Redhat Quiz Sa1 & Sa2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Roylnigam
R
Roylnigam
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,530
| Attempts: 1,530 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. Which command is used to change the password of user.?

Explanation

The correct answer is "passwd". The passwd command is used to change the password of a user in a Unix-like operating system. It allows the user to enter a new password and update their login credentials.

Submit
Please wait...
About This Quiz
Redhat Quiz Sa1 & Sa2 - Quiz

The REDHAT QUIZ SA1 & SA2 assesses knowledge on basic Linux system administration commands. It covers user management, directory content viewing, file creation, Apache server configuration, and filesystem... see moremounting. Ideal for learners aiming to understand or refresh fundamental Linux commands. see less

2. Which command is used for adding a new user.?

Explanation

The correct answer is "useradd". This command is used to add a new user in a Unix or Linux system. It creates a new user account with the specified username and assigns a unique user ID (UID) to the user. The useradd command also creates a home directory for the user and sets the default shell for the user's login.

Submit
3. What is the use of chmod command.?

Explanation

The chmod command is used to set permissions for files and directories in a Unix-like operating system. It allows the user to specify who can read, write, and execute a file or directory. By using chmod, the user can control access to their files and protect them from unauthorized access or modifications.

Submit
4. Which command is used to check the content of directory.?

Explanation

The correct answer is "ls". The "ls" command is used to list the content of a directory. It displays the names of files and directories within the specified directory. This command is commonly used in Unix-based operating systems to quickly view the contents of a directory.

Submit
5. MBR stands for .?

Explanation

The correct answer is Master Boot Record. MBR stands for Master Boot Record, which is a small section of a computer's hard drive that contains important information about the drive's partitions and booting process. It is located in the first sector of the hard drive and is responsible for loading the operating system. The MBR contains the partition table, boot loader, and other essential data that allows the computer to start up properly.

Submit
6. How to append data in to the file.?

Explanation

The correct answer is "cat>>file". This is the correct way to append data into a file using the cat command in Unix/Linux systems. The ">>" operator is used to redirect the output of the cat command and append it to the specified file.

Submit
7. What will happen if we run this command.?#touch file{1..10}

Explanation

Running the command "touch file{1..10}" will create 10 files. The command uses brace expansion to generate a sequence of file names from "file1" to "file10", and the "touch" command is used to create these files. Therefore, executing this command will result in the creation of 10 files with the specified names.

Submit
8. Which command is used for delete all credential of user.?

Explanation

The correct answer is "userdel -r user1". The "-r" option is used to remove the user's home directory and all its contents along with the user account. This command will delete all credentials and associated files of the user named "user1".

Submit
9. How can you create maximum Primary partition ?

Explanation

To create the maximum number of primary partitions, you need to understand the limitations of the partition table. The MBR (Master Boot Record) partitioning scheme allows for a maximum of four primary partitions. Therefore, the correct answer is 4, as it indicates that you can create a maximum of four primary partitions.

Submit
10. How to Lock the user.?

Explanation

The correct answer is "usermod -L user". This command is used to lock the user account in Linux. When the account is locked, the user will not be able to log in and access the system.

Submit
11. How to change the shell for user.?

Explanation

The correct answer is "usermod -s". This command is used to change the login shell for a user. The "-s" option followed by the desired shell path specifies the new shell for the user.

Submit
12. How to add these user in to the sysadmin group.?user1 , user2 , user3

Explanation

The correct answer is gpasswd -a user1 user2 user3. This command adds user1, user2, and user3 to the sysadmin group.

Submit
13.  A user can't remove the data of other user while he have full permission.? just because of

Explanation

The correct answer is stickey bit permission. The stickey bit permission is a special permission that can be set on a directory in Unix-like operating systems. When the stickey bit permission is set, it prevents users from deleting or renaming files in that directory, unless they are the owner of the file or the directory itself. This ensures that users cannot accidentally or maliciously remove the data of other users, even if they have full permission on the directory.

Submit
14. Which is the configuration file of apache server.?

Explanation

The correct answer is /etc/httpd/conf/httpd.conf. This file is the main configuration file for the Apache server. It contains all the settings and directives that control the behavior of the server. By editing this file, administrators can customize various aspects of the server, such as the port number, virtual hosts, and access control. It is typically located in the /etc/httpd/conf/ directory on Linux systems.

Submit
15. How to formate the swap partition.?

Explanation

The correct answer is "mkswap". This command is used to format a swap partition on a Linux system. It creates a swap area on a device or a file, which can then be activated as a swap space using the "swapon" command. The "mkswap" command initializes the swap space with a unique identifier and sets up the necessary data structures for the kernel to use it as swap memory.

Submit
16. Match the correct permission number .
Submit
17. For permanent mount /etc/ is the file.

Explanation

The given answer, "fstab," is the correct answer because it is the configuration file in Linux systems that contains information about the file systems and devices to be mounted at boot time. The "/etc/" in the question suggests that the file being referred to is located in the "/etc/" directory, which is where the fstab file is typically found. Therefore, the answer "fstab" is the most appropriate choice.

Submit
18. How to see parent Structure of Directory.?

Explanation

The correct answer is ls -R. The -R option in the ls command stands for "recursive", which means it will display the parent structure of the directory and all its subdirectories. It will list all the files and directories within the specified directory, as well as any files and directories within its subdirectories, in a hierarchical manner.

Submit
19. Which is the file consist group information.?

Explanation

The correct answer is /etc/gshadow. This file contains group information, specifically the encrypted passwords and other security-related information for groups on a Linux system. It is a secure version of the /etc/group file, which only contains basic group information. The gshadow file is typically only accessible by the root user to ensure the security of the group passwords.

Submit
20. How to add user1 in to the  sysadmin group.?

Explanation

The correct answer is "gpasswd -a user1 sysadmin". This command is used to add user1 to the sysadmin group. The "-a" option is used to add a user to a group, and "user1" is the username that is being added to the "sysadmin" group.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 28, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 28, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 03, 2016
    Quiz Created by
    Roylnigam
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which command is used to change the password of user.?
Which command is used for adding a new user.?
What is the use of chmod command.?
Which command is used to check the content of directory.?
MBR stands for .?
How to append data in to the file.?
What will happen if we run this command.?#touch file{1..10}
Which command is used for delete all credential of user.?
How can you create maximum Primary partition ?
How to Lock the user.?
How to change the shell for user.?
How to add these user in to the sysadmin group.?user1 , user2 , user3
 A user can't remove the data of other user while he have...
Which is the configuration file of apache server.?
How to formate the swap partition.?
Match the correct permission number .
For permanent mount /etc/ is the file.
How to see parent Structure of Directory.?
Which is the file consist group information.?
How to add user1 in to the  sysadmin group.?
Alert!

Advertisement