Red Hat Certified System Administrator RHCSA Simulator #2
Simulator Summary
0 of 60 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Results
0 of 60 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, your results in the simulator were not up to the desired standards. 😔
However, take advantage of your unlimited access and continue to practice.
Remember, persistence and dedication will lead to mastery. 😎 -
Congratulations! 🎉
You have successfully passed the simulator and are now one step closer to achieving your certification.
We hope you will consider joining us again in your future certification journey.Wishing you the best of luck with the upcoming exam. Keep up the great work! 💪
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 60
1. Question
You are tasked with securely connecting to a remote server with the IP address 192.168.1.10 using the username admin. Which of the following commands would you use to initiate this connection using SSH?
CorrectIncorrect -
Question 2 of 60
2. Question
You need to connect to a remote system using SSH on port 2222, rather than the default port 22. You are connecting to the server with IP address 10.0.0.5 using the username john. Which command accomplishes this?
CorrectIncorrect -
Question 3 of 60
3. Question
You are currently logged in as the user alice. You need to switch to the user bob for performing some administrative tasks. Which command should you use to switch to the user bob?
CorrectIncorrect -
Question 4 of 60
4. Question
After assisting with some configurations on a coworker’s system, you wish to return to your original login shell without terminating the current session. Which command would allow you to achieve this?
CorrectIncorrect -
Question 5 of 60
5. Question
You have a directory named project_files that contains numerous files and subdirectories. You need to archive the entire directory and then compress it using gzip. Which of the following commands would allow you to accomplish this task?
CorrectIncorrect -
Question 6 of 60
6. Question
You’ve received a compressed file named data.tar.bz2 from a colleague. You need to uncompress and unpack the file to access its contents. Which command should you use?
CorrectIncorrect -
Question 7 of 60
7. Question
You are creating a script that should notify the administrator if the disk usage of the root partition exceeds 80%. Which code snippet correctly captures and processes the disk usage of the root partition?
CorrectIncorrect -
Question 8 of 60
8. Question
You have a script that needs to count the number of active SSH sessions and store that number in a variable. Which code snippet correctly captures this data?
CorrectIncorrect -
Question 9 of 60
9. Question
You need to create a script that checks if a specific user, “jdoe”, exists on the system. Which code snippet correctly verifies the existence of this user?
CorrectIncorrect -
Question 10 of 60
10. Question
You’re writing a script to check the free space on the root filesystem and issue a warning if it’s below 10GB. Which code snippet achieves this?
CorrectIncorrect -
Question 11 of 60
11. Question
You have been tasked to write a shell script that takes a list of filenames as arguments and renames each of them by adding a .backup extension. Which code snippet correctly achieves this?
CorrectIncorrect -
Question 12 of 60
12. Question
You want to write a script that reads each line from a file named data.txt and processes each line to print out only those lines that contain the word “error”. Which code snippet correctly achieves this?
CorrectIncorrect -
Question 13 of 60
13. Question
You are a system administrator and receive complaints about a server’s slow performance. You decide to investigate CPU-intensive processes. Which command would you use to display a real-time view of the system’s current processes sorted by CPU usage?
CorrectIncorrect -
Question 14 of 60
14. Question
A certain process on your system is consuming a high amount of system resources and is unresponsive. You have the Process ID (PID) 1234 for this process. Which command would you use to forcefully terminate this process?
CorrectIncorrect -
Question 15 of 60
15. Question
You are working on a Red Hat system, and a critical application with Process ID (PID) 5678 requires more CPU time than it currently receives. Which command would you use to give this process a higher priority by decreasing its nice value by 5?
CorrectIncorrect -
Question 16 of 60
16. Question
One of the applications running on your system is too aggressive in consuming resources. You need to decrease its priority. Which statement about the ‘nice’ value in Red Hat systems is true?
CorrectIncorrect -
Question 17 of 60
17. Question
Your Red Hat system is currently running with the virtual-host tuning profile. You’ve been asked to switch to a profile that would better suit a high throughput database server. Which of the following tuning profiles would be most appropriate?
CorrectIncorrect -
Question 18 of 60
18. Question
You’re investigating the current tuning profile used by a Red Hat system. Which command will display the active tuning profile?
CorrectIncorrect -
Question 19 of 60
19. Question
Sarah, a system administrator, needs to set up a new logical volume named “lv_reports” of size 10GB inside the “vg_data” volume group. Which command will achieve this?
CorrectIncorrect -
Question 20 of 60
20. Question
After a project completion, Mike wants to delete a logical volume named “lv_temp” from the “vg_projects” volume group. What is the correct command to achieve this?
CorrectIncorrect -
Question 21 of 60
21. Question
Alex wants to ensure that the /dev/sda1 partition mounts at boot using its UUID. He knows the UUID of the partition is 4a98adbc-f23d-48e1-a5f6-598ca2d310c0. Which line should Alex add to the /etc/fstab file to achieve this?
CorrectIncorrect -
Question 22 of 60
22. Question
Lucy has a partition with a label “Backup” that she wants to auto-mount on boot at /mnt/backup. How should she correctly configure this in /etc/fstab?
CorrectIncorrect -
Question 23 of 60
23. Question
Martin, a system administrator, needs to add a new logical volume named “logs” of size 10GB to the volume group “vg_data” without causing any disruptions to the running system. Which command should he use?
CorrectIncorrect -
Question 24 of 60
24. Question
Jenna wants to add a new swap space of 4GB on her server without causing any disruptions. She has created a logical volume named “lv_swap” for this purpose. Which sequence of commands should she execute to achieve this?
CorrectIncorrect -
Question 25 of 60
25. Question
Your organization’s database server is running out of storage on its /dbdata mount, which resides on a logical volume named lv_dbdata in the vg_databases volume group. There is an additional 20GB of unused space in vg_databases. You have been tasked with expanding lv_dbdata to utilize this space. Which command would accomplish this?
CorrectIncorrect -
Question 26 of 60
26. Question
You’ve extended the logical volume lv_web in the volume group vg_website to accommodate more web content. After using lvextend, you need to ensure that the filesystem residing on the logical volume is aware of the added space. Which command should you use if the filesystem is ext4?
CorrectIncorrect -
Question 27 of 60
27. Question
In an attempt to encourage collaboration between the design and marketing teams, an IT administrator created a shared directory, /shared/design_marketing. However, files created by the design team members cannot be edited by the marketing team members and vice versa. What should the administrator do to ensure that files and directories created inside /shared/design_marketing are editable by both teams?
CorrectIncorrect -
Question 28 of 60
28. Question
A user, Tom, is unable to run a script named “runme.sh” located in his home directory. Tom sees the following output when checking the file’s permissions: -rw-r–r–. What command should Tom execute to resolve this issue and run the script without errors?
CorrectIncorrect -
Question 29 of 60
29. Question
An application stores its configuration files in the directory /app/config. Users have reported that they cannot access the configuration files. Upon investigation, the directory permissions are shown as drwx——. What command should be executed to ensure that all users can read the files in the directory without giving them write or execute permissions?
CorrectIncorrect -
Question 30 of 60
30. Question
You have a new USB drive that you need to format with the vfat file system, mount it to /mnt/usbdrive, and ensure all users can read and write to it. Which set of commands will achieve this?
CorrectIncorrect -
Question 31 of 60
31. Question
You are tasked with installing the httpd package on a Red Hat system using the Red Hat Network. Which command will accomplish this?
CorrectIncorrect -
Question 32 of 60
32. Question
After installing several packages, you want to ensure your system has the latest updates from the Red Hat Network. What command should you run?
CorrectIncorrect -
Question 33 of 60
33. Question
A system administrator needs to set the default boot entry to the third kernel in the GRUB 2 bootloader on a Red Hat system. Which file should the administrator modify?
CorrectIncorrect -
Question 34 of 60
34. Question
After a kernel upgrade, you want to keep the option to boot into the previous kernel version using the GRUB 2 bootloader. Which action ensures the older kernel entries are retained in the GRUB 2 boot menu?
CorrectIncorrect -
Question 35 of 60
35. Question
A system administrator wants to run a script called backup.sh from the /root/scripts directory every day at 3 AM. Which of the following cron job entries in the crontab will achieve this?
CorrectIncorrect -
Question 36 of 60
36. Question
A junior system administrator wants to run a one-time job at 5 PM today. He’s considering using the at command. Which of the following at commands will correctly schedule the job?
CorrectIncorrect -
Question 37 of 60
37. Question
Lisa, a systems administrator, wants to temporarily allow HTTP traffic on her RHEL 8 server. Which command should she execute to achieve this without permanently modifying the firewall rules?
CorrectIncorrect -
Question 38 of 60
38. Question
Michael wants to block a specific IP address, 192.168.1.10, from accessing his RHEL 8 server. Which command should he use to achieve this?
CorrectIncorrect -
Question 39 of 60
39. Question
John, a system administrator, wants to configure a static IP address of 192.168.0.10 and a netmask of 255.255.255.0 for the enp0s3 network interface on a RHEL 8 server. Which command should he use?
CorrectIncorrect -
Question 40 of 60
40. Question
Sarah is tasked with setting an IPv6 address of 2001:db8::2 on the network interface enp0s8. Which command accomplishes this without making the change permanent?
CorrectIncorrect -
Question 41 of 60
41. Question
Anna wants to permanently set the hostname of her RHEL 8 server to server01.example.com. Which of the following commands should she use?
CorrectIncorrect -
Question 42 of 60
42. Question
After setting up a local development environment, Mike needs to ensure that the hostname dev.local resolves to the IP address 192.168.0.100. Which file should he modify to achieve this on a RHEL system?
CorrectIncorrect -
Question 43 of 60
43. Question
To ensure better security practices, a system administrator is instructed to lock the user account “jane” temporarily. Which command would correctly lock “jane’s” account?
CorrectIncorrect -
Question 44 of 60
44. Question
A system administrator wants to set a password for user “alex” to expire in 30 days. Which of the following commands would achieve this?
CorrectIncorrect -
Question 45 of 60
45. Question
For auditing purposes, the system administrator needs to determine the last time the password for the user “mike” was changed. Which command would provide this information?
CorrectIncorrect -
Question 46 of 60
46. Question
As a system administrator, you have been tasked with creating a new group named “devteam” and then adding the user “john” to this group without removing him from any other group. Which set of commands would successfully achieve this task?
CorrectIncorrect -
Question 47 of 60
47. Question
An intern mistakenly removed user “alice” from the “finance” group. As the system administrator, you need to re-add Alice to the finance group without changing her primary group or removing her from other groups. Which command will you use?
CorrectIncorrect -
Question 48 of 60
48. Question
A new junior system administrator, Lisa, has joined your team. You want to give her superuser access, but only for running system monitoring tools and not for making system changes. Which of the following configurations in the sudoers file would allow this?
CorrectIncorrect -
Question 49 of 60
49. Question
Lucia is troubleshooting an application on her Red Hat system. She believes that SELinux might be blocking the application from functioning correctly. Without disabling SELinux permanently, which command can Lucia use to temporarily set SELinux to permissive mode?
CorrectIncorrect -
Question 50 of 60
50. Question
After testing a new configuration, Mia wants to set SELinux back to its enforcing mode, ensuring policies are actively enforced. Which command should she execute?
CorrectIncorrect -
Question 51 of 60
51. Question
Jackson is working on a web server running Red Hat Enterprise Linux. He wants to verify the SELinux context of a file located at /var/www/html/index.html. Which command will provide him with the required information?
CorrectIncorrect -
Question 52 of 60
52. Question
Simone is tasked with determining the SELinux context for a running process with PID 1234. Which of the following commands would help her in identifying the correct context?
CorrectIncorrect -
Question 53 of 60
53. Question
While working on a Red Hat Enterprise Linux server, Martin notices that a custom script at /opt/custom_script.sh does not have the default SELinux context. He wants to restore its context to the default. Which command should he use?
CorrectIncorrect -
Question 54 of 60
54. Question
Elaine is a system administrator who wants to restore the default SELinux context for all files within the /var/www/html directory. Which command will accomplish this while also covering all subdirectories?
CorrectIncorrect -
Question 55 of 60
55. Question
Rachel, a systems administrator, has been tasked with obtaining a container image for an Nginx web server from Docker Hub. Which command should she use to retrieve the official Nginx image?
CorrectIncorrect -
Question 56 of 60
56. Question
Daniel wants to verify if a specific version (1.19) of the Nginx image is available on Docker Hub without downloading it. Which command will help him achieve this?
CorrectIncorrect -
Question 57 of 60
57. Question
Anna has a container image named “myapp:2.0” on her local system. She wants to inspect the metadata of this image to gather information about the environment variables set in the image. Which command should Anna use?
CorrectIncorrect -
Question 58 of 60
58. Question
Lucas wants to find out the command that will run by default when the container “webserver:latest” starts. To inspect this specific detail, which command should Lucas utilize?
CorrectIncorrect -
Question 59 of 60
59. Question
Elena is running a Red Hat system and wants to start a new container using an image from Docker Hub without having Docker installed. Which of the following commands will help her run a container with the image “nginx:latest”?
CorrectIncorrect -
Question 60 of 60
60. Question
Marco needs to inspect the details of an image named “rhel7:latest” from a remote registry without pulling the image. Which command should he use to achieve this?
CorrectIncorrect