RedHat Academy Course (Industry Allied) RH124
RH124 Questionbank
2-Marks Questions
Unit I
1. Define RedHat OS.
2. What is open-source software? Give a key characteristic.
3. Explain the role of the command-line interface (CLI) in Linux.
4. Name two reasons why Linux skills are valuable for IT professionals.
5. What is a Linux distribution?
6. Give an example of an industry where Linux is commonly used.
Unit II
7. What is the purpose of the passwd command?
8. Explain why Red Hat recommends logging in as a normal user instead of root.
9. What is the difference between su and su -?
10.Name two files that contain user and group information.
11.What is the function of the useradd command?
12.List various Channels (File Descriptors) with it’s usage.
Unit III
13.Name the three permission categories in Linux file systems.
14.What command is used to change file permissions?
15.What does PID stand for, and what is its purpose?
16.Explain the purpose of the kill command.
17.Define Process.
18.What is systemd?
Unit IV
19.Why is security important when configuring SSH?
20.Give full form of TCP/IP and OSI.
RedHat Academy Course (Industry Allied) RH124
21.What type of information can be found in system logs?
22.Name a command used to configure network interfaces.
23.What is the purpose of a hostname?
24.What is the full form of SSH? And explain it.
Unit V
25.What is the role of DNF in Red Hat Enterprise Linux?
26.Explain the purpose of a package repository.
27.List the naming pattern of Block Device: SATA, SSDs.
28.What is a mount point?
29.Name two commands used to locate files.
30.What is the Red Hat Customer Portal used for?
3-Marks Questions
1. How to view the Contents of Files and counts lines, words, and characters in a file using
RHEL? Discuss with an appropriate example.
2. What is Linux? Mention any two features of Linux.
3. List and explain any two file management commands used in the bash shell.
4. Write the steps to create a new user and assign them to a group in Red Hat Enterprise
Linux.
5. Name any two text editors used in Linux and explain how to save a file using one of
them.
6. You are a system administrator in a company using Red Hat Enterprise Linux. You are
assigned the following tasks:
● Create a directory named backup in the /home/admin directory.
● Move all .log files from /var/logs to the backup directory.
● Copy a file named report.txt from /home/admin/docs to /home/admin/backup.
● Finally, delete an old directory named tempfiles from /home/admin.
Demonstrate the commands you would use to complete these tasks.
7. Illustrate the Vim Operating Modes with neat diagram.
RedHat Academy Course (Industry Allied) RH124
8. Classify the UID ranges used for different users.
9. Demonstrate a Process lifecycle in details.
10.Discuss the visual representation of the octal method for file system permission.
11.Interpret the various Network Interface Names.
12.Apply three commands and write their usage for Manage Networking.
13.Why is the locate command used in Linux? Explain with syntax and example.
14.Demonstrate any three-file command in RedHat.
15.What are the three basic types of Linux file permissions and what do they signify?
16.Write the command to list running processes and explain its output.
17.What is SSH and how is it used to securely access remote systems?
18.List two commands used to check and configure network settings in RHEL.
19.List any three basic Linux commands and explain their purpose.
20.List and briefly describe any three states a Linux process can be in during its lifecycle.
21.What is the purpose of the nmcli command in Red Hat Enterprise Linux? Explain with
example.
5-Marks Questions (Descriptive / Code-Based / Comparisons)
1. Design a Red Hat Enterprise Linux Ecosystem in detail.
2. Construct the structure and purpose of system directories in RHEL.
3. Explain the steps to log into a Linux system and execute basic shell commands with
examples.
4. Describe the process of managing files in Linux using the command line with appropriate
examples (copy, move, create, delete).
5. Demonstrate Output Redirection Operators in details.
6. Discuss the process of creating, viewing, and editing text files in Linux using both
command-line tools and text editors.
7. Explain how to create and manage local users and groups in Red Hat Enterprise Linux,
including setting password policies.
RedHat Academy Course (Industry Allied) RH124
8. How to Gain Superuser Access, Manage Local User Accounts and Manage Local Group
Accounts using RHEL? Explain with an appropriate example.
9. Analyze process states with neat diagram.
10.Discuss various useful commands for monitor and manage Linux processes.
11.Differentiate TCP/IP and OSI network models.
12.Compose a IPv4 Subnet masking in details.
13.Design a Red Hat Insights Architecture Description.
14.Explain file system permissions in Linux with examples. How can you change
permissions using chmod and chown commands?
15.Discuss how to configure and secure SSH on a Linux server. Why is SSH important for
remote administration?
16.Describe how to monitor and manage Linux processes using tools like top, ps, and kill.
Include command examples.
17.Explain how to configure and secure SSH using OpenSSH. Why is SSH preferred over
other remote login methods?
18.Describe the steps involved in configuring a network interface in Red Hat Enterprise
Linux.
19.Demonstrate following operations for Locate Files on the System.
● Locate Files by Name
● Search for Files in Real Time
● Search for Files Based on Ownership or Permission
● Find Files Based on Size
● Search for Files Based on Modification Time
20.Describe the complete lifecycle of a Linux process with a diagram. Include the states like
New, Ready, Running, Waiting, and Terminated.
21.Explain the use of the various network manage commands.