Red Hat Certified System Administrator (RHCSA) Practice QA | Shikhar Verma | Skillshare

Playback Speed


  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x

Red Hat Certified System Administrator (RHCSA) Practice QA

teacher avatar Shikhar Verma, Solution Architect

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Lessons in This Class

24 Lessons (1h 47m)
    • 1. Introduction

      5:58
    • 2. Lec1 Network Setup

      4:13
    • 3. Practice Lab on Network Setup

      7:09
    • 4. Recover root password

      4:24
    • 5. Set HostName & Boot Target

      2:38
    • 6. Enable SELinux

      2:39
    • 7. Create User, Groups & Group Membership

      5:34
    • 8. Directory Permission & Ownsership

      4:24
    • 9. Enable IP Forwarding

      2:09
    • 10. Users and Permissions

      5:50
    • 11. Add User

      3:16
    • 12. Create an Archive

      1:46
    • 13. Search the string

      1:24
    • 14. Create a Physical Partition

      5:26
    • 15. Create a swap partition

      6:45
    • 16. Create a Yum Repository

      3:09
    • 17. Install the appropriate kernel update

      5:56
    • 18. Configure LDAP Client

      7:17
    • 19. Configure autofs to automount the home directories of LDAP users,

      8:05
    • 20. Configure NTP Client

      2:40
    • 21. Create a volume group

      8:57
    • 22. Resize the logical volume

      3:23
    • 23. Schedule a cron job

      2:40
    • 24. Last lecture

      1:06
  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels
  • Beg/Int level
  • Int/Adv level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

54

Students

--

Projects

About This Class

Red Hat Certified System Administrator (RHCSA)

An IT professional who has earned the Red Hat Certified System Administrator (RHCSA) is able to perform the core system administration skills required in Red Hat Enterprise Linux environments. The credential is earned after successfully passing the Red Hat Certified System Administrator (RHCSA) Exam (EX200)

Exam Code: EX200 (Red Hat Certified System Administrator (RHCSA) exam)

Number of Questions: 20 Questions [Applied]

Duration: 2.5 Hours

Availability: On-site exam

Passing Score: A passing score is 210 out of 300 points

Language Exam: English

Sample Question Answer as shown below (Practice QA and Prep for RHCSAĀ Exam)

RHCSA Practice QA - Part 1

  • Network Setup

  • Practice Lab Session on Network Setup

  • Recover root password

  • Set hostname & boot target

  • SELinux to enforcing

  • Create users, groups & groupmembership

  • Directory permission & ownership

  • Enable IP forwarding

  • Add user with specifying user id.

RHCSA Practice QA - Part 2

  • Create an archive file

  • Search the string in a file

  • Create a physical partition and mount

  • Create a Swap Partition

  • Create a yum repository

  • Install the appropriate kernel update

  • Configure LDAPĀ Client

  • Configure autofs to automount the home directories of LDAP users,

  • Configure NTP Client

  • Create a volume group

  • Resize the logical volume

  • Schedule a cron job

Meet Your Teacher

Teacher Profile Image

Shikhar Verma

Solution Architect

Teacher

Class Ratings

Expectations Met?
  • Exceeded!
    0%
  • Yes
    0%
  • Somewhat
    0%
  • Not really
    0%
Reviews Archive

In October 2018, we updated our review system to improve the way we collect feedback. Below are the reviews written before that update.

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.

Transcripts

1. Introduction: Hello, everyone. My name is Shaker Wilma, and welcome to my course module record Certified System administration, RCSC Practice, question and answer. This course model is designed for the preparation off Odysseus exam by doing practice, question and answer that practical approach on the structure of this course model on having almost 12 years off ICT industry experience on had been the part of many immense is and global projects. My primary schools are Atlantic's administration and civil shallow scripting on Paul on My second is killed as the UNIX Solaris on a X so on the business off my technical skills on many years off expert eyes, I have designed this course model on in this course model. We have discussed practically all the sample questions with their answers on Believe me, that would be very much How awful for you if you're planning to perform our seas exam just to clear one thing, we have not discussed the topics critically in this course model. Whether we have focused more on the sample cushion. An answer on we have discussed each cushion, practically with a lab session about the certification to deal and I D professionals who has earned the record certified system administrator. RCSC is able to perform the court system administration skills required in Read her Enterprise Lennox environment. So once you will, you know past the certification, you will have the skills to perform the core system. Administration skulls on examining his Ex 200 audience. Anybody who is willing to perform or clear this exam, they can join this course model experience reading Enterprise Atlantic System Administration seeking validation off their skills. Students who have attended the other CS it but one and part two. Because for the Odysseus exam, we have to course books that has been prescribed by redhead that is, as a woman as it to So once you will complicate this two books, you're on the part for this on Odysseus certification and friends. If you are looking for understanding the course book, that is Odysseus it but for in part to have a separate course model, you can look for those cost models and which I have discussed East topics politically as well as practically so you can drown this course models. If you want to understand both the course books for RCC exam Heidi professionals who are on the path to one and that had certified engineer certification. So once you will clear out of Sears exam, you are on the path to on the certification. That is to see this is examining the X 200. So let's understand. What are the questions were short of the sample questions we have discussed in this course . Mahdi. So we have have developed this course model in two parts, two sections. I have good in the first section. We have discussed this is the network set up? So how was the first question that can come in your arses exam? How you do the network set up so we'll understand how we can do the network set of Andi will have a lab session on that record root password. You will be getting a system and which, you know have the password. Andre will ask you toe reset your system password, so we'll understand how we can, you know, record our fruit. Passport set, host name boot target. At the Lennox, you have to set idiot users group and memberships a different different type of questions that could be coming in. This s topics, directive, permissions and ownerships unable. I p forwarding and the users with specifying user I d. So in first part off this will have the cushions letter do these topics and the second section you will have the cushions little tow. These topics, like cleared a narc archive file such the string in the file so they can give you a file and which you have to, you know, find out any string. So how you can do that, kid? A physical partition and mountain. You have to care the partition on there and they will ask you to mounded get this fat partition you have to create the represent, tree installed appropriate Colonel configure the adept Kaine configure our refers to amount the home directories off let users to the questions that would be for our C exam that formulated to sous topics. So all these things we have discussed configure and tippy Klein create a volume group on decides the logical Volumen. Also the question for should you let Cron job? So all these questions we have discussed in this course modern on Believe me, if you go with each questions off this course model, you can easily passed exam different. That's all. I believe you're going to join this course model on going toe long, long off new things, but by ticket 2. Lec1 Network Setup: Welcome Toe Atlantis classes in this course model. We're going to understand out of CS It certification exam with various sample cushions, which can help you to examine or track the Odysseus it exam that is lettered certified system administration and that some court is e X 200. This certification is basically it's the performance based out of CSE exam, which test your knowledge and skills in area off system administration common across a wide range off environment on deploy scenarios you must be and Odysseus here toe under other C exam that is ready to certified India certification. It means that if you want to be out of C first, you have to correct the RCs exam. So this course model is basically for the preparation off. I don't see us. It's certification exam. So let's have the first simple cushion to the first question is for the network set up? So the question would be something like that. You would be having some box. The virtual box on the name would be like sewer ex dot example dot com. Here, acts would be deal system name. It could be one. It could be 23 What do any numbers. Suppose if you have been allotted a seat number 13 so you're someone in would be sewer 13 dot example dot com on Like that way, you have to configure your system so that would be mentioned in your test paper. Nobody's so here already. Simple cushion that is, for the set up off your network. You can see here they have mentioned several ex don't example dot com, and they have given the passport as well. And also they have provided the I be here I. P is 1 $72.25 dot extort 11 x would be your system number if it is starting, so the number would be You're right. It would be 1 $72.25 dollars, $13 11 and you get free also. So you have to configure an eye. People the system. There would be a it didn't con that is already located to the system. You have to, you know, configure the network interferes with the falling at I p. And with the get phase also mentioned, I'm apart from that. You have also defined the Deena's Do Min for the system as well. So two things. You have to do it first. You have to give the I P second, you have to give the get free and the thirties one is you domain name. Apart from there you have to do some more modification. Like you have to change the I people than four method from auto to manual and also connection dot or to connect by default. It is already too. If it is not true, you have to make it to so this setting is basically like suppose if you are going to reboot your system So whatever the settings you have Children here it will be persistent like on reboot physical Be Yes. So all these things you have to do it. So I've just given a vertical section. Like what? Sort of the question we have, Andi and how we can understand and how we can do this will understand Analects lecture. That would be a lab station. So, friend, that's all for this lecture on if you have time, please join with me in the lab session off this Kocian. Thanks for watching 3. Practice Lab on Network Setup: welcome to Atlantis classes. So this is a lab session which we're going to understand how we can do the network set up off your VM. So this is the information we have in the paper. Like, this is I p. This is a get fit. Now, this is a DNS I feet. We have to, you know, look for the domain name here doing number. So it is nine here. Number is nine. If you have any convincing, you can type host name it is suing. So over nine dot example dot com. So my i p would be 1 $72.25 dot mine 0.11 Now, the next is how we can configure an I p to the system. So first of all, you need to check it out. What? All interfaces you have and the paper, you will have a interferes name like it. Zero it one. So don't be confused. The different name it I am showing you. Okay, so you have tow allocate and I be toe the interferes. Currently the status is disconnected. Why the showing disconnected? Because there is no I'd be to the internet cars off now. Once we locate an eye people that net card or your device. It really started showing connector the state. So how we can give an I P to the Internet card is very simple. The command is on M C L a con ed corn name. So that would be the same as my the guy's name if name is also the same type is a TechNet and I be four is my i p. 1 91 102 25 0.9 dot 11 sub net is 24 on Get re is also mentioned in the paper, so you have to give the get fit I p as well. So it's 1722.1 $25 to $54 to 54 Now you can see that the connection or it has been a located successfully to the Internet card that is Iain 0167777 placings. If I again fire this come on, you can see the status Has bean changed from disconnected? Let it was, Discovery conceded has been changed to connected. Why the swing connected? Because we have allocated and I put to the do you guys know what is the next? Next is you have to, you know, locate the Deena's I p as well. So how we can give the DNS i p So, first of all, we need to know what all the you know properties are. We can say What are the different options we have with the internet cards? For that, we have the Commons human. I'm CIA late short corn on the name off of interferes. It is shrinking out of here to the commanders and m c l A connection. I can see that all the properties you can see it is showing here. So I have to look for I p wasn't four Deena's. So this is a name for if you want to allocate an I P. If you want to locate a DNS i p then you have to use this as a key word begins it. I'm coming out from here So the command would be an emcee alive. Gone, Mahdi fight. Onda interferes. Name is my this one You can use mortars off Also start off tapping the full name Modify. You can use more as well on then here you have to use I p before dot Deena's on the name of Deena's. It is 1 $72.25 dollars to $54 to 5. So all this information like I, p and your Gateway and Venus that will be mentioned in your paper. I can see that Deena's has been added to your system as well. Next, easier You have to change some modification for your I p was in method to manual on. Also, you have to mention like you connection dot or to connect should be true. It means that the entries that should be persistent or whatever the eyepiece you are giving it should be, you know, consistent. If you're taking a reboot, so you have to use the same Come on. And instead of this here, you have to use that, Manuel and how you'll find this is the same command in the corn. You can look for this keyword don't and also you have toe one more thing Auto connection door or toe. It should be to it is same as like on Buddhism will be yes. Okay, So everything has been done. No, If I'm fighting this on with check for this interferes you can see This is I p have a located. Just know the system. And also to cross check It can go here says conflict. Look for the file This one So all the entries string? Yes. Here. This on Buddhism will be Yes. It means the modification I have done for connection dot or to connect. So this was a common for that? Can I send up? So what will happen if you have given an I p? So this will be the I p off your system if we take the reboot as well. This is I p address. This is a Deena's. This is a gateway. Okay, so this is what you have to do it now. And one more thing, you can do it here. Although Diaby has been located if his case if in case it is not a locating an I P, you can restart the connection as well. And I'm CIA like gone Don't this year interferes and again up. Okay, so everything seems to find So this is what do you have to do it? Okay, so from there, some for this lecture. Hope you have got an idea how we can do the network set up off your Veum. And that would be your first question off your Odysseus exam. So from that's all for this lecture. If you have time, please do. And with me in the next lecture. 4. Recover root password: welcome to a length classes. Let's move to the next question. So next question is saying that supposed if you have lost your root password and you have to, you know, said the bus would and how you can achieve this. So in that case, you have to you know, he said, Your system on interpreter system at the grub menu on From there you can do some changes, and after that reboot the system on it will take you into the emergency mode from the recon . It is said, your root password. So you will be getting a question like that. Assuming that your passport is lost on system is running in multi user more with no roads, no session is open. So let me show you how we can do this. So this is my system. You can see that if I will try to love into the system. I do not have any password. So how I can get into the system or how he can decided. So in that case, you have to simply go toe power, and this is the same way you have to do it in examines Well, he said. Now, once it will be at the grub. Menu it here. You have to press E for Added on. Don't look for the line, which is started with manic system and go to the end of the line. Here you have to type body dot bread and then press control X cost. Now here you have to, Father. Come on, Mount Now you can see that entering emergency motion. This is what a modus call emergency more from here. You can, you know, reset that password. So here, if I fire the moment Come on, look for the last line. So last time tells that your who file system is mounted under system The route it is mounted as a lead on me. So the file system is mounted as a read only. And if we tried to reset, the password will start getting another. So first thing is that you have to, you know, fire this. Come on. You have to re moment that would file system with read write options. Once you've done this five this come and see it through Cissel. Okay. And then you can descend the possible Let's see this passed a bloody and took. So you have to say the same passport which has been mentioned, mentioned in your paper and then exit and rebuild. So your system really started into the Mounties And what? Whatever the more has been said and and once the system will up, you have the root password you can enter into the system. So this type of question that will be coming, your example, they will give you a system on which there is no group password and they will ask you to set the root password. So only option you have to take the reward of the system interrupted the group prom, and from there again added the line which started with Lennox system. And then you continue the password. So the same steps which I have shown you in this lecture you have to follow. It will take a few seconds here and then your system will up in you. I can see that if I tried to log in here, you can see that I'm able to log into the system with the possibly to have said from their song for the selected Let's see what we have in the next lecture. Next lecture. So that's something If you have time, please, Jennifer, In the next lecture. Thanks 5. Set HostName & Boot Target: welcome to Atlantic's classes. Let's move to the next question. Next question is very simple. You have to set the host name and they have mentioned in the paper The host name should be sober. $9 example dot com. So it's very simple. I'm moving to the lab here. So the commanders host name CTL on set host name and the name of the post name in the example they have asked and the people they have us do, you have to set $79 example dot com. So this has been said no. You can see the shrink potion even swing this one. Okay, so very simple. Let's move to the next question said that the four boot target toe multi that's use a dark target in other till seven. Target is just like you run levels are there, asking that you have to set it for Monte User Dark Target. In some paper, it would be asking you to set it for graphical target as well. So whatever mention in the exam, you have to do it so it's very simple. Second, come on, system CDO. First of all, let's see what is the default target to take the running target. It is showing multi user dot target. If it is Monday, user of graphical. Whatever you have to change it, so the command to change it system, CTL said. The Fall and modernity user dot target although it is already there. But in the example, if they're asking for the multi user, so default would be your graphical. If it is asking for the graphical, then your default would were multi user. This way you can do it. And if they're asking for the graphical so you start out this you have to use graphical. Don't tell you it's OK from their soul. For the selector, the next lecture will understand a few more questions. Thanks for watching. And if you have time, please join within the next lecture. 6. Enable SELinux: welcome to athletics classes. Let's move to the next question. Next question is also very simple. You have to set aside Lennix toe enforcing more, so I'm just moving towards my lab session. So how we can do this? It's very simple. You have to look for the file, this one in D. C as he Lennox and conflict and simple, you know, make a copy of that fight because if you're going to do some changes on any of the confrontation file, it's always better to make a copy off that file. And then asi Lennox, this fight on here, you have to change it. It is showing the several here. You have to put it on forcing because we have to enable forcing You can read and forcing a select security policies and forced permissive as Helen experience warnings instead of enforcing. So if it is, they are asking for the permissive or enforcing or disable whatever is mentioned in your paper. Do it accordingly after that, and you have to take the good for after that. To make it effective, you have to take it. Don't forget, Toe reviewed it so that it will take effect so Once your system will come up, the system will come up it at the Lennox. I never So there's some for this lecture in the next electoral. Understand the more questions about the record certified certification course. But I take it. And if you have time, please you. And within the next lecture here, you can see that a salon next target policies required. So it will take some time. Here it is, enabling their saline Xia So, friend there. So this lecture over 7. Create User, Groups & Group Membership: Welcome to Atlantic classes. Let's move to the next question. Next question is Richard toe the user administration. So the question is saying that festival they're asking Toe kid, few users and groups and group memberships. The first they're asking you to create a group that it's this group. Then you have to create a user who belongs to six Group as a secondary look. And then a user, Suzanne, who belongs to this group as a second regroup. I use this Suzanne, who doesn't have access to and interactive shell on the system and who not a member off Cisco. So this is what we have to do it on. At the last, you have to set the passport for Suzanne. Sarah Andrew the passport should be they didn't want to play. So those type of questions that can be asked in your our a. C s exam. So that's a simple question. Only. So let me go to the the lab session here and we'll show you how we cannot hear this. So first waas, a group named says Group. So we have to clear first group as a group at Come on, Okay. And second waas creator user Andrew, who belongs to Cisco. The creator user Andrew. Okay, I get it coming back. A user Andrew who belongs to says Group as a secondary group, second group. How we can do it. I would be using user more and then it on D is my second dig rule says Group and the name off user. If you want to check, you can check in with this. Come on. Okay, I get it, says girl. Let's see what's the next I use a sewage on also belongs to Citigroup as a second group, so you have to create one more user use their air. Suzanne on this is that it also be the part off, says Group as a second group. So user more life on a capital G for a second Regal says group. And then the user Suzanne. Okay, if you want to check, can check with Heidi says I okay. And one more thing. They have asked a user's Sarah who belongs, who doesn't have access to an interactive shell on the system on who not a member of this group as well. Two things we have to do it here, not interactive show. So First of all, you have a user use it ad and it use. It was set up. Okay. And you do one thing Mr Off during this, you can find a single. Come on. This is user head. Non interactive, as I wonder, should we not? Interactivity is that nobody can s u to the system. Nobody can log into the system using this idea. That is so Okay, this is what do you have to pay? Okay, I do. After that, you have to set the password as well. Password waas rented 123 So for all the users I have to set for the possible so fast, you there waas on Drew Second user Waas says I'm and terrible Sarah for doing this. You can cross check, like with highly and do get ender I need This is, uh and the last one was I d cross check. If you try for this, it won't allow you because we have set so that not interactive. Okay, so we have simple use few commands you can see in this here it can be used to, you know, complete this question. So from their soul for this lecture, hope you have understand how we can solve this question is very simple. So we have to read the question very carefully and accordingly performed the question. It's been there, some for this lecture. If you have time, please join. It had been a neck selective thanks. 8. Directory Permission & Ownsership: Welcome to Atlantis classes. Let's move to the next question on Next question is also related to user administration. In this question, they're asking you to Caridad Victory that is stated, says group on the group. Ownership off their directly would be your sis group. In the last lecture, we had created a group that assist group and this lecture. In this cushion, you have to create a directory on the group. Ownership of the doctor would be Cisco. Apart from that, the director should be readable, right, herbal and accessible to members off, says Group, but not do any other users. So this is what we have to keep in mind on one more thing. It is understand that route has access to all of files and directed of the system. The files created in this directory automatically have group ownership set to says Group. What does it mean? It means that if anybody is going to clear any file into this directory, the group membership should be That should be, says group on Lee. So let me go to the lab station and we'll show you how we can achieve this. So very first thing, what do you have to do it. You have to kill directly. I'm guilty. A hyphen B that it assists. Good and second thing. You have to change the group ownership. Let's see what is off of ownership. As of now, it is a whole drawer. 10 to group. Okay, we have done it now. Okay, now they're asking that too. One more thing we have asked you that Did The director should have readable, relatable and accessible to the members Off says girl. Okay, so they want full permission. So let's see. It is only leading. All right. So you have to. Do I see it more? 770 They have mentioned like and not others. Not to all any others users. So this doesn't have access to the fight. So you have to use this. Okay, Lets see. No. The users of the group says group should have read, write and accept this Excessive Alexis and any other users apart from that, doesn't have the access to the system. Okay, One more thing. They have asked for this. The fight is created in this group. Automatically have group members upset toe says group. It means that if anybody is going to this directory because I'm going into this directly that it says group and I'm going to get it if I, like, touch, testify it. So what they want, they want that the group or a shirt should by default, should be says group only. So how we can achieve this, you have to use said do 80. So for that, the commanders see it's more to 77 zero on this that it says go. So we have said the said JT knife, I'm going inside this directory. I'm going to clear the file. I just wonder the now you can see that deformed group would be a Cisco. Okay, so this is what you have to do it in this So what? All the commands we have done it just history. Come on. Simply after those in the group to says group on, then simple, make it permissions. And then at last, I have used this one. So from there, So for this lecture will be understand how we can achieve this, how we can solve this question. Thanks. And if you have time, please, John, within the next lecture 9. Enable IP Forwarding: welcome to annex classes. Let's move to the next question. Next question is very simple. You have to enable light be forwarding on your missing machine many times. You have to, you know, carry a system your V Amir Lennox, William. Whereas a photo. In that case, you have to unable. I p forwarding. So how we can do this? It's very simple. You have to, you know, go to this file. It is a city of dot com. I already told if you're going to do any changes on any contribution file, take a back up of the fight and then added it. Okay, go to the last of the lane. I'm for Dante. I p Med, don't I p before no hi p under school forward one. So this is what the until you have to put it in this file, okay? And to make it enable you have to use this city, I would be okay. It has been in and I wouldn't know if you want to cross check even checks a city in my friend, I this one not dot i PV for So this has been said. Now you can see here. Okay, so if you come once I have fired here, you can see in the history I can defend yourself for this lecture. We'll see a few more questions about this certification course RCC from that soul. And if you have time, please John Vidin in the next lecture. 10. Users and Permissions: welcome to our language classes. Let's move to the next question. Next question is related to your copy file from one location to another location. I also do some 10 years in the ownership of the fire. So let's understand the question first and then we'll move to the lab session. What it is asking, it is asking. You have to copy the file that is a DCFs top into that term directory and configure the permission off this file so that the file this is owned by root user on belongs to a group route on. It should not be executable by anyone. So the first requirement is that you have to copy the file from this location to that location on. You have to change ownership. Ownership would be your route user and group would be rude food. So this is very simple. We can achieve this on a part funded they're asking like no other users should able to execute. This will check the permission off that fight. Next is that first do this, Then we move to the next point of arrival. Confused. So what? They're asking their asking. There is a file DCFs stuff this is the file on day one, it should be copy. Always better to preserve the permission. So this location they want after that where they want. Let's see the permission on this file. Okay? Know what they want? They want that too. It should be owned by route. The user would be rude and group also. So we have the command, John. Loot good on this one. Well, Tim Mephisto, I can you can see that this on this issue in a little already showing this one. But they're asking you. So you have to fire this. Come on. Okay. And one more thing, it should not be executable by anyone. You can see that the permission. Nobody can. Eggs. Good. This so first part has been done with two commands. First copy and second the skull. The second is the user. Andrea is able to read and write this file. Now they have specifically defined a user. So if it is asking for a specifically any user, then you have to go for the easier. Okay, So how we can this achieve this? I d and do their asking. We are all dedicated. Andrew. In the last few lectures so say if you see it is the common hyphen. I am user and do should have read and write permission to this fight. What, Tim first. So that would lead a night executive. The user Suzanne, can neither write nor read to this file. So they have asked one more condition here that users. So yeah, Suzanne, Suzanne can neither write or read this file. So again, we have to use the side official only said official on I'm using no user would be Susanna Onda. We do not have any permission for this user to this file. If you'll see the permission on the file, you can see that others have read permission. This means apart from route are the groups anybody have and he uses existing on the system should have the true read permission. But I want that the users from the others as well a specifically Suzanne doesn't have any exist of the system. So you have to fight to dismiss. You are not going to give any access to the system, how you can very fighters. It's very simple. You have to use that Fuzeon. Andi, give this well, Tim. Huh? Efforts step so you can see that, Suzanne, His entire entries having this much taxes. Okay, so if you want to cross check, you can cross check with see how often, Andrew. Okay. And try to read something here in town if this chip. Okay, so I ve a like me. Clear it off because Andrews, having read it existed this file. Okay, I'm trying to do some changes. I can see that. Angie's having read and write access to the system exit. That's see trey for Suzanne. Okay. And, uh, let's try to get this fight. Doesn't have permission, because we haven't specifically any permission to the Suzanne. Suzanne doesn't haven't even read permission right now. None. None. Permission. So from there, some for the selected will be of understanding What is the question and how we can tackle how we can resolve the cushion. So there's some for this lecture. And if you have time, please join with me in the next lecture on the next table. Discuss some more questions. Thanks. Take care 11. Add User: welcome to ask classes. Let's move to the next question. Next question is also very simple. They're asking us to get a user, John Andi, while keeping the user. You have to specify the user idea of the John as well. Which is have mentioning the in the question this 1099 And after that, you have tow find the files, which is owned by User Sam, and copied those files into this directory. So, first of all that makayla users with a user i d. 1099 So it's very simple. So the name was John. So you use it at I found you for user. I d zone. Let me give some password for the job. Okay. I have done first part. Second parties there. Find the files which is owned by User Sam and copied toe this directory. Fine results, citizen slash route. So the command is fine. Hyphen name. Use it. So So this. Come on. You can see Lord of the files that belonged to use Osama showing now. So these are the files. You can see the one over. Okay, so you have to copy it. So what? The common is that? And simple You have to use Fine. Then execute Got the hyphen b exclusively. And that this location route first find rhythms. It has been done. Now, if I'm going into the static tree, you can see that all that it quite files has been copied now. Okay, but it didn't copy the head and file. I think we have to use a few more options with that. Let me add one more option. Okay? And I get left, missy. So this kind of enough to copy so to command, you have to do it here. The 1st 1 you have to create the directory, create the user for that. You have used user care flight. Make sure with the history Come on. So simple to Kamani after this one on a this 1/3. Come on. This court will check one of the finds of the user Sam on this one. That's all. Their son for the selector in the next lecture will understand few more questions. But I take care if you have time. Please, John, Within the next lecture 12. Create an Archive: Welcome to a Lennox. Classes less continue and move to the next question. The next question is to kill an archive file. That is your slash fruits last local dot Peter, it's a compressed by DD for this director, that is a user local. So we have to create a file archive file for use our local, and it should be placed in slash directory on it should be local dot teacher how we can do this, So it's very simple. So this is the data to which we have to Egypt us up local. Okay, if you'll see the lot of files would be there inside this. Okay, Now we have projected and placed into this locations less room. So the commander star CV zero f and then your route on then local dot de de jet. This is the command for them and then the name of the victory. But you need to compressed us are looking. That's done. Now, if I'm going inside here, you can see that this file has been gypped. Now, if we'll see the extension of this file, it is compressed data. Okay, So very simple. Come on, you can see that which can be used to solve this question. This is what you have to do. It declared on our guy. Find okay for this use of local and it should be complex man T J. So from there, some for the selective opium understand in the next election will see what is the next question. 13. Search the string: Welcome to Lennox classes. Let's move to the next question. The next question is that we have to search the string John in the file A d c. Password on did it? What without we're getting after doing the search for the string? John, we have to save the output in tow. This file that is a root lanes. It's very simple. Let me move to here. So, first of all, we have to look for the string John into this fight. So we got in this output are also going to one thing cat a d. C. Password. But the command is correct. That python I zong. So we have got an output here on. We have to redirect the output into this file. If this file would be there, the center will go there. If the file will not be there, it will create a file named as lines. If I'm going to can this fight? So what do with output we have got after doing the search or grab with John, we have redirect our put into this file so simple. We have to find a single Come on, this one which will resolve this cushion. Okay, which will solve this question. So that is simple to render some for the selected. Let's move to the next part. But I take care. Please join with me the next lecture. 14. Create a Physical Partition: welcome to Atlantis classes. Last move to the next question on next question is really toe the file system occasion. So the question is very simple. You have to create a file system on the side of the file system. That would be 1 50 empty on. You have to create this file system from the disk that is death as TV. Maybe in the exam they will not mention the disk. So you have to simply go to the solar. And from there you can check for the little disk on. Most probably, there would be only one thing on which you have to create the file system. So this is a sample question in which they have mentioned that this name as well on after the collision off our system, you have to mount it under slash or a TV show in the exam, you can get some different name as well. So don't be confused. So how we can do this? I'm just moving towards my really, really machine Lennox machine and let me show you what are the steps for that? First of all, we should have the disk on which we can create the file system. So simple. Fire After this hyphen on, I can see that this which has which was mentioning that cushion it is there, and it may 1st come on after five. This one as stupid before print. And if you have any conversion beacon, press it for help, okay? And then you have to purify tradition here to clear the partition. The command is, um, be default is one and two for Secretary. We understand from your default. Well, even then, you have to give 1 50 be you can give simple. Now you can see that one partition has vacated. Now on after that, you have to simple w the seven come out. So if you'll see that off, devise Name has been created with this name. Okay, on after that you have to fire this. Come on, which is not required at all. But if you want, you can fire this. Okay? Everything's fine now. It has given you the terrible the tradition that you have created on the system. After that. Do you have to, you know, former the partition using extra for because it is not mentioned. The ticket. If it has mentioned the file system type like you just did three x t four x offers. So accordingly you have do it. But it is not mentioning. So I'm just taking used to for completed. After that they have mentioned that it should be mounted under less order, baby. So you have to get the file system director Name Andi. What I d v. I didn't know on. Then I have to find out the u 80 to get you your idea off it. I would be using the common well, Katie bl k i d. Here. You can see that. Well, Katie is this one. I would be using this to put an entry in the Fester file DFS stuff. Fine. And here I am going in the last on. Then this is I have to first copy it. Cooperate after that, please copy. And then if it's chap your ideas according toe, based on where I want to mount it or a TV 64 the falls 00 Don't moment, people. You do you play for I can see that the file system has been mounted now. So this is what you have to do it in discussion. But it's simple you can see the steps which have usedto create. So the steps are very simple. Have this hyphen, Al. And then I have to clear the five partition name. And after that, symbolize use politics on then the name of the disc on former to the file system using 64 on Kitchen. The addictive it. I'm going to mount this file system. Blk individual used to find out the unique idea off the file system and then would that be Bill KDU idea Have kid in the first half file and use more definite so the file system has been created on. We have put it already and they've ever step five. So if we take the reboot, the system will come up with the file system as it mounted on the front. That's all for this letter. I believe you have understand how we can simply care a file system. So this is a push in that you are going to get in the exam. So do practice for that. Thanks for watching. And if you have time, please drive it in the next picture. 15. Create a swap partition: welcome toe a length classes in this Lecter. We're going to understand how to increase slap in Lenox. We all know that Swept is one type of file system, which is basically used as a virtual ram for the system. It provides the extra memory resources to the system when it is required, and also this file system will vacated manually or automatically during the stylish in off operating system. Once I file system is created, you may want to increase the straps size, so there to matters, we can increase the strap size. The first mother is using the separation, and also using the 2nd 1 is you're using sap fire. So in this lecture, we're going to understand how we can create the separate space using separation. So let's belonging to one off my land X box on. We'll show you how we can create another stripe addition there many senior scenarios in which our Lennox box is running out of the striper space. So in that case, we can either extend the service place or we can create another sub partitions. So let's understand this. I'm going toe along in tow one off my little box so This is my little box. So very first come on. Which can be used to take the available service press that is strapped on Hyphen s here. You can see that I have one, sir, Petition, which is already existing on the system. And it is off almost two TV. And also we have the command that is free hyphen. Um, this can also we can use to check out what all the space you have on the sap. Suppose my physical memory is almost, you know, a TV on. I want to increase mice purpose fears. So in that case, what I can do, I can create another step partition here, so we'll understand how we can do that. So first off on, I need to have ah, partition on that tradition. I can use a swept. So however, the disk I know this is the disk on. I'm this disc. I'm going to create a partition. So what? I need a partition off one DV so And I did not have anybody going on there to clear the position. I would be using an option and be primary before it will take one. And here I am giving the size one do you do for it is out of range. So simply, I'm giving 1000 them. No, my position has been created. Now, if you want to see, you can see that the one thing is here. The idea Just throwing 83. Now I need the I d Should be your so for that you can use t It will list all the for list all the courts. So here I need to 82 for Lennox Web. So I would be tending it for it to simply and putting it into. Now you can see that it has been tinged. Idea has been changed from 83 to 80 to 80. Do is for cyberspace. After doing this, we have to, you know, simply save and come out. So to save and come out, all right, that changes have to press w here now it has been kitted the petition. So what will the petition? So that was a partition. Have you simple this? So this party can I have created and I won't be used this partition as my swept. So how we can use this? It's very simple. After that, you have to simple use the command and get swept on. Then simple. Put this setting up service kids. So if you want to see if the sub has been added or not, you simply use swept on hyphen s. It is not ended yet. For that I have to use one more. Come on, that is strapped on. And then I have to use this. Come on to the first command which I need to use that is empty swept which will setting the surface place for them. And then I have to animal it for enabling after used swept one again I would be using the same. Come on now you can see that the partition off one TV off Swept has been headed now. So that has been activities as well. On it will suffer the separate the source to the machine as well. Life. I'm going to fight the common. This three hyphen em. You can see that cyberspace has been increased from two D veto please. Really. So it's very simple. And if you want to off the sub, so there is simple command swept off and then simply give the name off the surface space. So service, please watch this one. If you want to off, you can do it. If you want to make it permanent, you have to use You have to put the entry in It is cfs terrified. So this is my auntie. I would be simply in over here a d. C. A first step on in that file, I would be adding a line, but a simple line. I would be using the last new set of auditions, and it would be something like that. The name of my partition is this one. And then this swept strap the 40 So this is what you have to use it. Come out? No, I feel Reboot your system. So what happened? Your system will come up with your TV off, Sam. Okay. So from their cell for this election in the next lecture, we'll see how we can, you know. Okay, this web space using yourself file. So thanks for watching. And if you have time, please join with me in the next lecture. 16. Create a Yum Repository: welcome to our Lang's classes. Let's move to the next question. Next question is Richard toe the young. So here you have to create a representative e on the part of the repositories mentioned in the cushion. So you have to create a a profile on that would be in a TC young dot riposte D directory on there. You have to create a profile. The name of the profile could be anything but. Extension should be dot ripple like sour dot rep. Oh, my Aleppo Dots, our my several dot temple extension should be Dark Temple. So I'm going to show how we can create a repository for you on after that. You have to show that what all the packages we have on this location is that it started showing on your client machine on. So this is what we have to do it in this kosher, simple kosher. So first thing, I have to win a creator. I feel fine. Youngdahl triple started here. I can clear any name like myself. Adore, triple and insert. It always starts with this. You can give any name upon him, even local apple on then name. I'm giving local rep before I didn't see a sick. So this is is not mentioned in the A ticket is not mentioned in the cushion. So it is up to you Whatever you want to mention. The important thing is this one basic. Here you have to mention the same, which is mentioned in the cushion Great content dot example dot com slash s our Children 7.0 slash x 86 dr 64 then last was DVD weapon Coster get all seems for, you know, on a GPT check. It should be zero unable is equal to one. So this is what you have to do it now. After that, what you need to do? Yeah, young clean on, then. Young list. Uh, you can see that all the packages starting showing No. Okay, Andi, you can also cross check with Young Capitalist so you can see that my on a positive we have configured on my disclaimed machine. It started working on whatever the packages that is present on this location. The repository is showing at my client machine. So this is what you have a bill in this cushion. So thanks for watching. And if you have time, please, John, within the next lecture 17. Install the appropriate kernel update: welcome to our lands classes. Let's move to the next cushion. Next question is related to the stylish in off Colonel. They have given you the and I positively link. So first of all, you have to, you know, create your profile on the apple file. You have to put the entry, which is given a new cushion. After that, what we need to do, you have to upgrade the carnal. First, you need to check what is the current war zone off the colonel. Your system is running with which caramel, and then you have to update the Colonel and take the reboot off your system and check that colonel version has been updated or not. So this is what you have to do in this question. So let me move to the lab station so that I can show you how we can do this. So for stuff all, you have to get the profile so you can give any name, whatever you want. And after that, you have to put some entry here like Colonel Apple. Seem so whatever you want, you can put it here. The main important thing is this visit. So here you have to put the same and what we're shown. India Cushion people. Contender example dot com till 7.2 x 86 underscore 64. My gosh. Check one less than it was editor. And then gpt check the cut toe zero. I did not want it. Should be checked. Never is equal to one. So this is what do you have to do it in this? I see on Then do you have to, you know, do you monopolised and check for that? What were the contents we have in this repository? Is it showing on your plane machine or not? This is what you have to do it. So we have to fire the Come on. Um, wrap a list. So it started showing order the Beckett we have on that repository. And after that, you need to fire this. Come on, young stops. You can simply fire this. Come on. Um, update also on one more thing. I just forget. What was the colonel wasn't I'm just pressing. No. Here, Andi, let me show the colonel unit, my friend. So currently to showing this one I couldn't on did it? Copy this one. It's 3.10 What? 3.100 229 This will be a politic to this one. It's a new gonna wasn't. So this is what you have a do it in example same day. The staff which I have shown you as they do the same steps you have to follow. After that had retaken reboot here and was the sole will come up. It will come up with the nuclear on Wilson. This is what the question is all about. Let me take it. Pose here. Pose. I can see that it has been. Don't know. While 23 packages has been stolen, let me show you P 55 this. Come on. It is to showing the old one. So let me take a reboot here. We'll take it. Pause here. No, my system has come up. Now. Let me check. That was enough after doing the tradition off. So I'm going to take a terminal here. I'm going to fire the come on. Your name hyphen. I can see that a cardinal has been updated earlier. It was something T 0.10 dot zero dash C 29 night has been updated toe. See to someone. So this is what the question all about? You have to know. Upgrade that. So what are the steps I have shown on this? Well, actually, you have to follow the same steps, so thanks for watching. And if you have time, please join with me in the next lecture. 18. Configure LDAP Client: Welcome to Atlantis classes. Let's move to the next question. Next question is written toe album on it is little bit tricky. So in this cushion we have to configure the airplane. We're not supposed to configure the old observer what we need to do here. We have to configure the elect plane on all the informations are mentioned in the cushion. So here you can read this bind with a lab used provided by classroom dot example dot com. So classroom dot example dot com is my ellipse. So and what we need to hear. We have to authenticate the user. It means that my steps over absolutely, basically a centralized authentication we can say you draw authentication. So whatever the users we have in our world of servers that would be created on the and observers and the plane machines, the time machine, like your server once over to you have to configure the client machine. So users were able to log into the time machine and they can authenticate from the website . So this is what we have to do in this question. So here this is my absolute classroom door example dot com, and this is the dome in example dot com on they have given the certificate file for the security indication. And this is my child abuser. So basically adept Use an X X is basically you system name If I have system, So what mine. So my user would be held abuser mine. So this user basically discredited on this lapse Our glass room dot example don't come when we have to configure the plain machine that is your so what? $9 example dot com So we have to configure the server that is so benign dot example dot com in a do mean off example dot com on the users like your 11 9 user would able to authenticate for my client machine toe the slab. So So this is what we have to do it. So we have to log in tow on my the, um via on this is my This is my soul mine. So this is the kind machine on my elapse salaries classroom dot example dot com. So, first of all, we have to install a few packages. The first package is this one. Okay, so same. You have to do it. It is already in stock, but in exam you have to do it. Um will start working so you can use the young for this traditional off this packet and few . My pocket unit is totally in the stall about the conflict desk. Take it. Is this Is this a clear? Do you anymore to configure that you've got medication? As I said, d you have to use on did it? Garbo's five workstation. So this is what you have to you. It is already stolen his system. So after that, what do you need to do here? You have to, you know, configure the So the command is this did take it here. You can see you have to put the information first is your album. You have to click here a left and this lip service name, so it will already mentioned the ticket. If you can remember, it is already mentioned in the question. This is my D C. Example dot com and the exam. You'll get some different domain name as well. So what ever mention in your cushion? The same. You have to put it here on after that. Your left. So I left. So where is my this one. This one is my lives, Plus whom dot example dot com. So here the former is like that Collins less less classroom dot example dot com. They have mentioned one more thing here. This is the certificate file. So you have to, you know, mentioned the certificate file is about how we can do that. So this is what we have to copy from here? Probably. Example. Does she had on exam? So just click here. Okay, Andi and one more thing you have authentic information will be passed on before this certificate download certificate. And here you have to give the full part. What? They were mentioning this. Dig it classroom. Not example dot Coms. Less Popes. Less example. She that I believe is the same. So what? You were mentioning the to get the apples, You know, mention the same after that. Nothing else. Okay? And it will be yourself. Your client would be come into the do mean so that system will be part off. You do mean it means that your client machine we'll start out indicated with the old observers. Okay, let me show you how we can do it. I'm displacing it here. No authentication has been done. We can take the Come on. We have to come on this one. You tell Andi and passed a bloody on the user, so use it would be here. You can see that it is. The user is 11 user X. So X is my nine. So I left user mine. So it is giving an error. I believe I'm using the wrong. Come on. It would be this one asked really This So it means that my this flying machine, someone is able to communicate with my held up. So that is a classroom dot example Don't come. So if I'm going to get this file, it is the best word file. So this user left nine won't be. You know, a little on this file. This user is not here. So this user, which is on the line, is kitted on the old observers. Okay? And if I'm trying to, you know, use this looking to the suburb with them, use at night. So I am able to log into the system. But I am not able to get the, you know, home directory here. So this is what they're mentioned in the ticket as well. So you will not have a home directory until you have completed the auto offensively current below all that. So my party's only this one. I have to, you know, do this setting on board. I log into the system as well. Home Director is not configured yet because I have to configure it with auto efforts. Old, I believe that will be the next question. So from there, some for this. Like, I hope you understand how we can, you know, configure our elect line machine so that the users would be able to log in to the client machines with the authentication off their themselves. They're so far the structure. If you have time, please John Goodman, the next lecture. 19. Configure autofs to automount the home directories of LDAP users,: welcome to Atlantis, plus is less continue on understand the next question. Next question is also did to Aldo. So in the last lecture, we have understand how we can configure our client machines so that users were able to, you know, authenticated with the help of. So this is what we have understand on one more thing, if you can remember while we were trying to, you know, log in to the LF, servers, we were not even to get the home directory. So in this lecture we have to configure the auto fs so that the home directly should able to, you know, automatically are out amounted under climb machines so that users were able to get their home directories. So this is what we have to do it. So let's understand what all the information we have in the ticket. So this is my elapse. Overs on from the old observers, this home directly is exported through all my time machine, so it's less homes less guest. So what does it mean? It means that the user's home directory would inside this directory, so the user's home directory will like slash home guest, a lab one or 23 water users we have on. And LF home director should be autumn wanted locally. Okay, so this is what we have on one more condition. Home directories must beat a table by the users. Okay, Andi, while you would turn while we were able to log in to any of the users from one throw 20. The only home director that is accessible from your system is 20. This X X means you system supposed. My system is several night. So they're saying on Lee the home directly, which is accessible from the server nine. That would be a user and user nine. Okay. Although you have users from I love user 1 20 that is these other users. We have a level on this. My lips hours, but they're saying from your server, that is their sour nine on Lee. The users who were able to log into the LFC over that would be only a step user nine. So I'm coming here. Let me show how we can do this. So, first of all, we have to, you know, a naval few services system, city on a bill, a success as we service. This is service I'm getting and I know it. Is this one okay on? Did we need to start the service as well? Apart from that, we have to check for this. I would use it would be this one held up user night, so I'm able to get if I'm trying for some other either four. I'm not getting okay. Andi way have to stall or the office, I believe. What offices already stolen. Okay, now we have to configure a few files. The 1st 1 is this one. It is he or two God, master dot de Onda. And I'm going to clear if I like. And if I could kill here it is up to you. I'm kidding home $1 or two efforts and he'll have to put them trees. So this was exported on and I have to give the file in. I'm giving this auto or dot one cement. Do you have to put it in the exam as well? And now we have to configure this file. Get this. So the file which we have mentioned in this file it was Ordo Dr Home one. Here. We have to mention like a user mine. I want only this you should ever got in the game. Read, write, sing do ellipses on my lips. Ovaries classroom dot example dot com colon on duh. This is systematically, which is exported for my flying machine. Okay. And the last I have to use this and person. So this is what I have to do. It okay and leave. A few files are dedicated. I'm gloating it. This is what you need to do it. So don't even feel I'm just deleting few files, okay? You're not supposed to win or delete this file, okay? I'm just being because this is my chest. So, So, So many files. I want ridiculous to the sublime removed. Okay. After that, we have to restock system CTL artifice. Okay. I'm Frank, along with Elder User nine. I can see that I'm getting the home. Getting to know earlier I was not getting the home director. It was mounted under root only. Okay. On dime here. I'm looking good. Few fights, like a test test. One test. Okay. So you will find a way to have greater. Now I'm going to my So this is my lips. So this is my head up. So So I'm here now on my lips over on the users, which was kitted here. You can see that and they deceive password file. All the users are here, so I'm going inside this CD home. This guest, uh, that night. So what do with, you know, files I have created there on my client machine. You can see it is skated on this elapsed. So it means that, actually, I'm using this service 79 to authenticate to their web servers. All the users that is centralized skated on my steps over the cells on I'm communicating our logging toe, my lip service wire from the sewers. Okay, if you get Member, there were a lot of other souls on Israel, but if I'm trying to log in some other servers, it won't along me. Okay, so this is what the question all about. Again, I'm coming back to my question. Okay, so this was a question. We have already done all the things. Okay. So from their cell for this lecture, hope you have understand how we can do this. So what are the steps? I'll have, you know, tell him the Alexis you have the same You have to follow, but take care. And if you have time, please go and hit me in the next lecture on One more thing. If you want to understand the album the Company Idea Bowl, LF you can. Under my course, that is, at once Atlantic system administration. So on that course model, I have discos added up in a delivery so that you can understand what all the things, how we can configure their lips, overs on day water the congregation files we have in their observers the meaning off his conflagration file on how we can configure our lives of words with the doom in all those things we have understand this course so friends, if you want, you can differ them. What? I take care. And if you have time, please do. And within the next lecture 20. Configure NTP Client: welcome to a last glasses. So let's move to the next question. Next question is to configure your system so that your system would be the NTP Klein off this classroom dot example dot com so classroom dot example dot com would be your anti piece over on your server. That is a solar nine dot example dot com would be the typical line. So how we can do that? It's very simple, Let me show you. So first of all in our little seven, the back it for an Teepees. Connie, it has been chilled from anti P two Connie. So it is already in stock. But in the exam, it won't be a stall. So you have to use the same common on which can be used to install this packet. After that, you have to look for this file and then you have to, you know, for the entry for the here, and to be sewers so you can see that lot off. You know, symbols are already there. So in the example, what you need to do simple enough for this, So on it classroom dot example dot com I. So this is what you have to wear. So any very connected this line. It's so we're not I get So this is the anti after bordered in this file, Andi. And after that, you have to restart the service system. CTL these top okay. You want you can take this to deserve it. Okay, It is showing the civil, so make it enable That has been unable. So this is what do you have to do it? Okay, Onda. And for verification, you can check the verification as well. So for that we have. Come on, I see capital. So this commander gonna use to check the reached level? You can say that it's a friend there, some for this lecture. Hope you have got an idea how we can configure that and to be claimed for you to be so thanks for watching. And if you have time, please Janet, than expected 21. Create a volume group: Welcome to Atlantis classes. Let's move to the next question. The next cushion is Richard Toe Alvey. Um, so this question we have to clear the volume group, but the name off Davidi on Do we have the specified the size of the physical volume extent , that is 16 MB. If I want to create a volume group on, if you're not specifying any option, what will happen? A medieval vacated with physical extent size would be four m. V. That is a different nature when you're going to create a video without specifying any option. But here what? They want us. They want us to create a wall in group the name of the wall in group would be durability. And here the size off the physical extent, that would be 16 ambi. So this is the first requirement. Second is we have to create a logical volume off that volume group on the name of the logical volume that we got a copy on the size is off 50 extents, one extent size 16 m b. So 50 extent that would be 15 to 16 somewhere around 800 be on it should we must form it with 64 mount it under data resource data. So? So this is what we have to do it. So let me move towards my via on. We'll show you how we can do this. So first of all, let me check the disc. So this is a disc I have. I'm going to get a single partition on that. On that single partition I'm gonna be uses it. Physical volume. No partisan has been cleared and p 11 have doing full sighs. Toe that partition. Okay, I will. Between society, it is showing 83 I wanted should be 80. So it is for Elvia Atlantic, Zambia. I can see that it is changed. It has been turned from 83 to 80. The blue 47 come out. If you want to see whether the partition has been killed or not, you can check with this car. I can see that one partition has been cleared it with the size off to TV. So what? This part has been cared. No, no, no. The next is I have to get the volume group physical body. So for that, the command is TV critic on Did it as Stevie One physical volume has been good and now I'm going to come in the volume group. So the volume group, we have this persuaded option as that is my extreme size. He size for the collection that I have to give 16 MP on the name off my video door levity And the disk is spb won My video has been getting Now if I'm willing to give display you can see that this is another. While you go, the woman would have targeted data BD Now here you can see the piece either 16 MB Okay on. And there's another video which was credited Leader of the system but before will be able to go see that it's for peace three Okay, so that's why we have to use an option that is video secret hyphen as small s So first part has been done second is that I have look it up Logical volume on the name of the logical Hollywood with Donna Copy. So I would be using LV create l I'm using l for if I'm using small arms that is for extents . If I'm using capital l it means that the side after so I can give it an AMBI or TV. So 50 I'm giving here. So 50 means 50 extents, one x 10 size would be my 16 and B and the name off my this one. That was data copy on the name of my video, Dr Media, and we create hyphen l 50 abdomen here have to give an option, hyphen. And and for the name off the logical world in the name of the logical Hollywood Got a copy . And this. So this has been Twitter know Gianna Gobbi has been created. Now, No next is that after former the file system. I'm careful, hyphen B, the extra four and the name of my this one. So, Doctor, this was Dr V. G. So I will perform my logical volume with the 64 so logical volume has been created and it has been for murdered as well with 64. So if it is mentioned, like referred on except first, whatever maintaining the exam, you have two. Former accordingly. Now you have to mount it under data source. So first off, all I'm going to create a directly that is data source. Okay, on one more thing Bill Katie to find out this. Very okay. On. Do again. Put it in this effort. Stop. Okay, The first step I can put the entry of my village. Katie. So they're the system will really voted. Okay, it will come up with file system. So here, I have to put it like that. You I d this. You ready? Would you have funded here? This one? Then we have to give it here. This one e x t four on, then defaults on. Then this 10 and zero. So this is what we have to put it here and directly. I wanted a good moan. Typhon even put it. It is showing that 54 doesn't exist where I've already given before. So no need to give this extra for mon Pointy force doesn't exist. Okay, so this is my file system where I need to mount it. I have to give this data source I get So this is my file system which have for murdered with the extra for on this number. I've got it with Bill Katie and where I want to mount it. It won't. I want to shoot a mounted on them. This Okay. On the head after extra for that's he more definite. You find fighting, it will be. It will read that faster file. Andi, if the file system is not wanted, it will mount it. I can see that this file system has been mounted now. Okay. Besides, would be 772 MB if I'm going. Do you know this 16 in tow? 80. He was the size sorry. 16 into 50 50 extremes. So you can see that it is somewhere around 800. Okay, So, like, with this file system has been created. Okay, So let me again tell you what, All the steps I have done it so far. Stuff alive after that PV physical volume on then we with the command off secret. Then I've used the common we put it this history. Then I have used this. Come on. We declared Andi specifically defined. This small s for setting the be size to 69 be on this video has been created. And then I have captured this logical volume on here. Have given 50 extents. Okay, This has been catered then for murdered the file system with 64 in the example I can give you some other file system as well on then. I've just created this on and the Bill. Katie, I have got the your idea of the file system, which you have catered. Just know on in the first time. I just put the entry for this file system, which, after so that if the system will be devoted, it will come up with this file system. So this is what I have done for this question. So from Detzel for this lecture hope you can understand what I am trying to show you. So such type of questions will come in a sec. Example. So thanks for watching. And if you have time, please join me in the next lecture. 22. Resize the logical volume: welcome to a last classes. Let's move to the next question. Next question is also an important question. So in this question, you have to resize the logical William Dr. Copy. That is the name off the logical volume. In the last lecture, we have created a file system. Donna, copy was the file system name a logical will leave name and it was monitored. It's less data source. Now we have to reduce that file system toe 400 MB. I believe it was somewhere around 800 be and make sure that a file system contains remain intact. Old traditions are seldom exactly the size requested. So anything between the rain off 3 72 4 30 is acceptable. So this is what we have to do it just moving towards my lab session. So this is the file system. Okay? Now it is something I don't need. 100 MB. Now we have to, you know, reduce the logical walling off file system toe 400 be so Atlantis. If you won't do to do any file system for stuff all you have to amount that file system so far, Stab, You have to do this Okay, so this file system has been amounted. Now, second is you have to, you know, use the command this e to first seek it and then hyphen f on the name off Mike Classical, William. Okay. And then the size to efforts on this five. This going to do there just to check the file system on, then at the last head after give 400. Okay, on. Then I will be reduced 400 am on the side of my name off. My Yes, it has been decided. Now, Mom. Typhon, he the If I finish, I can see that my file system has been reduced from some of their own. 880 to 400. And so these are the steps. Okay. See the river defense? If we're extending the file system, do not require toe among the file system. We do not require that day for that, but if you're reducing the file system, you have to, you know, amount of file system. You need the outage. Okay, so here, first I need to amount the file system and then checking for the file system for any others . So for that, I have just on FSC. Thank you and then and he says to If it's if you're extending it so steps are first. We have abused the EXTEND, then decides to efforts. But if you're releasing it so first of first we have fired this command decides to FS, and then we have to use abilities commands to commands the Chinese to fire here on, then simply have mounted file system using mounted on A. This is the basic commands, which can be used to resize or released a logical war games. So from there, some for this lecture hope you have understand how we can you know, Tekle a question which can be asked for the record certified system administration exam, the sense of watching and if you have time, please Joanne Whitman and execution. 23. Schedule a cron job: Welcome to Atlantis classes. Let's move to the next question. Next cushion is related to the content job. So what we need to in this question, we have to, you know, shoot Silicon chap on that con job will be run by a user and drew on the job which will run on the live asses at 14. 30 on a simple job. A simple script that is eco. Hello. So this is what we have to do it in this question. So let me move towards my Lennox box. So what we need to do First of all, we after this trial the package for this The package name is this one. So this is a common which can be used to, you know, strolla Pocket. It is already stopped after that. Make it unable so that it will take the reboot. The system will come up with this Packets of ground is the so this name for and after that , the common is going tab hyphen e for added you for the user. And better to cross check whether this user is adjusting or not. If it is not existing than simple, you have to create the user using. Use the red. Come on on, then. Simple. Give a password for that to you. There is already existing here, so you have to use contact Hyphen e for adit. You for the user. So I'm going to create a contract for User Andrew. And so here the time is 30 14 three star. So first to the minute. Okay, on this is for the hours on it they want it is for every day. So that's why I used three star then echo. Hello. So this is what they want. Seven. Come out. It has been done now. Okay, so this job will execute hello every day at 14. 30. If you want to verify, you have the crown content, hyphen and user contacts hell for listing. So it will show the job for this custom user if I'm giving for route. So showing that there is no job for the root user. If I'm doing for some other user like Xnyr, it is saying there is no job for Chicago because I have created a job only for the user. And you. So from there. So for the selective, I believe you have understand how we can you know, said a con job. So in the exam, you know you will get some different script. You can get some different time. But the procedure, the steps would be saying so from that song for this lecture. If you have time, please, John. If it in the next sector. But by 24. Last lecture: Hello, everyone. This is the last lecture of this course morning, and I believe you have learned a lot off new things from this course model. I've tried my best to explain each cushions, but their answers and a practical approach on Believe me, if you really looking for RCs exam, then do the practice from your own. Create a set up on your laptop, this tall annex operating system. Get a sovereign plane and what are the questions we have discussed? Do it from your own twice a tryst Time. Go through my course again and again on whatever the questions we have discussed. Do it by yourself. I believe me. You can easily crack this exam. So from that soul, and if you have any confusion, any concern, any suggestion you can directly day to me put your question into the question Answer. Forum. Thanks