RED HAT LINUX SYSTEM ADMINISTRATION Multiple Choice Questions :-

1. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
A. repquota
B. quotaon
C. warnquota
D. edquota
E. quotaoff
Answer: C, D

2. Which of the following commands will you run to list all files that have been modified within the last 60 minutes?
A. find /etc -name *.txt
B. find start -dir -min -60
C. find start -dir -cmin -60
D. find start -cmin -60
Answer: C

3. You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.
A. mkswap /dev/hdb2
B. swapon /dev/hdb2
C. mount
D. parted
Answer: A, B, D

4. You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.
You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know that some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?
A. A high load average
B. A high process ID
C. A low load average
D. A low CPU time
E. A high CPU time
Answer: E

5. You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?
A. 2
B. 0
C. 1
D. 3
Answer: C

6. Which of the following commands can be used to compress a file?
Each correct answer represents a complete solution. Choose all that apply.
A. gzip
B. compress
C. tar
D. zip
Answer: A, B, D

7. You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following bootloaders does not require to be rewritten after the configuration of the kernel has been changed?
A. GRUB
B. BOOTP
C. LILO
D. ELILO
Answer: A

8. Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?
A. fsck -P
B. fsck -f
C. fsck -A
D. fsck -y
Answer: C

9. After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
A. /usr/shadow
B. /etc/passwd
C. /usr/passwd
D. /etc/shadow
Answer: D

10. You work as a Software Engineer for McNiel Inc. The company has a Linux-based network. The company has 150 Engineers. The root user has configured quota limits for each user. You want to view quota limits for your system. Which of the following commands will you use to accomplish this task?
A. repquota -a
B. quota -v
C. quotacheck
D. edquota
Answer: B

11. Which of the following commands is used to create a user account for a new user?
A. USERMOD
B. MOUNT
C. USERADD
D. CRUSER
Answer: C

12. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are configuring a server that will be used as a file server. You want to install an RPM package, named FILELOCATOR, on the server. You want to check whether the package is already installed. Which of the following commands will you use?
A. grep FILELOCATOR
B. find -q rpm | grep FILELOCATOR
C. rpm -qa | grep FILELOCATOR
D. find FILELOCATOR
Answer: C

13. By default, which of the following commands configures the current run level?
A. chkconfig
B. pstree
C. service
D. ntsysv
Answer: D

14. When installing RHEL in the graphical interface, which of the following switches can be used to specify a resolution?
A. lowers
B. vnc
C. resolution
D. skipddc
Answer: C

15. You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?
A. rpm -ivh
B. rpm -evh
C. rpm -qvh
D. rpm -Uvh
Answer: D

16. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to run the cc process at runlevel three. If the order of execution of cc command is 43, which of the following commands will John use to accomplish his task?
A. ln -s /etc/init.d/cc /etc/rc.d/rc3.d/K43cc
B. ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/K43cc
C. ln -s /etc/rc.d/cc /etc/rc.d/rc3.d/s43cc
D. ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/S43cc
Answer: D

17. Which of the following commands displays a module name or filename and associated information, such as the authors name, license, description, module version, dependencies, parameters, etc?
A. modprobe
B. lsmod
C. modprob
D. modinfo
Answer: D

18. After creating the swap area, which of the following commands will you need to run to start using it?
A. mkswap
B. mkfs
C. swapon
D. swapoff
Answer: C

19. You work as a Network Administrator for Secure Web Inc. The company has a Linux-based network. The network has a mixed set of client operating systems. You want to format a new hard disk drive. The drive will have only one partition. Both the Linux and Windows operating systems will access the partition. Which of the following file systems will you use?
A. VFAT
B. XFS
C. REISER
D. EXT3
Answer: A

20. What is the minimum RAM requirement for installing Red Hat in GUI mode?
A. 1GB
B. 512 MB
C. 128MB
D. 64MB
Answer: C

21. Fill in the blank with the appropriate command.
The ________ command recursively removes files, which have not been accessed for a period of time.
A. tmpwatch
Answer: A

22. Which of the following commands can be used to modify kernel parameters at runtime?
A. sync
B. sysctl
C. mkinitrd
D. lsdev
Answer: B

23. You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. rpm -e
B. rpm -K
C. rpm –checksig
D. rpm -V
Answer: B, C, D

24. Which of following options will you use to force mtr to display numeric IP numbers and not try to resolve the host names?
A. -t
B. -n
C. -l
D. -p
Answer: B

25. Which of the following statements are true about kernel modules?
Each correct answer represents a complete solution. Choose all that apply.
A. Kernel modules do not support executable loaders.
B. The kernel module contains extra kernel codes that may be loaded after the loading of the base kernel.
Only a minimal resident kernel is loaded into memory at boot time.
C. Kernel modules do not support the device drivers, network drivers, and file system drivers.
D. Whenever a user requests a feature that is not present in the resident kernel, a kernel module is dynamically loaded into memory.
Answer: B, D

26. You want to temporarily change your primary group to another group of which you are a member.
In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?
A. chgrp
B. newgrp
C. chmod
D. chown
Answer: B

27. You want to make Rick an owner of the files TRADE1.TXT and TRDREPORT.TXT. Which of the following commands will you use to accomplish this?
A. chown rick TRADE1.TXT TRDREPORT.TXT
B. chgrp rick TRADE1.TXT + TRDREPORT.TXT
C. chown rick TRADE1.TXT + TRDREPORT.TXT
D. chgrp rick TRADE1.TXT TRDREPORT.TXT
Answer: A

29. You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
A. vi /etc/passwd
B. vi /etc/shadow
C. useradd Trinity
D. passwd Trinity
E. Trinity:x:505:505::/home/Trinity:/sbin/nonlogin
Answer: A, B, C, D, E

30. Which of the following commands can be used to check the errors of the ext2 and ext3 filesystems?
Each correct answer represents a complete solution. Choose two.
A. fsck –ext2
B. fsck.ext3
C. fsck –ext3
D. e2fsck
Answer: B, D

RED HAT LINUX SYSTEM ADMINISTRATION Objective Questions Pdf Free Download ::

31. Which of the following statements is true about fdisk command?
A. It is used to build a Linux file system on a device, usually a hard disk partition.
B. It is used to create, change, delete, or display current partitions on the hard disk.
C. It is used to check and optionally repair one or more Linux file systems.
D. It displays or changes the filesystem label on the ext2 filesystem located on device.
Answer: B

32. You have recently been appointed as a Network Administrator for Rick International Inc. The company has a Linux-based network. You have to print an important file named secure.txt urgently. You therefore want to know what printers are currently configured on your computer and how you can connect to them. Which of the following commands will you use to accomplish the task?
A. lpstat -s
B. lpstat -d
C. lpr
D. lpstat -p
Answer: A

33. You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?
A. rpm –erase –allmatches
B. rpm -e –allmatches
C. rpm -e –noscript
D. rpm -e –nodeps
Answer: D

34. During the boot process of a Linux computer, which of the following daemons is called after the kernel is loaded?
A. LPD
B. TELNETD
C. INIT
D. RLOGIND
Answer: C

35. You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory named Sales on a file server. David, a Sales Manager, has to use this directory to keep sales reports. David reports that he is unable to save his reports in the directory. When you list the directory using the LS command, you get the following result: drwxr-xr-x 2 root root 2048 Jan 2 2006 Sales What is the most likely cause?
A. The Sales directory is not properly mounted.
B. David is working on his local computer’s login.
C. The Sales directory has been deleted by accident.
D. David does not have the Write permission on the directory.
Answer: D

36. You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. lvreduce
B. resize2fs
C. lvsize
D. reduce2fs
Answer: A,B

37. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?
A. init 3
B. init 6
C. init 0
D. shutdown -r now
E. reboot -i
Answer: E

38. You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:
rwxr–r— You want to add a sticky bit to the file. Which of the following commands will you use?
A. chmod 2744 report
B. chmod 1744 report
C. chmod 7744 report
D. chmod 4744 report
Answer: B

39. Which of the following statements is true about Linux kernel?
Each correct answer represents a complete solution. Choose all that apply.
A. It constitutes the core part of the Linux operating system.
B. It detects hardware resources and boots up the system.
C. It allocates memory on behalf of running process.
D. It does not verify firewall rules
Answer: A, B, C

40. Which of the following commands is used to make a swap active after creating a new SWAP partition?
A. mkswap
B. swapon
C. fdisk
D. mkfs
Answer: A

41 In a Linux computer, which of the following files defines run levels for the processes to be started up during boot up?
A. /etc/inittab
B. /etc/syslog.conf
C. /etc/lilo.conf
D. /etc/runlevel
Answer: A

42. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have to create user accounts for four new Management Trainees. You also have to create a group named MT and provide membership of this group to the new user accounts. How will you accomplish this?
A. Use the ADDUSER command to create new user accounts and the MT group. Add the users account to the group.
B. Use the USERADD command to create new user accounts and the MT group.
Add the user accounts to the group.
C. Use the GROUPADD command to create the MT group. Use the USERADD command to create the user accounts and provide them the membership of the MT group.
D. Use the ADDGROUP command to create the MT group.
Use the ADDUSER command to create the user accounts and provide them the membership of the MT group.
Answer: C

43. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. e2fsck
B. fsck
C. fsck -N
D. fsck.ext2
Answer: A, B, D

44. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?
A. mount
B. e2fsck
C. fsck
D. mkfs
Answer: B

45. You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?
A. mkfs
B. mount
C. scanfs
D. fsck
Answer: D

46. Which of the following files is used to view the current status of RAID devices in Linux?
A. /proc/mdstat
B. /proc/stat
C. /proc/meminfo
D. /proc/mounts
Answer: A

47. Which of the following network protocols are used by the dhclient command to configure the IP addresses of computers on the network?
A. The dhclient command does not use any protocol. It statically assigns the address to the network computers.
B. RARP and DHCP
C. BOOTP and DHCP
D. BOOTP and RARP
Answer: C

48. You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?
A. ifup eth0
B. ifconfig eth0
C. ip link show eth0
D. sudo ethtool eth0
Answer: D

49. Which of the following files are used to activate disk quotas on a file system?
Each correct answer represents a complete solution. Choose all that apply.
A. quotA.group
B. quotA.user
C. quotaon
D. .quotaon
Answer: A, B

50. You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?
A. n
B. w
C. 1
D. p
Answer: D

51. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to print a file named print.txt. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. lpr
B. lprm
C. lp
D. a2ps
Answer: A, C

52. Which of the following run levels is used to boot a Linux computer in graphical user interface (GUI) mode?
A. 3
B. 7
C. 5
D. 9
Answer: C

53. Which of the following commands are used to remove a package from a Linux system?
Each correct answer represents a complete solution. Choose two.
A. yum -rm packagename
B. yum erase packagename
C. yum -r packagename
D. yum remove packagename
Answer: B, D

54. You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?
A. find size +50M
B. find -size 50M
C. find -size -50M
D. find -size +50M
Answer: D

55. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?
A. chgrp bar foo
B. chgroup foo bar
C. chgrp foo bar
D. chgroup bar foo
Answer: A

56. Which of the following files lists the file systems to be mounted automatically at startup?
A. /etc/mtab
B. /dev/fstab
C. /etc/fstab
D. /dev/mtab
Answer: C

57. Which of the following commands is used to mount file systems?
A. detach
B. mount
C. umount
D. attach
Answer: B

58. What command will you use to find the current runlevel of an active Linux session?
A. runlevel
B. init
C. rlevel
D. ls /etc/runlevel
Answer: A

59. Which of the following files contains the names and locations of system log files?
A. /etc/lilo.conf
B. /usr/syslog.conf
C. /etc/syslog.conf
D. /usr/lilo.conf
Answer: C

60. Which of the following utilities is used to set ACL for files and directories?
A. enable acl
B. setacl
C. setfacl
D. getfacl
Answer: C

RED HAT LINUX SYSTEM ADMINISTRATION MCQs ::