You are previewing RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), Sixth Edition.
O'Reilly logo
RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), Sixth Edition

Book Description

The best fully integrated study system available (Exams EX200 and EX300) With hundreds of review questions and complete coverage of performance-based requirements, RHCSA/RHCE Red Hat Linux Certification Study Guide, Sixth Edition covers what you need to know--and shows you how to prepare--for these challenging exams. The ebook version does not provide access to the companion files.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. About the Contributors
  5. Contents at a Glance
  6. Contents
  7. Acknowledgments
  8. Preface
  9. Introduction
  10. I - Prepare for Red Hat Hands-on Certifications
    1. The RHCSA and RHCE Exams
      1. The Exam Experience
      2. The RHCSA Exam
      3. The RHCE Exam
      4. If You’re Studying “Just” for the RHCSA Exam
      5. Evolving Requirements
    2. Basic Hardware Requirements
      1. Hardware Compatibility
      2. Architectures
      3. RAM Requirements
      4. Hard Drive Options
      5. Networking
      6. Virtual Machine Options
    3. Get Red Hat Enterprise Linux
      1. Purchase a Subscription
      2. Get an Evaluation Copy
      3. Third-Party Rebuilds
      4. Check the Download
    4. Installation Requirements
      1. You Won’t Start from Scratch
      2. The Advantages of Network Installation
      3. Red Hat and Virtual Machines
      4. Virtual and Physical Systems
      5. A Pre-installed Environment for Practice Labs
      6. System Roles
    5. Installation Options
      1. Boot Media
      2. CD/DVD or Boot USB Starts Installation
      3. Basic Installation Steps
      4. The Installation Perspective on Partitions
      5. Partition Creation Exercises
      6. EXERCISE 1-1: Partitioning During Installation
      7. Configure the Bootloader
      8. Wow, Look at All That Software!
      9. Baseline Packages
      10. Package Groups
      11. On Reboot
    6. System Setup Options
      1. The First Boot Process
      2. Default Security Settings
      3. Special Setup Options for Virtual Machines
    7. Configure Default File Sharing Services
      1. Mount and Copy the Installation DVD
      2. Set Up a Default Configuration Apache Server
      3. EXERCISE 1-2: Configure Apache as an Installation Server
      4. Share Copied Files via FTP Server
      5. Two-Minute Drill
      6. Self Test
      7. Lab Questions
      8. Self Test Answers
      9. Lab Answers
  11. 2 - Virtual Machines and Automated Installations
    1. Configure KVM for Red Hat
      1. Why Virtual Machines
      2. If You Have to Install KVM
      3. The Right KVM Modules
      4. Configure the Virtual Machine Manager
      5. EXERCISE 2-1: Create a Second Virtual Network
    2. Configure a Virtual Machine on KVM
      1. Configure a Virtual Machine on KVM
      2. EXERCISE 2-2: Add Virtual Hard Drives
      3. KVM Configuration Files
      4. Control Virtual Machines from the Command Line
    3. Automated Installation Options
      1. Kickstart Concepts
      2. Set Up Local Access to Kickstart
      3. Set Up Network Access to Kickstart
      4. Sample Kickstart File
      5. Exercise 2-3: Create and Use a Sample Kickstart File
      6. The Kickstart Configurator
    4. Administration with the Secure Shell
      1. Configure an SSH Client
      2. Command Line Access
      3. More SSH Command Line Tools
      4. Graphical Secure Shell Access
    5. Consider Adding These Command Line Tools
      1. Checking Ports with telnet
      2. Checking Ports with nmap
      3. Configure an E-Mail Client
      4. The Use of Text and Graphical Browsers
      5. Using lftp to Access URLs
      6. Two-Minute Drill
      7. Self Test
      8. Lab Questions
      9. Self Test Answers
      10. Lab Answers
  12. 3 - Fundamental Command Line Skills
    1. Shells
      1. Other Shells
      2. Terminal Consoles
      3. GUI Shell Interfaces
      4. Differences Between Regular and Administrative Users
      5. Text Streams and Command Redirection
    2. Standard Command Line Tools
      1. File and Directory Concepts
      2. File Lists and ls
      3. File Creation Commands
      4. Wildcards
      5. File Searches
    3. The Management of Text Files
      1. Commands to Read Text Streams
      2. Commands to Process Text Streams
      3. Edit Text Files at the Console
      4. EXERCISE 3-1 Using vi to Create a New User
      5. If You Don’t Like vi
      6. Edit Text Files in the GUI
    4. Local Online Documentation
      1. When You Need Help
      2. A Variety of man Pages
      3. The info Manuals
      4. Detailed Documentation in /usr/share/doc
    5. A Networking Primer
      1. IP Version 4 Numbers and Address Classes
      2. Basic IP Version 6 Addressing
      3. How to Define a Network with IP Addresses
      4. Tools, Commands, and Gateways
    6. Network Configuration and Troubleshooting
      1. Network Configuration Files
      2. Network Configuration Tools
      3. EXERCISE 3-2: Configure a Network Card
      4. Hostname Configuration Files
      5. Hostname Configuration Options
      6. The Network Manager Applet
      7. Two-Minute Drill
      8. Self Test
      9. Lab Questions
      10. Self Test Answers
      11. Lab Answers
  13. 4 - RHCSA-Level Security Options
    1. Basic File Permissions
      1. File Permissions and Ownership
      2. Basic User and Group Concepts
      3. The umask
      4. Commands to Change Permissions and Ownership
      5. Special File Attributes
    2. Access Control Lists and More
      1. Every File Already Has an ACL
      2. Make a Filesystem ACL Friendly
      3. Manage ACLs on a File
      4. Configure a Directory for ACLs
      5. Special Restrictions with ACLs
      6. ACLs and Masks
      7. EXERCISE 4-1: Use ACLs to Deny a User
      8. NFS Shares and ACLs
    3. Basic Firewall Control
      1. Standard Ports
      2. A Focus on iptables
      3. Keep That Firewall in Operation
      4. The Default RHEL 6 Firewall
      5. The Firewall Configuration Tools
      6. EXERCISE 4-2: Adjust Firewall Settings
    4. A Security-Enhanced Linux Primer
      1. Basic Features of SELinux
      2. SELinux Status
      3. SELinux Configuration at the Command Line
      4. Configure Basic SELinux Settings
      5. Configure Regular Users for SELinux
      6. Manage SELinux Boolean Settings
      7. List and Identify SELinux File Contexts
      8. Restore SELinux File Contexts
      9. Identify SELinux Process Contexts
      10. Diagnose and Address SELinux Policy Violations
      11. The GUI SELinux Management Tool
      12. The SELinux Troubleshoot Browser
      13. EXERCISE 4-3: Test an SELinux User Type
      14. Two-Minute Drill
      15. Self Test
      16. Lab Questions
      17. Self Test Answers
      18. Lab Answers
  14. 5 - The Boot Process
    1. The BIOS and the UEFI
      1. Basic System Configuration
      2. Startup Menus
      3. Access to Linux Bootloaders
    2. Bootloaders and GRUB
      1. GRUB, the GRand Unified Bootloader
      2. Boot into Different Runlevels
      3. Exercise 5-1: Boot into a Different Runlevel
      4. Modify the System Bootloader
      5. More Options
      6. GRUB Security and Password Protection
      7. How to Update GRUB
      8. Effects of GRUB Errors
      9. The GRUB Command Line
      10. EXERCISE 5-2: Using the GRUB Command Line
      11. Create Your Own GRUB Configuration File
      12. An Option to Booting from GRUB: Rescue Mode
    3. Between GRUB and Login
      1. Kernels and the Initial RAM Disk
      2. The First Process, Runlevels, and Services
      3. Switch Between Runlevels
      4. Reboot and Shut Down a System Normally
      5. Upstart Replaces SysVInit
      6. Upstart Configuration Files
      7. Terminals and Login Screens
    4. Control by Runlevel
      1. Functionality by Runlevel
      2. The Innards of Runlevel Scripts
      3. Service Configuration from the Command Line
      4. The Text Console Service Configuration Tool
      5. The GUI Service Configuration Tool
    5. Network Configuration
      1. Network Configuration Commands
      2. Network Configuration Files
      3. The /etc/sysconfig/network-scripts Files
      4. Red Hat Configuration Tools
      5. EXERCISE 5-3 Modify Network Interfaces with the Network Connections Tool
      6. Configure Name Resolution
      7. Exercise 5-4: Revise Network Interfaces on a Cloned System
    6. Time Synchronization
      1. An NTP Client
      2. Date/Time Properties
      3. Two-Minute Drill
      4. Self Test
      5. Lab Questions
      6. Self Test Answers
      7. Lab Answers
  15. 6 - Linux Filesystem Administration
    1. Storage Management and Partitions
      1. Current System State
      2. The fdisk Utility
      3. The parted Utility
      4. Graphical Options
      5. EXERCISE 6-1: Work with fdisk and parted
    2. Filesystem Formats
      1. Standard Formatting Filesystems
      2. Journaling Filesystems
      3. Filesystem Format Commands
      4. Swap Volumes
      5. Filesystem Check Commands
      6. Filesystem Conversions
      7. EXERCISE 6-2: Format, Check, and Mount Different Filesystems
    3. Basic Linux Filesystems and Directories
      1. Separate Linux Filesystems
      2. Directories That Can Be Mounted Separately
    4. Logical Volume Management (LVM)
      1. Definitions in LVM
      2. Create a Physical Volume
      3. Create a Volume Group
      4. Create a Logical Volume
      5. Make Use of a Logical Volume
      6. More LVM Commands
      7. Remove a Logical Volume
      8. Resize Logical Volumes
      9. The GUI Logical Volume Management Tool
    5. Volume Encryption with the Linux Unified Key Setup
      1. Passwords, Passphrases, and More
      2. Encryption During Installation
      3. Prepare and Initialize Encryption
      4. Prepare the New Filesystem
      5. Create the New Filesystem
    6. Filesystem Management
    7. The /etc/fstab File
    8. Universally Unique Identifiers in /etc/fstab
    9. The mount Command
    10. More Filesystem Mount Options
    11. Virtual Filesystems
    12. Add Your Own Filesystems to /etc/fstab
    13. Removable Media and /etc/fstab
    14. Networked Filesystems
    15. The Automounter
      1. Mounting via the Automounter
      2. EXERCISE 6-3: Configure the Automounter
      3. Two-Minute Drill
      4. Self Test
      5. Lab Questions
      6. Self Test Answers
      7. Lab Answers
  16. 7 - Package Management
    1. The Red Hat Package Manager
      1. What Is a Package?
      2. What Is a Red Hat Package?
      3. What Is a Repository?
      4. Install an RPM Package
      5. Uninstall an RPM Package
      6. Install RPMs from Remote Systems
      7. RPM Installation Security
      8. Special RPM Procedures with the Kernel
    2. More RPM Commands
      1. Package Queries
      2. Package Signatures
      3. File Verification
      4. Different Databases of Installed Packages
    3. Dependencies and the yum Command
      1. An Example of Dependency Hell
      2. Relief from Dependency Hell
      3. Basic yum Configuration
      4. The Basic yum Configuration File: yum.conf
      5. Configuration Files in the /etc/yum/pluginconf.d Directory
      6. Configuration Files in the /etc/yum.repos.d Directory
      7. Create Your Own /etc/yum.repos.d Configuration File
      8. EXERCISE 7-1: Create a yum Repository from the RHEL 6 DVD
      9. Third-Party Repositories
      10. Basic yum Commands
      11. Installation Mode
      12. Security and yum
      13. Updates and Security Fixes
      14. Package Groups and yum
      15. More yum Commands
    4. More Package Management Tools
      1. The GNOME Software Update Tool
      2. Automated Updates
      3. GNOME Add/Remove Software Tool
      4. EXERCISE 7-2: Installing More with yum and the Add/Remove Software Tool
      5. The Red Hat Network
      6. Two-Minute Drill
      7. Self Test
      8. Lab Questions
      9. Self Test Answers
      10. Lab Answers
  17. 8 - User Administration
    1. User Account Management
      1. Different Kinds of Users
      2. The Shadow Password Suite
      3. Command Line Tools
      4. Exercise 8-1: Add a User with the Red Hat User Manager
      5. Exercise 8-2: Real and Fake Shells
      6. Delete a User
      7. Modify an Account
      8. More User and Group Management Commands
    2. Administrative Control
      1. The Ability to Log In as root
      2. EXERCISE 8-3: Limit root Logins
      3. The Ability to Log In
      4. The Proper Use of the su Command
      5. Limit Access to su
      6. The Proper Use of the sg Command
      7. Custom Administrators with the sudo Command
      8. Other Administrative Users
    3. User and Shell Configuration
      1. Home Directories and /etc/skel
      2. /etc/bashrc
      3. /etc/profile and /etc/profile.d
      4. /etc/profile.d
      5. EXERCISE 8-4: Another Way to Secure a System
      6. Shell Configuration Files in User Home Directories
      7. Login, Logout, and User Switching
    4. Users and Network Authentication
    5. LDAP Client Configuration
    6. The Name Service Switch File
    7. Red Hat Network Authentication Tools
    8. Special Groups
      1. Standard and Red Hat Groups
      2. Shared Directories
      3. EXERCISE 8-5: Control Group Ownership with the SGID Bit
      4. Two-Minute Drill
      5. Self Test
      6. Lab Questions
      7. Self Test Answers
      8. Lab Answers
  18. 9 - RHCSA-Level System Administration Tasks
    1. Configure Access with VNC
      1. Install and Configure a TigerVNC Server
      2. The GNOME-Based vino Server
      3. Install and Configure a VNC Client
      4. Firewall Options
      5. Confirm Access to a VNC Server
      6. Route Through a Secure Shell
      7. More VNC Configuration
      8. A User VNC Configuration File
    2. Elementary System Administration Commands
      1. System Resource Management Commands
      2. Archives and Compression
      3. Control Services Through Daemons
    3. Automate System Administration: cron and at
      1. The System crontab and Components
      2. Hourly cron Jobs
      3. Regular Anacron Jobs
      4. Setting Up cron for Users
      5. EXERCISE 9-1: Create a cron Job
      6. Running a Job with the at System
      7. Secure cron and at
    4. Local Log File Analysis
      1. System Log Configuration File
      2. Log File Management
      3. A Variety of Log Files
      4. Service Specific Logs
      5. EXERCISE 9-2: Learn the Log Files
      6. Two-Minute Drill
      7. Self Test
      8. Lab Questions
      9. Self Test Answers
      10. Lab Answers
  19. 10 - A Security Primer
    1. The Layers of Linux Security
      1. Bastion Systems
      2. Best Defenses with Security Updates
      3. Service-Specific Security
      4. Host-Based Security
      5. User-Based Security
      6. Console Security
      7. Recommendations from the U.S. National Security Agency
      8. The PolicyKit
    2. Firewalls and Network Address Translation
      1. Definitions
      2. The Structure of the iptables Command
      3. The Default Firewall
      4. Recommendations from the NSA
      5. Make Sure the Firewall Is Running
      6. IP Masquerading
      7. IP Forwarding
      8. The Red Hat Firewall Configuration Tool
    3. The Extended Internet Super-Server
      1. Generic xinetd Configuration
      2. Service-Specific xinetd Configuration
      3. EXERCISE 10-1: Configure xinetd
    4. TCP Wrappers
      1. Is a Service Protected by TCP Wrappers?
      2. TCP Wrappers Configuration Files
      3. EXERCISE 10-2: Configure TCP Wrappers
    5. Pluggable Authentication Modules
      1. Configuration Files
      2. Control Flags
      3. The Format of a PAM File
      4. EXERCISE 10-3: Configure PAM
      5. PAM and User-Based Security
      6. EXERCISE 10-4: Use PAM to Limit User Access
    6. Secure Files and More with GPG2
      1. GPG2 Commands
      2. Current GPG2 Configuration
      3. GPG2 Encryption Options
      4. Generate a GPG2 Key
      5. Use a GPG2 Key to Secure a File
      6. Two-Minute Drill
      7. Self Test
      8. Lab Questions
      9. Self Test Answers
      10. Lab Answers
  20. 11 - System Services and SELinux
    1. Red Hat System Configuration
      1. Service Management
      2. System Services
      3. Bigger Picture Configuration Process
      4. Available Configuration Tools
    2. Security-Enhanced Linux
      1. Options in the SELinux Booleans Directory
      2. Service Categories of SELinux Booleans
      3. Boolean Configuration with the SELinux Management Tool
      4. Boolean Settings
      5. SELinux File Contexts
      6. EXERCISE 11-1: Configure a New Directory with Appropriate SELinux Contexts
    3. The Secure Shell Server
      1. SSH Configuration Commands
      2. SSH Configuration Files
      3. Basic Encrypted Communication
      4. Set Up a Private/Public Pair for Key-Based Authentication
      5. Configure an SSH Server
      6. User-Based Security for SSH
      7. Host-Based Security for SSH
    4. A Security and Configuration Checklist
      1. Installation of Server Services
      2. Basic Configuration
      3. Make Sure the Service Survives a Reboot
      4. Review Access Through Layers of Security
      5. EXERCISE 11-2: Review the Different Effects of iptables and TCP Wrappers
      6. Two-Minute Drill
      7. Self Test
      8. Lab Questions
      9. Self Test Answers
      10. Lab Answers
  21. 12 - RHCE Administrative Tasks
    1. Automate System Maintenance
      1. Standard Administrative Scripts
      2. Script Commands
      3. Create Your Own Administrative Scripts
      4. Exercise 12-1: Create a Script
    2. Kernel Run-Time Parameters
      1. How sysctl Works with /etc/sysctl.conf
      2. Settings in the /etc/sysctl.conf File
      3. Exercise 12-2: Disable Responses to the ping Command
    3. Create an RPM Package
      1. Source RPMs
      2. The Directory Structure of an RPM Source
      3. Create Custom Source Code
      4. One More Prep Package
      5. Create Your Own spec File
      6. Build Your Own RPM
      7. The Built RPMs
    4. Special Network Options
      1. Configure Special IP Routes
      2. Set Up a Kerberos Client
      3. Connect to Remote iSCSI Storage
      4. Two-Minute Drill
      5. Self Test
      6. Lab Questions
      7. Self Test Answers
      8. Lab Answers
  22. 13 - Electronic Mail Servers
    1. A Variety of E-Mail Agents
      1. Definitions and Protocols
      2. Relevant Mail Server Packages
      3. Use alternatives to Select an E-Mail System
      4. General User Security
      5. Mail Logging
      6. Common Security Issues
      7. Testing an E-Mail Server
      8. EXERCISE 13-1: Create Users Just for E-Mail
    2. The Configuration of Postfix
      1. Configuration Files
      2. The main.cf Configuration File
      3. The /etc/aliases Configuration File
      4. The master.cf Configuration File
      5. Test the Current Postfix Configuration
      6. Configure Postfix Authentication
      7. Configure Incoming E-Mail
      8. Configure a Relay Through a Smart Host
      9. EXERCISE 13-2: Switch Services
    3. The Other SMTP Service: sendmail
      1. The Basics of sendmail
      2. Configuration Files
      3. The sendmail.mc Macro File
      4. The submit.mc Macro File
      5. Configure sendmail to Accept E-Mail from Other Systems
      6. Configure sendmail to Relay E-Mail to a Smart Host
      7. Configure User- and Host-Based sendmail Security
      8. Test the Current sendmail Configuration
      9. Two-Minute Drill
      10. Self Test
      11. Lab Questions
      12. Self Test Answers
      13. Lab Answers
  23. 14 - The Apache Web Server
    1. The Apache Web Server
      1. Apache 2.2
      2. The LAMP Stack
      3. Installation
      4. EXERCISE 14-1: Install the Apache Server
      5. The Apache Configuration Files
      6. Analyze the Default Apache Configuration
      7. The Main Apache Configuration File
      8. Basic Apache Configuration for a Simple Web Server
      9. Apache Log Files
    2. Standard Apache Security Configuration
      1. Ports and Firewalls
      2. Apache and SELinux
      3. Module Management
      4. Security Within Apache
      5. EXERCISE 14-2: The Apache Welcome and the noindex.html Story
      6. EXERCISE 14-3: Create a List of Files
      7. Host-Based Security
      8. User-Based Security
    3. Specialized Apache Directories
      1. Control Through the .htaccess File
      2. Password-Protected Access
      3. Home Directory Access
      4. Group-Managed Directories
      5. EXERCISE 14-4: Password Protection for a Web Directory
    4. Regular and Secure Virtual Hosts
      1. The Standard Virtual Host
      2. Secure Virtual Hosts
      3. Create a New SSL Certificate
      4. Test Pages
      5. Syntax Checkers
      6. Apache Troubleshooting
      7. EXERCISE 14-5: Set Up a Virtual Web Server
    5. Deploy a Basic CGI Application
      1. Apache Configuration Changes for CGI Files
      2. Set Up a Simple CGI Script
      3. Connections to a Web Site
      4. Two-Minute Drill
      5. Self Test
      6. Lab Questions
      7. Self Test Answers
      8. Lab Answers
  24. 15 - The Samba File Server
    1. Samba Services
      1. Install Samba Services
      2. Some Samba Background
      3. Ports, Firewalls, and Samba
      4. Configure SELinux Booleans for Samba
      5. Configure SELinux File Types for Samba
      6. Samba Daemons
      7. Samba Server Global Configuration
      8. Shared Samba Directories
      9. Let Samba Join a Domain
      10. The Samba User Database
      11. Create a Public Share
      12. EXERCISE 15-1: Configure a Samba Home Directory Share
      13. The Samba Web Administration Tool
      14. Test Changes to /etc/samba/smb.conf
      15. Review User- and Host-Based Samba Security
      16. Review Basic Samba Shares
      17. EXERCISE 15-2: Configuring Samba with Shares
    2. Samba as a Client
      1. Command Line Tools
      2. Mount Options
      3. Automated Samba Mounts
    3. Samba Troubleshooting
      1. Samba Problem Identification
      2. Local Log File Checks
      3. Enable Remote Access
      4. Two-Minute Drill
      5. Self Test
      6. Lab Questions
      7. Self Test Answers
      8. Lab Answers
  25. 16 - More File-Sharing Services
    1. The Network File System (NFS) Server
      1. NFS Options for RHEL 6
      2. Basic NFS Installation
      3. Basic NFS Server Configuration
      4. Configure NFS for Basic Operation
      5. Special Requirements for /home Directories
      6. Fixed Ports in /etc/sysconfig/nfs
      7. Make NFS Work with SELinux
      8. Quirks and Limitations of NFS
      9. Performance Tips
      10. NFS Security Directives
      11. Options for Host-Based Security
      12. Options for User-Based Security
      13. EXERCISE 16-1: NFS
    2. Test an NFS Client
      1. NFS Mount Options
      2. Configure NFS in /etc/fstab
      3. Diskless Clients
      4. Soft Mounting
      5. Current NFS Status
    3. The Very Secure FTP Server
      1. Basic vsFTP Configuration
      2. The Main vsFTP Configuration File
      3. Other vsFTP Configuration Files
      4. Configure SELinux Support for vsFTP
      5. Ports, Firewalls, and vsFTP
      6. EXERCISE 16-2: Configure a Basic vsFTP Server
      7. Anonymous-Only Download Configuration
      8. Two-Minute Drill
      9. Self Test
      10. Lab Questions
      11. Self Test Answers
      12. Lab Answers
  26. 17 - Administrative Services: DNS, FTP, and Logging
    1. Basic Domain Service Organization
      1. Basic Parameters
      2. DNS Package Options
      3. Different Types of DNS Servers
    2. Minimal DNS Server Configurations
      1. BIND Configuration Files
      2. A Caching-Only Name Server
      3. Starting named
      4. A Forwarding Name Server
      5. Forwarding from a Caching-Only Name Server
      6. BIND Troubleshooting Commands
      7. Exercise 17-1: Set Up Your Own DNS Server
    3. Set Up System Utilization Reports
      1. System Utilization Commands
      2. The System Status Service
      3. Collect System Status into Logs
      4. Prepare a System Status Report
    4. Configure a System Logging Server
      1. System Logging Modules
      2. Enable Logging Clients
      3. Configure Logging Servers
      4. Configure Logging Clients
      5. Limit Access to Specified Systems
    5. The Network Time Server Service
      1. The NTP Server Configuration File
      2. Security Limits on NTP
      3. Two-Minute Drill
      4. Self Test
      5. Lab Questions
      6. Self Test Answers
      7. Lab Answers
  27. A - Prepare a System for the Sample Exams
    1. Basic Sample Exam System Requirements
    2. Additional Sample Exam System Requirements for the RHCE
  28. B - Sample Exam 1: RHCSA
    1. RHCSA Sample Exam 1 Discussion
  29. C - Sample Exam 2: RHCSA
    1. RHCSA Sample Exam 2 Discussion
  30. D - Sample Exam 3: RHCE Sample Exam 1
    1. RHCE Sample Exam 1 Discussion
  31. E - Sample Exam 4: RHCE Sample Exam 2
    1. RHCE Sample Exam 2 Discussion
  32. F - About the CD
    1. System Requirements
    2. Electronic Book
    3. Technical Support