Black Friday Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

RedHat RH033 Red Hat Linux Essentials Exam Practice Test

Page: 1 / 15
Total 153 questions

Red Hat Linux Essentials Questions and Answers

Question 1

Which of the following network diagnostic tools is NOT used in the Linux operating system?

Options:

A.

host

B.

dig

C.

ipconfig

D.

ping

Question 2

Which of the following commands can be used by a user to display the list of contents existing in his current user account?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

echo *

B.

ls ~

C.

ls *

D.

pwd

Question 3

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network.

By using the VI utility, you have created a document that has 100 lines. You want to replace all the occurrences of "net" with "Net" in the first 50 lines of the document. Which of the following commands will you use?

Options:

A.

:1,$ s/net/Net/g

B.

:1,100 s/net/Net/g

C.

:1,50 s/net/Net/g

D.

:s/net/Net/g

Question 4

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named

RickGroup.txt. Which of the following commands will you use to accomplish the task?

Options:

A.

ls rick /etc/group > RickGroup.txt

B.

ls /etc/group rick > RickGroup.txt

C.

grep /etc/group rick > RickGroup.txt

D.

grep rick /etc/group > RickGroup.txt

Question 5

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, wants to combine the contents of the Sale1.txt and Sale2.txt files to

a new file named FinSale.txt. Which of the following commands will he use to accomplish the task?

Options:

A.

ls Sale1.txt Sale2.txt < FinSale.txt

B.

cat Sale1.txt Sale2.txt < FinSale.txt

C.

ls Sale1.txt Sale2.txt > FinSale.txt

D.

cat Sale1.txt Sale2.txt > FinSale.txt

Question 6

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. You want to run two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has executed successfully. Which of the following command sequences will John use to accomplish the task?

Options:

A.

foo && bar;

B.

foo | bar;

C.

foo; bar;

D.

foo || bar;

Question 7

You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.

You are working a root user on the Red Hat operating system. You want to search for files named snow.html, Snow.html, SNOW.html in the current directory. Which of the following commands should you use to accomplish the task?

Options:

A.

find -iname snow.html

B.

find -name snow.html

C.

find name snow.html

D.

find -i snow.html

Question 8

You are working with the vi editor and writing a textfile. Which of the following commands will you use if you want to move the cursor 3 characters to the right?

Options:

A.

3b

B.

3w

C.

3l

D.

3h

Question 9

You work as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.

You are working as a root user on the Linux operating system. You want to create an alias such that when you type c, the system should run the clear command to clear the screen. Which of the following tools should you use to accomplish the task?

Options:

A.

alias clear

B.

alias clear= c

C.

alias c

D.

alias c= 'clear'

Question 10

You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company's etwork. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use?

Options:

A.

du

B.

fsck

C.

df

D.

dfsck

Question 11

Which of the following commands is used to securely copy files from one host to another over the network?

Options:

A.

ls

B.

cat

C.

mutt

D.

scp

Question 12

You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

Options:

A.

chmod

B.

newgrp

C.

chgrp

D.

chown

Question 13

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to modify a configuration file in a Linux server. Which of the following utilities will you use to accomplish the task?

Options:

A.

VI

B.

NMAP

C.

MS Word

D.

GZIP

Question 14

Which of the following key-combinations is used to redo a change undone by a u command in vim?

Options:

A.

Ctrl-w, Arrow

B.

Ctrl-w, s

C.

Ctrl-r

D.

Ctrl-w, v

Question 15

John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linuxbased network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?

Options:

A.

touch VAR1

B.

env -u VAR1

C.

export VAR1

D.

echo $VAR1

Question 16

Fill in the blank with the appropriate permission to complete the statement below.

The___________command is used to start xsession using the xinit utility.

Options:

A.

startx

Question 17

You work as the Network technician for McNeil Inc. The company has a Linux-based Network. You are working on the Red Hat operating system. You want to remove some write protected files and directories. Which of the following commands should you use to accomplish this task?

Options:

A.

rm -rf

B.

rm -f

C.

rmdir

D.

rm

Question 18

You work as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.

You are currently working on vim. You opened a file in four windows in a single vim screen. You want to jump from one window to another. Which of the following key-combinations should you use to accomplish the task?

Options:

A.

Ctrl-w, v

B.

Ctrl-w, s

C.

Ctrl-w with an arrow key

D.

Ctrl-w, q

Question 19

Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?

Options:

A.

ls /tmp > deletelater.txt

B.

ls deletelater.txt /tmp

C.

ls /tmp deletelater.txt

D.

ls /tmp >> deletelater.txt

Question 20

Which of the following is a multi-platform instant messaging client, based on a library named libpurple?

Options:

A.

Evolution

B.

mutt

C.

Pidgin

D.

Thunderbird

Question 21

Which of the following is NOT true about the inode table in the Linux operating system?

Options:

A.

It contains the location information where data is stored in the hard disk.

B.

It contains information about what type of access permission of the file is available to whom.

C.

It contains the last access time, last modification time, however it does not store the last inode change time.

D.

It contains the file type of the specified file.

Question 22

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network.

You have created a folder named Report.

You have made David the owner of the folder. The members of a group named JAdmin can access the folder and have Read, Write, and

Execute permissions. No other user can access the folder. You want to ensure that the members of

the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder.

Whizh of the following commands will you use to accomplish the task?

Options:

A.

chmod 777 report

B.

chmod 754 report

C.

chown david.jadmin report

D.

chmod 555 report

Page: 1 / 15
Total 153 questions