Arjit

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

LINUX | LEVEL 3

INTERVIEW QUESTIONS
1. Explain virtual desktop?
Answer: When there are multiple windows available on the current desktop and there appears
the problem of minimizing and maximizing windows or restoring all the current programs, there
‘Virtual Desktop’ serves as an alternative. It allows you to open one or more programs on a clean
slate.

Virtual desktops are basically stored on a remote server and serve the following benefits:
Virtual desktops are basically stored on a remote server and serve the following benefits
Cost savings as the resources can be shared and allocated as and when required.
Resources and energy are more efficiently used.
Data integrity is improved.
Centralized administration
Fewer compatibility issues.
2. Explain /proc file system?
Answer: /proc is a virtual file system that provides detailed information about Linux kernel,
hardware, and running processes. Files under /proc directory named as Virtual files.Since /
proc contains virtual files, it is called the virtual file system. These virtual files have unique
qualities. Most of them are listed as zero bytes in size.Virtual files such as /
proc/interrupt, /proc/meminfo, /proc/mounts, and /proc/partitions provide an up-to-the-moment
glimpse of the system’s hardware. Others: /proc/filesystems file and the /proc/sys/ directory
provide system configuration information and interfaces.

3. What is LILO?
Answer: LILO is Linux Loader is a boot loader for Linux. It is used to load Linux into the memory
and start the Operating system. LILO can be configured to boot other operating systems as well.
LILO is customizable, which means that if the default configuration is not correct, it can be
changed. Config file for LILO is lilo.conf.LILO is also a code snippet which loads PC BIOS into the
main memory

at the time of starting the computer system. It handles the following tasks:
1. Locating the Linux kernel.2. Identifying other supporting programs and loading them in
memory.
3. Starting Kernel.
The selection of various kernel images and boot routines is supported by LILO. For this reason, it
is known as the boot manager.

Master Linux, in this Linux certification training.

4. What is the difference between soft and hard mounting points?


Answer: In the soft mount, if the client fails to connect the server, it gives an error report and
closes the connection whereas in the hard mount, if the client fails to access the server, the
connection hangs; and once the system is up, it again accesses the server.

5. How can you enhance the security of the password file?


Answer: Linux keep user account information in a text file called /etc/passwd. This file also stores
the one-way encrypted password. It is accessed by several tools to get user information, which is
a security risk, so file needs to ‘Word Readable.’ To minimize the security risk, you can use the
shadow password format. This method saves account information in regular file
/etc/passwd.However, the password is stored as a single “x” character (not actually stored in this
file). A second file, called “/
etc/shadow” contains encrypted password as well as other information such as account or
/ / fi
password expiration values, etc. The /etc/shadow file is readable only by the root account and is,
therefore, less of a security risk.
6. What is Puppet Server?
Answer: Puppet is an open-source & enterprise software for configuration management toll in
UNIX like operating system. Puppet is an IT automation software that is used to push
configuration to its clients (puppet agents) using code. Puppet code can do multiple tasks from
installing new software to checking file permissions to updating user accounts.

7. What is the difference between Cron and Anacron?


Answer: The minimum granularity with Cron is minute while it is in days with Anacron.
Cron job can be scheduled by any normal user while Anacron can be scheduled only by the
superuser (the superuser is a special user account used for system administration. Depending on
the operating system (OS), the actual name of this account might be root, administrator, admin or
supervisor)
Cron expects the system to be up and running while the Anacron doesn’t expect the system to be
up and running all the time. In the case of Anacron, if a job is scheduled and the system is down
that time, it will execute the job as soon as the system is up and running.
Cron is ideal for servers while Anacron is ideal for desktops and laptops.
Cron should be used when you want a job to be executed at a particular hour and minute while
Anacron should be used in when the job can be executed irrespective of the hour and minute.

8. What daemon is used for scheduling of the commands?


Answer: The crontab command is used for scheduling of the commands to run at a later
time.SYNTAX

crontab [ -u user ] file


crontab [ -u user ] { -l | -r | -e }Options
l List – display the current
crontab entries.
r Remove the current crontab.
e Edit the current crontab using the editor specified by the VISUAL or EDITOR environment
variables.When the user exits from the editor, the modified
crontab will be installed automatically. Each user can have their own crontab, and though these
are files in /var, they are not intended to be edited directly.If the –u option is given then the
crontab gives the name of the user whose crontab is to be tweaked. If it is given without this then
it will display the crontab of the user who is executing the command.

9. What shell does a Linux Administrator assign to a POP3 mail-only account?


Answer: POP3 mail-only account is assigned to the /bin/false shell. However, assigning bash
shell to a POP3 mail only gives user login access, which is avoided. /bin/nologin can also be
used. This shell is provided to the user when we don’t want to give shell access to the user. The
user cannot access the shell and it rejects shell login on the server as in Telnet. It is mainly for the
security of the shells.POP3 is basically used for downloading mail to the mail
program. So for illegal downloading of emails on the shell, this account is assigned to the
/bin/false shell or /bin/nologin. These both shells are the same as they both do the same work of
rejecting the user login to the shell.The main difference between these two shells is that false
shell shows the incorrect code and any unusual coding when user login to it. But the
nologin shell simply tells that no such account is available. So nologin shell is used often in Linux.
10. What are the different modes when using the vi editor?
Answer:The 3 different kinds of modes in vi editors are enlisted below
Command Mode/ Regular Mode
Insertion Mode/ Edit Mode
Ex Mode/ Replacement Mode

11. What is env command in Linux?


Answer: env command allows users to set or print the environment variables. During

fi f f f
troubleshooting, users can find it useful for checking if the wrong environment variable prevents
your application from starting.
env Command Example:

$ envPYTHON_PIP_VERSION=9.0.1
HOME=/root
DB_NAME=test
PATH=/
usr/local/bin:/usr/local/binLANG=C.UTF-8
PYTHON_VERSION=3.4.6
PWD=/
DB_URI=mongodb://database:27017/test

12. What is top Command in Linux?


Answer: top command displays and updates sorted process information. Use this top command
to determine which processes are running and how much memory and CPU they are consuming.

13. What command is used to check the number of files, disk space, and each user’s
defined quota?
Answer: repquota command is used to check the status of the user’s quota along with the disk
space and number of files used.This command gives a summary of the user’s quota that how
much space and files are left for the user. Each user has a defined quota in Linux. This is done
mainly for security as some users have only limited access to files. This provides security to the
files from unwanted access. The quota can be given to a single user or to a group of users.

14. How shadow passwords are given by in Linux?


Answer: pwconv command is used for giving shadow passwords. Shadow passwords are given
for better system security. The pwconv command creates the file /etc/shadow and changes all
passwords to ‘x’ in the /etc/passwd file.First, entries in the shadowed file which don’t exist in the
main file are removed.
Then, shadowed entries which don’t have `x’ as the password in the main file are updated. Any
missing shadowed entries are added. Finally, passwords in the main file are replaced with `x’.
These programs can be used for initial conversion as well to update the shadowed file if the main
file is edited by hand.

15. If a volume group named VG0 already exists and we need to extend this volume group
up to 4GB. How will you do it?
Answer:Firstly create Physical volume (/
dev/sda7) of size 4GB.
Now run following command.
vgextend VG0 /dev/sda7

16. What is the Linux Kernel?


Answer: Linux Kernel is low-level system software. It is used to manage the hardware resources
for the users. It provides an interface for user-level interaction.

17. What is Swap space?


Answer: Swap space is the amount of physical memory that is allocated for use by Linux to hold
some concurrent running programs temporarily. This condition usually occurs when Ram does not
have enough memory to support all concurrent running programs. This memory management
involves the swapping of memory to and from physical storage.There are different commands and
tools available to manage the Swap space usage.

18. Linux is which kind of Operating System?


Answer:Multi-User
Multi-Tasking
Multi-Process
All of the above
None of the above
All of the Above. Linux is an Operating System which supports Multi-User, Running a Number of
Processes performing different tasks simultaneously.

19. What do you understand by Root account?


Answer: As the name suggests, it is like a system administrator account which gives you the
ability to fully control the system. Root account serves as the default account whenever Linux is
installed. Below mentioned functions can be performed by the Root accountBelow mentioned
functions can be performed by the Root account
Create user accounts
Maintain user accounts
Assign different permissions to each account created and so on.

20. Does the Alt+Ctrl+Del key combination work in Linux?


Answer:Yes, it works like windows.

21. Which command would you use if you want to remove the password assigned to a
group?
Answer:

The gpasswd – r removes the password assigned to a group.

22. What is the difference between BASH and DOS?


Answer:
There are three key differences between BASH and DOS:

BASH commands are case sensitive while DOS commands are notBASH follows no convention in
naming files, while DOS follows a convention
Under BASH, / character serves as a directory separator while in DOS serves as the directory
separator

23. What is the difference between Linux and UNIX?


Answer:UNIX – Only big companies are allowed to use the UNIX copyright and name. IBM AIX,
Sun Solaris, and HP-UX all are UNIX operating systems. Most UNIX operating systems are
commercial in nature.
Linux is a
Unix clone. But if you consider Portable Operating System Interface (POSIX) standards then
Linux can be considered as UNIX.Linux Is Just
KernalAll Linux distributions include GUI system, GNU utilities, installation & management tools,
GNU c/
c++ Compilers, Editors (vi), and various applications like OpenOffice, Firefox.UNIX operating
systems are considered as a complete OS as everything come from a single vendor.
License and cost
Linux is Free. You can download it from the Internet or redistribute it under GNU licenses. Most
UNIX like operating systems
are not free.Security
And FirewallLinux comes with open source
Netfilter and IPTables based firewall tool to protect your server and desktop from the crackers and
hackers. UNIX operating systems comes with its own firewall products.Backup
And RecoveryUNIX and Linux come with their own set of tools for backing up data to tape and
other backup media. However, both Linux and UNIX share some common tools such as tar,
dump/restore, and
cpio, etc.
24. What is du command in Linux?
Answer:du command in Linux is used to retrieve more detailed information about which files use
the disk space in a directory.
du Command Example:
$ du -
sh /var/log/*1.8M /
var/log/anaconda384K /
var/log/audit4.0K /
var/log/boot.log0 /
var/log/chrony4.0K /
var/log/cron
4.0K /var/log/maillog64K /
var/log/messagesfirewall tool to protect your server and desktop from the crackers and hackers.
UNIX operating systems comes with its own firewall products.
Backup
And RecoveryUNIX and Linux come with their own set of tools for backing up data to tape and
other backup media. However, both Linux and UNIX share some common tools such as tar,
dump/restore, and
cpio, etc.

25. What is iptables command in Linux?


Answer: iptables command blocks or allows traffic on a Linux host, similar to a network firewall.
This iptables command may prevent certain applications from receiving or transmitting
requests.Learn how to use Linux, from beginner basics to advanced techniques learn Linux!

26. What does cd – command do?


Answer: cd- command go to the previous director
27. How to change window manager by editing your home directory?
Answer:“/.
xinitrc file” allows changing the window manager we want to use when logging into X from that
account. The dot in the file name shows you that the file is a hidden file and doesn’t show when
you do a normal directory listing. For setting a window manager we have to save a command in
this file.The syntax of the command is exec window manager.
After this, save the file. Next time when you run a startx a new window manager will open and
become the default.The commands for starting some popular window managers and desktop
environments are :KDE =
startkdeGnome = gnome-session.

Blackbox = blackbox.FVWM =
fvwmWindow Maker =
wmaker.
IceWM = icewm

28. What is df -I command?


Answer:
df -I command shows free inodes on mounted filesystems.

29. What is a Shell script?


Answer: As the name suggests, the shell script is the script written for the shell. This is a
program file or says a flat text file where certain Linux commands are executed one after another.
Although the execution speed is slow, Shell script is easy to debug and can also simplify everyday
automation processes.

30. What is the name and path of the main system log?
Answer: By default, the main system log is ‘/var/log/messages’. This file contains all the
messages and the script written by the user. By default, all scripts are saved in this file. This is the

fi f f
standard system log file, which contains messages from all system software, non-kernel boot
issues, and messages that go to ‘dmesg’. dmesg is a system file that is written upon system boot.
31. What are System Startup Scripts?
Answer: By default, Linux and UNIX come with system initialization script but they are located in
different directories:
HP-UX – /sbin/init.dAIX – /
etc/rc.d/init.dLinux – /
etc/init.d
32. What are the some UNIX Operating System Names?
Answer:By default, Linux and UNIX come with system initialization script but they are located in
different directories:

HP-UX – /sbin/init.dAIX – /
etc/rc.d/init.dLinux – /
etc/init.d

33. Differentiate between BASH and DOS?


Answer:The basic differences between BASH and DOS can be understood from the below table
Show
entriesSearch:BASH DOS
BASH commands are case sensitive. DOS commands are not case sensitive
.‘/’ character used as a directory separator
.‘’ character acts as an escape character. ‘/’ character: serves as a command argument delimiter
.‘’ character: serves as a directory separator.
File naming convention includes 8 character file name followed by a dot and 3 characters for the
extension. No file naming convention is followed in DOS.

34. Explain the term GUI?


Answer: GUI stands for the Graphical user interface. GUI is considered as the most attractive
and user-friendly because it consists of the usage of images and icons. These images and icons
are clicked and being manipulated by the users for the purpose of communication with the
system.
Advantages of GUI:Allows users to navigate and operate the software with the help of visual
elements.

The more intuitive and rich interface is possible to be created.Fewer chances of occurrence of
errors as complex, multi-step, dependent tasks are easily grouped together.
Productivity is enhanced with the means of multitasking as with a simple click of the mouse, the
user is able to maintain multiple open applications and transitions between them.
Disadvantages of GUI
:End-users have less control over the operating system and file systems.
Although it is easier to use a mouse and keyboard for navigation and controlling the operating
system, the whole process is a bit slow.
It requires more resources because of the elements that need to be loaded such as icons, fonts,
etc.

35. What is the maximum length for any file name under LINUX?
Answer:The maximum length for any filename under Linux is 255 characters.

36. How permissions are granted under LINUX?


Answer:A system administrator or the owner of the file can grant permissions using the ‘
chmod’ command. Following symbols are used while writing permissions‘+’ for adding permission
‘-‘ for denying permission
Permissions also include a single letter which denotes

u : user; g: group; o: other; a: all; r: read; w: write; x: execute.

37. What is netstat command in Linux?


Answer: netstat command in Linux shows the network status. This netstat command shows
network ports in use and their incoming connections.

38. Explain the Linux Directory commands along with the description?
Answer: Enlisted below are the directory commands along with descriptions
pwd: It is a built-in command which stands for ‘print working directory’. It displays the current
working location, working path starting with / and directory of the user. Basically, it displays the
full path to the directory you are currently in.
Is: This command list out all the files in the directed folder.
cd: This stands for ‘change directory’. This command is used to change to the directory you want
to work from the present directory. We just need to type cd followed by the directory name to
access that particular directory.
mkdir: This command is used to create an entirely new directory.
rmdir: This command is used to remove a directory from the system.
39. What is the root account?
Answer: The root account is like a system administrator account. It provides you full control of
the system. You can create and maintain user accounts, assign different permission for each
account, etc.

40. Explain the 3 kinds of file permissions under LINUX?


Answer: Every file and directory in Linux are assigned three types of owners namely ‘User’,
‘Group’, and ‘Others’. Find the three kinds of permissions defined for all the three owners

Read: This permission allows you to open and read the file as well as list the contents of the
directory.Write: This permission allows you to modify the contents of the file as well as allows
adding, removing and renaming files stored in the directories.
Execute: User can access and run the file in the directory. You cannot run a file unless the
execute permission is set.

41. How do you create a new user without logging on as a root user?
Answer: Using the sun command

42. Differentiate between Cron and Anacron?


Answer: Difference between Cron and Anacron can be understood from the below table
Cron Anacron
Cron allows the user to schedule tasks to be executed every minute. Anacron allows the user to
schedule tasks to be run either on a specific date or the first available cycle after the date.Tasks
can be scheduled by any normal user and are basically used when tasks have to be
completed/executed at a particular hour or minute.
Anacron can be used only by super users and is used when a task has to be executed
irrespective of an hour or minute.It is ideal for servers
It is ideal for desktops and laptops
Cron expects the system to be running 24×7. Anacron does not expects the system to be running
24×7.

43. How to Enable ACLs for /home partition?


Answer:Add following entry in /
etc/fstabLABEL=/home /home ext3
acl 1 2Now remount /home partition with
acl option.
mount -t ext3 -o acl /dev/sda3 /home
44. What do you understand by Linux Kernal? Is it legal to edit it?
Answer:‘
Kernal’ basically refers to that core component of the computer operating system that provides
basic services for the other parts as well as interacts with user commands. When it comes to
‘Linux Kernal’, it is referred to as low-level system software providing an interface for user-level
interactions.Linux
Kernal is considered as free and open source software which is capable of managing hardware
resources for the users. As it is released under General Public Licence (GPL), it becomes legal
for anyone to edit it.

45. Differentiate between LINUX and UNIX?


Answer:Although there are multiple differences between LINUX and UNIX, enlisted below table
covers all the major differences.
LINUX UNIX
LINUX is an open source software development and free operating system used for computer
hardware & software, game development, PCs, etc. UNIX is an operating system which is
basically used in Intel, HP, internet servers, etc.
LINUX has priced as well as freely distributed and downloaded versions. Different versions/flavors
of UNIX have different price structures.
Users of this operating system could be anyone including home users, developers, etc. This
operating system was basically developed for mainframes, servers, and workstations except for
OSX which is designed such that it can be used by anyone.
File support system includes Ext2, Ext3, Ext4,
Jfs, Xfs, Btrfs, FAT, etc. File support system includes jfs, gpfs, hfs, etc.BASH (Bourne Again Shell)
is the Linux default shell i.e. text mode interface which supports multiple command interpreters.
Bourne shell serves as the text mode interface which is now compatible with many others
including BASH.
LINUX provides two GUIs, KDE and Gnome. Common desktop environment was created which
serves as a GUI for UNIX.
Examples: Red Hat, Fedora, Ubuntu,
Debian, etc. Examples: Solaris, All LinuxIt provides higher security and has about 60-100 viruses
listed till date. It is also highly secured and has about 85-120 viruses listed till date.

46. What are the different modes of Network bonding in Linux?


Answer:
Below is a list of modes used in Network Bonding:balance-RR or 0 – round-robin mode for
fault tolerance and load balancing.

active-backup or 1 – Sets the active-backup mode for fault tolerance.


balance-xor or 2 – Sets an XOR (exclusive-or) mode for fault tolerance and load balancing.
broadcast or 3 – Sets a broadcast mode for fault tolerance. All transmissions are sent on all slave
interfaces.802.3ad or 4 – Sets an IEEE 802.3ad dynamic link aggregation mode.
Creates aggregation groups that share the same speed & duplex settings.
balance-tlb or 5 – Sets a Transmit Load Balancing (TLB) mode for fault tolerance & load
balancing.
balance-alb or 6 – Sets an Active Load Balancing (ALB) mode for fault tolerance & load
balancing.Now that you are aware of network bonding in Linux, Check Linux online training.

You might also like