Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

RH133 Questions and Answers

Question # 6

Which of the following files is the Linux Loader (LILO) configuration file?

A.

/etc/liloconf

B.

/etc/lilo.con

C.

/etc/lilocon

D.

/etc/lilo.conf

Full Access
Question # 7

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.weare-secure.com. He enters the following command on the Linux terminal: chmod 741 secure.c Considering the above scenario, which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

The textual representation of the file access permission of 741 will be -rwxr--rw-.

B.

By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

C.

John is providing all rights to the owner of the file.

D.

John is restricting a guest to only write or execute the secure.c file.

Full Access
Question # 8

Which of the following commands will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish?

A.

logrotate

B.

anacron

C.

tmpwatch

D.

logwatch

Full Access
Question # 9

Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

A.

fsck -P

B.

fsck -A

C.

fsck -f

D.

fsck -y

Full Access
Question # 10

You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?

A.

history !!

B.

history ##

C.

history !#

D.

history !1

Full Access
Question # 11

Which of the following files will you need to modify to disable the SELinux?

Each correct answer represents a complete solution. Choose all that apply.

A.

/etc/selinux/config

B.

/etc/grub.conf

C.

/etc/sysconfig/network

D.

/etc/selinux.conf

Full Access
Question # 12

Which of the following commands is used to make a swap active after creating a new SWAP partition?

A.

mkswap

B.

swapon

C.

fdisk

D.

mkfs

Full Access
Question # 13

You want to temporarily change your primary group to another group of which you are a member.

In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

A.

chgrp

B.

newgrp

C.

chmod

D.

chown

Full Access
Question # 14

Which of the following statements about Logical Volume Management (LVM) is true?

Each correct answer represents a complete solution. Choose all that apply.

A.

It can resize volume groups online by absorbing new physical volumes (PV) or ejecting existing ones.

B.

It can resize logical volumes (LV) online by concatenating extents onto them or truncating extents from them.

C.

It cannot suffer from internal fragmentation.

D.

It can stripe whole or parts of logical volumes across multiple PVs, in a fashion similar to R AID0.

Full Access
Question # 15

You work as a Network Administrator for Perfect World Inc. The company has a Linux-based network. You have configured a Linux server to connect to the Internet. Before connecting it to the Internet, you want to check all the files on which SUID has been set. Which of the following commands will you choose to list all such programs?

A.

find /-perm -2000

B.

ls -l

C.

find /-perm -4000

D.

ls -suid

Full Access
Question # 16

Which of the following commands sets the run level of a Linux computer?

A.

ps

B.

mount

C.

init

D.

kill

Full Access
Question # 17

Which of the following commands is used to see list of previously entered command on the Red Hat operating system?

A.

cat

B.

history

C.

ls

D.

man

Full Access
Question # 18

Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?

A.

su

B.

cngrl

C.

mount

D.

init

Full Access
Question # 19

Alicia works as a System Administrator for SoftTech Inc. The company uses the Linux operating system. She wants to install Apache on the company's server. Which of the following commands will she use to check whether or not Apache is already installed on the server?

A.

rpm -U apache

B.

rpm -q apache

C.

rpm --checksig

D.

rpm -i apache

Full Access
Question # 20

John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server. John wants to give the following file permissions to the imp.c file:

l Read, Write, and Execute permissions to the owner

l Read and Write permissions to groups

l Read Only permissions to other users

Which of the following commands will John use to accomplish the task?

A.

chmod 765

B.

chmod 777

C.

chmod 712

D.

chmod 764

Full Access
Question # 21

You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

lvreduce

B.

resize2fs

C.

lvsize

D.

reduce2fs

Full Access
Question # 22

You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.

You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know that some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?

A.

A high load average

B.

A high process ID

C.

A low load average

D.

A low CPU time

E.

A high CPU time

Full Access
Question # 23

Which of the following file should be edited, if MBR on /dev/hda is corrupted?

A.

/boot/grub/grub.conf

B.

/etc/grub/grub.conf

C.

/etc/grub.conf

D.

/sbin/grub-install/dev/hda

Full Access
Question # 24

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure

X?

A.

etc/videoconf

B.

root/videoconf

C.

root/x11/xf86config

D.

etc/x11/xf86config

Full Access
Question # 25

Which of the following files contains the names and locations of system log files?

A.

/etc/lilo.conf

B.

/usr/syslog.conf

C.

/etc/syslog.conf

D.

/usr/lilo.conf

Full Access
Question # 26

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to run xdm automatically when the

Linux operating system reboots. What will he do to accomplish the task?

A.

Enter the run xdm -auto command on the terminal.

B.

Enter the xdm command on the terminal.

C.

Enter the killall xdm command on the terminal.

D.

Change the default run level for xdm in the /etc/inintab file.

Full Access
Question # 27

In Linux, which of the following is the correct way to view a disk's current partition configuration?

A.

Run the fdisk command, and then type c at the command prompt.

B.

Run the fdisk command, and then type f at the command prompt.

C.

Run the fdisk command, and then type v at the command prompt.

D.

Run the fdisk command, and then type p at the command prompt.

Full Access
Question # 28

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are configuring a Linux computer. You want the Linux system to be booted in XWindow by default. Which of the following runlevels will you choose?

A.

5

B.

3

C.

2

D.

6

Full Access
Question # 29

You work as a Network Administrator for Rick International. The company has a Linux-based network. You have to remove a package named TEST from a Linux server. Which of the following commands will you use to accomplish the task?

A.

rpm -e TEST

B.

rpm -ql TEST

C.

rpm -qi TEST

D.

rpm -i TEST

Full Access
Question # 30

Which of the following files is used to view the current status of RAID devices in Linux?

A.

/proc/mdstat

B.

/proc/stat

C.

/proc/meminfo

D.

/proc/mounts

Full Access
Question # 31

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

vi /etc/passwd

B.

vi /etc/shadow

C.

useradd Trinity

D.

passwd Trinity

E.

Trinity:x:505:505::/home/Trinity:/sbin/nonlogin

Full Access
Question # 32

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?

A.

init 3

B.

init 6

C.

init 0

D.

reboot -i

E.

shutdown -r now

Full Access
Question # 33

You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?

A.

rpm --erase --allmatches

B.

rpm -e --allmatches

C.

rpm -e --noscript

D.

rpm -e --nodeps

Full Access
Question # 34

Which of the following commands can be used to overwrite an existing kernel image file?

A.

mkinitrd -v

B.

mkinitrd --preload

C.

mkinitrd --builtin

D.

mkinitrd -f

Full Access
Question # 35

Fill in the blank with the appropriate command.

The ________ command recursively removes files, which have not been accessed for a period of time.

A.

tmpwatch

Full Access
Question # 36

You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?

A.

2

B.

0

C.

1

D.

3

Full Access
Question # 37

Which of the following RAID levels provide striping without parity?

A.

RAID 5

B.

RAID 1

C.

RAID 4

D.

RAID 0

Full Access
Question # 38

What is the maximum number of partitions that can be defined on a single hard disk?

A.

16

B.

5

C.

10

D.

14

Full Access
Question # 39

Which of the following run levels is officially undefined?

A.

Run level 3

B.

Run level 4

C.

Run level 2

D.

Run level 5

Full Access
Question # 40

While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.

A.

swap

B.

ext3

C.

nfs

D.

befs

E.

ntfs

Full Access
Question # 41

Which of the following commands is used to create a new group?

A.

grpadd

B.

groupadd

C.

new group

D.

chgrp

Full Access
Question # 42

Which of the following files contain the information on how init should set up the system in every run level?

A.

/etc/rc.d/rc.local

B.

/sbin/runlevel

C.

/etc/rc.d/rc.sysinit

D.

/etc/inittab

Full Access
Question # 43

Which command is used to change ownership of a group?

A.

chown

B.

chgroup

C.

chmod

D.

chgrp

Full Access
Question # 44

Which of the following files defines which services to start?

A.

/etc/inittab

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc

D.

/etc/rc.d/init.d

Full Access
Question # 45

Which of the following run levels runs the system at single user mode?

A.

3

B.

1

C.

0

D.

2

Full Access
Question # 46

Which of the following commands can be used to view addresses assign to each interface?

A.

ping

B.

ifconfig

C.

ip addr show (interface name)

D.

tracert

Full Access
Question # 47

What is the maximum number of partitions that Linux kernel supports for SCSI drives?

A.

60

B.

63

C.

15

D.

30

Full Access
Question # 48

Which of the following graphical tools can be used to create and modify Kickstart files?

A.

ksvalidator

B.

system-config-services

C.

system-config-securitylevel

D.

system-config-kickstart

Full Access
Question # 49

Which of the following commands can be used to check the status of RAID devices?

A.

fsck

B.

mkfs

C.

mdadm

D.

fdisk

Full Access
Question # 50

Which of the following commands is used to check file system errors?

A.

fsck

B.

fdisk

C.

tripwire

D.

chkdsk

Full Access