SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the main config file for the DHCP service?
Using the chcon command - you can change the context of a file to work with Apache.
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
support TCP Wrappers
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
2. How can you verify the status of the SSH service after the system has booted?
The TFTP server uses UDP port 69.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
serve both files and printers to users
service sshd statuts
3. What does the partprobe command do?
The mount command lists all currently mounted file systems.
atq
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
4. Can you name three utilities that can be used for network or DNS client troubleshooting?
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
The three utilities are: route - ping - and nslookup.
serve both files and printers to users
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
5. A slave DNS server provides...
The superblock is a structure that contains metadata of the file system. If this becomes corrupt - you are in trouble.
rpcbind service
load balancing and redundancy benefits
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
6. What command can you use to test connectivity to another host?
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
The lastlog and faillog commands are used to view user login-related events?
The ping command can be used to verify connectivity to another host.
Apache uses port 80 for HTTP and port 443 for HTTPS.
7. What is the superblock used for?
LUKS encryption
The user_list file can be used to limit which users have access to the FTP server.
support TCP Wrappers
The superblock is a structure that contains metadata of the file system. If this becomes corrupt - you are in trouble.
8. What command can you use to create your own repositories?
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
createrepo
Sendmail
setsebool -P nfs_export_all_rw=1
9. What command can you use to monitor and troubleshoot network connections?
The /etc/fstab file.
The tcpdump command is used to monitor network connections on different interfaces.
This command reboots virtual guest Client04.
The three utilities are: route - ping - and nslookup.
10. Which file shows you all the client IP addresses?
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
getsebool -a | grep http
The TFTP server uses UDP port 69.
11. What is the /var/lib/nfs/etab file used for?
enabled by default
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
The -t nfs option is used with the mount command to mount NFS resources.
The vsftpd package is used to install an FTP server.
12. What happens to jobs that are scheduled to run while the system is off?
Use the resize2fs command to grow a file system.
The three utilities are: route - ping - and nslookup.
The DHCP server listens on port 67 by default.
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
13. What is PAM used for?
chkconfig xinetd --list
PAM is used as a modular way to leverage security. In this chapter - the main function we discussed was for managing password policies and complexity.
The dig - host - and ping commands can be used to test DNS server functionality.
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
14. Samba servers can...
serve both files and printers to users
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
used for kickstart and/or network installs
Enforcing during installation
15. What is a virtual host?
The tcpdump command is used to monitor network connections on different interfaces.
service named configtest
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
A virtual host is a way of hosting multiple sites using a single IP address.
16. What critical step must you take after updating the kernel to a newer version?
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
service dhcpd configtest
setsebool -P nfs_export_all_rw=1
You must ensure that the /boot/grub/grub.conf file has the new entry for your newly updated kernel to be able to boot into it.
17. What command can you use to view the current ACL on a file?
getfacl
LUKS encryption
enabled by default
you have access to the correct packages or repositories.
18. For Red Hat Enterprise Linux 6 - SELinux comes set up in enforcing mode. When installing Red Hat Enterprise Linux 5 - you have the option to...
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. What does the rdnc-confgen command do?
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
entering rescue mode and repairing the problem.
defining a %pre section although it is rarely used
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
20. What option needs to be used with the mount command to mount an NFS resource?
The -t nfs option is used with the mount command to mount NFS resources.
service httpd configtest
Use the resize2fs command to grow a file system.
This chapter described tdbsm and smbpasswd back-end authentication.
21. What command can you use to create a file system?
mkfs.ext4
The virsh command is used to manage virtual guests.
This chapter described tdbsm and smbpasswd back-end authentication.
Apache uses port 80 for HTTP and port 443 for HTTPS.
22. What command can you use to create a new SSL certificate?
service named configtest
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
23. What command is used to create an RPM package?
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
rpmbuild
The nfsstat command can be used to view NFS statistics.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
24. What command would you use to create a group - to add the user George to the group?
amount of RAM
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
The rndc utility provides a method for managing the DNS server remotely and securely.
The smbstatus command shows you currently mounted Samba resources.
25. What command is used to change the mail server from Sendmail to Postfix (useful only if you have both installed)?
SSH is used for secure remote management of Linux systems.
alternatives --config mta
A virtual host is a way of hosting multiple sites using a single IP address.
service sshd statuts
26. How can virtual hosts be used?
The /var/lib/nfs/etab file is used to keep track of currently exported resources.
enabled by default
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
27. What port does NFS use by default?
service named configtest
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
The NFS service uses TCP port 2049 by default.
Dovecot supports the POP3 - POP3S - IMAP - and IMAPS protocols.
28. What command can you use to query information from the kernel about RAID arrays?
You can use the authconfig-tui command or the authconfig command.
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
The du and df commands are used to view available space on the system.
cat /proc/mdstat
29. SSH does...
The service command is used to start - stop - and manage system services.
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
support TCP Wrappers
Physical volumes - volume groups - and logical volumes.
30. Can you put your /boot partition on a RAID 5 array?
A user's home directory is created under the /home directory.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
The virsh command is used to manage virtual guests.
This is actually a trick question because the answer could go either way. In this chapter - we discussed only software RAID setups - in which case the answer is no. If - however - you were using a hardware RAID 5 - the answer would be yes.
31. What is the xinetd service used for?
serve both files and printers to users
lvdisplay
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
The print option is used with both the fdisk and parted commands to display the current partition tables.
32. Before you work with quotas - what do you need to do to the file system?
The yum and rpm commands are used for package management.
The file system where quotas will be implemented must be mounted with the usrquota and grpquota options before quotas will work properly.
halts the system
The smbpasswd command is used to create Samba users.
33. Which version of SSH should you use?
createrepo
LUKS encryption
rpcbind service
Version 2 is the latest and most secure version of SSH.
34. What benefit does a web proxy provide to your network?
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
When the system enters into runlevel 2 - the rsyslog service has a priority of 12 when starting. Anything with a lower number (or the same number and lower first letter) starts before the rsyslog service.
This command reboots virtual guest Client04.
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
35. The old SysInit scripts have been replaced in Red Hat Enterprise Linux 6 for what new boot utility?
By using centralized authentication - you don't need to re-create or maintain multiple accounts across every system in your organization.
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
have the same effect
The yum and rpm commands are used for package management.
36. What is a gateway used for on a network?
This command reboots virtual guest Client04.
user's home directory in the /etc/skel directory
A gateway is used as an entry and exit point for a subnet on a network. To contact hosts outside your subnet - you need to pass through a gateway.
Apache uses port 80 for HTTP and port 443 for HTTPS.
37. How can you check the currently mounted file systems?
chkconfig sshd off
Use the yum groupinstall command to install multiple packages in a single group at once.
By default - the rndc utility listens on port 953.
The mount command lists all currently mounted file systems.
38. What happens if you call the command from question 3 with the -c option after it has already been run?
A user's home directory is created under the /home directory.
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
used for kickstart and/or network installs
The file that stores usernames and their encrypted passwords is erased and replaced with a new file.
39. What port on the firewall needs to be open for the TFTP server to work?
The mount command lists all currently mounted file systems.
Enforcing during installation
The TFTP server uses UDP port 69.
used for kickstart and/or network installs
40. What command can you use to check the config file of the DHCP server?
repquota
service dhcpd configtest
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
via the command line
41. What command (and options) can be used to create a user named George with the description "Jr Admin"?
The superblock is a structure that contains metadata of the file system. If this becomes corrupt - you are in trouble.
useradd -c "Jr Admin" George
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
42. What command can you use to get information about logical volumes?
cat /proc/mdstat
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
amount of RAM
lvdisplay
43. Place all files you want added to a _______________ during creation.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. What two commands are special for dealing with user login events?
The ping command can be used to verify connectivity to another host.
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
entering rescue mode and repairing the problem.
The lastlog and faillog commands are used to view user login-related events?
45. What does virsh reboot Client04 do?
The htpasswd command can be used to password-protect a web page.
The /etc/dhcp/dhcpd.conf file is the main config file for the DHCP service.
Kickstart supports both basic and advanced partitioning (RAID/LVM).
This command reboots virtual guest Client04.
46. Where are Yum repository config files located?
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
The /proc directory. The /proc/sys directory is the place where you actually tune kernel parameters.
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
47. Through its main config file - SSH can be configured to...
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. The package selection screen allows you to install any software you want during the installation process as long as...
you have access to the correct packages or repositories.
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
SELinux Booleans provide restrictions to different aspects of a service.
The mount command lists all currently mounted file systems.
49. In Red Hat Enterprise Linux 6 - the default for SELinux is _______________ (which can be changed after the installation completes). For Red Hat Enterprise Linux 5 - you were able to choose what mode you wanted SELinux to start in.
You can use the remove or erase options with yum to remove a package.
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
Use the chkconfig command to enable or disable services during the boot process. The on option enables the service and off disables it.
Enforcing during installation
50. The exportfs command is used to...
service dhcpd configtest
export one or all resources
PAM is used as a modular way to leverage security. In this chapter - the main function we discussed was for managing password policies and complexity.
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.