SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
RHCSA Exam Objectives
                         EX200 - RHCSA Certification:

RHCSA exam candidates should be able to accomplish the tasks below without assistance. These
have been grouped into several categories.



        Understand and Use Essential Tools
    •   Access a shell prompt and issue commands with correct syntax
    •   Use input-output redirection (>, >>, |, 2>, etc.)
    •   Use grep and regular expressions to analyze text
    •   Access remote systems using ssh and VNC
    •   Log in and switch users in multi-user runlevels
    •   Archive, compress, unpack and uncompress files using tar, star, gzip, and bzip2
    •   Create and edit text files
    •   Create, delete, copy and move files and directories
    •   Create hard and soft links
    •   List, set and change standard ugo/rwx permissions
    •   Locate, read and use system documentation including man, info, and files in /usr/share/doc .
        [Note: Red Hat may use applications during the exam that are not included in Red Hat
        Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.]

        Operate Running Systems
    •   Boot, reboot, and shut down a system normally
    •   Boot systems into different runlevels manually
    •   Use single-user mode to gain access to a system
    •   Identify CPU/memory intensive processes, adjust process priority with renice, and kill
        processes
    •   Locate and interpret system log files
    •   Access a virtual machine's console
    •   Start and stop virtual machines
    •   Start, stop and check the status of network services

        Configure Local Storage
    •   List, create, delete and set partition type for primary, extended, and logical partitions
    •   Create and remove physical volumes, assign physical volumes to volume groups, create and
        delete logical volumes
    •   Create and configure LUKS-encrypted partitions and logical volumes to prompt for password
        and mount a decrypted file system at boot
    •   Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
    •   Add new partitions, logical volumes and swap to a system non-destructively
Create and Configure File Systems
•   Create, mount, unmount and use ext2, ext3 and ext4 file systems
•   Mount, unmount and use LUKS-encrypted file systems
•   Mount and unmount CIFS and NFS network file systems
•   Configure systems to mount ext4, LUKS-encrypted and network file systems automatically
•   Extend existing unencrypted ext4-formatted logical volumes
•   Create and configure set-GID directories for collaboration
•   Create and manage Access Control Lists (ACLs)
•   Diagnose and correct file permission problems

    Deploy, Configure and Maintain Systems
•   Configure networking and hostname resolution statically or dynamically
•   Schedule tasks using cron
•   Configure systems to boot into a specific runlevel automatically
•   Install Red Hat Enterprise Linux automatically using Kickstart
•   Configure a physical machine to host virtual guests
•   Install Red Hat Enterprise Linux systems as virtual guests
•   Configure systems to launch virtual machines at boot
•   Configure network services to start automatically at boot
•   Configure a system to run a default configuration HTTP server
•   Configure a system to run a default configuration FTP server
•   Install and update software packages from Red Hat Network, a remote repository, or from the
    local filesystem
•   Update the kernel package appropriately to ensure a bootable system
•   Modify the system bootloader
•   Configure a system to run a default configuration NTP server and synchronize time using
    other NTP peers

    Manage Users and Groups
•   Create, delete, and modify local user accounts
•   Change passwords and adjust password aging for local user accounts
•   Create, delete and modify local groups and group memberships
•   Configure a system to use an existing LDAP directory service for user and group information

    Manage Security
•   Configure firewall settings using system-config-firewall or iptables
•   Set enforcing and permissive modes for SELinux
•   List and identify SELinux file and process context
•   Restore default file contexts
•   Use boolean settings to modify system SELinux settings
•   Diagnose and address routine SELinux policy violations
Ex200   objectives

Contenu connexe

Tendances

001 linux revision
001 linux revision001 linux revision
001 linux revision
Sherif Mousa
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
rajsandhu1989
 
Implementing Hadoop on a single cluster
Implementing Hadoop on a single clusterImplementing Hadoop on a single cluster
Implementing Hadoop on a single cluster
Salil Navgire
 

Tendances (20)

001 linux revision
001 linux revision001 linux revision
001 linux revision
 
Learning of docker storage driver (container file system)
Learning of docker storage driver  (container file system)Learning of docker storage driver  (container file system)
Learning of docker storage driver (container file system)
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
Course 102: Lecture 16: Process Management (Part 2)
Course 102: Lecture 16: Process Management (Part 2) Course 102: Lecture 16: Process Management (Part 2)
Course 102: Lecture 16: Process Management (Part 2)
 
Fuse'ing python for rapid development of storage efficient FS
Fuse'ing python for rapid development of storage efficient FSFuse'ing python for rapid development of storage efficient FS
Fuse'ing python for rapid development of storage efficient FS
 
File permission in Linux
File permission in LinuxFile permission in Linux
File permission in Linux
 
HDFS Deep Dive
HDFS Deep DiveHDFS Deep Dive
HDFS Deep Dive
 
File permissions
File permissionsFile permissions
File permissions
 
Linux: Basics OF Linux
Linux: Basics OF LinuxLinux: Basics OF Linux
Linux: Basics OF Linux
 
Filepermissions in linux
Filepermissions in linuxFilepermissions in linux
Filepermissions in linux
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 
Linux training
Linux trainingLinux training
Linux training
 
Unix _linux_fundamentals_for_hpc-_b
Unix  _linux_fundamentals_for_hpc-_bUnix  _linux_fundamentals_for_hpc-_b
Unix _linux_fundamentals_for_hpc-_b
 
Linux
Linux Linux
Linux
 
SUSE
SUSESUSE
SUSE
 
Implementing Hadoop on a single cluster
Implementing Hadoop on a single clusterImplementing Hadoop on a single cluster
Implementing Hadoop on a single cluster
 
Introduction of mesos persistent storage
Introduction of mesos persistent storageIntroduction of mesos persistent storage
Introduction of mesos persistent storage
 
Introduction
IntroductionIntroduction
Introduction
 
Linux: Everyting-as-a-service
Linux: Everyting-as-a-serviceLinux: Everyting-as-a-service
Linux: Everyting-as-a-service
 
RHEL6 - Rh124
RHEL6 - Rh124RHEL6 - Rh124
RHEL6 - Rh124
 

En vedette

RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210
RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210
RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210
Raghuprasad Gundeti
 

En vedette (10)

ITPEC VITEC and FE, AP examination presentation
ITPEC VITEC and FE, AP examination presentationITPEC VITEC and FE, AP examination presentation
ITPEC VITEC and FE, AP examination presentation
 
Storage Managment
Storage ManagmentStorage Managment
Storage Managment
 
RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210
RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210
RED HAT CERTIFIED SYSTEM ADMINISTRATOR__EX210
 
Redhat 6 & 7
Redhat 6 & 7Redhat 6 & 7
Redhat 6 & 7
 
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 7Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 7
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
 
Bookkeeping Presentation
Bookkeeping PresentationBookkeeping Presentation
Bookkeeping Presentation
 
RedHat Linux
RedHat LinuxRedHat Linux
RedHat Linux
 
Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)
 
Java SE 8 best practices
Java SE 8 best practicesJava SE 8 best practices
Java SE 8 best practices
 

Similaire à Ex200 objectives

Ex300 objectives
Ex300   objectivesEx300   objectives
Ex300 objectives
jorg_marq
 
Devin Black RHELSA Resume 2
Devin Black RHELSA Resume 2Devin Black RHELSA Resume 2
Devin Black RHELSA Resume 2
Devin Black
 
Linux操作系统01 简介
Linux操作系统01 简介Linux操作系统01 简介
Linux操作系统01 简介
lclsg123
 

Similaire à Ex200 objectives (20)

Rh299
Rh299Rh299
Rh299
 
Ex300 objectives
Ex300   objectivesEx300   objectives
Ex300 objectives
 
Haja Najumudeen CV
Haja Najumudeen CV Haja Najumudeen CV
Haja Najumudeen CV
 
Haja najumudeen CV
Haja najumudeen CVHaja najumudeen CV
Haja najumudeen CV
 
Haja najumudeen cv copy - copy
Haja najumudeen cv   copy - copyHaja najumudeen cv   copy - copy
Haja najumudeen cv copy - copy
 
Jineesh
JineeshJineesh
Jineesh
 
Hp ux-admin Online Training
Hp ux-admin Online TrainingHp ux-admin Online Training
Hp ux-admin Online Training
 
Linux Internet Servers. An overview of the Environment
Linux Internet Servers. An overview of the EnvironmentLinux Internet Servers. An overview of the Environment
Linux Internet Servers. An overview of the Environment
 
Powering up on power shell avengercon - 2018
Powering up on power shell   avengercon - 2018Powering up on power shell   avengercon - 2018
Powering up on power shell avengercon - 2018
 
Red Hart Linux
Red Hart LinuxRed Hart Linux
Red Hart Linux
 
Devin Black RHELSA Resume 2
Devin Black RHELSA Resume 2Devin Black RHELSA Resume 2
Devin Black RHELSA Resume 2
 
Powering up on PowerShell - BSides Greenville 2019
Powering up on PowerShell  - BSides Greenville 2019Powering up on PowerShell  - BSides Greenville 2019
Powering up on PowerShell - BSides Greenville 2019
 
Rh413
Rh413Rh413
Rh413
 
Security tools
Security toolsSecurity tools
Security tools
 
Anujit CV
Anujit CV Anujit CV
Anujit CV
 
Anujit CV
Anujit CV Anujit CV
Anujit CV
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
 
3. introduction of centos
3. introduction of centos3. introduction of centos
3. introduction of centos
 
Linux操作系统01 简介
Linux操作系统01 简介Linux操作系统01 简介
Linux操作系统01 简介
 
Unix - Sun Solaris Admin Classroom Training
Unix - Sun Solaris Admin Classroom TrainingUnix - Sun Solaris Admin Classroom Training
Unix - Sun Solaris Admin Classroom Training
 

Plus de jorg_marq

Clase9 threads
Clase9 threadsClase9 threads
Clase9 threads
jorg_marq
 
Clase8 innerclasses
Clase8 innerclassesClase8 innerclasses
Clase8 innerclasses
jorg_marq
 
Clase7 generics
Clase7 genericsClase7 generics
Clase7 generics
jorg_marq
 
Clase6 collections
Clase6 collectionsClase6 collections
Clase6 collections
jorg_marq
 
Clase5 controldeflujo
Clase5 controldeflujoClase5 controldeflujo
Clase5 controldeflujo
jorg_marq
 
Clase4 operadores
Clase4 operadoresClase4 operadores
Clase4 operadores
jorg_marq
 
Clase3 asignaciones
Clase3 asignacionesClase3 asignaciones
Clase3 asignaciones
jorg_marq
 
Clase2 ejemplosdeenumpoo
Clase2 ejemplosdeenumpooClase2 ejemplosdeenumpoo
Clase2 ejemplosdeenumpoo
jorg_marq
 
Clase1 introduccinalcurso
Clase1 introduccinalcursoClase1 introduccinalcurso
Clase1 introduccinalcurso
jorg_marq
 
Capitulos 8 9-10
Capitulos 8 9-10Capitulos 8 9-10
Capitulos 8 9-10
jorg_marq
 
Clase10 stringsio
Clase10 stringsioClase10 stringsio
Clase10 stringsio
jorg_marq
 
Whither cman
Whither cmanWhither cman
Whither cman
jorg_marq
 

Plus de jorg_marq (19)

Clase9 threads
Clase9 threadsClase9 threads
Clase9 threads
 
Clase8 innerclasses
Clase8 innerclassesClase8 innerclasses
Clase8 innerclasses
 
Clase7 generics
Clase7 genericsClase7 generics
Clase7 generics
 
Clase6 collections
Clase6 collectionsClase6 collections
Clase6 collections
 
Clase5 controldeflujo
Clase5 controldeflujoClase5 controldeflujo
Clase5 controldeflujo
 
Clase4 operadores
Clase4 operadoresClase4 operadores
Clase4 operadores
 
Clase3 asignaciones
Clase3 asignacionesClase3 asignaciones
Clase3 asignaciones
 
Clase2 ejemplosdeenumpoo
Clase2 ejemplosdeenumpooClase2 ejemplosdeenumpoo
Clase2 ejemplosdeenumpoo
 
Clase1 introduccinalcurso
Clase1 introduccinalcursoClase1 introduccinalcurso
Clase1 introduccinalcurso
 
Capitulos 8 9-10
Capitulos 8 9-10Capitulos 8 9-10
Capitulos 8 9-10
 
Capitulo 7
Capitulo 7Capitulo 7
Capitulo 7
 
Capitulo 6
Capitulo 6Capitulo 6
Capitulo 6
 
Capitulo 5
Capitulo 5Capitulo 5
Capitulo 5
 
Capitulo 4
Capitulo 4Capitulo 4
Capitulo 4
 
Capitulo 3
Capitulo 3Capitulo 3
Capitulo 3
 
Capitulo 2
Capitulo 2Capitulo 2
Capitulo 2
 
Capitulo 1
Capitulo 1Capitulo 1
Capitulo 1
 
Clase10 stringsio
Clase10 stringsioClase10 stringsio
Clase10 stringsio
 
Whither cman
Whither cmanWhither cman
Whither cman
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Ex200 objectives

  • 1. RHCSA Exam Objectives EX200 - RHCSA Certification: RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories. Understand and Use Essential Tools • Access a shell prompt and issue commands with correct syntax • Use input-output redirection (>, >>, |, 2>, etc.) • Use grep and regular expressions to analyze text • Access remote systems using ssh and VNC • Log in and switch users in multi-user runlevels • Archive, compress, unpack and uncompress files using tar, star, gzip, and bzip2 • Create and edit text files • Create, delete, copy and move files and directories • Create hard and soft links • List, set and change standard ugo/rwx permissions • Locate, read and use system documentation including man, info, and files in /usr/share/doc . [Note: Red Hat may use applications during the exam that are not included in Red Hat Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.] Operate Running Systems • Boot, reboot, and shut down a system normally • Boot systems into different runlevels manually • Use single-user mode to gain access to a system • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes • Locate and interpret system log files • Access a virtual machine's console • Start and stop virtual machines • Start, stop and check the status of network services Configure Local Storage • List, create, delete and set partition type for primary, extended, and logical partitions • Create and remove physical volumes, assign physical volumes to volume groups, create and delete logical volumes • Create and configure LUKS-encrypted partitions and logical volumes to prompt for password and mount a decrypted file system at boot • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label • Add new partitions, logical volumes and swap to a system non-destructively
  • 2. Create and Configure File Systems • Create, mount, unmount and use ext2, ext3 and ext4 file systems • Mount, unmount and use LUKS-encrypted file systems • Mount and unmount CIFS and NFS network file systems • Configure systems to mount ext4, LUKS-encrypted and network file systems automatically • Extend existing unencrypted ext4-formatted logical volumes • Create and configure set-GID directories for collaboration • Create and manage Access Control Lists (ACLs) • Diagnose and correct file permission problems Deploy, Configure and Maintain Systems • Configure networking and hostname resolution statically or dynamically • Schedule tasks using cron • Configure systems to boot into a specific runlevel automatically • Install Red Hat Enterprise Linux automatically using Kickstart • Configure a physical machine to host virtual guests • Install Red Hat Enterprise Linux systems as virtual guests • Configure systems to launch virtual machines at boot • Configure network services to start automatically at boot • Configure a system to run a default configuration HTTP server • Configure a system to run a default configuration FTP server • Install and update software packages from Red Hat Network, a remote repository, or from the local filesystem • Update the kernel package appropriately to ensure a bootable system • Modify the system bootloader • Configure a system to run a default configuration NTP server and synchronize time using other NTP peers Manage Users and Groups • Create, delete, and modify local user accounts • Change passwords and adjust password aging for local user accounts • Create, delete and modify local groups and group memberships • Configure a system to use an existing LDAP directory service for user and group information Manage Security • Configure firewall settings using system-config-firewall or iptables • Set enforcing and permissive modes for SELinux • List and identify SELinux file and process context • Restore default file contexts • Use boolean settings to modify system SELinux settings • Diagnose and address routine SELinux policy violations