You are on page 1of 4

FORCE 2010

Linux Network Administrator Questions


A pretty funny story - someone was offered a test of basic Linux questions for a junior network administrator position, and figured out that the best way to impress the future employer with good answers is to post the list on UbuntuForums. Good idea, right? Thats where all the Linux experts hang out. Unfortunately, thats where the employer hung out as well: It didnt seem to me that I was asking too much for people to use mailing lists, forums, IRC whatever to compile the answers themselves. I actually expected to see some questions show up on forums but I didnt expect someone to paste the entire thing and expect the forum users to do all the work that would qualify you for an interview. I think at this point you could save us all some time and not turn the answers back in, I already have the information I need on your answers. Anyway, the list has been made public, so enjoy: 1. Give an example of set of shell commands that will give you the number of files in a directory 2. How do you tell what process has a TCP port open in Linux 3. On a Red Hat Linux Variant how do you control whether a service starts when the system boots 4. How do you tell the amount of free disk space left on a volume 5. Give an example of a set of shell commands to tell how many times bob has logged on to the system this month 6. Give an example of a recursively copying a directory from one location to another. 7. How do you modify the IP and Net mask of a system running a Red Hat Variant of Linux 8. Give an example of a set of shell commands that will give you the number of httpd processes running on a Linux box. 9. On CentOS or Fedora based system using the package management application, how do you tell what package provided the file libnss_ldap.so 10. What is the difference between VTP client, server, and transparent 11. What is the maximum length of CAT6 12. How does one set up a layer two link to share VLANs 13. How does one implement redundant links at Layer 2 14. What is the difference between a hub, switch, and a router? What are the security advantages of switch vs. hub? 15. Show an example of using telnet to learn the headers of an http server. 16. In what OSI layer does PPP exist 17. Whats the difference between TCP and UDP 18. Given a DNS server that has just started (with an empty cache) and host contacting this DNS server (using its OS setting) to learn an address for google.com, list the steps the DNS server will take to learn it with IP addresses (each step will have multiple possible IP addresses you need choose only one per step).

FORCE 2010
19. Why are layer 2 loops bad, and what protocol was designed to prevent them 20. Given a radius server at 10.0.0.2 and a shared key of abc123 show the IOS commands necessary to authenticate switch users against the radius server, while still allowing the use of local username / password pairs

Unix Admin Questions 1. How do you list the files in an UNIX directory while also showing hidden files? 2. How do you execute a UNIX command in the background? 3. What UNIX command will control the default file permissions when files are created? 4. Explain the read, write, and execute permissions on a UNIX directory. 5. What is the difference between a soft link and a hard link? 6. Give the command to display space usage on the UNIX file system. 7. Explain iostat, vmstat and netstat. 8. How would you change all occurrences of a value using VI? 9. Give two UNIX kernel parameters that effect an Oracle install 10. Briefly, how do you install Oracle software on UNIX. Linux Command Line Q&A 1. You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse:- The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file. 2. Who owns the data dictionary? The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created. 3. You routinely compress old log files. You now need to examine a log from two months ago. In order to view its contents without first having to decompress it, use the _________ utility. zcat:- The zcat utility allows you to examine the contents of a compressed file much the same way that cat displays a file.

FORCE 2010
4. You suspect that you have two commands with the same name as the command is not producing the expected results. What command can you use to determine the location of the command being run? which:- The which command searches your path until it finds a command that matches the command you are looking for and displays its full path. 5. You locate a command in the /bin directory but do not know what it does. What command can you use to determine its purpose. whatis:- The whatis command displays a summary line from the man page for the specified command. 6. You wish to create a link to the /data directory in bobs home directory so you issue the command ln /data /home/bob/datalink but the command fails. What option should you use in this command line to be successful. Use the -F option:- In order to create a link to a directory you must use the -F option. 7. When you issue the command ls -l, the first character of the resulting display represents the files ___________. type:- The first character of the permission block designates the type of file that is being displayed. 8. What utility can you use to show a dynamic listing of running processes? __________ top:- The top utility shows a listing of all running processes that is dynamically updated. 9. Where is standard output usually directed? to the screen or display:- By default, your shell directs standard output to your screen or display. 10. You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type? tar xf MyBackup.tar memo.ben:- This command uses the x switch to extract a file. Here the file memo.ben will be restored from the tarfile MyBackup.tar. 11. You need to view the contents of the tarfile called MyBackup.tar. What command would you use? tar tf MyBackup.tar:- The t switch tells tar to display the contents and the f modifier specifies which file to examine. 12. You want to create a compressed backup of the users home directories. What utility should you use? tar:- You can use the z modifier with tar to compress your archive at the same time as creating it.

FORCE 2010
13. What daemon is responsible for tracking events on your system? syslogd:- The syslogd daemon is responsible for tracking system information and saving it to specified log files. 14. You have a file called phonenos that is almost 4,000 lines long. What text filter can you use to split it into four pieces each 1,000 lines long? split:- The split text filter will divide files into equally sized pieces. The default length of each piece is 1,000 lines. 15. You would like to temporarily change your command line editor to be vi. What command should you type to change it? set -o vi:- The set command is used to assign environment variables. In this case, you are instructing your shell to assign vi as your command line editor. However, once you log off and log back in you will return to the previously defined command line editor. 16. What account is created when you install Linux? root:- Whenever you install Linux, only one user account is created. This is the superuser account also known as root. 17. What command should you use to check the number of files and disk space used and each users defined quotas? repquota:- The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space.

You might also like