SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
RHCSA
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
rhcsa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What two ports should be opened on the firewall for the FTP server to function properly?
A large warning message appears indicating that the key doesn't match the host you are connecting to. You have to remove the key/host pair from the known_hosts file to proceed.
setsebool -P nfs_export_all_rw=1
The /var/log/audit/audit.log file contains all policy violations.
You must open TCP ports 20 and 21 for the FTP server to function properly.
2. What is the xinetd service used for?
If you are a hosting company or want to run multiple websites/applications from a single IP address - you can use virtual hosts to accomplish this.
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
The /proc directory. The /proc/sys directory is the place where you actually tune kernel parameters.
export one or all resources
3. What command can you use to view mounted Samba shares?
amount of RAM
The smbstatus command shows you currently mounted Samba resources.
have the same effect
The du and df commands are used to view available space on the system.
4. How can you check the currently mounted file systems?
The mount command lists all currently mounted file systems.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
The dig - host - and ping commands can be used to test DNS server functionality.
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
5. What command can you use to monitor and troubleshoot network connections?
The /etc/fstab file.
The lastlog and faillog commands are used to view user login-related events?
The xinetd daemon is used to control and/or run multiple system services. One example is a TFTP server.
The tcpdump command is used to monitor network connections on different interfaces.
6. In Red Hat Enterprise Linux 6 - the default for SELinux is _______________ (which can be changed after the installation completes). For Red Hat Enterprise Linux 5 - you were able to choose what mode you wanted SELinux to start in.
lvdisplay
Network installations can be performed using the HTTP - FTP - and NFS protocols.
Enforcing during installation
user's home directory in the /etc/skel directory
7. What command can you use to check the config file of the DHCP server?
you have access to the correct packages or repositories.
service dhcpd configtest
The lftp command can be used on a client to test FTP server connections.
A soft limit acts like an alarm - signaling you when you are reaching your limit. If you don't specify a grace period - the soft limit is the max. A hard limit is required only when a grace period exists. It is the max limit you can hit before your g
8. What are the two config files for Postfix called?
useradd -c "Jr Admin" George
The two main config files are master.cf and main.cf.
You should never use the -U option because it erases the prior kernel when updating. This leaves you with no fallback kernel should your system not boot properly.
serve both files and printers to users
9. What command and option do you use to view the description of Boolean values?
alternatives --config mta
The lftp command can be used on a client to test FTP server connections.
A virtual host is a way of hosting multiple sites using a single IP address.
semanage boolean -l
10. Do you need to write changes to the disk when using the parted command? What about fdisk?
useradd -c "Jr Admin" George
The rdnc-confgen command generates an rndc.conf file for the rndc utility.
lvdisplay
When you exit the parted utility - all your changes are automatically written to disk. With the fdisk command - you need to manually write your changes to disk for them to take effect.
11. The INPUT chain being used is the default under Red Hat Enterprise Linux 5. This rule...
When you exit the parted utility - all your changes are automatically written to disk. With the fdisk command - you need to manually write your changes to disk for them to take effect.
The NFS service uses TCP port 2049 by default.
Version 2 is the latest and most secure version of SSH.
generates errors under Red Hat Enterprise Linux 6
12. What is a swap? Is it created as a partition or device file?
The yum and rpm commands are used for package management.
The two main config files are master.cf and main.cf.
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
service sshd statuts
13. What command can you use to create your own repositories?
Upstart. The Upstart utility is now used in the boot process for Red Hat Enterprise Linux 6.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
createrepo
The last rule is always an implicit deny statement rejecting anything that wasn't matched by previous rules.
14. How would you disable SELinux protection for NFS - allowing shares to be read/write?
setsebool -P nfs_export_all_rw=1
user's home directory in the /etc/skel directory
The ping command can be used to verify connectivity to another host.
The partprobe command forces the kernel to reread the partition table. You should always call it after making any changes to your system partitions.
15. Which remote management service is installed by default?Can you name the port that it uses?
browseable option
Use the setgid flag to create the appropriate permissions (chmod 2770).
The SSH service is almost always installed by default in Red Hat. It uses TCP port 22 - and this port is open on the default firewall rules.
An ext3 file system has journaling built in to it - whereas the ext2 file system doesn't.
16. Does a DHCP server allow reserved IP addresses - If so - how?
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
Using the host option in the dhcpd.conf file allows you to reserve a client IP address based on its MAC address.
The install.log.syslog file contains messages that are generated during the installation. If you run into trouble during the installation - this is a good place to start.
The TFTP server uses UDP port 69.
17. GRUB has three stages. Can you name them?
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
browseable option
When the system enters into runlevel 2 - the rsyslog service has a priority of 12 when starting. Anything with a lower number (or the same number and lower first letter) starts before the rsyslog service.
The tcpdump command is used to monitor network connections on different interfaces.
18. What command-line program can you use to check your mail?
The lastlog and faillog commands are used to view user login-related events?
used for kickstart and/or network installs
Typing the mail or mutt command allows you to read mail from the command line.
RAID 0 (Striping) - RAID 1 (Mirror) - and RAID 5 (Striping with parity).
19. What command can you use to create a new SSL certificate?
Use the /usr/share/doc/dovecot-1.0.7/examples/mkcert.sh command after editing the /etc/pki/dovecot/dovecot-openssl.cnf file.
mkfs.ext4
Sendmail
serve both files and printers to users
20. What port does the SMTP service run on?
The SMTP service runs on TCP port 110.
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
atq
VNC is used to control a remote desktop session.
21. What is the benefit to using centralized authentication?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. Where are Yum repository config files located?
Yum repository config files (.repo files) are located in the /etc/yum.repos.d directory. You can also make direct entries into the main /etc/yum.conf file.
The du and df commands are used to view available space on the system.
choose which mode you'd like it to operate in
Public/private key authentication provides an additional layer of security because you need the correct key instead of just knowing someone's password. Passwords combined with public/private keys take the security one additional step.
23. What happens to jobs that are scheduled to run while the system is off?
semanage boolean -l
When the system starts up again - the cron service will run any jobs that were missed while the system was off. On Red Hat Enterprise Linux 5 - the anacron service handles this functionality.
VNC is used to control a remote desktop session.
defining a %pre section although it is rarely used
24. What command disables the SSH service from running when the system boots?
The dig - host - and ping commands can be used to test DNS server functionality.
service named configtest
DNS uses port 53.
chkconfig sshd off
25. What is SSH used for?
You must open TCP ports 20 and 21 for the FTP server to function properly.
support for TCP Wrappers
ifconfig
SSH is used for secure remote management of Linux systems.
26. What option at the GRUB boot menu can you use to append something to a kernel?
SELinux provides enhanced granular security for the Linux operating system.
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
generates errors under Red Hat Enterprise Linux 6
halts the system
27. The at command is used to ____________. The cron service handles reoccurring system jobs.
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
schedule one-time-only jobs
Uncomment the following line in the /etc/rsyslog.conf file: #$ModLoad imudp.so #$UDPServerRun 514
28. What command is used to create a user for Samba?
The smbpasswd command is used to create Samba users.
The install.log.syslog file contains messages that are generated during the installation. If you run into trouble during the installation - this is a good place to start.
The nfsstat command can be used to view NFS statistics.
Network installations can be performed using the HTTP - FTP - and NFS protocols.
29. How can you display all virtual guests after they're connected to a hypervisor?
A swap is scratch space on your file system used as virtual memory. A swap can be created as a partition or a device file.
The SMTP service runs on TCP port 110.
The superblock is a structure that contains metadata of the file system. If this becomes corrupt - you are in trouble.
After you connect to a hypervisor - you can use virsh list —all to list all virtual guests.
30. What is the name of the package used to install an FTP?
getsebool
The vsftpd package is used to install an FTP server.
SELinux Booleans provide restrictions to different aspects of a service.
The two main config files are master.cf and main.cf.
31. What command can be used to view the queue for at service jobs?
atq
The NFS service uses TCP port 2049 by default.
The five directories are BUILD - RPMS - SOURCES - SPECS - and SRPMS.
The gateway is incorrectly set - and the subnet of the host you are trying to reach is inaccessible.
32. What options with the yum command would you use to remove a package?
You can use the remove or erase options with yum to remove a package.
The DHCP server listens on port 67 by default.
The install.log.syslog file contains messages that are generated during the installation. If you run into trouble during the installation - this is a good place to start.
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
33. The virt-install package allows you to manage virtual machines _____________. The virt-manager package allows you to manage virtual machines via a GUI interface.
via the command line
The three utilities are: route - ping - and nslookup.
The /etc/exports file needs to contain any directory that you want to export - including which options you'd like to use as well.
After the ntpd service is stopped - you can use the ntpdate <server> command to update/sync the time.
34. What is the rndc utility used for?
The rndc utility provides a method for managing the DNS server remotely and securely.
The three utilities are: route - ping - and nslookup.
Typing the mail or mutt command allows you to read mail from the command line.
service named configtest
35. What directory is used to represent the virtual file system created by the kernel?
You can use the authconfig-tui command or the authconfig command.
The /proc directory. The /proc/sys directory is the place where you actually tune kernel parameters.
The htpasswd command can be used to password-protect a web page.
If you shrink a volume group or logical volume - there is a chance you could lose data depending on how much you shrink the volume.
36. What is the name of the section used to run scripts after a kickstart installation?
Apache uses port 80 for HTTP and port 443 for HTTPS.
By defining a %post section - you can run scripts after a kickstart installation is complete.
browseable option
getsebool -a | grep http
37. The firewall service is...
enabled by default
By entering the GRUB boot menu - you can choose the a option to append something to the kernel command-line options.
schedule one-time-only jobs
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
38. Which version of SSH should you use?
Enforcing during installation
Version 2 is the latest and most secure version of SSH.
The -t nfs option is used with the mount command to mount NFS resources.
Use the top command to view CPU and memory usage.
39. What command can you use to test the config files before starting the DNS service?
No. Red Hat Enterprise Linux 6 uses a different key to sign its packages.
you have access to the correct packages or repositories.
service named configtest
The mount command lists all currently mounted file systems.
40. The package selection screen allows you to install any software you want during the installation process as long as...
SELinux provides enhanced granular security for the Linux operating system.
A web proxy can provide multiple benefits - including security - web page caching for faster load times - and load balancing.
you have access to the correct packages or repositories.
The two main config files are master.cf and main.cf.
41. What command do you use to change the permissions on a file or directory - To change ownership?
getsebool
The anonymous_enable=YES option in the main config file allows anonymous uploads.
The two main config files are master.cf and main.cf.
The chmod command is used to change the permissions of files and directories. The chown command is used to change the ownership of files and directories.
42. What are the three modes in which the rpm command can operate?
The firewall rule is inserted into the fifth line of the iptables rules and opens up TCP port 80 (for the HTTP service) on the firewall to allow incoming connections.
For Apache to run a secure site - the mod_ssl package is required to be installed.
You can use the -q option to query an installed package. Combining grep and the -qa options - you can search among all installed packages on the system.
The rpm command can operate in install - query - or verify modes.
43. What command would you use to create a group - to add the user George to the group?
LUKS encryption
Use the groupadd command to create a group. You can then add user George with the following: usermod -G <group name> George
The grep -v ^# /etc/vsftpd/vsftpd.conf command shows you all the options currently being used with the FTP server.
DNS uses port 53.
44. What command can you use to create a file system?
mkfs.ext4
The /var/liv/dhcpd/dhcpd.leases file contains all clients IP address currently in use.
The smbpasswd command is used to create Samba users.
The smbstatus command shows you currently mounted Samba resources.
45. What is the format of the /etc/shadow file?
defining a %pre section although it is rarely used
The ping command can be used to verify connectivity to another host.
The format of the /etc/shadow file is <username>:<encrypted password>:<last passwd change>:<min>:<max>:<warn>:<inactive>:<expires>:<not used>.
The yum and rpm commands are used for package management.
46. What three components are needed to fully automate a kickstart installation?
The SMTP service runs on TCP port 110.
service httpd configtest
getsebool
By combining a TFTP server - PXE boot - and DHCP server - you can fully automate the kickstart installation process.
47. Through its main config file - SSH can be configured to...
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. Are additional packages besides httpd required for a secure website - If so - what are they?
user's home directory in the /etc/skel directory
The /etc/fstab file.
choose which mode you'd like it to operate in
For Apache to run a secure site - the mod_ssl package is required to be installed.
49. FTP is one of three protocols ______________. The other two protocols are NFS and HTTP.
used for kickstart and/or network installs
user's home directory in the /etc/skel directory
choose which mode you'd like it to operate in
The VNC package for Red Hat Enterprise Linux 6 is tiger-vnc.
50. What is a virtual host?
Use the resize2fs command to grow a file system.
Stage 1: During this stage - the primary bootloader is read into memory by the BIOS from the MBR. Stage 1.5: During this stage - the bootloader is read into memory by the stage 1 bootloader (only if necessary). Stage 2: During this stage - the bootlo
The /var/log/audit/audit.log file contains all policy violations.
A virtual host is a way of hosting multiple sites using a single IP address.