www.linkedin.
com/in/nayan-chaudhari-200b31241
Daemons in Linux
The operating system will use Daemons to execute a background operation that isn't native to
the operating system. System managers use Daemons to run background services. This
ensures that consumers are unable to communicate with the programs, making them more
stable. In short, when it comes to managing periodic requests, Daemon is a safe option.
How we can transfer file from one server to other server?
Files can be transferred from one server to another using tools like SCP, SFTP, or rsync.
Use SCP (Secure Copy Protocol) to securely transfer files between servers.
Example: #scp file.txt user@server2:/path/to/directory
Use SFTP (SSH File Transfer Protocol) for interactive file transfers.
Example: #sftp user@server2
Use rsync for efficient synchronization of files between servers.
Example: #rsync -avz file.txt user@server2:/path/to/directory
Explain the term patching used in Linux.
Answer: Patching is a Linux computer utility that includes modified text files as well as a
special file known as the patch file. It is a little text document that fits in between two
different copies of a source tree that's full of updates. In addition, the diff software is used to
create a patch that fits the diff listing form.
You are unable to unmount a file system, what will you do?
Ans. Check for any processes or open files using the file system, then force unmount if
necessary.
Check for any processes or applications currently using the file system with 'lsof' command
Kill any processes that are using the file system if necessary
Try unmounting the file system again using 'umount -l' to force unmount if needed
You are unable to unmount a file system, what will you do?
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
Patching and the process of how I do patching
Ans. Patching is the process of updating software to fix vulnerabilities and improve
performance.
Patching involves identifying and applying updates to software systems.
It is important to regularly check for patches and updates from vendors.
Patching can be done manually or through automated tools.
Before applying patches, it is crucial to test them in a controlled environment.
Patching should be performed in a planned and systematic manner to minimize downtime and
ensure system stability.
Documentation of the patching process is essential for tracking changes and troubleshooting.
Examples: yum, apt-get, and Windows Update.
If a server patched with new kernel update after reboot server came up
with old kernel only. How will you troubleshoot it?
Ans. To troubleshoot a server that booted up with the old kernel after a new kernel update,
check the bootloader configuration, verify the kernel installation, and review the update
process.
Check the bootloader configuration to ensure it is pointing to the correct kernel version.
Verify the kernel installation to see if the new kernel was successfully installed.
Review the update process to identify any errors or issues that may have occurred during the
update.
Check the logs for any relevant information on the update process and boot sequence.
Consider rolling back the update and reapplying it to see if that resolves the issue.
What is the command to check load average?
Ans. The command to check load average is 'uptime' or 'w' in the terminal.
Use the 'uptime' command to display the load average for the system.
Alternatively, you can use the 'w' command to see load average along with other information.
Load average represents the average system load over a period of time.
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
What is LVM, Explain LVM Architecture, What is Raid, What is the
booting process of RHEL, How to manage failed unmount or mount, What
are the issues you have faced in working with Linux Servers, What is
special permission, How many states are there for a process, How to kill
process.
Answer - LVM is Logical Volume Manager used for managing disk space, RAID is
Redundant Array of Independent Disks for data protection, RHEL boot process involves
BIOS, GRUB, kernel loading, and init process.
LVM allows for dynamic resizing of logical volumes without downtime.
RAID combines multiple disks for data redundancy or performance improvement.
RHEL boot process involves BIOS POST, GRUB bootloader, kernel loading, and init
process.
Managing failed unmount or mount involves checking for processes holding the mount point,
killing them if necessary, and then retrying the operation.
Special permissions in Linux include setuid, setgid, and sticky bit.
There are 5 states for a process: Running, Sleeping, Stopped, Zombie, and Dead.
To kill a process, you can use the 'kill' command with the process ID or 'pkill' with the
process name.
If kernal stuck in update what we do
Try to reboot the system
Check for any errors
If the issue persists, try to boot into a previous kernel version
If all else fails, reinstall the kernel
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
What is rollback patching
Ans. Rollback patching is a process of reverting a patch or update to a previous version.
Rollback patching is useful when a patch or update causes issues or conflicts with the system.
It involves undoing the changes made by the patch or update and restoring the system to its
previous state.
Rollback patching can be done manually or automatically depending on the system and the
patching process.
Examples: of rollback patching tools include Windows System Restore and Linux's yum
history command.
What is DHCP and how its working?
Ans. DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that
automatically assigns IP addresses to devices on a network.
DHCP server assigns IP addresses to devices on a network
It also provides other network configuration information such as subnet mask and default
gateway
DHCP uses a lease mechanism to manage IP address assignments
DHCP operates on the client-server model
Example: When a device connects to a network, it sends a DHCP request to the DHCP
server to obtain an IP address.
What is the mean of NFS. What is NFS config file.
Ans. NFS stands for Network File System. It is a protocol used for sharing files/folders
between Unix/Linux systems over a network.
NFS allows a user on a client computer to access files over a network as if they were on the
local hard drive.
The NFS configuration file is /etc/exports, which lists the directories that can be exported to
remote systems. NFS uses RPC (Remote Procedure Call) to communicate between the client
and server.
www.linkedin.com/in/nayan-chaudhari-200b31241
NFS can be used to share files between Linux/Unix systems, as well as between Linux/Unix
and Windows systems using third-party software.
NFS can be secured using various methods such as IP address restrictions, user
authentication, and encryption.
What is linux and what is difference between unix and linux?
Ans. Linux is an open-source operating system based on Unix. Unix is a family of
multitasking, multiuser computer operating systems.
Linux is open-source and free to use, while Unix is proprietary and usually requires a license.
Linux has a larger community and more distributions (e.g. Ubuntu, CentOS), while Unix has
fewer variations (e.g. Solaris, AIX).
Linux is more customizable and can run on a wider range of hardware, while Unix is more
stable and secure.
Linux uses the GNU General Public License (GPL), while Unix uses various proprietary
licenses.
Linux has a faster development cycle and more frequent updates compared to Unix.
What is Linux administrator?
Ans. A Linux administrator is responsible for managing and maintaining Linux-based
systems.
Installs, configures, and updates Linux operating systems and software
Monitors system performance and troubleshoots issues
Manages user accounts and permissions
Implements security measures to protect systems and data
Automates tasks using scripting languages like Bash or Python
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
What is the difference between /etc/passwd and /etc/shadow files?
Answer: The /etc/passwd file stores essential user information like usernames, user IDs,
home directories, and default shells. Each line in the file represents a user account.
The /etc/shadow file contains encrypted passwords and other security-related information. It
is only accessible by the root user or privileged processes.
What methods would you use to monitor disk space usage on a Linux
server?
Answer: To monitor disk space usage, I would use commands like df to check the overall
disk usage and du to examine space usage by individual directories and files. Setting up
automated monitoring tools such as Nagios or Prometheus can provide ongoing alerts for
disk space issues.
Regularly reviewing and cleaning up unnecessary files, logs, and temporary data can help
maintain disk space. Additionally, configuring log rotation and archiving can prevent log files
from consuming excessive space.
How would you approach troubleshooting a service that fails to start on a
Linux server?
First, I would check the service's status using systemctl or service commands to gather
information about why it failed to start. Reviewing the service's log files, usually located in
/var/log, can provide additional insights into the issue.
I would then verify the service's configuration files for any errors or misconfigurations.
Ensuring that all dependencies and required resources are available and checking for conflicts
with other services can also help resolve the issue.
How would you troubleshoot a system that is experiencing high load
averages?
To troubleshoot high load averages, a candidate should start by examining system resource
usage. This includes checking CPU, memory, and disk I/O to identify any bottlenecks.
They might use tools like top or htop to get a real-time view of system performance and
identify processes consuming excessive resources.
Look for candidates who mention monitoring system logs and checking for any unusual
activities or misconfigurations. Ideal responses should show a systematic approach to
narrowing down the root cause.
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
What steps would you take to investigate a system with slow I/O
performance?
Slow I/O performance can often be traced to disk-related issues. Candidates should mention
using tools like iostat or vmstat to monitor disk I/O and identify any problematic patterns.
They might discuss checking for disk errors or filesystem issues and ensuring that the disk is
not running out of space.
How would you approach troubleshooting a system with frequent
application crashes?
Frequent application crashes can be due to various issues, including insufficient resources,
software bugs, or configuration errors. I will start by reviewing application logs and system
logs for any error messages.
They might also consider checking the stability and compatibility of the application with the
current system environment. Ensuring that all dependencies are correctly installed and up-to-
date is crucial.
What methods would you use to diagnose a system with high memory
usage?
To diagnose high memory usage, I will start by using tools like free, vmstat, or top to get an
overview of memory utilization.
They should identify processes consuming large amounts of memory and investigate whether
this usage is expected or due to a memory leak. Checking swap usage can also provide
insights into memory pressure.
Look for candidates who can explain the importance of memory management and
optimization. They should be able to discuss strategies like adjusting memory limits,
optimizing applications, or considering hardware upgrades.
How would you handle a system that is experiencing frequent spikes in
CPU usage?
Frequent spikes in CPU usage can be caused by various factors, including misbehaving
processes, inefficient code, or resource-intensive applications. I will start by using tools like
top or htop to identify processes consuming high CPU.
They might discuss analysing these processes to determine if they are necessary and whether
they can be optimized. Checking for scheduled tasks or background jobs that might be
causing spikes is also important.
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
What steps would you take to resolve a system with slow network performance?
Slow network performance can be due to various factors like network congestion,
misconfigurations, or hardware issues. I will start by using tools like ping, traceroute,
or netstat to diagnose the problem.
Checking network interfaces and configurations, reviewing firewall rules, and ensuring that
no unauthorized devices are connected to the network.
I will be able to discuss strategies for improving network performance and minimizing
latency.
How would you investigate and resolve a system with intermittent performance
issues?
Intermittent performance issues can be challenging to diagnose. Candidates should start by
collecting data over time using monitoring tools like sar or collectl to identify patterns and
correlations.
I will discuss checking for hardware issues, network problems, or software bugs that could be
causing the intermittent issues. Reviewing system logs and application logs for any
irregularities is also important.
How would you troubleshoot a system with performance degradation after a
recent update?
Performance degradation after an update can be due to compatibility issues,
misconfigurations, or resource conflicts. I will start by reviewing the update logs and
checking for any errors or warnings.
Rolling back the update if necessary or applying patches to resolve any issues. Ensuring that
all dependencies are correctly installed and compatible is crucial.
www.linkedin.com/in/nayan-chaudhari-200b31241
www.linkedin.com/in/nayan-chaudhari-200b31241
What methods would you use to monitor and improve overall system
performance?
Monitoring and improving system performance require a comprehensive approach.
Candidates should mention using tools like Nagios, Zabbix, or Prometheus for continuous
monitoring.
They might discuss setting up alerts for critical performance metrics and regularly reviewing
system logs and performance data to identify and address any issues.
I want to create a directory a1 and inside that a2 and inside that a3. Is it possible?
Ans. Creating multiple directories is possible. In this scenario the below command works.
$mkdir –p a1/a2/a3
What are 2 Types of Mount in linux?
Answer: Temporary Mount and Permanent Mount
Temporary Mount for removable devices such as pendrive, cd/dvd or any other.
permanent Mounting like harddrives, lun storage etc, it will remain connected on Linux
system every boot or restart.
What is SWAP in Linux?
Answer. Linux uses swap space to increase the amount of virtual memory available to a host.
It can use one or more dedicated swap partitions or a swap file on a regular filesystem or
logical volume.
What command use for Error checking and Error Fixing in Linux?
Answer. $ fsck and e2fsck
What types of package Installation in REDHAT?
A. RPM = Redhat Package Manager YUM = Yellow Dog Updated Modifier
www.linkedin.com/in/nayan-chaudhari-200b31241