Red Hat Certified System Administrator RHCSA Simulator #4
Simulator Summary
0 of 60 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Results
0 of 60 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, your results in the simulator were not up to the desired standards. 😔
However, take advantage of your unlimited access and continue to practice.
Remember, persistence and dedication will lead to mastery. 😎 -
Congratulations! 🎉
You have successfully passed the simulator and are now one step closer to achieving your certification.
We hope you will consider joining us again in your future certification journey.Wishing you the best of luck with the upcoming exam. Keep up the great work! 💪
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 60
1. Question
You have a file named report.txt in your home directory. You want to modify the permissions so that the owner can read and write, the group members can only read, and others have no permissions. Which command will accomplish this?
CorrectIncorrect -
Question 2 of 60
2. Question
You have been given a directory named projects and you need to ensure that the owner can navigate (execute), read, and write to the directory, while the group members can only navigate and read. Everyone else should not have any access. Which command will set these permissions?
CorrectIncorrect -
Question 3 of 60
3. Question
You are troubleshooting an issue with a command named toolkit. You remember there’s a section in the man pages that explains the command’s error codes. How would you quickly find and navigate to this section within the toolkit man page?
CorrectIncorrect -
Question 4 of 60
4. Question
You’ve heard that the info command provides more detailed documentation than the man pages for certain commands. You wish to read the info documentation for the gzip command. Which command would you use?
CorrectIncorrect -
Question 5 of 60
5. Question
You are trying to access a terminal on a remote server named server123. The username you want to use is john. Which command should you use to access the shell prompt of server123 using the correct syntax?
CorrectIncorrect -
Question 6 of 60
6. Question
You are currently in a terminal session and you want to move up one directory. Which command should you issue to perform this operation with the correct syntax?
CorrectIncorrect -
Question 7 of 60
7. Question
You have been given a task to list all the “.txt” files in the current directory and print the content of each file one by one. Which of the following scripts will correctly perform this task?
CorrectIncorrect -
Question 8 of 60
8. Question
You have been asked to create a script that reads a list of user names from a command line and then adds each of them to the system. Which of the following scripts accomplishes this task?
CorrectIncorrect -
Question 9 of 60
9. Question
You have been tasked with creating a script that accepts two arguments: the first argument is the name of a file, and the second argument is a string. The script should append the given string to the provided file. Which of the following scripts accomplishes this task?
CorrectIncorrect -
Question 10 of 60
10. Question
You are creating a script to automate server diagnostics. The script should accept a hostname as its first argument and a port number as its second argument. It should then run a network test on the given host and port. Which of the following scripts accomplishes this?
CorrectIncorrect -
Question 11 of 60
11. Question
You’ve been given the responsibility of creating a script that counts the number of lines in a file and then prints out a message saying whether the file has more than 100 lines. Which of the following scripts will correctly accomplish this?
CorrectIncorrect -
Question 12 of 60
12. Question
You are writing a script that retrieves the available disk space of the root directory and then prints a warning if the available space is less than 10 GB. Which of the following scripts will work correctly for this scenario?
CorrectIncorrect -
Question 13 of 60
13. Question
You are tasked with copying a file named important_data.txt from a local directory to a remote server with the IP address 192.168.1.5. You want to use a secure method that employs SSH. Which command would you use?
CorrectIncorrect -
Question 14 of 60
14. Question
You need to transfer a large directory named project_files to a colleague’s home directory on a remote system with the hostname remotehost. To achieve this securely and ensure only changes are sent over subsequent transfers, which command should you use?
CorrectIncorrect -
Question 15 of 60
15. Question
You have been asked to safely reboot a Linux server after 15 minutes. Which command should you use to achieve this?
CorrectIncorrect -
Question 16 of 60
16. Question
You are on a system that requires a reboot to apply some changes, but you want to ensure that all logged-in users receive a warning message and are given 5 minutes to save their work before the system reboots. Which command will you use?
CorrectIncorrect -
Question 17 of 60
17. Question
Your team is performing maintenance tasks on a server. To ensure no network services start during this period, you need to boot the system into a mode where only basic file systems are mounted and no network services are started. Which target should you boot the system into?
CorrectIncorrect -
Question 18 of 60
18. Question
A system administrator wants to temporarily boot a Linux server into graphical mode for configuring a GUI-based application but doesn’t want to change the default boot target. Which command should they use to manually boot the system into the graphical target for just one session?
CorrectIncorrect -
Question 19 of 60
19. Question
Alex wishes to set up a new 10GB logical volume for storing project backups inside the volume group named “ProjectsVG”. He wants the logical volume to be named “BackupLV”. Which command should Alex use to achieve this?
CorrectIncorrect -
Question 20 of 60
20. Question
Linda has a logical volume named “LogsLV” inside the volume group “SystemVG”. Due to some changes in her application’s requirements, she no longer needs this logical volume and wants to delete it. Which command should Linda use?
CorrectIncorrect -
Question 21 of 60
21. Question
Amelia wants to ensure that her /data filesystem is mounted automatically at boot using its UUID. She found the UUID to be a1b2c3d4-e5f6-g7h8-i9j0-k1l2m3n4o5p6. Which of the following entries should Amelia put in the /etc/fstab file to achieve this?
CorrectIncorrect -
Question 22 of 60
22. Question
Carlos has a new disk that he wants to mount on /backups. He labels the filesystem on the disk as “BACKUP_DRIVE”. To ensure this drive mounts at boot based on its label, which entry should Carlos use in /etc/fstab?
CorrectIncorrect -
Question 23 of 60
23. Question
Elena, a system administrator, has been tasked with adding a new swap space of 4GB to a server without rebooting it or affecting current data. She has a free partition /dev/sdb1 of size 5GB. Which of the following steps should she perform to achieve this?
CorrectIncorrect -
Question 24 of 60
24. Question
Jackson is working on a server with limited storage. He realizes that he often runs out of space in /var/log. Jackson has an unallocated space on his disk and wishes to create a logical volume named “log_vol” of 10GB under the volume group “vg0” for this purpose. Which of the following command sequences will achieve this without destroying existing data?
CorrectIncorrect -
Question 25 of 60
25. Question
After extending the logical volume lv_docs in the volume group vg_office, you notice that the file system has not been resized. You are using an ext4 file system. Which command would you use to resize the file system to fit the enlarged logical volume?
CorrectIncorrect -
Question 26 of 60
26. Question
You are the administrator of a team where members need to collaborate on files within the /projects/teamdata/ directory. You want new files created within this directory to inherit the group ownership of the directory, not the primary group of the user who creates the file. How can you achieve this?
CorrectIncorrect -
Question 27 of 60
27. Question
A user, jane, reports that she cannot execute a script named runme.sh located in her home directory. You run the command ls -l ~/runme.sh and get the output -rw-r–r–. 1 jane jane 100 Sep 10 10:10 /home/jane/runme.sh. How can you enable jane to execute the script?
CorrectIncorrect -
Question 28 of 60
28. Question
You’re auditing file permissions on a server and discover that the file /etc/securedata.txt has permissions -rwxrwxrwx. 1 root root 500 Sep 15 08:00 /etc/securedata.txt. The file contains sensitive data and should be readable only by the root user. Which command will correctly set the permissions?
CorrectIncorrect -
Question 29 of 60
29. Question
You’ve just added a new storage device to your server and need to create a file system on it. You wish to choose a file system that supports journaling and is best suited for large-scale systems with large files. Which of the following commands will help you create the desired file system on the device /dev/sdb1?
CorrectIncorrect -
Question 30 of 60
30. Question
You have a USB drive that was previously formatted with the vfat file system, and it’s mounted at /mnt/usbdrive. You need to unmount the drive to safely remove it from the system. Which command should you use?
CorrectIncorrect -
Question 31 of 60
31. Question
You’ve been asked to install the httpd package on a Red Hat server, ensuring that the package is fetched from the repository rhel-8-server-rpms. Which of the following commands would allow you to accomplish this task?
CorrectIncorrect -
Question 32 of 60
32. Question
A colleague provides you with a package named custom-tool.rpm that needs to be installed on a Red Hat server. Which command would you use to install this package from the local filesystem?
CorrectIncorrect -
Question 33 of 60
33. Question
Your organization has decided to increase the boot time allotted for users to select a kernel in the GRUB bootloader from 5 seconds to 10 seconds. Which file should you modify to change this setting in RHEL 8?
CorrectIncorrect -
Question 34 of 60
34. Question
You are troubleshooting a server that’s facing boot issues. You suspect there might be an issue with the kernel parameters in the bootloader. To temporarily modify the kernel parameters during boot, what should you do when the GRUB2 menu appears?
CorrectIncorrect -
Question 35 of 60
35. Question
You are a system administrator and need to run a backup script, backup.sh, every Monday at 3:15 AM. Which crontab entry will achieve this?
CorrectIncorrect -
Question 36 of 60
36. Question
An intern asks you how to schedule a script to run one time, precisely 20 minutes from now using the Linux scheduling utilities. Which command should the intern use?
CorrectIncorrect -
Question 37 of 60
37. Question
Mia is troubleshooting a problem on a Red Hat system where a certain domain, example.com, is not resolving correctly. She suspects an incorrect entry in a local resolution file. Which file should Mia inspect to check for custom domain resolutions?
CorrectIncorrect -
Question 38 of 60
38. Question
Alex needs to ensure that the system always resolves the hostname backupserver to the IP address 10.0.2.15, even if DNS says otherwise. Which command can he use to add this resolution?
CorrectIncorrect -
Question 39 of 60
39. Question
Emma has installed the vsftpd FTP server on her Red Hat system. She needs to ensure that the service starts automatically whenever the system is rebooted. Which command should Emma use to achieve this?
CorrectIncorrect -
Question 40 of 60
40. Question
James has just installed a DHCP server on his Red Hat machine and wants to ensure that it automatically starts after every system reboot. He’s unsure if the service is currently set to start on boot. Which command can James use to check if the DHCP service is enabled to start on boot?
CorrectIncorrect -
Question 41 of 60
41. Question
Liam has been asked to ensure that SSH access to his Red Hat server is restricted only to the subnet 192.168.1.0/24. Which command should Liam use to apply this rule using firewall-cmd?
CorrectIncorrect -
Question 42 of 60
42. Question
Jasmine is working on a Red Hat server that should only allow HTTP and HTTPS traffic. She wants to apply this rule permanently. Which command should Jasmine use?
CorrectIncorrect -
Question 43 of 60
43. Question
You have recently created a new group called “developers”. You now want to add an existing user, “jdoe”, to this group without modifying his primary group. Which command accomplishes this?
CorrectIncorrect -
Question 44 of 60
44. Question
A junior system administrator needs to run a maintenance script that requires root privileges, but you want to avoid giving them the root password. Which configuration file should you edit to grant them sudo privileges without disclosing the root password?
CorrectIncorrect -
Question 45 of 60
45. Question
You need to ensure that a user named “sam” can run all administrative commands with sudo, but you don’t want to prompt him for a password. Which entry should you add to the /etc/sudoers file to achieve this?
CorrectIncorrect -
Question 46 of 60
46. Question
You are working with a team of new system administrators and you want to teach them how to create a new user account named “devuser” with a home directory in /opt/devuser_home. Which command should they use?
CorrectIncorrect -
Question 47 of 60
47. Question
One of the administrators mistakenly removed the user “john” from the system. However, his home directory /home/john still exists. You need to recreate his account without creating a new home directory. Which command should you use?
CorrectIncorrect -
Question 48 of 60
48. Question
You are auditing the system’s password policies and notice that a user, Alex, hasn’t changed his password in over a year. You want to force Alex to change his password upon his next login. Which command should you use?
CorrectIncorrect -
Question 49 of 60
49. Question
John is a system administrator responsible for managing a Red Hat Enterprise Linux server. He needs to open port 8080 for a new web application in the firewall. Which command should he use to add a rule to allow incoming traffic on port 8080 using firewall-cmd?
CorrectIncorrect -
Question 50 of 60
50. Question
Lisa is a system administrator working with a Red Hat Enterprise Linux server. She needs to permanently block incoming traffic on port 22 (SSH) using firewall-cmd. Which command should she use to achieve this?
CorrectIncorrect -
Question 51 of 60
51. Question
A system administrator, Alex, wants to ensure that any new file created in the “/data” directory will have the permissions 755 (rwxr-xr-x). Which command should he use to set the default file permissions for the directory?
CorrectIncorrect -
Question 52 of 60
52. Question
In the context of the umask command, which of the following umask values will result in new directories being created with the permissions 750 (rwxr-x—)?
CorrectIncorrect -
Question 53 of 60
53. Question
A systems administrator, Maria, is setting up key-based authentication for a user named “jane” on a remote server. Which directory should Maria place Jane’s public key on the remote server to ensure Jane can successfully use key-based authentication?
CorrectIncorrect -
Question 54 of 60
54. Question
David wants to generate a new SSH key pair for key-based authentication without overwriting his existing keys. Which command should he use?
CorrectIncorrect -
Question 55 of 60
55. Question
Jacob, a system administrator, wants to copy a container image named “myapp” from his local Podman storage to a remote container registry at registry.example.com. Which of the following commands should he use to achieve this task?
CorrectIncorrect -
Question 56 of 60
56. Question
Liam wants to obtain information about a container image named “webserver” from a remote Docker registry without pulling the image to his local system. Which command should he use?
CorrectIncorrect -
Question 57 of 60
57. Question
Elena is working on a project where she needs to build a container image using a Containerfile. She placed her Containerfile in the directory /projects/myapp. Which of the following commands should she use to build the container image with the tag myapp:latest?
CorrectIncorrect -
Question 58 of 60
58. Question
Liam has a Containerfile that he wishes to use for building a container image. However, he wants to pass a build-time variable named VERSION with the value 1.2.3 during the build process. Which command achieves this?
CorrectIncorrect -
Question 59 of 60
59. Question
Jonathan wants to start a detached container using an image named “webapp:latest” and wishes to name the container “my-webapp”. Which of the following commands will achieve this?
CorrectIncorrect -
Question 60 of 60
60. Question
Sarah needs to list all the currently running containers on her system. Which command should she use to accomplish this?
CorrectIncorrect