Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

RH133 Red Hat Linux System Administration Questions and Answers

Questions 4

Which of the following commands is used to start or stop a standalone service immediately?

Options:

A.

ntsysv

B.

service

C.

services

D.

chkconfig

Buy Now
Questions 5

You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

rpm -e

B.

rpm -K

C.

rpm --checksig

D.

rpm -V

Buy Now
Questions 6

Which of the following files lists the file systems to be mounted automatically at startup?

Options:

A.

/etc/mtab

B.

/etc/fstab

C.

/dev/mtab

D.

/dev/fstab

Buy Now
Questions 7

You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

lvsize

B.

resize2fs

C.

reduce2fs

D.

lvreduce

Buy Now
Questions 8

You have recently been appointed as a Network Administrator for Rick International Inc. The company has a Linux-based network. You have to print an important file named secure.txt urgently. You therefore want to know what printers are currently configured on your computer and how you can connect to them. Which of the following commands will you use to accomplish the task?

Options:

A.

lpstat -s

B.

lpstat -d

C.

lpr

D.

lpstat -p

Buy Now
Questions 9

Which of the following files contain messages and errors from security-related system?

Options:

A.

/var/log/messages

B.

/var/log/secure

C.

/var/log/mail

D.

/var/log/message

Buy Now
Questions 10

Which of the following commands is used to create filesystem in Linux?

Options:

A.

fdisk

B.

mkfs

C.

sfdisk

D.

fsck

Buy Now
Questions 11

Which of the following file should be edited, if MBR on /dev/hda is corrupted?

Options:

A.

/boot/grub/grub.conf

B.

/etc/grub/grub.conf

C.

/etc/grub.conf

D.

/sbin/grub-install/dev/hda

Buy Now
Questions 12

Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?

Options:

A.

su

B.

cngrl

C.

mount

D.

init

Buy Now
Questions 13

You work as a Network Administrator for Tech Perfect Inc. You want to configure quotas for everyone on the /home directory. What will you add to the options in /etc/fstab?

Each correct answer represents a complete solution. Choose two.

Options:

A.

usrquota

B.

grpquota

C.

groupquota

D.

userquota

Buy Now
Questions 14

Which command displays the lines in a file that match a pattern?

Options:

A.

cat

B.

grep

C.

history

D.

cp

Buy Now
Questions 15

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. The company is using the host-based access control to avoid unwanted access of the malicious users. John wants to add a new user, which can use X applications from the remote computer. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

John will run the xhost command.

B.

John will execute the startx command.

C.

John will add a new user in the file /etc/Xn.hosts.

D.

John will add a new user in the file /etc/Xadd.hosts.

Buy Now
Questions 16

Which of the following statements is true about Linux kernel?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It constitutes the core part of the Linux operating system.

B.

It detects hardware resources and boots up the system.

C.

It allocates memory on behalf of running process.

D.

It does not verify firewall rules

Buy Now
Questions 17

You work as a Network Administrator for McNeil Inc. You are configuring a hard disk drive of a Linux server.

Which of the following steps can prevent the server from failure due to a log file or user quota overrun?

Options:

A.

Using the same file system for /bin and /usr.

B.

Using separate file systems for /home and /var.

C.

Using separate file systems for /bin and /usr.

D.

Using the same file system for /home and /var.

Buy Now
Questions 18

Which of the following commands can be used to power off a Linux computer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

init 6

B.

init 0

C.

shutdown

D.

halt

Buy Now
Questions 19

You are novice user of Linux. You forgot your password. Which of the following commands will you use to change your password?

Options:

A.

chmod

B.

chown

C.

password

D.

passwd

Buy Now
Questions 20

Which of the following commands is used to create a new group in a Linux server?

Options:

A.

MOUNT

B.

ADDGROUP

C.

USERADD

D.

GROUPADD

Buy Now
Questions 21

Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?

Options:

A.

halt

B.

autofs

C.

apmd

D.

crond

Buy Now
Questions 22

Which of the following statements are true about rsync?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can use any transparent remote shell, including ssh or rsh.

B.

It does not support for anonymous or authenticated rsync daemons.

C.

It does not require super-user privileges.

D.

It supports for copying links, devices, owners, groups, and permissions.

Buy Now
Questions 23

Which of the following provides users shared access to files and directories?

Options:

A.

pump

B.

NFS

C.

Squid

D.

DNS

Buy Now
Questions 24

Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?

Options:

A.

ip link show [interface name]

B.

ip -s link show [interface name]

C.

ifconfig

D.

ping

Buy Now
Questions 25

Which of the following mkswap command options can be used to allow the creation of a swap area that is larger than the file or partition area on which it resides?

Options:

A.

-f

B.

-c

C.

-p

D.

-L

Buy Now
Questions 26

You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?

Options:

A.

rpm --erase --allmatches

B.

rpm -e --allmatches

C.

rpm -e --noscript

D.

rpm -e --nodeps

Buy Now
Questions 27

Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?

Options:

A.

ip link show [interface name]

B.

ifconfig

C.

ip -s link show [interface name]

D.

ping

Buy Now
Questions 28

Which of the following statements about Logical Volume Management (LVM) is true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can resize volume groups online by absorbing new physical volumes (PV) or ejecting existing ones.

B.

It can resize logical volumes (LV) online by concatenating extents onto them or truncating extents from them.

C.

It cannot suffer from internal fragmentation.

D.

It can stripe whole or parts of logical volumes across multiple PVs, in a fashion similar to R AID0.

Buy Now
Questions 29

After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?

Options:

A.

/usr/shadow

B.

/etc/passwd

C.

/usr/passwd

D.

/etc/shadow

Buy Now
Questions 30

Which of the following statements are true about rsync? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It supports for copying links, devices, owners, groups, and permissions.

B.

It can use any transparent remote shell, including ssh or rsh.

C.

It does not support for anonymous or authenticated rsync daemons.

D.

It does not require super-user privileges.

Buy Now
Questions 31

Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?

Options:

A.

mount

B.

init

C.

su

D.

cngrl

Buy Now
Questions 32

The ____ command is used to view the TCP/IP configuration on a Windows 9x computer.

Options:

A.

IFCONFIG

B.

WINIPCONFIG

C.

CHKDSK

D.

IPCONFIG

Buy Now
Questions 33

In order to access any other devices, such as a floppy drive, the relevant device node must be created. Which of the following commands will you use to make device nodes manually?

Options:

A.

chroot

B.

mkfs

C.

mkdir

D.

mknod

Buy Now
Questions 34

Which of the following commands is used to start a preconfigured network interface?

Options:

A.

ping

B.

ifup [interface name]

C.

ifdown [interface name]

D.

ifprobe [interface name]

Buy Now
Questions 35

Which of the following commands can be used to delete all jobs queued in a printer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

lprm - *

B.

lprm -a all

C.

lprm -all

D.

lprm -

Buy Now
Questions 36

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring a new computer that will work as a file server. You have decided to use ten hard disk drives in a RAID-5 array. Each hard disk has 40GB capacity. How much space will be available for file storage?

Options:

A.

400GB

B.

300GB

C.

200GB

D.

360GB

Buy Now
Questions 37

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently run the yum clean packages command. What does this command do?

Options:

A.

It eliminates all cached packages from the system.

B.

It deletes the cached packages and metadatA.

C.

It deletes the dbcache information.

D.

It deletes the cached packages and headers.

Buy Now
Questions 38

Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?

Options:

A.

e2fsck -f

B.

e2fsck -p

C.

e2fsck -c

D.

e2fsck –b

Buy Now
Questions 39

In, which of the following directories all configuration files are usually stored?

Options:

A.

/boot

B.

/var

C.

/etc

D.

/bin

Buy Now
Questions 40

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

ls /proc

B.

lsmod

C.

locate

D.

cat /proc/modules

Buy Now
Questions 41

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are required to boot a server in single-user mode. Which of the following runlevels will you choose to accomplish the task?

Options:

A.

0

B.

5

C.

1

D.

3

E.

2

Buy Now
Questions 42

Which of the following commands is used to create a new group account?

Options:

A.

groupdel

B.

groupmod

C.

groupenable

D.

groupadd

Buy Now
Questions 43

Which of the following commands is used to change file access permissions in Linux?

Options:

A.

chmod

B.

chperm

C.

chown

D.

chgrp

Buy Now
Questions 44

Which of the following RAID levels provides block level striping?

Options:

A.

RAID 4

B.

RAID 3

C.

RAID 5

D.

RAID 6

Buy Now
Questions 45

You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?

Options:

A.

tail -n 3 /var/adm/messages

B.

tail /var/adm/messages

C.

cat /var/adm/messages

D.

tail -f /var/adm/messages

Buy Now
Questions 46

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are configuring a UPS for a Linux server. You want to configure the computer as follows:

The server should automatically shut down after ten minutes of power failure.

The server should inform the administrator that the shut down process has started.

Which of the following files will help you to configure these settings?

Options:

A.

/etc/syslog.conf

B.

/etc/inittab

C.

/etc/mtab

D.

/etc/fstab

Buy Now
Questions 47

Which of the following files contains the configuration of the kernel modules?

Options:

A.

/etc/kernel.modules

B.

/etc/lilo.conf

C.

/etc/conf.modules

D.

/etc/syslog.conf

Buy Now
Questions 48

Which of the following commands is used to compress files?

Options:

A.

GZIP

B.

TAR

C.

WINZIP

D.

GUNZIP

Buy Now
Questions 49

Which of the following SHELL commands displays currently logged-in users and their tasks?

Options:

A.

who

B.

w

C.

finger

D.

whoami

Buy Now
Questions 50

If /root partition is installed on /dev/hdb1, what defines /dev/hdb1?

Options:

A.

Second hard disk, second partition

B.

First hard disk, second partition

C.

Second hard disk, first partition

D.

First hard disk, first partition

Buy Now
Questions 51

Which of the following commands is used to compare the contents of two files for differences?

Options:

A.

sort

B.

cat

C.

wc

D.

diff

Buy Now
Questions 52

What is the minimum RAM requirement for installing Red Hat in text-mode?

Options:

A.

256MB

B.

64MB

C.

128MB

D.

1GB

Buy Now
Questions 53

Which of the following files should be edited to modify kernel module configuration settings?

Options:

A.

/etc/module.conf

B.

/etc/modprobe.conf

C.

/etc/inttab

D.

/etc/xinted.cong

Buy Now
Questions 54

Which of the following commands is used to display last 10 lines of a file?

Options:

A.

cat

B.

tail 10

C.

tail

D.

head

Buy Now
Questions 55

Which of the following tools can be used to manage Red Hat Virtualization environment?

Options:

A.

xen

B.

chroot

C.

sed

D.

xm

Buy Now
Questions 56

Which of the following runlevel values is used to halt the Linux operating system?

Options:

A.

0

B.

3

C.

1

D.

2

Buy Now
Questions 57

Which of the following files contains the information about DNS Name Server?

Options:

A.

/etc/resolve.conf

B.

/etc/hosts

C.

/etc/resolv.conf

D.

/etc/host

Buy Now
Questions 58

Which of the following files can be used to identify installed PCI devices?

Options:

A.

//proc/ioports

B.

/proc/pci

C.

/proc/devices

D.

/proc

Buy Now
Questions 59

Which of following commands lets an Administrator to set a user ' s quota?

Options:

A.

edquota user

B.

edquota -p

C.

edquota

D.

edquota -u user

Buy Now
Questions 60

Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

Options:

A.

find /etc -name *.txt

B.

find start -dir -min -60

C.

find start -dir -cmin -60

D.

find start -cmin -60

Buy Now
Questions 61

Which of the following commands displays information for all filesystems that have quota enabled?

Options:

A.

quotaoff

B.

quotaon

C.

quota

D.

quota -v

Buy Now
Questions 62

Which of the following statements are true about kernel modules?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kernel modules do not support executable loaders.

B.

The kernel module contains extra kernel codes that may be loaded after the loading of the base kernel.

Only a minimal resident kernel is loaded into memory at boot time.

C.

Kernel modules do not support the device drivers, network drivers, and file system drivers.

D.

Whenever a user requests a feature that is not present in the resident kernel, a kernel module is dynamically loaded into memory.

Buy Now
Questions 63

You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?

Options:

A.

2

B.

0

C.

1

D.

3

Buy Now
Questions 64

Which of the following files contains the names and locations of system log files?

Options:

A.

/usr/syslog.conf

B.

/usr/lilo.conf

C.

/etc/lilo.conf

D.

/etc/syslog.conf

Buy Now
Questions 65

You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

Options:

A.

stop httpd

B.

stopall httpd

C.

kill httpd

D.

killall httpd

Buy Now
Questions 66

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

No permission to others.

B.

Read permission to the owner.

C.

Read and Execute permissions to the group.

D.

Read, Write, and Execute permissions to the owner and the group.

E.

Read permission to the group.

F.

Read and Execute permissions to the owner.

Buy Now
Questions 67

Which of the following files is used to initialize a computer-wide environment on a Linux computer?

Options:

A.

/etc/group

B.

/etc/profile

C.

/etc/syslog.conf

D.

/etc/startup

Buy Now
Questions 68

Which of the following commands can be used to overwrite an existing kernel image file?

Options:

A.

mkinitrd -v

B.

mkinitrd --preload

C.

mkinitrd --builtin

D.

mkinitrd -f

Buy Now
Questions 69

Which of the following commands is used to list all contents of a superblock of a partition?

Options:

A.

tune2fs -c

B.

tune2fs -f

C.

tune2fs -l

D.

tune2fs -j

Buy Now
Questions 70

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

quotaon

B.

warnquota

C.

edquota

D.

quotaoff

E.

repquota

Buy Now
Questions 71

You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?

Options:

A.

mkfs

B.

mount

C.

scanfs

D.

fsck

Buy Now
Questions 72

Which of the following commands is used to create a user account for a new user?

Options:

A.

USERMOD

B.

MOUNT

C.

USERADD

D.

CRUSER

Buy Now
Questions 73

You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?

Options:

A.

ifup eth0

B.

ifconfig eth0

C.

ip link show eth0

D.

sudo ethtool eth0

Buy Now
Questions 74

Fill in the blank with the appropriate command.

The ________ command recursively removes files, which have not been accessed for a period of time.

Options:

A.

tmpwatch

Buy Now
Questions 75

Which of the following commands creates a new logical volume in a volume group?

Options:

A.

lvcreate

B.

vgcreate

C.

pvcreate

D.

mkfs

Buy Now
Questions 76

You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?

Options:

A.

n

B.

w

C.

1

D.

p

Buy Now
Questions 77

You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following bootloaders does not require to be rewritten after the configuration of the kernel has been changed?

Options:

A.

GRUB

B.

BOOTP

C.

LILO

D.

ELILO

Buy Now
Questions 78

Which of the following commands or command flags can be used to list the installed services and their associated runlevels?

Options:

A.

config

B.

xconfig

C.

menuconfig

D.

chkconfig

Buy Now
Questions 79

Drag and drop the appropriate command in front of its respective function.

RH133 Question 79

Options:

Buy Now
Questions 80

Which of the following commands is used to make a swap active after creating a new SWAP partition?

Options:

A.

swapon

B.

mkswap

C.

mkfs

D.

fdisk

Buy Now
Questions 81

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

e2fsck

B.

fsck

C.

fsck -N

D.

fsck.ext2

Buy Now
Questions 82

You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.

You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know that some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?

Options:

A.

A high load average

B.

A high process ID

C.

A low load average

D.

A low CPU time

E.

A high CPU time

Buy Now
Questions 83

Which of the following commands is used to modify the kernel parameters at runtime?

Options:

A.

modinfo

B.

modprobe

C.

lsmod

D.

sysctl

Buy Now
Questions 84

Which of the following options does tar command require to create a tar file?

Options:

A.

-x

B.

-t

C.

-c

D.

-v

Buy Now
Questions 85

Which of the following commands is used to create physical volumes in Linux?

Options:

A.

lvextend

B.

vgcreate

C.

pvcreate

D.

fdisk

Buy Now
Questions 86

Which of the following commands is used to create a new group?

Options:

A.

grpadd

B.

groupadd

C.

new group

D.

chgrp

Buy Now
Questions 87

Which of the following files contains users ' names and UIDs?

Options:

A.

/etc/group

B.

/etc/passwd

C.

/etc/user

D.

/etc/shadow

Buy Now
Questions 88

In which of the following files, RHEL stores its network interface configuration information?

Options:

A.

/etc/host.conf

B.

/etc/sysconfig/network-scripts/ ifcfg-ethX

C.

/etc/network.conf

D.

/etc/sysconfig/network-script/ifcfg-ethX

Buy Now
Questions 89

Which of the following is the parent of all processes in Linux?

Options:

A.

bash

B.

/etc/init

C.

init

D.

grub

Buy Now
Questions 90

Which of the following tools is used to view and/or change the speed and duplex settings for the network card?

Options:

A.

ifconfig

B.

traceroot

C.

ethtool

D.

ping

Buy Now
Questions 91

Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?

Options:

A.

crond

B.

apmd

C.

autofs

D.

halt

Buy Now
Questions 92

Which of the following files contain the information on how init should set up the system in every run level?

Options:

A.

/etc/rc.d/rc.local

B.

/sbin/runlevel

C.

/etc/rc.d/rc.sysinit

D.

/etc/inittab

Buy Now
Questions 93

Which of the following Linux commands can be used to set an expiration date for a user ' s password?

Options:

A.

chown

B.

chage

C.

chgrp

D.

chmod

Buy Now
Questions 94

Which of the following commands can be used to view addresses assign to each interface?

Options:

A.

ping

B.

ifconfig

C.

ip addr show (interface name)

D.

tracert

Buy Now
Questions 95

While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.

Options:

A.

swap

B.

ext3

C.

nfs

D.

befs

E.

ntfs

Buy Now
Questions 96

Which of the following is GRUB Menu Configuration File?

Options:

A.

/etc/grub.conf

B.

/boot/grub/grub.conf

C.

/etc/grub/grub.conf

D.

/boot/grub.conf

Buy Now
Questions 97

Which of the following commands is used to create repomd repository to hold packages in Linux system?

Options:

A.

chroot

B.

createrepo

C.

xm

D.

setsebool

Buy Now
Questions 98

Which of the following RAID levels provide striping without parity?

Options:

A.

RAID 5

B.

RAID 1

C.

RAID 4

D.

RAID 0

Buy Now
Questions 99

When you are installing RHEL on a system how much swap space should be given in partition?

Options:

A.

Half of the RAM

B.

Equal to the RAM

C.

One fourth of the RAM

D.

Twice of RAM

Buy Now
Questions 100

Which command is used to change access mode for files and directories?

Options:

A.

chmod

B.

chmode

C.

chgrp

D.

chown

Buy Now
Exam Code: RH133
Exam Name: Red Hat Linux System Administration
Last Update: Apr 30, 2026
Questions: 336

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now RH133 testing engine

PDF (Q&A)

$43.57  $124.49
buy now RH133 pdf