Professional Documents
Culture Documents
1) BIOS: BIOS is the lowest level interface between computer and peripherals.
2) The MBR points to the boot loader (GRUB or LILO: Linux Boot Loader)
3) Boot loader (GRUB or LILO) will then ask for the OS label
Which will identify which kernel to run and where it is? located (Hard drive and partitioned)
/etc/rc.d/rc.sysinit
to start the various processes to run the system and make it functional.
or
6. The last processes that init starts as part of the boot sequence allow you to log in.
c
u How to hide the partition in GRUB booting? (This technique is required when you have more
that one Windows system on different partitions of the same disk, let us say the first and second
partitions of the first hard drive, to boot from the first partition you must hide the second one)
grub> chainloader +1
grub> makeactive
how can i make an user to nologin without locking the account for the user?
Ans: Simply edit a line in /etc/passwd and chage user's shell to /bin/false(in case of ubuntu) or
https://support.comodo.com/index.php?
_m=knowledgebase&_a=viewarticle&kbarticleid=264&nav=0, 96,1,88
very time you use a domain name, therefore, a DNS service must translate the name into the
corresponding IP address. For example, the domain name www.example.com
The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a
particular domain name, it asks another one, and so on, until the correct IP address is returned.
(2) Short for digital nervous system, a term coined by Bill Gates to describe a network of
personal computers that make it easier to obtain and understand information.
Answer: Kernel is the core of the operating system .it interacts hardware of the computer
What command would you use to find the hostname of the server if you only have the ip
address?
Answer: Patches are software modules which are used to fix some existing bugs in the source
code. Mostly used in kernel, bootloader and other sources. Patches contain the difference
between the original source file and the modified source file. The command used to apply a
patch is
"patch -p1" in LINUX/UNIX. On entering this command you will be prompted to enter the path
for the file name in which the patch is to be applied. So enter the absolute path for the file name.
Ans: kernel is the core of the operating system .it interacts hardware of the computer
c What are the files to be used in the network installation of linux os?
Ans: /etc/sysconfig/network,/etc/resolv.conf,/etc/hosts
cu What is the command to see the installed rpm's in the linux system.
Ans: you can view the installed rpm in your linux box by :
home - Contains the user's home directories along with directories for services
u
ftp, HTTP, samba, george
bin - Commands needed during bootup that might be needed by normal users
sbin - Like bin but commands are not intended for normal users. Commands run by LINUX.
1 - A directory with info about process number 1.ach process has a directory below proc.
usr - Contains all commands, libraries, man pages, games and static files for normal operation.
bin - Almost all user commands. some commands are in /bin or /usr/local/bin.
local - The place for locally installed software and other files.
doc - Documentation
tmp
modules - Loadable kernel modules, especially those needed to boot the system after disasters.
£
etc - Configuration files specific to the machine.
file
normally
administrator.
use /var/tmp.
º
15) How can i recover the linux system after it was crashed by step by step process..
Ans: All Machines crashed either due to hardware or software problem. We can trace out the
h/w failure as the BIOS or kernel will report that a device had failed or is missing. Knowing at
which stage of the boot process a failure occured is very important. If we get Kernel Panic rror
it means (a) an incorrect root argument to the kernel (b) missing modules from the initial RAM
DISK. If problem occurs during file system mounting that means something wrong happen
during execution of /etc/rc.d/rc.sysinit (this script does a lot) Once system services began to
start the failure is most likely in /etc/rc.d/rc.sysinit
Check the log files /var/log/message and dmesg bcoz information gathering is very important to
trace the bottle neck of the issue.
16) What is the command for displaying, in which shell we are working.
Ans: hard mount option: - If the client fails to access the servers, then connection hang it,
after the system up then it access the server.
Soft: - If the client failed to connect the server it immediately gives the error report, and close the
connection.
19) Without Using $date ±d yesterday. How I get the yesterday's date?
20) what is the command for finding the highest memory occupied file in linux?
Ans: Top command will show the memory occupied by a file. When top is showing the output
press shift+m to show the file or process which is using larger memory.
21) What is the difference between NTFS & FAT File Systems?
Ñ
NTFS
1) allows access local to w2k w2k3 XP win NT4 with SP4 & later may get access for some file.
FAT 32
22) How to set path and class path for java in linux
Ans: You can set as in windows, But this has to mention in some file which loads profile.
~/.bashrc (private)
or
or
# kill -9 <pid>
pid: process id
24) why LINUX is fast processing software and why it does not get viruses.
Ans: It does not get viruses because unlike windows, in linux each and every services,
o
files have different contexts. So for each one we have to write pgm to attack.
ex:
or
this is one of the reasons for fast & due to modular kernal
service/device/modules.
In linux all are consider as file and files are not executing automatically. so not able to spread.
But if we fails to secure our system [physical/nw] hackers can schedule the script in cron.
26) what r the different command to check ram, process and hdd of linux machine
Ans:
RAM: We will check RAM, Process as well as HDD by the root user...
RAM: #free
#cat /proc/meminfo
25) If we transfer 100 files by ftp to remote server, how to know the files are successfully
transfer or some file are not transferred?
³ls | wc -l "
Then compare with how many files originally needs to be transferred from ftp server.
if 100 = 100 then all transferred fine.
27) I know ssh, telnet, dns, apache all are worked on TCP/UDP but i want to know any one
service which are working on UDP only?
belongs to DHCP
27) I want to see how many interfaces(thernet cards) are working using single command?
Ans: Swap partition maintained separate partition. same swap partition can be used in two OS
within single machine. If system crashes their is a chance to recover itor may not
Less fragmented.
whereas swap file takes very less space. we can increase the space very easily, compared to
swap partition. Swap file system fragmented. If system crashes their is a huge chance to lost
the swap file system.
30) How can I know my linux os is 32 bit or 64 bit? and How can i know my CPU is 32 bit or 64
bit in linux machine environment?
/usr/bin/file: LF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses
shared libs), for GNU/Linux 2.6.18, stripped
[root@ganesh ~]#
31) In my linux machine, i lost /etc/passwd file and /etc/shadow file, then how can i recover it?
ü
-Start GRUB on boot (press SC while booting)
-Press enter
-Press b
-Press enter
-Press b
name type "ls /home" (that is a Lower case L and lower case
32) lost a root password and i need to give it, I treid to change it through single user mode
even though i am not get a password, then what is the other procedure to give a root password?
Ans: you need to check /etc/security file and u have check the permission this file
c
33) A file which is not deleted by normal user and also root (using rm), for that type of file how
we delete it?
Ans: Using chattr command we need to change the attributes. and then normally remove
using rm command.
34) if i run ls command it will show me the junk output what is problem and how to resolve it
Ans: set your terminal setting by stty and before that export ls command to PATH variable
35) how nfs server works in linux.........please mention the nfs server working process
configuration of NFS:
NFS SRVR:
save -> wq
chkconfig portmap on
chkconfig nfs on
cd /opt
cc
or
backup tools
tar:
cpio:
Dump:
37) how many types of user accounts are available in linux os? if i assign a
In linux, Uid from 1 to 500 has been reserved for system users, these are the default users of
linux, so if anyone try to assign Uid 500 to normal user then it wil give the error.
38) there are many IPC mechanisms available in Linux? Which one is best to use and when?
Ans: Amonog all the available IPCs, Shared Memory is the best and fastest one. We need to
use Shared memory when more than one proceses wish to communicate each other on a
common read-only memory. It is fast because it does not involve physical moment of data as
the data is shared among them.
39) what is the use of nis server in linux? what is the purpose.........?
Ans: NIS stand for "network information system" the use of nis server centeralized
authentication of users.
c
40) why kerberos.............what its need
Ans: kerberos is one of the schemes of digital signature.it is used as an authentication scheme.
it is needed for the security of messages.
rsync means synchronization of directories to all over the network (give permissions like read,
write, execute)
Ans: acl- giving a file or permission explicitly regardless of the file owner and file group.
automation of jobs- daily or recurrent jobs can be scheduled to run at a particular time
NIS-
DNS-
DNS user for name resolution (ip to name and name to ip)
lookup zone.
cu
44) cups stands for..?
Ans:
It is printer daemon
C - common
U - Unix
P - printing
S - system
45) what are the default permissions for files and folders..?
Ans:
By default it is 644 = file and 755 = dir, but when u create and file / dir that time the permission
of these decides by the value called Umask in your system
46) In how many ways linux can be installed n explain the steps involved in installation in any of
the method..?
Ans:
47) commands regarding the adding of users into groups n different options with user add...?
Ans: stands for Network Information System, which provides any user on that network with
the same working environment irrespective of the system on that network which has been
Ans: TAR - used for complete files or folders backup, and it uses the utilities gunzip and
bunzip2.
CPIO - used to backup the selected objects and it stands for copy in and out..
c£
DUMP - used to have the device back up. there are multiple backups in this such as
- full back up
- Incremental back up
- Differential back up
SSH - stands for secured Shell n used to connect remotely to corresponding computer n take
the back up...
Ans: FTP IS USD FOR UPLOAD, DOWNLOAD & TRANSFR FIL BUT NFS IS
Ans: port: a particular port number on a host & socket: a host and a port
Like
the socket on the server side is google.com:80 this is the server side socket
on your local system where you are browsing the socket is yourip: port above 1024
53) Why bind system call is required in socket programming? what is it¶s Significance?
Ans:
bind system call assigns a name to the unnamed socket. Binding an address allows a
process to register its address with the system. This makes it possible for other process to
find it.
cº
54) what is stored at /lib/modules?
Ans: It contains all the kernel modules that needed to be loaded into kernel (booting etc).
When the kernel needs a feature that is not resident in the kernel, the kernel module daemon
kmod [1] execs modprobe to load the module in.
You can see what modules are already loaded into the kernel by running lsmod,
Ans: Mainly hardware related information such as CPU information, Memory (RAM)
information stored under /proc directory
example:
particular hardware)
56) what are the different ways the Linux can switch from User Space to Kernel Space & vice-
versa?
Ans: There are 2 situations when Linux can switch from user Space to Kernel Space:-
Ans:
ext2: It was only the default file system upto 7.1 redhat version
cÑ
->more speed, secure n supports journaling compared to ext2
Journaling: This is one of the default features of ext3 which provides multiples functions like
data availability across improper shut downs, easy transmission between the file systems and
speed etc.
58) what kind of information the linux driver modules (.ko ) files has ?
Ans:
kernel 2.6 introduces a new file naming convention: kernel modules now have a .ko extension
(in place of the old .o extension) which easily distinguishes them from conventional
object files. The reason for this is that they contain an additional .modinfo section that where
additional information about the module is kept. Linux program modpost can be used to convert
.o files into
.ko files.
Ans: A system call is the mechanism used by an application program to request service from
the operating system.
On Unix-based and POSIX-based systems, popular system calls are open, read, write, close,
wait, exec, fork, exit, and kill. Many of today's operating systems have hundreds of calls.
FreeBSD has about the same (almost 330).
Tools such as strace and truss report the system calls made by a running process.
Pipe is a technique to use for joining two/more commands (one command output as input to
other command .so on
62) A file has 1000 lines and i want to display only 1st line how to do it? pls ..tel me
co
c