Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the two config files for Postfix called?






2. What command is used to show all services being controlled by the xinetd daemon?






3. How would you install a group of packages all at a single time?






4. A service needs to have _______________ to be able to use it.






5. What does virsh reboot Client04 do?






6. What is PAM used for?






7. Before you work with ACLs - what do you need to do to the file system?






8. What command and option do you use to view the description of Boolean values?






9. What command-line program can you use to check your mail?






10. What command can you use to create a new SSL certificate?






11. How can you verify the status of the SSH service after the system has booted?






12. What command would you use to create a group - to add the user George to the group?






13. What does it mean if you ping a host and you receive the response Destination Unreachable?






14. What command can be used to easily list all the options in the FTP main config file?






15. The ____________ is available for each share.






16. What command disables the SSH service from running when the system boots?






17. What command can you use to test the config files before starting the DNS service?






18. What option would you use to query an installed package using the rpm command?






19. How can you change the security context of a directory to work with Apache?






20. What port does the Apache web server run on - What about HTTPS?






21. What command can you use to validate the syntax of the Apache config file?






22. What are the side effects of shrinking a volume group or logical volume?






23. What is the difference between an ext2 and ext3 file system?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. What command can you use to view system processes and their CPU usage?






25. What is the benefit of using public/private key authentication?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. The virt-install package allows you to manage virtual machines _____________. The virt-manager package allows you to manage virtual machines via a GUI interface.






27. The old SysInit scripts have been replaced in Red Hat Enterprise Linux 6 for what new boot utility?






28. What command can you use to change the context of files?






29. What happens if you call the command from question 3 with the -c option after it has already been run?






30. What are SELinux Booleans?






31. What is SSH used for?






32. How can you display all virtual guests after they're connected to a hypervisor?






33. What port must be opened on the firewall for DNS?






34. What file needs to be edited so that the system will mount a file system at boot time?






35. What are the three different types of RAID described in this chapter?






36. What is a virtual host?






37. Where are Yum repository config files located?






38. What three protocols can you use to perform network installations?






39. A slave DNS server provides...






40. For Red Hat Enterprise Linux 6 - SELinux comes set up in enforcing mode. When installing Red Hat Enterprise Linux 5 - you have the option to...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


41. If you want a specific action to take place when user01 logs in to the system - which file would you edit?






42. The ______________ for Red Hat Enterprise Linux 5 or 6 includes the use of LVM.






43. What command do you use to change the permissions on a file or directory - To change ownership?






44. What is the benefit to using centralized authentication?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. What port on the firewall needs to be open for the TFTP server to work?






46. What command can you use to create a password-protected page?






47. What are the two types of back-end authentication mechanisms discussed in this chapter?






48. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?






49. What command displays your current interfaces and IP address?






50. What is the biggest benefit to using LVM over basic partitions?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests