0%

Book Description

Based on Red Hat Enterprise Linux 7, the new edition of this bestselling study guide covers the updated Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) exams.

RHCSA/RHCE Red Hat Linux Certification Study Guide, 7th Edition is fully revised to cover the recently released Red Hat Enterprise Linux 7 and the corresponding RHCSA and RHCE certification exams. This new edition provides complete coverage of all official exam objectives for the new exams.

An integrated study system based on proven pedagogy, this revised bestseller features special elements that reinforce and teach practical skills while preparing candidates for the exam. Each chapter includes step-by-step exercises, Exam Watch and On-the-Job sidebars, Two-Minute Drills, end-of-chapter self tests, and hands-on lab questions. Electronic content includes four complete lab-based practice exams to ensure you’re ready to sit for the live exams.

  • Complete coverage of all exam objectives and performance-based requirements related to the exams, including difficult lab-based scenarios
  • Electronic content includes four complete lab-based practice exams, two for RHSCA and two for RHCE
  • A proven study system for RHCSA and RHCE candidates

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Authors
  6. Contents at a Glance
  7. Contents
  8. Acknowledgments
  9. Preface
  10. Introduction
  11. 1 Prepare for Red Hat Hands-on Certifications
    1. The RHCSA and RHCE Exams
      1. The Exam Experience
      2. The RHCSA Exam
      3. The RHCE Exam
      4. If You’re Studying “Just” for the RHCSA Exam
      5. Evolving Requirements
    2. Basic Hardware Requirements
      1. Hardware Compatibility
      2. Architectures
      3. RAM Requirements
      4. Hard Drive Options
      5. Networking
      6. Virtual Machine Options
    3. Get Red Hat Enterprise Linux
      1. Purchase a Subscription
      2. Get an Evaluation Copy
      3. Third-party Rebuilds
      4. Check the Download
    4. Installation Requirements
      1. You Won’t Start from Scratch
      2. The Advantages of Network Installation
      3. Red Hat and Virtual Machines
      4. Virtual and Physical Systems
      5. A Pre-installed Environment for Practice Labs
      6. System Roles
    5. Installation Options
      1. Boot Media
      2. CD/DVD or Boot USB Starts Installation
      3. Basic Installation Steps
      4. The Installation Perspective on Partitions
      5. Partition Creation Exercise
      6. Exercise 1-1: Partitioning During Installation
      7. Wow, Look at All That Software!
      8. Baseline Packages
      9. Package Groups
      10. During the Installation
    6. System Setup Options
      1. Initial Setup and Firstboot
      2. Default Security Settings
      3. Special Setup Options for Virtual Machines
    7. Configure Default File Sharing Services
      1. Mount and Copy the Installation DVD
      2. Set Up a Default Configuration Apache Server
      3. Exercise 1-2: Configure Apache as an Installation Server
      4. Share Copied Files via FTP Server
      5. Certification Summary
      6.    Two-Minute Drill
      7. Q&A   Self Test
      8. Lab Questions
      9. Self Test Answers
      10. Lab Answers
  12. 2 Virtual Machines and Automated Installations
    1. Configure KVM for Red Hat
      1. Why Virtual Machines
      2. If You Have to Install KVM
      3. The Right KVM Modules
      4. Configure the Virtual Machine Manager
      5. Configuration by Hypervisor
      6. Virtual Networks on a Hypervisor
      7. Exercise 2-1: Create a Second Virtual Network
    2. Configure a Virtual Machine on KVM
      1. Configure a Virtual Machine on KVM
      2. Exercise 2-2: Add Virtual Hard Drives
      3. KVM Configuration Files
      4. Control Virtual Machines from the Command Line
    3. Automated Installation Options
      1. Kickstart Concepts
      2. Set Up Local Access to Kickstart
      3. Set Up Network Access to Kickstart
      4. Sample Kickstart File
      5. Exercise 2-3: Create and Use a Sample Kickstart File
      6. The Kickstart Configurator
    4. Administration with the Secure Shell and Secure Copy
      1. Configure an SSH Client
      2. Command-Line Access
      3. More SSH Command-Line Tools
      4. Graphical Secure Shell Access
    5. Consider Adding These Command-Line Tools
      1. Checking Ports with telnet
      2. Checking Ports with nmap
      3. Configure an E-mail Client
      4. The Use of Text and Graphical Browsers
      5. Using lftp to Access URLs
      6. Certification Summary
      7.    Two-Minute Drill
      8. Q&A   Self Test
      9. Lab Questions
      10. Self Test Answers
      11. Lab Answers
  13. 3 Fundamental Command-Line Skills
    1. Shells
      1. Other Shells
      2. Virtual Terminals
      3. GUI Shell Interfaces
      4. Differences Between Regular and Administrative Users
      5. Text Streams and Command Redirection
    2. Standard Command-Line Tools
      1. File and Directory Concepts
      2. File Lists and ls
      3. File-Creation Commands
      4. Wildcards
      5. File Searches
    3. The Management of Text Files
      1. Commands to Read Text Streams
      2. Commands to Process Text Streams
      3. Edit Text Files at the Console
      4. Exercise 3-1: Using vi to Create a New User
      5. If You Don’t Like vi
      6. Edit Text Files in the GUI
    4. Local Online Documentation
      1. When You Need Help
      2. A Variety of man Pages
      3. The info Manuals
      4. Detailed Documentation in /usr/share/doc
    5. A Networking Primer
      1. IPv4 Networks
      2. Networks and Routing
      3. Tools and Commands
    6. Network Configuration and Troubleshooting
      1. Network Configuration Files
      2. Network Configuration Tools
      3. Exercise 3-2: Configure a Network Card
      4. Configure Name Resolution
      5. Hostname Configuration Files
      6. Hostname Configuration Options
      7. Certification Summary
    7.    Two-Minute Drill
    8. Q&A   Self Test
    9. Lab Questions
    10. Self Test Answers
    11. Lab Answers
  14. 4 RHCSA-Level Security Options
    1. Basic File Permissions
      1. File Permissions and Ownership
      2. Commands to Change Permissions and Ownership
      3. Basic User and Group Concepts
    2. Access Control Lists and More
      1. The getfacl Command
      2. Make a Filesystem ACL Friendly
      3. Manage ACLs on a File
      4. Configure a Directory for ACLs
      5. Configure Default ACLs
      6. ACLs and Masks
      7. Exercise 4-1: Use ACLs to Deny a User
      8. NFS Shares and ACLs
    3. Basic Firewall Control
      1. Standard Ports
      2. A Focus on iptables
      3. Keep That Firewall in Operation
      4. The iptables Service
      5. The firewalld Service
      6. Exercise 4-2: Adjust Firewall Settings
    4. Securing SSH with Key-Based Authentication
      1. SSH Configuration Commands
      2. SSH Client Configuration Files
      3. Basic Encrypted Communication
      4. Set Up a Private/Public Pair for Key-Based Authentication
    5. A Security-Enhanced Linux Primer
      1. Basic Features of SELinux
      2. SELinux Status
      3. SELinux Configuration at the Command Line
      4. Configure Basic SELinux Settings
      5. Configure Regular Users for SELinux
      6. Manage SELinux Boolean Settings
      7. List and Identify SELinux File Contexts
      8. Restore SELinux File Contexts
      9. Identify SELinux Process Contexts
      10. Diagnose and Address SELinux Policy Violations
      11. The GUI SELinux Administration Tool
      12. The SELinux Troubleshoot Browser
      13. Exercise 4-3: Test a SELinux User Type
      14. Certification Summary
    6.    Two-Minute Drill
    7. Q&A   Self Test
    8. Lab Questions
    9. Self Test Answers
    10. Lab Answers
  15. 5 The Boot Process
    1. The BIOS and the UEFI
      1. Basic System Configuration
      2. Startup Menus
      3. Access to Linux Bootloaders
    2. Bootloaders and GRUB 2
      1. GRUB, the GRand Unified Bootloader
      2. Exercise 5-1: Boot into a Different Target
      3. Exercise 5-2: Recover the Root Password
      4. Modify the System Bootloader
      5. How to Update GRUB
      6. The GRUB 2 Command Line
      7. Exercise 5-3: Using the GRUB 2 Command Line
      8. Reinstall GRUB 2
      9. An Option for Booting from GRUB 2: Rescue Mode
    3. Between GRUB 2 and Login
      1. Kernels and the Initial RAM Disk
      2. The First Process, Targets, and Units
      3. Switch Between Targets
      4. Reboot and Shut Down a System Normally
      5. systemd Replaces Upstart and SysVinit
      6. systemd Units
      7. Virtual Terminals and Login Screens
    4. Control by Target
      1. Functionality by Target
      2. The Innards of systemd Units
      3. Service Configuration
    5. Time Synchronization
      1. Time Zone Configuration
      2. Sync the Time with chronyd
      3. Sync the Time with ntpd
      4. Certification Summary
      5.    Two-Minute Drill
      6. Q&A   Self Test
      7. Lab Questions
      8. Self Test Answers
      9. Lab Answers
  16. 6 Linux Filesystem Administration
    1. Storage Management and Partitions
      1. Current System State
      2. The fdisk Utility
      3. The gdisk Utility
      4. The parted Utility
      5. Using parted: Starting, Getting Help, and Quitting
      6. Graphical Options
      7. Exercise 6-1: Work with fdisk and parted
    2. Filesystem Formats
      1. Standard Formatting Filesystems
      2. Journaling Filesystems
      3. Filesystem Format Commands
      4. Swap Volumes
      5. Filesystem Check Commands
      6. Exercise 6-2: Format, Check, and Mount Different Filesystems
    3. Basic Linux Filesystems and Directories
      1. Separate Linux Filesystems
      2. Directories That Can Be Mounted Separately
    4. Logical Volume Management (LVM)
      1. Definitions in LVM
      2. Create a Physical Volume
      3. Create a Volume Group
      4. Create a Logical Volume
      5. Make Use of a Logical Volume
      6. More LVM Commands
      7. Remove a Logical Volume
      8. Resize Logical Volumes
    5. Filesystem Management
      1. The /etc/fstab File
      2. Universally Unique Identifiers in /etc/fstab
      3. The mount Command
      4. More Filesystem Mount Options
      5. Virtual Filesystems
      6. Add Your Own Filesystems to /etc/fstab
      7. Removable Media and /etc/fstab
      8. Networked Filesystems
    6. The Automounter
      1. Mounting via the Automounter
      2. Exercise 6-3: Configure the Automounter
      3. Certification Summary
    7.    Two-Minute Drill
    8. Q&A   Self Test
    9. Lab Questions
    10. Self Test Answers
    11. Lab Answers
  17. 7 Package Management
    1. The Red Hat Package Manager
      1. What Is a Package?
      2. What Is the RPM Database?
      3. What Is a Repository?
      4. Install an RPM Package
      5. Uninstall an RPM Package
      6. Install RPMs from Remote Systems
      7. RPM Installation Security
      8. Special RPM Procedures with the Kernel
    2. More RPM Commands
      1. Package Queries
      2. Package Signatures
      3. File Verification
    3. Dependencies and the yum Command
      1. An Example of Dependency Hell
      2. Relief from Dependency Hell
      3. Basic yum Configuration
      4. The Basic yum Configuration File: yum.conf
      5. Configuration Files in the /etc/yum/pluginconf.d Directory
      6. Configuration Files in the /etc/yum.repos.d Directory
      7. Create Your Own /etc/yum.repos.d Configuration File
      8. Exercise 7-1: Create a yum Repository from the RHEL 7 DVD
      9. Third-party Repositories
      10. Basic yum Commands
      11. Installation Mode
      12. Security and yum
      13. Updates and Security Fixes
      14. Package Groups and yum
      15. More yum Commands
    4. More Package Management Tools
      1. The GNOME Software Update Tool
      2. Automated Updates
      3. GNOME Software Tool
      4. Exercise 7-2: Installing More with yum and the GNOME Software Tool
      5. Red Hat Subscription Manager
      6. Certification Summary
      7.    Two-Minute Drill
      8. Q&A   Self Test
      9. Lab Questions
      10. Self Test Answers
      11. Lab Answers
  18. 8 User Administration
    1. User Account Management
      1. Different Kinds of Users
      2. The Shadow Password Suite
      3. Command-Line Tools
      4. Exercise 8-1: Add a User with the Red Hat User Manager
      5. Exercise 8-2: Real and Fake Shells
      6. Modify an Account
      7. More User and Group Management Commands
    2. Administrative Control
      1. The Ability to Log In as root
      2. Exercise 8-3: Limit root Logins
      3. The Ability to Log In
      4. The Proper Use of the su Command
      5. Limit Access to su
      6. The Proper Use of the sg Command
      7. Custom Administrators with the sudo Command
      8. Other Administrative Users
    3. User and Shell Configuration
      1. Home Directories and /etc/skel
      2. Exercise 8-4: Another Way to Secure a System
      3. Shell Configuration Files in User Home Directories
      4. Login, Logout, and User Switching
    4. Users and Network Authentication
      1. LDAP Client Configuration
      2. The Name Service Switch File
      3. The System Security Service Daemon
      4. Red Hat Network Authentication Tools
    5. Special Groups
      1. Standard and Red Hat Groups
      2. Shared Directories
      3. Exercise 8-5: Control Group Ownership with the SGID Bit
      4. Certification Summary
      5.    Two-Minute Drill
      6. Q&A   Self Test
      7. Lab Questions
      8. Self Test Answers
      9. Lab Answers
  19. 9 RHCSA-Level System Administration Tasks
    1. Elementary System Administration Commands
      1. System Resource Management Commands
      2. Archives and Compression
    2. Automate System Administration: cron and at
      1. The System crontab and Components
      2. Hourly cron Jobs
      3. Regular Anacron Jobs
      4. Setting Up cron for Users
      5. Exercise 9-1: Create a cron Job
      6. Running a Job with the at System
      7. Secure cron and at
    3. Local Log File Analysis
      1. System Log Configuration File
      2. Log File Management
      3. A Variety of Log Files
      4. Service-Specific Logs
      5. Exercise 9-2: Learn the Log Files
      6. View systemd Journal Log Entries
      7. Certification Summary
    4.    Two-Minute Drill
    5. Q&A   Self Test
    6. Lab Questions
    7. Self Test Answers
    8. Lab Answers
  20. 10 A Security Primer
    1. The Layers of Linux Security
      1. Bastion Systems
      2. Best Defenses with Security Updates
      3. Service-Specific Security
      4. Host-Based Security
      5. User-Based Security
      6. Console Security
      7. Recommendations from the U.S. National Security Agency
      8. The PolicyKit
    2. Firewalls and Network Address Translation
      1. Definitions
      2. The Structure of firewalld
      3. Exercise 10-1: Configure Rich Rules
      4. Further Recommendations from the NSA
      5. Make Sure That firewalld Is Running
      6. IP Masquerading
      7. IP Forwarding
      8. The Red Hat Firewall Configuration Tool
    3. TCP Wrappers
      1. Is a Service Protected by TCP Wrappers?
      2. TCP Wrappers Configuration Files
      3. Exercise 10-2: Configure TCP Wrappers
    4. Pluggable Authentication Modules
      1. Configuration Files
      2. Control Flags
      3. The Format of a PAM File
      4. Exercise 10-3: Configure PAM to Limit root Access
      5. PAM and User-Based Security
      6. Exercise 10-4: Use PAM to Limit User Access
    5. Secure Files and More with GPG2
      1. GPG2 Commands
      2. Current GPG2 Configuration
      3. GPG2 Encryption Options
      4. Generate a GPG2 Key
      5. Use a GPG2 Key to Encrypt a File
      6. Certification Summary
    6.    Two-Minute Drill
    7. Q&A   Self Test
    8. Lab Questions
    9. Self Test Answers
    10. Lab Answers
  21. 11 System Services and SELinux
    1. Red Hat System Configuration
      1. Service Management
      2. System Services
      3. Bigger Picture Configuration Process
      4. Available Configuration Tools
    2. Security-Enhanced Linux
      1. Options in the SELinux Booleans Directory
      2. Service Categories of SELinux Booleans
      3. Boolean Configuration with the SELinux Management Tool
      4. Boolean Settings
      5. SELinux File Contexts
      6. SELinux Port Labeling
      7. Exercise 11-1: Configure a New Directory with Appropriate SELinux Contexts
    3. The Secure Shell Server
      1. SSH Server Configuration Files
      2. Configure an SSH Server
      3. Exercise 11-2: Run an SSH Server on a Nonstandard Port
      4. User-Based Security for SSH
      5. Host-Based Security for SSH
    4. A Security and Configuration Checklist
      1. Installation of Server Services
      2. Basic Configuration
      3. Make Sure the Service Survives a Reboot
      4. Review Access Through Layers of Security
      5. Exercise 11-3: Practice Troubleshooting Network Connectivity Issues
      6. Exercise 11-4: Review the Different Effects of firewalld and TCP Wrappers
      7. Certification Summary
    5.    Two-Minute Drill
    6. Q&A   Self Test
    7. Lab Questions
    8. Self Test Answers
    9. Lab Answers
  22. 12 RHCE Administrative Tasks
    1. Automate System Maintenance
      1. Standard Administrative Scripts
      2. Bash Variables
      3. Bash Commands
      4. Exercise 12-1: Create a Script
    2. Set Up System Utilization Reports
      1. System Utilization Commands
      2. The System Activity Report Tool
      3. Collect System Status into Logs
      4. Prepare a System Status Report
    3. Kernel Run-time Parameters
      1. How sysctl Works with /etc/sysctl.conf
      2. Settings in the /etc/sysctl.conf File
      3. Exercise 12-2: Disable Responses to the ping Command
    4. IP Routes
      1. Configure a Default Route
      2. Configure a Static Route
      3. Exercise 12-3: Practice with Static Routes
    5. An Introduction to IPv6
      1. Basic IPv6 Addressing
      2. Troubleshooting Tools
      3. Configure IPv6 Addresses
    6. Network Interface Bonding and Teaming
      1. Configure Interface Bonding
      2. Exercise 12-4: Test Bonding Failover
      3. Configure Interface Teaming
    7. Authentication with Kerberos
      1. A Kerberos Primer
      2. Prerequisites for Kerberos Servers and Clients
      3. Exercise 12-5: Install a Kerberos KDC
      4. Set Up a Kerberos Client
      5. Exercise 12-6: Configure Kerberos Authentication
      6. Certification Summary
    8.    Two-Minute Drill
      1. Q&A   Self Test
      2. Lab Questions
      3. Self Test Answers
      4. Lab Answers
  23. 13 Network Services: DNS, SMTP, iSCSI, and NTP
    1. An Introduction to Domain Name Services
      1. The BIND Name Server
      2. Different Types of DNS Servers
    2. Minimal DNS Server Configurations
      1. BIND Configuration Files
      2. A BIND Caching-Only Name Server
      3. Unbound as a Caching-Only Name Server
      4. DNS Client Troubleshooting
      5. Exercise 13-1: Set Up Your Own BIND DNS Server
      6. Exercise 13-2: Set Up Your Own Unbound DNS Server
    3. A Variety of E-Mail Agents
      1. Definitions and Protocols
      2. Relevant Mail Server Packages
      3. Use the alternatives Command to Select an E-Mail System
      4. General User Security
      5. Mail Logging
      6. Common Security Issues
      7. Testing an E-Mail Server
      8. Exercise 13-3: Create Users Just for E-Mail
    4. The Configuration of Postfix
      1. Configuration Files
      2. The main.cf Configuration File
      3. The /etc/aliases Configuration File
      4. Test the Current Postfix Configuration
      5. Configure Postfix Authentication
      6. Configure Postfix as an SMTP Server for a Domain
      7. Configure Postfix as a Null Client
    5. iSCSI Targets and Initiators
      1. Set Up an iSCSI Target
      2. Connect to Remote iSCSI Storage
    6. The Network Time Service
      1. The NTP Server Configuration File
      2. Certification Summary
      3.    Two-Minute Drill
      4. Q&A   Self Test
      5. Lab Questions
      6. Self Test Answers
      7. Lab Answers
  24. 14 The Apache Web Server
    1. The Apache Web Server
      1. Apache 2.4
      2. The LAMP Stack
      3. Installation
      4. Exercise 14-1: Install the Apache Server
      5. The Apache Configuration Files
      6. Analyze the Default Apache Configuration
      7. The Main Apache Configuration File
      8. Basic Apache Configuration for a Simple Web Server
      9. Apache Log Files
    2. Standard Apache Security Configuration
      1. Ports and Firewalls
      2. Apache and SELinux
      3. Module Management
      4. Security Within Apache
      5. Exercise 14-2: The Apache Welcome and the noindex.html Story
      6. Exercise 14-3: Create a List of Files
      7. Host-Based Security
      8. User-Based Security
    3. Specialized Apache Directories
      1. Control Through the .htaccess File
      2. Password-Protected Access
      3. Home Directory Access
      4. Group-Managed Directories
      5. Exercise 14-4: Password Protection for a Web Directory
    4. Regular and Secure Virtual Hosts
      1. The Standard Virtual Host
      2. Secure Virtual Hosts
      3. Create a New TLS Certificate
      4. Test Pages
      5. Syntax Checkers
      6. Apache Troubleshooting
      7. Exercise 14-5: Set Up a Virtual Web Server
    5. Deploy a Basic CGI Application
      1. Apache Configuration Changes for CGI Files
      2. Set Up a Simple CGI Script in Perl
      3. Connections to a Website
      4. Certification Summary
    6.    Two-Minute Drill
      1. Q&A   Self Test
      2. Lab Questions
      3. Self Test Answers
      4. Lab Answers
  25. 15 The Samba File Server
    1. Samba Services
      1. Install Samba Services
      2. Some Samba Background
      3. Ports, Firewalls, and Samba
      4. Configure SELinux Booleans for Samba
      5. Configure SELinux File Contexts for Samba
      6. Samba Daemons
      7. Samba Server Global Configuration
      8. Shared Samba Directories
      9. Let Samba Join a Domain
      10. The Samba User Database
      11. Create a Public Share
      12. Test Changes to /etc/samba/smb.conf
      13. Exercise 15-1: Configure a Samba Home Directory Share
    2. Samba as a Client
      1. Command-Line Tools
      2. Mount Options
      3. Automated Samba Mounts
      4. Exercise 15-2: Configuring a Samba Share for Group Collaboration
      5. Multiuser Samba Mounts
    3. Samba Troubleshooting
      1. Samba Problem Identification
      2. Local Log File Checks
      3. Certification Summary
    4.    Two-Minute Drill
      1. Q&A   Self Test
      2. Lab Questions
      3. Self Test Answers
      4. Lab Answers
  26. 16 NFS Secured with Kerberos
    1. The Network File System (NFS) Server
      1. NFS Options for RHEL 7
      2. Basic NFS Installation
      3. Basic NFS Server Configuration
      4. Configure NFS for Basic Operation
      5. Fixed Ports in /etc/sysconfig/nfs
      6. Make NFS Work with SELinux
      7. Quirks and Limitations of NFS
      8. Performance Tips
      9. NFS Security Directives
      10. Options for Host-Based Security
      11. Options for User-Based Security
      12. Exercise 16-1: NFS
    2. Test an NFS Client
      1. NFS Mount Options
      2. Configure NFS in /etc/fstab
      3. Diskless Clients
      4. Current NFS Status
    3. NFS with Kerberos
      1. Kerberos-Enabled NFS Services
      2. Configure NFS Exports with Kerberos
      3. Configure NFS Clients with Kerberos
      4. Exercise 16-2: Prepare a System for NFS Secured with Kerberos
      5. Exercise 16-3: Configure a Kerberos-Enabled NFS Share
      6. Certification Summary
    4.    Two-Minute Drill
      1. Q&A   Self Test
      2. Lab Questions
      3. Self Test Answers
      4. Lab Answers
  27. 17 The MariaDB Server
    1. Introduction to MariaDB
      1. MariaDB Installation
      2. Initial Configuration
      3. Exercise 17-1: Install and Secure MariaDB
      4. Run MariaDB on a Nonstandard TCP Port
      5. Exercise 17-2: Run MariaDB on a Nonstandard TCP Port
    2. Database Management
      1. Database Concepts
      2. Working with Databases
      3. Working with Tables
      4. Exercise 17-3: Create a Table
    3. Simple SQL Queries
      1. The INSERT SQL Command
      2. The SELECT SQL Command
      3. The DELETE SQL Command
      4. The UPDATE SQL Command
      5. Exercise 17-4: Practice with Simple SQL Queries
    4. Secure MariaDB
      1. Host-Based Security
      2. User-Based Security
      3. Exercise 17-5: Practice MariaDB User’s Permissions
    5. Database Backup and Recovery
      1. Back Up and Restore with mysqldump
      2. Back Up with a Dump of the Data to a Text File
      3. Certification Summary
      4.    Two-Minute Drill
      5. Q&A   Self Test
      6. Lab Questions
      7. Self Test Answers
      8. Lab Answers
  28. A  Prepare a System for the Sample Exams
    1. Basic Sample Exam System Requirements
    2. Additional Sample Exam System Requirements for the RHCE
  29. B   Sample Exam 1: RHCSA
    1. RHCSA Sample Exam 1 Discussion
  30. C  Sample Exam 2: RHCSA
    1. RHCSA Sample Exam 2 Discussion
  31. D    Sample Exam 3: RHCE Sample Exam 1
    1. RHCE Sample Exam 1 Discussion
  32. E   Sample Exam 4: RHCE Sample Exam 2
    1. RHCE Sample Exam 2 Discussion
  33. F    About the DVD
    1. System Requirements
    2. Electronic Book
    3. Technical Support
  34. Glossary
  35. Index
3.141.41.187