Wednesday, December 30, 2009

Red Hat Linux System Administration Pre-assessment Questionnaire

Red Hat Linux System Administration Pre-assessment Questionnaire
Topic #1: Supported Hardware

1) Which statement is false?
The master drive on the primary IDE controller is /dev/hda.
USB and PCMCIA devices are supported by Red Hat, but only USB is hot swappable.
Both SCSI and IDE are supported by Red Hat.
Do not know.

2) Block and character special devices, used to address hardware, do not display size in a long ls listing. Instead, they display
the amount of addressable space on the device
bus and device numbers
major and minor device numbers
Do not know.

3) Which statement is false?
The i686 and athlon kernels can map up to 4 GB of RAM, but using the bigmem kernel, more than 4 GB of RAM can be mapped if your hardware supports Physical Address Extentions (PAE).
Support for virtual CPUs using hyperthreading technology is only available when using smp or bigmem kernels.
Architectures supported by Red Hat Enterprise Linux products include IA-32, IA-64, Alpha, S/390, z-Series, pSeries, and Sparc.
Do not know.


Topic #2: Installation

1) When selecting packages to install,
you may make your selection by individual package or by package group; no further level of refinement is possible.
you may make your selection by individual package or by package group; if you choose the latter method, you can refine your choice by selected the related "Details" item.
the installer does not track how much disk space the requested installation will take.
Do not know.

2) Which statement about installation is false?
It is not possible to set up logical volume management at install time.
It is possible to set up additional non-privileged user accounts at install time.
Kickstart installations allows system administrators to install an operating system in a virtually hands-free manner, often requiring no human intervention, other than starting the kickstart process.
Do not know.

3) Setting up software RAID partitions
is not possible during the install.
is a simple one step process of designating a partition as a software RAID partition and declaring the mount point.
is a multi-step process: declare various partitions to be software RAID partitions and then RAID them together.
Do not know.

Topic #3: Creating and maintaining filesystems

1) What is the default filesystem type under the current version of Red Hat?
ext2, the second extended Linux filesystem.
ext3, the third extended Linux filesystem.
reiserfs, the Reiser filesystem.
Do not know.

2) How many partitions are allowed on an IDE drive?
63 total partitions are allowed, but this number is only possible if you use an extended partition, which will limit the number primary partitions to three.
15 total partitions are allowed.
Four primary partitions are allowed, plus an extended partition. Logical partitions reside within the extended partition. Up to 15 logical partitions are allowed.
Do not know.

3) Explain filesystem remounts.
remount is an option to mount command allowing the system administrator to change the options on a currently mounted filesystem; these changes will take effect immediately.
remount is a command that forces an unmount (umount) and a mount of a filesystem, typically an NFS filesystem, to clear a stale file handle.
remount is a process that occurs when changing runlevels, effectively reapplying options from the /etc/fstab file.
Do not know.

Topic #4: X Window System Administration

1) Which statement is true about the configuration of the X server?
The redhat-config-xfree86 command will not create an /etc/X11/XF86Config file.
You cannot create an /etc/X11/XF86Config file at install time.
The redhat-config-xfree86 command will probe your hardware to determine values for the /etc/X11/XF86Config file.
Do not know.

2) Which statement is true about the relationship between display managers and desktop environments?
To use the KDE desktop, you must use the kdm display manager.
Regardless of the display manager you use, you may start up either the KDE desktop or the GNOME desktop.
When you use switchdesk to select a desktop environment, you also select a display manager.
Do not know.

3) Which of the following statements about using the Xauthority security mechanism with ssh is false?
An MIT magic cookie must be manually created before the Xauthority mechanism can be used with ssh.
To use the Xauthority mechanism with ssh, log into the remote computer using ssh from an xterm-type application running on the X server system and run the application.
When using the Xauthority security mechanism through ssh, all data passing between the remote client and the local X server will be encrypted.
Do not know.


Topic #5: System initialization

1) Which item below best represents the boot sequence?
The BIOS loads the boot loader; the boot loader loads the kernel; the kernel runs the initial process.
The BIOS loads the kernel; the kernel loads the boot loader; the boot loader loads the initial process.
The BIOS loads the initial process; the initial process loads the boot loader; the boot loader loads the kernel.
Do not know.

2) On a default Red Hat system, what is the first program run by /sbin/init?
/etc/rc.d/rc.sysinit
/etc/rc.d/rc
/sbin/initdefault
Do not know.

3) How does runlevel S differ from runlevel 1?
There is no difference; they are exactly the same.
Runlevel 1 runs the /etc/rc.d/rc1.d scripts, but runlevel S does not.
Runlevel S runs rc.sysinit, but runlevel 1 does not.
Do not know.

Topic #6: User and group administration

1) How can a system administrator change the password of a non-privileged user?
If using shadow passwords, run shadow username. If using an integrated /etc/passwd file, run passwd username. Either version will prompt the superuser for the new password.
Run passwd username. This will prompt the superuser for the new password.
It is necessary to know the non-privileged user's password in order to change it. The system administrator can run passwd username. This will prompt the superuser for the user's current password and the new password.
Do not know.

2) The /etc/shadow file:
must be used to hold the encrypted password; the second field of the /etc/passwd file is no longer valid.
is optional; a system administrator can choose to use it or not.
is considered less secure than using an integrated /etc/passwd file.
Do not know.

3) What is the net effect of running the following commands:
usermod -G sysadmns digby
usermod -G websters digby
digby is a member of the websters group.
digby is a member of the sysadmns and websters groups.
digby's primary group (as specified in the /etc/passwd file) is websters.
Do not know.

Topic #7: Client-side network authentication

1) Which of the following is not a common network authentication scheme?
NIS
LDAP
autofs
Do not know.

2) What is the name of the tool that configures a network authentication scheme?
systemauth
userconfig
authconfig
Do not know.

3) Where is the NISDOMAIN variable set and stored?
/etc/sysconfig/network
/etc/sysconfig/network-scripts/ifcfg-interface, where interface is an interface name, such as eth0.
/var/yp/securenets
Do not know.

Topic #8: Network setup and troubleshooting

1) The configuration file for the first ethernet interface is:
/etc/sysconfig/ifcfg-eth0
/etc/sysconfig/ifcfg-eth1
/etc/sysconfig/network-scripts/ifcfg-eth0
Do not know.

2) Which command does not modify the configuration file for the first ethernet interface?
ifconfig
netconfig
redhat-config-network
Do not know.

3) Where can the default route be specified?
In the global network default file, /etc/sysconfig/network, only.
In the network interface configuration files only.
In either the global network default file, /etc/sysconfig/network, or the network interface configuration files.
Do not know.

Topic #9: Printing

1) Which printing subsystem is available under current versions of Red Hat:
printcap
CUPS
BSD
Do not know.

2) From the user's perspective, which printing user interfaces are available on Red Hat:
LPRng and CUPS
BSD and LPRng
BSD and System V
Do not know.

3) What is the name of a valid print daemon under Red Hat?
printd
cupsd
spoold
Do not know.

Topic #10: System Logging and Monitoring

1) Most daemon log messages get logged to:
/var/log/daemonname, where daemonname is the name of the daemon.
/var/log/messages
/var/log/dmesg
Do not know.

2) Which statement about system logging is false?
klogd logs kernel messages; syslogd logs some other log messages.
The system logging subsystem can send messages over the network to a log host.
The following line in the /etc/syslog.conf file means that no messages will be logged through the mail facility:
mail.* /var/log/maillog
Do not know.

3) The load average is a measure of how busy your CPU is. What does it measure?
The number of non-timer interrupts divided by the number of minutes over which the average is taken, divided by 1000 (or 1024, depending on the version of Linux or Unix being used).
The average number of processes in the process table over an increment of time.
The average number of processes in the runnable state over an increment of time.
Do not know.

Topic #11: System-wide task automation

1) How many fields does an entry in the /etc/crontab file have?
6: five time specifications and a command, the same number as users' crontab files.
7: five time specifications, a user under whose authority the command should be run, a command; this is one more than users' crontab files.
7: five time specifications, an email address to receive unredirected standard output and standard error, and a command; this is one more than users' crontab files.
Do not know.

2) By default, the /etc/crontab file is populated with:
A series of commands such as makewhatis, tmpwatch, and logrotate that perform system maintenance on a regular basis.
A series of runparts commands that, in turn, run a series of other commands, such as makewhatis, tmpwatch, and logrotate, that perform system maintenance on a regular basis.
By default, the file contains no commands, allowing individual system administrators to populate the file.
Do not know.

3) To prevent some users from using the at command:
add the users to the atdeny group in the /etc/group file.
put the usernames of those users in the /etc/at.deny file.
as there is no /etc/at.deny file, you must put the names of the users permitted to use the at command in the /etc/at.allow file.
Do not know.

Topic #12: RPM

1) What is not one of the functions of the rpm command?
Install software.
Query the database of installed software.
Optionally, interactively configure newly installed software packages, asking the system administrator a series of questions about the install, such as whether or not the files have been relocated to a different directory.
Do not know.

2) What is the difference between these two rpm commands?
rpm -Uhv mypkg.1.0-2.noarch.rpm
rpm -Fhv mypkg.1.0-2.noarch.rpm
The -U version of the command uninstalls the package, whereas the -F version will upgrade the package if a previous version is already installed.
Both will upgrade the mypkg package if it is already installed, but if the mypkg package is not installed, the -U version will install it, whereas the -F version will not.
The -U version will uninstall the package, whereas the -F version will do a test install, reporting any install errors without actually installing it.
Do not know.

3) In the query command below, what is being queried?
rpm -qp mypkg.1.0-0.noarch.rpm
The package file.
The RPM database on the current system.
Nothing. This is not a valid query.
Do not know.

1 comment:

  1. In summer i will take admission in Linux currently i am working on cat photos and my focus is on making these photos.
    Thanks for sharing this.

    ReplyDelete