Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium RedHat RH133 Dumps Questions Answers

Page: 1 / 13
Total 336 questions

Red Hat Linux System Administration Questions and Answers

Question 1

Which of the following switches of the rpm command lists the package that owns the specified file?

Options:

A.

-a

B.

-q

C.

-e

D.

-f

Buy Now
Question 2

You want to start the display manager automatically at boot time. Which of the following files will you edit to accomplish the task?

Options:

A.

Xaccess

B.

XDM-config

C.

Xsession

D.

inittab

Question 3

The ____ command is used to view the TCP/IP configuration on a Windows 9x computer.

Options:

A.

IFCONFIG

B.

WINIPCONFIG

C.

CHKDSK

D.

IPCONFIG

Question 4

Which of the following commands can be used to initialize a disk partition to set up the Logical Volume Manager (LVM)?

Options:

A.

vgcreate

B.

lvcreate

C.

pvcreate

Question 5

Which of the following commands is used to modify a user account?

Options:

A.

USERADD

B.

MOUNT

C.

MODUSER

D.

USERMOD

Question 6

Which of the following files is the Linux Loader (LILO) configuration file?

Options:

A.

/etc/liloconf

B.

/etc/lilo.con

C.

/etc/lilocon

D.

/etc/lilo.conf

Question 7

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have installed Kmail for sending messages. You want to install the latest version of it. Which of the following commands will you use to identify the currently installed version?

Options:

A.

rpm -q

B.

rpm -U

C.

rpm -v

D.

rpm –i

Question 8

Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?

Options:

A.

ip link show [interface name]

B.

ip -s link show [interface name]

C.

ifconfig

D.

ping

Question 9

Which of the following statements are true about rsync?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can use any transparent remote shell, including ssh or rsh.

B.

It does not support for anonymous or authenticated rsync daemons.

C.

It does not require super-user privileges.

D.

It supports for copying links, devices, owners, groups, and permissions.

Question 10

You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?

Options:

A.

tail -n 3 /var/adm/messages

B.

tail /var/adm/messages

C.

cat /var/adm/messages

D.

tail -f /var/adm/messages

Question 11

Which of the following RAID levels provides block level striping?

Options:

A.

RAID 4

B.

RAID 3

C.

RAID 5

D.

RAID 6

Question 12

Which of the following commands displays information for all filesystems that have quota enabled?

Options:

A.

quotaon

B.

quota

C.

quota -v

D.

quotaoff

Question 13

You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?

Options:

A.

history !!

B.

history ##

C.

history !#

D.

history !1

Question 14

Which of the following commands can be used to power off a Linux computer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

init 6

B.

init 0

C.

shutdown

D.

halt

Question 15

Which of the following commands can be used to display the file name, owner, group, and the Access Control List (ACL) of a given file?

Options:

A.

rdev

B.

cardmgr

C.

getfacl

D.

dd

Question 16

You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?

Options:

A.

chroot

B.

chdir

C.

ls

D.

route

Question 17

Which of the following commands runs a Linux system in multi-user mode with networking?

Options:

A.

init 2

B.

init 3

C.

init 6

D.

init 5

Question 18

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?

Options:

A.

chgrp bar foo

B.

chgroup foo bar

C.

chgrp foo bar

D.

chgroup bar foo

Question 19

Fill in the blank with the appropriate command.

The ________ command recursively removes files, which have not been accessed for a period of time.

Options:

A.

tmpwatch

Question 20

Which of the following files contains the names and locations of system log files?

Options:

A.

/etc/lilo.conf

B.

/usr/syslog.conf

C.

/etc/syslog.conf

D.

/usr/lilo.conf

Question 21

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?

Options:

A.

mount

B.

e2fsck

C.

fsck

D.

mkfs

Question 22

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?

Options:

A.

e2fsck

B.

mount

C.

fsck

D.

mkfs

Question 23

You want to start the display manager automatically at boot time. Which of the following files will you edit to accomplish the task?

Options:

A.

inittab

B.

XDM-config

C.

Xsession

D.

Xaccess

Question 24

Which of the following commands creates a new logical volume in a volume group?

Options:

A.

lvcreate

B.

vgcreate

C.

pvcreate

D.

mkfs

Question 25

Which of the following utilities is used to set ACL for files and directories?

Options:

A.

enable acl

B.

setacl

C.

setfacl

D.

getfacl

Question 26

You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?

Options:

A.

find size +50M

B.

find -size 50M

C.

find -size -50M

D.

find -size +50M

Question 27

Which of the following commands are used to remove a package from a Linux system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

yum -rm packagename

B.

yum erase packagename

C.

yum -r packagename

D.

yum remove packagename

Question 28

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

quotaon

B.

warnquota

C.

edquota

D.

quotaoff

E.

repquota

Question 29

Which of the following statements is true about fdisk command?

Options:

A.

It is used to build a Linux file system on a device, usually a hard disk partition.

B.

It is used to create, change, delete, or display current partitions on the hard disk.

C.

It is used to check and optionally repair one or more Linux file systems.

D.

It displays or changes the filesystem label on the ext2 filesystem located on device.

Question 30

Which of the following statements is true about Linux kernel?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It constitutes the core part of the Linux operating system.

B.

It detects hardware resources and boots up the system.

C.

It allocates memory on behalf of running process.

D.

It does not verify firewall rules

Question 31

You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following bootloaders does not require to be rewritten after the configuration of the kernel has been changed?

Options:

A.

GRUB

B.

BOOTP

C.

LILO

D.

ELILO

Question 32

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:

rwxr--r— You want to add a sticky bit to the file. Which of the following commands will you use?

Options:

A.

chmod 2744 report

B.

chmod 1744 report

C.

chmod 7744 report

D.

chmod 4744 report

Question 33

Which of the following commands is used to create a user account for a new user?

Options:

A.

USERMOD

B.

MOUNT

C.

USERADD

D.

CRUSER

Question 34

Which of the following files are used to activate disk quotas on a file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

quotA.group

B.

quotA.user

C.

quotaon

D.

.quotaon

Question 35

Which of the following commands is used to check file system errors?

Options:

A.

fsck

B.

fdisk

C.

tripwire

D.

chkdsk

Question 36

Which of the following commands is used to see list of previously entered command on the Red Hat operating system?

Options:

A.

cat

B.

history

C.

ls

D.

man

Question 37

Which of the following files contains users' names and UIDs?

Options:

A.

/etc/group

B.

/etc/passwd

C.

/etc/user

D.

/etc/shadow

Question 38

Which of the following scripts invokes the runlevel scripts?

Options:

A.

/etc/rc.d/rc.local

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc.serial

D.

/etc/rc.d/rc

Question 39

While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.

Options:

A.

swap

B.

ext3

C.

nfs

D.

befs

E.

ntfs

Question 40

Which command displays the lines in a file that match a pattern?

Options:

A.

cat

B.

grep

C.

history

D.

cp

Question 41

Which of the following commands is used to check /etc/fstab file in Linux?

Options:

A.

sfdisk

B.

fdisk

C.

mount -a

D.

fsck

Question 42

Which of the following options is used with tar command to extract contents from a tar file?

Options:

A.

-x

B.

-t

C.

-f

D.

-c

Question 43

Which of the following tools is used to view the name of a Linux system?

Options:

A.

ping

B.

hostname

C.

mtr

D.

ifconfig

Question 44

Which of the following tools is used to view and/or change the speed and duplex settings for the network card?

Options:

A.

ifconfig

B.

traceroot

C.

ethtool

D.

ping

Question 45

Which of the following is a configuration file used to configure TCP wrappers?

Options:

A.

/etc/hosts.allow

B.

/etc/resolve.conf

C.

/etc/tcpwrapper

D.

/etc/hosts.conf

Question 46

Which of the following is the installer for RHEL?

Options:

A.

GRUB

B.

MBR

C.

anaconda

D.

kernal

Question 47

Which of the following files does mount command read to determine which options should be used when mounting the specified device?

Options:

A.

/etc/xinetd.conf

B.

/etc/inittab

C.

/etc/auto.master

D.

/etc/fstab

Question 48

Which of the following commands can be used to view the name of a Linux system?

Options:

A.

ifconfig

B.

mtr

C.

/bin/hostname

D.

ping

Question 49

What is the UID number for a root user?

Options:

A.

UID 0

B.

UID 1

C.

UID 500

D.

UID 550

Question 50

Which of the following utilities allows a user to control what services should run when entering a given run level?

Options:

A.

pstree

B.

ntsysv

C.

service

D.

chkconfig

Page: 1 / 13
Total 336 questions