Exam Objectives

Exam objective "Build a simple RPM that packages a single file" has been removed from the list of current exam objectives.

The Red Hat Certified System Administrator (RHCSA™) and the Red Hat Certified Engineer (RHCE™) certification exams are performance-based, hands-on practical exams designed for IT professionals. These exams are presented in electronic format. During the exams, the candidates do not have access to the Internet or other printed or electronic documentation except for what comes standard with the RHEL6 operating system software. The official exam objectives are listed at http://www.redhat.com/training/courses/ex200/examobjective for RHCSA and that for RHCE at http://www.redhat.com/training/courses/ex300/examobjective. Visit the URLs for up-to-date and more in-depth information. The exam objectives are covered in sufficient detail in the chapters throughout this book. A list of the exam objectives is presented below along with chapter numbers where the objectives are discussed.

RHCSA Specific Skills:

Understand and Use Essential Tools:

  • Access a shell prompt and issue commands with correct syntax (chapter 2)
  • Use input-output redirection (>, >>, |, 2>, etc) (chapter 4)
  • Use grep and regular expressions to analyze text (chapter 3)
  • Access remote systems using ssh and VNC (chapter 2)
  • Log in and switch users in multiuser run levels (chapter 11)
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2 (chapter 2)
  • Create and edit text files (chapter 4)
  • Create, delete, copy, and move files and directories (chapter 3)
  • Create hard and soft links (chapter 3)
  • List, set, and change standard ugo/rwx permissions (chapter 4)
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc (chapter 2)

Operate Running Systems

  • Boot, reboot, and shut down a system normally (chapter 8)
  • Boot systems into different runlevels manually (chapter 8)
  • Use single-user mode to gain access to a system (chapter 8)
  • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes (chapter 5)
  • Locate and interpret system log files (chapter 8)
  • Access a virtual machine's console (chapter 7)
  • Start and stop virtual machines (chapter 7)
  • Start, stop, and check the status of network services (chapter 8)

Configure Local Storage

  • List, create, delete, and set partition type for primary, extended, and logical partitions (chapter 9)
  • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes (chapter 9)
  • Create and configure LUKS-encrypted partitions and logical volumes to prompt for password and mount a decrypted file system at boot (chapter 10)
  • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label (chapter 10)
  • Add new partitions and logical volumes, and swap to a system non-destructively (chapters 9 and 10)

Create and Configure File Systems

  • Create, mount, unmount, and use ext2, ext3, and ext4 file systems (chapter 10)
  • Mount, unmount, and use LUKS-encrypted file systems (chapter 10)
  • Mount and unmount CIFS and NFS network file systems (chapters 10, 19, and 20)
  • Configure systems to mount ext4, LUKS-encrypted, and network file systems automatically (chapter 10)
  • Extend existing unencrypted ext4-formatted logical volumes (chapter 9)
  • Create and configure set-GID directories for collaboration (chapter 4)
  • Create and manage Access Control Lists (ACLs) (chapter 10)
  • Diagnose and correct file permission problems (chapter 4)

Deploy, Configure, and Maintain Systems

  • Configure networking and hostname resolution statically or dynamically (chapter 13)
  • Schedule tasks using cron (chapter 5)
  • Configure systems to boot into a specific runlevel automatically (chapter 8)
  • Install Red Hat Enterprise Linux automatically using Kickstart (chapter 7)
  • Configure a physical machine to host virtual guests (chapter 7)
  • Install Red Hat Enterprise Linux systems as virtual guests (chapter 7)
  • Configure systems to launch virtual machines at boot (chapter 7)
  • Configure network services to start automatically at boot (chapter 8)
  • Configure a system to run a default configuration HTTP server (chapter 7)
  • Configure a system to run a default configuration FTP server (chapter 7)
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system (chapter 6)
  • Update the kernel package appropriately to ensure a bootable system (chapter 8)
  • Modify the system bootloader (chapter 8)

Manage Users and Groups

  • Create, delete, and modify local user accounts (chapter 11)
  • Change passwords and adjust password aging for local user accounts (chapter 11)
  • Create, delete, and modify local groups and group memberships (chapter 11)
  • Configure a system to use an existing LDAP directory service for user and group information (chapter 13)

Manage Security

  • Configure firewall settings using system-config-firewall or iptables (chapter 12)
  • Set enforcing and permissive modes for SELinux (chapter 12)
  • List and identify SELinux file and process context (chapter 12)
  • Restore default file contexts (chapter 12)
  • Use boolean settings to modify system SELinux settings (chapter 12)
  • Diagnose and address routine SELinux policy violations (chapter 12)

RHCE™ Specific Skills:

System Configuration and Management

  • Route IP traffic and create static routes (chapter 16)
  • Use iptables to implement packet filtering & configure network address translation (NAT) (chapter 15)
  • Use /proc/sys and sysctl to modify and set kernel runtime parameters (chapter 17)
  • Configure a system to authenticate using Kerberos (chapter 16)
  • Build a simple RPM that packages a single file (chapter 14)
  • Configure a system as an iSCSI initiator that persistently mounts an iSCSI target (chapter 14)
  • Produce and deliver reports on system utilization (processor, memory, disk, and network) (chapter 15)
  • Use shell scripting to automate system maintenance tasks (chapter 14)
  • Configure a system to log to a remote system (chapter 15)
  • Configure a system to accept logging from a remote system (chapter 15)

Network Services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

  • Install the packages needed to provide the service
  • Configure SELinux to support the service
  • Configure the service to start when the system is booted
  • Configure the service for basic operation
  • Configure host-based and user-based security for the service

HTTP/HTTPS (chapter 21)

  • Configure a virtual host
  • Configure private directories
  • Deploy a basic CGI application
  • Configure group-managed content

DNS (chapter 16)

  • Configure a caching-only name server
  • Configure a caching-only name server to forward DNS queries

FTP (chapter 20)

  • Configure anonymous-only download

NFS (chapter 19)

  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration

SMB (chapter 20)

  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration

SMTP (chapter 18)

  • Configure a mail transfer agent (MTA) to accept inbound email from other systems
  • Configure an MTA to forward (relay) email through a smart host

SSH (chapter 21)

  • Configure key-based authentication
  • Configure additional options described in documentation

NTP (chapter 17)

  • Synchronize time using other NTP peers
Red Hat Certified System Administrator (EX200) and the Red Hat Certified Engineer (EX300)
Google Book Search