New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Ace the RedHat RH133 Exam: Ultimate Preparation Guide

Questions 11

You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?

Options:
A.

find size +50M

B.

find -size 50M

C.

find -size -50M

D.

find -size +50M

RedHat RH133 Premium Access
Questions 12

You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?

Options:
A.

n

B.

w

C.

1

D.

p

Questions 13

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?

Options:
A.

/var/log/wtmp

B.

/var/log/dmesg

C.

/var/log/bootmsg

D.

/var/log/messages

Questions 14

Which of the following commands can be used to overwrite an existing kernel image file?

Options:
A.

mkinitrd -v

B.

mkinitrd --preload

C.

mkinitrd --builtin

D.

mkinitrd -f

Questions 15

During the boot process of a Linux computer, which of the following daemons is called after the kernel is loaded?

Options:
A.

LPD

B.

TELNETD

C.

INIT

D.

RLOGIND

Questions 16

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

vi /etc/passwd

B.

vi /etc/shadow

C.

useradd Trinity

D.

passwd Trinity

E.

Trinity:x:505:505::/home/Trinity:/sbin/nonlogin

Questions 17

Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

Options:
A.

find /etc -name *.txt

B.

find start -dir -min -60

C.

find start -dir -cmin -60

D.

find start -cmin -60

Questions 18

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

quotaon

B.

warnquota

C.

edquota

D.

quotaoff

E.

repquota

Questions 19

You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?

Options:
A.

rpm --erase --allmatches

B.

rpm -e --allmatches

C.

rpm -e --noscript

D.

rpm -e --nodeps

Questions 20

Which of the following files is used to initialize a computer-wide environment on a Linux computer?

Options:
A.

/etc/group

B.

/etc/profile

C.

/etc/syslog.conf

D.

/etc/startup