About the RHCSA (EX200) and RHCE (EX300) Exams - RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition (2015) 

RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition (2015)

About the RHCSA (EX200) and RHCE (EX300) Exams

The Red Hat Certified System Administrator (RHCSA) and the Red Hat Certified Engineer (RHCE) certification exams are performance-based hands-on exams designed for IT professionals. These exams are presented in electronic format on a live desktop computer running Red Hat Enterprise Linux 7. This desktop computer will have one RHEL7-based virtual machine for the RHCSA exam and two for the RHCE exam. During the exams, the candidates do not have access to the Internet, or printed or electronic documentation except for what comes standard with RHEL7. The official exam objectives are listed at http://www.redhat.com/training/courses/ex200/examobjective for RHCSA and that for RHCE at http://www.redhat.com/training/courses/ex300/examobjective. Visit the URLs for up-to-date and more in-depth information. The exam objectives are covered in sufficient detail in the chapters throughout this book. An enumerated list of exam objectives is presented below along with a chapter number where the objective is found.

RHCSA   Specific Skills:

Understand and Use Essential Tools:

1.    Access a shell prompt and issue commands with correct syntax (chapter 2)

2.    Use input-output redirection (>, >>, |, 2>, etc) (chapter 4) 

3.    Use grep and regular expressions to analyze text (chapter 4)

4.    Access remote systems using ssh (chapter 13)

5.    Log in and switch users in multiuser targets (chapter 8)

6.    Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2 (chapter 2)

7.    Create and edit text files (chapter 2)

8.    Create, delete, copy, and move files and directories (chapter 3)

9.    Create hard and soft links (chapter 3)

10.  List, set, and change standard ugo/rwx permissions (chapter 3)

11.  Locate, read, and use system documentation including man, info, and files in /usr/share/doc (chapter 2)

Operate Running Systems

12.  Boot, reboot, and shut down a system normally (chapter 7)

13.  Boot systems into different targets manually (chapter 7)

14.  Interrupt the boot process in order to gain access to a system (chapter 7)

15.  Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes (chapter 4)

16.  Locate and interpret system log files and journals (chapter 7)

17.  Access a virtual machine’s console (chapter 6)

18.  Start and stop virtual machines (chapter 6)

19.  Start, stop, and check the status of network services (chapter 7)

20.  Securely transfer files between systems (chapter 13)

Configure Local Storage

21.  List, create, and delete partitions on MBR and GPT disks (chapter 9)

22.  Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes (chapter 9)

23.  Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label (chapter 10)

24.  Add new partitions and logical volumes, and swap to a system non-destructively (chapters 9 and 10)

Create and Configure File Systems

25.  Create, mount, unmount, and use vfat, ext4, and xfs file systems (chapter 10)

26.  Mount and unmount CIFS and NFS network file systems (chapters 10, 20, and 21)

27.  Extend existing logical volumes (chapter 9)

28.  Create and configure set-GID directories for collaboration (chapter 3)

29.  Create and manage Access Control Lists (ACLs) (chapter 10)

30.  Diagnose and correct file permission problems (chapter 3)

Deploy, Configure, and Maintain Systems

31.  Configure networking and hostname resolution statically or dynamically (chapter 12 and 15)

32.  Schedule tasks using at and cron (chapter 4)

33.  Start and stop services and configure services to start automatically at boot (chapter 7)

34.  Configure systems to boot into a specific target automatically (chapter 7)

35.  Install Red Hat Enterprise Linux automatically using Kickstart (chapter 6)

36.  Configure a physical machine to host virtual guests (chapter 6)

37.  Install Red Hat Enterprise Linux systems as virtual guests (chapter 6)

38.  Configure systems to launch virtual machines at boot (chapter 6)

39.  Configure network services to start automatically at boot (chapter 7)

40.  Configure a system to use time services (chapter 12 and 16)

41.  Install and update software packages from Red Hat Network, a remote repository, or from the local file system (chapter 5)

42.  Update the kernel package appropriately to ensure a bootable system (chapter 7)

43.  Modify the system bootloader (chapter 7)

Manage Users and Groups

44.  Create, delete, and modify local user accounts (chapter 8)

45.  Change passwords and adjust password aging for local user accounts (chapter 8)

46.  Create, delete, and modify local groups and group memberships (chapter 8)

47.  Configure a system to use an existing authentication service for user and group information (chapter 12)

Manage Security

48.  Configure firewall settings using firewall-config, firewall-cmd, or iptables (chapter 11)

49.  Configure key-based authentication for SSH (chapter 13)

50.  Set enforcing and permissive modes for SELinux (chapter 11)

51.  List and identify SELinux file and process context (chapter 11)

52.  Restore default file contexts (chapter 11)

53.  Use boolean settings to modify system SELinux settings (chapter 11)

54.  Diagnose and address routine SELinux policy violations (chapter 11)

RHCE™ Specific Skills:

System Configuration and Management

55.  Use network teaming or bonding to configure aggregate network links between two Red Hat Enterprise Linux systems (chapter 15)

56.  Configure IPv6 addresses and perform basic IPv6 troubleshooting (chapter 15)

57.  Route IP traffic and create static routes (chapter 15)

58.  Use firewallD and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT) (chapter 17)

59.  Use /proc/sys and sysctl to modify and set kernel runtime parameters (chapter 18)

60.  Configure a system to authenticate using Kerberos (chapter 17)

61.  Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target (chapter 19)

62.  Produce and deliver reports on system utilization (processor, memory, disk, and network) (chapter 18)

63.  Use shell scripting to automate system maintenance tasks (chapter 14)

64.  Configure a system to log to a remote system (chapter 18) [Recently removed from the objectives list]

65.  Configure a system to accept logging from a remote system (chapter 18) [Recently removed from the objectives list]

Network Services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

·        Install the packages needed to provide the service

·        Configure SELinux to support the service

·        Use SELinux port labelling to allow services to use non-standard ports

·        Configure the service to start when the system is booted

·        Configure the service for basic operation

·        Configure host-based and user-based security for the service

HTTP/HTTPS (chapter 22)

66.  Configure a virtual host

67.  Configure private directories

68.  Deploy a basic CGI application

69.  Configure group-managed content

70.  Configure TLS security

DNS (chapter 24)

71.  Configure a caching-only name server

72.  Troubleshoot DNS client issues

NFS (chapter 20)

73.  Provide network shares to specific clients

74.  Provide network shares suitable for group collaboration

75.  Use Kerberos to control access to NFS network shares

SMB (chapter 21)

76.  Provide network shares to specific clients

77.  Provide network shares suitable for group collaboration

78.  Use Kerberos to authenticate access to shared directories

SMTP (chapter 23)

79.  Configure a system to forward all email to a central mail server

SSH (chapter 13) [This chapter is in the RHCSA section]

80.  Configure key-based authentication

81.  Configure additional options described in documentation

NTP (chapter 16)

82.  Synchronize time using other NTP peers

Database Services (chapter 25)

83.  Install and configure MariaDB

84.  Backup and restore a database

85.  Create a simple database schema

86.  Perform simple SQL queries against a database

Taking the Exams

1.     Save time wherever possible, as time is of the essence during the exams. Install X Window and GNOME if you prefer to use the graphical tools for completing your tasks (instructions are provided in chapter 01 on how to do it). Perform tasks using either text or graphical tools, whichever you feel more comfortable with. Install a graphical tool if you need it and if it is not already loaded.

2.     Make certain that any changes you make must survive system reboots.

3.     Use any text editor you feel comfortable with to modify text configuration files.

4.     Inform the invigilator right away if you identify a hardware issue with your system.

5.     Exams are administered with no access to the Internet, electronic devices, or paper material.

6.     Read each exam task carefully and understand it thoroughly before attempting it.

Exam Fees and Registration Procedure

The fee for either the RHCSA (EX200) or RHCE (EX300) exam is US$400, or equivalent in local currencies. To register, visit http://www.redhat.com/training/courses/ex200/examobjective or http://www.redhat.com/training/courses/ex300/examobjective and click ENROLL. Choose a location and date, and click SEARCH for available choices. Click Enroll Now and submit your information and fee to register. The exams are administered on Fridays in a classroom setting. At many centers, individuals also have the convenience to schedule their exams on regular business days other than Fridays. The RHCSA exam lasts for 2.5 hours and the RHCE exam 4 hours.