{"id":155,"date":"2016-11-12T14:34:47","date_gmt":"2016-11-12T13:34:47","guid":{"rendered":"http:\/\/miroslaw.borodziuk.eu\/?p=155"},"modified":"2017-08-15T16:26:10","modified_gmt":"2017-08-15T14:26:10","slug":"wymagania-na-egzamin","status":"publish","type":"post","link":"http:\/\/miro.borodziuk.eu\/index.php\/2016\/11\/12\/wymagania-na-egzamin\/","title":{"rendered":"Wymagania na egzamin RHCSA EX200"},"content":{"rendered":"<p><span style=\"color: #ff0000;\">Understand and Use Essential Tools:<\/span><br \/>\n1. Access a shell prompt and issue commands with correct syntax<br \/>\n2. Use input-output redirection (&gt;, &gt;&gt;, |, 2&gt;, etc)<br \/>\n3. Use grep and regular expressions to analyze text<br \/>\n4. Access remote systems using ssh<br \/>\n5. Log in and switch users in multiuser targets<br \/>\n6. Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2<!--more--><br \/>\n7. Create and edit text files<br \/>\n8. Create, delete, copy, and move files and directories<br \/>\n9. Create hard and soft links<br \/>\n10. List, set, and change standard ugo\/rwx permissions (chapter 3)<br \/>\n11. Locate, read, and use system documentation including man, info, and files in \/usr\/share\/doc (chapter 2)<\/p>\n<p><span style=\"color: #ff0000;\">Operate Running Systems<\/span><br \/>\n12. Boot, reboot, and shut down a system normally (chapter 7)<br \/>\n13. Boot systems into different targets manually (chapter 7)<br \/>\n14. Interrupt the boot process in order to gain access to a system (chapter 7)<br \/>\n15. Identify CPU\/memory intensive processes, adjust process priority with renice, and kill processes (chapter 4)<br \/>\n16. Locate and interpret system log files and journals (chapter 7)<br \/>\n17. Access a virtual machine\u2019s console (chapter 6)<br \/>\n18. Start and stop virtual machines (chapter 6)<br \/>\n19. Start, stop, and check the status of network services (chapter 7)<br \/>\n20. Securely transfer files between systems (chapter 13)<\/p>\n<p><span style=\"color: #ff0000;\">Configure Local Storage<\/span><br \/>\n21. List, create, and delete partitions on MBR and GPT disks (chapter 9)<br \/>\n22. Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes (chapter<br \/>\n9)<br \/>\n23. Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label (chapter 10)<br \/>\n24. Add new partitions and logical volumes, and swap to a system non-destructively (chapters 9 and 10)<\/p>\n<p><span style=\"color: #ff0000;\">Create and Configure File Systems<\/span><br \/>\n25. Create, mount, unmount, and use vfat, ext4, and xfs file systems (chapter 10)<br \/>\n26. Mount and unmount CIFS and NFS network file systems (chapters 10, 20, and 21)<br \/>\n27. Extend existing logical volumes (chapter 9)<br \/>\n28. Create and configure set-GID directories for collaboration (chapter 3)<br \/>\n29. Create and manage Access Control Lists (ACLs) (chapter 10)<br \/>\n30. Diagnose and correct file permission problems (chapter 3)<\/p>\n<p><span style=\"color: #ff0000;\">Deploy, Configure, and Maintain Systems<\/span><br \/>\n31. Configure networking and hostname resolution statically or dynamically (chapter 12 and 15)<br \/>\n32. Schedule tasks using at and cron (chapter 4)<br \/>\n33. Start and stop services and configure services to start automatically at boot (chapter 7)<br \/>\n34. Configure systems to boot into a specific target automatically (chapter 7)<br \/>\n35. Install Red Hat Enterprise Linux automatically using Kickstart (chapter 6)<br \/>\n36. Configure a physical machine to host virtual guests (chapter 6)<br \/>\n37. Install Red Hat Enterprise Linux systems as virtual guests (chapter 6)<br \/>\n38. Configure systems to launch virtual machines at boot (chapter 6)<br \/>\n39. Configure network services to start automatically at boot (chapter 7)<br \/>\n40. Configure a system to use time services (chapter 12 and 16)<br \/>\n41. Install and update software packages from Red Hat Network, a remote repository, or from the local file system (chapter 5)<br \/>\n42. Update the kernel package appropriately to ensure a bootable system (chapter 7)<br \/>\n43. Modify the system bootloader (chapter 7)<\/p>\n<p><span style=\"color: #ff0000;\">Manage Users and Groups<\/span><br \/>\n44. Create, delete, and modify local user accounts (chapter 8)<br \/>\n45. Change passwords and adjust password aging for local user accounts (chapter 8)<br \/>\n46. Create, delete, and modify local groups and group memberships (chapter 8)<br \/>\n47. Configure a system to use an existing authentication service for user and group information (chapter 12)<\/p>\n<p><span style=\"color: #ff0000;\">Manage Security<\/span><br \/>\n48. Configure firewall settings using firewall-config, firewall-cmd, or iptables (chapter 11)<br \/>\n49. Configure key-based authentication for SSH (chapter 13)<br \/>\n50. Set enforcing and permissive modes for SELinux (chapter 11)<br \/>\n51. List and identify SELinux file and process context (chapter 11)<br \/>\n52. Restore default file contexts (chapter 11)<br \/>\n53. Use boolean settings to modify system SELinux settings (chapter 11)<br \/>\n54. Diagnose and address routine SELinux policy violations (chapter 11)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understand and Use Essential Tools: 1. Access a shell prompt and issue commands with correct syntax 2. Use input-output redirection (&gt;, &gt;&gt;, |, 2&gt;, etc) 3. Use grep and regular expressions to analyze text 4. Access remote systems using ssh 5. Log in and switch users in multiuser targets 6. Archive, compress, unpack, and uncompress &hellip; <\/p>\n<p class=\"link-more\"><a href=\"http:\/\/miro.borodziuk.eu\/index.php\/2016\/11\/12\/wymagania-na-egzamin\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Wymagania na egzamin RHCSA EX200&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1143,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"_links":{"self":[{"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/posts\/155"}],"collection":[{"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":8,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/posts\/155\/revisions"}],"predecessor-version":[{"id":1766,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/posts\/155\/revisions\/1766"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/media\/1143"}],"wp:attachment":[{"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/media?parent=155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/categories?post=155"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/miro.borodziuk.eu\/index.php\/wp-json\/wp\/v2\/tags?post=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}