Here are some of the key points from the certification objectives in Chapter 1.
❑ | The Red Hat exams are given on computers built for an Intel-based 32-bit architecture. |
❑ | An Intel-architecture PC has three basic communications channels: IRQ ports, I/O addresses, and DMA channels. |
❑ | The latest version of Red Hat Enterprise Linux as certified should have at least 256MB of RAM. |
❑ | You can set up Linux on IDE, SCSI, USB, or IEEE 1394 hard drives. However, the BIOS of a PC can load Linux boot files only from the first two PATA, SATA, or SCSI drives. |
❑ | Linux is managed through a series of text configuration files. |
❑ | Understanding text editors is a critical skill. If you ever have to recover your system with a rescue CD, you may not have access to the GUI and will need to know how to use a console-based text editor such as vi. |
❑ | Linux directories are organized to the Filesystem Hierarchy Standard (FHS). |
❑ | In the FHS, devices such as mice and hard drives are grouped in the /dev directory. Some /dev files have logical names such as dvdwriter and are linked to the actual device files. |
❑ | FHS partitions can be managed and formatted with the fdisk, fsck, and mkfs commands. |
❑ | The Logical Volume Manager allows you to consolidate multiple partitions in one filesystem, on one directory. |
❑ | Once configured, Linux directories can be mounted on a partition through /etc/fstab or directly with the mount command. |
❑ | Linux administrators need to know how to use the command line interface. |
❑ | Basic commands allow you to navigate, find the files that you need, read file contents, create new files, and more. |
❑ | File filters allow you to search through the files themselves for specific citations or other file characteristics. |
❑ | Administrative commands allow you to manage Linux in a number of ways, including running processes and managing logged-in users. |
❑ | The default Red Hat Enterprise Linux print system is CUPS. |
❑ | You can configure printers by directly editing the files in the /etc/cups directory or by opening the Red Hat Printer Configuration tool with the system-config-printer command. |
❑ | Command lines are based on a shell. |
❑ | With the right permissions, you can set up shell programs in executable scripts. |
❑ | The way a shell works depends on the settings in its variables and parameters. Some variables and parameters are grouped in the inherited environment, which maintains settings from shell to shell. |
❑ | With stdin, stdout, and stderr, you can manage different data streams. |
❑ | Basic security within Linux is based on file permissions, users, groups, and umask. |
❑ | The SUID and SGID bits allow you to share owner-level permissions with different users and groups. |
❑ | Shadow passwords hide user authentication data. The Shadow Password Suite protects user and group passwords in files that should be accessible only to the root user. |
❑ | While it's normally best to log in as a regular user, it's faster to log in as the root user for the RHCE and RHCT exams. |
❑ | Standard files for new users are kept in /etc/skel. |
❑ | Daemons are processes that run in the background. |
❑ | Network service can be controlled through scripts in the /etc/init.d and /etc/ xinetd.d directories. |
❑ | The cron daemon helps you schedule different jobs, including backup and restore jobs, which should be done when network use is at a minimum. |
❑ | When you have problems, system log files, as organized by /etc/syslog.conf, provide important clues to the causes. |
❑ | Most of the work in TCP/IP networking is in configuring IP addresses. |
❑ | There are three different sets of private IPv4 addresses suitable for setting up TCP/IP on a LAN. |
❑ | IPv6 addresses include all available IPv4 addresses. If the first three bits of an IPv6 address are 001, that is a unicast address-in other words, one that is associated with a specific computer or other device. |
❑ | The first 48 bits of an IPv6 address are typically associated with a specific network. |
❑ | Tools such as ping, ping6, ifconfig, and netstat can help you diagnose problems on that LAN. |
❑ | Name resolution configuration files determine how your computer finds the right IP address. |
❑ | There are a number of standard network services, including NFS, sendmail, POP, IMAP, FTP, DNS, DHCP, Samba, Apache, and NIS. |
❑ | Each of these services, when installed, can be configured to start and stop through the scripts located in the /etc/rc.d/init.d or /etc/xinetd.d directories. |
❑ | Basic network security settings can depend on allowing or denying access to different computers by their IP addresses or by the desired TCP/IP port. |
❑ | Computers behind a firewall can be protected through Network Address Translation or various iptables commands. |
❑ | While GUI e-mail clients should be trivial, it's important to know how to configure a command line e-mail client. |
❑ | While GUI Web browsers should be trivial for serious Red Hat exam candidates, it can help to know a text-based browser such as elinks. |
❑ | While GUI FTP clients should be trivial for serious Red Hat exam candidates, it can help to understand a text-based FTP client such as lftp. |
❑ | There is no evidence that you need to know how to download the Red Hat installation CDs for the Red Hat exams. |
❑ | While the best option is to download the RHEL 5 CDs from the Red Hat Network, excellent options are available. |
❑ | You can use the rebuild distributions to prepare for the Red Hat exams. Their distributions are built on the same source code used by Red Hat for RHEL 5. |