Blogs On Job Interview Questions

10 Most Likely Asked Linux System Administrator Interview Questions And Answers

10 Most Likely Asked Linux System Administrator Interview Questions And Answers

by Vibrant Publishers on May 20, 2022
An entry-level Linux System Administrator with less than 1 year experience can expect to earn an average total compensation (includes tips, bonus, and overtime pay) of ₹243,259 based on 94 salaries. An early career Linux System Administrator with 1-4 years of experience earns an average total compensation of ₹373,622 based on 638 salaries. An experienced Linux System Administrator with 10-19 years of experience earns an average total compensation of ₹909,839 based on 67 salaries (As per Payscale.com). The average Linux Administrator salary in the United States is $95,019 as of August 27, 2020, but the range typically falls between $75,661 and $107,171. Salary ranges can vary widely depending on many important factors, including education, certifications, additional skills, the number of years you have spent in your profession (As per Salary.com)   Typical Linux System Administrator job roles include: Linux Administrator: Tomcat/Apache Server Senior System Administrator Senior Engineer (System) Infrastructure Administrator Senior Linux Administrator System Admin   Prepare for your next job interview with these top 10 Linux System Administrator Interview Questions highly asked in job interviews.    1: You see a process “./myApplication” with PID 44556, how can you know where the file was executed from? 2: How can you check how long is the system running since the last restart and the load average on it? 3: You want to save the mysql DB “mySQLDB” to a file “mySQLDB.sql”, how can you do it? 4: You want to run a binary file, you have permissions to it, but it gives you “Access Denied”, what do you need to do? 5: Explain the Zombie process. 6: What are the differences between Cron and Anacron? 7: How can you change your server time zone to a Europe/France time zone? 8: How can you check the mail queue of an exim mail server? 9: Using perl, write a command that will print all the IPs, Bcasts and Masks configured on the server line by line. 10: Explain how kernel modules are signed for secure system boot.   1: You see a process “./myApplication” with PID 44556, how can you know where the file was executed from? You can identify the path where the PID was executed by running pwdx 44556 and you will get the command executing path as an output.   2: How can you check how long is the system running since the last restart and the load average on it? The uptime command can show you the current time, how long the system has been running since the last restart, how many users are currently logged on to the system, and the system load averages in the resolution of the last 1, 5, and 15 minutes.   3:You want to save the mysql DB “mySQLDB” to a file “mySQLDB.sql”, how can you do it? You can use the mysqldump command to dump a database – mysqldump -u username -p mySQLDB>mySQLDB.sql   4: You want to run a binary file, you have permissions to it, but it gives you “Access Denied”, what do you need to do? In order to run an application in Linux you need to add executable permission to the file: in order to change a file mode, you need to use the chmod with the required parameters – chmod +x .   5: Explain the Zombie process. The Zombie process, also called a defunct process, is one that is already executed and still waiting in the process table. These are the child processes that are waiting for the parent to execute the system wait call. Remember that the zombie processes will not be killed by the kill call. It remains in the process table till the parent explicitly executes that system wait call.   6: What are the differences between Cron and Anacron? Cron is a job scheduled to be executed at a later time in a Linux server. One example could be scheduled backups of log files or databases. Anacron is Cron which is used on a workstation or client which is not expected to be always on or connected to a network. While Cron can be set on minute-basis, Anacron can be set on a day-basis at the minimum level. Any user can set the Cron, but Anacron can be set only by a super user. Since Cron is set on servers that are up all the time, it will be executed at the scheduled time. Anacron does not expect the machine to be set all the time and hence is executed whenever the system is up and available.   7: How can you change your server time zone to a Europe/France time zone? You need to link the file /usr/share/zoneinfo/Europe/Paris to /etc/localtime.   8: How can you check the mail queue of an exim mail server? The exim mail server allows a quick and clean command to view the mail queue – mailq.   9: Using perl, write a command that will print all the IPs, Bcasts and Masks configured on the server line by line. You need to extract the IPs from the ifconfig first, then run on each line and get the required information – ifconfig -a | perl -n -l -e ‘/ addr:([^ ].+)/ and print $1’   10: Explain how kernel modules are signed for secure system boot. For Secure system boot, the Kernel modules will have a private key and public key. The modules are signed with private key and authenticated with public key. The Linux distribution by default includes signed kernels, signed boot loaders, and signed kernel modules. Also, the signed embedded keys allow the Linux distribution to boot, install, and authenticate with secure Unified Extensible Firmware Interface (UEFI) thereby allowing secure system boot. Linux system administrator needs to be very analytical and be able to effectively troubleshoot and resolve a variety of problems. Read our books HR Interview Questions You’ll Most Likely Be Asked (Third Edition) and Leadership Interview Questions You’ll Most Likely Be Asked to get a comprehensive list of questions to help you crack the HR round of your interview.
Top 20 Operating Systems Interview Questions you should know before going for an Interview

Top 20 Operating Systems Interview Questions you should know before going for an Interview

by Vibrant Publishers on May 20, 2022
Operating Systems have revolutionized the world in its entirety and have made computing one of the most simplified tasks. Having an in-depth knowledge of Operating Systems can land you a well-paying job. While the demand for hardware keeps increasing with time, developments in software will be needed hence widening the scope in the study of Operating Systems.   Companies like Microsoft, Google, Samsung, and Blackberry welcome the very best software developers with open arms who are flexible enough to adapt to the latest trends and can compete with the speed of development.   To make a mark in the interview, one needs to understand the interview questions asked and competently answer them.    Below are the most frequently asked top 20 operating systems interview questions & answers:     1) What are the types of multiprocessor computer systems? There are two types of multiprocessor computer systems:Asymmetric multiprocessor computer system – In this multiprocessor computer system, each processor is assigned a specific task Symmetric multiprocessor computer system – In this multiprocessor computer system, each processor can perform all tasks within the operating system     2) What are the advantages and disadvantages of symmetric clustering system?   Advantages: Symmetric clustering system utilizes hardware resources efficiently because all machines are used to run user applications Symmetric clustering system is more cost effective Disadvantages: When a machine takes the additional work of another failed machine, it may cause the machine to fail   3) What are the responsibilities of operating system in file management?   The responsibilities of operating system in file management are: Operating system is responsible for creating and deleting files Operating system is responsible for creating and deleting directories in order to organize files Operating system is responsible for mapping files to secondary storage Operating system is responsible for maintaining back upon secondary storage such as magnetic disk, magnetic tape etc. Operating system is responsible for supporting basic operations in order to manipulate files     4) What are the types of operating system services? There are two types of operating system services: Function-based: This type of operating system services provide functions that which are helpful for users Efficiency-based: This type of operating system services provide functions which ensure efficient operation of a computer system   5) Explain layered approach to design an operating system. In layered approach, the operating system is divided into number of layers or levels. The hardware of the computer represents bottom most layer or level 0 and user interface represents the highest level or level N.     6) What is the main function of microkernel? The microkernel acts as a communication channel between the client and server programs run by the user. When the client wants to access a file or information from the database, the microkernel communicates with the server to take this information from the file-system or database and pass it on to the requesting client.     7) What are the various states of a process? A process may be in any of the following states at any time: New – It is defined as a state where a new process is created Running – It is defined as a state where process is being executed Waiting – It is defined as a state where a process waits for some event to happen such as completion of I/O operation Ready – It is defined as a state where a process is waiting to be allocated to a processor Terminated – It is defined as a state where a process has completed its execution     8) Explain the difference between blocking and non-blocking message passing technique.   Blocking message passing – In blocking message passing, sender is refrained from sending another message until first message is received by receiver or mailbox. Similarly, receiver is refrained from receiving the message until the message is available. Non-blocking message passing – In non-blocking message passing, sending process continuously sends the message. Similarly, receiving process receives either a valid message or a null.     9) Explain Remote Method Invocation (RMI). Remote Method Invocation is a feature of Java which is similar to Remote Procedure Call (RPC) and is used to invoke a method on the remote object. Two objects are called remote if both are present in a different Java virtual Machine (JVM). Therefore, a remote object may reside on the same machine but in a different Java virtual Machine (JVM).     10) What are the types of available thread libraries? The types of available thread libraries are: POSIX Pthreads – Pthreads is a POSIX (Portable Operating System Interface) standard which defines an API (Application Programming Interface) for thread creation and synchronization. It is provided as either user or kernel level library Win32 – It is a kernel level library which is provided for Windows systems Java – Java thread API(Application Programming Interface) is implemented using a thread library on host operating system. Therefore, on Windows systems, it is implemented using Win32 API (Application Programming Interface)     11) What are the disadvantages of a multithreaded server? Even though multithreading is considered to improve processing time, here are some disadvantages to consider: For every request, there’s a time lag to create, manage and terminate a new thread. Once created, it should be tracked consistently so that it can be terminated as soon as the process ends. When more requests come, more threads have to be created which results in larger time lag. Further, every thread takes up some CPU time and system memory, which may get exhausted after a while.     12) What are the components of a thread? The components of a thread are: Thread ID – A thread ID uniquely identifies a thread Register Set – It represents status of the processor Stack – It employs a user stack when it is running in user mode and employs kernel stack when it is running in kernel mode Private storage area – This area is used by run time libraries and dynamic link libraries (DLLs)     13) What are the criteria to compare scheduling algorithms? The criteria to compare scheduling algorithms are: CPU utilization – It measures amount of usage of CPU Throughput – It measures number of process completed in a given amount of time Turnaround time – It measures the time of completion of a process Waiting time – It measures amount of time spent in the ready queue Response time – It measures the time taken to start responding     14) What is the solution of indefinite blocking or starvation of a process?   The priority of processes in waiting can be increased with time. This is called aging. For example, if a low priority process has been waiting for 2 hours, the priority increases by 1 for every 20 minutes of waiting. We can set the interval at which the priority can be increased. Thus, a low-priority process can overcome indefinite blocking through aging.     15) Explain implementation method to evaluate a scheduling algorithm.   In this method, the algorithm is coded in a programming language and it is run on the computer system in order to determine its performance. The advantage of this approach is that it provides an accurate way to measure the performance. The disadvantage is that it is costly because the algorithm needs to be coded and changes to the operating system are required.     16) Explain deadlock avoidance. Deadlocks can be avoided by obtaining additional information about the resources which a process will request and use during its lifetime. For example, in a computer system with only one tape drive and one printer, the operating system may need to know that a process P will first request a printer and then a tape drive and another process Q will first request a tape drive and then printer before releasing both the resources. Using this information, operating system considers available resources, resources which are already allocated to processes and then decides for each request whether a process should wait or not in order to avoid a deadlock.     17) When can address binding be performed? Address binding can be performed at: Compile time – If the location where the process will reside in main memory is known at compile time then address binding is performed at compile time and compiler generates the executable code containing absolute addresses Load time – If the location where the process will reside in main memory is not known at compile time then address binding is performed at load time and compiler generates the resulting code containing re-locatable addresses Execution time – If the process can be moved from one memory segment to another during its execution then address binding is performed at execution time     18) Explain some of the core features of Windows 10. The Windows 10 OS comes with some outstanding features that support the following: The personal voice-controlled assistant Cortana DirectX 12 The latest windows browser Microsoft Edge Biometric authentication Support for Virtual Desktop Better Command Prompt     19) Explain the classes of IP addresses. IP addresses are classified into five categories: Class A that corresponds to the range 0 – 126 Class B that corresponds to the range 128 – 191 Class C that corresponds to the range 192 – 223 Class D that corresponds to the range 224 – 239 Class E that corresponds to the range 240 – 255   You may have noticed that 127 is missing in the classification. It is reserved for the local host. Class D is reserved for the multicast groups and Class E is reserved for R&D purposes and future use.     20) Differentiate between Mac OS X and Windows. Windows 10 and Mac OS X have been often compared. Though they both enjoy their own spaces, here are some marked differences many users have observed:   Cortana Vs Siri – Windows’ Cortana is more preferred over Apple’s Siri because it is easier to use and offers more details. For Android users too, Cortana would offer more relevant information. Writing Vs Typing – Windows is offering a stylus to write (as in the traditional writing) which adds zing to your boring typing in Apple. Utility Apps – Windows come with many interesting utilities and apps such as sticky notes which are used regularly by the users in the real world to the desktop. It also lets you add the sticky note to your calendar. Games – It’s no news that there are more games available for Windows than Mac! The new Game Mode in Windows 10 makes your gaming experience much smoother.   To ace the interview, understanding the ideology behind questions is important and that knowledge can be imparted with the help of books, which guide you thoroughly over the type of questions to be posed in front of you in an interview for such a job.   Reading the complete book for in-depth guidance can help you emerge victorious in your interview!