Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

RH202 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

RH202 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: RHCT (Redhat Certified Technician) RH202
  • Last Update: May 3, 2024
  • Questions and Answers: 140
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

RH202 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

RH202 Practice Exam Questions with Answers RHCT (Redhat Certified Technician) RH202 Certification

Question # 6

You are a System administrator. Using Log files very easy to monitor the system. Now there are 50 servers running as Mail, Web, Proxy, DNS services etc. You want to centralize the logs from all servers into on LOG Server. How will you configure the LOG Server to accept logs from remote host ?

Answer and Explanation:

By Default system accept the logs only generated from local host. To accept the Log from other host configure:

  • vi /etc/sysconfig/syslog

SYSLOGD_OPTIONS="-m 0 -r"

Where

-m 0 disables 'MARK' messages.

-r enables logging from remote machines

-x disables DNS lookups on messages recieved with -r

  • service syslog restart

Full Access
Question # 7

Quota is implemented on /data but not working properly. Find out the

Problem and implement the quota to user1 to have a soft limit 60 inodes

(files) and hard limit of 70 inodes (files).

Answer and Explanation:

Quotas are used to limit a user's or a group of users' ability to consume disk space. This prevents a small group of users from monopolizing disk capacity and potentially interfering with other users or the entire system. Disk quotas are commonly used by ISPs, by Web hosting companies, on FTP sites, and on corporate file servers to ensure continued availability of their systems.

Without quotas, one or more users can upload files on an FTP server to the point of filling a filesystem. Once the affected partition is full, other users are effectively denied upload access to the disk. This is also a reason to mount different filesystem directories on different partitions. For example, if you only had partitions for your root (/) directory and swap space, someone uploading to your computer could fill up all of the space in your root directory (/). Without at least a little free space in the root directory (/), your system could become unstable or even crash.

You have two ways to set quotas for users. You can limit users by inodes or by kilobyte-sized disk blocks. Every Linux file requires an inode. Therefore, you can limit users by the number of files or by absolute space. You can set up different quotas for different filesystems. For example, you can set different quotas for users on the /home and /tmp directories if they are mounted on their own partitions.

Limits on disk blocks restrict the amount of disk space available to a user on your system. Older versions of Red Hat Linux included LinuxConf, which included a graphical tool to configure quotas. As of this writing, Red Hat no longer has a graphical quota configuration tool. Today, you can configure quotas on RHEL only through the command line interface.

1. vi /etc/fstab

/dev/hda11/data ext3defaults,usrquota 1 2

2. Either Reboot the System or remount the partition.

Mount –o remount /dev/hda11 /data

3. touch /data/aquota.user

4. quotacheck –ufm /data

5. quotaon -u /data

6. edquota –u user1 /data

and Specified the Soft limit and hard limit on opened file.

To verify either quota is working or not:

Soft limit specify the limit to generate warnings to users and hard limit can’t cross by the user. Use the quota command or repquota command to monitor the quota information.

Full Access
Question # 8

Your System is going use as a router for 172.24.0.0/16 and 172.25.0.0/16. Enable the IP Forwarding.

  • uk.co.certification.simulator.questionpool.PList@2459ece0

net.ipv4.ip_forward=1

/proc is the virtual filesystem, containing the information about the running kernel. To change the parameter of running kernel you should modify on /proc. From Next reboot the system, kernel will take the value from /etc/sysctl.conf.

Full Access
Question # 9

Your system is giving error while booting on Runlevel 5 . Make successfully boot your system in runlevel 5.

Answer and Explanation: While you load the X Window System, you will get the problem. To troubleshoot follow the following steps:

1.Check the /tmp is full ?

2.Check your quota, hard limit is already crossed ?

3.Check xfs service is running ?

4.Configure the Video card, Resolution, monitor type using: system-config-display (Most Probably in Redhat exam)

5.Edit the /etc/inittab to set default runlevel 5.

id:5:initdefault:

Full Access
Question # 10

There are Mail servers, Web Servers, DNS Servers and Log Server. Log Server is already configured. You should configure the mail server, web server and dns server to send the logs to log server.

Answer and Explanation:

According to question, log server is already configured. We have to configure the mail, web and dns server for log redirection.

In mail, web and dns server:

1.vi /etc/syslog.conf

mail.*@logserveraddress

2.service syslog restart

mail is the facility and * means the priority. It sends logs of mail services into log server.

Full Access
Question # 11

Create the directory /data and group owner should be the sysadmin group.

Answer and Explanation:

1.chgrp sysadmin /data

2.Verify using ls -ld /data command. You should get like

drwxr-x--- 2 root sysadmin 4096 Mar 16 17:59 /data

chgrp command is used to change the group ownership of particular files or directory.

Another way you can use the chown command.

chown root:sysadmin /data

Full Access
Question # 12

Fill up the Form through http://server1.example.com/form.php

Answer and Explanation:

1.Open the Browser and type the above URL.

2.Fill the form as required all information.

Full Access
Question # 13

Install the Cron Schedule for david user to display “Hello” on daily 5:30.

Answer and Explanation:

  • Login as a root user
  • cat >schedule.txt

30 05 * * * /bin/echo “Hello”

3. crontab –u david schedule.txt

4. service crond restart

The cron system is essentially a smart alarm clock. When the alarm sounds, Linux runs the commands of your choice automatically. You can set the alarm clock to run at all sorts of regular time intervals. Alternatively, the at system allows you to run the command of your choice once, at a specified time in the future.

Red Hat configured the cron daemon, crond. By default, it checks a series of directories for jobs to run, every minute of every hour of every day. The crond checks the /var/spool/cron directory for jobs by user. It also checks for scheduled jobs for the computer under /etc/crontab and in the /etc/cron.d directory.

Here is the format of a line in crontab. Each of these columns is explained in more detail:

#minute, hour, day of month, month, day of week, command

*        *     *             *      *            command

Entries in a crontab Command Line

Field

Value

Minute

0-59

Hour

Based on a 24-hour clock; for example, 23 = 11 p.m.

Day of month

1-31

Month

1-12, or jan, feb, mar, etc.

Day of week

0-7; where 0 and 7 are both Sunday; or sun, mon, tue, etc.

Command

The command you want to run

Full Access
Question # 14

Make user1, user2 and user3 belongs to training group.

Answer and Explanation:

  • usermod -G training user1
  • usermod -G training user2
  • usermod -G training user3
  • Verify from : cat /etc/group

There are two types of group, I) primary group II) Secondary or supplementary group.

  • uk.co.certification.simulator.questionpool.PList@2459f1e0

Here user1, user2 and user3 belong as supplementary to training group. So these users get the permission of group member.

Full Access