1. Where the History file can be located?
2. How will you harden the server?
3. Diff between Raid 1 and Raid 5?
4. What is the largest disk size can be used in LVM?
5. How will you remove a PV from lvm without any data loss?
6. What is the diff between ext3 and ext2 File system?
7. How we can use resize2fs, what is the purpose?
8. What is the purpose of LVM? Why it is used?
9. If the FS is in read-only mode, so we cannot create any
file. How will you fix it?
10. How to create swap partition after OS installation?
11. What is the diff between ssh and telnet?
12. How to find out the dependency required for a package?

Answers were Sorted based on User's Feedback



1. Where the History file can be located? 2. How will you harden the server? 3. Diff between Raid ..

Answer / raju pedshinge

.bash_history

Is This Answer Correct ?    13 Yes 1 No

1. Where the History file can be located? 2. How will you harden the server? 3. Diff between Raid ..

Answer / bharath

1. Where the History file can be located?
A. the file .bash_profile stored in home directory of user.
To see that file vi .bash_profile and edit it.
2. How will you harden the server?
A. A Server-- it is weather in testing or production-- are primary targets for
the attackers. By taking the proper steps, you can turn a vulnerable box into
a hardened server.
How to secure SSH sessions, configure firewall rules, minimize software, listed below,
1. Encrypt Data communication
-- use scp, ssh avoid FTP, Telnet and Rlogin /rsh
2. Minimize Software to minimize vulnerability
-- use RPM pkg management / YUM utility to remove unwanted packages installed
3. One Network Service per System or Vm Instance
-- Run different network services on separate servers or vm instance.
For example, if an attacker able to successfully exploit software called
Apache flow, he/she get an access to entire server including other services
such as MYSQL, email server and so on.
4. Keep linux software and Kernel up to date.
-- Use yum update or up2date
some distros apt-get update
5. Security essentials like selinux
6. password authentication like password aging, restricting to user previous
passphrases, and locking user accounts after login failures.
7. Disable unwanted services using chkconfig --list | grep "3:on"

and many more. . .

3. Diff between Raid 1 and Raid 5?
A. RAID 1 is disk striping. no mirroring no parity. Minimum 2 disks required. If any
One disk fails all the data get lost.
RAID 5 is disk striping with parity. Minimum 3 disks required. if anyone disk fails
Data is safe, if two fails data get lost.

4. What is the largest disk size can be used in LVM?
A. Don't know exactly, think of 2TB or 8TB (Warning- Not genuine answer)

5. How will you remove a PV from lvm without any data loss?
A. by using pvremove command.

6. What is the diff between ext3 and ext2 File system?
A. ext3 is also same as the ext2, but journaling concept is introduced in ext3.
Compared to ext2, ext3 is slow. ext2 less secure compared to ext3. ext2 is less
Performance where as ext3 is very good performance.


7. How we can use resize2fs, what is the purpose?
A. resize2fs is only for ext2 filesystem but not ext3.
first unmount the partition
#umount /dev/sda1

#tune2fs -O ^has_journal /dev/sda1 #to remove journal from /dev/sda1

#e2fsck -f /dev/sda1

#resize2fs /dev/sda1 600M #resize the partition


8. What is the purpose of LVM? Why it is used?


9. If the FS is in read-only mode, so we cannot create any
file. How will you fix it?
A. LVM is a mechanism use for providing specality of extending (or) reducing
the sizes of an existing partition.


10. How to create swap partition after OS installation?
A. swap can be created in two ways after the installation,
1. fdisk command
2. create a swap file using dd command

after creating swap file or file system

#mkswap /dev/sda10
#swapon /dev/sda10
#swapon -s #To see the swap devices

by using dd command

#dd if=/dev/zero of=/swap bs=1024 count=1

Which will creates the file size 1024(1GB).

#mkswap /swap
#swapon /swap
#swapon -s #to see the swap devices


11. What is the diff between ssh and telnet?
A. ssh is secured shell, allows the user to login remotely with more secured.
whereas telnet also same but authentications like passwords, transfers over a network
as text mode. so it is not good to use.

12. How to find out the dependency required for a package?
#rpm -qpR filename.rpm

Lists the dependency list of packages.

Is This Answer Correct ?    4 Yes 1 No

1. Where the History file can be located? 2. How will you harden the server? 3. Diff between Raid ..

Answer / durgesh srivastava

1. .bash_history

2. lvm is also called logical volume manager and it a
combination of multiple disk and drive which can be store
data in diff. form and use of lvm creat control or modified
all RAIDS 1,2,5,1+0

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More Linux System Calls Interview Questions

What do fork() internally call?

3 Answers  


1.Diff between Active and passive FTP? 2.What is anacron? 3.Diff between yum update and yum install while doing for kernel? 4.root_squash and no_root_squash does what? 5.What are the commands will you execute to find a new hardware? 6.How will you find out a lun allocated from SAN? 7.What is the main diff in CaT5 and CAT6 cable, except the 1/100 and 1/1000? 8.What is stale NFS and How will you fix it? 9.What is kernel panic error? 10.How will you recover password and shadow file, in case both got deleted. Explain the steps? 11.Explain boot process 12.What is network bonding. Explain the steps? 13.What are the exit codes returned by FSCK? 14.What is LDOM? 15.Diff between block and character device?

2 Answers   Wipro,


what is the difference between user APIs and kernel system calls ?

1 Answers   NetApp,


how to create a ftp user on redhat linux 4.0?

6 Answers   Accenture,


what are the backup utilites on red hat linux 4.0?

4 Answers   Wipro,






What is the Diffrent between Redhat linux And suse linux

2 Answers   Wipro,


What are system calls used for process management in linux?

0 Answers  


what is iptabe on redhat linux?

3 Answers   CDAC,


what is bus trap.

1 Answers   NetApp,


how to configure http server on red hat linux4.0?

5 Answers   IBM,


What is atomic function / atomic variable ?

1 Answers   Broadcom,


what are the different ways the Linux can swich from User Space to Kernel Space & vice-versa ?

2 Answers   NetApp,


Categories