0% found this document useful (0 votes)
29 views6 pages

Interview Questions & Ans

The document provides an overview of key concepts related to Linux, Windows, and networking, including the Linux kernel, LILO, swap space, root accounts, and security features of Linux. It also covers Windows-specific topics such as Active Directory, TCP/IP configurations, and Group Policy Objects. Additionally, it discusses networking fundamentals like OSI model layers, differences between hubs, switches, and routers, and protocols like TCP/IP and SNMP.

Uploaded by

anujamakasare45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views6 pages

Interview Questions & Ans

The document provides an overview of key concepts related to Linux, Windows, and networking, including the Linux kernel, LILO, swap space, root accounts, and security features of Linux. It also covers Windows-specific topics such as Active Directory, TCP/IP configurations, and Group Policy Objects. Additionally, it discusses networking fundamentals like OSI model layers, differences between hubs, switches, and routers, and protocols like TCP/IP and SNMP.

Uploaded by

anujamakasare45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Linux

1. What do you understand by Linux Kernal? Is it legal to edit it?

Ans. The Linux kernel is the main component of a Linux operating system (OS) and is the core
interface between a computer's hardware and its processes. It communicates between the 2,
managing resources as efficiently as possible. Yes, its legal to edit.

2. Explain LILO?

Ans. LILO stands for Linux Loader that is used to load Linux into memory. It can boot operating
systems from floppy disks, hard disks, and it does not depend on a specific file system. Lilo handles
some tasks such as locate the kernel, identify other supporting programs, load memory and starts
the kernel. The configuration file of lilo is located at “/etc/[Link]”

3. What is Swap space?

Ans. Swap space in Linux is used when the amount of physical memory (RAM) is full. If the system
needs more memory resources and the RAM is full, inactive pages in memory are moved to the
swap space. ... Swap space is located on hard drives, which have a slower access time than physical
memory.

4. What do you understand by the Root account?

Ans. Root is the superuser account in Unix and Linux. It is a user account for administrative
purposes, and typically has the highest access rights on the system. Usually, the root user account is
called root. However, in Unix and Linux, any account with user id 0 is a root account.

5. How can you determine the total memory used by LINUX?

Ans. $ free -m $ cat /proc/meminfo $ vmstat -s , top, htop

6. What are the different modes when using the vi editor?

Ans. entry mode and command mode. You use entry mode to type text into a file, while command
mode is used to type commands that perform specific vi functions

7. Differentiate between Cron and Anacron?

Ans. The major difference between cron and anacron is that cron works effectively on machines that
will run continuously while anacron is intended for machines that will be powered off in a day or
week

8. Explain the work of Ctrl+Alt+Del key combination on the Linux operating system?

Ans. To terminate an application task or to reboot the operating system (have it shut down and
restart itself).

9. Explain the features of a Stateless Linux server?


Ans. A stateless Linux server is a centralized server in which no state exists on the single
workstations

Features:

- It stores the prototypes of every machine

- It stores snapshots taken for those systems

- It stores home directories for those systems

- Uses LDAP containing information of all systems to assist in finding out which snapshot (of state)
should be running on which system.

10. Why is Linux considered more secure than other operating systems?

Ans. Linux is more secure than Windows because of the way it handles user permissions. The main
protection on Linux is that running an “.exe” is much harder. ... An advantage of Linux is that viruses
can be more easily removed

Windows

1. What do you understand by domains, forests and trees?

Ans. Active Directory (AD) is a directory service developed by Microsoft for Windows
domain . The forest, tree, and domain are the logical divisions in an Active Directory
network. A tree is a collection of one or more domains

2. What commands you will use to check TCP/IP configurations?

Ans. With [Link] you can easily view your TCP/IP settings
3. What is INODE?

Ans. File-system object attributes may include metadata (times of last change,
access, modification), as well as owner and permission data.

4. What is a Proxy Server?

Ans. In computer networking, a proxy server is a server application or appliance that


acts as an intermediary for requests from clients seeking

5. What is APIPA?
Ans. (Automatic Private IP Addressing) The Windows function that provides DHCP
autoconfiguration addressing.

6. Define Dora Procedure & its usage.

Ans. The DHCP operates based on the client–server model. When a computer or
other device connects to a network, the DHCP client software sends a broadcast
query requesting the necessary information.

7. What is the group nesting?

Ans. Introduction Using nesting, you can add a group as a member of another group.
You can nest groups to consolidate group management.

8. What Is Gpo?

Ans. A Group Policy Object (GPO) defines a number of settings—for example, the
screensaver to be used, the control panel options that are available to a user, and
the features available on the Start menu or in Internet Explorer

9. What is Sysvol folder?

Ans. In Microsoft Windows, the System Volume (Sysvol) is a shared directory that
stores the server copy of the domain's public files that must be shared for common
access and replication throughout a domain.

[Link] Is Dns Scavenging?


Ans. Scavenging is a feature that allows the cleanup and removal of stale resource
records in DNS zones. A stale resource record will be removed only if scavenging is
enabled on: The resource record.

Network:
1. What is a Network?

Ans. Network is defined as a set of devices connected to each other using a physical
transmission medium. For Example, A computer network is a group of computers
connected with each other to communicate and share information and resources
like hardware, data, and software

2. What are the layers in OSI Reference Models?


Ans. Physical, Data Link, Network, Transport, Session, Presentation, and Application .
3. What is the difference between Hub, Switch, and Router?

Ans. Hub: A hub is the least expensive, least intelligent, and least complicated of the
three. Its job is very simple: anything that comes in one port is sent out to the
others.
Switch: A switch does what a hub does, but more efficiently. By paying attention to
the traffic that comes across it, it learns which computers are connected to which
port.
Router: A router is the smartest and most complicated of the three. Routers come in
all shapes and sizes, from small, four-port broadband routers to large industrial-
strength devices that drive the internet itself

4. Explain TCP/IP Model

Ans. TCP/IP means Transmission Control Protocol and Internet Protocol. It is the
network model used in the current Internet architecture as well. ... These protocols
describe the movement of data between the source and destination or the internet.
TCP allows for transmission of information in both directions. This means that
computer systems that communicate over TCP can send and receive data at the
same time, similar to a telephone conversation. The protocol uses segments
(packets) as the basic units of data transmission.

5. What is HTTPs and what port does it use?

Ans. Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext


Transfer Protocol (HTTP). It is used for secure communication over a computer
network, and is widely used on the Internet.[1][2] In HTTPS, the communication
protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure
Sockets Layer (SSL).

6. What is meant by [Link] and localhost?

Ans. Localhost refers to the local computer that a program is running [Link] local
machine is defined as "localhost," which gives it an IP address of 127.0. 0.1. This is
considered a "loopback" address because the information sent to it is routed back to
the local machine.

7. What is NIC?
Ans. A network interface controller (NIC, also known as a network interface card,
network adapter, LAN adapter or physical network interface, and by similar terms) is
a computer hardware component that connects a computer to a computer network

8. What is Data Encapsulation?

Ans. Encapsulation is a process of combining data members and functions in a


single unit called class. This is to prevent the access to the data directly, the
access to them is provided through the functions of the class.

9. What are Ipconfig and Ifconfig?

Ans. Ipconfig : ipconfig stands for Internet Protocol Configuration. This command is
used to view all the current TCP/IP network configurations values of the computer.
ifconfig

ifconfig :stands for Interface Configuration. This command is the same as ipconfig,
and is used to view all the current TCP/IP network configurations values of the
computer

[Link] is SNMP?
Ans. Simple Network Management Protocol (SNMP) is a way for different devices on
a network to share information with one another. It allows devices to communicate
even if the devices are different hardware and run different software.

Deep Dive:

1. Walk me through a big problem or issue in your organization that you helped to solve. How did
you become aware of it? What information did you gather, what information was missing and
how did you fill the gaps? Did you do a post mortem analysis and if you did what did you learn?
Ans.

2. Tell me about a time when you linked two or more problems together and identified an
underlying issue? Were you able to find a solution?

You might also like