SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the name of the package used to install an FTP?
The vsftpd package is used to install an FTP server.
You add your action to the end of the /home/user01/.bashrc file.
The user_list file can be used to limit which users have access to the FTP server.
kickstart installations to work
2. The package selection screen allows you to install any software you want during the installation process as long as...
A virtual host is a way of hosting multiple sites using a single IP address.
The install.log.syslog file contains messages that are generated during the installation. If you run into trouble during the installation - this is a good place to start.
you have access to the correct packages or repositories.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
3. What command would you use to create a group - to add the user George to the group?
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
getsebool
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
4. What are the three items that make up LVM?
Use the ps command to view processes and their CPU usage.
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
Physical volumes - volume groups - and logical volumes.
5. What two commands are special for dealing with user login events?
The lastlog and faillog commands are used to view user login-related events?
via the command line
Apache uses port 80 for HTTP and port 443 for HTTPS.
you have access to the correct packages or repositories.
6. The default SMTP service has been changed from _________ to Postfix in Red Hat Enterprise Linux 6.
Sendmail
ifconfig
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
schedule one-time-only jobs
7. What command and option can you use to enable a service to start on boot?
The ping command can be used to verify connectivity to another host.
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
The tcpdump command is used to monitor network connections on different interfaces.
8. What file is used to maintain custom parameters for the kernel during system boot?
The /etc/sysctl.conf file maintains a list of custom kernel parameters that should be applied during system boot.
Use the ps command to view processes and their CPU usage.
The four types of DNS servers are master - slave - caching-only - and forwarding.
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
9. Samba servers can...
The /proc directory. The /proc/sys directory is the place where you actually tune kernel parameters.
serve both files and printers to users
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
The rndc utility provides a method for managing the DNS server remotely and securely.
10. How can virtual hosts be used?
defining a %pre section although it is rarely used
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
11. What is the name of the package that allows you to install VNC?
The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
This chapter described tdbsm and smbpasswd back-end authentication.
For Apache to run a secure site - the mod_ssl package is required to be installed.
12. Most boot issues can be resolved by...
entering rescue mode and repairing the problem.
run on any port you'd like (provided that port is available)
load balancing and redundancy benefits
getsebool -a | grep http
13. What option at the GRUB boot menu can you use to append something to a kernel?
The lastlog and faillog commands are used to view user login-related events?
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
14. To grow a file system
The TFTP server uses UDP port 69.
Use the resize2fs command to grow a file system.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
The smbpasswd command is used to create Samba users.
15. A service needs to have _______________ to be able to use it.
You have the flexibility to resize and add new volumes on the fly. With basic partitions - any time that you want to make a change - you need to destroy the partition and create it again.
enabled by default
The nfsstat command can be used to view NFS statistics.
support for TCP Wrappers
16. How would you disable SELinux protection for NFS - allowing shares to be read/write?
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
setsebool -P nfs_export_all_rw=1
The service command is used to start - stop - and manage system services.
kickstart installations to work
17. What command can you use to view mounted Samba shares?
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
The smbstatus command shows you currently mounted Samba resources.
chkconfig sshd off
18. What is the name of the section used to run scripts after a kickstart installation?
By defining a %post section - you can run scripts after a kickstart installation is complete.
getfacl
The SMTP service runs on TCP port 110.
serve both files and printers to users
19. What command (and options) can be used to create a user named George with the description "Jr Admin"?
This is actually a trick question because the answer could go either way. In this chapter - we discussed only software RAID setups - in which case the answer is no. If - however - you were using a hardware RAID 5 - the answer would be yes.
SSH is used for secure remote management of Linux systems.
useradd -c "Jr Admin" George
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
20. What port on the firewall needs to be open for the TFTP server to work?
The TFTP server uses UDP port 69.
VNC is used to control a remote desktop session.
Using the chcon command - you can change the context of a file to work with Apache.
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
21. Do you need to write changes to the disk when using the parted command? What about fdisk?
getfacl
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
When you exit the parted utility - all your changes are automatically written to disk. With the fdisk command - you need to manually write your changes to disk for them to take effect.
used for kickstart and/or network installs
22. Before you work with ACLs - what do you need to do to the file system?
You should never allow remote root access. Should your root account become compromised and you use the same password - someone could gain access to all your systems. You also don't want the most powerful user of your system (with no accountability) l
Use the yum groupinstall command to install multiple packages in a single group at once.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
23. What are the two types of back-end authentication mechanisms discussed in this chapter?
The /etc/exports file needs to contain any directory that you want to export - including which options you'd like to use as well.
serve both files and printers to users
load balancing and redundancy benefits
This chapter described tdbsm and smbpasswd back-end authentication.
24. The firewall service is...
enabled by default
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
run on any port you'd like (provided that port is available)
kickstart installations to work
25. What command can you use to query Boolean values?
getsebool
Use the ps command to view processes and their CPU usage.
You must open TCP ports 20 and 21 for the FTP server to function properly.
support for TCP Wrappers
26. What does ifconfig 172.168.1.100 netmask 255.255.255.0 eth1 do?
This command sets the eth1 interface to have a static IP address of 172.168.1.100 with a netmask of 255.255.255.0.
The anonymous_enable=YES option in the main config file allows anonymous uploads.
generates errors under Red Hat Enterprise Linux 6
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
27. What command and option do you use to view the description of Boolean values?
support for TCP Wrappers
via the command line
semanage boolean -l
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
28. What is VNC?
VNC is used to control a remote desktop session.
service named configtest
schedule one-time-only jobs
A virtual host is a way of hosting multiple sites using a single IP address.
29. What is the virsh command used for?
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
you have access to the correct packages or repositories.
Using the chcon command - you can change the context of a file to work with Apache.
The virsh command is used to manage virtual guests.
30. What command displays your current interfaces and IP address?
ifconfig
getsebool -a | grep http
The smbstatus command shows you currently mounted Samba resources.
mkfs.ext4
31. What option is used to allow anonymous uploads to the FTP server?
The four types of DNS servers are master - slave - caching-only - and forwarding.
The smbstatus command shows you currently mounted Samba resources.
The anonymous_enable=YES option in the main config file allows anonymous uploads.
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
32. What protocols are used with Dovecot?
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
The htpasswd command can be used to password-protect a web page.
Typing the mail or mutt command allows you to read mail from the command line.
33. What two commands are used for package management?
The ping command can be used to verify connectivity to another host.
The yum and rpm commands are used for package management.
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
Enforcing during installation
34. What command is used to change the mail server from Sendmail to Postfix (useful only if you have both installed)?
Sendmail
alternatives --config mta
used for kickstart and/or network installs
Using the chcon command - you can change the context of a file to work with Apache.
35. What is a gateway used for on a network?
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
have the same effect
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
36. What is the default port that Squid runs on?
The file system where ACLs will be implemented must be mounted with the acl option before ACLs will work properly.
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
By default - Squid runs on port 3128.
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
37. How would you install a group of packages all at a single time?
The user_list file can be used to limit which users have access to the FTP server.
Use the yum groupinstall command to install multiple packages in a single group at once.
The /proc directory. The /proc/sys directory is the place where you actually tune kernel parameters.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
38. A slave DNS server provides...
The tcpdump command is used to monitor network connections on different interfaces.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
load balancing and redundancy benefits
This is actually a trick question because the answer could go either way. In this chapter - we discussed only software RAID setups - in which case the answer is no. If - however - you were using a hardware RAID 5 - the answer would be yes.
39. What command and options can you use to update the time?
service sshd statuts
The two main config files are master.cf and main.cf.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
40. The old SysInit scripts have been replaced in Red Hat Enterprise Linux 6 for what new boot utility?
chcon
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
service sshd statuts
41. What is the difference between an ext2 and ext3 file system?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Is it possible to share files among groups - What permissions would you set on the directory to accomplish file sharing if possible?
getsebool
Use the route command with the add option to create a static route.
The /var/log/audit/audit.log file contains all policy violations.
Use the setgid flag to create the appropriate permissions (chmod 2770).
43. What does it mean if you ping a host and you receive the response Destination Unreachable?
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
The SMTP service runs on TCP port 110.
The service command is used to start - stop - and manage system services.
44. What command can you use to view system processes and their CPU usage?
The tcpdump command is used to monitor network connections on different interfaces.
The htpasswd command can be used to password-protect a web page.
Use the ps command to view processes and their CPU usage.
user's home directory in the /etc/skel directory
45. What command is used to show all services being controlled by the xinetd daemon?
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
generates errors under Red Hat Enterprise Linux 6
chkconfig xinetd --list
The /var/log/audit/audit.log file contains all policy violations.
46. If you want a specific action to take place when user01 logs in to the system - which file would you edit?
getsebool
You add your action to the end of the /home/user01/.bashrc file.
Sendmail
The /etc/exports file needs to contain any directory that you want to export - including which options you'd like to use as well.
47. What is the benefit of using public/private key authentication?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. The ______________ for Red Hat Enterprise Linux 5 or 6 includes the use of LVM.
getsebool -a | grep http
The TFTP server uses UDP port 69.
Enforcing during installation
Network address translation (NAT) maintains a table that allows the use of multiple internal IP addresses to a multiple public IP address (called address translation). It can also be used for one-to-one or one-to-many relationships as well.
49. Editing the /etc/xinetd.d/tftp file and enabling the service are the same as running the chkconfig tftp on command. Both of these actions...
LUKS encryption
getsebool -a | grep http
Use the resize2fs command to grow a file system.
have the same effect
50. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
Use the ps command to view processes and their CPU usage.
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests