Skip to content

Latest commit

 

History

History
253 lines (194 loc) · 11.1 KB

exam-checklist.md

File metadata and controls

253 lines (194 loc) · 11.1 KB
nav_order permalink title
2
/exam-checklist
Exam checklist

Exam checklist

Table of contents

  • TOC {:toc}

Using this checklist

To check off items on the checklist, log in to GitHub, fork this guide, and clone your fork.

This checklist is in the file exam-checklist.md. You can edit the checklist in an editor of your choice. Fill out items by placing an X next to them, for example:

* [X] Complete item
* [ ] Incomplete item

Commit your changes with git add and git commit.

You should sync your local copy often to keep it up to date. The main branch name for this guide is master. If you have merge conflicts, see basic merge conflicts.

Update the remote copy of your fork with git push.

Red Hat course content checklists

The checklists in this section contain material in Red Hat courses with prerequisite knowledge for the RHCSA exam. This section is to help you make sure you have learned the same information that's in these courses.

Check off items once you feel you have learned this material.

Red Hat System Administration I checklist

This checklist is from the RH124 Course Outline.

  • Get started with Red Hat Enterprise Linux
    • Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.
  • Access the command line
    • Log into a Linux system and run simple commands using the shell.
  • Manage files from the command line
    • Copy, move, create, delete, and organize files while working from the bash shell.
  • Get help in Red Hat Enterprise Linux
    • Resolve problems by using local help systems.
  • Create, view, and edit text files
    • Manage text files from command output or in a text editor.
  • Manage local users and groups
    • Create, manage, and delete local users and groups, as well as administer local password policies.
  • Control access to files
    • Set Linux file system permissions on files and interpret the security effects of different permission settings.
  • Monitor and manage Linux processes
    • Evaluate and control processes running on a Red Hat Enterprise Linux system.
  • Control services and daemons
    • Control and monitor network services and system daemons using systemd.
  • Configure and secure SSH
    • Configure secure command line service on remote systems, using OpenSSH.
  • Analyze and store logs
    • Locate and accurately interpret logs of system events for troubleshooting purposes.
  • Manage networking
    • Configure network interfaces and settings on Red Hat Enterprise Linux servers.
  • Archive and transfer files
    • Archive and copy files from one system to another.
  • Install and update software packages
    • Download, install, update, and manage software packages from Red Hat and yum package repositories.
  • Access Linux files systems
    • Access, inspect, and use existing file systems on storage attached to a Linux server.
  • Analyze servers and get support
    • Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.
  • Comprehensive review
    • Review the content covered in [RH124] by completing hands-on exercises.

Red Hat System Administration II checklist

This checklist is from the RH134 Course Outline.

  • Improve command line productivity
    • Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
  • Schedule future tasks
    • Schedule commands to run in the future, either one time or on a repeating schedule.
  • Tune system performance
    • Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
  • Manage SELinux security
    • Protect and manage the security of a server by using SELinux.
  • Manage logical volumes
    • Create and manage logical volumes containing file systems and swap spaces from the command line.
  • Access network-attached storage
    • Use the NFS protocol to administer network-attached storage.
  • Control the boot process
    • Manage the boot process to control services offered and to troubleshoot and repair problems.
  • Manage network security
    • Control network connections to services using the system firewall and SELinux rules.
  • Install Red Hat Enterprise Linux
    • Install Red Hat Enterprise Linux on servers and virtual machines.
  • Run Containers
    • Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.

Running Containers with Red Hat Technical Overview checklist

This checklist is from the RH065 Course Content Summary.

  • Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.
  • Explain what a container is and how to use one to manage and deploy applications with their supporting software libraries and dependencies.
  • Install container management tools and run a simple rootless container.
  • Find, retrieve, inspect, and manage container images obtained from a remote container registry and stored on your server.
  • Run containers with advanced options; list the containers running on the system; and start, stop, and kill containers.
  • Provide persistent storage for container data by mounting a directory from the container host inside a running container.
  • Start, stop, and check the status of a container as a system service.

Red Hat Certified System Administrator exam study points checklist

This checklist is from the EX200 Study Points. This section is to help you make sure you have sufficiently studied.

For the exam, you must be able to complete all the tasks below without help. Configurations must persist after reboot without intervention.

Check off items once you feel you can meet this criteria.

Understand and use essential tools

  • Access a shell prompt and issue commands with correct syntax
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Access remote systems using SSH
  • Log in and switch users in multiuser targets
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ugo/rwx permissions
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc

Create simple shell scripts

  • Conditionally execute code (use of: if, test, [], etc.)
  • Use Looping constructs (for, etc.) to process file, command line input
  • Process script inputs ($1, $2, etc.)
  • Processing output of shell commands within a script

Operate running systems

  • Boot, reboot, and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Identify CPU/memory intensive processes and kill processes
  • Adjust process scheduling
  • Manage tuning profiles
  • Locate and interpret system log files and journals
  • Preserve system journals
  • Start, stop, and check the status of network services
  • Securely transfer files between systems

Configure local storage

  • List, create, delete partitions on MBR and GPT disks
  • Create and remove physical volumes
  • Assign physical volumes to volume groups
  • Create and delete logical volumes
  • Configure systems to mount file systems at boot by universally unique ID (UUID) or label
  • Add new partitions and logical volumes, and swap to a system non-destructively

Create and configure file systems

  • Create, mount, unmount, and use vfat, ext4, and xfs file systems
  • Mount and unmount network file systems using NFS
  • Configure autofs
  • Extend existing logical volumes
  • Create and configure set-GID directories for collaboration
  • Diagnose and correct file permission problems

Deploy, configure, and maintain systems

  • Schedule tasks using at and cron
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Configure time service clients
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Modify the system bootloader

Manage basic networking

  • Configure IPv4 and IPv6 addresses
  • Configure hostname resolution
  • Configure network services to start automatically at boot
  • Restrict network access using firewall-cmd/firewall

Manage users and groups

  • Create, delete, and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Configure superuser access

Manage security

  • Configure firewall settings using firewall-cmd/firewalld
  • Manage default file permissions
  • Configure key-based authentication for SSH
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default file contexts
  • Manage SELinux port labels
  • Use boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations

Manage containers

  • Find and retrieve container images from a remote registry
  • Inspect container images
  • Perform container management using commands such as podman and skopeo
  • Build a container from a Containerfile
  • Perform basic container management such as running, starting, stopping, and listing running containers
  • Run a service inside a container
  • Configure a container to start automatically as a systemd service
  • Attach persistent storage to a container