SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Runlevel 0 ___________. Runlevel 6 reboots the system.
halts the system
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
The tcpdump command is used to monitor network connections on different interfaces.
mkfs.ext4
2. How do you run a command with elevated privileges?
The testparm command allows you to check for syntax errors in the /etc/samba/smb.conf file.
Use the top command to view CPU and memory usage.
The service command is used to start - stop - and manage system services.
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
3. What critical step must you take after updating the kernel to a newer version?
You should never allow remote root access. Should your root account become compromised and you use the same password - someone could gain access to all your systems. You also don't want the most powerful user of your system (with no accountability) l
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
The smbpasswd command is used to create Samba users.
repquota
4. How can you verify the status of the SSH service after the system has booted?
VNC is used to control a remote desktop session.
A user's home directory is created under the /home directory.
service sshd statuts
Use the ps command to view processes and their CPU usage.
5. Which remote management service is installed by default?Can you name the port that it uses?
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
6. What command is used to create an RPM package?
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
When you exit the parted utility - all your changes are automatically written to disk. With the fdisk command - you need to manually write your changes to disk for them to take effect.
The lftp command can be used on a client to test FTP server connections.
rpmbuild
7. What command can you use to create a file system?
mkfs.ext4
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
8. What command can be used to easily list all the options in the FTP main config file?
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
This command reboots virtual guest Client04.
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
repquota
9. What command is used to change the mail server from Sendmail to Postfix (useful only if you have both installed)?
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
alternatives --config mta
A virtual host is a way of hosting multiple sites using a single IP address.
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
10. What is a gateway used for on a network?
By default - the rndc utility listens on port 953.
The two main config files are master.cf and main.cf.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
The tcpdump command is used to monitor network connections on different interfaces.
11. What two commands are special for dealing with user login events?
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
getsebool
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
The lastlog and faillog commands are used to view user login-related events?
12. What commands can you use to add a client machine to an LDAP server?
This command reboots virtual guest Client04.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
You can use the authconfig-tui command or the authconfig command.
Enforcing during installation
13. What command displays your current interfaces and IP address?
ifconfig
The NFS service uses TCP port 2049 by default.
The /etc/exports file needs to contain any directory that you want to export - including which options you'd like to use as well.
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
14. What port must be opened on the firewall for DNS?
The DHCP server listens on port 67 by default.
Enforcing during installation
mkfs.ext4
DNS uses port 53.
15. What options with the yum command would you use to remove a package?
The du and df commands are used to view available space on the system.
chcon
You can use the remove or erase options with yum to remove a package.
Sendmail
16. What option needs to be used with the mount command to mount an NFS resource?
The -t nfs option is used with the mount command to mount NFS resources.
ifconfig
setsebool -P nfs_export_all_rw=1
schedule one-time-only jobs
17. What three protocols can you use to perform network installations?
run on any port you'd like (provided that port is available)
The du and df commands are used to view available space on the system.
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
Network installations can be performed using the HTTP - FTP - and NFS protocols.
18. How can you display all virtual guests after they're connected to a hypervisor?
By default - the rndc utility listens on port 953.
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
getfacl
19. What command disables the SSH service from running when the system boots?
SELinux provides enhanced granular security for the Linux operating system.
chkconfig sshd off
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
20. What command can you use to manage system services?
The TFTP server uses UDP port 69.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
The service command is used to start - stop - and manage system services.
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
21. How would you install a group of packages all at a single time?
Kickstart supports both basic and advanced partitioning (RAID/LVM).
Using the chcon command - you can change the context of a file to work with Apache.
The four types of DNS servers are master - slave - caching-only - and forwarding.
Use the yum groupinstall command to install multiple packages in a single group at once.
22. GRUB has three stages. Can you name them?
Enforcing during installation
semanage boolean -l
When you exit the parted utility - all your changes are automatically written to disk. With the fdisk command - you need to manually write your changes to disk for them to take effect.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
23. What are SELinux Booleans?
The -t nfs option is used with the mount command to mount NFS resources.
You can use the authconfig-tui command or the authconfig command.
SELinux Booleans provide restrictions to different aspects of a service.
serve both files and printers to users
24. What is the rndc utility used for?
The rndc utility provides a method for managing the DNS server remotely and securely.
The yum and rpm commands are used for package management.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
browseable option
25. What are the three modes in which the rpm command can operate?
semanage boolean -l
have the same effect
enabled by default
The rpm command can operate in install - query - or verify modes.
26. What are the three items that make up LVM?
Physical volumes - volume groups - and logical volumes.
service sshd statuts
A virtual host is a way of hosting multiple sites using a single IP address.
Use the resize2fs command to grow a file system.
27. What command can you use to create a new SSL certificate?
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
By defining a %post section - you can run scripts after a kickstart installation is complete.
You should never allow remote root access. Should your root account become compromised and you use the same password - someone could gain access to all your systems. You also don't want the most powerful user of your system (with no accountability) l
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
28. If you want a specific action to take place when user01 logs in to the system - which file would you edit?
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
You add your action to the end of the /home/user01/.bashrc file.
29. What command-line program can you use to check your mail?
The service command is used to start - stop - and manage system services.
Typing the mail or mutt command allows you to read mail from the command line.
choose which mode you'd like it to operate in
The TFTP server uses UDP port 69.
30. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?
support TCP Wrappers
chkconfig—list
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
The TFTP server uses UDP port 69.
31. What directory is used to represent the virtual file system created by the kernel?
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
Use the top command to view CPU and memory usage.
cat /proc/mdstat
The /proc directory. The /proc/sys directory is the place where you actually tune kernel parameters.
32. What command can you use to test connectivity to another host?
alternatives --config mta
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
The ping command can be used to verify connectivity to another host.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
33. What is the /etc/vsftpd/user_list file used for?
Enforcing during installation
The user_list file can be used to limit which users have access to the FTP server.
The testparm command allows you to check for syntax errors in the /etc/samba/smb.conf file.
The virsh command is used to manage virtual guests.
34. Where are Yum repository config files located?
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
The DHCP server listens on port 67 by default.
This chapter described tdbsm and smbpasswd back-end authentication.
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
35. Through its main config file - SSH can be configured to...
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What happens if you call the command from question 3 with the -c option after it has already been run?
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
The du and df commands are used to view available space on the system.
user's home directory in the /etc/skel directory
37. The portmap service was replaced by the ______________ in Red Hat Enterprise Linux 6.
Apache uses port 80 for HTTP and port 443 for HTTPS.
cat /proc/mdstat
The two main config files are master.cf and main.cf.
rpcbind service
38. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
You can use the -q option to query an installed package. Combining grep and the -qa options - you can search among all installed packages on the system.
LUKS encryption
Kickstart supports both basic and advanced partitioning (RAID/LVM).
39. What command can you use to query Boolean values?
The lftp command can be used on a client to test FTP server connections.
By using centralized authentication - you don't need to re-create or maintain multiple accounts across every system in your organization.
getsebool
The user_list file can be used to limit which users have access to the FTP server.
40. What port does the rndc utility listen on by default?
By default - the rndc utility listens on port 953.
The NFS service uses TCP port 2049 by default.
useradd -c "Jr Admin" George
entering rescue mode and repairing the problem.
41. A PXE server eases the automation process but isn't required for...
run on any port you'd like (provided that port is available)
Network installations can be performed using the HTTP - FTP - and NFS protocols.
mkfs.ext4
kickstart installations to work
42. What port does the Apache web server run on - What about HTTPS?
enabled by default
This is actually a trick question because the answer could go either way. In this chapter - we discussed only software RAID setups - in which case the answer is no. If - however - you were using a hardware RAID 5 - the answer would be yes.
you have access to the correct packages or repositories.
Apache uses port 80 for HTTP and port 443 for HTTPS.
43. What are the two config files for Postfix called?
The two main config files are master.cf and main.cf.
Use the ps command to view processes and their CPU usage.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
Network installations can be performed using the HTTP - FTP - and NFS protocols.
44. How can you list all services on the system to tell whether they will boot during startup?
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
kickstart installations to work
The four types of DNS servers are master - slave - caching-only - and forwarding.
chkconfig—list
45. What option at the GRUB boot menu can you use to append something to a kernel?
The /var/log/audit/audit.log file contains all policy violations.
Enforcing during installation
The -t nfs option is used with the mount command to mount NFS resources.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
46. What command and option do you use to view the description of Boolean values?
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
The yum and rpm commands are used for package management.
semanage boolean -l
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
47. How would you go about creating a static route?
The du and df commands are used to view available space on the system.
Use the route command with the add option to create a static route.
The testparm command allows you to check for syntax errors in the /etc/samba/smb.conf file.
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
48. How would you disable SELinux protection for NFS - allowing shares to be read/write?
repquota
setsebool -P nfs_export_all_rw=1
The four types of DNS servers are master - slave - caching-only - and forwarding.
choose which mode you'd like it to operate in
49. What port does NFS use by default?
service httpd configtest
You add your action to the end of the /home/user01/.bashrc file.
The NFS service uses TCP port 2049 by default.
atq
50. A service needs to have _______________ to be able to use it.
Use the resize2fs command to grow a file system.
serve both files and printers to users
support for TCP Wrappers
getfacl