0% found this document useful (0 votes)
0 views

interview questions (1)

The document presents a comprehensive list of 24 Linux system administration interview questions and answers, covering essential topics such as the Linux kernel, LVM, network protocols, and security measures. It provides insights into the technical skills and problem-solving abilities expected from candidates in the field. Additionally, it includes a brief mention of Red Hat Linux system administrator interview questions, indicating a focus on practical knowledge and hands-on experience with Linux systems.

Uploaded by

matheshcr07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

interview questions (1)

The document presents a comprehensive list of 24 Linux system administration interview questions and answers, covering essential topics such as the Linux kernel, LVM, network protocols, and security measures. It provides insights into the technical skills and problem-solving abilities expected from candidates in the field. Additionally, it includes a brief mention of Red Hat Linux system administrator interview questions, indicating a focus on practical knowledge and hands-on experience with Linux systems.

Uploaded by

matheshcr07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

24 Linux system administration interview questions and answers

The following section presents a carefully selected list of 24 Linux system administration
interview questions.

These questions and answers are designed to give you valuable insights into candidates'
technical skills, problem-solving ability, and hands-on experience with the Linux kernel.

1. What is the role of the Linux kernel in the operating system?

Answer:

The Linux kernel is the core of the Linux operating system, managing and controlling the
computer's hardware resources. It functions as a bridge between applications and the data
processing performed at the hardware level.

Handling tasks like memory management, process management, and device control, the kernel
ensures smooth communication between software and hardware components.

2. Describe the LVM (Logical Volume Manager) and its benefits in Linux.

Answer:

The Logical Volume Manager (LVM) in Linux is a tool that allows you to manage disk space more
flexibly. Unlike traditional partitioning, where disk space is divided into fixed parts, the LVM lets
you create, resize, and move logical volumes across physical drives without downtime.

This approach facilitates easier disk space management, allows you to extend or shrink
partitions as needed, and supports snapshots for data backup.

By grouping physical volumes into a single pool and allocating space to logical volumes, LVM
provides a more scalable and manageable storage solution, enhancing system performance
and adaptability.

3. How can you monitor disk usage and performance in Linux?

Answer:

Monitoring disk usage and performance in Linux can be accomplished through various tools
and commands.

Commands like df and du can display disk space usage, while iostat and vmstat provide insights
into disk performance and I/O statistics.

Tools like sar and atop offer more detailed reports, including the utilization rate and read/write
speeds.

Additionally, graphical tools such as GNOME System Monitor provide a user-friendly interface to
visualize disk performance.

These tools help identify potential issues, like bottlenecks or space shortages, ensuring the
system runs efficiently and allowing for proactive measures to avoid potential problems.

4. Explain the distinctions between the init and systemd initialization systems. When would you
use each one?

Answer:
init and systemd are initialization systems in Linux, used to bootstrap the user space and
manage system processes after booting.

• init, the older of the two, follows a sequential process, starting services one by one. It's
simpler but can be slower and less flexible.

• systemd, on the other hand, uses parallel processing, starting services simultaneously,
making booting faster and more efficient. It also provides features like dependency
resolution and better logging.

While init might be found in older systems or those needing a lightweight solution, systemd is
commonly used in modern Linux distributions for its enhanced control and efficiency.

5. Discuss the differences between TCP and UDP protocols.

Answer:

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both transport layer
protocols used to transmit data over the Internet, but they function differently.

TCP ensures reliable, ordered delivery by establishing a connection and confirming receipt of
packets. If a packet is lost, TCP resends it.

On the other hand, UDP is connectionless and doesn't guarantee delivery, meaning it sends
packets without confirmation.

While TCP's approach ensures accuracy, it may be slower. UDP is faster but may result in lost
data. TCP is used for web browsing and email, while UDP is suitable for streaming media where
speed is vital.

6. What's the significance of the /etc/resolv.conf file in Linux?

Answer:

The /etc/resolv.conf file in Linux plays a crucial role in network communications. It contains
information that the system uses to map domain names to IP addresses. Specifically, it lists the
Domain Name System (DNS) servers the system should use to perform these translations.

Translating human-readable domain names into numerical IP addresses allows applications


and users to connect to websites using common names instead of numeric addresses.

If this file is misconfigured or missing, it may lead to issues accessing internet resources,
making it an essential component in network configuration.

7. How would you enhance the security of a Linux server against common threats?

Answer:

Enhancing the security of a Linux server requires a combination of strategies:

• Regular system updates are crucial to patch vulnerabilities.

• Implementing a firewall helps control incoming and outgoing traffic.

• Disabling unnecessary services and using strong, unique passwords add extra layers of
protection.
• Setting proper permissions and employing user account management restrict access to
sensitive areas.

• Using security tools like SELinux to monitor and enforce security policies is also
beneficial.

• Regular security audits and monitoring logs for suspicious activities help to detect
threats early.

Together, these practices create a robust defense against common security threats.

8. Can you explain the purpose of the /etc/fstab file in Linux?

Answer:

The /etc/fstab file in Linux controls how disk drives and partitions are mounted and used by the
system. It contains a list of entries that define the file systems, partitions, and remote storage
devices, along with their mount points, file system types, and mount options.

By configuring these options in /etc/fstab, you can set which devices are automatically mounted
at boot time and how they should behave once mounted. It helps organize and manage storage,
ensuring that the drives are mounted consistently and with the proper settings every time the
system starts.

9. Describe the role and function of the iptables utility in Linux.

Answer:

The iptables utility in Linux is a powerful tool used for configuring packet filtering rules within the
kernel's networking stack. It's mainly responsible for defining how the system should handle
network traffic.

Admins can use iptables to create rules that permit or deny traffic based on criteria, like source
and destination IP addresses, protocols, and ports. This allows for fine-grained control over
network security, enabling the setup of firewalls, Network Address Translation (NAT), and other
network-related functions.

10. How do you create and manage user accounts and permissions in Linux?

Answer:

In Linux, creating and managing user accounts and permissions is often done through
command-line tools.

To create a user, use the useradd command followed by the username.

To set or change a password, use the passwd command.

Managing permissions involves setting the right permissions on files and directories with
the chmod command and defining user groups with the chown command.

Permissions are categorized as read, write, or execute for the owner, group, and others. Proper
user and permission management ensures that only authorized individuals can access specific
resources.

11. Walk through the process of troubleshooting network connectivity issues in Linux.
Answer:

1. Check the connection: Use ping to test connectivity to a known address.

2. Inspect network configuration: Use commands like ifconfig or ip a to verify the network
interface settings.

3. Verify DNS resolution: Test DNS with nslookup or dig to ensure domain names are
resolving correctly.

4. Examine the routing table: The route command helps to check that the data is being
routed to the right destination.

5. Look into firewall rules: Check iptables or firewall configurations to see if traffic is
being wrongly blocked.

6. Review logs: System logs may contain information about network errors. Tools
like dmesg or journalctl can be useful.

7. Restart network services: If needed, restarting network services with systemctl restart
networking might resolve the issue.

12. Compare the ext4, XFS, and Btrfs file systems, emphasizing their differences.

Answer:

• ext4 is a commonly used journaling file system in Linux. It supports file sizes up to 16 TB
and offers good performance and reliability.

• XFS is known for handling large files and volumes efficiently. It can scale to support file
systems up to 8 exabytes. It's often used in high-performance environments.

• Btrfs (B-tree file system) offers advanced features like copy-on-write, snapshots, and
built-in RAID. It's designed for fault tolerance and easy management.

While ext4 provides a solid base for general usage, XFS excels in managing large files and
volumes. Btrfs, on the other hand, introduces more advanced features, making it suitable for
modern storage needs.

13. How do you monitor and audit activity on a Linux system?

Answer:

Monitoring and auditing activity on a Linux system can be achieved through various tools and
log files.

Tools like top, htop, and ps allow you to monitor real-time system activity such as CPU usage,
memory, and running processes.

For auditing, the audit daemon (auditd) can track system events specified by rules, and the log
files in /var/log/ directory record different types of system activities.

Analyzing these logs with tools like awk, grep, and logwatch can help you to track, understand,
and audit system behavior, ensuring security and optimal performance.

14. What are the key differences between Debian, Ubuntu, and CentOS Linux distributions?
Answer:

• Debian: Known for stability and a large repository of packages, Debian follows a strict
free software philosophy. It has less frequent releases, focusing on well-tested software.

• Ubuntu: Based on Debian, Ubuntu aims for ease of use and provides regular updates. It
offers commercial support and has different versions, like Ubuntu Desktop and Server.

• CentOS: A free clone of Red Hat Enterprise Linux (RHEL), CentOS focuses on enterprise
stability and compatibility. It has slower release cycles and aligns with RHEL's
development.

While Debian emphasizes free software and stability, Ubuntu adds user-friendliness and
commercial support. CentOS targets enterprise users aligned with Red Hat practices.

15. Describe one way you can create a bootable USB drive in Linux.

Answer:

Creating a bootable USB drive in Linux can be done using the dd command.

First, you need to identify the USB drive's device name, usually something like /dev/sdX. You can
find it using the lsblk or fdisk -l command.

Then, use a command like sudo dd if=/path/to/iso-file.iso of=/dev/sdX bs=4M status=progress to


write the ISO file to the USB drive. Be cautious with this command as specifying the wrong
device can erase data.

After the process is complete, you'll have a bootable USB drive ready to use with the specified
Linux distribution or other operating systems.

16. Explain the steps to create and manage disk partitions in Linux.

Answer:

In Linux, you can create and manage disk partitions using tools like fdisk or gparted. Here's a
simplified process:

1. List existing disks using fdisk -l.

2. Open the disk with sudo fdisk /dev/sdX.

3. Create a new partition with the n command.

4. Choose partition type and size.

5. Write changes with the w command.

6. Format the partition using mkfs (e.g. sudo mkfs.ext4 /dev/sdX1).

7. Mount the partition if needed.

Remember, these actions can affect data, so always take precautions such as making a backup
before editing disk partitions.

17. Detail the differences between IPv4 and IPv6.

Answer:
IPv4 and IPv6 are Internet Protocol versions, but they differ mainly in structure and capacity:

• IPv4 uses 32-bit addresses, allowing around 4.3 billion unique addresses. It's written in
four decimal numbers separated by dots (e.g. 192.168.0.1).

• IPv6 uses 128-bit addresses, enabling a vast number of unique addresses. It's
expressed in hexadecimal, separated by colons (e.g.
2001:0df8:84a3:0000:0000:8b2e:0170:7134). IPv6 also simplifies the header structure
and improves routing efficiency. As IPv4 addresses are depleting, IPv6 provides a
necessary expansion to accommodate growing Internet usage.

18. What are the key elements of a secure SSH configuration in Linux?

Answer:

A secure SSH configuration in Linux should include the following elements:

• Strong authentication: Use public/private key pairs instead of simple passwords.

• Limit user access: Allow only necessary users to access SSH by


configuring AllowUsers or AllowGroups.

• Change default port: Modify the default port 22 to a non-standard one.

• Disable root login: Set PermitRootLogin to “no” to prevent root user login via SSH.

• Use SSH2: Ensure the configuration uses SSH2, which is more secure than SSH1.

These practices help to safeguard the SSH connection from unauthorized access and potential
threats.

19. Describe the stages involved in the Linux boot process.

Answer:

The Linux boot process consists of several stages:

1. BIOS/UEFI: Performs initial hardware checks and loads the boot loader.

2. Boot Loader (e.g. GRUB): Presents boot options and loads the Linux kernel.

3. Kernel initialization: The kernel takes control, initializes the hardware, and mounts the
root file system.

4. Init/systemd process: Init or systemd starts as the first user-space program and
initializes the user environment.

5. Runlevel/target: Specific services and programs are started depending on the runlevel
or target.

6. User login: Presents a login prompt, allowing users to access the system.

Each stage is crucial, progressing from hardware initialization to user interaction.

20. Describe the benefits of the LVM (Logical Volume Manager) in Linux.

Answer:
LVM in Linux provides flexibility in managing disk storage. Here's why it's useful:

• Resize partitions: You can easily grow or shrink logical volumes as needed.

• Storage pooling: Combine multiple disks or partitions into a single logical volume.

• Snapshots: Create point-in-time snapshots of data for backups or testing.

• Data migration: Move data between disks without downtime.

• Improved performance: Stripe data across multiple disks for better speed.

LVM enhances storage management, offering a scalable and more efficient solution for various
storage needs.

21. Outline the role of a Linux firewall and the steps to configure it.

Answer:

A firewall on Linux controls incoming and outgoing network traffic based on predefined rules.
Here's a high-level view of how to set one up:

1. Choose a firewall tool (like iptables or ufw).

2. List existing rules to understand the current configuration.

3. Define rules for allowing, denying, or forwarding specific traffic.

4. Apply the rules to the firewall.

5. Save the configuration to make it persistent across reboots.

6. Monitor and log as needed.

The firewall helps protect the system by filtering unauthorized access, thus enhancing network
security.

22. What is the function of the ifconfig command in Linux?

Answer:

The ifconfig command in Linux is used to configure and display network interface parameters. It
enables you to:

• View current network configuration, such as IP address, subnet mask, and broadcast
address.

• Activate or deactivate network interfaces.

• Assign or change IP addresses.

• Set or modify other network-related attributes.

Though ifconfig is widely known, it's becoming outdated, and the ip command is the preferred
modern alternative. Both tools help in managing network interfaces and configurations on Linux
systems.

23. Explain the concept of process scheduling in Linux and the role of the nice command.
Answer:

Process scheduling in Linux is how the CPU allocates time to various running processes. The
scheduler aims for fair distribution and efficient use of CPU resources. The nice command plays
a part in this:

• Niceness value: Every process has a “niceness value”, ranging from -20 (high priority) to
19 (low priority).

• Adjust priority: Using the nice command, you can set or modify a process's priority.

• Control resource allocation: A process with a lower niceness value gets more CPU
time.

Using the nice command, users can influence how the CPU handles their processes, aligning
with their specific needs.

24. How can you check for open ports on a Linux server using command-line tools?

Answer:

Checking for open ports on a Linux server is a critical part of system administration, as it helps
in managing network security.

Command-line tools like netstat or ss can be used. To list all listening ports, you can use netstat
-l or ss -l. To see TCP connections, netstat -t or ss -t is useful. These commands provide
valuable information on open ports and related protocols.

Filtering and monitoring open ports help maintain proper security measures within the system.

------------------------------------------------------------------------------------------------------------------------

Redhat system administrator.

Table of Contents

• 30 Must-have Red Hat Linux System Administrator Interview Questions with Detailed
Answers

o 1. What do you mean by Linux?

o 2. What do you mean by Red Hat Enterprise Linux?

o 3. How to verify the uptime of a Linux server?

o 4. What do you mean by Red Hat Network?

o 5. How can one change the user password?

o 6. How can a user rename a file in Red Hat Linux?

o 7. Can you explain the objectives of Red Hat Linux?

o 8. Can you explain the functionality of a Puppet Server?

o 9. How to know what the version of the Red Hat is?


o 10. What is the command to install Rpm packages?

o 11. Which command can be used to determine the Linux box’s hostname?

o 12. Explain in short about the storage cluster?

o 13. Can you explain the difference between umask and ulimit?

o 14. Elaborate about SELinux?

o 15. While installing Apache, what is the web port used to serve web pages?

o 16. Explain about rgmanager and CMA?

o 17. Explain the runs levels and how to alter them?

o 18. Can you explain DAS?

o 19. Tell me about the load balancing cluster?

o 20. What do you mean by LVM?

o 21. Elaborate the process for creating LVM?

o 22. Clearly explain the Indoes and their uses in Red Hat Linux?

o 23. Tell us about SAN and NAS?

o 24. Elaborate about sgid and suid terms?

o 25. Can you tell me about the bootloader? Give us a short description.

o 26. Do you know what is “parted” Command? If yes, then tell why it is used?

o 27. What do you mean by Crontab? Can you explain the fields of the Crontab?

o 28. What kind of remote software users can use to encrypt communication?

o 29. How will you create a partition of 100MB and mount it?

o 30. Can you elaborate on the process states in Unix?

30 Must-have Red Hat Linux System Administrator Interview Questions with Detailed Answers

1. What do you mean by Linux?

Answer: Linux s one of the most widely used operating systems, developed based on Linux
Kernel. As this is an open-source OS and can use on various hardware platforms. Those who are
looking for low-cost and free OS, then this one is the best. It comes with a user-friendly
interface, and users can customize the source code as per their requirements.

2. What do you mean by Red Hat Enterprise Linux?

Answer: This is one type of Linux/ GNU distribution developed by Red Hat, a multinational open-
source software provider.

3. How to verify the uptime of a Linux server?

Answer: For this, you can use the uptime command. It can show you the duration of how long
the Linux box is running. Besides, w and top command can verify the uptime.
4. What do you mean by Red Hat Network?

Answer: Red Hat Network is a platform, especially a system management platform which
provides the users with effective lifecycle management of different applications and operating
system. It helps in:

• Installing as well as provision new Linux systems.

• Configuration file management.

• Updating systems.

• Performance monitoring.

• Redeploying the systems for satellite and hosted deployment architectures.

Don’t forget to cover this question while preparing for Red Hat Linux System Administrator
interview questions and answers.

5. How can one change the user password?

Answer: The users to change the password, can use the command “passwd.” While executing
the command through the terminal, the users need to put the current password. After that, put
the new password. The process is quite easy.

Also Read: How to Prepare for Red Hat Certified System Administrator (RHCSA) Exam?

6. How can a user rename a file in Red Hat Linux?

Answer: To rename the file, you need first to open the shell command line of Red Hat Linux.
There you need to use the “mv command.” Then the command will take to the original file and
the newly named file. You need to check the parameters before renaming the files. However, if
you forget to mention the parameters, then the command will notify you to put those.

7. Can you explain the objectives of Red Hat Linux?

Answer: The users who know everything about Red Hat Linux can use the Red Hat Enterprise
Linux for customization of the operating environment. Besides, it also helps in completing some
basic command-line tasks as well as productivity roles related to the desktop.

8. Can you explain the functionality of a Puppet Server?

Answer: Yes. In general, this is an enterprise application and perfect for configuration
management. A puppet server is for Unix like OS. Explaining in detail, this a completely open-
source and fully automated program. Using this, one can send the configurations to puppet
agents through codes. Some essential tasks such as updating user accounts, verifying
permissions of the file, new software installation, and others and can be carried out using the
puppet code.

9. How to know what the version of the Red Hat is?

Answer: For this, the users can use the command “cat /etc/Redhat-release.” You will get the
output that will show the version.

10. What is the command to install Rpm packages?


Answer: To install Rpm packages in CentOS and Red Hat, you can use yum and rpm command
lines.

Preparing for Linux interview? Here’re the top 60 Linux interview questions with detailed answers
to crack the interview!

11. Which command can be used to determine the Linux box’s hostname?

The hostname command helps in determining the hostname of the server.

12. Explain in short about the storage cluster?

Answer: This is one of the most commonly asked Red Hat Linux System Administrator interview
questions that you will face during your job interview. Talking about the cluster, here multiple
computers combined together to carry out some tasks. Some major types of clusters are high
performance, load balancing, high availability, and storage.

The storage cluster helps in providing the perfect view of the file system in the servers in the
group. It dramatically improves the servers to write and read at the same time to a shared file
system. Besides, storage simplifies the storage administration by effectively limiting the
patching and application installation process.

13. Can you explain the difference between umask and ulimit?

Answer: In general, ulimit is a Linux built-in command which offers excellent control over
available resources to start the process. The users, if want, can limit the range by customizing
the limits.conf files. Besides, the users can update the system settings by editing the sysctl.conf
file. Now talking about umask, it defines the use file creation mask. When the users create a
directory and file, umask sets the permission for the directories and files.

Now, let’s look next Red Hat Linux System Administrator interview questions.

14. Elaborate about SELinux?

Answer: Talking about SELinux, it is a Linux program with enhanced security features. SELinux
keeps the server protected from compromise and misconfiguration. This is sued to access the
control implementation for the Linux Kernel. It puts a limit and then instructs the servers to only
access the particular files and security policies.

15. While installing Apache, what is the web port used to serve web pages?

Answer: Well, most of the web servers operate on Port 80. So, while installing Apache, it
automatically defaults to Port 80. However, users can use some alternative ports. But this will
force them to type a port into a browser to get access to the website. You can also use Port 8080
for this.

Linux Blogs are the good source to learn about the latest Linux news, updates, trends, strategies
etc. Here is the list of 20 best Linux Blogs and websites!

16. Explain about rgmanager and CMA?

Answer: This is one of the most complex Red Hat Linux System Administrator interview
questions. So, while answering it, remember to tell transparently. In the Red Hat cluster, Cman
works as a cluster manager, especially a distributed cluster manager. It operates in a cluster
node. Talking about its functions, it effectively tacks the cluster quorum by observing the cluster
nodes. Cman is responsible for a quorum, voting, communication, and monitoring between
clusters.

Coming to the rgmanager, it is a resource group manager. Rgmanager is responsible for


collecting cluster resources defined as resource trees, resource groups, and services. This
dramatically helps a Red Hat administrator to define, monitor, and configure the cluster
services. When a node fails to work, it will locate that particular clustered service to other nodes
without affecting the services.

17. Explain the runs levels and how to alter them?

Answer: In Linux, a run level is a stage of initialization that effectively defines what types of
system services are functioning. They are generally defined by numbers. In general, there are a
total of 7 run levels in the Linux system, and they serve a different purpose. They are:

• Halt system (Sued to turn off the system)

• Basis multi-user mode but there will be no NFS

• Single users mode

• Full multi-user mode (based on the text)

• Multi-user mode (graphical UI)

• Unused

• Reboot system

Now talking about the process for changing the level, one needs to change the file – /etc/inittab.
Alter the initdefault entry (id:5: initdefault:). If the users want to alter the run level on the fly, they
can do it through the ‘init’ command. Let’s take an example.

When a user types Init 3 in the command line, this will shift the system to run level 3 from run
level. To list the current level, the users can use the command “Who -r.”

18. Can you explain DAS?

Answer: This is one of the common Red Hat Linux System Administrator interview
questions that every employer asks. However, the answer is quite simple. It is, generally, a block
device physically connected to the host machine. It comes with a filesystem. Only certain
servers can access the device. You can find such storage devices, near-dedicated resources,
and server storage. The DAS is inexpensive and easy to use. It covers SATA and SCSI
technologies.

19. Tell me about the load balancing cluster?

Answer: As the name suggests, the load balancing cluster utilized to balance the load
throughout the cluster nodes. It works when the cluster dispatches the service request to a
different cluster node. This cluster offers inexpensive scalability as multiple nodes can be
configured considering the load requirements. In this cluster, if a node is not working correctly,
it will then detect the failure and then assign required requests to available nodes. Here the
collapse of the node will not be visible outside the cluster.

20. What do you mean by LVM?


Answer: In Red Hat Linux, LVM refers to Logical Volume Mangere. It is the storage management
solution that lets the Red Hat Linux System Administrators split the space of hard drive into PV-
Physical Volumes. After that, PV is combined into VG- Volume Groups. The VG can be further
divided into LV- Logical Volumes.

21. Elaborate the process for creating LVM?

Answer: When talking about Red Hat Linux System Administrator interview questions, we can’t
ignore this question. You need to elaborate it steps by steps. First, users need to create physical
volumes. For this, they can use the command “pvcreate” (#pvcreate /dev/sda2). After
establishing that, they need to add the physical volume to the volume group. Here “vgcreate”
command can be used (#vgcreate VLG0 /dev/sda2). Now, from the volume group, create a
logical volume. Use the “lvcreate” command (#lvcreate -L 1G -n LVM1 VLG0). In the last step,
the users need to use the “mke2f” command to make a file system on Sda2 (#mke2fs -j
/dev/VLG0/LVM1).

22. Clearly explain the Indoes and their uses in Red Hat Linux?

Answer: It refers to a data structure of a file system found in Unix like OS. It stores all the
necessary information about the file. However, it doesn’t use the actual name. The inode helps
in the process of recovering the files systems, which are damages. If there is any lost inode, you
can locate it in “locate + found” directory. Remember that this question comes under the most
frequently asked Red Hat Linux System Administrator interview questions. So, keep the answer
in your mind.

23. Tell us about SAN and NAS?

Answer: In Red Hat Linux, NAS runs an embedded OS on the basic hardware, for example,
keyboard and monitor. Its primary purpose is to verify the clients and offer to share with the
multiple systems or users to a particular network that needs dedicated IP to work. On the other
side, SAN is a perfect storage solution at the block-level. It is primarily developed to handle high
volume data transfer. In terms of performance and capacity, this is perfectly scalable.

24. Elaborate about sgid and suid terms?

Answer: Talking about suid, it offers the same level of ownership permissions while a user
executes a file. Coming to the sgid, it comes with a group of privileges of a completed file. It
inherits the ownerships while developing the directory.

25. Can you tell me about the bootloader? Give us a short description.

Answer: One of the easiest Red Hat Linux System Administrator interview questions in the
interview. The answer is very simple. Just tell the recruiter that bootloader boots the operating
system. Besides, it takes the decision about the kernel from which the operating system will
boot.

26. Do you know what is “parted” Command? If yes, then tell why it is used?
Answer: In Red Hat Linux, parted is a popular command, or you can say a tool that lets the users
manage the hard disk partitions easily. This can help you in deleting, adding, extending, and
shrinking hard disk partitions and file systems. However, with time it has gone through several
changes. Some of its old features are now replaced with new ones.

Aspired to become Red Hat Certified Engineer? Here we bring the comprehensive Red Hat
Certified Engineer exam preparation guide, that will help you prepare and pass the certification
exam.

27. What do you mean by Crontab? Can you explain the fields of the Crontab?

Answer: In the Red Hat Linux system, the cron executes the commands at specific times and
dates in Linux. So, this greatly helps in scheduling the activities and quite useful for recurring
works. The Crontab helps in uninstalling and installing the tables used to drive the cron. Here
are some command lines for Crontab.

• Crontab -e Edit your crontab file.

• Crontab -l Show your crontab file.

• Crontab -r Remove your crontab file.

While searching for Red Hat Linux System Administrator interview questions, this question will
definitely come in the list.

28. What kind of remote software users can use to encrypt communication?

Answer: One can use SSH, reliable remote desktop software that can help the users to control
the Red Hat server remotely. It can be controlled through certain commands. Besides, SSH also
effectively encrypts the data. This software uses port 22.

29. How will you create a partition of 100MB and mount it?

Answer:

• Use the command “partprobe” and then mkfs -t ext3 /dev/hda?

• First, to create a new partition, the users need to use fdisk /dev/had.

• Now, for the new partition, type “n.”

• Then, the users need to select between primary or logical partition. There, press “1” to
go for a logical partition.

• It will then ask to choose the starting cylinder type. Keep it default by pressing “Enter.”

• Now, the users need to put the size. Put +100M then press “P” for verification of the
partition list and name.

• To write the partition on the partitions table, press “W.”

Such types of Red Hat Linux System Administrator interview questions are quite common.
While answering it, don’t skip any steps. So, remember each step.

30. Can you elaborate on the process states in Unix?


Answer: In Unix, the processes execute the changes states considering the ongoing
circumstances. However, the states in Unix are:

• Waiting: It suggests the process is waiting for the resources or an event.

• Running: Here, the process is in running states, or it may suggest the process is all set to
work.

• Stopped: The Unix process has been stopped. They stop functioning after getting a
signal.

• Zombie: It suggests, the Unix process is dead. However, it is still there in the process
table.

As per ZipRecruiter, the average annual pay for a Red Hat Linux Administrator in the United
States is $115,180 a year.

You might also like