sessionIcon

We're open through the holidays to support your upskilling goals — book your session today!

sessionIcon

We're open through the holidays to support your upskilling goals — book your session today!

koenig-logo

Red Hat System Administration II (RH134) – RHEL 9 Quiz Questions and Answers

Answer :
  • df -T

Explanation :

The df -h command shows mounted devices and the amount of disk space currently in use on these devices. The -T option helps in recognizing real file systems (as opposed to kernel interfaces) because it shows the file system type as well.
Answer :
  • To provide centralized file storage and sharing over a network.

Explanation :

Network-Attached Storage (NAS) with NFS in a Red Hat Enterprise Linux environment is used to provide centralized file storage and sharing, allowing multiple clients to access the files over a network.
Answer :
  • It executes container processes in isolated environments

Explanation :

The container runtime is responsible for executing and managing the container processes, ensuring that applications run in isolated environments using shared system resources effectively.
Answer :
  • To prevent unauthorized processes from accessing sensitive ports

Explanation :

Correct labeling with SELinux types helps to prevent unauthorized processes from accessing or communicating through sensitive or critical ports, thus safeguarding the server environment.
Answer :
  • podman run -d -p 8080:80 httpd

Explanation :

The 'podman run -d -p 8080:80 httpd' command runs a container in detached mode with port 8080 on the host mapped to port 80 in the container where the HTTP server listens.
Answer :
  • Containers share the host operating system

Explanation :

Containers share the host operating system's kernel, which reduces overhead and allows for faster deployment and scaling compared to fully virtualized environments.
Answer :
  • Reviewing and adjusting port labeling rules

Explanation :

Reviewing and adjusting port labeling rules is a logical initial step to address frequent port rejections by ensuring labels are correctly and suitably applied.
Answer :
  • To block and allow network traffic based on rules

Explanation :

A server firewall is used to control ingress and egress network traffic by setting up rules that decide whether data packets should be blocked or allowed.
Answer :
  • `-p`

Explanation :

The `-p` option ensures that all permission and ownership details are preserved in the archive, particularly when restoring on a different system.---
Answer :
  • To enable or disable specific security policies dynamically.

Explanation :

SELinux Booleans allow administrators to enable or disable specific aspects of the SELinux policy without modifying or recompiling the entire policy.