4 avg. rating (80% score) - 5883 votes
If you are an expert in Red Hat Linux System Administration then this is for you. Let us know if you looking for a job change? Then do not worry, we’ve a right answer for your job interview preparation. If you are preparing for Red Hat Linux System Administration job interview then go through Wisdomjobs interview questions and answers page. Red Hat Linux System Administration is the one who able to carry out the system administration tasks that are needed in Red Hat Enterprise Linux environments. There are certifications to improve the visibility in interview. Good knowledge on the Red Hat Linux System Administration are must to crack the job. Below are the Red Hat Linux System Administration interview questions and answers which makes you comfortable to face the interviews:
Using uptime command we can determine how long a linux box has been running , also uptime can be viewed by the top & w command.
Use the command cat /etc/redhat-release , output of this command will tell you the redhat version.
rpm and yum command are used to install packages in redhat linux and CentOS.
Using ‘ifconfig’ & ‘ip address’ command we can determine the ip address of LAN Card.
On typing the hostname command on terminal we can determine the hostname of a linux server.
Using ‘route -n’ command we can determine the default gateway in linux.
‘who -r’ and ‘runlevel’ , both of these command are used to find current run level.
Initrd stands for initial ram disk , which contains the temporary root filesystem and neccessary modules which helps in mounting the real root filesystem in read mode only.
Bootloader is a program that boots the operating system and decides from which kernel OS will boot.
‘ls -a’ <Folder_Name>
Soft link is a method to create short cuts in linux. It is similar to windows short cut feature.
Using the command ‘touch <file-name>’
Run level 2 is the multi-user mode without networking.
Because One can customize the existing code and can redistribute it.
Using the Command ‘lsmod’ we can see the installed kernel modules.
Default uid & gid of root user is 0.
Any program in execution is called a process.
‘init’ is the first process in linux which is started by kernel and whose pid is 1.
umask stands for ‘User file creation mask’, which determines the settings of a mask that controls which file permissions are set for files and directories when they are created. While ulimit is a linux built in command which provides control over the resources available to the shell and/or to processes started by it.
You can limit user to specific range by editing /etc/security/limits.conf at the same time system wide settings can be updated in /etc/sysctl.conf
A run level is a state of init and the whole system that defines what system services are operating and they are identified by numbers.There are 7 different run levels present (run level 0-6) in Linux system for different purpose. The descriptions are given below.
0: Halt System (To shutdown the system)
1: Single user mode
2: Basic multi user mode without NFS
3: Full multi user mode (text based)
5: Multi user mode with Graphical User Interface
6: Reboot System
To change the run level, edit the file “/etc/inittab” and change initdefault entry ( id:5:initdefault:). If we want to change the run level on the fly, it can be done using ‘init’ command.
For example: when we type ‘init 3′ in the commandline , this will move the system from current runlevel to runlevl 3. Current level can be listed by typing the command ‘who -r’.
Puppet is an open-source and enterprise application for configuration management toll in UNIX like operating system. Puppet is an IT automation software used to push configuration to its clients (puppet agents) using code. Puppet code can do a variety of tasks from installing new software, to check file permissions, or updating user accounts and lots of other tasks.
SELinux is an acronym for Security-enhanced Linux. It is an access control implementation and security feature for the Linux kernel. It is designed to protect the server against misconfigurations and/or compromised daemons. It put limits and instructs server daemons or programs what files they can access and what actions they can take by defining a security policy.
The cron is a deamon that executes commands at specific dates and times in linux. You can use this to schedule activities, either as one-time events or as recurring tasks. Crontab is the program used to install, deinstall or list the tables used to drive the cron daemon in a server. Each user can have their own crontab, and though these are files in /var/spool/cron/crontabs, they are not intended to be edited directly. Here are few of the command line options for crontab.
crontab -e Edit your crontab file.
crontab -l Show your crontab file.
crontab -r Remove your crontab file.
Traditional cron format consists of six fields separated by white spaces:
The format is explained in detail below.
* * * * * *
| | | | | |
| | | | | +– Year (range: 1900-3000)
| | | | +—- Day of the Week (range: 1-7, 1 standing for Monday)
| | | +—— Month of the Year (range: 1-12)
| | +——– Day of the Month (range: 1-31)
| +———- Hour (range: 0-23)
+———— Minute (range: 0-59)
An inode is a data structure on a filesystem on Linux and other Unix-like operating systems that stores all the information about a file except its name and its actual data. When a file is created, it is assigned both a name and an inode number, which is an integer that is unique within the filesystem. Both the file names and their corresponding inode numbers are stored as entries in the directory that appears to the user to contain the files. The concept of inodes is particularly important to the recovery of damaged filesystems. When parts of the inode are lost, they appear in the lost+found directory within the partition in which they once existed.
The following will show the name of each object in the current directory together with its inode number:
# ls -i
The avialble number inodes in a filesystem can be found using the below command :
# df -i
The other way we can get the inode details of a file by using the stat commmand.
Usage : # stat
-sh-4.1$ stat note.txt
Size: 4 Blocks: 8 IO Block: 4096 regular file
Device: fd05h/64773d Inode: 8655235 Links: 1
Access: (0644/-rw-r--r--) Uid: (69548/nixuser) Gid: (25000/ UNKNOWN)
Access: 2014-06-29 15:27:56.299214865 +0000
Modify: 2014-06-29 15:28:28.027093254 +0000
Change: 2014-06-29 15:28:28.027093254 +0000
Red Hat Linux System Administration Related Tutorials
|Linux Tutorial||Linux Embedded systems Tutorial|
Red Hat Linux System Administration Related Interview Questions
|Network Technical Support Interview Questions||Linux Interview Questions|
|Linux Embedded systems Interview Questions||Red Hat Linux Essentials Interview Questions|
|Technical Support Interview Questions||Citrix NetScaler Interview Questions|
|Logical Volume Manager (Linux) Interview Questions||Red Hat cluster Interview Questions|
|Red Hat Satellite Interview Questions||Advanced Linux Interview Questions|
|Linux Device Drivers Interview Questions||IPTABLES Interview Questions|
|Linux Shell Scripting Interview Questions||Red Hat Certified Engineer (RHCE) Interview Questions|
Broadband Networking Protocols Of Yesterday And Today
Tcp/ip In Embedded Systems
Linux Networking Interfaces And Device Drivers
The Linux Tcp/ip Stack
Socket Buffers And Linux Memory Allocation
Sending The Data From The Socket Through Udp And Tcp
The Network Layer, Ip
Receiving Data In The Transport Layer, Udp, And Tcp
Internet Protocol Version 6 (ipv6)
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.