Proper study guides for Update Red Hat Red Hat Certified Engineer on Redhat Enterprise Linux 5 (Labs) certified begins with Red Hat RH302 preparation products which designed to deliver the Virtual RH302 questions by making you pass the RH302 test at your first time. Try the free RH302 demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Red Hat RH302 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW RH302 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/RH302-exam-dumps.html

Q41. CORRECT TEXT

Now a days you are observing that your system being very slow. You observe the processes that one user named user1 running more than 50 processes. Configure to limit the number of processes that user1 couldn't run more than 7 process.

Answer and Explanation:

1. vi /etc/security/limits.conf

user1 hard nproc 7

2. vi /etc/pam.d/system-auth

session required /lib/security/pam_limits.so

To limit the number of process or number of logins, we should configure on /etc/security/limits.conf. First Columns contains the username separated by comma or @group name. Second column either hard or soft limits. Third columns called the item, maxloigns or nproc etc.

To identify the session of users we should call the pam_limits module in /etc/pam.d/system-auth.


Q42. CORRECT TEXT

You have a domain in your LAN named example.com. Allow the FTP connection only from local domain.

Answer and Explanation:

1. vi /etc/hosts.deny

vsftpd:ALL EXCEPT .example.com

We can secure the services using tcp_wrappers. There are main two files, /etc/hosts.allow and /etc/hosts.deny.

There will be three stage access checking

-Is access explicitly permitted? Means permitted from /etc/hosts.allow?

- Otherwise, Is access explicitly denied? Means denied from /etc/hosts.deny?

- Otherwise, by default permit access if neither condition matched.

To deny the services we can configure /etc/hosts.deny file using ALL and EXCEPT operation.

Pattern of /etc/hosts.allow and /etc/hosts.deny file is:

Demon_list:client_list:options

In Client list can be either domain name or IP address.


Q43. CORRECT TEXT

You are the Network Engineer of example.com domain. Configure to allow users user1, user2 and user3 to login only between 9am to 17pm on very day.

Answer and Explanation:

1. vi /etc/security/time.conf

login;*;user1|user2|user3;Al0900-1700

2. vi /etc/pam.d/login

account required pam_time.so

For Time based authentication, we should configured in /etc/security/time.conf

Syntax of /etc/security/time.conf

services;ttys;users;times

services

is a logic list of PAM service names that the rule applies to.

ttys

is a logic list of terminal names that this rule applies to.

users

is a logic list of users to whom this rule applies.

times

the format here is a logic list of day/time-range entries the days are specified by a sequence of two character entries, MoTuSa for example is Monday Tuesday and Saturday. Note that repeated days are unset MoMo = no day, and MoWk = all weekdays bar Monday. The two character combinations accepted are

Mo Tu We Th Fr Sa Su Wk Wd Al

the last two being week-end days and all 7 days of the week respectively. As a final example, AlFr means all days except Friday.

pam_time modules checks the file /etc/security/time.conf for authentication. So, we should call the pam_time modules in /etc/pam.d/login.


Q44. CORRECT TEXT

Create the user named jackie, curtin, david

Answer and Explanation:

1. useradd jackie

2. useradd curtin

3. useradd david

useradd command is used to create the user. All user's information stores in /etc/passwd and user;s shadow password stores in /etc/shadow.


Q45. CORRECT TEXT

You have a dedicated internet line in your LAN and IP from your ISP is 202.2.2.2. Your LAN is in 192.168.0.0/24. Configure the SNAT that allows all system in your LAN can access the Internet.

Answer and Explanation:

1. iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -p tcp -j SNAT -to-source 202.2.2.2.

POSTROUTINGà This filter point handles packets immediately prior leaving the system.

When Packets leave the system all's source address change to 202.2.2.2 and can access the internet. iptables is the build-in firewall tools, used to filter the packets and for nat. By identifying Source Address, Destination Address, type of protocol, source and destination port we can filter the packets.

-sà Source Address

-dà Destination Address

-p à Layer 3 Protocol

-dàDestination Address

--sportà Source Prot

--dportàDestination Port

-ià Incoming Interface

-oà Outgoing Interface

-t à Table either filter or nat or mangle

-Aà Chain can be either INPUT, OUTPUT, FORWARD, PREROUTING, POSTROUTING.


Q46. CORRECT TEXT

You are giving RHCE exam. Examiner gave you the Boot related problem and told to you that make successfully boot the System. When you started the system, System automatically asking the root password for maintenance. How will you fix that problem?

Answer and Explanation:

Maintenance mode also known as emergency mode. System boots on emergency mode when file system error occurred. It is due to unknown partition, bad filesystem specified in /etc/fstab. To slove follow the steps

6. Give the Root password

7. fdisk -l àVerify the Number of parations.

8. Identify the Root partition, e2label /dev/hda1, e2label /dev/hda2.....

9. Remount the root partation on rw mode: mount -o remount,defaults /dev/hda6 /

10. vi /etc/fstab

Correct all partitions, mount point, mount options, file system etc.

6. Press ctrl+d


Q47. CORRECT TEXT

One Logical Volume is created named as myvol under vo volume group and is mounted. The Initial Size of that Logical Volume is 124MB. Make successfully that the size of Logical Volume 245MB without losing any data. The size of logical volume 240MB to 255MB will be acceptable.

Answer and Explanation:

1. First check the size of Logical Volume: lvdisplay /dev/vo/myvol

2. Increase the Size of Logical Volume: lvextend -L+121M /dev/vo/myvol

3. Make Available the size on online: ext2online /dev/vo/myvol

4. Verify the Size of Logical Volume: lvdisplay /dev/vo/myvol

5. Verify that the size comes in online or not: df -h

We can extend the size of logical Volume using the lvextend command. As well as to decrease the size of Logical Volume, use the lvresize command. In LVM v2 we can extend the size of Logical Volume without unmount as well as we can bring the size of Logical Volume on online using ext2online command.


Q48. CORRECT TEXT

Give Full Permission to owner user and owner group member but no permission to others on /data.

Answer and Explanation:

We can change the permission of file/directory either character symbol method or numeric method.

Permission:

r-Read

w-Write

x-Execute

Permission Category

u- Owner User

g- Owner Group

o- Others

Operators

+ à Add the Permissions

- à Remove the Permissions

= à Assigns the Permissions

Numeric Method:

4àRead

2à Write

1àExecute

Total: 7, total for owner user, owner group member and for others : 777

1. chmod u+rwx /data

2. chmod g+rwx /data

3. chmod o-rwx /data

or

chmod 770 /data

4. Verify the /data : ls -ld /data

5. You will get drwxrwx---


Q49. CORRECT TEXT

You are giving RHCT Exam and in your Exam paper there is a question written, make successfully ping to 192.168.0.254.

Answer and Explanation:

In Network problem thinks to check:

1. IP Configuration: use ifconfig command either IP is assigned to interface or not?

2. Default Gateway is set or not?

3. Hostname is set or not?

4. Routing problem is there?

5. Device Driver Module is loaded or not?

6. Device is activated or not?

Check In this way:

1. use ifconfig command and identify which IP is assigned or not.

2. cat /etc/sysconfig/network à What, What is written here. Actually here are these parameters.

NETWORKING=yes or no

GATEWAY=x.x.x.x

HOSTNAME=?

NISDOMAIN=?

- Correct the file

3. Use vi /etc/sysconfig/network-scirpts/ifcfg-eth0 and check the proper options

DEVICE=eth0

ONBOOT=yes

BOOTPROTO=static

IPADDR=x.x.x.x

NETMAKS=x.x.x.x

GATEWAY=x.x.x.x

4. Use service network restart or start command


Q50. CORRECT TEXT

Create the user named eric and deny to interactive login.

Answer and Explanation:

1. useradd eric

2. passwd eric

3. vi /etc/passwd

4. eric:x:505:505::/home/eric:/sbin/nologin

Which shell or program should start at login time is specified in /etc/passwd file. By default Redhat Enterprise Linux assigns the /bin/bash shell to the users. To deny the interactive login, you should write /sbin/nologin or /bin/false instead of login shell.