Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What command-line program can you use to check your mail?






2. What command displays your current interfaces and IP address?






3. What is the xinetd service used for?






4. If a package is built on an RHEL6 system and deployed to a custom RHEL5 repository - are RHEL5 systems able to use it?






5. How can you check the currently mounted file systems?






6. The firewall service is...






7. What command can you use to create a password-protected page?






8. What command do you use to report information on quota usage?






9. Explain the difference between soft and hard limits in quotas.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. Most boot issues can be resolved by...






11. What command do you use to change the permissions on a file or directory - To change ownership?






12. A service needs to have _______________ to be able to use it.






13. Before you work with ACLs - what do you need to do to the file system?






14. Editing the /etc/xinetd.d/tftp file and enabling the service are the same as running the chkconfig tftp on command. Both of these actions...






15. How would you install a group of packages all at a single time?






16. What two commands are used for package management?






17. What command is used to change the mail server from Sendmail to Postfix (useful only if you have both installed)?






18. What is the name of the package that allows you to install VNC?






19. What are the three modes in which the rpm command can operate?






20. What command can you use to view system processes and their CPU usage?






21. SSH does...






22. By default - what is the path to a user's home directory?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


23. What are the three items that make up LVM?






24. FTP is one of three protocols ______________. The other two protocols are NFS and HTTP.






25. What does S12rsyslog in the /etc/rc.d/rc2.d directory mean?






26. What port does the DHCP server listen on by default?






27. What is NAT - How is it used?






28. What file is used to maintain custom parameters for the kernel during system boot?






29. What command can you use to get information about logical volumes?






30. The INPUT chain being used is the default under Red Hat Enterprise Linux 5. This rule...






31. What command disables the SSH service from running when the system boots?






32. What command can be used to easily list all the options in the FTP main config file?






33. What protocols are used with Dovecot?






34. What two commands are special for dealing with user login events?






35. What are the side effects of shrinking a volume group or logical volume?






36. How would you view all Boolean options for the HTTP service?






37. What does the partprobe command do?






38. Samba servers can...






39. What is the difference between an ext2 and ext3 file system?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. To grow a file system






41. What critical step must you take after updating the kernel to a newer version?






42. What command can you use to view the current ACL on a file?






43. What command and options can you use to update the time?






44. What command (and options) can be used to create a user named George with the description "Jr Admin"?






45. What does ifconfig 172.168.1.100 netmask 255.255.255.0 eth1 do?






46. What option would you use to query an installed package using the rpm command?






47. Which log file is used to keep track of policy violations?






48. What is the format of the /etc/shadow file?






49. Which file contains all messages generated during installation that can be used for troubleshooting if the need arises?






50. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?