Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! RH133 Red Hat Linux System Administration is now Stable and With Pass Result

RH133 Practice Exam Questions and Answers

Red Hat Linux System Administration

Last Update 6 days ago
Total Questions : 336

RH133 is stable now with all latest exam questions are added 6 days ago. Just download our Full package and start your journey with RedHat Red Hat Linux System Administration certification. All these RedHat RH133 practice exam questions are real and verified by our Experts in the related industry fields.

RH133 PDF

RH133 PDF (Printable)
$48
$119.99

RH133 Testing Engine

RH133 PDF (Printable)
$56
$139.99

RH133 PDF + Testing Engine

RH133 PDF (Printable)
$70.8
$176.99
Question # 1

You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3G

B.  

Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

lvsize

B.  

resize2fs

C.  

reduce2fs

D.  

lvreduce

Discussion 0
Question # 2

Which of the following commands are used to remove a package from a Linux system?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

yum -rm packagename

B.  

yum erase packagename

C.  

yum -r packagename

D.  

yum remove packagename

Discussion 0
Question # 3

Which of the following files contains the names and locations of system log files?

Options:

A.  

/usr/syslog.conf

B.  

/usr/lilo.conf

C.  

/etc/lilo.conf

D.  

/etc/syslog.conf

Discussion 0
Question # 4

You work as a Network Administrator for Secure Web Inc. The company has a Linux-based network. The network has a mixed set of client operating systems. You want to format a new hard disk drive. The drive will have only one partition. Both the Linux and Windows operating systems will access the partition. Which of the following file systems will you use?

Options:

A.  

VFAT

B.  

XFS

C.  

REISER

D.  

EXT3

Discussion 0
Question # 5

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?

Options:

A.  

chgrp bar foo

B.  

chgroup foo bar

C.  

chgrp foo bar

D.  

chgroup bar foo

Discussion 0
Question # 6

Which of the following statements is true about Linux kernel?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It constitutes the core part of the Linux operating system.

B.  

It detects hardware resources and boots up the system.

C.  

It allocates memory on behalf of running process.

D.  

It does not verify firewall rules

Discussion 0
Question # 7

Fill in the blank with the appropriate command.

The ________ command recursively removes files, which have not been accessed for a period of time.

Options:

A.  

tmpwatch

Discussion 0
Question # 8

Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?

Options:

A.  

ip link show [interface name]

B.  

ifconfig

C.  

ip -s link show [interface name]

D.  

ping

Discussion 0
Question # 9

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are configuring a UPS for a Linux server. You want to configure the computer as follows:

. The server should automatically shut down after ten minutes of power failure.

. The server should inform the administrator that the shut down process has started.

Which of the following files will help you to configure these settings?

Options:

A.  

/etc/inittab

B.  

/etc/mtab

C.  

/etc/fstab

D.  

/etc/syslog.conf

Discussion 0
Question # 10

You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?

Options:

A.  

mkfs

B.  

mount

C.  

scanfs

D.  

fsck

Discussion 0
Question # 11

During the boot process of a Linux computer, which of the following daemons is called after the kernel is loaded?

Options:

A.  

LPD

B.  

TELNETD

C.  

INIT

D.  

RLOGIND

Discussion 0
Question # 12

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quot

A.  

Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

quotaon

B.  

warnquota

C.  

edquota

D.  

quotaoff

E.  

repquota

Discussion 0
Question # 13

You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.

You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know that some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?

Options:

A.  

A high load average

B.  

A high process ID

C.  

A low load average

D.  

A low CPU time

E.  

A high CPU time

Discussion 0
Question # 14

You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?

Options:

A.  

rpm -ivh

B.  

rpm -Uvh

C.  

rpm -evh

D.  

rpm -qvh

Discussion 0
Question # 15

Which of the following files contains the names and locations of system log files?

Options:

A.  

/etc/lilo.conf

B.  

/usr/syslog.conf

C.  

/etc/syslog.conf

D.  

/usr/lilo.conf

Discussion 0
Question # 16

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?

Options:

A.  

e2fsck

B.  

mount

C.  

fsck

D.  

mkfs

Discussion 0
Question # 17

After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?

Options:

A.  

/usr/shadow

B.  

/etc/passwd

C.  

/usr/passwd

D.  

/etc/shadow

Discussion 0
Question # 18

You want to format a floppy disk in a Linux server. Which of the following commands will you use?

Options:

A.  

fsck /dev/fd0

B.  

fdisk /dev/fd0

C.  

mkfs /dev/fd0

D.  

mount /dev/fd0

Discussion 0
Question # 19

Which of the following files should be edited to modify kernel module configuration settings?

Options:

A.  

/etc/module.conf

B.  

/etc/modprobe.conf

C.  

/etc/inttab

D.  

/etc/xinted.cong

Discussion 0
Question # 20

Which of the following is the installer for RHEL?

Options:

A.  

GRUB

B.  

MBR

C.  

anaconda

D.  

kernal

Discussion 0
Question # 21

Which of the following is the parent of all processes in Linux?

Options:

A.  

bash

B.  

/etc/init

C.  

init

D.  

grub

Discussion 0
Question # 22

Which of the following commands can be used to determine the system's current mode?

Options:

A.  

getenforce

B.  

semanage

C.  

getsebool

D.  

setenforce

Discussion 0
Question # 23

Which of the following commands is used to check /etc/fstab file in Linux?

Options:

A.  

sfdisk

B.  

fdisk

C.  

mount -a

D.  

fsck

Discussion 0
Question # 24

Which of the following programs is responsible for converting named.boot to named.conf format?

Options:

A.  

/usr/sbin/ncd

B.  

/etc/init.d/bind

C.  

/usr/sbin/named-bootconf

D.  

/usr/sbin/named

Discussion 0
Question # 25

In RHEL, Which of the following logical interfaces refers to the loopback interface?

Options:

A.  

eth0

B.  

ppp0

C.  

l0

D.  

lo

Discussion 0
Question # 26

Which of the following options is used with yum to list various information about available packages?

Options:

A.  

list

B.  

update

C.  

deplist

D.  

info

Discussion 0
Question # 27

Which of the following files can be used to identify installed PCI devices?

Options:

A.  

//proc/ioports

B.  

/proc/pci

C.  

/proc/devices

D.  

/proc

Discussion 0
Question # 28

Which of the following commands is used to create, change, delete, or display the partitions on a hard disk?

Options:

A.  

fdisk

B.  

fsck

C.  

mount

D.  

mkfs

Discussion 0
Question # 29

Which of the following directories can be installed on a separate filesystem in Linux?

Options:

A.  

/sbin

B.  

/var

C.  

/etc

D.  

/lib

Discussion 0
Question # 30

Which of the following commands can be used to extend the logical volumes?

Options:

A.  

lvxtend

B.  

lvcreate

C.  

lvextend

D.  

resizee2fs

Discussion 0
Question # 31

Which of the following Linux commands can be used to set an expiration date for a user's password?

Options:

A.  

chown

B.  

chage

C.  

chgrp

D.  

chmod

Discussion 0
Question # 32

Which of the following commands is used to start or stop a standalone service immediately?

Options:

A.  

chkconfig

B.  

service

C.  

ntsysv

D.  

pstree

Discussion 0
Question # 33

Which of the following files contain messages and errors from security-related system?

Options:

A.  

/var/log/messages

B.  

/var/log/secure

C.  

/var/log/mail

D.  

/var/log/message

Discussion 0
Question # 34

Which of the following command is used to list the current routing table in Linux?

Options:

A.  

ifconfig

B.  

traceroute

C.  

dig

D.  

/sbin/ip route

Discussion 0
Question # 35

You work as a Network Administrator for Perfect World Inc. The company has a Linux-based network. You have configured a Linux server to connect to the Internet. Before connecting it to the Internet, you want to check all the files on which SUID has been set. Which of the following commands will you choose to list all such programs?

Options:

A.  

find /-perm -2000

B.  

ls -l

C.  

find /-perm -4000

D.  

ls -suid

Discussion 0
Question # 36

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. John wants to remove some installed kernel modules. Which of the following commands will John use to accomplish his task?

Question # 36

Options:

Discussion 0
Question # 37

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You have created a folder named Report. You have made David the owner of the folder.

The members of a group named JAdmin can access the folder and have Read, Write, and Execute permissions. No other user can access the folder. You want to ensure that the members of the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder.

Which of the following commands will you use to accomplish the task?

Options:

A.  

chmod 777 report

B.  

chmod 754 report

C.  

chmod 555 report

D.  

chown david.jadmin report

Discussion 0
Question # 38

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the quota setting of the user named Mari

A.  

Which of the following commands will he use to accomplish the task?

Options:

A.  

edquota -u

B.  

edquota -g

C.  

edquota -p

D.  

edquota –T

Discussion 0
Question # 39

By which of the following commands a device can be partition in Linux?

Options:

A.  

fdisk

B.  

fsck

C.  

mke2fs

D.  

mkfs

Discussion 0
Question # 40

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. The company is using the host-based access control to avoid unwanted access of the malicious users. John wants to add a new user, which can use X applications from the remote computer. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

John will run the xhost command.

B.  

John will execute the startx command.

C.  

John will add a new user in the file /etc/Xn.hosts.

D.  

John will add a new user in the file /etc/Xadd.hosts.

Discussion 0
Question # 41

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are required to boot a server in single-user mode. Which of the following runlevels will you choose to accomplish the task?

Options:

A.  

0

B.  

5

C.  

1

D.  

3

E.  

2

Discussion 0
Question # 42

Which of the following commands can be used to get the status of the modules currently loaded in the kernel? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

netstat

B.  

cat /proc/modules

C.  

lsmod

D.  

find

Discussion 0
Question # 43

Drag and drop the appropriate command in front of its respective function.

Question # 43

Options:

Discussion 0
Question # 44

Which of the following files contains configuration data for automount?

Options:

A.  

automount

B.  

automaster

C.  

auto.mount

D.  

auto.master

Discussion 0
Question # 45

Which of the following directories CANNOT be installed on separate filesystems in Linux?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

/etc

B.  

/bin

C.  

/var

D.  

/lib

Discussion 0
Question # 46

Which of the following files contains the processes that start up automatically during the booting of a Linux server?

Options:

A.  

/etc/inittab

B.  

/etc/lilo.conf

C.  

/usr/inittab

D.  

/etc/syslog.conf

Discussion 0
Question # 47

You work as a Network Administrator for McNeil Inc. You are configuring a hard disk drive of a Linux server.

Which of the following steps can prevent the server from failure due to a log file or user quota overrun?

Options:

A.  

Using the same file system for /bin and /usr.

B.  

Using separate file systems for /home and /var.

C.  

Using separate file systems for /bin and /usr.

D.  

Using the same file system for /home and /var.

Discussion 0
Question # 48

Which of the following commands configures a new printer or changes the configuration of the existing printer?

Options:

A.  

lpr

B.  

lprm

C.  

lpstat

D.  

lpadmin

Discussion 0
Question # 49

Which of the following commands is used to verify the installed zip rpm against the RPM database?

Options:

A.  

rpm -Vp zip-2.3-8.i386.rpm

B.  

rpm -Va

C.  

rpm -V zip

D.  

rpm -qa gpg-pubkey

Discussion 0
Question # 50

Which of the following commands is used to check the disk quota for each filesystem and to mail a warning message to a user who has reached his/her softlimit?

Options:

A.  

repquota

B.  

edquota

C.  

quotacheck

D.  

warnquota

Discussion 0
Get RH133 dumps and pass your exam in 24 hours!

Free Exams Sample Questions