Red Hat – RHCSA Exam Back to Exams Page. 1. What is swap? Swap is the ability to switch between users in one terminal session Swap is the cache of your Physical Memory (RAM) Swap space is the area on a hard disk that is part of the Virtual Memory of your machine (Swap+RAM) Swap is the cache of your HDDQuestion 1 of 50 2. What is the action to disable SSH root login? Set PermitRootLogin no” in /etc/ssh/sshd_config” Set AllowRootLogin=No” in /etc/ssh/sshd_config” Set PermitRootLogin=No” in /etc/ssh/sshd.conf” Set PermitRootLogin no” in /etc/ssh/sshd.conf”Question 2 of 50 3. If you have accidentally deleted a file using rm command, how can you get that file back? run the undelete command Go to the trash bin and recover it Type the rm -u command You cannot get the file backQuestion 3 of 50 4. Identify the action that ‘rpm -ql nagios’ will perform. Verify the package nagios Provide additional info on the package nagios Install the package nagios List files in the package nagiosQuestion 4 of 50 5. How can we to show currently loaded kernel modules? kernshow modprobe modshow lsmodQuestion 5 of 50 6. What is the command to mount the file system to the directory /mnt? umount ‘file system path’ /mnt umount /mnt ‘file system path’ mount /mnt ‘file system path’ mount ‘file system path’ /mntQuestion 6 of 50 7. What is the command used to find out what packages are currently installed? rpm -a yum list –installed rpm -q yum list installedQuestion 7 of 50 8. What does the pwd command do? It prints the path of the current working directory It asks for the current user’s password, and the prompts for a new password It launches the power management daemon It saves the current working directory, so that you can return there with the popd commandQuestion 8 of 50 9. If you set your /etc/inittab file to have the default init entry to be ‘init:3:default:’, then your system default runlevel is which of the follow? administrative single-user mode; denies other users access to the system but allows root access to the entire multiuser file system. Startup scripts are not run full multiuser mode with login to command-line interface; allows remote file sharing with other systems on your network. Also referred to as the text mode state full multiuser mode that starts up in an X session, initiating a graphical login; allows remote file sharing with other systems on your network multiuser, without networking (i.e., you don’t have access to network services, like NFS, xinetd, and NIS)Question 9 of 50 10. What is the command used to create a disk dump in RedHat Linux? fsck2 /dev/sda /dev/sdb dump /dev/sda ssh@localhost:/dev/hda mk4ext /dev/sda /dev/sdb dd if=/dev/sda of=/dev/sdbQuestion 10 of 50 11. What does ‘shutdown -r now’ do? Requests that the system be halted after it has been brought down Only sends out the warning messages and disable slogins, does not actually bring the system down Requests that the system be powered off after it has been brought down in a safe way Requests that the system be rebooted after it has been brought down in a safe wayQuestion 11 of 50 12. Which statement is true about the files and directories created inside the /project directory that have 2777 permissions? All files inside the /project directory will have permissions set to 2644, and the subdirectories will have them set to 2755 All files and directories will have the same group as that of the /project directory All executables inside the /project directory will run with the effective group ID (EGID) of the group of the /project directory All files and directories will have the default group set to the primary group of the user who creates them in /project directoryQuestion 12 of 50 13. To change the ownership of the file “myfile” from “Tim” to “Jim”, _____ is used. chown myfile tim:jim chown tim:jim myfile changeowner jim myfile chown jim myfileQuestion 13 of 50 14. How would you use scp to copy a file ‘test_file’ from your machine to the remote machine ‘test_machine’ to the /tmp directory, using the account ‘test_user’ on the remote machine. scp test_file test_machine@test_user:/tmp scp test_file:test_user@test_machine:/tmp scp test_file test_user@test_machine:/tmp scp -f test_file -u test_user -m test_machine -d /tmpQuestion 14 of 50 15. Identify the most correct way to edit the current user’s crontab. vi /etc/crontab.conf vi /etc/cron.d/0hourly crontab -l crontab -eQuestion 15 of 50 16. Where do the manual (man) pages for all commands reside in the File System Hierarchy (FSH)? /usr/man/share/locale /usr/share/info/man /usr/share/locale/man /usr/share/manQuestion 16 of 50 17. During boot, the init program checks default runlevel from the __________ file. /etc/initconf /etc/inittab /proc/inittab /proc/initconfQuestion 17 of 50 18. What is the ssh command? It is the secure shell; it is used to restrict actions available to users It is the secure shell; it is used to connect to remote hosts via an authenticated and encrypted channel It is the standard shell; it has a restricted set of commands, but those are portable across different Linux distributions It is the synchronous shell; all commands are performed in real-timeQuestion 18 of 50 19. Identify the file in which we can configure the IP Address and Netmask for eth0: cd /etc/sysconfig/network/ in this folder edit ifcfg-eth0 cd /etc/sysconfig/network-scripts/ in this folder edit ifcfg-eth0 cd /var/syscofig/network-scripts/ in this folder edit ifcfg-eth0 cd /rm/syscofig/network-scripts/ in this folder edit ifcfg-eth0Question 19 of 50 20. What is the command used to query DNS (Internet domain name) servers? nslookup dns lsrouted dnsqueryQuestion 20 of 50 21. ________ is used to configure networking via a console GUI. system-config-network networking config network-config system-configQuestion 21 of 50 22. In which file will user-encrypted passwords be stored? /home/passwd /etc/shadow /etc/masterpwd /etc/encpasswdQuestion 22 of 50 23. If umask is 0022, what is the by-default permission of a file? 655 755 777 644 744Question 23 of 50 24. Consider using the command ‘cd /a/b/c’, then executing ‘cd ..’. What does this last command do? changes to your home directory displays the default directory path changes to the / directory changes to /a/b directoryQuestion 24 of 50 25. When creating a new user account, unless otherwise specified, the files from the __________ are automatically copied to the home directory. /etc/user start /etc/skel /etc/default /usr/skelQuestion 25 of 50 26. What action will ‘du -h ~’ perform? list the size of all files within your $HOME in human-readable form dump your home directory to /tmp duplicate the current process delete your account and home directoryQuestion 26 of 50 27. What is the default home directory path in Redhat Linux? /user/home /usr/home/ /home/user /var/homeQuestion 27 of 50 28. ________ is the Linux distro that is derived from RHEL. Debian CentOS Ubuntu MintQuestion 28 of 50 29. ‘uname’ command is used to __________ . show the user name change user name print system information nothingQuestion 29 of 50 30. On Red Hat Linux and its derivatives, which of the following commands is appropriate to check whether a particular ‘package’ is installed? pkg rpm -qa sys lsQuestion 30 of 50 31. The Linux Kernel was written by whom? Richard Stallman Linus Torvalds Brian Kernighan Dennis RitchieQuestion 31 of 50 32. _______ is the firewall that is most commonly used on Linux. pf ipfw iptables ipchainsQuestion 32 of 50 33. What is used to power down the system? telinit 0 All are correct shutdown -h +1 shutdown -h nowQuestion 33 of 50 34. The “mount -a” command will mount all file systems in the ________ file. /etc/filesystems /etc/mtab /etc/fs.conf /etc/fstabQuestion 34 of 50 35. What is used to disable the ssh service at next boot? chkconfig sshd off chkconfig sshd noboot chkconfig sshd ignore chkconfig sshd onQuestion 35 of 50 36. _____ is added to a command to run it in the background. & $ ? *Question 36 of 50 37. A normal user sends a print job to the default printer but later finds the print queue is large and decides to cancel the job. What would the user do to perform this task? The user can know the job number but cannot remove the job as he or her has no permission to use the Iprm command The user has no permission to view job numbers using the Ipq command and hence cannot delete the job The user has to list the job using Ipq and remove it using the command Iprm with the job number as the argument The user has no permission to view job numbers using the jobs command and hence cannot delete the jobQuestion 37 of 50 38. What is the command used to change to runlevel 3 if you are at runlevel 5? who -r 3 runlevel 3 init 3 chkconfig 3Question 38 of 50 39. is used to see the age of a password. chgrp passwd chmod chage Question 39 of 50 40. If you are logged in to a regular user account, and it is necessary for you to log in as root and become a superuser, you use which of the following? su chpriv chown passwdQuestion 40 of 50 41. Can we increase SWAP space without rebooting? No, you have to boot with a Live CD to do that Yes, if you create a swap file No, you have to re-install your system to do that No, you have to reboot for the new swap to be activated properlyQuestion 41 of 50 42. What is used to verify in which state (run level) we are currently running? init runlevel chkstate telinitQuestion 42 of 50 43. is the runlevel that halts the system. 1 6 h 0 Question 43 of 50 44. Identify the true statement regarding the Linux operating system. It is single-user, single-tasking, and open source It is multi-user, multi-tasking, and proprietary It is single-user, multi-tasking, and free It is multi-user, multi-tasking, and freeQuestion 44 of 50 45. The main configuration file that GRUB reads when it is loaded is which of the following? /boot/grub/grub.conf /usr/bin/gboot.tab /etc/boot.conf /etc/bootQuestion 45 of 50 46. SSH uses _____ to authenticate remote computers. public key cryptography stream cipher both block and stream ciphers secret key cryptographyQuestion 46 of 50 47. ________ is used to delete a directory, recursively searching for files and other directories and deleting them. rmdir ‘rm -r’ deltree rdQuestion 47 of 50 48. What does GRUB stand for? Great Ultimate Bootloader Gum Removal Under Boot Grand Unified Bootloader Great Unique BootloaderQuestion 48 of 50 49. What is the command used to list the most CPU-intensive processes on your system? par top free iostatQuestion 49 of 50 50. How do you find out memory usage? vmstat top All are correct free -mQuestion 50 of 50 Loading…