SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What file needs to be edited so that the system will mount a file system at boot time?
The /etc/fstab file.
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
The yum and rpm commands are used for package management.
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
2. What is the difference between an A record and a PTR record?
An A record translates translated hostnames to IP addresses - and a PTR record works the other way around.
chkconfig—list
You can use the sudo command to run a command with elevated privileges provided you have the rights in the /etc/sudoers file.
Use the yum groupinstall command to install multiple packages in a single group at once.
3. What option at the GRUB boot menu can you use to append something to a kernel?
The -t nfs option is used with the mount command to mount NFS resources.
Use the yum groupinstall command to install multiple packages in a single group at once.
Use the ps command to view processes and their CPU usage.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
4. What command can you use to create a password-protected page?
The htpasswd command can be used to password-protect a web page.
repquota
By default - Squid runs on port 3128.
SSH is used for secure remote management of Linux systems.
5. Place all files you want added to a _______________ during creation.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. What client-side command can you use to test your FTP server connection?
The -t nfs option is used with the mount command to mount NFS resources.
createrepo
Kickstart supports both basic and advanced partitioning (RAID/LVM).
The lftp command can be used on a client to test FTP server connections.
7. What command can you use to view mounted Samba shares?
you have access to the correct packages or repositories.
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
chkconfig sshd off
The smbstatus command shows you currently mounted Samba resources.
8. What protocols are used with Dovecot?
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
The print option is used with both the fdisk and parted commands to display the current partition tables.
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
9. Explain the difference between soft and hard limits in quotas.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. What command can you use to query Boolean values?
The /var/log/audit/audit.log file contains all policy violations.
getsebool
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
The nfsstat command can be used to view NFS statistics.
11. The ______________ for Red Hat Enterprise Linux 5 or 6 includes the use of LVM.
Enforcing during installation
Network installations can be performed using the HTTP - FTP - and NFS protocols.
Using the chcon command - you can change the context of a file to work with Apache.
chcon
12. What is the last rule in the iptables file?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. What command can you use to create a new SSL certificate?
This chapter described tdbsm and smbpasswd back-end authentication.
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
The /etc/hosts file is a local lookup file used to map IP addresses to hostnames if a DNS server isn't available.
14. What command (and options) can be used to create a user named George with the description "Jr Admin"?
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
useradd -c "Jr Admin" George
run on any port you'd like (provided that port is available)
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
15. What option can you change in the rsyslog config file to accept remote logs (acting as a centralized logging server)?
lvdisplay
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
The lftp command can be used on a client to test FTP server connections.
16. Before you work with quotas - what do you need to do to the file system?
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
Use the route command with the add option to create a static route.
17. The firewall service is...
You add your action to the end of the /home/user01/.bashrc file.
The SMTP service runs on TCP port 110.
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
enabled by default
18. What command displays your current interfaces and IP address?
The /var/log/audit/audit.log file contains all policy violations.
ifconfig
Public/private key authentication provides an additional layer of security because you need the correct key instead of just knowing someone's password. Passwords combined with public/private keys take the security one additional step.
Version 2 is the latest and most secure version of SSH.
19. What two commands are special for dealing with user login events?
The lastlog and faillog commands are used to view user login-related events?
The lftp command can be used on a client to test FTP server connections.
Use the setgid flag to create the appropriate permissions (chmod 2770).
The mount command lists all currently mounted file systems.
20. Which file contains all messages generated during installation that can be used for troubleshooting if the need arises?
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
The install.log.syslog file contains messages that are generated during the installation. If you run into trouble during the installation - this is a good place to start.
The NFS service uses TCP port 2049 by default.
Use the route command with the add option to create a static route.
21. What are the three different types of RAID described in this chapter?
The /var/log/audit/audit.log file contains all policy violations.
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
The four types of DNS servers are master - slave - caching-only - and forwarding.
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
22. How would you disable SELinux protection for NFS - allowing shares to be read/write?
Use the resize2fs command to grow a file system.
via the command line
setsebool -P nfs_export_all_rw=1
have the same effect
23. What commands can you use to add a client machine to an LDAP server?
The DHCP server listens on port 67 by default.
Apache uses port 80 for HTTP and port 443 for HTTPS.
You can use the authconfig-tui command or the authconfig command.
VNC is used to control a remote desktop session.
24. How can you list all services on the system to tell whether they will boot during startup?
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
chkconfig—list
via the command line
For Apache to run a secure site - the mod_ssl package is required to be installed.
25. Which version of SSH should you use?
Version 2 is the latest and most secure version of SSH.
The tcpdump command is used to monitor network connections on different interfaces.
ifconfig
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
26. The portmap service was replaced by the ______________ in Red Hat Enterprise Linux 6.
rpcbind service
No. Red Hat Enterprise Linux 6 uses a different key to sign its packages.
The install.log.syslog file contains messages that are generated during the installation. If you run into trouble during the installation - this is a good place to start.
amount of RAM
27. The ____________ is available for each share.
service sshd statuts
The /etc/exports file needs to contain any directory that you want to export - including which options you'd like to use as well.
browseable option
chkconfig—list
28. What port must be opened on the firewall for DNS?
DNS uses port 53.
An A record translates translated hostnames to IP addresses - and a PTR record works the other way around.
setsebool -P nfs_export_all_rw=1
service dhcpd configtest
29. What is PAM used for?
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
No. Red Hat Enterprise Linux 6 uses a different key to sign its packages.
PAM is used as a modular way to leverage security. In this chapter - the main function we discussed was for managing password policies and complexity.
getsebool
30. In Red Hat Enterprise Linux 6 - the default for SELinux is _______________ (which can be changed after the installation completes). For Red Hat Enterprise Linux 5 - you were able to choose what mode you wanted SELinux to start in.
Enforcing during installation
Kickstart supports both basic and advanced partitioning (RAID/LVM).
The user_list file can be used to limit which users have access to the FTP server.
The tcpdump command is used to monitor network connections on different interfaces.
31. What three commands can you use to help verify that the DNS server is functioning properly?
The dig - host - and ping commands can be used to test DNS server functionality.
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
LUKS encryption
Network installations can be performed using the HTTP - FTP - and NFS protocols.
32. If you want a specific action to take place when user01 logs in to the system - which file would you edit?
The ping command can be used to verify connectivity to another host.
getsebool
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
You add your action to the end of the /home/user01/.bashrc file.
33. FTP is one of three protocols ______________. The other two protocols are NFS and HTTP.
schedule one-time-only jobs
used for kickstart and/or network installs
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
34. What command can you use to create a file system?
lvdisplay
mkfs.ext4
The two main config files are master.cf and main.cf.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
35. What file is used to maintain custom parameters for the kernel during system boot?
The user_list file can be used to limit which users have access to the FTP server.
mkfs.ext4
The /etc/sysctl.conf file maintains a list of custom kernel parameters that should be applied during system boot.
cat /proc/mdstat
36. How would you install a group of packages all at a single time?
By using centralized authentication - you don't need to re-create or maintain multiple accounts across every system in your organization.
Use the yum groupinstall command to install multiple packages in a single group at once.
If you shrink a volume group or logical volume - there is a chance you could lose data depending on how much you shrink the volume.
service named configtest
37. What are the two types of back-end authentication mechanisms discussed in this chapter?
Enforcing during installation
For Apache to run a secure site - the mod_ssl package is required to be installed.
This chapter described tdbsm and smbpasswd back-end authentication.
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
38. How would you view all Boolean options for the HTTP service?
semanage boolean -l
You add your action to the end of the /home/user01/.bashrc file.
LUKS encryption
getsebool -a | grep http
39. How can you verify the status of the SSH service after the system has booted?
The service command is used to start - stop - and manage system services.
The testparm command allows you to check for syntax errors in the /etc/samba/smb.conf file.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
service sshd statuts
40. What is the biggest benefit to using LVM over basic partitions?
You have the flexibility to resize and add new volumes on the fly. With basic partitions - any time that you want to make a change - you need to destroy the partition and create it again.
SELinux provides enhanced granular security for the Linux operating system.
Use the yum groupinstall command to install multiple packages in a single group at once.
setsebool -P nfs_export_all_rw=1
41. What critical step must you take after updating the kernel to a newer version?
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
Use the ps command to view processes and their CPU usage.
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
42. What is the default port that Squid runs on?
By default - Squid runs on port 3128.
service named configtest
The rpm command can operate in install - query - or verify modes.
The TFTP server uses UDP port 69.
43. How can virtual hosts be used?
LUKS encryption
The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
44. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?
The nfsstat command can be used to view NFS statistics.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
45. What port does the DHCP server listen on by default?
The DHCP server listens on port 67 by default.
The user_list file can be used to limit which users have access to the FTP server.
Apache uses port 80 for HTTP and port 443 for HTTPS.
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
46. What is the benefit to using centralized authentication?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Can you name the two commands that can be used to view the free space on the system?
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
The du and df commands are used to view available space on the system.
When the system enters into runlevel 2 - the rsyslog service has a priority of 12 when starting. Anything with a lower number (or the same number and lower first letter) starts before the rsyslog service.
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
48. What does the rdnc-confgen command do?
entering rescue mode and repairing the problem.
Apache uses port 80 for HTTP and port 443 for HTTPS.
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
You can use the authconfig-tui command or the authconfig command.
49. What is the name of the package that allows you to install VNC?
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
Version 2 is the latest and most secure version of SSH.
The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.
By default - Squid runs on port 3128.
50. What command can you use to validate the syntax of the Apache config file?
The /var/log/audit/audit.log file contains all policy violations.
service httpd configtest
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
The du and df commands are used to view available space on the system.