0% found this document useful (0 votes)
43 views9 pages

Objective of RHCSA

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views9 pages

Objective of RHCSA

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Objective of RHCSA.

-- BY Vinayak and Param .


Details of RHCSA EXAM.

1. Understand and use essential tools:-


 Access a shell prompt and issue commands with correct syntax.
 Use input and output redirection (>,>>,|,2>,etc)
 Use grep and regular expressions to analyze text.
 Access remote systems using SSH.
 Login & switch users in multiuser targets.
 Archeive , compress, unpack ,and uncompress files using tar ,star ,
gizip and bzip2.
 Create and edit text files.
 Create , delete , copy , move files and directories.
 Create hard and soft link.
 List , set and change standard ugo/ rwx permissions.
 Locate , read and use system documentation including man into files
in usr/doc/share.
Continued….

2. Operate Running System.


 Boot ,reboot ,shutdown a system normally.
 Boot system into different targets manually.
 Interrupts the boot process in order to gain access into a system.
 Identify CPU/Memory intensive processes and kill process.
 Adjust process scheduling.
 Locate and interupt system log files and journals.
 Preserve system journals.
 Start ,Stop and check the status of network services.
 Securely transfer files between system.
Continued….
3. Configure local storage.
 List ,create ,delete partition on MBR and GPT

disks.
 Create and remove Physical Volume.
 Assign Physical Volume to Volume groups.
 Create and delete logical volume.
 Configure system to mount files systems at boot by

universally unique ID (UUID) or labels.


 Add new Partition and logical volume ,and swap to

a system non-destructive.
Continued….
4. Create and configure file systems.
 Create , mount , unmount and use vfat, ext4 , and

XFs files system.


 Mount and unmount network files system using NFS.
 Extend existing logical volumes.
 Create and configure set –GID directories for

collaboration.
 Configure disk Compression.
 Manage layered storage.
 Diagnose and correct file permission problems.
Continued….
5. Deploy , configure and maintain system.
 Schedule tasks using at and cron .
 Start and stop services and configure services to start

automatically at boot.
 Configure systems at boot into a specific target

automatically.
 Configure time service clients.
 Install and update software packages from RED HAT

NETWORK a remote respository or from the local file


system.
 Work with packages module streams.
 Modify the system bootloader.
Continued….
6. Manage basic networking.
 Configure IPv4 and IPv6 adresses.
 Configure host name resolution.
 Configure network services to start

automatically at boot .
 Restrict network access using firewall

–cmd/firewall.
Continued….
7. Manage Security.
 Create , delete and modify local user accounts.
 Change passwords and adjust password aging

for local user accouns.


 Create , delete and modify local groups and

group memberships.
 Configure superuser access.
Continued….
8. Manage Security.
 Configure firewall settings using firewall

–cmd/firewalld.
 Configure keyboard authentication for SSH.
 Set enforcing and permissive modes for SELinux .
 List and identify SELinux file and process context.
 Restore default file contexts.
 Use boolean settings to modify system SELinux

settings.
 Diagnose and address routine SELinux policy

violations.

You might also like