Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

RH033 Red Hat Linux Essentials Questions and Answers

Questions 4

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to save the output to the ProStat.txt file. Which of the following commands will you use to accomplish the task?

Options:

A.

ps < ProStat.txt

B.

ps | ProStat.txt

C.

ps > ProStat.txt

D.

ps

Buy Now
Questions 5

You work as the Network administrator for McNeil Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You have created a PostScript file on your system. You want to convert this file to a PDF file. Which of the following commands should you use to accomplish the task?

Options:

A.

ps2pdf

B.

evince

C.

pdf2ps

D.

enscript

Buy Now
Questions 6

Which of the following cp command parameters copies only when the source file is newer than the destination file or when the destination file is missing?

Options:

A.

-u

B.

-l

C.

-p

D.

-s

Buy Now
Questions 7

Which of the following key-combinations is used to redo a change undone by a u command in vim?

Options:

A.

Ctrl-w, Arrow

B.

Ctrl-w, s

C.

Ctrl-r

D.

Ctrl-w, v

Buy Now
Questions 8

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network.

You have created a folder named Report.

You have made David the owner of the folder. The members of a group named JAdmin can access the folder and have Read, Write, and

Execute permissions. No other user can access the folder. You want to ensure that the members of

the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder.

Whizh of the following commands will you use to accomplish the task?

Options:

A.

chmod 777 report

B.

chmod 754 report

C.

chown david.jadmin report

D.

chmod 555 report

Buy Now
Questions 9

Which of the following commands can be used to delete all jobs queued in a printer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

lprm -a all

B.

lprm -all

C.

lprm - *

D.

lprm -

Buy Now
Questions 10

Which of the following commands is used to set down the interface and flush all its addresses?

Options:

A.

ifup

B.

ifdown

C.

ifconfig

D.

down

Buy Now
Questions 11

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?

Options:

A.

chgrp foo bar

B.

chgroup bar foo

C.

chgrp bar foo

D.

chgroup foo bar

Buy Now
Questions 12

All network interface settings are stored in /etc/sysconfig/network-scripts/ directory. Which of the following tools are used to read the interface configuration files?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

ifup

B.

system-config-services

C.

system-config-network

D.

ifdown

Buy Now
Questions 13

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see all directories and files, including hidden files of your home directory in long listing format. Which of the following command-line utilities would you use to accomplish this task?

Options:

A.

ls -al /root

B.

ls

C.

ls -s /root

D.

ls -h /root

Buy Now
Questions 14

What will be the output of the following command? echo $(date %M) > date.txt

Options:

A.

It will print a string "date %M".

B.

The current time (Month) will be written in the date.txt file.

C.

The current time (Minutes) will be written in the date.txt file.

D.

It will create a variable $(date %M).

Buy Now
Questions 15

You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?

Options:

A.

wc -c file1.txt >>error.txt

B.

wc -c file1.txt 1>error.txt

C.

wc -c file1.txt 2>error.txt

D.

wc -c file1.txt >error.txt

Buy Now
Questions 16

You work as the Network Administrator for McNeil Inc. The company has a Linux- based network.

You are working as a root user on the Red Hat operating system. Joe is a user in your company. You want to remove Joe's tmp files that are 3 days older. Which of the following command syntaxes should you use to accomplish the task?

Options:

A.

find /tmp -cmin +3 -user Joe -ok rm {} \;

B.

find /tmp -ctime +3 user Joe -ok rm {} \;

C.

find /tmp -ctime +3 -user Joe -ok rm {} \;

D.

find /tmp -cmin +3 user Joe -ok rm {} \;

Buy Now
Questions 17

Which of the following statements are true about open source software?

Each correct answer represents a complete solution. Choose two.

Options:

A.

In OSS access to source code by third parties commonly requires the party to sign a nondiscloser agreement.

B.

It is software whose license does not allow for the distribution of the software source's source code.

C.

Open source software and its source code must be freely distributable.

D.

In OSS all users must be able to modify the source code and create derived works.

Buy Now
Questions 18

Which of the following is NOT true about the inode table in the Linux operating system?

Options:

A.

It contains the location information where data is stored in the hard disk.

B.

It contains information about what type of access permission of the file is available to whom.

C.

It contains the last access time, last modification time, however it does not store the last inode change time.

D.

It contains the file type of the specified file.

Buy Now
Questions 19

Which of the following network diagnostic tools is NOT used in the Linux operating system?

Options:

A.

host

B.

dig

C.

ipconfig

D.

ping

Buy Now
Questions 20

You work as a Network Administrator for Maverick Inc. The company has a Linux-based network.

You are working on a Linux computer. You want to see the environment variables that are set on your computer. Which of the following commands will you use?

Options:

A.

env

B.

rm

C.

ls

D.

echo $shell

Buy Now
Questions 21

Fill in the blank with appropriate word. The------------ command copies files between hosts on a network. It uses ssh for data transfer, and uses the same authentication and provides the same security as ssh. It will ask for passwords or passphrases if they are needed for authentication.

Options:

A.

SCP

Buy Now
Questions 22

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to modify a configuration file in a Linux server. Which of the following utilities will you use to accomplish the task?

Options:

A.

VI

B.

NMAP

C.

MS Word

D.

GZIP

Buy Now
Exam Code: RH033
Exam Name: Red Hat Linux Essentials
Last Update: May 18, 2024
Questions: 153

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80