i
IBM
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
To check all information destroy pool & get back them, we can use ZFS snapshots and clones.
ZFS snapshots and clones can be used to recover data from a destroyed pool.
Snapshots capture the state of the pool at a specific point in time.
Clones can be created from snapshots and mounted as a separate file system.
Data can be copied from the clone to the new pool.
It is important to regularly create snapshots to ensure da...
To check data set & mount point info in human readable format, use the 'df' command.
Open the terminal and type 'df -h' to display the information in human-readable format.
The 'df' command shows the file system disk space usage, including the mount point and file system type.
The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.
You can als...
To scan a LUN and check the wwn number, use the 'multipath' command.
Run 'multipath -ll' to list all the available LUNs and their wwn numbers.
To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).
Use 'multipath -v3' for verbose output and troubleshooting.
Ensure that the necessary drivers and modules are loaded for the storage device.
Check the system ...
To know the current directory in Linux/Unix, use the 'pwd' command.
Type 'pwd' in the terminal and press enter.
The output will show the full path of the current directory.
Alternatively, you can use 'echo $PWD' to display the current directory path.
The command 'ls' can also be used to list the contents of the current directory.
What people are saying about IBM
To activate Boot Environment back up, use the beadm command.
Use the beadm command with the activate option followed by the name of the Boot Environment.
For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.
This will make the Boot Environment the default one at the next system reboot.
Saloris does not exist. Linux has 7 run levels.
Saloris is not a known operating system
Linux has 7 run levels numbered from 0 to 6
Each run level has a specific set of services and daemons that are started or stopped
Run level 0 is used for system halt
Run level 1 is used for single user mode
Run level 2 is used for multi-user mode without networking
Run level 3 is used for multi-user mode with networking
Run level 4 is ...
Patch management process involves identifying, testing, deploying, and verifying patches.
Identify vulnerabilities and available patches
Test patches in a non-production environment
Deploy patches to production systems
Verify successful patch installation and functionality
Monitor for any issues or new vulnerabilities
Repeat the process regularly
Use automation tools for efficiency
To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.
To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'
To detach a disk from a normal pool, use 'zpool detach poolname device'
To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'
To detach a disk from a mirror pool, use 'zpool detach poolname mirro...
The command to display the present working directory in Linux/Unix is 'pwd'.
The 'pwd' command stands for 'print working directory'.
It displays the absolute path of the current working directory.
The output of 'pwd' does not contain any trailing slashes.
To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.
Identify the faulty disk using disk monitoring tools or error messages
Remove the faulty disk from the pool using the appropriate command or tool
Physically replace the faulty disk with a new disk
Add the new disk to the pool using the appropriate command or tool
Verify the disk replacement and ensure data integrity
I applied via Walk-in and was interviewed in Mar 2022. There was 1 interview round.
To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.
Check if a backup of the file exists and restore it
If no backup is available, use data recovery tools like extundelete or scalpel
Stop writing to the disk immediately to prevent overwriting the deleted file
Consult with a professional if necessary
To switch a user in Linux or Unix, use the 'su' command followed by the username.
Open the terminal
Type 'su' followed by the username of the user you want to switch to
Enter the password of the user when prompted
You will be switched to the specified user
To check a user password status, use the 'passwd' command with the '-S' option followed by the username.
Open the terminal or command prompt.
Type 'passwd -S
The password status will be displayed, indicating if the password is locked, expired, or active.
To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.
Enforce strong password policies
Regularly audit user accounts and access permissions
Implement least privilege principle
Enable multi-factor authentication
Disable unnecessary user accounts
Regularly update and patch the system
Implement intrusion detection and preven...
Moving a file to another directory changes its location; the filename remains the same unless explicitly renamed.
The file retains its original name unless renamed during the move.
Example: Moving 'file.txt' from '/home/user/' to '/home/user/docs/' keeps it as 'file.txt'.
File permissions and ownership remain unchanged unless modified by the move command.
The file's metadata (like creation date) is preserved during the mov...
To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.
Use the 'getent group' command to list all the groups and their details
To check the users assigned to a specific group, use 'getent group
The output will display the group name, group ID, and a list of users assigned to the group
Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.
To modify a user's password, you can use the 'passwd' command followed by the username.
To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.
Make sure to have the necessary permissions to modify user information.
To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.
Use lsusb command to list USB devices connected to the computer
Use lspci command to list PCI devices connected to the computer
Use lshw command to list detailed hardware information
Physically check power cables and connections
Verify system configuration settings
Creating a PuTTY-friendly session involves configuring settings for better usability and security.
Set a session name in PuTTY for easy identification.
Adjust font size and type for better readability.
Enable 'Use system colors' for a familiar color scheme.
Configure SSH keys for secure authentication.
Save session settings to avoid reconfiguration.
To know the current directory in Linux/Unix, use the 'pwd' command.
Type 'pwd' in the terminal and press enter.
The output will show the full path of the current directory.
Alternatively, you can use 'echo $PWD' to display the current directory path.
The command 'ls' can also be used to list the contents of the current directory.
The command to display the present working directory in Linux/Unix is 'pwd'.
The 'pwd' command stands for 'print working directory'.
It displays the absolute path of the current working directory.
The output of 'pwd' does not contain any trailing slashes.
To scan a LUN and check the wwn number, use the 'multipath' command.
Run 'multipath -ll' to list all the available LUNs and their wwn numbers.
To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).
Use 'multipath -v3' for verbose output and troubleshooting.
Ensure that the necessary drivers and modules are loaded for the storage device.
Check the system logs ...
To check data set & mount point info in human readable format, use the 'df' command.
Open the terminal and type 'df -h' to display the information in human-readable format.
The 'df' command shows the file system disk space usage, including the mount point and file system type.
The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.
You can also use...
The #df -h command displays disk space usage in a human-readable format, showing available and used space on mounted filesystems.
The '-h' option stands for 'human-readable', which formats sizes in KB, MB, or GB.
Example output: Filesystem Size Used Avail Use% Mounted on
It helps system administrators monitor disk usage and plan for storage needs.
You can check specific filesystems by adding their mount point, e.g., ...
A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.
A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.
It requires at least two drives to create a mirror pool.
The data written to one drive is automatically duplicated to the other drive in real-time.
If one drive fails, the data can still be accessed from ...
To destroy a pool in Linux or Unix, use the 'zpool destroy' command.
Open the terminal or command prompt.
Use the 'zpool destroy' command followed by the name of the pool to be destroyed.
Confirm the destruction by typing 'y' or 'yes' when prompted.
The pool and all its associated data will be permanently deleted.
To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.
Identify the faulty disk using disk monitoring tools or error messages
Remove the faulty disk from the pool using the appropriate command or tool
Physically replace the faulty disk with a new disk
Add the new disk to the pool using the appropriate command or tool
Verify the disk replacement and ensure data integrity
To check all zpool status, use the 'zpool status' command.
Open the terminal or command prompt.
Type 'zpool status' and press Enter.
The command will display the status of all zpools on the system.
You can also use additional options like '-v' for more detailed information.
To check all disk information in Linux and Unix systems, you can use the 'df' command.
Use the 'df' command to display disk space usage information
Add the '-h' option to display sizes in a more human-readable format
Use the '-T' option to display the filesystem type
Use the '-i' option to display inode information
Combine options as needed to get the desired output
To check all information destroy pool & get back them, we can use ZFS snapshots and clones.
ZFS snapshots and clones can be used to recover data from a destroyed pool.
Snapshots capture the state of the pool at a specific point in time.
Clones can be created from snapshots and mounted as a separate file system.
Data can be copied from the clone to the new pool.
It is important to regularly create snapshots to ensure data ca...
To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.
To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'
To detach a disk from a normal pool, use 'zpool detach poolname device'
To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'
To detach a disk from a mirror pool, use 'zpool detach poolname mirror_dev...
Patch management process involves identifying, testing, deploying, and verifying patches.
Identify vulnerabilities and available patches
Test patches in a non-production environment
Deploy patches to production systems
Verify successful patch installation and functionality
Monitor for any issues or new vulnerabilities
Repeat the process regularly
Use automation tools for efficiency
Saloris does not exist. Linux has 7 run levels.
Saloris is not a known operating system
Linux has 7 run levels numbered from 0 to 6
Each run level has a specific set of services and daemons that are started or stopped
Run level 0 is used for system halt
Run level 1 is used for single user mode
Run level 2 is used for multi-user mode without networking
Run level 3 is used for multi-user mode with networking
Run level 4 is not u...
To reboot a system, use the 'reboot' command or the 'shutdown' command with the '-r' option.
Use the 'reboot' command to immediately reboot the system
Use the 'shutdown -r' command to schedule a reboot at a specific time
Ensure you have the necessary permissions to reboot the system
To activate Boot Environment back up, use the beadm command.
Use the beadm command with the activate option followed by the name of the Boot Environment.
For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.
This will make the Boot Environment the default one at the next system reboot.
I applied via Campus Placement and was interviewed before Sep 2019. There were 3 interview rounds.
I have chosen a variety of technologies depending on the project requirements.
I have worked with programming languages such as Java, Python, and C++
I have experience with databases such as MySQL and MongoDB
I have used cloud technologies like AWS and Azure
I have worked with DevOps tools like Jenkins and Docker
I have also used machine learning frameworks like TensorFlow and Keras
I chose myself in the programming language at a small scale and gradually increased it.
Started with basic syntax and gradually moved to more complex concepts
Practiced on small projects before moving to larger ones
Learned from online resources and collaborated with peers
Continuously updated skills and learned new languages as needed
A simple program to calculate the average of numbers in an array, demonstrating basic programming concepts.
Define a function to calculate the average.
Use an array to store numbers.
Iterate through the array to sum the numbers.
Divide the sum by the number of elements to get the average.
Example: For array [1, 2, 3, 4, 5], average = (1+2+3+4+5)/5 = 3.
I applied via Walk-in and was interviewed in Aug 2019. There were 3 interview rounds.
ArrayList is faster than Vector due to synchronization overhead in Vector.
ArrayList is not synchronized while Vector is.
ArrayList is faster as it does not need to acquire a lock before performing operations.
Vector is thread-safe while ArrayList is not.
Use Vector when thread safety is required, else use ArrayList for better performance.
Serialization is the process of converting an object into a stream of bytes to store or transmit it over a network.
Serialization is used to save the state of an object and recreate it later.
It is commonly used in network communication to transmit data between different systems.
Serialization can be done in different formats such as XML, JSON, or binary.
Examples of serialization libraries include Java Serialization, JSON...
Finally block is used in exception handling to execute code regardless of whether an exception is thrown or not.
Finally block is always executed after try and catch blocks.
It is used to release resources like file handles, database connections, etc.
It is also used to perform cleanup operations like closing streams, deleting temporary files, etc.
Finally block can be used without catch block but not vice versa.
Example: t...
JVM is a virtual machine that executes Java bytecode. It provides a runtime environment for Java programs.
JVM stands for Java Virtual Machine
It interprets compiled Java code into machine code
JVM provides memory management, garbage collection, and security
JVM is platform-independent, allowing Java programs to run on any system with a JVM installed
Examples of JVM implementations include Oracle's HotSpot and OpenJDK
Hashmap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Retrieving a value from a hashmap is typically an O(1) operation, but worst case can be O(n) if all keys map to the same in...
OOPs concepts are the fundamental principles of object-oriented programming.
Abstraction
Encapsulation
Inheritance
Polymorphism
I applied via Naukri.com and was interviewed in Sep 2019. There were 3 interview rounds.
Our application follows a microservices architecture with containerization using Docker and orchestration with Kubernetes.
Microservices architecture
Containerization with Docker
Orchestration with Kubernetes
What people are saying about IBM
I applied via Company Website and was interviewed before Jan 2021. There were 6 interview rounds.
I applied via Campus Placement and was interviewed before May 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2021. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Apr 2021. There were 2 interview rounds.
The test consist verbal, logical and quantitative sections and you need to score 50% more in all three.
Some of the top questions asked at the IBM Linux and Unix System Administrator interview -
based on 1 review
Rating in categories
Application Developer
12.6k
salaries
| ₹5.3 L/yr - ₹26.5 L/yr |
Software Engineer
5.9k
salaries
| ₹8.3 L/yr - ₹25 L/yr |
Software Developer
5.7k
salaries
| ₹13.4 L/yr - ₹39.5 L/yr |
Senior Software Engineer
5.3k
salaries
| ₹14.1 L/yr - ₹30 L/yr |
Advisory System Analyst
4.6k
salaries
| ₹13.6 L/yr - ₹23 L/yr |
Oracle
TCS
Cognizant
Accenture