IBM
Interview Questions and Answers
Q1. How to user lock & unlock
The 'user lock' and 'user unlock' commands are used to lock and unlock user accounts in Linux.
To lock a user account, use the 'usermod' command with the '-L' option followed by the username.
Example: usermod -L username
To unlock a user account, use the 'usermod' command with the '-U' option followed by the username.
Example: usermod -U username
Q2. how to create lvm
To create LVM, first create physical volumes, then create a volume group, and finally create logical volumes.
Use pvcreate command to create physical volumes
Use vgcreate command to create volume group
Use lvcreate command to create logical volumes
Use lvextend command to extend logical volumes
Use lvreduce command to reduce logical volumes
Q3. What is lun in linux
LUN stands for Logical Unit Number. It is a unique identifier for a logical unit on a storage area network (SAN).
LUN is used to identify a specific disk or partition on a SAN.
It is used in conjunction with SCSI protocol to access storage devices.
LUNs can be created and managed using tools like LVM or multipath.
LUNs can be shared between multiple servers for high availability and load balancing.
Example: /dev/sdb is a LUN that can be mounted on a Linux system.
Q4. What is workload in linux
Workload in Linux refers to the amount of work being done by the system at a given time.
Workload can include tasks such as running processes, handling network requests, and managing system resources.
Monitoring workload is important for ensuring system performance and stability.
Tools like top, htop, and sar can be used to track and analyze workload.
High workload can lead to system slowdowns or crashes.
Balancing workload across multiple servers can help improve overall system e...read more
Q5. What linux kernel
The Linux kernel is the core component of the Linux operating system, responsible for managing hardware resources and providing essential services.
The Linux kernel is open-source and developed by a community of developers worldwide.
It is released under the GNU General Public License (GPL).
The kernel version can be checked using the 'uname -r' command.
Examples of popular Linux kernel versions include 2.6, 3.x, 4.x, and 5.x.
Q6. Describe about acl
ACL stands for Access Control List, a set of permissions attached to an object that specifies which users or system processes are granted access to that object.
ACLs are used to control access to files, directories, and other resources on a system.
They define who can read, write, or execute a file or directory.
ACLs can be set on a per-user or per-group basis, allowing for more granular control over access permissions.
Examples of ACL commands in Linux include setfacl and getfac...read more
Q7. Discribe about lvm
LVM (Logical Volume Manager) is a tool used in Linux to manage storage by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without downtime.
It provides features like snapshots, striping, mirroring, and thin provisioning.
Physical volumes are divided into extents, which can be allocated to logical volumes.
Commands like pvcreate, vgcreate, lvcreate are used to create physical volumes, volume groups, and logical volumes respectivel...read more
Q8. Booting procedure
The booting procedure is the process of starting up a computer system and loading the operating system into memory.
The BIOS (Basic Input/Output System) performs a Power-On Self Test (POST) to check hardware components.
The BIOS then looks for the bootloader, which is typically stored in the Master Boot Record (MBR) of the hard drive.
The bootloader loads the operating system kernel into memory and hands over control to it.
The kernel initializes the system and starts essential s...read more
More about working at IBM
Interview Process at null
Top Linux Administrator Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month