getcertified4sure.com

Replace RH302 free practice test Guide




Act now and download your Red Hat RH302 test today! Do not waste time for the worthless Red Hat RH302 tutorials. Download Renew Red Hat Red Hat Certified Engineer on Redhat Enterprise Linux 5 (Labs) exam with real questions and answers and begin to learn Red Hat RH302 with a classic professional.

2021 Apr RH302 practice test

Q121. CORRECT TEXT

Your System is configured in 192.168.0.0/24 Network and your Domain nameserver is 192.168.0.254. Make successfully resolve to server1.example.com.

Answer and Explanation:

Very Easy question, nameserver is specified in question,

1. vi /etc/resolv.conf

nameserver 192.168.0.254

2. host server1.example.com


Q122. CORRECT TEXT

Make sure on /data that only the owner user can remove files/directories.

Answer and Explanation:

By default user1 can remove user2's files due to directory permission to group member. We can prevent of deleting files from others users using Sticky Bits.chmod o+t /dataVerify /data: ls –ld /data

You will get: drwxrwx-T


Q123. CORRECT TEXT

There are two different networks 192.168.0.0/24 and 192.168.1.0/24. Where 192.168.0.254 and 192.168.1.254 IP Address are assigned on Server. Verify your network settings by pinging 192.168.1.0/24 Network's Host.

Answer and Explanation:

1. vi /etc/sysconfing/network

NETWORKING=yes

HOSTNAME=station?.example.com

GATEWAY=192.168.0.254

2. service network restart

Or

1. vi /etc/sysconfig/network-scripts/ifcfg-eth0

DEVICE=eth0

ONBOOT=yes

BOOTPROTO=static

IPADDR=X.X.X.X

NETMASK=X.X.X.X

GATEWAY=192.168.0.254

2. ifdown eth0

3. ifup eth0


Q124. CORRECT TEXT

Give Full Permission to owner user and owner group member but no permission to others on /data.

Answer and Explanation:

We can change the permission of file/directory either character symbol method or numeric method.

Permission:

r-Read

w-Write

x-Execute

Permission Category

u- Owner User

g- Owner Group

o- Others

Operators

+ à Add the Permissions

- à Remove the Permissions

= à Assigns the Permissions

Numeric Method:

4àRead

2à Write

1àExecute

Total: 7, total for owner user, owner group member and for others : 777

1. chmod u+rwx /data

2. chmod g+rwx /data

3. chmod o-rwx /data

or

chmod 770 /data

4. Verify the /data : ls -ld /data

5. You will get drwxrwx---


Q125. CORRECT TEXT

The System you are using is for NFS (Network File Services). Some important data are shared from your system. Make automatically start the nfs and portmap services at boot time.

Answer and Explanation:

We can control the services for current session and for next reboot time. For current Session, we use service servicename start or restart or stop or status. For automatically at next reboot time:

3. chkconfig servicename on or off

eg: chkconfig nfs on

chkconfig portmap on

or

ntsysv

Select the nfs and portmap services.

4. Reboot the system and identify whether services are running or not.


Rebirth RH302 practice test:

Q126. CORRECT TEXT

Add a user named user4 and make primarily belongs to training group. As well account should expire on 30 days from today.

Answer and Explanation:

useradd usernamepasswd usernameusermod -e "date"

example: usermod -e "12 Feb 2006" user4

Verify: chage -l user4


Q127. CORRECT TEXT

Successfully resolv to server1.example.com where your DNS server is 172.24.254.254

Answer and Explanation:

1. vi /etc/resolv.conf

nameserver 172.24.254.254

2. host server1.example.com

On every clients, DNS server is specified in /etc/resolv.conf. When you request by name it tries to resolve from DNS server.


Q128. CORRECT TEXT

You have a domain in your LAN named example.com and cracker.org. Allow the

- Allow the FTP connection only from local domain.

- Deny the FTP connection from cracker.org

Answer and Explanation:

1. vi /etc/hosts.deny

vsftpd:ALL EXCEPT .example.com

or

1. vi /etc/hosts.deny

vsftpd:ALL

2. vi /etc/hosts.allow

vsftpd:.example.com

We can secure the services using tcp_wrappers. There are main two files, /etc/hosts.allow and /etc/hosts.deny.

There will be three stage access checking

- Is access explicitly permitted? Means permitted from /etc/hosts.allow?

- Otherwise, Is access explicitly denied? Means denied from /etc/hosts.deny?

- Otherwise, by default permit access if neither condition matched.

To deny the services we can configure /etc/hosts.deny file using ALL and EXCEPT operation.

Pattern of /etc/hosts.allow and /etc/hosts.deny file is:

Demon_list:client_list:options

In Client list can be either domain name or IP address.


Q129. CORRECT TEXT

Create a RAID Device /dev/md0 by creating equal two disks from available free space on your harddisk and mount it on /data.

Answer and Explanation:

Redhat Enterprise Linux 5 Supports the RAID LEVEL 0, RAID LEVEL 1, RAID LEVEL 5 and RAID LEVEL 6 at installation time. You can create it at installation time later no need to type lots of commands for RAID.

At Installation Time:

ii. Create the partitions using diskdruid.

iii. Create the Partitions having File system Type Software RAID.

iv. Click on RAID button

v. Type the Mount Point

vi. Select File system type

vii. Select RAID Level

viii. Select Partitions/disks as a member of RAID.

viii. Click on ok

After Installation: We can create the RAID Device after Installation on command-line.

11. Create the Two partitions having equal size. (Specify the Size using Cylinder, find the

remaining cylinder and divide by 2).

12. Change the Partition ID to fd (Linux raid Autodetect) by typing t.

13. Type w à To write on partitions table.

14. Use partprobe command to synchronic the partition table.

15. Use: mdadm --create /dev/md0 --level=1 --raid-devices=2 /dev/hda? /dev/hda?

16. Verify the RAID: mdadm --detail /dev/md0

17. mkfs -t ext3 /dev/md0

18. mount /dev/md0 /data

19. vi /etc/fstab

/dev/md0 /data ext3 defaults 0 0

20. Verify mounting devices using mount command.


Q130. CORRECT TEXT

ssh service is enabled in your Server. Configure to

- Deny the ssh from cracker.org domain.

- Allow the ssh service only from example.com domain.

Answer and Explanation:

1. vi /etc/hosts.deny

sshd:ALL EXCEPT .example.com

or

1. vi /etc/hosts.deny

sshd:ALL

2. vi /etc/hosts.allow

sshd:.example.com

We can secure the services using tcp_wrappers. There are main two files, /etc/hosts.allow and /etc/hosts.deny.

There will be three stage access checking

- Is access explicitly permitted? Means permitted from /etc/hosts.allow?

- Otherwise, Is access explicitly denied? Means denied from /etc/hosts.deny?

- Otherwise, by default permit access if neither condition matched.

To deny the services we can configure /etc/hosts.deny file using ALL and EXCEPT operation.

Pattern of /etc/hosts.allow and /etc/hosts.deny file is:

Demon_list:client_list:options

In Client list can be either domain name or IP address.