Anda di halaman 1dari 6

Red Hat Linux System Administration Pre-

assessment Questionnaire

1. What is the default filesystem type under the current version of Red Hat?
ext2, the second extended Linux filesystem.
ext3, the third extended Linux filesystem.
reiserfs, the Reiser filesystem.
Do not know.

2. How many partitions are allowed on an IDE drive?


63 total partitions are allowed, but this number is only possible if you use an extended
partition, which will limit the number primary partitions to three.
15 total partitions are allowed.
Four primary partitions are allowed, plus an extended partition. Logical partitions reside
within the extended partition. Up to 15 logical partitions are allowed.
Do not know.

3. Explain filesystem remounts.


remount is an option to mount command allowing the system administrator to change the
options on a currently mounted filesystem; these changes will take effect immediately.
remount is a command that forces an unmount (umount) and a mount of a filesystem,
typically an NFS filesystem, to clear a stale file handle.
remount is a process that occurs when changing runlevels, effectively reapplying options
from the /etc/fstab file.
Do not know.

4. Which item below best represents the boot sequence?


The BIOS loads the boot loader; the boot loader loads the kernel; the kernel runs the initial
process.
The BIOS loads the kernel; the kernel loads the boot loader; the boot loader loads the initial
process.
The BIOS loads the initial process; the initial process loads the boot loader; the boot loader
loads the kernel.
Do not know.

5. On a default Red Hat system, what is the first program run by /sbin/init?
/etc/rc.d/rc.sysinit

/etc/rc.d/rc

/sbin/initdefault

Do not know.

6. How does runlevel S differ from runlevel 1?


There is no difference; they are exactly the same.
Runlevel 1 runs the /etc/rc.d/rc1.d scripts, but runlevel S does not.
Runlevel S runs rc.sysinit, but runlevel 1 does not.
Do not know.

7. How can a system administrator change the password of a non-privileged user?

If using shadow passwords, run shadow username. If using an integrated /etc/passwd file,
run passwd username. Either version will prompt the superuser for the new password.
Run passwd username. This will prompt the superuser for the new password.
It is necessary to know the non-privileged user's password in order to change it. The system
administrator can run passwd username. This will prompt the superuser for the user's
current password and the new password.
Do not know.

8. The /etc/shadow file:

must be used to hold the encrypted password; the second field of the /etc/passwd file is no
longer valid.
is optional; a system administrator can choose to use it or not.
is considered less secure than using an integrated /etc/passwd file.
Do not know.

9. What is the name of the tool that configures a network authentication scheme?

systemauth

userconfig

authconfig

Do not know.

10. Where is the NISDOMAIN variable set and stored?

/etc/sysconfig/network
/etc/sysconfig/network-scripts/ifcfg-interface, where interface is an interface name, such as
eth0.
/var/yp/securenets
Do not know.

11. The configuration file for the first ethernet interface is:

/etc/sysconfig/ifcfg-eth0
/etc/sysconfig/ifcfg-eth1
/etc/sysconfig/network-scripts/ifcfg-eth0
Do not know.

12. Which command does not modify the configuration file for the first ethernet
interface?
ifconfig

netconfig

redhat-config-network

Do not know.
13. Most daemon log messages get logged to:
/var/log/daemonname, where daemonname is the name of the
daemon.
/var/log/messages
/var/log/dmesg
Do not know.

14. The name of the bootable CD Image of RHEL:

 diskboot.img
 boot.iso
 pxeboot
 None of the above.

15. The recommended size for swap partition is usually:

 Twice the RAM size.


 Thrice the RAM size.
 Five times the RAM size.
 None of the above

16. Contents of the kernel buffer regarding the boot process are stored in:

 /var/log/messages.
 /var/log/dmesg.
 /var/log/bootlog.
 /var/log/secure

17. The file that contains information about each service that is started up at boot time:

 /tmp/startup.log.
 /tmp/boot.log.
 /var/log/boot.log.
 /var/log/startup.log.

18. To make temporary changes to GRUB we need to enter GRUB edit mode by pressing:

 w.
 c.
 u.
 e.
19. To make driver modules available for initialization process, they must be included in:

 initrd.
 init
 vmlinuz
 None of the above

20. The swap partitions are enabled during the boot process when:

 The script /etc/rc.d/rc.sysinit is executed.


 The script /etc/inittab is executed.
 The script /etc/rc.d/rc is executed.
 None of the above.

21. By default, the number of consoles defined in Red Hat Linux system is:

 6.
 7.
 12.
 24.

22. Which of the following commands are used to shutdown a system:

 shutdown –h now.
 poweroff.
 init 0.
 All the above

23. /proc is a virtual file system containing information about the running kernel.

 True.
 False.

24. The partition id for Linux extended partition is:

 0x5.
 0xf.
 0x82.
 0xfd.
25. The maximum number of partitions supported by the kernel:

 63 for IDE drives.


 32 for IDE drives.
 15 for SCSI drives.
 16 for SCSI drives.

26. Which one of the utilities is not used for managing partitions:

 fdisk.
 sfdisk.
 parted.
 partprobe.

27. In order to access files of individual or foreign file system, it must first be connected to the
filesystem tree. For that system we have to use:

 mount.
 mkfs.
 mke2fs.
 None of the above

28. The default gateway information is stored in which file?

 /etc/sysconfig/network.
 /etc/sysconfig/gateway.
 /etc/sysconfig/ifcfg.ethx.
 /etc/sysconfig/network-scripts/ifcfg-xxx.

29. The default behavior of ping is to send _____ Bytes ICMP packet to the specified host every
second until you cancel the operation:

 128.
 56.
 64.
 1024.

30. To delete bind-utils from the system, we use:

 # rpm –f bind-utils
 # rpm –e bind-utils
 # rpm –h bind-utils
 None of the above.

Anda mungkin juga menyukai