for troubleshooting if the need arises?






21. What is the format of the /etc/shadow file?






22. What is the superblock used for?






23. What are the three modes in which the rpm command can operate?






24. The exportfs command is used to...






25. What command (and options) can be used to create a user named George with the description "Jr Admin"?






26. What three components are needed to fully automate a kickstart installation?






27. What does it mean if you ping a host and you receive the response Destination Unreachable?






28. What command can you use to view the current ACL on a file?






29. What is the default port that Squid runs on?






30. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?






31. What is the rndc utility used for?






32. What command is used to create a user for Samba?






33. What is a gateway used for on a network?






34. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?






35. What port on the firewall needs to be open for the TFTP server to work?






36. What command would you use to create a group - to add the user George to the group?






37. If a package is built on an RHEL6 system and deployed to a custom RHEL5 repository - are RHEL5 systems able to use it?






38. What directory is used to represent the virtual file system created by the kernel?






39. What command can you use to monitor and troubleshoot network connections?






40. The ____________ is available for each share.






41. What port does the rndc utility listen on by default?






42. The ______________ for Red Hat Enterprise Linux 5 or 6 includes the use of LVM.






43. What is the name of the package used to install an FTP?






44. What is the benefit to using centralized authentication?


45. What command can you use to view system processes and their CPU usage?






46. What option at the GRUB boot menu can you use to append something to a kernel?






47. What are the two types of back-end authentication mechanisms discussed in this chapter?






48. How can you check the currently mounted file systems?






49. What does virsh reboot Client04 do?






50. What command can you use to change the context of files?