Red Hat Linux Essentials v6.1 (RH033)

Page:    1 / 11   
Total 153 questions

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux- based network. You want to modify a configuration file in a Linux server. Which of the following utilities will you use to accomplish the task?

  • A. VI
  • B. NMAP
  • C. MS Word
  • D. GZIP


Answer : A

Explanation:
The VI is a visual interactive text editor that allows a user to create, modify, and store files on a Linux computer. It works in the following modes:
Command: This is the default mode of the command. Various commands can be used in this mode to manipulate the opened text.
Input: In this mode, a user can insert text directly in the text screen area.
Answer option D is incorrect. The GNU zip (GZIP) utility is a compression utility that is used to compress files for saving space. It creates files with the .gz extension. It can also compress tar files. In order to unzip files with the .gz extension, the
GUNZIP command is used.
Answer option B is incorrect. The nmap utility, also commonly known as port scanner, is used to view the open ports on a Linux computer. It is used by administrators to determine which services are available for external users. This utility helps administrators in deciding whether to disable the services that are not being used in order to minimize any security risk.
Answer option C is incorrect. MS Word is a Windows-based utility. Hence, it cannot be used in Linux.

Which of the following is a utility that can function as an independent spell checker?

  • A. spell
  • B. nice
  • C. aspell
  • D. inspell


Answer : C

Explanation:
aspell is a utility that can function as an ispell -a replacement, as an independent spell checker, as a test utility to test out Aspell features, and as a utility for managing dictionaries.
Syntax:
aspell [options]
Some important options used with aspell are as follows:
Answer option B is incorrect. The nice command is used to change the priority of a process in the kernel's scheduler. A niceness of -20 is the highest priority and 19 is the lowest priority. The default niceness for processes is inherited from its parent process, usually 0.
For example, when specifying a very low priority, the following command can be entered: nice -n 19 cc -c *.c &
The above command runs the cc command in the background at a lower priority than the default priority set by the nice command.
Answer options D and A are incorrect. There are no such spell checkers as inspell and spell.

You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?

  • A. history !#
  • B. history !!
  • C. history ##
  • D. history !1


Answer : B

Explanation:
The history !! command shows the previously entered command in the bash shell. In the bash shell, the history command is used to view the recently executed commands. History is on by default. A user can turn off history using the command set +o history and turn it on using set o history. An environment variable HISTSIZE is used to inform bash about how many history lines should be kept. The following commands are frequently used to view and manipulate history:
Answer option A is incorrect. The history !# command shows the entire command line typed.
Answer option D is incorrect. The history !n command shows the nth command typed.
Since n is equal to 1 in this command, the first command will be shown.
Answer option C is incorrect. It is not a valid command.

Which of the following SHELL commands displays currently logged-in users and their tasks?

  • A. w
  • B. finger
  • C. whoami
  • D. who


Answer : A

Explanation:
The w command displays currently logged-in users and their tasks.
Answer option C is incorrect. The whoami command displays the user name of the current user.
Answer option D is incorrect. The who command displays currently logged-in users. It does not display their tasks.
Answer option B is incorrect. The finger command displays information on system users.

John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. touch -t 200911110259.58 private.txt
  • B. rm private.txt #11 Nov 2009 02:59:58 am
  • C. touch private.txt #11 Nov 2009 02:59:58 am
  • D. touch -d "11 Nov 2009 02:59:58 am" private.txt


Answer : A,D

Explanation:
According to the scenario, John wants to change the modified date and time of the file private.txt to a desired date and time. For this, he can use either the touch -t or touch -d command. The difference between these two commands is that the touch -d command is more flexible, while the touch -t command takes the date and time in the format
MMDDhhmm.ss.

Which of the following are the Graphical Mail clients in Red Hat Enterprise Linux?
Each correct answer represents a complete solution. Choose two.

  • A. Pidgin
  • B. Mozilla
  • C. Evolution
  • D. mutt


Answer : B,C

Explanation:
The Evolution and Mozilla are the Graphical Mail clients in Red Hat Enterprise Linux.

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network.
By using the VI utility, you have created a document that has 100 lines. You want to replace all the occurrences of "net" with "Net" in the first 50 lines of the document. Which of the following commands will you use?

  • A. :1,$ s/net/Net/g
  • B. :1,100 s/net/Net/g
  • C. :1,50 s/net/Net/g
  • D. :s/net/Net/g


Answer : C

Explanation:
In order to replace all the occurrences of "net" with "Net" in the first fifty lines of the file, you will have to execute the following command: :1,50 s/net/Net/g
This command is issued in the command mode of the VI utility. 1,50 defines the initial and final line numbers of the current document where the command will execute. The s/ switch with the net/Net/g option will globally replace all the occurrences of "net" with "Net".
Answer option A is incorrect. This command will replace "net" with "Net" all over the current document.
Answer option B is incorrect. Since this command executes on the first 100 lines of a document, it will replace "net" with "Net" in all the 100 lines of the current document.
Answer option D is incorrect. This command will replace "net" with "Net" in the current line of the current document.

Which of the following commands will you execute to fix other writable files in your home directory?

  • A. find -perm -002 -exec chmod o-w {} \;
  • B. find /home -type d -ls
  • C. find ~ -perm -002 -exec chmod o-w {} \;
  • D. find ~ -perm -002 -exec chmod -w {} \;


Answer : C

Explanation:
You will use find ~ -perm -002 -exec chmod o-w {} \; command to fix other writable files in your home directory.
Answer option B is incorrect. The find /home -type d -ls command is used to do an ls -l style listing of all directories in /home/.
Answer options A and D are incorrect. There are no such commands in Linux.

John works as a Network Administrator for Perfect Solutions Inc. The company has a
Debian Linuxbased network. He is working on the bash shell in which he creates a variable
VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?

  • A. touch VAR1
  • B. env -u VAR1
  • C. export VAR1
  • D. echo $VAR1


Answer : C

Explanation:
Since John wants to use the variable VAR1 as an environmental variable, he will use the export command to accomplish the task.

You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?

  • A. wc -c file1.txt >>error.txt
  • B. wc -c file1.txt 1>error.txt
  • C. wc -c file1.txt 2>error.txt
  • D. wc -c file1.txt >error.txt


Answer : C

Explanation:
According to the scenario, you will use the wc -c file1.txt 2>error.txt command to accomplish the task. The 2> operator is an error redirector, which, while running a command, redirects the error (if it exists) on the specified file.
Answer options D and B are incorrect. The > or 1> redirector can be used to redirect the output of the wc -c file1.txt file to the error.txt file; however, you want to write the errors in the error.txt file, not the whole output.
Answer option A is incorrect. The >> operator will redirect the output of the command in the same manner as the > or 1> operator. Although the >> operator will not overwrite the error.txt file, it will append the error.txt file.

Fill in the blank with the appropriate permission to complete the statement below.
__________ is Linux access permission flag bit that allows users to run an executable file with the permissions of the executable's owner.

  • A. SUID


Answer : A

Explanation: Set user ID is the Linux access permission flag bit that allows users to run an executable file as the permissions of the executable's owner. When the Set user ID
(SUID) bit is set and a user executes the file, the user will have the same rights as the owner.
If the Set user ID bit is set and the owner has the execute permission, the 'x' in the owner permissions is replaced by 's'. If the Set user ID bit is set and the owner has no execute permission, the 'x' is replaced by 'S'.
For example:
-rwsrw----The owner has the execute permission and the SUID bit is set.
-rwSr----- The SUID bit is set, but the owner has no execute permission.

Which of the following commands is used to create a partition on a new hard disk of a
Linux computer?

  • A. fdisk
  • B. crpar
  • C. mount
  • D. fsck


Answer : A

Explanation:
The fdisk command is a menu-based command available with Linux for hard disk configuration. This command can perform the following tasks:
Delete a partition on a hard disk.
Create a partition on a hard disk.
Change the partition type.
Display the partition table.
Note: The sfdisk command-line utility is an alternative to the fdisk command.
Answer option C is incorrect. In Linux, the mount command is used to mount and display disks, partitions, and file systems. Mounting refers to the process in which the operating system prepares the media to be read.
Anwer option D is incorrect. The File System Check (fsck) command is used to scan all disks and partitions, and it repairs them if required. The fsck command should be run only on an unmounted file system.
Note: The function of the fsck command is similar to that of the Window's scandisk utility.
Answer option B is incorrect. There is no such command as crpar in Linux.

Which of the following is a multi-platform instant messaging client, based on a library named libpurple?

  • A. Evolution
  • B. mutt
  • C. Pidgin
  • D. Thunderbird


Answer : C

Explanation:
Pidgin (formerly named Gaim) is a multi-platform instant messaging client, based on a library named libpurple. Libpurple has support for many commonly used instant messaging protocols, allowing a user to log into various different services from one application.
What is Pidgin?
Pidgin is a multi-protocol Instant Messaging client that allows a user to use all of his IM accounts at once. It is a free software that can work with AIM ,Gadu-Gadu, Jabber, ICQ
,IRC, MSN, SILC, XMPP, Yahoo!, and Zephyr Network. Anyone is free to use it and modify it, but if a user distributes his modifications, he must distribute the modified source code as well.
The license of this communication software is Freeware, i.e. anyone can freely download and use this communication software.
Answer options A and D are incorrect. Evolution and Thunderbird are Graphical mail clients in Linux.
It is not an Instant Messenger.
What is Evolution?
Evolution is a full-featured personal and workgroup information management tool for Linux systems, and is the default email client for Red Hat Enterprise Linux. It provides all of the standard email client features, including powerful mailbox management, user-defined filters, and quick searches. Its additional feature is a flexible calendar/scheduler, which allows users to create and confirm group meetings and special events online.
What is Thunderbird?
Mozilla Thunderbird is a free, open source, cross-platform e-mail and news client developed by the
Mozilla Foundation.
Thunderbird can manage multiple e-mail, newsgroup and RSS accounts and supports multiple identities within accounts.
Thunderbird incorporates a Bayesian spam filter, a white list based on the included address book, and can also understand classifications by server-based filters such as
SpamAssassin. Thunderbird provides enterprise and government-grade security features such as SSL/TLS connections to IMAP and SMTP servers. It also offers native support for S/MIME secure email (digital signing and message encryption using certificates).
Answer option B is incorrect. mutt is an email client that manages emails within a text-only environment. It is not an Instant Messenger.
What is mutt? mutt is a powerful tool for managing email within a text-only environment.
This tool is very important to access email even when a graphical interface is not available.
Some of its strengths are handling of message threads and flexibility. When mutt sees a series of related messages, it displays each reply under the parent. mutt supports sending of attachments through a mail. The following example describes how a file can be attached to a mail: echo "Sending an attachment." | mutt -a backup.zip -s "attachment" [email protected]
This command will send a mail to [email protected] with the subject (-s) "attachment", the body text "Sending an attachment.", containing the attachment (-a) backup.zip.

You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.
You are working as a root user on the Linux operating system. Some employees have been recently appointed in your company. You have to add these users in your network.
Which of the following tools should you use to accomplish this task?
Each correct answer represents a complete solution. Choose two.

  • A. useradd
  • B. userdel
  • C. adduser
  • D. usermod


Answer : A,C

Explanation:
The useradd or adduser command is used to add a user on the Linux operating system.

You are a newly appointed network technician at Net Perfect Inc. The company has a
Linux-based network. You want to install a package named firefox on your Linux system.
Which of the following commands will you use to accomplish the task?

  • A. yum update firefox
  • B. yum i firefox
  • C. yum install firefox
  • D. yum -ivh firefox


Answer : C

Explanation:
You will use the yum install firefox command to install the package named firefox in the
Linux system. This command will search the configured repositories for the package named firefox, and if found, will install the latest version, pulling in dependencies if needed.
Answer options B and D are incorrect. The -ivh and i options are not used with the yum command.
Answer option A is incorrect. The yum update firefox command is used to update a package in the Linux system. It is not used to install a package in Linux. If run without any specified package, the update option will update every currently installed package. If one or more packages are specified, yum will only update the listed packages. While updating packages, yum will ensure that all dependencies are satisfied.

Page:    1 / 11   
Total 153 questions