Wednesday, March 6, 2013

Red Hat Linux System Administration



1.      John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.

A)    repquota
B)     quotaon
C)    warnquota
D)    edquota
E)     quotaoff

Answer: C,D

2.      Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

A)    find /etc -name *.txt
B)     find start -dir -min -60
C)    find start -dir -cmin -60
D)    find start -cmin -60

Answer: C

3.      You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.

A)    mkswap /dev/hdb2
B)     swapon /dev/hdb2
C)    mount
D)    parted

Answer: A,B,D

4.      You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network .You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know what some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?

A)    A high load average
B)     A high process ID
C)    A low load average
D)    A low CPU time
E)     A high CPU time

Answer: E

5.      You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?

A)    2
B)     0
C)    1
D)    3

Answer: C

6.      Which of the following commands can be used to compress a file? Each correct answer represents a complete solution. Choose all that apply.

A)    gzip
B)     compress
C)    tar
D)    zip

Answer: A,B,D

7.      You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following boot loaders does not require to be rewritten after the configuration of the kernel has been changed?

A)    GRUB
B)     BOOTP
C)    LILO
D)    ELILO
             
Answer: A

8.      Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

A)    fsck -P
B)     fsck -f
C)    fsck -A
D)    fsck -y

Answer: C

9.      After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?

A)    /usr/shadow
B)     /etc/passwd
C)    /usr/passwd
D)    /etc/shadow

Answer: D

10.  You work as a Software Engineer for McNiel Inc. The company has a Linux-based network. The company has 150 Engineers. The root user has configured quota limits for each user. You want to view quota limits for your system. Which of the following commands will you use to accomplish this task?

A)    repquota -a
B)     quota -v
C)    quotacheck
D)    edquota

Answer: B

11.  Which of the following commands is used to create a user account for a new user?

A)    USERMOD
B)     MOUNT
C)    USERADD
D)    CRUSER

Answer: C

12.  You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are configuring a server that will be used as a file server. You want to install an RPM package, named FILELOCATOR, on the server. You want to check whether the package is already installed. Which of the following commands will you use?

A)    grep FILELOCATOR
B)     find -q rpm |grep FILELOCATOR
C)    rpm -qa | grep FILELOCATOR
D)    find FILELOCATOR

Answer: C

13.  By default, which of the following commands configures the current run level?

A)    chkconfig
B)     pstree
C)    service
D)    ntsysv

Answer: D
14.  When installing RHEL in the graphical interface, which of the following switches can be used to specify a resolution?

A)    lowers
B)     vnc
C)    resolution
D)    skipddc

Answer: C

15.  You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?
A)    A. rpm -ivh
B)     B. rpm -evh
C)    C. rpm -qvh
D)    D. rpm -Uvh

Answer: D

16.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to run the cc process at runlevel three. If the order of execution of cc command is 43, which of the following commands will John use to accomplish his task?

A)    ln -s /etc/init.d/cc /etc/rc.d/rc3.d/K43cc
B)     ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/K43cc
C)    ln -s /etc/rc.d/cc /etc/rc.d/rc3.d/s43cc
D)    ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/S43cc

Answer: D

17.  Which of the following commands displays a module name or filename and associated information, such as the authors name, license, description, module version, dependencies, parameters, etc?

A)    modprobe
B)     lsmod
C)    modprob
D)    modinfo

Answer: D

18.  After creating the swap area, which of the following commands will you need to run to start using it?

A)    mkswap
B)     mkfs
C)    swapon
D)    swapoff

Answer: C

19.  You work as a Network Administrator for Secure Web Inc. The company has a Linux-based network. The network has a mixed set of client operating systems. You want to format a new hard disk drive. The drive will have only one partition. Both the Linux and Windows operating systems will access the partition. Which of the following file systems will you use?

A)    VFAT
B)     XFS
C)    REISER
D)    EXT3

Answer: A

20.  What is the minimum RAM requirement for installing Red Hat in GUI mode?

A)    1GB
B)     512 MB
C)    128MB
D)    64MB

Answer: C

21.  Which of the following commands can be used to modify kernel parameters at
runtime?

A)    sync
B)     sysctl
C)    mkinitrd
D)    lsdev

Answer: B

22.  You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A)    rpm -e
B)     rpm -K
C)    rpm --checksig
D)    rpm -V

Answer: B,C,D

23.  Which of following options will you use to force mtr to display numeric IP numbers and not try to resolve the host names?
A)    -t
B)     -n
C)    -l
D)    -p

Answer: B

24.  Which of the following statements are true about kernel modules?  Each correct answer represents a complete solution. Choose all that apply.

A)    Kernel modules do not support executable loaders.
B)     The kernel module contains extra kernel codes that may be loaded after the loading of the base kernel. Only a minimal resident kernel is loaded into memory at boot time.
C)    Kernel modules do not support the device drivers, network drivers, and file system drivers.
D)    Whenever a user requests a feature that is not present in the resident kernel, a kernel module is dynamically loaded into memory.

Answer: B,D

25.  You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

A)    chgrp
B)     newgrp
C)    chmod
D)    chown

Answer: B

26.  You want to make Rick an owner of the files TRADE1.TXT and TRDREPORT.TXT. Which of the following commands will you use to accomplish this?

A)    chown rick TRADE1.TXT TRDREPORT.TXT
B)     chgrp rick TRADE1.TXT + TRDREPORT.TXT
C)    chown rick TRADE1.TXT + TRDREPORT.TXT
D)    chgrp rick TRADE1.TXT TRDREPORT.TXT

Answer: A

27.  You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

A)    vi /etc/passwd
B)     vi /etc/shadow
C)    useradd Trinity
D)    passwd Trinity
E)     Trinity:x:505:505::/home/Trinity:/sbin/nonlogin

Answer: A,B,C,D,E

28.  Which of the following commands can be used to check the errors of the ext2 and ext3 file systems? Each correct answer represents a complete solution. Choose two.

A)    fsck --ext2
B)     fsck.ext3
C)    fsck --ext3
D)    e2fsck

Answer: B,D

29.  Which of the following statements is true about fdisk command?

A)    It is used to build a Linux file system on a device, usually a hard disk partition.
B)     It is used to create, change, delete, or display current partitions on the hard disk.
C)    It is used to check and optionally repair one or more Linux file systems.
D)    It displays or changes thefilesystem label on the ext2 filesystem located on device.

Answer: B

30.  You have recently been appointed as a Network Administrator for Rick International Inc. The company has a Linux-based network. You have to print an important file named secure.txt urgently. You therefore want to know what printers are currently configured on your computer and how you can connect to them. Which of the following commands will you use to accomplish the task?

A)    lpstat -s
B)     lpstat -d
C)    lpr
D)    lpstat -p

Answer: A

31.  You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?

A)    rpm --erase --allmatches
B)     rpm -e --allmatches
C)    rpm -e --noscript
D)    rpm -e --nodeps

Answer: D

32.  During the boot process of a Linux computer, which of the following daemons is called after the kernel is loaded?

A)    LPD
B)     TELNETD
C)    INIT
D)    RLOGIND

Answer: C

33.  You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory named Sales on a file server. David, a Sales Manager, has to use this directory to keep sales reports. David reports that he is unable to save his reports in the directory. When you list the directory using the LS command, you get the following result: drwxr-xrx 2 root root 2048 Jan 2 2006 Sales What is the most likely cause?

A)    The Sales directory is not properly mounted.
B)     David is working on his local computer's login.
C)    The Sales directory has been deleted by accident.
D)    David does not have the Write permission on the directory.

Answer: D

34.  You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

A)    lvreduce
B)     resize2fs
C)    lvsize
D)    reduce2fs

Answer: A,B

35.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?

A)    init 3
B)     init 6
C)    init 0
D)    shutdown -r now
E)     reboot -i

Answer: E

36.  You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:
rwxr--r- You want to add a sticky bit to the file. Which of the following commands will you use?

A)    chmod 2744 report
B)     chmod 1744 report
C)    chmod 7744 report
D)    chmod 4744 report

Answer: B

37.  Which of the following statements is true about Linux kernel? Each correct answer represents a complete solution. Choose all that apply.

A)    It constitutes the core part of the Linux operating system.
B)     It detects hardware resources and boots up the system.
C)    It allocates memory on behalf of running process.
D)    It does not verify firewall rules

Answer: A,B,C

38.  Which of the following commands is used to make a swap active after creating a new SWAP partition?

A)    mkswap
B)     swapon
C)    fdisk
D)    mkfs

Answer: A

39.  In a Linux computer, which of the following files defines run levels for the processes to be started up during boot up?

A)    /etc/inittab
B)     /etc/syslog.conf
C)    /etc/lilo.conf
D)    /etc/runlevel

Answer: A

40.  You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have to create user accounts for four new Management Trainees. You also have to create a group named MT and provide membership of this group to the new user accounts. How will you accomplish this?

A)    Use the ADDUSER command to create new user accounts and the MT group. Add the users account to the group.
B)     Use the USERADD command to create new user accounts and the MT group. Add the user accounts to the group.
C)    Use the GROUPADD command to create the MT group. Use the USERADD command to create the user accounts and provide them the membership of the MT group.
D)    Use the ADDGROUP command to create the MT group. Use the ADDUSER command to create the user accounts and provide them the membership of the MT group.

Answer: C

41.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A)    e2fsck
B)     fsck
C)    fsck -N
D)    fsck.ext2

Answer: A,B,D

42.  You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged.\ Which of the following commands will you use to resolve the issue?

A)    mount
B)     e2fsck
C)    fsck
D)    mkfs

Answer: B

43.  You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?

A)    mkfs
B)     mount
C)    scanfs
D)    fsck

Answer: D

44.  Which of the following files is used to view the current status of RAID devices in Linux?
A)    /proc/mdstat
B)     /proc/stat
C)    /proc/meminfo
D)    /proc/mounts

Answer: A

45.  45.Which of the following network protocols are used by the dhclient command to configure the IP addresses of computers on the network?

A)    Thedhclient command does not use any protocol. It statically assigns the address to the network computers.
B)     RARP and DHCP
C)    BOOTP and DHCP
D)    BOOTP and RARP

Answer: C

46.  You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?

A)    ifup eth0
B)     ifconfig eth0
C)    ip link show eth0
D)    sudo ethtool eth0

Answer: D

47.  Which of the following files are used to activate disk quotas on a file system?
Each correct answer represents a complete solution. Choose all that apply.

A)    quotA.group
B)     quotA.user
C)    quotaon
D)    .quotaon

Answer: A,B

48.  You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?

A)    n
B)     w
C)    1
D)    p

Answer: D

49.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to print a file named print.txt. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A)    lpr
B)     lprm
C)    lp
D)    a2ps

Answer: A,C

50.  Which of the following run levels is used to boot a Linux computer in graphical user interface (GUI) mode?

A)    3
B)     7
C)    5
D)    9

Answer: C

51.  Which of the following commands are used to remove a package from a Linux system? Each correct answer represents a complete solution. Choose two.

A)    yum -rm packagename
B)     yum erasepackagename
C)    yum -rpackagename
D)    yum removepackagename

Answer: B,D

52.  You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?

A)    find size +50M
B)     find -size 50M
C)    find -size -50M
D)    find -size +50M

Answer: D

53.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?

A)    chgrp bar foo
B)     chgroup foo bar
C)    chgrp foo bar
D)    chgroup bar foo

Answer: A

54.  Which of the following files lists the file systems to be mounted automatically at startup?

A)    /etc/mtab
B)     /dev/fstab
C)    /etc/fstab
D)    /dev/mtab

Answer: C

55.  Which of the following commands is used to mount file systems?
A)    detach
B)     mount
C)    umount
D)    attach

Answer: B

56.  What command will you use to find the current runlevel of an active Linux session?

A)    runlevel
B)     init
C)    rlevel
D)    ls /etc/runlevel

Answer: A

57.  Which of the following files contains the names and locations of system log files?

A)    /etc/lilo.conf
B)     /usr/syslog.conf
C)    /etc/syslog.conf
D)    /usr/lilo.conf

Answer: C

58.  Which of the following utilities is used to set ACL for files and directories?

A)    enable acl
B)     setacl
C)    setfacl
D)    getfacl

Answer: C

59.  You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?

A)    /var/log/wtmp
B)     /var/log/dmesg
C)    /var/log/bootmsg
D)    /var/log/messages

Answer: D

60.  You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task? Each correct answer represents a complete solution. Choose two.

A)    smbmount
B)     smbfsmount
C)    mount smb
D)    mount -tsmbfs

Answer: A,D

61.  You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You want to know the ownership of the /etc/inittab file. Which of the following commands will you use to accomplish the task?

A)    rpm -e /etc/inittab
B)     rpm -i /etc/inittab
C)    rpm -qa /etc/inittab
D)    rpm -qf /etc/inittab

Answer: D

62.  Which of the following files is used to initialize a computer-wide environment on a Linux computer?

A)    /etc/group
B)     /etc/profile
C)    /etc/syslog.conf
D)    /etc/startup

Answer: B

63.  Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?

A)    su
B)     cngrl
C)    mount
D)    init

Answer: D

64.  You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

A)    stophttpd
B)     stopall httpd
C)    kill httpd
D)    killall httpd

Answer: D

65.  John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.

A)    locate
B)     lsmod
C)    cat /proc/modules
D)    ls /proc

Answer: B,C

66.  Which of the following commands or command flags can be used to list the installed services and their associated runlevels?

A)    config
B)     xconfig
C)    menuconfig
D)    chkconfig

Answer: D

67.  Which of the following commands is used to list all contents of a superblock of a partition?

A)    tune2fs -c
B)     tune2fs -f
C)    tune2fs -l
D)    tune2fs -j

Answer: C

68.  You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure X?

A)    etc/videoconf
B)     root/videoconf
C)    root/x11/xf86config
D)    etc/x11/xf86config

Answer: D

69.  John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server.
John wants to give the following file permissions to the imp.c file:
l Read, Write, and Execute permissions to the owner
l Read and Write permissions to groups
l Read Only permissions to other users
Which of the following commands will John use to accomplish the task?

A)    chmod 765
B)     chmod 777
C)    chmod 712
D)    chmod 764

Answer: D

70.  Which of the following commands can be used to overwrite an existing kernel image file?

A)    mkinitrd -v
B)     mkinitrd --preload
C)    mkinitrd --builtin
D)    mkinitrd -f

Answer: D