Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Runlevel 0 ___________. Runlevel 6 reboots the system.






2. What option would you use to query an installed package using the rpm command?






3. What two commands are special for dealing with user login events?






4. What command can you use to test connectivity to another host?






5. How do you run a command with elevated privileges?






6. What is the format of the /etc/shadow file?






7. What command and options can you use to update the time?






8. What is the difference between the update (-U) and install (-i) options when using rpm to update the kernel?






9. A service needs to have _______________ to be able to use it.






10. What does the rdnc-confgen command do?






11. What is the benefit to using centralized authentication?


12. What two ports should be opened on the firewall for the FTP server to function properly?






13. What is VNC?






14. Which remote management service is installed by default?Can you name the port that it uses?






15. What command can you use to create a password-protected page?






16. What port does NFS use by default?






17. For Red Hat Enterprise Linux 6 - SELinux comes set up in enforcing mode. When installing Red Hat Enterprise Linux 5 - you have the option to...


18. What are the three items that make up LVM?






19. Which file shows you all the client IP addresses?






20. What critical step must you take after updating the kernel to a newer version?






21. What command disables the SSH service from running when the system boots?






22. How can you change the security context of a directory to work with Apache?






23. What command is used to create a user for Samba?






24. Do you need to write changes to the disk when using the parted command? What about fdisk?






25. What is a swap? Is it created as a partition or device file?






26. Are additional packages besides httpd required for a secure website - If so - what are they?






27. What command can you use to create your own repositories?






28. Can you name the two commands that can be used to view the free space on the system?






29. What command can you use to create a file system?






30. What protocols are used with Dovecot?






31. Through its main config file - SSH can be configured to...


32. SSH does...






33. What is the biggest benefit to using LVM over basic partitions?






34. What command can you use to get information about logical volumes?






35. What two commands are used for package management?






36. What is the rndc utility used for?






37. What option is used to allow anonymous uploads to the FTP server?






38. What command can you use to monitor and troubleshoot network connections?






39. Most boot issues can be resolved by...






40. What command is used to show all services being controlled by the xinetd daemon?






41. If you want a specific action to take place when user01 logs in to the system - which file would you edit?






42. What commands can you use to add a client machine to an LDAP server?






43. What three components are needed to fully automate a kickstart installation?






44. What is the difference between an A record and a PTR record?






45. What three protocols can you use to perform network installations?






46. Does a DHCP server allow reserved IP addresses - If so - how?






47. Samba servers can...






48. What is the name of the section used to run scripts after a kickstart installation?






49. Should you allow remote root access - Why or why not?


50. What command (and options) can be used to create a user named George with the description "Jr Admin"?