Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! EX407 Red Hat Certified Specialist in Ansible Automation exam is now Stable and With Pass Result

EX407 Practice Exam Questions and Answers

Red Hat Certified Specialist in Ansible Automation exam

Last Update 6 days ago
Total Questions : 41

Red Hat Certified Specialist in Ansible Automation exam is stable now with all latest exam questions are added 6 days ago. Incorporating EX407 practice exam questions into your study plan is more than just a preparation strategy.

EX407 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through EX407 dumps allows you to practice pacing yourself, ensuring that you can complete all Red Hat Certified Specialist in Ansible Automation exam practice test within the allotted time frame.

EX407 PDF

EX407 PDF (Printable)
$48
$119.99

EX407 Testing Engine

EX407 PDF (Printable)
$56
$139.99

EX407 PDF + Testing Engine

EX407 PDF (Printable)
$70.8
$176.99
Question # 1

Install and configure ansible

User bob has been created on your control node. Give him the appropriate permissions on the control node. Install the necessary packages to run ansible on the control node.

Create a configuration file /home/bob/ansible/ansible.cfg to meet the following requirements:

• The roles path should include /home/bob/ansible/roles, as well as any other path that may be required for the course of the sample exam.

• The inventory file path is /home/bob/ansible/inventory.

• Ansible should be able to manage 10 hosts at a single time.

• Ansible should connect to all managed nodes using the bob user.

Create an inventory file for the following five nodes:

nodel.example.com

node2.example.com

node3.example.com

node4.example.com

node5.example.com

Configure these nodes to be in an inventory file where node1 is a member of group dev. nodc2 is a member of group test, nodc3 is a member of group proxy, nodc4 and node 5 are members of group prod. Also, prod is a member of group webservers.

Options:

Discussion 0
Question # 2

Create a playbook called webdev.yml in 'home/sandy/ansible. The playbook will create a directory Avcbdev on dev host. The permission of the directory are 2755 and owner is webdev. Create a symbolic link from /Webdev to /var/www/html/webdev. Serve a file from Avebdev7index.html which displays the text "Development" Curl http://nod e1.example.com/webdev/index.html to test

Options:

Discussion 0
Question # 3

Install and configure ansible

User sandy has been created on your control node with the appropriate permissions already, do not change or modify ssh keys. Install the necessary packages to run ansible on the control node. Configure ansible.cfg to be in folder /home/sandy/ansible/ansible.cfg and configure to access remote machines via the sandy user. All roles should be in the path /home/sandy/ansible/roles. The inventory path should be in /home/sandy/ansible/invenlory.

You will have access to 5 nodes.

node1.example.com

node2.example.com

node3.example.com

node4.example.com

node5.example.com

Configure these nodes to be in an inventory file where node I is a member of group dev. nodc2 is a member of group test, node3 is a member of group proxy, nodc4 and node 5 are members of group prod. Also, prod is a member of group webservers.

Options:

Discussion 0
Question # 4

Create a file called mysecret.yml on the control host using ansible vault in home/bob/ansible. Set the password to 'notasafepass' and inside the file create a variable called dev_pass with the value of devops. Save the file. Then go back in the file and change dev_pass value to devops123. Then change the vault password of mysecret.yml to verysafepass

Options:

Discussion 0
Question # 5

Create the users in the file usersjist.yml file provided. Do this in a playbook called users.yml located at /home/sandy/ansible. The passwords for these users should be set using the lock.yml file from TASK7. When running the playbook, the lock.yml file should be unlocked with secret.txt file from TASK 7.

All users with the job of 'developer' should be created on the dev hosts, add them to the group devops, their password should be set using the pw_dev variable. Likewise create users with the job of 'manager' on the proxy host and add the users to the group 'managers', their password should be set using the pw_mgr variable.

Question # 5

Options:

Discussion 0
Question # 6

===================================================================================

control.realmX.example.com _ workstation.lab.example.com

node1.realmX.example.com _ servera.lab.example.com

node2.realmX.example.com _ serverb.lab.example.com

node3.realmX.example.com _ serverc.lab.example.com

node4.realmX.example.com _ serverd.lab.example.com

node5.realmX.example.com

- username:root, password:redhat

- username:admin, password:redhat

note1. don’t change ‘root’ or ‘admin’ password.

note2. no need to create ssh-keygen for access, its pre-defined

note3. SELinux is in enforcing mode and firewalld is disabled/stop on whole managed hosts.

===================================================================================

Create Logical volumes with lvm.yml in all nodes according to following

requirements.

----------------------------------------------------------------------------------------

* Create a new Logical volume named as 'data'

* LV should be the member of 'research' Volume Group

* LV size should be 1500M

* It should be formatted with ext4 file-system.

--> If Volume Group does not exist then it should print the message "VG Not found"

--> If the VG can not accommodate 1500M size then it should print "LV Can not be

created with

following size", then the LV should be created with 800M of size.

--> Do not perform any mounting for this LV.

Options:

Discussion 0
Get EX407 dumps and pass your exam in 24 hours!

Free Exams Sample Questions