SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What command would you use to create a group - to add the user George to the group?
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
The lastlog and faillog commands are used to view user login-related events?
By default - the rndc utility listens on port 953.
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
2. What is the point of using SELinux?
SELinux provides enhanced granular security for the Linux operating system.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
Use the yum groupinstall command to install multiple packages in a single group at once.
You should never allow remote root access. Should your root account become compromised and you use the same password - someone could gain access to all your systems. You also don't want the most powerful user of your system (with no accountability) l
3. How would you disable SELinux protection for NFS - allowing shares to be read/write?
user's home directory in the /etc/skel directory
service named configtest
setsebool -P nfs_export_all_rw=1
service httpd configtest
4. What command is used to change the mail server from Sendmail to Postfix (useful only if you have both installed)?
For Apache to run a secure site - the mod_ssl package is required to be installed.
alternatives --config mta
Version 2 is the latest and most secure version of SSH.
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
5. There are four types of DNS servers. Name them.
The four types of DNS servers are master - slave - caching-only - and forwarding.
VNC is used to control a remote desktop session.
Sendmail
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
6. The virt-install package allows you to manage virtual machines _____________. The virt-manager package allows you to manage virtual machines via a GUI interface.
VNC is used to control a remote desktop session.
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
Use the top command to view CPU and memory usage.
via the command line
7. What is the top command used for?
Use the top command to view CPU and memory usage.
The smbpasswd command is used to create Samba users.
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
8. Which remote management service is installed by default?Can you name the port that it uses?
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
The three utilities are: route - ping - and nslookup.
The last rule is always an implicit deny statement rejecting anything that wasn't matched by previous rules.
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
9. What command disables the SSH service from running when the system boots?
The DHCP server listens on port 67 by default.
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
chkconfig sshd off
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
10. What protocols are used with Dovecot?
An A record translates translated hostnames to IP addresses - and a PTR record works the other way around.
halts the system
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
11. What port does the rndc utility listen on by default?
By default - the rndc utility listens on port 953.
generates errors under Red Hat Enterprise Linux 6
This chapter described tdbsm and smbpasswd back-end authentication.
ifconfig
12. What are the five required directories when building RPMS?
chcon
The htpasswd command can be used to password-protect a web page.
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
export one or all resources
13. How can you change the security context of a directory to work with Apache?
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
The print option is used with both the fdisk and parted commands to display the current partition tables.
If you shrink a volume group or logical volume - there is a chance you could lose data depending on how much you shrink the volume.
Using the chcon command - you can change the context of a file to work with Apache.
14. Which file shows you all the client IP addresses?
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
15. Does a DHCP server allow reserved IP addresses - If so - how?
you have access to the correct packages or repositories.
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
16. The ______________ for Red Hat Enterprise Linux 5 or 6 includes the use of LVM.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
The two main config files are master.cf and main.cf.
chcon
Enforcing during installation
17. What happens if a host changes its IP address and the keys don't match?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. You must dictate the ____________ you want allocated to your virtual machine when you create it.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
amount of RAM
SELinux Booleans provide restrictions to different aspects of a service.
setsebool -P nfs_export_all_rw=1
19. What is a virtual host?
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
The htpasswd command can be used to password-protect a web page.
Use the route command with the add option to create a static route.
A virtual host is a way of hosting multiple sites using a single IP address.
20. How would you go about creating a static route?
Use the route command with the add option to create a static route.
Network installations can be performed using the HTTP - FTP - and NFS protocols.
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
When the system enters into runlevel 2 - the rsyslog service has a priority of 12 when starting. Anything with a lower number (or the same number and lower first letter) starts before the rsyslog service.
21. What command can you use to view system processes and their CPU usage?
chcon
repquota
service dhcpd configtest
Use the ps command to view processes and their CPU usage.
22. What does the partprobe command do?
By default - the rndc utility listens on port 953.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
getsebool
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
23. What are the two config files for Postfix called?
The DHCP server listens on port 67 by default.
service named configtest
The two main config files are master.cf and main.cf.
The TFTP server uses UDP port 69.
24. What critical step must you take after updating the kernel to a newer version?
DNS uses port 53.
The DHCP server listens on port 67 by default.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
Using the chcon command - you can change the context of a file to work with Apache.
25. What command can be used to easily list all the options in the FTP main config file?
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
entering rescue mode and repairing the problem.
Version 2 is the latest and most secure version of SSH.
Use the resize2fs command to grow a file system.
26. What are the side effects of shrinking a volume group or logical volume?
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
If you shrink a volume group or logical volume - there is a chance you could lose data depending on how much you shrink the volume.
atq
The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.
27. What is the name of the package used to install an FTP?
The vsftpd package is used to install an FTP server.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
export one or all resources
28. How can you verify the status of the SSH service after the system has booted?
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
The smbstatus command shows you currently mounted Samba resources.
service named configtest
service sshd statuts
29. How can you list all services on the system to tell whether they will boot during startup?
chkconfig sshd off
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
chkconfig—list
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
30. What file is used to maintain custom parameters for the kernel during system boot?
By default - Squid runs on port 3128.
service httpd configtest
The /etc/sysctl.conf file maintains a list of custom kernel parameters that should be applied during system boot.
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
31. Is it possible to share files among groups - What permissions would you set on the directory to accomplish file sharing if possible?
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
Use the setgid flag to create the appropriate permissions (chmod 2770).
rpcbind service
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
32. What two commands are special for dealing with user login events?
The smbpasswd command is used to create Samba users.
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
The lastlog and faillog commands are used to view user login-related events?
33. What is the rndc utility used for?
The virsh command is used to manage virtual guests.
Apache uses port 80 for HTTP and port 443 for HTTPS.
The rndc utility provides a method for managing the DNS server remotely and securely.
lvdisplay
34. What command can you use to test connectivity to another host?
have the same effect
The NFS service uses TCP port 2049 by default.
An A record translates translated hostnames to IP addresses - and a PTR record works the other way around.
The ping command can be used to verify connectivity to another host.
35. What is the last rule in the iptables file?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What is the name of the section used to run scripts after a kickstart installation?
By defining a %post section - you can run scripts after a kickstart installation is complete.
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
support TCP Wrappers
VNC is used to control a remote desktop session.
37. What is the /etc/hosts file used for?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. In Red Hat Enterprise Linux 6 - the default for SELinux is _______________ (which can be changed after the installation completes). For Red Hat Enterprise Linux 5 - you were able to choose what mode you wanted SELinux to start in.
rpcbind service
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
Version 2 is the latest and most secure version of SSH.
Enforcing during installation
39. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?
defining a %pre section although it is rarely used
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
The four types of DNS servers are master - slave - caching-only - and forwarding.
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
40. What two commands are used for package management?
export one or all resources
Use the route command with the add option to create a static route.
The print option is used with both the fdisk and parted commands to display the current partition tables.
The yum and rpm commands are used for package management.
41. What is SSH used for?
The ping command can be used to verify connectivity to another host.
SSH is used for secure remote management of Linux systems.
The du and df commands are used to view available space on the system.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
42. What port on the firewall needs to be open for the TFTP server to work?
The TFTP server uses UDP port 69.
chcon
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
43. What does it mean if you ping a host and you receive the response Destination Unreachable?
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
load balancing and redundancy benefits
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
44. What port must be opened on the firewall for DNS?
The tcpdump command is used to monitor network connections on different interfaces.
DNS uses port 53.
The last rule is always an implicit deny statement rejecting anything that wasn't matched by previous rules.
The print option is used with both the fdisk and parted commands to display the current partition tables.
45. SSH does...
rpmbuild
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
support TCP Wrappers
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
46. What option is used to allow anonymous uploads to the FTP server?
The anonymous_enable=YES option in the main config file allows anonymous uploads.
lvdisplay
chkconfig—list
defining a %pre section although it is rarely used
47. What command can you use to create a file system?
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
mkfs.ext4
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
support TCP Wrappers
48. FTP is one of three protocols ______________. The other two protocols are NFS and HTTP.
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
SELinux provides enhanced granular security for the Linux operating system.
used for kickstart and/or network installs
The dig - host - and ping commands can be used to test DNS server functionality.
49. What does ifconfig 172.168.1.100 netmask 255.255.255.0 eth1 do?
cat /proc/mdstat
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
Enforcing during installation
50. What happens to jobs that are scheduled to run while the system is off?
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
Typing the mail or mutt command allows you to read mail from the command line.
defining a %pre section although it is rarely used
service dhcpd configtest
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests