Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is PAM used for?






2. The package selection screen allows you to install any software you want during the installation process as long as...






3. How would you view all Boolean options for the HTTP service?






4. What command is used to create an RPM package?






5. What command displays your current interfaces and IP address?






6. What command can you use to create a new SSL certificate?






7. The portmap service was replaced by the ______________ in Red Hat Enterprise Linux 6.






8. What port does the DHCP server listen on by default?






9. What happens to jobs that are scheduled to run while the system is off?






10. Which file shows you all the client IP addresses?






11. What command can you use to check the config file of the DHCP server?






12. What command disables the SSH service from running when the system boots?






13. What port must be opened on the firewall for DNS?






14. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?






15. Does a DHCP server allow reserved IP addresses - If so - how?






16. How can you change the security context of a directory to work with Apache?






17. Place all files you want added to a _______________ during creation.


18. What are the two types of back-end authentication mechanisms discussed in this chapter?






19. What is the main config file for the DHCP service?






20. What command and options can you use to update the time?






21. What are the three different types of RAID described in this chapter?






22. What is the benefit of using public/private key authentication?


23. What command can you use to query Boolean values?






24. What command and option can you use to enable a service to start on boot?






25. If a package is built on an RHEL6 system and deployed to a custom RHEL5 repository - are RHEL5 systems able to use it?






26. What command can you use to view mounted Samba shares?






27. What are the side effects of shrinking a volume group or logical volume?






28. What file needs to be edited so that the system will mount a file system at boot time?






29. Which version of SSH should you use?






30. What command can you use to monitor and troubleshoot network connections?






31. How can you check the currently mounted file systems?






32. What is the format of the /etc/shadow file?






33. What client-side command can you use to test your FTP server connection?






34. To create a RAID or LVM partition using kickstart






35. What is the default port that Squid runs on?






36. What is the point of using SELinux?






37. What critical step must you take after updating the kernel to a newer version?






38. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?






39. To export directories as resources - what file needs to be edited?


40. What does ifconfig 172.168.1.100 netmask 255.255.255.0 eth1 do?






41. You must dictate the ____________ you want allocated to your virtual machine when you create it.






42. What is the difference between an A record and a PTR record?






43. What command can you use to get information about logical volumes?






44. Before you work with quotas - what do you need to do to the file system?






45. What is the xinetd service used for?






46. To grow a file system






47. What command can you use to change the context of files?






48. The ____________ is available for each share.






49. What command can you use to create a password-protected page?






50. There are four types of DNS servers. Name them.