Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > RedHat > RHCT > RH133

RH133 Red Hat Linux System Administration Question and Answers

Question # 4

You want to temporarily change your primary group to another group of which you are a member.

In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

A.

chgrp

B.

newgrp

C.

chmod

D.

chown

Full Access
Question # 5

Which of the following commands is used to make a swap active after creating a new SWAP partition?

A.

mkswap

B.

swapon

C.

fdisk

D.

mkfs

Full Access
Question # 6

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?

A.

/var/log/wtmp

B.

/var/log/dmesg

C.

/var/log/bootmsg

D.

/var/log/messages

Full Access
Question # 7

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:

rwxr--r—

You want to add a sticky bit to the file. Which of the following commands will you use?

A.

chmod 7744 report

B.

chmod 1744 report

C.

chmod 2744 report

D.

chmod 4744 report

Full Access
Question # 8

You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?

A.

find size +50M

B.

find -size 50M

C.

find -size -50M

D.

find -size +50M

Full Access
Question # 9

In Linux, which of the following prompts does the Shell display to indicate that the logged in user is Superuser?

A.

$

B.

#

C.

:

D.

&

Full Access
Question # 10

Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?

A.

crond

B.

apmd

C.

autofs

D.

halt

Full Access
Question # 11

Which of the following commands can be used to view addresses assign to each interface?

A.

ping

B.

ifconfig

C.

ip addr show (interface name)

D.

tracert

Full Access
Question # 12

Which of the following commands is used to install a rpm package?

A.

rpm -Ivh packagename

B.

rpm -Uvh packagename

C.

rpm -ivh packagename

D.

rpm -i packagename

Full Access
Question # 13

Which of the following commands can be used to burn a boot.iso file to CD?

A.

bootrecord

B.

cp boot.iso

C.

cdrecord

D.

mount boot.iso

Full Access
Question # 14

Which command creates a database that describes kernel's modules dependencies?

A.

depmod

B.

lsmod

C.

rmmod

D.

modprobe

Full Access
Question # 15

You want to format a floppy disk in a Linux server. Which of the following commands will you use?

A.

fsck /dev/fd0

B.

fdisk /dev/fd0

C.

mkfs /dev/fd0

D.

mount /dev/fd0

Full Access
Question # 16

Which of the following commands is used to create physical volumes in Linux?

A.

lvextend

B.

vgcreate

C.

pvcreate

D.

fdisk

Full Access
Question # 17

Which of the following run levels start the system in single user mode?

Each correct answer represents a complete solution. Choose all that apply.

A.

0

B.

single

C.

S

D.

s

E.

1

Full Access
Question # 18

Which of the following files does mount command read to determine which options should be used when mounting the specified device?

A.

/etc/xinetd.conf

B.

/etc/inittab

C.

/etc/auto.master

D.

/etc/fstab

Full Access
Question # 19

What is the minimum processor requirement to install Red Hat in GUI mode?

A.

346 MHz Pentium III

B.

250 MHz Pentium I

C.

400MHz Pentium II

D.

200 MHz Pentium II

Full Access
Question # 20

Which of the following commands is used to see IP address, MAC address, and default gateway of a Linux system?

A.

traceroute

B.

ifconfig

C.

ipconfig

D.

ping

Full Access
Question # 21

What is the correct location of the Linux kernel?

A.

/boot/kernal

B.

/boot/vmlinux

C.

/boot/vmlinuz

D.

/boot/bzImage

Full Access
Question # 22

Which of the following files defines which services to start?

A.

/etc/inittab

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc

D.

/etc/rc.d/init.d

Full Access
Question # 23

Which of the following is a configuration file used to configure TCP wrappers?

A.

/etc/hosts.allow

B.

/etc/resolve.conf

C.

/etc/tcpwrapper

D.

/etc/hosts.conf

Full Access
Question # 24

When you are installing RHEL on a system how much swap space should be given in partition?

A.

Half of the RAM

B.

Equal to the RAM

C.

One fourth of the RAM

D.

Twice of RAM

Full Access
Question # 25

Which of the following files contains GIDs?

A.

/etc/passwd

B.

/etc/shadow

C.

/etc/usr

D.

/etc/group

Full Access
Question # 26

Which of the following files is used to view the current status of RAID devices in Linux?

A.

/proc/mdstat

B.

/proc/stat

C.

/proc/meminfo

D.

/proc/mounts

Full Access
Question # 27

You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?

A.

rpm -ivh

B.

rpm -Uvh

C.

rpm -evh

D.

rpm -qvh

Full Access
Question # 28

Which of the following utilities is used to set ACL for files and directories?

A.

enable acl

B.

setacl

C.

setfacl

D.

getfacl

Full Access
Question # 29

John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server. John wants to give the following file permissions to the imp.c file:

l Read, Write, and Execute permissions to the owner

l Read and Write permissions to groups

l Read Only permissions to other users

Which of the following commands will John use to accomplish the task?

A.

chmod 765

B.

chmod 777

C.

chmod 712

D.

chmod 764

Full Access
Question # 30

You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.

A.

mkswap /dev/hdb2

B.

swapon /dev/hdb2

C.

mount

D.

parted

Full Access
Question # 31

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?

A.

mount

B.

e2fsck

C.

fsck

D.

mkfs

Full Access
Question # 32

What is the minimum RAM requirement for installing Red Hat in GUI mode?

A.

1GB

B.

512 MB

C.

128MB

D.

64MB

Full Access
Question # 33

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

vi /etc/passwd

B.

vi /etc/shadow

C.

useradd Trinity

D.

passwd Trinity

E.

Trinity:x:505:505::/home/Trinity:/sbin/nonlogin

Full Access
Question # 34

You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

rpm -e

B.

rpm -K

C.

rpm --checksig

D.

rpm -V

Full Access
Question # 35

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder? Each correct answer represents a part of the solution. Choose all that apply.

A.

No permission to others.

B.

Read permission to the owner.

C.

Read and Execute permissions to the group.

D.

Read, Write, and Execute permissions to the owner and the group.

E.

Read permission to the group.

F.

Read and Execute permissions to the owner.

Full Access
Question # 36

You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?

A.

mkfs

B.

mount

C.

scanfs

D.

fsck

Full Access
Question # 37

Which of the following statements are true about rsync?

Each correct answer represents a complete solution. Choose all that apply.

A.

It can use any transparent remote shell, including ssh or rsh.

B.

It does not support for anonymous or authenticated rsync daemons.

C.

It does not require super-user privileges.

D.

It supports for copying links, devices, owners, groups, and permissions.

Full Access
Question # 38

What does the third field in the process entry of the /etc/inittab file define?

A.

It defines the name of the process to be executed.

B.

It is an identification number of the process entry.

C.

It defines the action to be taken by the process.

D.

It defines the run level of the process.

Full Access
Question # 39

In Linux, which of the following files contains group information?

A.

/etc/gp

B.

/etc/group

C.

/etc/login.defs

D.

/etc/passwd

Full Access
Question # 40

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure

X?

A.

root/videoconf

B.

root/x11/xf86config

C.

etc/x11/xf86config

D.

etc/videoconf

Full Access
Question # 41

Which of the following rpmbuild commands is used to print debugging information of an rpm package?

A.

rpm -vv

B.

rpm --pipe

C.

rpm -V zip

D.

rpm –quiet

Full Access
Question # 42

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.

Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named RickGroup.txt. Which of the following commands will you use to accomplish the task?

A.

ls /etc/group rick > RickGroup.txt

B.

grep /etc/group rick > RickGroup.txt

C.

ls rick /etc/group > RickGroup.txt

D.

grep rick /etc/group > RickGroup.txt

Full Access
Question # 43

Fill in the blank with the appropriate tool.

_________is a network diagnostic tool that combines the functionality of the traceroute and ping programs in a single network diagnostic tool.

A.

mtr

Full Access
Question # 44

In, which of the following directories all configuration files are usually stored?

A.

/boot

B.

/var

C.

/etc

D.

/bin

Full Access
Question # 45

Which of the following commands is used to create a new group in a Linux server?

A.

MOUNT

B.

ADDGROUP

C.

USERADD

D.

GROUPADD

Full Access
Question # 46

You work as an Administrator for McNeil Inc. The company has a Linux-based network. You are logged in as a standard user on your client computer. You have started a process 1001 as a root user. You want to kill the process. Which of the following commands will you use to accomplish the task?

A.

kill 1001 /SU

B.

su -c "kill 1001"

C.

kill 1001

D.

killall 1001

Full Access
Question # 47

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to decompress a gZipped tarball. Which of the following commands will John use to accomplish this task?

A.

tar -cvf

B.

tar -zxvf

C.

tar -xvf

D.

tar -jzvf

Full Access
Question # 48

You have made some changes in the /etc/inittab file. Now, you want to make changes take effect without rebooting the operating system. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

init S

B.

init Q

C.

init q

D.

init s

Full Access
Question # 49

Which of the following mke2fs command parameters is used to read bad blocks from a given file?

A.

-I

B.

-N

C.

-c

D.

-m

Full Access
Question # 50

What is the maximum number of partitions that Linux kernel supports for IDE drives?

A.

50

B.

15

C.

74

D.

63

Full Access