Free Red Hat Certified Specialist in Ansible Automation Exam EX407 Exam Practice Test
EX407 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 41
-
===================================================================================control.realmX.example.com _ workstation.lab.example.comnode1.realmX.example.com _ servera.lab.example.comnode2.realmX.example.com _ serverb.lab.example.comnode3.realmX.example.com _ serverc.lab.example.comnode4.realmX.example.com _ serverd.lab.example.comnode5.realmX.example.com- username:root, password:redhat- username:admin, password:redhatnote1. don't change 'root' or 'admin' password.note2. no need to create ssh-keygen for access, its pre-definednote3. SELinux is in enforcing mode and firewalld is disabled/stop on whole managed hosts.===================================================================================Install the RHEL system roles package and create a playbook called timesync.yml that:--> Runs over all managed hosts.--> Uses the timesync role.--> Configures the role to use the time server 192.168.10.254 ( Hear in redhat labuse 'classroom.example.com' )--> Configures the role to set the iburst parameter as enabled.
Answer: A Next Question -
Install and configure ansibleUser bob has been created on your control node. Give him the appropriate permissions on the control node. Install the necessary packages to run ansible on the control node.Create a configuration file /home/bob/ansible/ansible.cfg to meet the following requirements:* The roles path should include /home/bob/ansible/roles, as well as any other path that may be required for the course of the sample exam.* The inventory file path is /home/bob/ansible/inventory.* Ansible should be able to manage 10 hosts at a single time.* Ansible should connect to all managed nodes using the bob user.Create an inventory file for the following five nodes:Configure these nodes to be in an inventory file where node1 is a member of group dev. nodc2 is a member of group test, nodc3 is a member of group proxy, nodc4 and node 5 are members of group prod. Also, prod is a member of group webservers.
Answer: A Next Question -
===================================================================================control.realmX.example.com _ workstation.lab.example.comnode1.realmX.example.com _ servera.lab.example.comnode2.realmX.example.com _ serverb.lab.example.comnode3.realmX.example.com _ serverc.lab.example.comnode4.realmX.example.com _ serverd.lab.example.comnode5.realmX.example.com- username:root, password:redhat- username:admin, password:redhatnote1. don't change 'root' or 'admin' password.note2. no need to create ssh-keygen for access, its pre-definednote3. SELinux is in enforcing mode and firewalld is disabled/stop on whole managed hosts.===================================================================================Use Ansible Galaxy with a requirements file called /home/admin/ansible/roles/install.yml to download and install roles to /home/admin/ansible/roles from thefollowing URLs:http:// classroom.example.com /role1.tar.gz The name of this role should be balancerhttp:// classroom.example.com /role2.tar.gz The name of this role should be phphello
Answer: A Next Question -
===================================================================================control.realmX.example.com _ workstation.lab.example.comnode1.realmX.example.com _ servera.lab.example.comnode2.realmX.example.com _ serverb.lab.example.comnode3.realmX.example.com _ serverc.lab.example.comnode4.realmX.example.com _ serverd.lab.example.comnode5.realmX.example.com- username:root, password:redhat- username:admin, password:redhatnote1. don't change 'root' or 'admin' password.note2. no need to create ssh-keygen for access, its pre-definednote3. SELinux is in enforcing mode and firewalld is disabled/stop on whole managed hosts.===================================================================================Generate a hosts file:hosts.j2 to/home/admin/ansible/ Complete the template so that it can be used to generate a filewith aline for each inventory host in the same format as /etc/hosts:172.25.250.9 workstation.lab.example.com workstation* Create a playbook called gen_hosts.yml that uses this template to generate the file/etc/myhosts on hosts in the dev host group.* When completed, the file /etc/myhosts on hosts in the dev host group should have aline foreach managed host:127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4::1 localhost localhost.localdomain localhost6 localhost6.localdomain6172.25.250.10 serevra.lab.example.com servera172.25.250.11 serevrb.lab.example.com serverb172.25.250.12 serevrc.lab.example.com serverc172.25.250.13 serevrd.lab.example.com serverd-----------------------------------------------------------------while practising you to create these file hear. But in exam have to download as perquestation.hosts.j2 file consists.localhost localhost.localdomain localhost4 localhost4.localdomain4::1localhost localhost.localdomain localhost6 localhost6.localdomain6-------------------------------------------------------------------
Answer: A Next Question -
Create a playbook that changes the default target on all nodes to multi-user tarqet. Do this in playbook file called target.yml in /home/sandy/ansible
Answer: A Next Question -
===================================================================================control.realmX.example.com _ workstation.lab.example.comnode1.realmX.example.com _ servera.lab.example.comnode2.realmX.example.com _ serverb.lab.example.comnode3.realmX.example.com _ serverc.lab.example.comnode4.realmX.example.com _ serverd.lab.example.comnode5.realmX.example.com- username:root, password:redhat- username:admin, password:redhatnote1. don't change 'root' or 'admin' password.note2. no need to create ssh-keygen for access, its pre-definednote3. SELinux is in enforcing mode and firewalld is disabled/stop on whole managed hosts.===================================================================================Create Logical volumes with lvm.yml in all nodes according to followingrequirements.----------------------------------------------------------------------------------------* Create a new Logical volume named as 'data'* LV should be the member of 'research' Volume Group* LV size should be 1500M* It should be formatted with ext4 file-system.--> If Volume Group does not exist then it should print the message 'VG Not found'--> If the VG can not accommodate 1500M size then it should print 'LV Can not becreated withfollowing size', then the LV should be created with 800M of size.--> Do not perform any mounting for this LV.
Answer: A Next Question -
Create a file called specs.empty in home/bob/ansible on the local machine as follows:HOST=MEMORY=BIOS=VDA_DISK_SIZE=VDB_DISK_SIZE=Create the playbook /home/bob/ansible/specs.yml which copies specs.empty to all remote nodes' path /root/specs.txt. Using the specs.yml playbook then edit specs.txt on the remote machines to reflect the appropriate ansible facts.
Answer: A Next Question -
Install and configure ansibleUser sandy has been created on your control node with the appropriate permissions already, do not change or modify ssh keys. Install the necessary packages to run ansible on the control node. Configure ansible.cfg to be in folder /home/sandy/ansible/ansible.cfg and configure to access remote machines via the sandy user. All roles should be in the path /home/sandy/ansible/roles. The inventory path should be in /home/sandy/ansible/invenlory.You will have access to 5 nodes.node3.example.comConfigure these nodes to be in an inventory file where node I is a member of group dev. nodc2 is a member of group test, node3 is a member of group proxy, nodc4 and node 5 are members of group prod. Also, prod is a member of group webservers.
Answer: A Next Question -
===================================================================================control.realmX.example.com _ workstation.lab.example.comnode1.realmX.example.com _ servera.lab.example.comnode2.realmX.example.com _ serverb.lab.example.comnode3.realmX.example.com _ serverc.lab.example.comnode4.realmX.example.com _ serverd.lab.example.comnode5.realmX.example.com- username:root, password:redhat- username:admin, password:redhatnote1. don't change 'root' or 'admin' password.note2. no need to create ssh-keygen for access, its pre-definednote3. SELinux is in enforcing mode and firewalld is disabled/stop on whole managed hosts.===================================================================================Create a playbook called hwreport.yml that produces an output file called /root/hwreport.txt on all managed nodes with the following information:--------------------------------------------------------------------------------------------------------> Inventory host name--> Total memory in MB--> BIOS version--> Size of disk device vda--> Size of disk device vdbEach line of the output file contains a single key-value pair.* Your playbook should:hwreport.empty andsave it as /root/hwreport.txt--> Modify with the correct values.note: If a hardware item does not exist, the associated value should be set to NONE----------------------------------------------------------------------------------------------while practising you to create these file hear. But in exam have to download as perquestation.hwreport.txt file consists.my_sys=hostnamemy_BIOS=biosversionmy_MEMORY=memorymy_vda=vdasizemy_vdb=vdbsize
Answer: A Next Question -
Create an ansible vault password file called lock.yml with the password reallysafepw in the /home/sandy/ansible directory. In the lock.yml file define two variables. One is pw_dev and the password is 'dev' and the other is pw_mgr and the password is 'mgr' Create a regular file called secret.txt which contains the password for lock.yml.
Answer: A Next Question
Total Questions: 41