Red Hat – RHCSA Exam Back to Exams Page. 1. SSH uses _____ to authenticate remote computers. stream cipher public key cryptography both block and stream ciphers secret key cryptographyQuestion 1 of 50 2. If you set your /etc/inittab file to have the default init entry to be ‘init:3:default:’, then your system default runlevel is which of the follow? full multiuser mode that starts up in an X session, initiating a graphical login; allows remote file sharing with other systems on your network full multiuser mode with login to command-line interface; allows remote file sharing with other systems on your network. Also referred to as the text mode state multiuser, without networking (i.e., you don’t have access to network services, like NFS, xinetd, and NIS) administrative single-user mode; denies other users access to the system but allows root access to the entire multiuser file system. Startup scripts are not runQuestion 2 of 50 3. If you are logged in to a regular user account, and it is necessary for you to log in as root and become a superuser, you use which of the following? chown passwd chpriv suQuestion 3 of 50 4. What action will ‘du -h ~’ perform? list the size of all files within your $HOME in human-readable form dump your home directory to /tmp delete your account and home directory duplicate the current processQuestion 4 of 50 5. ‘uname’ command is used to __________ . change user name print system information nothing show the user nameQuestion 5 of 50 6. What is used to disable the ssh service at next boot? chkconfig sshd on chkconfig sshd ignore chkconfig sshd noboot chkconfig sshd offQuestion 6 of 50 7. If you have accidentally deleted a file using rm command, how can you get that file back? Type the rm -u command run the undelete command Go to the trash bin and recover it You cannot get the file backQuestion 7 of 50 8. What is swap? Swap is the cache of your HDD Swap space is the area on a hard disk that is part of the Virtual Memory of your machine (Swap+RAM) Swap is the ability to switch between users in one terminal session Swap is the cache of your Physical Memory (RAM)Question 8 of 50 9. The Linux Kernel was written by whom? Linus Torvalds Brian Kernighan Richard Stallman Dennis RitchieQuestion 9 of 50 10. What is used to verify in which state (run level) we are currently running? chkstate runlevel telinit initQuestion 10 of 50 11. What is the command used to find out what packages are currently installed? rpm -q yum list installed rpm -a yum list –installedQuestion 11 of 50 12. ________ is the Linux distro that is derived from RHEL. Mint CentOS Ubuntu DebianQuestion 12 of 50 13. What does ‘shutdown -r now’ do? Requests that the system be powered off after it has been brought down in a safe way Requests that the system be rebooted after it has been brought down in a safe way Only sends out the warning messages and disable slogins, does not actually bring the system down Requests that the system be halted after it has been brought downQuestion 13 of 50 14. What does GRUB stand for? Gum Removal Under Boot Grand Unified Bootloader Great Unique Bootloader Great Ultimate BootloaderQuestion 14 of 50 15. How do you find out memory usage? vmstat top All are correct free -mQuestion 15 of 50 16. The “mount -a” command will mount all file systems in the ________ file. /etc/fstab /etc/fs.conf /etc/filesystems /etc/mtabQuestion 16 of 50 17. Identify the file in which we can configure the IP Address and Netmask for eth0: cd /etc/sysconfig/network-scripts/ in this folder edit ifcfg-eth0 cd /rm/syscofig/network-scripts/ in this folder edit ifcfg-eth0 cd /etc/sysconfig/network/ in this folder edit ifcfg-eth0 cd /var/syscofig/network-scripts/ in this folder edit ifcfg-eth0Question 17 of 50 18. is the runlevel that halts the system. 1 6 h 0 Question 18 of 50 19. If umask is 0022, what is the by-default permission of a file? 755 644 777 655 744Question 19 of 50 20. Where do the manual (man) pages for all commands reside in the File System Hierarchy (FSH)? /usr/man/share/locale /usr/share/locale/man /usr/share/man /usr/share/info/manQuestion 20 of 50 21. In which file will user-encrypted passwords be stored? /home/passwd /etc/masterpwd /etc/shadow /etc/encpasswdQuestion 21 of 50 22. What is the command used to list the most CPU-intensive processes on your system? free iostat top parQuestion 22 of 50 23. To change the ownership of the file “myfile” from “Tim” to “Jim”, _____ is used. changeowner jim myfile chown jim myfile chown myfile tim:jim chown tim:jim myfileQuestion 23 of 50 24. On Red Hat Linux and its derivatives, which of the following commands is appropriate to check whether a particular ‘package’ is installed? sys pkg rpm -qa lsQuestion 24 of 50 25. Can we increase SWAP space without rebooting? No, you have to reboot for the new swap to be activated properly No, you have to boot with a Live CD to do that Yes, if you create a swap file No, you have to re-install your system to do thatQuestion 25 of 50 26. What is the command used to query DNS (Internet domain name) servers? dns lsrouted nslookup dnsqueryQuestion 26 of 50 27. What is the ssh command? It is the secure shell; it is used to connect to remote hosts via an authenticated and encrypted channel It is the synchronous shell; all commands are performed in real-time It is the standard shell; it has a restricted set of commands, but those are portable across different Linux distributions It is the secure shell; it is used to restrict actions available to usersQuestion 27 of 50 28. What does the pwd command do? It saves the current working directory, so that you can return there with the popd command It asks for the current user’s password, and the prompts for a new password It prints the path of the current working directory It launches the power management daemonQuestion 28 of 50 29. _______ is the firewall that is most commonly used on Linux. pf ipchains iptables ipfwQuestion 29 of 50 30. How would you use scp to copy a file ‘test_file’ from your machine to the remote machine ‘test_machine’ to the /tmp directory, using the account ‘test_user’ on the remote machine. scp test_file test_machine@test_user:/tmp scp test_file:test_user@test_machine:/tmp scp -f test_file -u test_user -m test_machine -d /tmp scp test_file test_user@test_machine:/tmpQuestion 30 of 50 31. Consider using the command ‘cd /a/b/c’, then executing ‘cd ..’. What does this last command do? changes to the / directory changes to /a/b directory changes to your home directory displays the default directory pathQuestion 31 of 50 32. The main configuration file that GRUB reads when it is loaded is which of the following? /usr/bin/gboot.tab /etc/boot /boot/grub/grub.conf /etc/boot.confQuestion 32 of 50 33. Identify the action that ‘rpm -ql nagios’ will perform. List files in the package nagios Install the package nagios Provide additional info on the package nagios Verify the package nagiosQuestion 33 of 50 34. _____ is added to a command to run it in the background. $ ? * &Question 34 of 50 35. What is the command to mount the file system to the directory /mnt? umount /mnt ‘file system path’ umount ‘file system path’ /mnt mount ‘file system path’ /mnt mount /mnt ‘file system path’ Question 35 of 50 36. How can we to show currently loaded kernel modules? modshow kernshow lsmod modprobeQuestion 36 of 50 37. A normal user sends a print job to the default printer but later finds the print queue is large and decides to cancel the job. What would the user do to perform this task? The user has to list the job using Ipq and remove it using the command Iprm with the job number as the argument The user has no permission to view job numbers using the Ipq command and hence cannot delete the job The user can know the job number but cannot remove the job as he or her has no permission to use the Iprm command The user has no permission to view job numbers using the jobs command and hence cannot delete the jobQuestion 37 of 50 38. What is the action to disable SSH root login? Set PermitRootLogin no” in /etc/ssh/sshd.conf” Set PermitRootLogin no” in /etc/ssh/sshd_config” Set AllowRootLogin=No” in /etc/ssh/sshd_config” Set PermitRootLogin=No” in /etc/ssh/sshd.conf”Question 38 of 50 39. What is used to power down the system? shutdown -h now All are correct telinit 0 shutdown -h +1Question 39 of 50 40. Identify the true statement regarding the Linux operating system. It is single-user, multi-tasking, and free It is multi-user, multi-tasking, and proprietary It is multi-user, multi-tasking, and free It is single-user, single-tasking, and open sourceQuestion 40 of 50 41. ________ is used to delete a directory, recursively searching for files and other directories and deleting them. rmdir deltree ‘rm -r’ rdQuestion 41 of 50 42. What is the command used to change to runlevel 3 if you are at runlevel 5? chkconfig 3 runlevel 3 who -r 3 init 3Question 42 of 50 43. During boot, the init program checks default runlevel from the __________ file. /etc/inittab /proc/inittab /etc/initconf /proc/initconfQuestion 43 of 50 44. What is the default home directory path in Redhat Linux? /user/home /usr/home/ /home/user /var/homeQuestion 44 of 50 45. ________ is used to configure networking via a console GUI. system-config-network networking config network-config system-configQuestion 45 of 50 46. is used to see the age of a password. chgrp passwd chmod chage Question 46 of 50 47. Identify the most correct way to edit the current user’s crontab. crontab -l vi /etc/crontab.conf vi /etc/cron.d/0hourly crontab -eQuestion 47 of 50 48. When creating a new user account, unless otherwise specified, the files from the __________ are automatically copied to the home directory. /etc/skel /etc/user start /etc/default /usr/skelQuestion 48 of 50 49. What is the command used to create a disk dump in RedHat Linux? mk4ext /dev/sda /dev/sdb fsck2 /dev/sda /dev/sdb dump /dev/sda ssh@localhost:/dev/hda dd if=/dev/sda of=/dev/sdbQuestion 49 of 50 50. Which statement is true about the files and directories created inside the /project directory that have 2777 permissions? All executables inside the /project directory will run with the effective group ID (EGID) of the group of the /project directory All files inside the /project directory will have permissions set to 2644, and the subdirectories will have them set to 2755 All files and directories will have the default group set to the primary group of the user who creates them in /project directory All files and directories will have the same group as that of the /project directoryQuestion 50 of 50 Loading…