Linux Interview Questions and Answers

Thumb

Author

BIQ

Questions

30

Last updated

Mar 8, 2022

A genuinely free and open source operating system, Linux is one of the most liked operating systems. It was designed keeping in mind the Unix compatibility. Read our detailed Linux interview questions to know more about the features and commands of Linux. Usually, it is called as the clone of Unix. Linux was developed by Linus Torvalds. While working on the Unix OS, he felt the need to improve Unix, but the designers of Unix rejected his suggestions. Hence, he founded the Linux in 1991 as a kernel first, which was later launched as a full-fledged OS.

Most Frequently Asked Linux Interview Questions

Here in this article, we will be listing frequently asked Linux Interview Questions and Answers with the belief that they will be helpful for you to gain higher marks. Also, to let you know that this article has been written under the guidance of industry professionals and covered all the current competencies.

Q1. What is Linux and why it is used?
Answer

An open-source operating system, Linux is currently one of the best OSs. It can be considered as software that sits underneath and communicates with the other software on a computer and passes on requests from those software programs to the hardware.

Linux is used because it is –

  • Highly stable and secure
  • Can be maintained easily
  • Can run on any hardware system
  • Open source and free to use
  • Extensive documentation and support
Q2. What is the difference between Linux and Redhat?
Answer
S.no REDHAT LINUX
1. Specific distribution backed by the company RedHat General term for the Linux OS. Can refer to any distribution.
2. RedHat is a specific OS built on Linux Kernel. Linux is essentially a kernel.
3. To receive support and updates, one needs to have a proper agreement with the company. Follows the Open source model
Q3. What does Swap mean in Linux?
Answer

If a Linux server runs out of memory, the kernel moves some inactive processes from Linux server to a disk that acts as the virtual memory. This disk space is called a Swap.

Q4. What are the essential features of the Linux operating system?
Answer
  • Multi-tasking is possible without slowing down CPU.
  • Offers high security compared to other OSs like Windows, iOS, etc.
  • Can be converted from the command line to GUI by installing required packages.
  • Open source code with great community and support.
  • Can run on different hardware types.
  • Hierarchical file system.

Read details about the security features of Linux in the next question of our Linux Interview questions list.

Q5. How is Linux more secure compared to other operating systems?
Answer
There are multiple reasons for this –
  • Linux gives very low access to its users. If there is a virus attack, only a few files will be corrupted not the whole system.
  • It is less vulnerable because a user needs complete execution rights for opening even an email attachment.
  • The working environment in Linux is segmented in different environments like Ubuntu, Arch, Linux Mint, etc. This division gives much protection from the virus.
  • Linux uses Iptables which requires advanced privileges to function.
Q6. What is the structure of Linux?
Answer

Linux has a layered structure –

Standard Utility library

Applications

The standard library of procedures

Kernel

Device drivers

Hardware

  • Hardware - the CPU, RAM, mouse, the keyboard is the hardware
  • Kernel - contains device drivers and handles resource allocation, acts as an interface between the hardware and the operating system.
  • The standard library of procedures – termed as libc, allows the user to communicate with the kernel.
  • User applications and standard utilities – the commands for various tasks like computing, modifying files or taking backups, etc.
Q7. What are the functions of a Linux operating system?
Answer
Q8. What are the core components of Linux?
Answer

The core components of Linux are boot loader, kernel, shell, Daemons, window manager and X window server.

Q9. What is the virtual desktop in Linux?
Answer

Virtual desktop provides secure access to Linux VDI even from non-Linux devices like Windows. This helps admins manage Windows and Linux applications using one console.

Q10. How do I get to a command prompt in Linux?
Answer

You can use the key combination Ctrl+Alt+T to open a command prompt in Linux.

Q11. How do I run a file in Linux?
Answer
  • Open the command prompt using Ctrl+Alt+T
  • If your file does not have to execute permission, add the same chmod +x /root/home/your file.sh
  • Run the script by typing /root/home/your file.sh and press enter.
Q12. How do I check hard drive space on Linux?
Answer

Use df [options] [devices] to check hard drive space.

Example –

df -h /test/tmp gives output as

Filesystem

Inodes

IUsed

IFree

IUse%

Mounted On

/test/tmp

453K

23

433

1%

/

Q13. What is Lilo how is it useful in Linux?
Answer
Q14. What is export Ld_library_path?
Answer

It is an environment variable that contains a list of paths that are used to resolve the library dependencies at run-time (dynamic libraries). This path is checked before the standard paths /lib or /usr/lib.

Q15. What do you mean by ldconfig in Linux?
Answer

Idconfig is a command that creates the required links and cache to the most recently shared libraries that are present in the directories specified in the

  • command line,
  • the file /etc/ld.so.conf,
  • the trusted directories /lib and /usr/lib
Q16. What is GUI in Linux?
Answer

Graphical User Interface or GUI makes it easier for a Linux user to execute programs via a desktop, similar to Windows. The desktops in Linux are KDE, Java, GNOME.

Q17. What is puppet used for in Linux?
Answer
Puppet is a Configuration Management tool. It is used to
  • Deploy, configure and manage servers,
  • Define and monitor unique configurations for each host
  • Scale-up and scale-down machines dynamically
  • Provide control over configured devices to propagate changes in a centralized manner
Q18. How to enhance the security of password file in Linux?
Answer

For enhanced security, a shadow copy of the password file is made, which stores hashed passwords of all the users. The hashed password is a long string of characters, generated based on the hashing method used.

Read further for more questions on security in our list of Linux interview questions.

Q19. What is the use of a symbolic link in Linux?
Answer
Symbolic link :-
  • links the libraries
  • ensures that the files are in their place without the original being copied or moved.
Q20. Compare cron and anacron in Linux with an example?
Answer
S.no CRON ANACRON
1. It is a daemon that runs scheduled tasks It runs commands periodically, the frequency being defined in several days.
2. Example – updates, system backups Example – a backup script that is scheduled to run weekly or monthly.
3. Suitable for machines that are on 24x7 like servers Suitable for machines like laptops and desktops that are NOT on 24x7.
4. Runs as per defined schedules. Checks if any job has to be executed when the user turns on the power.
5. Default system crontab file is /etc/crontab Listed in /etc/anacrontab
Q21. What is a daemon process in Linux?
Answer

A program that gets executed in the background because of the occurrence of a specific event, process or condition. Daemon processes are managed by the Kernel. The operations are given unique PIDs.

Q22. What is the difference between filesystems ext2, ext3 and ext4 in Linux?
Answer
1. ext2 Second extended filesystem.
2. ext3 The concept of journaling was introduced, wherein, if a system crash or power failure occurred, the filesystems that were not saved could be recovered, unlike ext2.
3. ext4 Performance improvements over the ext3 filesystem. Supports huge filesizes.
Q23. List 10 networking and troubleshooting commands in Linux?
Answer
  • Ifconfig – configure interface parameters of the network.
  • dig – performs DNS lookups to display a result obtained from name servers.
  • traceroute – prints the route that the packets take to the network host.
  • nslookup – queries internet domain name servers.
  • telnet – connect destination port if the connection between hosts is working fine
  • netstat – reviews each network connection and the open sockets.
  • w – writes (prints) current activities and processes by each user.
  • scp – secure copy the files from and to another host in the network.
  • ifup/ifdown – enable or disable the network interface respectively.
  • nmap – checks for the opened port on the server
Q24. How to give permission to full permission in Linux?
Answer

Use chmod 777 to give full permission to reading, write and execute.

Q25. list the different modes of using vi editor in Linux?
Answer

There are three modes – command mode, insert mode and last line or escape mode.

Q26. How to Uninstall Software with the Command Line in Linux?
Answer

Use the command apt-get as –

        apt-get --purge remove [filename]

Q27. What are system calls in Linux?
Answer

There are 80 system calls in Unix that are used to control processes, manage filesystem and for inter-process communication. System calls occur in the kernel.

Q28. Which command in Linux is used for the description of any command?
Answer

For this access the individual command’s manual page. For instance, to know the description of

     cat command, type

man cat

This will display a description of the said command.

Q29. How many types of bond are there in Linux?
Answer

There are 7 types of network bond in Linux – mode=0 (balance-rr), mode-1 (active-backup),

       mode=2 (balance-xor), mode=3 (broadcast), mode=4 (802.3ad), mode=5 (balance-tlb),

       mode=6 (balance-alb)

Q30. How to stop a process running in Linux?
Answer
You can kill the process using –
  • kill PID – It is used to kill a particular process.
  • killall – It is also used to kill all the running processes.