i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Approached by Company and was interviewed in Jun 2022. There was 1 interview round.
Possible reasons for all users including root unable to login.
Incorrect permissions on login files or directories
Corrupted or missing system files
Network connectivity issues
Authentication server down or misconfigured
System compromised by a hacker or malware
Answers to Linux Administrator L2 interview questions.
A problem ticket is a record of an issue or problem that needs to be resolved.
To recover shadow file, use a backup or recreate it using the passwd command.
The name of the event daemon varies depending on the Linux distribution.
inetd is a daemon that manages incoming network connections and launches the appropriate service.
I applied via Walk-in and was interviewed before Apr 2021. There were 2 interview rounds.
The is not aptitude. Its a online test focuses on Aptitude, Communication and programming
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
To troubleshoot a server that booted up with the old kernel after a new kernel update, check the bootloader configuration, verify the kernel installation, and review the update process.
Check the bootloader configuration to ensure it is pointing to the correct kernel version.
Verify the kernel installation to see if the new kernel was successfully installed.
Review the update process to identify any errors or issues that ...
Various commands to check CPU and Memory utilization in Linux server.
To check CPU utilization: top, mpstat, sar
To check Memory utilization: free, vmstat, sar -r
To add a new disk to the system using LVM, you need to initialize the disk, create a physical volume, extend the volume group, and finally extend the logical volume.
Initialize the disk using fdisk or parted command
Create a physical volume using pvcreate command
Extend the volume group using vgextend command
Extend the logical volume using lvextend command
Resize the filesystem using resize2fs or xfs_growfs command
Experienced Linux Administrator with a passion for troubleshooting and optimizing systems.
Over 5 years of experience managing Linux servers in a corporate environment
Skilled in shell scripting, server configuration, and system monitoring tools like Nagios
Strong problem-solving skills and ability to work well under pressure
Certified in Red Hat Enterprise Linux (RHCE)
Passionate about staying up-to-date with the latest te
Some additional skills I possess include scripting languages, troubleshooting abilities, and strong communication skills.
Proficiency in scripting languages such as Python, Bash, or Perl can be beneficial for automating tasks and improving efficiency.
Strong troubleshooting abilities are essential for quickly identifying and resolving issues that may arise in a Linux environment.
Effective communication skills are importa...
ACL stands for Access Control List, a set of permissions attached to an object that specifies which users or system processes are granted access to that object.
ACLs are used to control access to files, directories, and other resources on a system.
They define who can read, write, or execute a file or directory.
ACLs can be set on a per-user or per-group basis, allowing for more granular control over access permissions.
Ex...
LVM (Logical Volume Manager) is a tool used in Linux to manage storage by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without downtime.
It provides features like snapshots, striping, mirroring, and thin provisioning.
Physical volumes are divided into extents, which can be allocated to logical volumes.
Commands like pvcreate, vgcreate, lvcreate are used to create physic...
I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.
To schedule a cron job, use the crontab command to edit the cron table file.
Use the crontab -e command to open the cron table file for editing
Add a new line to the file with the schedule timing and the command to be executed
Save and exit the file to schedule the cron job
Sticky bit is a permission in Unix/Linux that allows only the owner of a file to delete or rename it.
Sticky bit is represented by a 't' in the permissions of a file or directory.
When the sticky bit is set on a directory, only the owner of a file within that directory can delete or rename the file.
Commonly used on directories like /tmp to prevent users from deleting each other's files.
Example: chmod +t directory_name
I applied via Referral and was interviewed before Sep 2022. There were 2 interview rounds.
To check Kernel and OS Version, change file permissions, view default permissions of files, locate user id and password file, find network configuration file, and filter keywords.
To check Kernel and OS Version: Use 'uname -a' command
To change file permissions: Use 'chmod' command followed by permission code and file name
Default permissions of few files: For example, /etc/passwd has 644 permissions
User id and password s...
LVM is Logical Volume Manager used for managing disk space, RAID is Redundant Array of Independent Disks for data protection, RHEL boot process involves BIOS, GRUB, kernel loading, and init process.
LVM allows for dynamic resizing of logical volumes without downtime.
RAID combines multiple disks for data redundancy or performance improvement.
RHEL boot process involves BIOS POST, GRUB bootloader, kernel loading, and init ...
I applied via LinkedIn and was interviewed in Jul 2022. There were 2 interview rounds.
Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.
Networking involves connecting devices to share resources such as files, printers, and internet access.
DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.
DNS cluster can be configured using tools like BIND an...
Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.
Backups are essential for data recovery in case of disasters or system failures
Ports are identified by numbers and are used to establish connections between devices
Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.
based on 2 reviews
Rating in categories
Consultant
55.1k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
50.8k
salaries
| ₹2.9 L/yr - ₹11.8 L/yr |
Senior Consultant
46k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
21k
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Engineer
20.1k
salaries
| ₹3.5 L/yr - ₹12.4 L/yr |
Wipro
Accenture
Cognizant
TCS