From  CertCities.com
PopQuiz

Red Hat Certified Engineer (RHCE) Exam (Multiple-Choice Portion)
30 questions. Answers and detailed explanations can be found at the end of the quiz.

courtesy of   Whizlabs Software

Questions

1. You have a default Red Hat 7.x workstation. Your lilo.conf contains the following lines

boot=/dev/hda3
password=foo123
restricted

This means that:

A. password is needed to proceed beyond LILO at every bootup

B. A password is needed to drop to single user mode

C. Logins are restricted to user foo123

D. None of the above

 

2. A filesystem contains errors. You run fsck. Where do you look for orphaned files?

A. /boot

B. /var/fsck/orphan-files

C. tmp of the filesystem

D. lost+found of the filesystem

 

3. You have to find out whether an application foo uses the shared library libbar.so. You can do this by:

A. grep libbar foo

B. ldd foo | grep libbar

C. ldconfig foo bar

D. find foo -lib libbar -print

 

4. In the bash shell, command history is controlled by which group of the following environment variables?

A. HISTFILE, HISTSIZE, HISTFILESIZE

B. HISTFILE, HISTFILESIZE, EDITOR

C. HISTSIZE, HISTOPTIONS, EDITOR

D. HISTSIZE, HISTFILESIZE, EDITOR

 

5. Protocols used for retrieval and deletion of mail are:

A. tcp and udp

B. smtp and imap4

C. imap4 and pop3

D. mail and pop3

 

6. Your workstation is on a LAN. You can successfully ping other hosts on the same network but are unable to ping a host outside your network. Which command(s) will help you diagnose the problem?

A. route

B. tracert

C. nettl

D. traceroute

 

7. You want to use the lynx web browser to browse the WWW. You are behind a WinGate proxy whose IP address is 10.0.0.1. You have to make the following change(s) in your /etc/lynx.cfg:

A. http_proxy=http://10.0.0.1:80

B. http_proxy_host=http://10.0.0.1

C. http_proxy_port=80

D. HTTP_PROXY=10.0.0.1:80

 

8. You do not wish to recieve any mail from the cron daemon. What do you do?

A. You set the CRONMAIL environment variable to 0

B. You set the MAIL environment variable to 0

C. You put MAIL=0 at the top of your crontab file

D. You put MAILTO="" at the top of your crontab file

 

9. The following free, opensource journalling filesystems are available for Linux at the moment:

A. ext2, ext3 and reisser

B. ext3, reisser and xfs

C. ext3 and xfs

D. afs, ext3 and reisser

 

10. You do not know which NIC you have in your workstation. You only know that it is a PCI NIC. Which command(s) can help you find out more?

A. lspci

B. devscan pci

C. cat /proc/pci | more

D. ioscan -funC lan

 

11. You have 2 PCI video cards in your workstation. To enable the second, you have to use the following command(s):

A. This is impossible. You cannot have more than one video card per workstation

B. setpci

C. modprobe svga

D. modprobe pci

 

12. You have implemented RAID5. You can expect:

A. Fast reads and fast writes

B. Fast reads and slow writes

C. Slow reads and fast writes

D. Slow reads and slow writes

 

13. You wish to add to your swap memory by swapping to a file "swapfile" in addition to your swap partition. The first command you have to run to create the file is:

A. dd

B. touch

C. >

D. swapon

 

14. Your server has Red Hat 7.x installed. Your NIC has been detected but you have not configured networking. To allot it an IP address, you have to edit the following file:

A. This is impossible. An address has to be allotted the moment an NIC has been detected.

B. /etc/hosts

C. /etc/sysconfig/network

D. /etc/sysconfig/network-scripts/ifcfg-eth0

 

15. You have to allocate the addresses 192.168.0.1 to 192.168.0.123 to eth1. You have to edit:

A. /etc/sysconfig/network-scripts/eth{1,1:0,1:2 .. 1:123}

B. /etc/sysconfig/network-scripts/ifcfg-eth0

C. /etc/sysconfig/network-scripts/ifcfg-eth1-range0

D. /etc/sysconfig/network/range0

 

16. By default DNS checks:

A. cache only

B. hint file only

C. hint file and cache in that order

D. cache and hint file in that order

 

17. In your LAN, there has been a change in the IP address of one host. You have changed the relevant A record in the DNS zone file(s) and restarted named. Still, the old IP address is being served out by the DNS server. The problem could be that:

A.You have forgotten to decrease the TimeToLive in the zone file(s)

B. You have forgotten to increment Serial in the zone file

C. You have forgotten to update /etc/named.conf

D.You have check from the whois database

 

18. The default umask for a non-privileged user on a Red Hat system is:

A. 777

B. 222

C. 022

D. 755

 

19. You are running a gateway for your LAN on a Red Hat 7.x system. You will configure the static routes in which of the following file(s)?

A. /etc/defaultrouter

B. /etc/sysconfig/static-routes

C. /etc/static-routes

D. /etc/router/static-routes

 

20. ish to allow a non-root user to bring network interface eth0 up and down:

A. This is impossible. Only root can bring interfaces up or down.

B. The user can "su" to root and manage the interface.

C. You have to set USER variable to that user in the /etc/sysconfig/network-scripts/ifcfg-eth0 file

D. You have to set the USERCTL variable in the /etc/sysconfig/network-scripts/ifcfg-eth0 file

 

21. -4u -f /dev/nrst1 /home will update the following file(s):

A. /home/dumpdates

B. /etc/dump/home/dumpdates

C. /etc/dumpdates

D. /etc/home/dumpdates

 

22. In order to map the proper module libraries to the proper kernel, it is advisable to set the ___________ variable in /usr/src/linux/Makefile:

A. KERNELVERSION

B. EXTRAVERSION

C. VERSION

D. PROPERVERSION

 

23. You wish to allow non-root user to mount dos-formatted floppy disks on /dev/fd0. The following line(s) in /etc/fstab will do the job:

A. /dev/fd0 /mnt msdos user,noauto

B. /dev/fd0 /mnt dos users,noauto

C. /dev/fd0 /mnt dosfs defaults

D. /dev/fd0 /mnt dos users,noauto 0 0

 

24. It is impossible to run X without a window manager.

A. True

B. False

 

25. You wish to use multiple monitors with your X:

A. You have to use the lbx extensions

B. You have to use the omniX server

C. You have to use the xinerama extensions

D. It is not possible to use multiple monitors with X.

 

26. Your /etc/securetty file contains the following entries:

tty1
tty2
tty3

This means that root can login at:

A. virtual terminals tty4 to tty7

B. virtual terminals tty1 to tty3

C. both of the above

D. The /etc/securetty controls only remote logins. Hence the above file will have no effect.

 

27. Your /etc/securetty file contains the following line:

tty1

Also your /etc/pam.d/login file has the following line at the top:

auth sufficient /lib/security/pam_securetty.so

This means that:

A. All users can login without passwords

B. Only root can login at tty1 without password

C. No user can login at tty1 without password

D. All users excluding root can login at tty1 without passwords

 

28. You are running a mailserver using default Red Hat 7.x. The default Sendmail generates a relaying denied error. This means that:

A. Recipient's domain is not in /etc/sendmail.cf

B. Recipient's domain is not in /etc/sendmail.cw

C. Recipient's domain is not in /etc/mail/local-host-names

D. Recipient's domain is not in /etc/mail/virtdomains

 

29. The main tripwire configuration file by default in a Red Hat 7.x server is:

A. /etc/tripwire/config

B. /etc/twconfig

C. /etc/tripwire.conf

D. /etc/tripwire/twpol.txt

 

30. The minimum keysize for a DSA and ElGamal key generated by gpg 1.0.6 is:

A. 768 bits

B. 512 bits

C. 1024 bits

D. 4096 bits

 

Answers

1. Choice B is correct. The "restricted" directive forces LILO to prompt for a password whenever booting into the non-default runlevel. In RedHat 7.x, the default runlevel is 5. The single user mode is at runlevel 1.

If the "restricted" directive was absent, then a password would have been needed to proceed beyond the LILO prompt at each bootup. For this reason, option A is wrong. LILO does not include a user authentication process. For this reason, option C is wrong. Obviously option D is also wrong.

2. Choice D is correct. Only the kernel and related files are placed in /boot.No system process generates an "orphan-files" file or directory. The "tmp" directory is not created for every filesystem.

3. Choice B is correct. Choice A is wrong because grep is a text search command.If foo were a text file, grep would look for the word "libbar" in it. The "ldconfig" command creates the links and cache used by the runtime linker. It does not display the libraries used by an application. Hence choice C is wrong. Choice D is also wrong. The find command as shown in option D would search for a file called libbar under the directory called foo. This is obviously wrong

4. Choice A is correct. This is a trick question. The Korn shell needs the EDITOR variable to be set. The bash shell merely needs the HISTFILE, HISTSIZE, and HISTFILESIZE variables.

5. Choice C is correct. POP3 and IMAP4 are used to retrieve and delete mail.Mail is retrieved and deleted at the application layer of the TCP/IP stack. There is no "mail" protocol. The smtp protocol is used for reliable transfer of mail. It has not function to delete mail. The protocols tcp and udp work below the application layer. You can read more about this topic at the NAG (Network Administrator's Guide).

6. Choices A and D are correct. Choice B and C are invalid. The "route" command will display the gateway of your LAN. If not set, you will have to set it. If it is set correctly and still the problem persists, you have to use the traceroute command to make sure that our ping packet is being dropped by the gateway.

7. Choice A is correct. The WinGate proxy listens at port 80 and forwards all requests arriving at that port. Choice B and C are invalid. Choice D is wrong but important. In case you cannot edit the /etc/lynx.cfg

file, you can still get proxied out if you set the HTTP_PROXY environment variable. In this question, however you were asked specifically about the lynx.cfg file.

8. Choice D is correct. The cron daemon sends a mail to the user every time it executes a command specified in the crontab. This is often a major source of iritation for busy system administrators.The MAILTO="" stops this default behaviour of cron. The crontab does not check any variable called CRONMAIL or MAIL. Hence options A,B and C are wrong.

9. Choice B is correct. The ext2 and afs filesystems are not journalling filesystems. AFS is, in fact, a distributed filesystem. It can span several networks. However, it is not a journalling filesystem.

10. Choices A and C are correct. Choice B and D are invalid.

11. Choice B is correct. Choice A is wrong. Choice C and D will generate error messages. The setpci command will be used to enable the second video card.

12. Choice B is correct. RAID5 enables fast reads and slow writes. Theoretically, since RAID5 spreads the write process to 3 or more disks, it should be faster. However in practise, RAID5 increases read speed but actually slows down write speed.

13. Choice A is correct. This is a trick question. The point is _create_ the file of a required size. This is achieved by running the "dd" command. The touch command creates a file of zero size. ">" will bring down the size of an existing file to 0. The swapon command will start swapping to a preformatted swap partition.

14. Choice D is correct. The /etc/hosts file is used to map IP addresses to hostnames.The /etc/sysconfig/network is used to define some basic networking information about your host, such as the hostname, and the default gateway.

15. Choice C is correct. Choice A is also correct, theoretically. But it is impractical to edit the files as suggested. Only one interface alias can be configured in choice B, whereas we need to configure 123 at a time. Choice D is invalid.

16. Choice D is correct. Bind - the DNS server software that runs on UNIX is so written that it always checks its cache and hint file in that order.

17. Choice B is correct. This is a common mistake made by DNS administrators. The TimeToLive has nothing to do with the problem at hand. The /etc/named.conf file does not need an updation if changes are made inside a zone file. The whois database also has nothing to do with this particular problem.

18. Choice C is correct. The default umask for a non-privileged user is 022 .

19. Choice B is correct. Choices A, C and D are invalid

20. Choice D is correct. Choice A is wrong. Choice B defeats the purpose of having the user manipulate the interface as the user will have to be told the root password. Choice C is also incorrect.

21. Choice C is correct. Choices A, B and D are invalid.

22. Choice B is correct. This is a very important question as correct kernel compilation can carry high marks in the actual exam. Red Hat has modified the Makefile to include the EXTRAVERSION variable.

23. Choice A is correct. There is no such thing as the dos and dosfs filesystems under linux. The FAT filesystem is recognized as msdos.It should be usable by user (not users). It should also not be mounted automatically.

24. Choice B is correct. One does not need a window manager to run X. One may see this by running the following commands

echo "xterm \&" > ~/.xinitrc
startx &

You will see an X session start up with the xterm. The only notable thing is that the terminal window cannot be moved, resized, maximized or minimized. X as a protocol does not need a window manager. This is a major feature of X. The display terminal is the X Server, not the window manager.

25. Choice C is correct. Choice A is wrong as lbx (low bandwidth X) is used for running X over slow connections.Choice B is invalid. Choice D is clearly wrong.

26. Choice B is correct. The /etc/securetty file determines which TTY devices the root user is allowed to login on. Thus Choice B is correct. Choice D is clearly wrong. Choice A is also incorrect. This implies that choice C is also wrong.

27. Choice A is correct. This is another trick question. The configuration above is horribly insecure! The /etc/securetty file determines which TTY devices the root user is allowed to login on. It has no effect whatsoever on logins by non-root users. The key to understanding this question is is the "sufficient" in /etc/pam.d/login. It has two implications. First, if this condition is satisfied, access is to be granted iediately irrespective of other conditions. Second, it means that as long as root logs in at only tty1, root will be given access. A non-root user can login at any terminal. The non-root user will be granted access without a password. The pam configuration of the login program is such that the only condition that is checked is whether root is logging in at tty1. The condition is satisfied as long as a non-root user is logging in.

28. Choices A and C are correct. The domains for which we relay mail are to be specified in sendmail's class w. This is done typically by defining a file which, in the case of RedHat 7.x, sendmail is /etc/mail/local-host-names. One may also set the domains as a space separated list inside the sendmail.cf file. In case, you thought sendmail.cw was the correct answer, don't be disappointed. Prior to version 8.10, the file was /etc/sendmail.cw. It has changed now been to /etc/mail/local-host-names. Too bad you can't have almost right answers. If you are seriously interested in sendmail (and you should be if you want to make a career out of Linux), there is only one place to look: http://www.ora.com/catalog/sendmail2/noframes.html.

29. Choice D is correct. The default configuration file in RedHat 7.x is /etc/tripwire/twpol.txt. The rest of the options refer to files that do not exist.

30. Choice A is correct. This is yet another trick question. The default keysize is 1024 bits. But the minimum keysize is 768 bits.

Questions and answers provided by Whizlabs Software. To order the full version of this exam simulation, click here.


More Pop Quiz:

 

 

top

Copyright 2000-2009, 101communications LLC. See our Privacy Policy.
For more information, e-mail .