Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Red Hat Linux System Administration Question and Answers

Red Hat Linux System Administration

Last Update Nov 30, 2025
Total Questions : 336

We are offering FREE RH133 RedHat exam questions. All you do is to just go and sign up. Give your details, prepare RH133 free exam questions and then go for complete pool of Red Hat Linux System Administration test questions that will help you more.

RH133 pdf

RH133 PDF

$36.75  $104.99
RH133 Engine

RH133 Testing Engine

$43.75  $124.99
RH133 PDF + Engine

RH133 PDF + Testing Engine

$57.75  $164.99
Questions 1

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?

Options:

A.  

init 3

B.  

init 6

C.  

init 0

D.  

reboot -i

E.  

shutdown -r now

Discussion 0
Questions 2

Which of the following commands will you run to list all files that have been modified within the last 60 minutes?

Options:

A.  

find /etc -name *.txt

B.  

find start -dir -min -60

C.  

find start -dir -cmin -60

D.  

find start -cmin -60

Discussion 0
Questions 3

After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?

Options:

A.  

/usr/shadow

B.  

/etc/passwd

C.  

/usr/passwd

D.  

/etc/shadow

Discussion 0
Questions 4

Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

Options:

A.  

fsck -P

B.  

fsck -f

C.  

fsck -A

D.  

fsck -y

Discussion 0
Questions 5

Which of the following files contains the names and locations of system log files?

Options:

A.  

/usr/syslog.conf

B.  

/usr/lilo.conf

C.  

/etc/lilo.conf

D.  

/etc/syslog.conf

Discussion 0
Questions 6

You want to temporarily change your primary group to another group of which you are a member.

In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?

Options:

A.  

chgrp

B.  

newgrp

C.  

chmod

D.  

chown

Discussion 0
Questions 7

Which of the following commands is used to list all contents of a superblock of a partition?

Options:

A.  

tune2fs -c

B.  

tune2fs -f

C.  

tune2fs -l

D.  

tune2fs -j

Discussion 0
Questions 8

Which of the following files contains users' names and UIDs?

Options:

A.  

/etc/group

B.  

/etc/passwd

C.  

/etc/user

D.  

/etc/shadow

Discussion 0
Questions 9

While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.

Options:

A.  

swap

B.  

ext3

C.  

nfs

D.  

befs

E.  

ntfs

Discussion 0
Questions 10

Which of the following commands is used to compress a tar file?

Options:

A.  

tar

B.  

gzip

C.  

compress

D.  

dump

Discussion 0
Questions 11

Which of the following commands is used to create physical volumes in Linux?

Options:

A.  

lvextend

B.  

vgcreate

C.  

pvcreate

D.  

fdisk

Discussion 0
Questions 12

Which of the following file should be edited, if MBR on /dev/hda is corrupted?

Options:

A.  

/boot/grub/grub.conf

B.  

/etc/grub/grub.conf

C.  

/etc/grub.conf

D.  

/sbin/grub-install/dev/hda

Discussion 0
Questions 13

Which of the following commands is used to check /etc/fstab file in Linux?

Options:

A.  

sfdisk

B.  

fdisk

C.  

mount -a

D.  

fsck

Discussion 0
Questions 14

Which of the following options is used with yum to list various information about available packages?

Options:

A.  

list

B.  

update

C.  

deplist

D.  

info

Discussion 0
Questions 15

Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?

Options:

A.  

crond

B.  

apmd

C.  

autofs

D.  

halt

Discussion 0
Questions 16

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You want to run the yum command entirely from the cache and not let it download or update any headers unless absolutely necessary. Which of the following yum command parameters will you use to accomplish the task?

Options:

A.  

-y

B.  

-R

C.  

-c

D.  

-C

Discussion 0
Questions 17

You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?

Options:

A.  

history !!

B.  

history ##

C.  

history !#

D.  

history !1

Discussion 0
Questions 18

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are configuring a UPS for a Linux server. You want to configure the computer as follows:

The server should automatically shut down after ten minutes of power failure.

The server should inform the administrator that the shut down process has started.

Which of the following files will help you to configure these settings?

Options:

A.  

/etc/syslog.conf

B.  

/etc/inittab

C.  

/etc/mtab

D.  

/etc/fstab

Discussion 0
Questions 19

In Linux, which of the following files contains group information?

Options:

A.  

/etc/gp

B.  

/etc/group

C.  

/etc/login.defs

D.  

/etc/passwd

Discussion 0
Questions 20

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring a new computer that will work as a file server. You have decided to use ten hard disk drives in a RAID-5 array. Each hard disk has 40GB capacity. How much space will be available for file storage?

Options:

A.  

400GB

B.  

300GB

C.  

200GB

D.  

360GB

Discussion 0
Questions 21

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.  

Read permission to the owner.

B.  

Read and Execute permissions to the group.

C.  

Read, Write, and Execute permissions to the owner and the group.

D.  

Read and Execute permissions to the owner.

E.  

Read permission to the group.

F.  

No permission to others.

Discussion 0
Questions 22

You work as a Network Administrator for Rick International. The company has a Linux-based network. You have to remove a package named TEST from a Linux server. Which of the following commands will you use to accomplish the task?

Options:

A.  

rpm -e TEST

B.  

rpm -ql TEST

C.  

rpm -qi TEST

D.  

rpm -i TEST

Discussion 0
Questions 23

Which of the following commands can be used to power off a Linux computer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

init 6

B.  

init 0

C.  

shutdown

D.  

halt

Discussion 0
Questions 24

You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.

You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know that some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?

Options:

A.  

A high load average

B.  

A high process ID

C.  

A low load average

D.  

A low CPU time

E.  

A high CPU time

Discussion 0
Questions 25

You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?

Options:

A.  

rpm --erase --allmatches

B.  

rpm -e --allmatches

C.  

rpm -e --noscript

D.  

rpm -e --nodeps

Discussion 0
Questions 26

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

smbmount

B.  

smbfsmount

C.  

mount smb

D.  

mount -t smbfs

Discussion 0
Questions 27

Which of the following statements are true about kernel modules?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Kernel modules do not support executable loaders.

B.  

The kernel module contains extra kernel codes that may be loaded after the loading of the base kernel.

Only a minimal resident kernel is loaded into memory at boot time.

C.  

Kernel modules do not support the device drivers, network drivers, and file system drivers.

D.  

Whenever a user requests a feature that is not present in the resident kernel, a kernel module is dynamically loaded into memory.

Discussion 0
Questions 28

You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?

Options:

A.  

2

B.  

0

C.  

1

D.  

3

Discussion 0
Questions 29

You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?

Options:

A.  

n

B.  

w

C.  

1

D.  

p

Discussion 0
Questions 30

You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?

Options:

A.  

rpm -ivh

B.  

rpm -Uvh

C.  

rpm -evh

D.  

rpm -qvh

Discussion 0
Questions 31

You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

lvsize

B.  

resize2fs

C.  

reduce2fs

D.  

lvreduce

Discussion 0
Questions 32

Which of the following is the userspace component to the Linux Auditing System, and is responsible for writing audit records to the disk?

Options:

A.  

klogd

B.  

syslogd

C.  

crontab

D.  

auditd

Discussion 0
Questions 33

Which of the following commands is used to create a new group in a Linux server?

Options:

A.  

MOUNT

B.  

ADDGROUP

C.  

USERADD

D.  

GROUPADD

Discussion 0
Questions 34

You want to find out what quota a user 'john' is using. Which of the following commands will you use to accomplish the task?

Options:

A.  

edquota -u john

B.  

quota -u john

C.  

edquota -g john

D.  

quota john

Discussion 0
Questions 35

Which of the following files is used to view the current status of RAID devices in Linux?

Options:

A.  

/proc/mdstat

B.  

/proc/stat

C.  

/proc/meminfo

D.  

/proc/mounts

Discussion 0
Questions 36

Which of the following shutdown command parameters is used to skip the fsck command process after rebooting the Linux operating system?

Options:

A.  

-k

B.  

-a

C.  

-f

D.  

-t

Discussion 0
Questions 37

Which of the following files contains GIDs?

Options:

A.  

/etc/passwd

B.  

/etc/shadow

C.  

/etc/usr

D.  

/etc/group

Discussion 0
Questions 38

Which of the following options is used with yum command to update a currently installed package?

Options:

A.  

-U

B.  

update

C.  

provides

D.  

-u

Discussion 0
Questions 39

What does LDAP stand for?

Options:

A.  

Light Directory Access Protocol

B.  

Local Directory Access Protocol

C.  

Lightweight Directory Access Protocol

D.  

Linkweight Directory Access Protocol

Discussion 0
Questions 40

Which of the following files defines which services to start?

Options:

A.  

/etc/inittab

B.  

/etc/rc.d/rc.sysinit

C.  

/etc/rc.d/rc

D.  

/etc/rc.d/init.d

Discussion 0
Questions 41

Which of the following files contain messages and errors from security-related system?

Options:

A.  

/var/log/messages

B.  

/var/log/secure

C.  

/var/log/mail

D.  

/var/log/message

Discussion 0
Questions 42

Which of the following commands is used to create a new group?

Options:

A.  

grpadd

B.  

groupadd

C.  

new group

D.  

chgrp

Discussion 0
Questions 43

When you are installing RHEL on a system how much swap space should be given in partition?

Options:

A.  

Half of the RAM

B.  

Equal to the RAM

C.  

One fourth of the RAM

D.  

Twice of RAM

Discussion 0
Questions 44

What is the PID for init?

Options:

A.  

3

B.  

0

C.  

2

D.  

1

Discussion 0
Questions 45

You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?

Options:

A.  

rpm -ivh

B.  

rpm -evh

C.  

rpm -qvh

D.  

rpm -Uvh

Discussion 0
Questions 46

Which of the following files must be edited to alter the run level?

Options:

A.  

/etc/profile

B.  

/etc/mtab

C.  

/etc/inittab

D.  

/etc/init

Discussion 0
Questions 47

Which of the following commands can you use to create an ext3 file system?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

mkfs.ext3

B.  

mke2fs

C.  

mke2fs -j

D.  

mkfs.ext2

Discussion 0
Questions 48

Which of the following commands is used to uninstall an RPM package from a Linux server?

Options:

A.  

rpm -e

B.  

rpm --uninstall

C.  

rpm -U

D.  

rpm -re

Discussion 0
Questions 49

Which of the following commands runs a Linux system in multi-user mode with networking?

Options:

A.  

init 2

B.  

init 3

C.  

init 6

D.  

init 5

Discussion 0
Questions 50

You work as a Network Administrator for Perfect World Inc. The company has a Linux-based network. You have configured a Linux server to connect to the Internet. Before connecting it to the Internet, you want to check all the files on which SUID has been set. Which of the following commands will you choose to list all such programs?

Options:

A.  

find /-perm -2000

B.  

ls -l

C.  

find /-perm -4000

D.  

ls -suid

Discussion 0