Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What command can you use to test the config files before starting the DNS service?






2. What option is used to allow anonymous uploads to the FTP server?






3. What are the three items that make up LVM?






4. The package selection screen allows you to install any software you want during the installation process as long as...






5. What command can you use to create a new SSL certificate?






6. What option needs to be used with the mount command to mount an NFS resource?






7. Before you work with quotas - what do you need to do to the file system?






8. Red Hat Enterprise Linux 6 is the only version that officially supports _______






9. What are the two types of back-end authentication mechanisms discussed in this chapter?






10. Can you name the two commands that can be used to view the free space on the system?






11. What command and options can you use to update the time?






12. How would you disable SELinux protection for NFS - allowing shares to be read/write?






13. What option at the GRUB boot menu can you use to append something to a kernel?






14. What directory is used to represent the virtual file system created by the kernel?






15. What is the main config file for the DHCP service?






16. The ____________ is available for each share.






17. Through its main config file - SSH can be configured to...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. What are the three different types of RAID described in this chapter?






19. What is the format of the /etc/shadow file?






20. Which log file is used to keep track of policy violations?






21. What is the name of the package that allows you to install VNC?






22. In Red Hat Enterprise Linux 6 - the default for SELinux is _______________ (which can be changed after the installation completes). For Red Hat Enterprise Linux 5 - you were able to choose what mode you wanted SELinux to start in.






23. The INPUT chain being used is the default under Red Hat Enterprise Linux 5. This rule...






24. What does the following firewall rule accomplish: iptables -I INPUT 5 -p tcp -m tcp --dport 80 -j ACCEPT?






25. What are the side effects of shrinking a volume group or logical volume?






26. How do you run a command with elevated privileges?






27. What command do you use to report information on quota usage?






28. What is the top command used for?






29. What three components are needed to fully automate a kickstart installation?






30. What is the point of using SELinux?






31. Before you work with ACLs - what do you need to do to the file system?






32. What command can you use to view system processes and their CPU usage?






33. What command is used to create an RPM package?






34. What is the name of the package used to install an FTP?






35. What are the three modes in which the rpm command can operate?






36. What command can you use to check the config file of the DHCP server?






37. What file is used to maintain custom parameters for the kernel during system boot?






38. What is the difference between an A record and a PTR record?






39. Runlevel 0 ___________. Runlevel 6 reboots the system.






40. A slave DNS server provides...






41. For Red Hat Enterprise Linux 6 - SELinux comes set up in enforcing mode. When installing Red Hat Enterprise Linux 5 - you have the option to...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. What is the benefit of using public/private key authentication?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. What command can you use to manage system services?






44. What port does NFS use by default?






45. What is a gateway used for on a network?






46. What command can you use to monitor and troubleshoot network connections?






47. What happens if a host changes its IP address and the keys don't match?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. What does ifconfig 172.168.1.100 netmask 255.255.255.0 eth1 do?






49. What command can you use to change the context of files?






50. SSH does...