Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

RH133 Red Hat Linux System Administration Questions and Answers

Questions 4

Which of the following tools can be used to add a journal to an ext2 system, making it an ext3 system, as well as to display or set the maximum number of mounts before a check is forced?

Options:

A.

debug2fs

B.

dump2fs

C.

xfs_admin

D.

tune2fs

Buy Now
Questions 5

Which of the following commands is used to create a new group account?

Options:

A.

groupdel

B.

groupmod

C.

groupenable

D.

groupadd

Buy Now
Questions 6

What is the maximum number of partitions that Linux kernel supports for IDE drives?

Options:

A.

50

B.

15

C.

74

D.

63

Buy Now
Questions 7

In Linux, which of the following commands is used to query the installed RPM packages?

Options:

A.

rpm -?

B.

rpm -qr

C.

rpm -q

D.

rpm –get

Buy Now
Questions 8

Drag and drop the appropriate file name before the respective information it contains.

Options:

Buy Now
Questions 9

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure

X?

Options:

A.

root/videoconf

B.

root/x11/xf86config

C.

etc/x11/xf86config

D.

etc/videoconf

Buy Now
Questions 10

Which of the following commands can be used to check badblocks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

mkswap -c

B.

fsck -c

C.

mke2fs -I

D.

fsck -p

Buy Now
Questions 11

Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?

Options:

A.

ip link show [interface name]

B.

ip -s link show [interface name]

C.

ifconfig

D.

ping

Buy Now
Questions 12

You want to find out what quota a user 'john' is using. Which of the following commands will you use to accomplish the task?

Options:

A.

edquota -u john

B.

quota -u john

C.

edquota -g john

D.

quota john

Buy Now
Questions 13

You have made some changes in the /etc/inittab file. Now, you want to make changes take effect without rebooting the operating system. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

init S

B.

init Q

C.

init q

D.

init s

Buy Now
Questions 14

Which of the following commands will display or change the file system label on the ext2 file system located on the specified device?

Options:

A.

e2label

B.

f2label

C.

mkfs

D.

fdisk

Buy Now
Questions 15

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

ls /proc

B.

lsmod

C.

locate

D.

cat /proc/modules

Buy Now
Questions 16

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.

Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named RickGroup.txt. Which of the following commands will you use to accomplish the task?

Options:

A.

ls /etc/group rick > RickGroup.txt

B.

grep /etc/group rick > RickGroup.txt

C.

ls rick /etc/group > RickGroup.txt

D.

grep rick /etc/group > RickGroup.txt

Buy Now
Questions 17

You are a newly appointed network technician at Net Perfect Inc. The company has a Linux-based network. You want to install a package named firefox on your Linux system. Which of the following commands will you use to accomplish the task?

Options:

A.

yum update firefox

B.

yum i firefox

C.

yum install firefox

D.

yum -ivh firefox

Buy Now
Questions 18

Which of the following files contain messages and errors from security-related system?

Options:

A.

/var/log/messages

B.

/var/log/secure

C.

/var/log/mail

D.

/var/log/message

Buy Now
Questions 19

While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.

Options:

A.

swap

B.

ext3

C.

nfs

D.

befs

E.

ntfs

Buy Now
Questions 20

In which of the following files, RHEL stores its network interface configuration information?

Options:

A.

/etc/host.conf

B.

/etc/sysconfig/network-scripts/ ifcfg-ethX

C.

/etc/network.conf

D.

/etc/sysconfig/network-script/ifcfg-ethX

Buy Now
Questions 21

Which of the following files defines which services to start?

Options:

A.

/etc/inittab

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc

D.

/etc/rc.d/init.d

Buy Now
Questions 22

Which of the following command is used to list the current routing table in Linux?

Options:

A.

ifconfig

B.

traceroute

C.

dig

D.

/sbin/ip route

Buy Now
Questions 23

Which of the following files does mount command read to determine which options should be used when mounting the specified device?

Options:

A.

/etc/xinetd.conf

B.

/etc/inittab

C.

/etc/auto.master

D.

/etc/fstab

Buy Now
Questions 24

Which of the following commands is used to see list of previously entered command on the Red Hat operating system?

Options:

A.

cat

B.

history

C.

ls

D.

man

Buy Now
Questions 25

Which of the following scripts invokes the runlevel scripts?

Options:

A.

/etc/rc.d/rc.local

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc.serial

D.

/etc/rc.d/rc

Buy Now
Questions 26

Which of the following commands is used to see IP address, MAC address, and default gateway of a Linux system?

Options:

A.

traceroute

B.

ifconfig

C.

ipconfig

D.

ping

Buy Now
Questions 27

In RHEL, Which of the following logical interfaces refers to the loopback interface?

Options:

A.

eth0

B.

ppp0

C.

l0

D.

lo

Buy Now
Questions 28

Which of the following tools is used to view the name of a Linux system?

Options:

A.

ping

B.

hostname

C.

mtr

D.

ifconfig

Buy Now
Questions 29

Which of the following graphical tools can be used to create and modify Kickstart files?

Options:

A.

ksvalidator

B.

system-config-services

C.

system-config-securitylevel

D.

system-config-kickstart

Buy Now
Questions 30

Which of the following is GRUB Menu Configuration File?

Options:

A.

/etc/grub.conf

B.

/boot/grub/grub.conf

C.

/etc/grub/grub.conf

D.

/boot/grub.conf

Buy Now
Questions 31

Which of the following run levels is officially undefined?

Options:

A.

Run level 3

B.

Run level 4

C.

Run level 2

D.

Run level 5

Buy Now
Questions 32

Which of the following is a RAID device?

Options:

A.

/dev/hda

B.

/dev/md0

C.

/dev/nst1

D.

/dev/sda

Buy Now
Questions 33

Which of the following is the parent of all processes in Linux?

Options:

A.

bash

B.

/etc/init

C.

init

D.

grub

Buy Now
Questions 34

Which of the following is a name of the file created when group quotas are used?

Options:

A.

quotA.user

B.

qoutaon

C.

quota

D.

quotA.group

Buy Now
Questions 35

Which of the following files are used to activate disk quotas on a file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

quotA.group

B.

quotA.user

C.

quotaon

D.

.quotaon

Buy Now
Questions 36

You want to temporarily change your primary group to another group of which you are a member.

In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

Options:

A.

chgrp

B.

newgrp

C.

chmod

D.

chown

Buy Now
Questions 37

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

quotaon

B.

warnquota

C.

edquota

D.

quotaoff

E.

repquota

Buy Now
Questions 38

Which of the following files contains the names and locations of system log files?

Options:

A.

/usr/syslog.conf

B.

/usr/lilo.conf

C.

/etc/lilo.conf

D.

/etc/syslog.conf

Buy Now
Questions 39

Which of the following network protocols are used by the dhclient command to configure the IP addresses of computers on the network?

Options:

A.

The dhclient command does not use any protocol. It statically assigns the address to the network computers.

B.

RARP and DHCP

C.

BOOTP and DHCP

D.

BOOTP and RARP

Buy Now
Questions 40

Which of the following commands is used to mount file systems?

Options:

A.

detach

B.

mount

C.

umount

D.

attach

Buy Now
Questions 41

You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following bootloaders does not require to be rewritten after the configuration of the kernel has been changed?

Options:

A.

GRUB

B.

BOOTP

C.

LILO

D.

ELILO

Buy Now
Questions 42

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:

rwxr--r—

You want to add a sticky bit to the file. Which of the following commands will you use?

Options:

A.

chmod 7744 report

B.

chmod 1744 report

C.

chmod 2744 report

D.

chmod 4744 report

Buy Now
Questions 43

You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?

Options:

A.

rpm -ivh

B.

rpm -evh

C.

rpm -qvh

D.

rpm -Uvh

Buy Now
Questions 44

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

vi /etc/passwd

B.

vi /etc/shadow

C.

useradd Trinity

D.

passwd Trinity

E.

Trinity:x:505:505::/home/Trinity:/sbin/nonlogin

Buy Now
Questions 45

You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

Options:

A.

stop httpd

B.

stopall httpd

C.

kill httpd

D.

killall httpd

Buy Now
Questions 46

Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

Options:

A.

find /etc -name *.txt

B.

find start -dir -min -60

C.

find start -dir -cmin -60

D.

find start -cmin -60

Buy Now
Questions 47

Which of the following statements is true about fdisk command?

Options:

A.

It is used to build a Linux file system on a device, usually a hard disk partition.

B.

It is used to create, change, delete, or display current partitions on the hard disk.

C.

It is used to check and optionally repair one or more Linux file systems.

D.

It displays or changes the filesystem label on the ext2 filesystem located on device.

Buy Now
Questions 48

Which of the following commands can be used to overwrite an existing kernel image file?

Options:

A.

mkinitrd -v

B.

mkinitrd --preload

C.

mkinitrd --builtin

D.

mkinitrd -f

Buy Now
Questions 49

Which of the following statements are true about rsync? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It supports for copying links, devices, owners, groups, and permissions.

B.

It can use any transparent remote shell, including ssh or rsh.

C.

It does not support for anonymous or authenticated rsync daemons.

D.

It does not require super-user privileges.

Buy Now
Questions 50

Alicia works as a System Administrator for SoftTech Inc. The company uses the Linux operating system. She wants to install Apache on the company's server. Which of the following commands will she use to check whether or not Apache is already installed on the server?

Options:

A.

rpm -U apache

B.

rpm -q apache

C.

rpm --checksig

D.

rpm -i apache

Buy Now
Exam Code: RH133
Exam Name: Red Hat Linux System Administration
Last Update: Nov 21, 2024
Questions: 336

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80