Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

RH033 Exam Dumps - Red Hat Linux Essentials

Question # 4

Which of the following commands is used to access Windows resources from Linux workstation?

A.

rsync

B.

mutt

C.

scp

D.

smbclient

Full Access
Question # 5

You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.

You are a root user on the Red Hat operating system. You want to see first five lines of the file

/etc/passwd. Which of the following commands should you use to accomplish the task?

A.

head /etc/passwd

B.

head -n 5 /etc/passwd

C.

tail -n 5 /etc/passwd

D.

head 5 -n /etc/passwd

Full Access
Question # 6

You work as a Network Administrator for Rick International. The company has a Linux-based network. A process is running on a server. It is using a lot of processing power. You want the process to use less resources. Which of the following actions will you perform to accomplish the task?

A.

Kill the process and rerun it by using the nice command with the -n 1 switch.

B.

Kill the process and rerun it by using the nice command with the -n 19 switch.

C.

Kill the process and rerun it by using the fg command.

D.

Kill the process and rerun it by using the bg command.

Full Access
Question # 7

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.

There are six files in a directory on your laptop. You want to find out the file types of all the files at a time. Which of the following commands will you use?

A.

fsck

B.

file

C.

mount

D.

init

Full Access
Question # 8

Which of the following commands will you run to do case-sensitive search for files named

foobar.png?

A.

locate -name foobar.png

B.

find -iname foobar.png

C.

grep-name foobar.png

D.

find -name foobar.png

Full Access
Question # 9

You work as the Network Administrator for McNeil Inc. The company has a Linux- based network.

You are working as a root user on the Red Hat operating system. Joe is a user in your company. You want to remove Joe's tmp files that are 3 days older. Which of the following command syntaxes should you use to accomplish the task?

A.

find /tmp -cmin +3 -user Joe -ok rm {} \;

B.

find /tmp -ctime +3 user Joe -ok rm {} \;

C.

find /tmp -ctime +3 -user Joe -ok rm {} \;

D.

find /tmp -cmin +3 user Joe -ok rm {} \;

Full Access
Question # 10

Which of the following commands pipes stdout and stderr from cmd1 to cmd2?

A.

cmd2 | cmd1

B.

cmd2 2>&1 | cmd1

C.

cmd1 | cmd2

D.

cmd1 2>&1 | cmd2

Full Access
Question # 11

What will be the output of the following command? echo $(date %M) > date.txt

A.

It will print a string "date %M".

B.

The current time (Month) will be written in the date.txt file.

C.

The current time (Minutes) will be written in the date.txt file.

D.

It will create a variable $(date %M).

Full Access
Question # 12

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a dat a.txt file, 200MB in size, into two files in which the size of the first file named data.txt.aa should be150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command: split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt

Which of the following commands can John use to join the splitted files into a new data.txt file?

A.

vi data.txt.*

B.

less data.txt.* > data.txt

C.

cat data.txt.* > data.txt

D.

vi data.txt.* > data.txt

Full Access
Question # 13

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named

RickGroup.txt. Which of the following commands will you use to accomplish the task?

A.

ls rick /etc/group > RickGroup.txt

B.

ls /etc/group rick > RickGroup.txt

C.

grep /etc/group rick > RickGroup.txt

D.

grep rick /etc/group > RickGroup.txt

Full Access
Question # 14

You work as the Network administrator for McNeil Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a PostScript file on your system. You want to convert this file to a PDF file. Which of the following commands should you use to accomplish the task?

A.

ps2pdf

B.

evince

C.

pdf2ps

D.

enscript

Full Access
Question # 15

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

A.

touch -t 200911110259.58 private.txt

B.

rm private.txt #11 Nov 2009 02:59:58 am

C.

touch private.txt #11 Nov 2009 02:59:58 am

D.

touch -d "11 Nov 2009 02:59:58 am" private.txt

Full Access
Question # 16

Which of the following commands is used to count the number of bytes in a file?

A.

wc -l filename

B.

wc -c filename

C.

wc -m filename

D.

wc -w filename

Full Access
Question # 17

John works as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.

John wants to view a PDF document on his Linux system. Which of the following commands should John use to accomplish the task?

A.

ps2pdf

B.

enscript

C.

evince

D.

a2ps

Full Access
Question # 18

Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?

A.

ls /tmp > deletelater.txt

B.

ls deletelater.txt /tmp

C.

ls /tmp deletelater.txt

D.

ls /tmp >> deletelater.txt

Full Access
Question # 19

Which of the following files does the /var directory NOT contain?

A.

System log files

B.

Kernel files

C.

Email-spools

D.

Print spools

Full Access
Question # 20

Which of the following operators is used to connect the output of one command to the input of another command?

A.

>

B.

|

C.

2>

D.

&>

Full Access
Question # 21

Mark works as a Network Administrator for company.com Inc. The company has a Linux-based network. A printer is configured on the network. Mark wants to see the content of a print queue.

Which of the following commands will he use to accomplish the task?

A.

lprm

B.

lpstat -a

C.

lpq

D.

lpr

Full Access
Question # 22

You are a newly appointed Technician for company.com Inc. You are working on the Red Hat operating system. As you are about to leave for some important work, you want to shut down your system immediately. Which of the following commands can you use to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

A.

halt -h

B.

/sbin/stop

C.

shutdown -h now

D.

poweroff -h

Full Access