Free Red Hat Certified Engineer (RHCE) exam for Red Hat Enterprise Linux 8 Exam EX294 Exam Practice Test
EX294 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 35
-
Install and configure ansibleUser bob has been created on your control node. Give him the appropriate permissions on the control node. Install the necessary packages to run ansible on the control node.Create a configuration file /home/bob/ansible/ansible.cfg to meet the following requirements:* The roles path should include /home/bob/ansible/roles, as well as any other path that may be required for the course of the sample exam.* The inventory file path is /home/bob/ansible/inventory.* Ansible should be able to manage 10 hosts at a single time.* Ansible should connect to all managed nodes using the bob user.Create an inventory file for the following five nodes:Configure these nodes to be in an inventory file where node1 is a member of group dev. nodc2 is a member of group test, nodc3 is a member of group proxy, nodc4 and node 5 are members of group prod. Also, prod is a member of group webservers.
Answer: A Next Question -
Create a file called adhoc.sh in /home/sandy/ansible which will use adhoc commands to set up a new repository. The name of the repo will be 'EPEL' the description 'RHEL8' the baseurl is 'https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rmp' there is no gpgcheck, but you should enable the repo.* You should be able to use an bash script using adhoc commands to enable repos. Depending on your lab setup, you may need to make this repo 'state=absent' after you pass this task.
Answer: A Next Question -
Create an ansible vault password file called lock.yml with the password reallysafepw in the /home/sandy/ansible directory. In the lock.yml file define two variables. One is pw_dev and the password is 'dev' and the other is pw_mgr and the password is 'mgr' Create a regular file called secret.txt which contains the password for lock.yml.
Answer: A Next Question -
Create user accounts--------------------------> A list of users to be created can be found in the file called user_list.ymlsave to /home/admin/ansible/--> Using the password vault created elsewhere in this exam, create a playbook calledcreate_user.ymlthat creates user accounts as follows:--> Users with a job description of developer should be:--> created on managed nodes in the 'dev' and 'test' host groups assigned thepassword from the 'dev_pass'variable and these user should be member of supplementary group 'devops'.--> Users with a job description of manager should be:--> created on managed nodes in the 'prod' host group assigned the password fromthe 'mgr_pass' variableand these user should be member of supplementary group 'opsmgr'--> Passwords should use the 'SHA512' hash format. Your playbook should work usingthe vault password filecreated elsewhere in this exam.while practising you to create these file hear. But in exam have to download as perquestation.user_list.yml file consist:---user:- name: user1job: developer- name: user2job: manager
Answer: A Next Question -
Create a playbook called timesvnc.yml in /home/sandy/ansible using rhel system role timesync. Set the time to use currently configured nip with the server 0.uk.pool.ntp.org. Enable burst. Do this on all hosts.
Answer: A Next Question -
Create a file called requirements.yml in /home/sandy/ansible/roles to install two roles. The source for the first role is geerlingguy.haproxy and geerlingguy.php. Name the first haproxy-role and the second php-role. The roles should be installed in /home/sandy/ansible/roles.
Answer: A Next Question -
Create and run an Ansible ad-hoc command.--> As a system administrator, you will need to install software on the managednodes.--> Create a shell script called yum-pack.sh that runs an Ansible ad-hoc command tocreate yum-repository on each of the managed nodes as follows:--> repository1-----------1. The name of the repository is EX4072. The description is 'Ex407 Description'4. GPG signature checking is enabledrelease6. The repository is enabled--> repository2-----------1. The name of the repository is EXX4072. The description is 'Exx407 Description'4. GPG signature checking is enabledrelease6. The repository is enabled
Answer: A Next Question -
Modify file content.------------------------Create a playbook called /home/admin/ansible/modify.yml as follows:* The playbook runs on all inventory hosts* The playbook replaces the contents of /etc/issue with a single line of text asfollows:--> On hosts in the dev host group, the line reads: ''Development''--> On hosts in the test host group, the line reads: ''Test''--> On hosts in the prod host group, the line reads: ''Production''
Answer: A Next Question -
Create a playbook called issue.yml in /home/sandy/ansible which changes the file /etc/issue on all managed nodes: If host is a member of (lev then write 'Development' If host is a member of test then write 'Test' If host is a member of prod then write 'Production'
Answer: A Next Question -
Create a role called sample-apache in /home/sandy/ansible/roles that enables and starts httpd, enables and starts the firewall and allows the webserver service. Create a template called index.html.j2 which creates and serves a message from /var/www/html/index.html Whenever the content of the file changes, restart the webserver service.Welcome to [FQDN] on [IP]Replace the FQDN with the fully qualified domain name and IP with the ip address of the node using ansible facts. Lastly, create a playbook in /home/sandy/ansible/ called apache.yml and use the role to serve the index file on webserver hosts.
Answer: A Next Question
Total Questions: 35