Bookmark this page

Chapter 16. Comprehensive Review

Abstract

Goal To practice and demonstrate knowledge and skills learned in Red Hat System Administration I.
Objectives

  • Practice skills learned in Red Hat System Administration I.

Lab
  • Comprehensive Review

Red Hat System Administration I Comprehensive Review

  • Review chapters to validate knowledge level.

  • Review practice exercises to validate skill level.

Objectives

After completing this section, students should be able to demonstrate knowledge and skill of the topics covered in each chapter.

Reviewing Red Hat System Administration I

Before beginning the comprehensive review for this course, students should be comfortable with the topics covered in each chapter.

Students can refer to earlier sections in the textbook for extra study.

Chapter 1, Accessing the Command Line

To log into a Linux system and run simple commands using the shell.

  • Use Bash shell syntax to enter commands at a Linux console.

  • Launch applications in a GNOME desktop environment.

  • Use Bash features to run commands from a shell prompt using fewer keystrokes.

Chapter 2, Managing Files From the Command Line

To copy, move, create, delete, and organize files while working from the Bash shell prompt.

  • Identify the purpose for important directories on a Linux system.

  • Specify files using absolute and relative path names.

  • Create, copy, move, and remove files and directories using command-line utilities.

  • Match one or more file names using shell expansion as arguments to shell commands.

Chapter 3, Getting Help in Red Hat Enterprise Linux

To resolve problems by using on-line help systems and Red Hat support utilities.

  • Use the man Linux manual reader.

  • Use the pinfo GNU Info reader.

  • Use the Red Hat Package Manager (RPM) package documentation.

  • Use the redhat-support-tool command.

Chapter 4, Creating, Viewing, and Editing Text Files

To create, view, and edit text files from command output or in an editor.

  • Redirect the text output of a program to a file or to another program.

  • Edit existing text files and create new files from the shell prompt with a text editor.

  • Copy text from a graphical window to a text file using a text editor running in the graphical environment.

Chapter 5, Managing Local Linux Users and Groups

To manage local Linux users and groups and administer local password policies.

  • Explain the role of users and groups on a Linux system and how they are understood by the computer.

  • Run commands as the superuser to administer a Linux system.

  • Create, modify, lock, and delete locally defined user accounts.

  • Create, modify, and delete locally defined group accounts.

  • Lock accounts manually or by setting a password-aging policy in the shadow password file.

Chapter 6, Controlling Access to Files with Linux File System Permissions

To set Linux file system permissions on files and interpret the security effects of different permission settings.

  • Explain how the Linux file permissions model works.

  • Change the permissions and ownership of files using command-line tools.

  • Configure a directory in which newly created files are automatically writable by members of the group which owns the directory, using special permissions and default umask settings.

Chapter 7, Monitoring and Managing Linux Processes

To evaluate and control processes running on a Red Hat Enterprise Linux system.

  • List and interpret basic information about processes running on the system.

  • Control processes in the shell's session using bash job control.

  • Terminate and control processes using signals.

  • Monitor resource usage and system load due to process activity.

Chapter 8, Controlling Services and Daemons

To control and monitor network services and system daemons using systemd.

  • List system daemons and network services started by the systemd service and socket units.

  • Control system daemons and network services using systemctl.

Chapter 9, Configuring and Securing OpenSSH Service

To configure secure command-line access on remote systems using OpenSSH.

  • Log into a remote system using ssh to run commands from a shell prompt.

  • Set up ssh to allow secure password-free logins by using a private authentication key file.

  • Customize sshd configuration to restrict direct logins as root or to disable password-based authentication.

Chapter 10, Analyzing and Storing Logs

To locate and accurately interpret relevant system log files for troubleshooting purposes.

  • Describe the basic syslog architecture in Red Hat Enterprise Linux 7.

  • Interpret entries in relevant syslog files to troubleshoot problems or review system status.

  • Find and interpret log entries in the systemd journal to troubleshoot problems or review system status.

  • Configure systemd-journald to store its journal on disk rather than in memory.

  • Maintain accurate time synchronization and time zone configuration to ensure correct timestamps in system logs.

Chapter 11, Managing Red Hat Enterprise Linux Networking

To configure basic IPv4 networking on Red Hat Enterprise Linux systems.

  • Explain fundamental concepts of computer networking.

  • Test and review current network configuration with basic utilities.

  • Manage network settings and devices with nmcli and NetworkManager.

  • Modify network settings by editing the configuration files.

  • Configure and test system host name and name resolution.

Chapter 12, Archiving and Copying Files Between Systems

To archive and copy files from one system to another.

  • Use tar to create new compressed archive files and extract files from existing archive files.

  • Copy files securely to or from a remote system running sshd.

  • Securely synchronize the contents of a local file or directory with a remote copy.

Chapter 13, Installing and Updating Software Packages

To download, install, update, and manage software packages from Red Hat and YUM package repositories.

  • Register systems with your Red Hat account and entitle them to software updates for installed products.

  • Explain what an RPM package is and how RPM packages are used to manage software on a Red Hat Enterprise Linux system.

  • Find, install, and update software packages using the yum command.

  • Enable and disable use of Red Hat or third-party YUM repositories.

  • Examine and install downloaded software package files.

Chapter 14, Accessing Linux File Systems

To access and inspect existing file systems on a Red Hat Enterprise Linux system.

  • Identify the file system hierarchy.

  • Access the contents of file systems.

  • Use hard links and symlinks to make multiple names.

  • Search for files on mounted file systems.

Chapter 15, Using Virtualized Systems

To create and use Red Hat Enterprise Linux virtual machines with Kernel-based Virtual Machine (KVM) and libvirt.

  • Install a Red Hat Enterprise Linux system as a host for running virtual machines.

  • Perform an interactive install of Red Hat Enterprise Linux on a virtual machine.

References

Get information on more classes available from Red Hat at http://learn.spidernet.pl/training/

Revision: rh124-7-1b00421