Tải bản đầy đủ (.pdf) (817 trang)

Tài liệu RHCE: Red Hat Certified Engineer Study Guide pdf

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (10.07 MB, 817 trang )


RHCE:



Red Hat Certified Engineer



Study Guide
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com

San Francisco • Paris • Düsseldorf • Soest • London

RHCE:



Red Hat Certified Engineer



Study Guide

Bill McCarty
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com

Associate Publisher: Jordan Gold
Contracts and Licensing Manager: Kristine O’Callaghan


Acquisitions and Developmental Editor: Ellen L. Dendy
Editors: Julie Sakaue, Suzanne Goraj, Sarah Lemaire
Production Editor: Dennis Fitzgerald
Technical Editor: Randolph Russell
Book Designer: Bill Gibson
Graphic Illustrator: Tony Jonick
Electronic Publishing Specialists: Susie Hendrickson, Judy Fung, Jill Niles
Proofreaders: Carol A. Burbo, Nanette Duffy, Mae Lum, Nathan Whiteside
Indexer: Ted Laux
CD Coordinator: Kara Eve Schwartz
CD Technician: Keith McNeil
Cover Designer: Archer Design
Cover Photograph: Tony Stone
Copyright © 2000 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. No part of this
publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photo-
copy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher.
Library of Congress Card Number: 00-106231
ISBN: 0-7821-2793-2
SYBEX and the SYBEX logo are trademarks of SYBEX Inc. in the USA and other countries.
Screen reproductions produced with FullShot 99. FullShot 99 © 1991-1999 Inbit Incorporated. All rights reserved.
FullShot is a trademark of Inbit Incorporated.
The CD interface was created using Macromedia Director, COPYRIGHT 1994, 1997-1999 Macromedia Inc. For more
information on Macromedia and Macromedia Director, visit .
SYBEX is an independent entity from Red Hat, Inc. and not affiliated with Red Hat, Inc. in any manner. This publication
may be used in assisting students to prepare for a Red Hat Certified Engineer exam. Neither Red Hat, Inc. nor SYBEX war-
rants that use of this publication will ensure passing the relevant exam. Red Hat is a registered trademark or trademark of
Red Hat, Inc. in the United States and/or other countries. Red Hat, RPM, Linux Library, PowerTools, and all Red Hat-based
trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries.
TRADEMARKS: SYBEX has attempted throughout this book to distinguish proprietary trademarks from descriptive terms
by following the capitalization style used by the manufacturer.

The author and publisher have made their best efforts to prepare this book, and the content is based upon final release soft-
ware whenever possible. Portions of the manuscript may be based upon pre-release versions supplied by software manu-
facturer(s). The author and the publisher make no representation or warranties of any kind with regard to the completeness
or accuracy of the contents herein and accept no liability of any kind including but not limited to performance, merchant-
ability, fitness for any particular purpose, or any losses or damages of any kind caused or alleged to be caused directly or
indirectly from this book.
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com

Software License Agreement: Terms and Conditions

The media and/or any online materials accompanying this book
that are available now or in the future contain programs and/or
text files (the "Software") to be used in connection with the book.
SYBEX hereby grants to you a license to use the Software, subject
to the terms that follow. Your purchase, acceptance, or use of the
Software will constitute your acceptance of such terms.
The Software compilation is the property of SYBEX
unless otherwise indicated and is protected by copyright
to SYBEX or other copyright owner(s) as indicated in the
media files (the "Owner(s)"). You are hereby granted a
single-user license to use the Software for your personal,
noncommercial use only. You may not reproduce, sell,
distribute, publish, circulate, or commercially exploit the
Software, or any portion thereof, without the written
consent of SYBEX and the specific copyright owner(s) of
any component software included on this media.
In the event that the Software or components include specific

license requirements or end-user agreements, statements of con-
dition, disclaimers, limitations or warranties ("End-User
License"), those End-User Licenses supersede the terms and
conditions herein as to that particular Software component.
Your purchase, acceptance, or use of the Software will consti-
tute your acceptance of such End-User Licenses.
By purchase, use or acceptance of the Software you further
agree to comply with all export laws and regulations of the
United States as such laws and regulations may exist from
time to time.

Software Support

Components of the supplemental Software and any offers asso-
ciated with them may be supported by the specific Owner(s) of
that material but they are not supported by SYBEX. Informa-
tion regarding any available support may be obtained from the
Owner(s) using the information provided in the appropriate
read.me files or listed elsewhere on the media.
Should the manufacturer(s) or other Owner(s) cease to offer sup-
port or decline to honor any offer, SYBEX bears no responsibil-
ity. This notice concerning support for the Software is provided
for your information only. SYBEX is not the agent or principal of
the Owner(s), and SYBEX is in no way responsible for providing
any support for the Software, nor is it liable or responsible for any
support provided, or not provided, by the Owner(s).

Warranty

SYBEX warrants the enclosed media to be free of physical

defects for a period of ninety (90) days after purchase. The
Software is not available from SYBEX in any other form or
media than that enclosed herein or posted to www.sybex.com.
If you discover a defect in the media during this warranty
period, you may obtain a replacement of identical format at no
charge by sending the defective media, postage prepaid, with
proof of purchase to:

SYBEX Inc.
Customer Service Department
1151 Marina Village Parkway
Alameda, CA 94501
(510) 523-8233
Fax: (510) 523-2373
e-mail:
WEB: HTTP://WWW.SYBEX.COM
After the 90-day period, you can obtain replacement media
of identical format by sending us the defective disk, proof of
purchase, and a check or money order for $10, payable to
SYBEX.

Disclaimer

SYBEX makes no warranty or representation, either
expressed or implied, with respect to the Software or its
contents, quality, performance, merchantability, or fitness
for a particular purpose. In no event will SYBEX, its dis-
tributors, or dealers be liable to you or any other party for
direct, indirect, special, incidental, consequential, or other
damages arising out of the use of or inability to use the

Software or its contents even if advised of the possibility of
such damage. In the event that the Software includes an
online update feature, SYBEX further disclaims any obli-
gation to provide this feature for any specific duration
other than the initial posting.
The exclusion of implied warranties is not permitted by some
states. Therefore, the above exclusion may not apply to you.
This warranty provides you with specific legal rights; there
may be other rights that you may have that vary from state to
state. The pricing of the book with the Software by SYBEX
reflects the allocation of risk and limitations on liability con-
tained in this agreement of Terms and Conditions.

Shareware Distribution

This Software may contain various programs that are distributed
as shareware. Copyright laws apply to both shareware and ordi-
nary commercial software, and the copyright Owner(s) retains all
rights. If you try a shareware program and continue using it, you
are expected to register it. Individual programs differ on details of
trial periods, registration, and payment. Please observe the
requirements stated in appropriate files.

Copy Protection

The Software in whole or in part may or may not be copy-
protected or encrypted. However, in all cases, reselling or
redistributing these files without authorization is
expressly forbidden except as specifically provided for by
the Owner(s) therein.

Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com

Acknowledgments

T

his is my tenth book, and I still find writing acknowledgments to be the
hardest part of writing a book. This is doubly frustrating because they’re so
seldom read, or so it seems to me. I’m a teacher during the day, you see, and
I find that my students are only dimly and rarely aware of the acknowledg-
ments in books they’ve bought at my insistence. Perhaps the acknowledgments
in works of fiction enjoy a gladder fate, but the pessimist in me doubts that this
is so. I don’t understand all this, because I’m the sort who watches the credits
of a film until I see the copyright symbol go by. Okay, to be honest, I often skip
out when I see the production accountants’ names go by, but that’s quite close
to the end, isn’t it?
Notwithstanding this conspiracy of obscurity that surrounds acknowl-
edgments, I must insist that they’re important. Yes, I concede that it’s
unlikely that more than a handful of people have ever purchased books
on account of the acknowledgments. And, that seems to indicate that the
acknowledgments are less important than what lies nearer the center of
the book. But, not so.
After all, books are created by

people

and for

people


: It’s people who are
important, not books. And here, in the acknowledgments, I have an opportunity
to pay a debt to the many people who worked on this book. In film, many people
are sometimes given a prominent place in the credits—often above the title of the
film itself—including producers, directors, actors, and actresses. But, in publish-
ing, the cover of a book generally contains only the name of the publishing com-
pany and the author. (Gosh, come to think of it, I haven’t seen the cover of this
book: I’m merely presuming that my name will be on the cover.)
This is all wrong, and I’d like to give you the chance to help change it: I
want you to copy this page—don’t tear it out or anything crude like that—
and tape it over the cover of your copy of this book. The result may not be
very visually aesthetic, but my spirit soars when I consider this little act of
rebellion against anonymity on behalf of the cast and crew of this book.
Now, I’d best get to the point or the names of all these folk will be on
the back of this page, which would ruin the whole concept, wouldn’t it?
Let’s start with Margot Maley-Hutchison, Literary Agent (think of her as
the producer), and Ellen Dendy, Acquisitions and Developmental Editor
(think of her as the director). Then, there’s Randy Russell and Utilman,
Technical Editors (think of them as the screenwriters who adapted my
unfilmable novel, because that approximates the enormous scope of their
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com

Acknowledgments

vii

contribution) and Ellen Bliss, Technical Editorial Coordinator (think of
her as the screenwriting manager who had the wisdom to choose Randy

and Utilman to write the screenplay). Stars include Dennis Fitzgerald,
Production Editor (think of him as this year’s best actor); Julie Sakaue,
Editor (think of her as this year’s best actress); and Sarah Lemaire and
Suzanne Goraj, Editors (think of them as this year’s best actresses in sup-
porting roles). Each of these folks deserves an Oscar—or perhaps two
Oscars—just for putting up with my idiosyncrasies and increasingly poor
memory and lack of attention to detail.
Several others who didn’t work directly on the book merit special mention.
My home crew—Jennifer, Patrick, and Sara—seem by now to have become
inured of my book writing habits. Thanks to them for handling the bills, the
moving of furniture, and the household chores while I indulged my writing
habit. Finally, and emphatically, I thank my Lord and Savior, Jesus Christ,
who knows my many flaws and weaknesses better than any other and never-
theless patiently bears with me knowing that He—how, I don’t know—can yet
make something remarkable of me. I can’t wait!
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Introduction
L
ike many in the Linux community, you’ve probably heard of the Red
Hat Certified Engineer (RHCE) program and the related RHCE exam, both of
which were created by Red Hat, Inc. You may have heard that the RHCE
exam is challenging, or you may have heard that it is not. You may have heard
that the exam is focused on Red Hat Linux and that knowledge of Unix or a
Linux distribution other than Red Hat Linux will not help you to pass the
exam. Most of all, you may have wondered how RHCE certification might
boost your career or, if you’re a hiring manager, whether RHCE certification
could help you find qualified employees. I wrote this book to answer these
questions and similar questions and to provide comprehensive material and
exercises designed to prepare you to pass the RHCE exam.

Is This Book for You?
I
f you want to learn how to administer a Red Hat Linux system, this
is the book for you. In it, you’ll find clear and comprehensive explanations
of the concepts you need to understand and the procedures you need to be
able to perform.
If you plan to take the RHCE exam, you will find this book to be even more
valuable, because it focuses on the topics identified by Red Hat, Inc., as central
to the RHCE exam. It contains many practice questions and exercises that will
help you to prepare for and assess your readiness to take the RHCE exam. The
book includes both questions and exercises because the RHCE exam has two
kinds of tests: written and performance-based exams. The questions prepare
you for the written part of the RHCE exam, and the exercises prepare you for
the performance-based part of the exam. Once you master the questions and
exercises, you will be able to approach the RHCE exam with confidence.
However, the RHCE exam and this book are not for everyone. The RHCE
exam is mostly a hands-on exam that attempts to assess your system administra-
tion skills. This book will help you to learn and refine these skills, but unless you’ve
had some experience with Unix or Linux, you probably won’t make much sense
of this book or the RHCE exam. To succeed, you don’t need to be a Unix or Linux
expert—although it certainly won’t hurt if you are—but you should be at least a
Unix or Linux power user who has some experience in system installation and
administration. If you’ve installed Linux on several systems and spent some time
figuring out some system administration commands such as mount and unount,
you can expect to understand the material in this book.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
xxxvi Introduction
What Does This Book Cover?
I

’ve endeavored to cover every topic that’s important to a Red Hat
Linux system administrator, especially emphasizing those topics that are
likely to appear on the RHCE exam. I must write endeavored to, because
those—like myself—who have taken the RHCE exam are bound by a non-
disclosure agreement and cannot divulge the contents of the exam. More-
over, Red Hat, Inc. regularly updates the RHCE exam with new questions
and exercises. So, no program of study for the RHCE exam is or can be a
substitute for real knowledge. But, this book can help you develop exactly
the sort and degree of real knowledge required to pass the RHCE exam.
Among the central topics covered are the following:

RHCE certification and the RHCE exam

A review of PC hardware, Unix, and networking that will help you fill
in the gaps in what you already know

Red Hat Linux installation

Red Hat Linux system and network administration

Network server administration

X Window system administration

Red Hat Linux security administration

System troubleshooting and repair
At the time of writing, Red Hat, Inc. had just released Red Hat Linux 6.2
and was updating the RHCE exam to reflect the new and changed features
of Red Hat Linux 6.2. Thus, this book was written with Red Hat Linux 6.2

and the RHCE exam for Red Hat Linux 6.2 in mind.
If you pass the RHCE exam, your certification will remain current for one year,
irrespective of any new versions of Red Hat Linux released during that time.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Introduction xxxvii
How Do You Take the RHCE Exam?
T
he RHCE exam tests your conceptual understanding of and skill
in performing Red Hat Linux system administration tasks. The exam
takes about seven hours, including a one-hour break for lunch. The
exam is challenging: currently about one out of every three examinees
fails the exam. However, proper preparation for the exam can signifi-
cantly increase your likelihood of success.
Red Hat, Inc., offers the RHCE exam about once a month at its Durham, NC
headquarters and less frequently at its Santa Clara, California, facility. At the
time of writing, Red Hat, Inc., had just announced that it will soon offer the
RHCE exam in Europe and East Asia. The RHCE exam is also offered in several
additional cities by Red Hat, Inc.’s training partners, including Global Knowl-
edge and IBM Global Services.
You can take the RHCE exam or a special four-day RHCE exam
preparation course, the price of which includes the exam, which is taken
the following day. The Red Hat, Inc. course numbers and the cost at the
time of writing were as follows:
RHCE exam only RH302 ($749)
RHCE exam and preparation course RH300 ($2,498)
To register for an RHCE exam or RHCE exam preparation course
offered by Red Hat, Inc., at a U.S. location, call (800) 454-5502 or e-mail
Also, check the following Web sites for up-to-the-
minute details and additional registration information:

Red Hat, Inc. www.redhat.com/services/training/training.html
Global Knowledge db.globalknowledge.com/olm/go.asp?find=redhat
IBM Global Services www.ibm.com/services/learning/
spotlight/linux.html
Chapter 1, “Red Hat Certification,” and Chapter 31, “The RHCE Exam,” provide
further information on RHCE certification and the RHCE exam.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
xxxviii Introduction
How to Use This Book
T
his book has quite a few chapters—31, to be precise. Most of the
chapters are small and focused so that you can quickly find and review
topics. Small chapters also help you pace your study so that you avoid
burn out. A few chapters, such as the chapter on installing Red Hat
Linux, are longer than most, but, generally, their length is attributable to
screen shots that will help you to stay oriented to the procedures those
chapters explain. So, you probably won’t find even the longer chapters
overly tiring.
Be sure to read the inside front cover page of this book which discusses
what’s on the companion CD.
Because the chapters are small, the book is organized into parts that group
related chapters:
Part I: Background Chapters 1–5 explain RHCE certification and
review basic material on PC hardware, Unix, TCP/IP networking, and
Linux. You’re probably familiar with much of this material already, so
feel free to skim these chapters, using these chapters just to fill in gaps in
your recollection and understanding.
Part II: Installation Chapters 6–8 describe the procedure for installing Red
Hat Linux, including pre-installation planning and advanced installation

techniques.
Part III: Configuration and Administration Chapters 9–20 describe and
explain Red Hat Linux system administration, including such topics as
user accounts, disk quotas, and RPM packages.
Part IV: Network Services Administration Chapters 21–25 describe and
explain the administration of network services. They include material on
Apache, NFS, Squid, and a variety of other servers, plus material on network
security and system logs.
Part V: X Window System Administration Chapters 26–28 concern the
X Window System, the Unix standard graphical user interface.
Part VI: Network Administration Chapters 29 and 30 cover routers
and firewalls.
Part VII: The RHCE Exam (RH302) Chapter 31 describes the RHCE
exam in detail and gives suggestions for performing well on the exam.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Introduction xxxix
Appendix A Appendix A is a practice exam for you to take as you prepare
for the RHCE exam.
Merely reading—or worse yet, skimming—this book won’t suffice to prepare
you for the RHCE exam. Instead, you should follow a methodical, organized
process such as the following:
1.
Take the assessment test to determine the areas in which you excel and
those in which you should spend more time studying. Strive to learn
from your mistakes as well as your successes.
2.
Study a chapter. Studying, by the way, involves more than mere reading;
it involves interacting with the text, asking yourself questions, and
probing to discover the consequences of what you read.

3.
Complete the exercises in the chapter. Bear in mind that the RHCE exam
will require you to demonstrate skills, which are acquired only by prac-
tice, not by precept. The exercises are probably the closest experience to
a real RHCE exam you’ll find anywhere. They’re worth doing, if you plan
to pass the exam.
4.
Answer the review questions at the end of the chapter. These questions
closely resemble the experience of the written portion of the RHCE exam.
5.
Review chapter topics related to any questions you missed. Be sure
you know the right answer and why the other responses are wrong.
6.
Work your way through the entire book in this fashion, one chapter at
a time.
7.
When you believe you’re ready, take the practice exam in Appendix A,
then assess your performance.
8.
Take the bonus exam included on the CD to further test your readi-
ness for the real thing. If you do well, sign up for the RHCE exam or
the RHCE preparation course, according to your preference. If you
don’t do well, repeat steps 1–8 until you’re able to pass the practice
exam with confidence.
9.
Use the Flashcard questions on the CD that accompanies this book to
stay sharp while awaiting the RHCE exam.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Assessment Test

1.
Which /etc/conf.modules line specifies that default module path
information is to be retained?
A.
default-path
B.
hold
C.
keep
D.
retain
2.
Which of the following are components of the Linux operating system?
A.
The kernel originally created by Linus Torvalds
B.
The GNU utilities and programs
C.
The MINIX utilities and programs
D.
The Unix utilities and programs
3.
Which of the following protocols is a popular exterior protocol?
A.
BGP-4
B.
EGP
C.
OSPF-2
D.

RIP-2
4.
To check permission of the local host to access the X server running on
server, which of the following commands should be issued?
A.
export DISPLAY=server:0.0
xhost
B.
export DISPLAY=server:0.0
xhost +
C.
export DISPLAY=server:0.0
xhosts
D.
export DISPLAY=server:0.0
xhosts +
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
xlii Assessment Test
5.
Which of the following programs is used to configure the system time zone?
A.
timeconfig
B.
timezone
C.
timezoneconfig
D.
zoneconfig
6.

Which of the following runlevels corresponds to multiuser operation
without networking?
A.
1
B.
2
C.
3
D.
4
7.
Which of the following programs is used to convert to MD5 password
encryption?
A.
md5conv
B.
md5unconv
C.
pwconv
D.
None of the above
8.
Which of the following commands correctly creates an initial ramdisk
for use during system boot?
A.
mkinitrd /boot/initrd-version
B.
mkinitrd /boot/initrd-version version
C.
mkinitrd /boot/initrd-version.img

D.
mkinitrd /boot/initrd-version.img version
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Assessment Test xliii
9.
Quotas are supported on which of the following file system types?
A.
dos
B.
ext2
C.
iso9660
D.
vfat
10.
Which of the following files specifies a user’s window manager?
A.
~/.wm_style
B.
~/.wmanager
C.
~/.Xclients
D.
~/.Xsession
11.
Which of the following are Red Hat Linux installation types?
A.
Expert
B.

Graphical
C.
Text
D.
Upgrade
12.
Which of the following commands activates user quotas?
A.
quotaon -a
B.
quotaon -ag
C.
quotaon -au
D.
quotaon -aug
13.
Which of the following operations should be performed first?
A.
Create the quota files.
B.
Set default quotas.
C.
Set individual quotas.
D.
Turn on quotas.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
xliv Assessment Test
14.
What is the port number associated with the SMTP protocol?

A.
22
B.
25
C.
50
D.
110
15.
To determine whether a Linux kernel supports firewalling, you should
check for the existence of which of the following files?
A.
/proc/net/ip_always_defrag
B.
/proc/net/ip_fwchains
C.
/proc/sys/net/ipv4/ip_always_defrag
D.
/proc/sys/net/ipv4/ip_fwchains
16.
To masquerade packets originating from a local protected network,
which of the following ipchains commands should be specified?
A.
ipchains –A forward –i eth0 \
–s 192.168.1.0/24 –j MASQ
B.
ipchains –A input –i eth0 \
–s 192.168.1.0/24 –j MASQ
C.
ipchains –A local –i eth0 \

–s 192.168.1.0/24 –j MASQ
D.
ipchains –A output –i eth0 \
–s 192.168.1.0/24 –j MASQ
17.
Which of the following is associated with a network address of 24 bits?
A.
The network address 192.168.1.0/8
B.
The network address 192.168.1.0/24
C.
An IP address with a netmask of 255.0.0.0
D.
An IP address with a netmask of 255.255.255.0
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Assessment Test xlv
18.
Which of the following directories contains the ping command?
A.
/bin
B.
/sbin
C.
/usr/bin
D.
/usr/sbin
19.
Where might modules associated with Linux version 2.2.15 reside?
A.

/lib/2.2.15
B.
/lib/modules/2.2.15-2
C.
/modules/2.2.15
D.
/modules/2.2.15-2
20.
Which of the following is the final operation performed by
rc.sysinit?
A.
Activate swap partitions.
B.
Load the keymap.
C.
Set the logging level.
D.
Store the boot messages.
21.
Which of the following logging configuration file entries will log messages
pertaining to FTP logins that have a critical priority?
A.
auth.alert: /var/log/messages
B.
auth.err: /var/log/messages
C.
auth.info: /var/log/messages
D.
auth.*: /var/log/messages
Copyright ©2000 SYBEX , Inc., Alameda, CA

www.sybex.com
xlvi Assessment Test
22.
Which of the following key sequences switches the keyboard and
video system from a virtual console to X?
A.
Ctrl+Alt+F1
B.
Ctrl+Alt+F3
C.
Ctrl+Alt+F7
D.
Ctrl+Alt+F8
23.
To specify that the gpm service should be executed at runlevel 3, which
should be issued command?
A.
chkconfig --level 3 gpm
B.
chkconfig --level 3 gpm on
C.
chkconfig --levels 3 gpm
D.
chkconfig --levels 3 gpm on
24.
To remount the root file system in read-write mode, which of the following
commands should be issued?
A.
mount -t ext2 /dev/hda1 / -o defaults,ro
B.

mount -t ext2 /dev/hda1 / -o defaults,rw
C.
mount -t ext2 /dev/hda1 / \
-o defaults,remount,ro
D.
mount -t ext2 /dev/hda1 / \
-o defaults,remount,rw
25.
Which of the following commands will halt the system?
A.
init 0
B.
halt
C.
shutdown -h now
D.
telinit 0
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Assessment Test xlvii
26.
Which of the following allow you to run Windows 9x under Linux?
A.
You can configure the system for multi-boot operation.
B.
You can install LILO.
C.
You can install VMware.
D.
You can install WINE.

27.
Which of the following time specifications defines a cron job that executes
at 8:00
P.M.
on the first day of odd-numbered months?
A.
0 20 1 1-9/2,11 *
B.
0 20 1 1-11/2 *
C.
0 20 1 1,3,5,7,9,11 *
D.
0 20 1 jan,mar,may,jul,sep,nov *
28.
When you modify the file /etc/crontab, which of the following occurs?
A.
cron immediately recognizes the change
B.
You must reboot the system
C.
You must issue the touch command to update the modification
time of the /var/spool/cron directory
D.
You must restart the cron system
29.
Which of the following kinds of users log in and receive a shell prompt?
A.
Ordinary users
B.
POP users

C.
PPP users
D.
SLIP users
30.
Which of the following files establishes the user’s path?
A.
/etc/bashrc
B.
/etc/profile
C.
~/.bashrc
D.
~/.bash_profile
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
xlviii Assessment Test
31.
Which of the following correctly pairs a virtual console with its installation
program function?
A.
2, shell prompt
B.
3, install program messages
C.
4, system messages
D.
5, other messages
32.
Which program is used by the installation procedure to configure X?

A.
Xcfg
B.
Xconfig
C.
Xconfigurator
D.
Xconfiguration
33.
Which of the following are Apache configuration files that must exist?
A.
access.conf
B.
httpd.conf
C.
modules.conf
D.
srm.conf
34.
To start a system in single-user mode without initial processes, what
should be typed in response to the boot prompt?
A.
linux
B.
linux emergency
C.
linux s
D.
linux single
35.

Which of the following programs is not PAM-aware?
A.
ftp
B.
login
C.
rlogin
D.
telnet
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Assessment Test xlix
36.
To permit a client host to access a printer remotely, the client host can
be listed in:
A.
/etc/hosts
B.
/etc/hosts.equiv
C.
/etc/hosts.lpd
D.
/etc/printcap
37.
Which of the following correctly specifies the location of a compiled
Linux kernel?
A.
/usr/src/linux/arch/i386/boot/bzImage
B.
/usr/src/linux/arch/i386/boot/kernel

C.
/usr/src/linux/arch/i386/boot/vmlinux
D.
/usr/src/linux/arch/i386/boot/vmlinuz
38.
To specify that members of the owning group can read the file data,
which command do you enter?
A.
chmod 727 data
B.
chmod 717 data
C.
chmod g+r data
D.
chmod uo+r data
39.
What does a LILO prompt of LIL indicate?
A.
LILO’s first stage loaded.
B.
LILO’s second stage loaded.
C.
LILO’s second stage started.
D.
LILO’s third stage loaded.
40.
To update the shared library configuration, you must issue the command
A.
ld
B.

ld.so
C.
ldconfig
D.
ldd
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
l Assessment Test
41.
Which of the following commands is included in the standard rescue
mode complement of commands?
A.
kill
B.
pico
C.
sync
D.
vi
42.
Which of the following is true of the Red Hat Linux text mode instal-
lation procedure?
A.
It is easier for beginners to use than the graphical mode installation
procedure.
B.
It is faster than the graphical mode installation procedure.
C.
It is more reliable than the graphical mode installation procedure.
D.

It requires fewer system resources, such as RAM, than the graphical
mode installation procedure.
43.
Which of the following are ways to disable dynamic routing?
A.
echo “0” > /proc/sys/net/ipv4/dynamic_routing
B.
Editing /etc/sysconfig/network-scripts
C.
The linuxconf Gated Daemon screen
D.
The linuxconf Routed Daemon screen
44.
To specify the file system type that corresponds to a NetWare share, use:
A.
ipx
B.
ncp
C.
ncpfs
D.
netware
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Assessment Test li
45.
Which of the following is generally the best way to choose packages to
be installed during installation?
A.
Choose the Everything option.

B.
Install packages after installation.
C.
Select the desired components.
D.
Select the desired packages.
46.
The dynamic loader’s cache resides in which of the following files?
A.
/etc/ld.so.cache
B.
/etc/ld.so.conf
C.
/lib/ld.so.cache
D.
/lib/ld.so.cache
47.
To use Xconfigurator noninteractively, where possible, you should
invoke the program with which of the following flags?
A.
--auto
B.
--expert
C.
--kickstart
D.
--probe
48.
You can damage a monitor by running which of the following tools?
A.

SuperProbe
B.
xf86config
C.
xinitrc
D.
xvidtune
49.
To configure XDM to provide any requesting host with a chooser that
includes server1 and server2, which CHOOSER directive should be
specified?
A.
* CHOOSER server1 server2
B.
server1 server2 CHOOSER *
C.
ALL CHOOSER server1 server2
D.
server1 server2 CHOOSER ALL
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
lii Assessment Test
50.
The command to build the Linux kernel is which of the following?
A.
make clean bzImage modules
B.
make clean dep bzImage modules
C.
make dep bzImage modules

D.
make dep clean bzImage modules
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
Answers to Assessment Test liii
Answers to Assessment Test
1.
C. The keep line specifies that path information in /etc/
conf.modules supplements default information. See Chapter 17 for
more information.
2.
A, B. Linux, sometimes called GNU/Linux, is the combination of Tor-
valds’s kernel and the GNU utilities and programs. See Chapter 5 for
more information.
3.
A. OSPF-2 and RIP-2 are interior protocols. EGP is no longer popular.
See Chapter 29 for more information.
4.
A. Without arguments, the xhost command can be run on a client or
server. See Chapter 28 for more information.
5.
A. The timeconfig program configures the time zone. See Chapter 9
for more information.
6.
B. Runlevel 1 is single-user mode. Runlevel 3 is multi-user mode with net-
working. Runlevel 4 is essentially the same as runlevel 3. See Chapter 9
for more information.
7.
D. You cannot conveniently convert to MD5 password encryption; it
must be specified during installation. See Chapter 9 for more information.

8.
D. You should specify the img extension and the kernel version and
extraversion code. See Chapter 18 for more information.
9.
B. Only the ext2 file system supports disk quotas. See Chapter 11
for more information.
10.
A. The ~/.Xclients-default script checks the contents of the
~/.wm_style file. See Chapter 27 for more information.
11.
D. Upgrade is an installation type; the other responses are installation
modes. See Chapter 7 for more information.
12.
A, C, D. The -a option activates user and group quotas unless -g or
-u is given, in which case it activates only the specified type of quotas.
See Chapter 11 for more information.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com
liv Assessment Test
13.
A. You must create the quota files before quotas can be set or turned
on. See Chapter 11 for more information.
14.
B. The SMTP protocol uses port 25. See Chapter 21 for more information.
15.
B. The existence of ip_fwchains indicates support for firewalling; the
ip_always_defrag option should be enabled on systems that provide
a firewall. See Chapter 30 for more information.
16.
A. To masquerade a local network, append the proper rules to the forward

chain. See Chapter 30 for more information.
17.
B, D. The IP address 192.168.1.0/24 has a 24-bit network address and
8-bit host address. The netmask 255.255.255.0 has 24 1 bits, indicat-
ing a 24-bit network address. See Chapter 4 for more information.
18.
A. The ping command is sometimes issued by ordinary users and
therefore must reside in /bin rather than /sbin. It is an essential trou-
bleshooting tool and therefore resides in /bin rather than /usr/bin.
See Chapter 13 for additional information.
19.
B. The modules reside in a subdirectory of /lib/modules and are
named for the kernel version and build with which they’re associated.
See Chapter 13 for additional information.
20.
D. The boot messages are stored as the last operation, so that no mes-
sages are lost. See Chapter 14 for more information.
21.
B, C, D. The crit priority is higher than those of err and info, but
lower than that of alert. The * priority matches all message priorities.
See Chapter 24 for more information.
22.
C. Virtual console 7 is associated with X. See Chapter 27 for more
information.
23.
B. The flag is level, not levels, and the on argument is required. See
Chapter 14 for more information.
24.
D. The remount option lets you remount a mounted file system. See
Chapter 15 for additional information.

25.
A, B, C, D. Any of the alternatives will work. See Chapter 15 for
additional information.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com

×