Filter interviews by
I applied via Company Website and was interviewed before May 2022. There were 2 interview rounds.
tar is a command-line utility used for archiving files and directories into a single file.
Can be used to compress and decompress files
Can preserve file permissions and ownership
Can create and extract archives in various formats
Commonly used with gzip and bzip2 for compression
Example: tar -cvzf archive.tar.gz /path/to/directory
DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
DNS stands for Domain Name System
It translates domain names into IP addresses
It helps in resolving internet requests
Examples of DNS servers are Google DNS, OpenDNS, etc.
I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Mar 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2023. There was 1 interview round.
Communication skills problem
I applied via LinkedIn and was interviewed in Jul 2022. There were 2 interview rounds.
Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.
Networking involves connecting devices to share resources such as files, printers, and internet access.
DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.
DNS cluster can be configured using tools like BIND an...
Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.
Backups are essential for data recovery in case of disasters or system failures
Ports are identified by numbers and are used to establish connections between devices
Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.
posted on 5 Sep 2022
Regarding group discussion & system knowledge.
I applied via Recruitment Consultant and was interviewed in Apr 2021. There was 1 interview round.
LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.
LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.
It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.
LVM enables dynamic allocation of storage space, making it easier to add or remov...
Patching is the process of applying updates or fixes to software or systems to address vulnerabilities or improve functionality.
Patching involves downloading and installing updates provided by software vendors.
It helps to fix bugs, security vulnerabilities, and improve performance.
Patches can be applied to operating systems, applications, or firmware.
Regular patching is crucial to maintain system integrity and protect ...
LVM (Logical Volume Manager) is configured by creating physical volumes, volume groups, and logical volumes.
Create physical volumes using the 'pvcreate' command
Create volume groups using the 'vgcreate' command
Create logical volumes using the 'lvcreate' command
Format the logical volumes with a file system using the 'mkfs' command
Mount the logical volumes to desired mount points using the 'mount' command
Update the '/etc/
Decommission is the process of retiring a system or service, while recommission is the process of bringing it back into service.
Decommission involves shutting down and removing a system or service from operation.
Recommission involves restoring a decommissioned system or service back into operation.
Decommission and recommission are common processes in IT infrastructure management.
Examples include retiring an old server ...
NFS allows remote access to files and directories, providing centralized storage and easy sharing.
Enables sharing of files and directories across multiple systems
Reduces storage costs by centralizing data on a single server
Improves data availability and reliability through redundancy
Simplifies administration by allowing for centralized management
Examples: Sharing files between a web server and a database server, sharin
A user can be created in a single line command using the 'useradd' command in Linux.
Use the 'useradd' command followed by the username to create a user.
Specify additional options like home directory, shell, etc. if required.
Example: useradd john -m -s /bin/bash
To reset the root password, you can use the single-user mode or a bootable Linux distribution.
Boot into single-user mode by interrupting the boot process and appending 'init=/bin/bash' to the kernel command line.
Remount the root filesystem as read-write using the 'mount -o remount,rw /' command.
Change the root password using the 'passwd' command.
Alternatively, boot from a bootable Linux distribution like a Live CD or U...
Possible causes of user not able to login to an application
Incorrect username or password
Account locked or disabled
Expired password
Network connectivity issues
Application server down
Incorrect permissions or access rights
Firewall blocking access
Authentication server issues
Application configuration errors
To set the password for a newly created user in Linux, use the 'passwd' command followed by the username.
Open the terminal or SSH into the Linux system
Run the 'passwd' command followed by the username of the new user
Enter and confirm the new password when prompted
A cron job is a scheduled task that runs automatically at specific intervals on a Linux system.
Cron jobs are managed by the cron daemon, which reads a configuration file called crontab.
To write a cron job, you need to edit the crontab file using the 'crontab' command.
Each line in the crontab file represents a separate cron job and follows a specific format.
The format consists of five fields: minute, hour, day of month,...
An I node number is a unique identifier assigned to each file in a Unix-like file system.
I node number is also known as index node number.
It contains metadata about the file such as ownership, permissions, timestamps, etc.
It is used by the operating system to locate and access the file on the disk.
The command 'ls -i' can be used to display the I node number of a file.
based on 5 reviews
Rating in categories
Software Engineer
3.7k
salaries
| ₹1.9 L/yr - ₹9.2 L/yr |
Technical Lead
3.5k
salaries
| ₹6.9 L/yr - ₹25 L/yr |
Senior Software Engineer
2.8k
salaries
| ₹4 L/yr - ₹14.6 L/yr |
Lead Engineer
2.5k
salaries
| ₹4.4 L/yr - ₹13.4 L/yr |
Senior Analyst
2.2k
salaries
| ₹1.6 L/yr - ₹8 L/yr |
HCLTech
TCS
Tata Group
Wipro