Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

RH133 Exam Dumps - Red Hat Linux System Administration

Question # 4

Which of the following is the default configuration file for the ifup command?

A.

/etc/syslog

B.

/etc/sysconfig

C.

/etc/init.d

D.

/etc/syslog.conf

Full Access
Question # 5

Which command is used to change access mode for files and directories?

A.

chmod

B.

chmode

C.

chgrp

D.

chown

Full Access
Question # 6

What is the maximum number of partitions that Linux kernel supports for SCSI drives?

A.

60

B.

63

C.

15

D.

30

Full Access
Question # 7

Which of the following utilities is used by the remote dump and restore programs in manipulating a magnetic tape drive through an interprocess communication connection?

A.

ssh

B.

rmt

C.

tar

D.

rcp

Full Access
Question # 8

You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.

A.

mkswap /dev/hdb2

B.

swapon /dev/hdb2

C.

mount

D.

parted

Full Access
Question # 9

Which of the following Linux commands is used to assign privileges over a particular file to a designated user?

A.

chgrp

B.

chmod

C.

chown

D.

useradd

Full Access
Question # 10

Which of the following is GRUB Menu Configuration File?

A.

/etc/grub.conf

B.

/boot/grub/grub.conf

C.

/etc/grub/grub.conf

D.

/boot/grub.conf

Full Access
Question # 11

Which of the following run levels start the system in single user mode?

Each correct answer represents a complete solution. Choose all that apply.

A.

0

B.

single

C.

S

D.

s

E.

1

Full Access
Question # 12

Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

A.

find /etc -name *.txt

B.

find start -dir -min -60

C.

find start -dir -cmin -60

D.

find start -cmin -60

Full Access
Question # 13

Which of the following commands are used to remove a package from a Linux system?

Each correct answer represents a complete solution. Choose two.

A.

yum -rm packagename

B.

yum erase packagename

C.

yum -r packagename

D.

yum remove packagename

Full Access
Question # 14

Which of the following commands can be used to overwrite an existing kernel image file?

A.

mkinitrd -v

B.

mkinitrd --preload

C.

mkinitrd --builtin

D.

mkinitrd -f

Full Access
Question # 15

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

A.

getpid

B.

ps

C.

kill

D.

killall

Full Access
Question # 16

Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

A.

fsck -P

B.

fsck -A

C.

fsck -f

D.

fsck -y

Full Access
Question # 17

You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

lvsize

B.

resize2fs

C.

reduce2fs

D.

lvreduce

Full Access
Question # 18

Which of the following files is used to view the current status of RAID devices in Linux?

A.

/proc/mdstat

B.

/proc/stat

C.

/proc/meminfo

D.

/proc/mounts

Full Access
Question # 19

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

smbmount

B.

smbfsmount

C.

mount smb

D.

mount -t smbfs

Full Access
Question # 20

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?

A.

e2fsck

B.

mount

C.

fsck

D.

mkfs

Full Access
Question # 21

Fill in the blank with the appropriate command.

The ________ command recursively removes files, which have not been accessed for a period of time.

A.

tmpwatch

Full Access
Question # 22

Which of the following commands is used to list all contents of a superblock of a partition?

A.

tune2fs -c

B.

tune2fs -f

C.

tune2fs -l

D.

tune2fs -j

Full Access
Question # 23

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A.

e2fsck

B.

fsck

C.

fsck -N

D.

fsck.ext2

Full Access
Question # 24

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the quota setting of the user named MariA. Which of the following commands will he use to accomplish the task?

A.

edquota -u

B.

edquota -g

C.

edquota -p

D.

edquota –T

Full Access
Question # 25

Which command displays the lines in a file that match a pattern?

A.

cat

B.

grep

C.

history

D.

cp

Full Access
Question # 26

By default, which of the following commands configures the current run level?

A.

service

B.

chkconfig

C.

ntsysv

D.

pstree

Full Access
Question # 27

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?

A.

/var/log/wtmp

B.

/var/log/dmesg

C.

/var/log/bootmsg

D.

/var/log/messages

Full Access
Question # 28

You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

lvreduce

B.

resize2fs

C.

lvsize

D.

reduce2fs

Full Access
Question # 29

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder? Each correct answer represents a part of the solution. Choose all that apply.

A.

No permission to others.

B.

Read permission to the owner.

C.

Read and Execute permissions to the group.

D.

Read, Write, and Execute permissions to the owner and the group.

E.

Read permission to the group.

F.

Read and Execute permissions to the owner.

Full Access
Question # 30

You are a newly appointed network technician at Net Perfect Inc. The company has a Linux-based network. You want to install a package named firefox on your Linux system. Which of the following commands will you use to accomplish the task?

A.

yum update firefox

B.

yum i firefox

C.

yum install firefox

D.

yum -ivh firefox

Full Access
Question # 31

Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?

A.

e2fsck -f

B.

e2fsck -p

C.

e2fsck -c

D.

e2fsck –b

Full Access
Question # 32

Drag and drop the appropriate commands before their respective functions.

Full Access
Question # 33

Which of the following files contains the configuration of the kernel modules?

A.

/etc/kernel.modules

B.

/etc/lilo.conf

C.

/etc/conf.modules

D.

/etc/syslog.conf

Full Access
Question # 34

You are a newly appointed Red Hat Technician for uCertify Inc. The company has a Linux-based network. You want to install a package named httpd on your Linux system. Before installing the package, you want to get the list of those packages that httpd depends on. Which of the following commands will you use to accomplish the task?

A.

rpm -qR httpd

B.

yum list httpd

C.

rpm deplist httpd

D.

yum deplist httpd

Full Access
Question # 35

Which of the following commands is used to unmount a file system from its mount point?

A.

automount

B.

fdisk

C.

umount

D.

unmount

Full Access
Question # 36

Which of the following rpmbuild command options is used to print debugging information of an rpm package?

A.

--pipe

B.

-vv

C.

-v

D.

--quite

Full Access
Question # 37

Which of the following images provide support for different types of network interface cards and other network devices?

A.

drvblock.img

B.

bootdisk.img

C.

drvnet.img

D.

pcmciadd.img

Full Access
Question # 38

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to decompress a gZipped tarball. Which of the following commands will John use to accomplish this task?

A.

tar -cvf

B.

tar -zxvf

C.

tar -xvf

D.

tar -jzvf

Full Access
Question # 39

You work as a Network Administrator for McNeil Inc. You are configuring a hard disk drive of a Linux server.

Which of the following steps can prevent the server from failure due to a log file or user quota overrun?

A.

Using the same file system for /bin and /usr.

B.

Using separate file systems for /home and /var.

C.

Using separate file systems for /bin and /usr.

D.

Using the same file system for /home and /var.

Full Access
Question # 40

Which of the following statements are true about rsync?

Each correct answer represents a complete solution. Choose all that apply.

A.

It can use any transparent remote shell, including ssh or rsh.

B.

It does not support for anonymous or authenticated rsync daemons.

C.

It does not require super-user privileges.

D.

It supports for copying links, devices, owners, groups, and permissions.

Full Access
Question # 41

Which of the following mke2fs command parameters is used to read bad blocks from a given file?

A.

-I

B.

-N

C.

-c

D.

-m

Full Access
Question # 42

Which of the following servers can provide files required for Red Hat Linux installation process?

Each correct answer represents a complete solution. Choose all that apply.

A.

FTP

B.

HTTP

C.

SMB

D.

NFS

Full Access
Question # 43

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure

X?

A.

root/videoconf

B.

root/x11/xf86config

C.

etc/x11/xf86config

D.

etc/videoconf

Full Access
Question # 44

What does the third field in the process entry of the /etc/inittab file define?

A.

It defines the name of the process to be executed.

B.

It is an identification number of the process entry.

C.

It defines the action to be taken by the process.

D.

It defines the run level of the process.

Full Access
Question # 45

Which of the following commands can be used to display the file name, owner, group, and the Access Control List (ACL) of a given file?

A.

rdev

B.

cardmgr

C.

getfacl

D.

dd

Full Access
Question # 46

Which of the following commands can be used to add a new user in Linux?

A.

mkuser

B.

newuser

C.

addnewusr

D.

useradd

Full Access
Question # 47

Which of the following scripts invokes the runlevel scripts?

A.

/etc/rc.d/rc.local

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc.serial

D.

/etc/rc.d/rc

Full Access
Question # 48

Which of the following traceroute command parameters displays numeric addresses instead of names of the routers?

A.

-v

B.

-f

C.

-w

D.

-n

Full Access
Question # 49

Which of the following commands will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish?

A.

tmpwatch

B.

logrotate

C.

anacron

D.

logwatch

Full Access
Question # 50

Which of the following files contain the information on how init should set up the system in every run level?

A.

/etc/rc.d/rc.local

B.

/sbin/runlevel

C.

/etc/rc.d/rc.sysinit

D.

/etc/inittab

Full Access