New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium RedHat RH033 Dumps Questions Answers

Page: 1 / 6
Total 153 questions

Red Hat Linux Essentials Questions and Answers

Question 1

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as the root user on the Linux operating system. He wants to delete all files whose names end with a number. Which of the following commands will John use to accomplish the task?

Options:

A.

rm *[0-9]

B.

rm [^0-9]

C.

rm ^[0-9]

D.

rm [0-9]*

Buy Now
Question 2

Which of the following commands can you use to see only the last ten lines of a file?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

head

B.

tail -10

C.

head -10

D.

tail

Question 3

Which shell script is the first startup script run when a login shell is started in Linux?

Options:

A.

~/.bashrc

B.

/etc/profile.d

C.

/etc/profile

D.

/etc/bashrc

Question 4

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.

You run the following command on the terminal: find -name "*.conf" -exec cp {} {} .orig \ ;

What will this command do?

Options:

A.

It will extract the content of configuration files from the current directory.

B.

It will search configuration files from the current directory and a .orig extension.

C.

It will back up configuration files from the current directory and a .orig extension.

D.

It will fix other-writable files in your home directory.

Question 5

You run the ps -aux command on the terminal. You get the following output:

You notice that the process id 24224 is showing the status message S on the stat column. What does this indicate?

Options:

A.

The process id 24224 is in sleeping status.

B.

The process id 24224 is hanged.

C.

The process id 24224 is in stopped status.

D.

The process id 24224 is in running status.

Question 6

You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program's output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?

Options:

A.

less

B.

tee

C.

cat

D.

more

Question 7

Which of the following is NOT the feature of SELinux in the Red Hat enterprise Linux?

Options:

A.

SELinux applies to all users, including root.

B.

All process and files have a context.

C.

SELinux implements Mandatory Access Control (MAC) security in Red Hat Enterprise Linux.

D.

SELinux does not provide Kernel-level security.

Question 8

Which of the following files does the /var directory NOT contain?

Options:

A.

System log files

B.

Kernel files

C.

Email-spools

D.

Print spools

Question 9

Which of the following key-combinations is used to redo a change undone by a u command in vim?

Options:

A.

Ctrl-w, Arrow

B.

Ctrl-w, s

C.

Ctrl-r

D.

Ctrl-w, v

Question 10

Which of the following is a utility that can function as an independent spell checker?

Options:

A.

spell

B.

nice

C.

aspell

D.

inspell

Question 11

Which of the following utilities will resume suspended jobs from the current environment if job control is enabled?

Options:

A.

jobs

B.

bg

C.

top

D.

fg

Question 12

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to save the output to the ProStat.txt file. Which of the following commands will you use to accomplish the task?

Options:

A.

ps < ProStat.txt

B.

ps | ProStat.txt

C.

ps > ProStat.txt

D.

ps

Question 13

Which of the following commands are used to start and stop a service, and to ensure persistence across reboots? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

chkconfig

B.

tar

C.

service

D.

yum

Question 14

You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.

You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file named file2 rather than being displayed on the screen.

Which of the following tools should you use to accomplish the task?

Options:

A.

My_program >> file2

B.

My_program 2> file2

C.

My_program 2>> file2

D.

My_program > file2

Question 15

Mark works as a Network Administrator for company.com Inc. The company has a Linux-based network. A printer is configured on the network. Mark wants to see the content of a print queue.

Which of the following commands will he use to accomplish the task?

Options:

A.

lprm

B.

lpstat -a

C.

lpq

D.

lpr

Question 16

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.

There are six files in a directory on your laptop. You want to find out the file types of all the files at a time. Which of the following commands will you use?

Options:

A.

fsck

B.

file

C.

mount

D.

init

Question 17

You want to terminate your X session. Which of the following key combinations will you use to accomplish this?

Options:

A.

Ctrl+Alt+F7

B.

Ctrl+Alt+Backspace

C.

Ctrl+Alt+Fn

D.

Ctrl+Alt+A

Question 18

You work as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.

You are currently working on vim. You opened a file in four windows in a single vim screen. You want to jump from one window to another. Which of the following key-combinations should you use to accomplish the task?

Options:

A.

Ctrl-w, v

B.

Ctrl-w, s

C.

Ctrl-w with an arrow key

D.

Ctrl-w, q

Question 19

Which of the following commands is used to count the number of bytes in a file?

Options:

A.

wc -l filename

B.

wc -c filename

C.

wc -m filename

D.

wc -w filename

Question 20

John works as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.

John wants to view a PDF document on his Linux system. Which of the following commands should John use to accomplish the task?

Options:

A.

ps2pdf

B.

enscript

C.

evince

D.

a2ps

Question 21

Fill in the blank with appropriate word. The------------ command copies files between hosts on a network. It uses ssh for data transfer, and uses the same authentication and provides the same security as ssh. It will ask for passwords or passphrases if they are needed for authentication.

Options:

A.

SCP

Question 22

Which of the following commands is used to securely copy files from one host to another over the network?

Options:

A.

ls

B.

cat

C.

mutt

D.

scp

Page: 1 / 6
Total 153 questions