InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Where Is Standard Output Usually Directed? |
|
Answer» By DEFAULT, your SHELL directs standard OUTPUT to your SCREEN or display. By default, your shell directs standard output to your screen or display. |
|
| 2. |
You Wish To Restore The File Memo.ben Which Was Backed Up In The Tarfile Mybackup.tar. What Command Should You Type? |
|
Answer» This COMMAND USES the X switch to extract a FILE. Here the file memo.ben will be restored from the tarfile MyBackup.tar. This command uses the x switch to extract a file. Here the file memo.ben will be restored from the tarfile MyBackup.tar. |
|
| 3. |
You Want To Create A Compressed Backup Of The Users' Home Directories. What Utility Should You Use? |
|
Answer» You can USE the z modifier with tar to COMPRESS your ARCHIVE at the same time as creating it. You can use the z modifier with tar to compress your archive at the same time as creating it. |
|
| 4. |
You Have A File Called Phonenos That Is Almost 4,000 Lines Long. What Text Filter Can You Use To Split It Into Four Pieces Each 1,000 Lines Long? |
|
Answer» The SPLIT text filter will divide files into EQUALLY sized pieces. The DEFAULT length of each PIECE is 1,000 LINES. The split text filter will divide files into equally sized pieces. The default length of each piece is 1,000 lines. |
|
| 5. |
What Command Should You Use To Check The Number Of Files And Disk Space Used And Each User's Defined Quotas? |
|
Answer» The repquota COMMAND is used to get a report on the status of the quotas you have SET including the AMOUNT of ALLOCATED SPACE and amount of used space. The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space. |
|
| 6. |
In Order To Improve Your System's Security You Decide To Implement Shadow Passwords. What Command Should You Use? |
|
Answer» The pwconv COMMAND creates the FILE /etc/shadow and changes all PASSWORDS to 'X' in the /etc/passwd file. The pwconv command creates the file /etc/shadow and changes all passwords to 'x' in the /etc/passwd file. |
|
| 7. |
What Command Is Used To Remove The Password Assigned To A Group? |
|
Answer» gpasswd -R gpasswd -r |
|
| 8. |
What Key Combination Can You Press To Suspend A Running Job And Place It In The Background? |
|
Answer» ctrl-z ctrl-z |
|
| 9. |
What Utility Can You Use To Automate Rotation Of Logs? |
|
Answer» logrotate logrotate |
|
| 10. |
What Is The Name And Path Of The Main System Log? |
|
Answer» /var/LOG/messages /var/log/messages |
|
| 11. |
What Is The Minimum Number Of Partitions You Need To Install Linux? |
|
Answer» 2 2 |
|
| 12. |
What Command Can You Use To Review Boot Messages? |
|
Answer» dmesg dmesg |
|
| 13. |
Who Owns The Data Dictionary? |
|
Answer» The SYS user owns the DATA dictionary. The SYS and SYSTEM users are created when the database is created. The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created. |
|
| 14. |
What Utility Can You Use To Show A Dynamic Listing Of Running Processes? |
|
Answer» TOP-The top utility shows a LISTING of all running PROCESSES that is DYNAMICALLY UPDATED. Top-The top utility shows a listing of all running processes that is dynamically updated. |
|
| 15. |
Where Standard Output Is Usually Directed? |
|
Answer» To the screen or DISPLAY-By DEFAULT, your shell DIRECTS STANDARD output to your screen or display. To the screen or display-By default, your shell directs standard output to your screen or display. |
|
| 16. |
What Daemon Is Responsible For Tracking Events On Your System? |
|
Answer» Syslogd-The syslogd daemon is responsible for TRACKING system INFORMATION and saving it to SPECIFIED LOG FLIES. Syslogd-The syslogd daemon is responsible for tracking system information and saving it to specified log flies. |
|
| 17. |
What Account Is Created When You Install Linux? |
|
Answer» root-Whenever you install Linux, only ONE USER account is created. This is the SUPER user account ALSO known as root. root-Whenever you install Linux, only one user account is created. This is the super user account also known as root. |
|
| 18. |
What File Defines The Levels Of Messages Written To System Log Files? |
|
Answer» kernel.h-To DETERMINE the various levels of messages that are DEFINED on your SYSTEM, examine the kernel.h FILE. kernel.h-To determine the various levels of messages that are defined on your system, examine the kernel.h file. |
|
| 19. |
What Command Should You Use To Check Your File System? |
|
Answer» FSCK-The fsck COMMAND is used to CHECK the INTEGRITY of the file SYSTEM on your disk. fsck-The fsck command is used to check the integrity of the file system on your disk. |
|
| 20. |
In Order To Display The Last Five Commands You Have Entered Using The Fc Command, You Would Type? |
|
Answer» fc -5-The fc COMMAND can be USED to EDIT or rerun commands you have PREVIOUSLY entered. To SPECIFY the number of commands to list, use -n. fc -5-The fc command can be used to edit or rerun commands you have previously entered. To specify the number of commands to list, use -n. |
|
| 21. |
What Can You Type At A Command Line To Determine Which Shell You Are Using? |
|
Answer» ECHO $SHELL-The name and path to the shell you are using is saved to the SHELL ENVIRONMENT variable. You can then use the echo command to PRINT out the VALUE of any variable by PRECEDING the variable’s name with $. Therefore, typing echo $SHELL will display the name of your shell. echo $SHELL-The name and path to the shell you are using is saved to the SHELL environment variable. You can then use the echo command to print out the value of any variable by preceding the variable’s name with $. Therefore, typing echo $SHELL will display the name of your shell. |
|
| 22. |
When You Create A New Partition, You Need To Designate Its Size By Defining The Starting And Ending? |
|
Answer» cylinders-When CREATING a NEW partition you MUST first specify its starting cylinder. You can then EITHER specify its size or the ENDING cylinder. cylinders-When creating a new partition you must first specify its starting cylinder. You can then either specify its size or the ending cylinder. |
|
| 23. |
Which Field Is Used To Define The User's Default Shell? |
|
Answer» command-The last field, CALLED EITHER command or login command, is used to SPECIFY what SHELL the user will use when he logs in. command-The last field, called either command or login command, is used to specify what shell the user will use when he logs in. |
|
| 24. |
How Big Should The Swap-space Partition Be? |
|
Answer» Swap SPACE is used as an extension of PHYSICAL RAM, the more RAM you have, the LESS swap space is required. You can add the amount of swap space and the amount of RAM together to get the amount of RAM Linux will use. For example, if you have 8MB of RAM on your machine’s motherboard, and a 16MB swap-space PARTITION, Linux will behave as though you had 24MB of total RAM. Swap space is used as an extension of physical RAM, the more RAM you have, the less swap space is required. You can add the amount of swap space and the amount of RAM together to get the amount of RAM Linux will use. For example, if you have 8MB of RAM on your machine’s motherboard, and a 16MB swap-space partition, Linux will behave as though you had 24MB of total RAM. |
|
| 25. |
Why You Shouldn't Use The Root Login? |
|
Answer» The root LOGIN does not RESTRICT you in any way. When you log in as root, you become the system. The root login is also sometimes called the super user login. With ONE SIMPLE command, issued either on purpose or by accident, you can destroy your entire Linux installation. For this reason, use the root login only when necessary. Avoid experimenting with commands when you do log in as root. The root login does not restrict you in any way. When you log in as root, you become the system. The root login is also sometimes called the super user login. With one simple command, issued either on purpose or by accident, you can destroy your entire Linux installation. For this reason, use the root login only when necessary. Avoid experimenting with commands when you do log in as root. |
|
| 26. |
What Is Write Command? |
|
Answer» The write command enables you to write an actual message on the other terminal online. You have to issue the write command with the login ID of the user with whom you want to communicate. The write command informs the user at the other end that there is a message from another user. write pastes that message onto the other user’s terminal if their terminal’s write permissions are SET. Even if they are in the middle of an edit session, write overwrites WHATEVER is on the SCREEN. The edit session contents are not CORRUPTED; you can restore the original screen on most editors with Ctrl-L. write is mostly used for one-way communication, but you can have an actual conversation as well. The write command enables you to write an actual message on the other terminal online. You have to issue the write command with the login ID of the user with whom you want to communicate. The write command informs the user at the other end that there is a message from another user. write pastes that message onto the other user’s terminal if their terminal’s write permissions are set. Even if they are in the middle of an edit session, write overwrites whatever is on the screen. The edit session contents are not corrupted; you can restore the original screen on most editors with Ctrl-L. write is mostly used for one-way communication, but you can have an actual conversation as well. |
|
| 27. |
What Is The Major Advantage Of A Hash Table? |
|
Answer» The major advantage of a hash table is its speed. Because the hash FUNCTION is to take a range of KEY values and TRANSFORM them into index values in such a way that the key values are distributed randomly ACROSS all the indices of a hash table. The major advantage of a hash table is its speed. Because the hash function is to take a range of key values and transform them into index values in such a way that the key values are distributed randomly across all the indices of a hash table. |
|
| 28. |
What Are The Techniques That You Use To Handle The Collisions In Hash Tables? |
|
Answer» We can use TWO major techniques to handle the collisions. They are open addressing and separate CHAINING. In open addressing, data items that hash to a full array cell are placed in another cell in the array. In separate chaining, each array element CONSISTS of a LINKED list. All data items hashing to a given array INDEX are inserted in that list. We can use two major techniques to handle the collisions. They are open addressing and separate chaining. In open addressing, data items that hash to a full array cell are placed in another cell in the array. In separate chaining, each array element consists of a linked list. All data items hashing to a given array index are inserted in that list. |
|
| 29. |
In Linux Os, What Is The File Server? |
|
Answer» The file SERVER is a MACHINE that shares its DISK storage and FILES with other machines on the network. The file server is a machine that shares its disk storage and files with other machines on the network. |
|
| 30. |
What Is Nfs? What Is Its Job? |
|
Answer» NFS stands for Network File SYSTEM. NFS enables filesystems PHYSICALLY residing on one computer system to be used by other computers in the network, appearing to USERS on the remote HOST as just ANOTHER local disk. NFS stands for Network File System. NFS enables filesystems physically residing on one computer system to be used by other computers in the network, appearing to users on the remote host as just another local disk. |
|
| 31. |
What Is The Real Mean Of Dhcp? |
|
Answer» Dynamic addressing simplifies network administration because the s/w keeps TRACK of IP addresses rather than requiring an administrator to manage the task. That MEANS new COMPUTER can be ADDED to the network without any risk of manually assigning unique IP ADDRESS. Dynamic addressing simplifies network administration because the s/w keeps track of IP addresses rather than requiring an administrator to manage the task. That means new computer can be added to the network without any risk of manually assigning unique IP address. |
|
| 32. |
You Need To See The Last Fifteen Lines Of The Files Dog, Cat And Horse. What Command Should You Use? |
|
Answer» The tail UTILITY displays the end of a file. The -15 tells tail to DISPLAY the last FIFTEEN LINES of each specified file. The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file. |
|
| 33. |
What Would Be The Result Of Issuing The Command Cat Phonenos? |
|
Answer» The tac TEXT filter is a reverse cat. It DISPLAYS a file STARTING with the last line and ENDING with the first line. The tac text filter is a reverse cat. It displays a file starting with the last line and ending with the first line. |
|
| 34. |
You Wish To Print The File Vacations With 60 Lines To A Page. Which Of The Following Commands Will Accomplish This? |
|
Answer» The default PAGE length when USING pr is 66 lines. The -l OPTION is USED to specify a different length. The default page length when using pr is 66 lines. The -l option is used to specify a different length. |
|
| 35. |
What Would Be The Result Of The Command Paste -s Dog Cat? |
|
Answer» The paste TEXT filter USUALLY joins two files separating the corresponding lines with a tab. The -s option, however, will cause paste to DISPLAY the FIRST file, DOG, then a new line character, and then the file cat. The paste text filter usually joins two files separating the corresponding lines with a tab. The -s option, however, will cause paste to display the first file, dog, then a new line character, and then the file cat. |
|
| 36. |
What Text Filter Can You Use To Display A Binary File In Octal Numbers? |
|
Answer» The OD TEXT filter will dumpt the contents of a file and display it in 2-byte OCTAL NUMBERS. The od text filter will dumpt the contents of a file and display it in 2-byte octal numbers. |
|
| 37. |
You Issue The Command Head * What Would The Resulting Output Be? |
|
Answer» If the number of lines to DISPLAY is not specified, the first ten lines of the specified file are displayed. The asterick tells HEAD to display the content of each file in the present working directory. If the number of lines to display is not specified, the first ten lines of the specified file are displayed. The asterick tells head to display the content of each file in the present working directory. |
|
| 38. |
You Have A Tab Delimited File Called Phonenos And Want To Change Each Tab To Four Spaces. What Command Can You Use To Accomplish This? |
|
Answer» By default, EXPAND converts tabs to EIGHT spaces. Use the -t option to change this behavior. By default, expand converts tabs to eight spaces. Use the -t option to change this behavior. |
|
| 39. |
Which Of The Following Commands Will Replace All Occurrences Of The Word Rate With The Word Speed In The File Racing? |
|
Answer» When using sed to do a search and REPLACE, its default action is to only replace the first occurrence in each LINE. Adding the ‘G’ makes sed replace all occurrences of the search TERM even when it occurs multiple TIMES on the same line. When using sed to do a search and replace, its default action is to only replace the first occurrence in each line. Adding the ‘g’ makes sed replace all occurrences of the search term even when it occurs multiple times on the same line. |
|
| 40. |
Your Default Umask Is 002. What Does This Mean? |
|
Answer» The DIGITS of your UMASK represent owner, GROUP and others in that order. The digits of your umask represent owner, group and others in that order. |
|
| 41. |
What Is Meant By Sticky Bit? |
|
Answer» When the STICKY BIT is set on a WORLD writable directory, only the OWNER can delete any file contained in that directory. When the sticky bit is set on a world writable directory, only the owner can delete any file contained in that directory. |
|
| 42. |
You Have A File Called Sales Data And Create Symbolic Links To It In Bob's Home Directory. Bob Calls You And Says That His Link No Longer Works. How Can You Fix The Link? |
|
Answer» Because the LINK in BOB’s DIRECTORY is a symbolic link, if the file sales data in the /data directory is DELETED, the symbolic link will no LONGER work. Because the link in bob’s directory is a symbolic link, if the file sales data in the /data directory is deleted, the symbolic link will no longer work. |
|
| 43. |
You Have A Large Spreadsheet Located In The /data Directory That Five Different People Need To Be Able To Change. How Can You Enable Each User To Edit The Spreadsheet From Their Individual Home Directories? |
|
Answer» By creating a link to the file in each user’s home directory, each user is able to easily open and edit the spreadsheet. Also, any changes that are made are SEEN by all the USERS with ACCESS. By creating a link to the file in each user’s home directory, each user is able to easily open and edit the spreadsheet. Also, any changes that are made are seen by all the users with access. |
|
| 44. |
What Command Should You Use To Check The Number Of Files And Disk Space Used And Each User's Defined Quotas? |
|
Answer» The repquota COMMAND is used to get a REPORT on the status of the QUOTAS you have SET including the AMOUNT of allocated space and amount of used space. The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space. |
|
| 45. |
You Have Set Quotas For All Your Users But Half Of Your Users Are Using More Space Than They Have Been Allotted. Which Of The Following Could Be The Problem? |
|
Answer» Quotas are set on a partition by partition BASIS. If your users have home DIRECTORIES on different PARTITIONS, you will need to CONFIGURE quotas for each partition. Quotas are set on a partition by partition basis. If your users have home directories on different partitions, you will need to configure quotas for each partition. |
|
| 46. |
After Copying A File To A Floppy Disk, What Should You Do Before Removing The Disk? |
|
Answer» If you do not UNMOUNT the FLOPPY before REMOVING it, the files on the floppy may become corrupted. If you do not unmount the floppy before removing it, the files on the floppy may become corrupted. |
|
| 47. |
You Have A File Called Docs.z But Do Not Know What It Is. What Is The Easiest Way To Look At The Contents Of The File? |
|
Answer» The .Z extension INDICATES that this is a file that has been compressed USING the compress utility. The zcat utility PROVIDES the ability to display the CONTENTS of a compressed file. The .Z extension indicates that this is a file that has been compressed using the compress utility. The zcat utility provides the ability to display the contents of a compressed file. |
|
| 48. |
You Want To Verify Which Lines In The File Kickoff Contain 'bob'. Which Of The Following Commands Will Accomplish This? |
|
Answer» The -n OPTION when used with sed prints only the LINES CONTAINING the pattern. In this CASE, the pattern is ‘BOB’ and the file to be searched is kickoff. The -n option when used with sed prints only the lines containing the pattern. In this case, the pattern is ‘Bob’ and the file to be searched is kickoff. |
|
| 49. |
You Want To Know How Many Lines In The Kickoff File Contains 'prize'. Which Of The Following Commands Will Produce The Desired Results? |
|
Answer» Using the -c OPTION with the GREP COMMAND will show the total number of LINES containing the specified pattern rather than DISPLAYING the lines containing the pattern. Using the -c option with the grep command will show the total number of lines containing the specified pattern rather than displaying the lines containing the pattern. |
|
| 50. |
You Want To Search For Sale And Sales. What Regular Expression Should You Use? |
|
Answer» Use the asterick (*) to match to zero or more CHARACTERS. The ‘$‘ matches to any one CHARACTER so SALE$ would not find sale. Use the asterick (*) to match to zero or more characters. The ‘$‘ matches to any one character so sale$ would not find sale. |
|