Top 48 Red Hat Certified Engineer (RHCE) Interview Questions You Must Prepare 19.May.2024

Gzip is a compression utility created by the GNU project.

You can use tail command with -f option. Following command will do the assigned task

#tail -f /var/log/messages

Ifconfig command can be used to assign IP address. Following command will do the given task. Ifconfig eth0 net mask

/var/log/wtmp log file keeps track of all user logins and logouts.

The first ATA/IDE hard drive is hda, so the command would be

# fdisk /dev/hda

/etc partition stores system configuration files in Linux.

The insmod command is used to load a module into the kernel.

The X Consortium at controls the official release and updating of the X Window System.

To accomplish this task set up cron to run a script that will check the disk space daily at 7:00 p.m. The output will be e-mailed to the root account. You can compare the results from day to day to analyze disk space usage.

Your cron file should look similar to the following:

* 19 * * * df -kl.

Linux provides text base installation as the alternative method of GUI installation.

You can use killall httpd command to kill all httpd process. httpd process run web server.

Following command will do this task. Ifconfig eth1 net mask broadcast

Use ps -ef command to list all running process.

#ps -ef

Killing a core process can potentially crash your system because many critical services rely on these core processes.

You can use #ps -au command to list all the process owned by user. Following command will do the assigned task

#ps -au summit

The standard command used to uncompress gzip files in gunzip.

First you need to determine the PID of send mail so it can be killed.

#ps -ef |grep send mail

Now you can use kill command to terminate the process associated with send mail.

You should follow these common steps:

  • Use RPM tools should be used to query or verify the installed packages to.
  • Confirm the installation of any previous packages.
  • Check the signature of new package.
  • RPM should be installed or upgraded by first using the test mode to verify that it works, and then it should be installed.
  • At the end query the RPM and verify the installation of RPM.

The most common command used to remove an RPM package is rpm -evh. Following command will remove the given package

#rpm -evh demofilename2.2-2.i386.rpm

Any failed login attempts for root are logged into the /var/log/messages file. It indicate that some has tried to login as root.

To enable already configured interface use Ifconfig [interface] up command. For example to up eth0 interface use following command.

#Ifconfig eth0 up

  • Include at least eight total characters.
  • Use the string in an unrepeated way.
  • Avoid use words that can be found in the dictionary..
  • Avoid use dates of significance, such as a birthday or anniversary.

The [esc] key is used to exit from the edit mode of VI editor.

You could use mkfs command to format partition with file system.

The Linux swap file is used for virtual memory to store additional information that cannot fit into current memory. This swap file allows information to be cached on disk, and can be retrieved very quickly. Heavy use of the swap file indicates a low memory condition.

Kernel panic error can cause a Linux system to crash. A kernel panic indicates that a kernel process has crashed. This is a very serious error that causes the entire Linux system to crash. These core dumps should be analyzed carefully to find the root cause of the problem.

PPP is most often used to create serial point-to-point connections.

In fdisk utility, the "p" command will print the partition table.

The most common command used to install an RPM package is rpm -ivh. Following command will install the given package

#rpm -ivh demo filename 2.2-2.i386.rpm

If administrators have no intention of keeping these files for debugging purposes, they should be deleted because they are wasting valuable disk space, and may cause system to run out of space.

Swap on command is used to activate a already created swap partition. It cannot be used to create a new swap partition.

The init process is the first process to be run. It is the parent process of all other Linux system processes, services, and daemons that are needed to run the system.

Kerberos is used for secure network logon.

The most common command used to update an RPM package is rpm -Uvh. Following command will update the given package and remove the old.

#rpm -Uvh demofilename2.2-2.i386.rpm

Tar is an archive utility that is used to create tape backups.

The automatically mounted file systems are listed in the file /etc/fstab.

MD5 is an encryption method that encrypts the password before saving.

A better method of password security is to create difficult-to-break passwords that are easy for the users to remember.

The command line switch for installing an RPM is -i.

To decompress use following command

#tar -zxvf demo.tar.gz

Use cp command to create the backup.

#cp /etc/fstab /backup

The process should be immediately killed before it consumes so many resources that the server cannot run properly and therefore crash.

Your first step is to identify the process, use ps command

#ps -au sanjay

Now run top command to compare the process running, and verify which one is using the most resources. After you have identified the problem process, you can use the kill command to terminate it. Because the user was unable to stop the process, you should probably force a kill signal to make sure that the process stops:

#kills -9 [PID of process]

Now, to verify that it has stopped, run the ps command again on the user:

ps -au sanjay