Sunteți pe pagina 1din 17

NIM : 171110614

Nama : Steven
Kelas : MW-A Sore

Rangkuman Soal dan Jawaban Quiz RH Learn


Chapter 1
1. Which two of the following are benefits of open source software for the
user? (Choose two.)
a. Code can survive the loss of the original developer or distributor.
b. Code remains open as long as it is in a public repository but the license may
change when included with closed source software.
c. Sensitive portions of code are protected and only available to the original
developer.
d. You can learn from real-world code and develop more effective
applications.
2. Which two of the following are ways in which RedHat develops their
products for the future and interacts with the community? (Choose two.)
a. Participate in upstream projects.
b. Repackage and re-license community products.
c. Sponsor and integrate open source projects into the community-driven
Fedora project.
d. Develop specific integration tools only available in RedHat distributions.
3. Which two statements describe the benefits of Linux? (Choose two.)
a. Linux is locked in a known state for a minimum of one year for each release,
making it easier to develop custom software.
b. Linux is modular and can be configured as a full graphical desktop or a
small appliance.
c. Linux includes a powerful and scriptable command-line interface, enabling
easier automation and provisioning.
d. Linux is developed entirely by volunteers making it a low cost operating system.

Chapter 2
1. Which term describes the interpreter that executes commands typed as
strings?
a. Terminal
b. Console
c. Command
d. Shell
2. Which term describes the visual cue that indicates an interactive shell is
waiting for the user to type a command?
a. Option
b. Argument
c. Command
d. Prompt
3. Which term describes the name of a program to run?
a. Argument
b. Command
c. Option
d. Prompt
4. Which term describes the part of the command line that adjusts the
behavior of a command?
a. Prompt
b. Option
c. Argument
d. Command
5. Which term describes the part of the command line that specifies the target
that the command should operate on?
a. Argument
b. Prompt
c. Command
d. Option
6. Which term describes the hardware display and keyboard used to interact
with a system?
a. Physical Console
b. Virtual Console
c. Shell
d. Terminal
7. Which term describes one of multiple logical consoles that can each
support an independent login session?
a. Physical Console
b. Shell
c. Terminal
d. Virtual Console
8. Which term describes an interface that provides a display for output and a
keyboard for input to a shell session?
a. Terminal
b. Shell
c. Virtual Console
d. Console

1. Which Bash shortcut or command jumps to the beginning of the previous


word on the command line?
a. !number
b. Pressing Ctrl+LeftArrow
c. Pressing Ctrl+A
d. Pressing Ctrl+K
e. !string
2. Which Bash shortcut or command separates commands on the same line?
a. !string
b. history
c. ;
d. Pressing Esc+.
e. Pressing Tab
3. Which Bash shortcut or command is used to clear characters from the
cursor to the end of the command line?
a. Pressing Ctrl+K
b. Pressing Ctrl+LeftArrow
c. ;
d. Pressing Esc+.
e. Pressing Ctrl+A
4. Which Bash shortcut or command is used to re-execute a recent command
by matching the command name?
a. Pressing Tab
b. history
c. Pressing Esc+.
d. !number
e. !string
5. Which Bash shortcut or command is used to complete commands, file
names, and options?
a. !number
b. Pressing Esc+.
c. history
d. Pressing Tab
e. ;
6. Which Bash shortcut or command re-executes a specific command in the
history list?
a. !number
b. !string
c. Pressing Tab
d. history
e. Pressing Esc+.
7. Which Bash shortcut or command jumps to the beginning of the command
line?
a. !string
b. !number
c. Pressing Ctrl+LeftArrow
d. Pressing Ctrl+A
e. Pressing Ctrl+K
8. Which Bash shortcut or command displays the list of previous commands?
a. History
b. Pressing Tab
c. !string
d. Pressing Esc+.
e. !number
9. Which Bash shortcut or command copies the last argument of previous
commands?
a. Pressing Esc+
b. Pressing Ctrl+K
c. Pressing Ctrl+A
d. !number

Chapter 3
1. Which directory contains persistent, system-specific configuration data?
a. /run
b. /root
c. /etc
d. /usr
2. Which directory is the top of the system's file system hierarchy?
a. /
b. /etc
c. /root
d. /home/root
3. Which directory contains user home directories?
a. /
b. /user
c. /root
d. /home
4. Which directory contains temporary files?
a. /tmp
b. /run
c. /trash
d. /var
5. Which directory contains dynamic data, such as for databases and
websites?
a. /etc
b. /var
c. /usr
d. /run
6. Which directory is the administrative superuser's home directory?
a. /root
b. /home/root
c. /
d. /etc
7. Which directory contains regular commands and utilities?
a. /usr/sbin
a. /commands
b. /usr/bin
c. /run
8. Which directory contains non-persistent process runtime data?
a. /etc
b. /tmp
c. /var
d. /run
9. Which directory contains installed software programs and libraries?
a. /etc
b. /var
c. /usr
d. /lib

1. Which command is used to return to the current user's home directory,


assuming the current working directory is /tmp and their home directory is
/home/user?
a. cd /home
b. cd
c. cd..
d. cd *
e. cd .
2. Which command displays the absolute path name of the current location?
a. ls -d
b. pwd
c. ls ~
d. cd
3. Which command will always return you to the working directory used prior
to the current working directory?
a. cd -
b. cd ..
c. cd -p
d. cd ~
4. Which command will always change the working directory up two levels
from the current location?
a. cd ../
b. cd ~
c. cd ../..
d. cd -u2
5. Which command lists files in the current location, using a long format, and
including hidden files?
a. ls -al
b. llong ~
c. ls -l
d. ls -a
6. Which command will always change the working directory to /bin?
a. cd /bin
b. cd ~bin
c. cd -bin
d. cd bin
7. Which command will always change the working directory to the parent of
the current location?
a. cd ..
b. cd ~
c. cd ../..
d. cd -u1
8. Which command will change the working directory to /tmp if the current
working directory is /home/student?
a. cd ~tmp
b. cd tmp
c. cd ..
d. cd ../../tmp

1. Which pattern will match only filenames ending with "b"?


a. b*
b. [!b]
c. *b*
d. *b
2. Which pattern will match only filenames beginning with "b"?
a. *b
b. b*
c. *b*
d. [!b]*
3. Which pattern will match only filenames where the first character is not "b"?
a. [!b]*
b. *b*
c. *b
d. b*
4. Which pattern will match all filenames containing a "b"?
a. [!b]*
b. *b*
c. *b
d. b*
5. Which pattern will match only filenames that contain a number?
a. *[digit]*
b. *[[:digit:]]*
c. [0-9]
d. *#*
6. Which pattern will match only filenames that begin with an uppercase
letter?
a. ^?*
b. ^*
c. [[CAP]]*
d. [upper]*
e. [[:upper:]]*
7. Which pattern will match only filenames at least three characters in length?
a. ...*
b. \3*
c. ???
d. ???*
e. +++*

Chapter 5
1. Which answer displays output to a terminal and ignores all errors?
a. &>file
b. 1>/dev/null
c. 2>/dev/null
d. 2> &>file

2. Which answer sends output to a file and sends errors to a different file?
a. >file 2>file2
b. >file 1>file2
c. >file &2>file2
d. | tee file

3. Which answer sends both output and errors to a file, creating it or


overwriting its contents?
a. 2 &>file
b. | tee file
c. &>file
d. 1 &>file
4. Which answer sends output and errors to the same file ensuring existing file
content is preserved?
a. >>file 2>&1
b. &>file
c. >>file 1>&1
d. >file 2>file2

5. Which answer discards all messages normally sent to the terminal?


a. &>/dev/null 2>file
b. &>file
c. >file 2>file2
d. &>/dev/null

6. Which answer sends output to both the screen and a file at the same time?
a. >file 2>file2
b. | < file
c. &>/dev/null
d. | tee file

7. Which answer saves output to a file and discards error messages?


a. > file 2> /dev/null
b. | tee file 2> /dev/null
c. &>file
d. > file 1> /dev/null

Chapter 6
1. Which item represents a number that identifies the user at the most
fundamental level?
a. UID.
b. primary user
c. username
d. GID

2. Which item represents the program that provides the user's command-line
prompt?
a. primary shell
b. command name
c. home directory
d. login shell
3. Which item or file represents the location of the local group information?
a. /etc/group
b. /etc/passwd
c. home directory
d. /etc/GID

4. Which item or file represents the location of the user's personal files?
a. /etc/group
b. /etc/passwd
c. home directory
d. login shell

5. Which item represents a number that identifies the group at the most
fundamental level?
a. primary group
b. groupid
c. UID
d. GID

6. Which item or file represents the location of the local user account
information?
a. /etc/group
b. home directory
c. /etc/UID
d. /etc/passwd

7. What is the fourth field of the /etc/passwd file?


a. home directory
b. login shell
c. primary group
d. UID
Chapter 7

1. Which regular file is owned by operator1 and readable by all users?


a. lfile2
b. lfile1
c. rfile2
d. rfile1
2. Which file can be modified by the contractor1 user?
a. rfile2
b. lfile2
c. lfile1
d. rfile1

3. Which file cannot be read by the operator2 user?


a. lfile1
b. lfile2
c. rfile2
d. rfile1
4. Which file has a group ownership of consultant1?
a. lfile2
b. rfile1
c. rfile2
d. lfile1
5. Which files can be deleted by the operator1 user?
a. None of the above.
b. rfile2
c. All of the above.
d. rfile1
6. Which files can be deleted by the operator2 user?
a. None of the above.
b. All of the above.
c. lfile1
d. lfile2

Chapter 8
1. Which state represents a process that has been stopped or suspended?
a. T
b. R
c. Z
d. D
e. S
2. Which state represents a process that has released all of its resources
except its PID?
a. S
b. T
c. R
d. D
e. Z
3. Which process does a parent use to duplicate to create a new child
process?
a. reap
b. exec
c. syscall
d. fork
e. zombie
4. Which state represents a process that is sleeping until some condition is
met?
a. D
b. R
c. T
d. S
e. Z
Chapter 11
1. Which of these log files stores most syslog messages, with the exception of
those that are related to authentication, mail, scheduled jobs, and debugging?
a. /var/log/maillog
b. /var/log/messages
c. /var/log/secure
d. /var/log/boot.log

2. Which log file stores syslog messages related to security and authentication
operations in the system?
a. /var/log/boot.log.
b. /var/log/secure.
c. /var/log/messages.
d. /var/log/maillog

3. Which service sorts and organizes syslog messages into files in /var/log?
a. tuned.
b. rsyslog.
c. auditd.
d. systemd-journald

4. Which directory accommodates the human-readable syslog files?


a. /run/log/journal.
b. /var/log
c. /sys/kernel/debug.
d. /var/log/journal

5. Which file stores syslog messages related to the mail server?


a. /var/log/lastlog.
b. /var/log/boot.log.
c. /var/log/tallylog.
d. /var/log/maillog.

6. Which file stores syslog messages related to the scheduled jobs?


a. /var/log/secure.
b. /var/log/spooler.
c. /var/log/cron.
d. /var/log/tallylog

7. What file stores console messages related to system startup?


a. /var/log/secure.
b. /var/log/cron.
c. /var/log/messages.
d. /var/log/boot.log.

Chapter 12
1. Which number is the size, in bits, of an IPv4 address?
a. 128.
b. 4.
c. 64.
d. 16.
e. 32.
f. 8

2. Which term determines how many leading bits in the IP address contribute
to its network address?
a. netscope.
b. subnet.
c. netaddr.
d. network.
e. multicast.
f. Netmask.

3. Which address represents a valid IPv4 host IP address?


a. 192.168.1.255.
b. 192.168.1.188.
c. 192.168.1.256.
d. 192.168.1.0

4. Which number is the size, in bits, of an IPv6 address?


a. 16.
b. 128.
c. 4.
d. 8.
e. 64.
f. 32

5. Which address does not represent a valid IPv6 address?


a. 2001:db8::7::2.
b. 2001:3::7:0:2.
c. ff02::1:0:0.
d. 2000::1.
e. ::.
f. 2000:0000:0000:0000:0000:0000:0000:0001.
g. 2::1

6. Which term allows one system to send traffic to a special IP address that is
received by multiple systems?
h. network.
i. netmask.
j. netscope.
k. netaddr.
l. multicast.
m. subnet

Chapter 14
1. Which command is used to register a system without using a graphical
environment?
a. subscription-manager
a. rct
b. yum
c. rpm

2. Which GUI tool is used to register and subscribe a system?


a. RedHat Subscription Manager
d. gpk-application
e. PackageKit
f. gnome-software

3. Which task(s) can be performed with RedHat Subscription Management


tools?
a. Enable repositories.
b. Register a system.
c. All of the above.
d. Review and track entitlements.
e. Subscribe a system.
Chapter 15
1. What is the name of the device file of an entire SATA hard drive in the
/dev directory?
a. /dev/vda
b. /dev/sda1
c. /dev/sda
d. /dev/vg_install/lv_home

2. Choose the device file name of the third partition on the second SATA hard
drive.
a. /dev/vda2
b. /dev/sdb3
c. /dev/sda3
d. /dev/sdb2

3. What is the name of the device file for the entire second virtio-blk disk
attached to a virtual machine?
a. /dev/vdb
b. /dev/vda2
c. /dev/sda2
d. /dev/vdb2

4. Choose the correct name of the device file for the third partition on the
second virtio-blk disk attached to a virtual machine?
a. /dev/vda3
b. /dev/vdb3
c. /dev/sda3
d. /dev/vda3

5. Which command provides an overview of the file system mount points and
the amount of free space available in SI units?
a. df -h
b. df -H
c. df
d. du -h

Chapter 16
1. In what order do the following events occur when managing a RedHat
Enterprise Linux system using RedHat Insights?
1. RedHat Insights analyzes system metadata to determine which issues
and recommendations apply.
2. The Insights client uploads system metadata to the RedHat Insights
service.
3. The administrator views the recommended actions in the RedHat Insights
customer portal.
4. RedHat Insights collects system metadata on the RedHat Enterprise
Linux system.
a. 1, 2, 3, 4
b. 4, 1, 2, 3
c. 4, 2, 1, 3
d. 4, 2, 3, 1

2. Which command is used to register a client to RedHat Insights?


a. insights-client --register
b. insights-client --unregister
c. subscription-manager register
d. insights-client --no-upload

3. Which two pages in the RedHat Insights console allows you to display list of
rules, using filters based on the catgeory of risk? (Choose two.)
a. Overview
b. Rules z
c. Remediation
d. Inventory

S-ar putea să vă placă și