Red Hat RHCSA 8 - Pre-Assessment Questions
and Answers
System targets roughly correspond to runlevels used on earlier versions of RHEL. Which of the
following runlevels corresponds to rescue.target? Correct Ans-1
What does rsyslogd use to define the severity of the message that needs to be logged?
Correct Ans-Priority
Which of the following is the default location from where a program gets its input? Correct
Ans-STDIN
Which system log files is the generic log file where most messages are written to? Correct
Ans-/var/log/messages
After starting a rescue system, you usually need to enable full access to the on-disk installation.
Typically, the rescue disk detects your installation and mounts it on the /mnt/sysimage
directory. To fix access to the configuration files and their default locations as they should be
available on disk, you need to make the contents of this directory your actual working
environment. Which of the following commands will you use to accomplish the task? Correct
Ans-chroot /mnt/sysimage
Which of the following files is used to define the default settings for all users when starting a
login shell to construct the user environment? Correct Ans-/etc/profile
, Which of the following SELinux elements is typically a file or a port that a source domain is
trying to access? Correct Ans-Target Domain
Consider the following text of a document:Pomegranate Pineapple Papaya Pear Plum Suppose,
the cursor is currently blinking at the word "nate" of the "Pomegranate" text of the document.
Which of the following vim commands will you use so that the cursor goes to the first position
in the current line? Correct Ans-^
Which of the following user-extended attributes ensures that the file access time of the file is
not modified? Correct Ans-A
Which of the following commands verify the availability of ports on your server?Each correct
answer represents a complete solution. Choose all that apply. Correct Ans-ss netstat
A user has the read permission which is applied to a directory. Which of the following things the
user is allowed to do? Correct Ans-list the contents of the directory
Which of the following directories contains configuration files that are used by programs and
services on your server as well as this directory is essential during boot? Correct Ans-/etc
Which of the following is a valid command to add a second DNS server for the same
parameters? Correct Ans-nmcli con mod static +ipv4.dns 8.8.8.8
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.