• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar

The Geek Diary

HowTos | Basics | Concepts

  • Solaris
    • Solaris 11
    • SVM
    • ZFS
    • Zones
    • LDOMs
    • Hardware
  • Linux
    • CentOS/RHEL 7
    • RHCSA notes
    • SuSE Linux Enterprise
    • Linux Services
  • VCS
    • VxVM
  • Interview Questions
  • oracle
    • ASM
    • mysql
    • RAC
    • oracle 12c
    • Data Guard
  • DevOps
    • Docker
    • Shell Scripting
  • Hadoop
    • Hortonworks HDP
      • HDPCA
    • Cloudera
      • CCA 131

RHEL 7 – RHCSA Notes (Cheat Sheets)

By admin

Red Hat Certified System Administrator better known as RHCSA exam is one of the well-known certification exam in Linux world. I’ve tried to write together notes that I used in my preparation of RHEL 7 RHCSA. Remember that, these are not explanatory notes, but a quick cheat sheet. The post includes links to all exam objectives for the RHCSA exam.

Understand and use essential tools

  • Access a shell prompt and issue commands with correct syntax.
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text.
  • Access remote systems using ssh.
  • Log in and switch users in multiuser targets.
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2.
  • Create and edit text files.
  • Create, delete, copy, and move files and directories.
  • Create hard and soft links.
  • List, set, and change standard ugo/rwx permissions.
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc.

Operate running systems

  • Boot, reboot, and shut down a system normally.
  • Boot systems into different targets manually.
  • Interrupt the boot process in order to gain access to a system.
  • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes.
  • Locate and interpret system log files and journals.
  • Access a virtual machine’s console.
  • Start and stop virtual machines.
  • Start, stop, and check the status of network services.
  • Securely transfer files between systems.

Configure local storage

  • List, create, delete partitions on MBR and GPT disks.
  • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes.
  • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label.
  • Add new partitions and logical volumes, and swap to a system non-destructively.

Create and configure file systems

  • Create, mount, unmount, and use vfat, ext4 and xfs file systems.
  • Mount and unmount CIFS and NFS network file systems.
  • Extend existing logical volumes.
  • Create and configure set-GID directories for collaboration.
  • Create and manage Access Control Lists (ACLs).
  • Diagnose and correct file permission problems.

Deploy, configure, and maintain systems

  • Configure networking and hostname resolution statically or dynamically.
  • Schedule tasks using at and cron.
  • Start and stop services and configure services to start automatically at boot.
  • Configure systems to boot into a specific target automatically.
  • Install Red Hat Enterprise Linux automatically using Kickstart.
  • Configure a physical machine to host virtual guests.
  • Install Red Hat Enterprise Linux systems as virtual guests.
  • Configure systems to launch virtual machines at boot.
  • Configure network services to start automatically at boot.
  • Configure a system to use time services.
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system.
  • Update the kernel package appropriately to ensure a bootable system.
  • Modify the system bootloader.

Manage users and groups

  • Create, delete, and modify local user accounts.
  • Change passwords and adjust password aging for local user accounts.
  • Create, delete, and modify local groups and group memberships.
  • Configure a system to use an existing authentication service for user and group information.

Manage security

  • Configure firewall settings using firewall-config, firewall-cmd, or iptables.
  • Configure key-based authentication for SSH.
  • Set enforcing and permissive modes for SELinux.
  • List and identify SELinux file and process context.
  • Restore default file contexts.
  • Use boolean settings to modify system SELinux settings.
  • Diagnose and address routine SELinux policy violations.

Filed Under: CentOS/RHEL 7, Linux, RHCSA notes

Some more articles you might also be interested in …

  1. What is yum-cron? How it can be used in a CentOS/RHEL system to apply updates automatically
  2. CentOS / RHEL : How to view the commands executed in yum history command output
  3. CentOS / RHEL 7 : How to follow the mount order in /etc/fstab
  4. systemd alternatives to ‘service’ ‘chkconfig’ and ‘init ‘ commands in CentOS/RHEL 7
  5. Troubleshooting kdump Issues in CentOS/RHEL
  6. CentOS / RHEL 7 : How to Change the machine-id
  7. CentOS / RHEL : How to disable BASH shell history
  8. Understanding Automatic NUMA balancing
  9. CentOS / RHEL : How to add a new Physical Volume to an existing Volume Group
  10. CentOS / RHEL 6 : How to disable Transparent Huge pages (THP)

You May Also Like

Primary Sidebar

Recent Posts

  • How to disable firewalld and nftables and use iptables instead in CentOS/RHEL 8
  • How to add an Ethernet connection using nmcli in CentOS/RHEL 7
  • How to set the order to load certain modules in CentOS/RHEL 7 and 8
  • How to configure initrd / initramfs to including kernel modules in CentOS/RHEL
  • How to configure systemd.path to trigger an event when any changes made to a directory
  • Archives
  • Contact Us
  • Copyright

© 2019 · The Geek Diary