-
General Knowledge
-
General Topics
- Abbreviations
- Books and Authors
- Famous Academies and Institutes
- First in India (Man)
- First in India (Women)
- Important Dates
- Famous Personalities
- Public Administration Science
- Astronomy
- Biology
- Botany
- Chemistry
- Physics
- Zoology
- Inventions and Scientists Geography
- Geographical Epithets India
- Geographical Epithets World
- Places Associated with Industries in India
- National Parks and Sanctuaries
- Towns on River Banks History
- Indian History and Culture
- Indian National Movement
- Indian Polity and Constitution
- Ancient Period in Indian History
- World History
- Governor General of India Culture
- Languages
- Indian Dance and Music
- Classical Dances of India
- Folk Dances in India and Tribal Dances in India
- Famous Dancers, Instrumentalists, Vocalists in India World
- First in the World
- Parliament Names
- United Nation Organizations (UNO)
- World's Famous News Agencies
- World Industries
- National Emblems
- Countries and Alternative Names
- Countries and Capitals
- View More topics...
- General Aptitude
- Problems on Ages
- Alligation and Mixture
- Area
- Arithmetic Progression
- Average
- Banker's Discount
- Boats and Streams
- Calendar
- Chain Rule
- Clock
- Compound Interest
- Decimal Fraction
- Height and Distance
- Logarithms
- Mensurations
- Numbers
- Odd Man Out and Series
- Partnership and Share
- Percentage
- Permutation and Combination
- Pipes and Cisterns
- Probability
- Problems on H.C.F and L.C.M
- Problems on Numbers
- Problems on Trains
- Profit and Loss
- Races and Games
- Ratio and Proportion
- Simple Interest
- Simplification
- Stocks and Shares
- Surds and Indices
- Time and Distance
- Time and Work
- True Discount
- Volume & Surface Areas
- General English
- Antonyms
- Synonyms
- Vocabulary Test
- One Word Substitution
- Sentence Completion
- Sentence Improvement
- Idioms & Phrases
- Homonyms
- Word Formation
- Active & Passive Voice
- Direct and Indirect Speech
- Spotting Errors
- Double Synonyms
- Choose the Appropriate Filter
- Spelling Test
- Transformation
- Reconstruction of Sentence
- Chooose the Correct or Incorrect Sentence
- Networking
- Interview Questions
-
Programming
- .NET
- Java
- ASP.NET
- C++
- Perl
- Python
- Ruby and Rails
- Struts
- Core Java
- Hibernate Database
- DB2
- MS SQL Server
- MySQL
- Oracle
- SQL
- DBMS
- Data Warehousing
- Data structures and Algorithms Cisco
- CCNA
- CCNP Routing
- CCNP Switching
- Internetworking
- Border Gateway Protocol Windows
- MCSE
- Exchange Server
- Windows Server 2008
- DNS & Active Directory
- Firewall Questions Linux
- Unix
- Linux Server Administrator
- Linux System Administrator
- Linux File Manipulation
- Database
- Home
- Server Administration
- RHCSA Online Test
Instructions
- Total Questions 20
- Each question carry 1 mark
- Must answer all the questions (otherwise report card will not be generated)
- If you dont want to take a test, simply click the check answers button and view all the answers with explanations
- Do Not Refresh the Page
- No Time Limit
- Good Luck :)
You Scored % - /
Correct Answers :
[B]
Explanation :
The default location where the private key is stored is in /etc/ pki/tls/private. Of course, it is up to the discretion of the system administrator to store this key in another location.
Correct Answers :
[A]
Explanation :
After installing the mod_tls package that contains all that is needed for setting up a TLS secured host, the SSLEngine is already set to on. The other parameters mentioned here must be changed to match the server configuration.
Correct Answers :
[A, D]
Explanation :
Using mod_php or running the script as a CGI script are both valid solutions. Answers A and D will not work.
Correct Answers :
[A]
Explanation :
Explanation: To access a local database, no additional configuration is required. To allow Apache to access remote databases, you may have to set both the httpd_can_network_connect_db as the httpd_can_network_connect Booleans.
Correct Answers :
[B]
Explanation :
The htpasswd command is used for adding Apache users to a server. The -c option is required once only. It creates the authentication file and adds the user to it. Do not use it while adding additional users, because it will overwrite the old configuration file!
Correct Answers :
[B]
Explanation :
The trust-anchor parameter is used for specific DNS domains that have been configured with DNSSEC but which cannot be verified all the way back to the root domain. The interface and access-control parameters must be changed because otherwise no connections will be accepted. It is highly recommended to configure a forward-zone also.
Correct Answers :
[A]
Explanation :
The domain-insecure parameter is used to specify the name of a domain that is not configured with DNSSEC security settings.
Correct Answers :
[A]
Explanation :
The command to use the DNSKEY to be used as the trust anchor in unbound.conf is dig +dnssec DNSKEY example.com.
Correct Answers :
[D]
Explanation :
The unbound-control dump_cache command dumps the current contents of the unbound cache to a file.
Correct Answers :
[C]
Explanation :
Explanation:
Dig shows the NXDOMAIN in the answer section when the requested DNS name cannot be found.
Correct Answers :
[A]
Explanation :
Read this command as “select all records from the user table where the name field contains the value johnson.”
Correct Answers :
[D]
Explanation :
To create something, you need to tell what you want to create, hence create user . You then need to specify where you want to create the user, hence lisa@localhost . Last, you need to set the password using identified by ‘password’; . In this last part, it is important to put the password between single quotes and to close the command with a semicolon.
Correct Answers :
[D]
Explanation :
A physical backup is just a backup of database files. It does not perform any queries on the database.
Correct Answers :
[D]
Explanation :
To make a backup, you need to authenticate as user root and have MariaDB prompt for a password. You then specify the name of the database you want to back up. You need --databases to make clear what it needs to back up and you need to redirect the output to a specific file.
Correct Answers :
[A]
Explanation :
To create a snapshot, you need to specify the options -s for snapshot and -L to specify the size. You also need a complete path reference to the original logical volume. Specifying a name for the snapshot is optional, but if you want to do it, you have to use -n followed by the name you want to use.
Correct Answers :
[C]
Explanation :
The showmount command uses RPC calls, and for these to be successful, ports 2049, 111, and 20048 need to be allowed through the firewall. It is a common mistake that these ports have not been enabled, which will cause showmount to fail. In that case, to test the availability of the export, it is easiest to just mount the export.
Correct Answers :
[D]
Explanation :
For anything on RHEL 7 where the most secure solution is needed, use SELinux. The nfs_export_all_rw Boolean will shut off all read/write access to NFS shares.
Correct Answers :
[C]
Explanation :
In NFS 4.2, the client respects SELinux settings on the server.
Correct Answers :
[B]
Explanation :
On earlier versions of RHEL, the netdev mount option needed to be used to mount remote file systems from /etc/fstab. In RHEL 7, this is no longer a requirement because of the event-driven nature of systemd. You need to make sure that the remote-fs.target is enabled on the client, though.
Correct Answers :
[D]
Explanation :
Any service that uses Kerberos for added security needs access to a keytab file. The name of this file by default is /etc/krb5.keytab, and it contains credentials for the local server and all Kerberized services that are running on that server. These credentials are required; without them, the service cannot get the mandatory Kerberos ticket.
|
|
||||||||||||||||||||||||||||