Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by IBM Team. If you also belong to the team, you can get access from here

IBM Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

IBM Linux and Unix System Administrator Interview Questions and Answers

Updated 31 Aug 2022

25 Interview questions

A Linux and Unix System Administrator was asked
Q. How can we check all information, destroy a pool, and get it back?
Ans. 

To check all information destroy pool & get back them, we can use ZFS snapshots and clones.

  • ZFS snapshots and clones can be used to recover data from a destroyed pool.

  • Snapshots capture the state of the pool at a specific point in time.

  • Clones can be created from snapshots and mounted as a separate file system.

  • Data can be copied from the clone to the new pool.

  • It is important to regularly create snapshots to ensure da...

A Linux and Unix System Administrator was asked
Q. How do you check data set and mount point information in a human-readable format?
Ans. 

To check data set & mount point info in human readable format, use the 'df' command.

  • Open the terminal and type 'df -h' to display the information in human-readable format.

  • The 'df' command shows the file system disk space usage, including the mount point and file system type.

  • The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.

  • You can als...

Linux and Unix System Administrator Interview Questions Asked at Other Companies

asked in IBM
Q1. How do you check that all ports are connected to your computer an ... read more
asked in IBM
Q2. How do you check data set and mount point information in a human- ... read more
asked in IBM
Q3. How do you recover a deleted user file or the /etc/passwd file?
asked in IBM
Q4. How do you check the password status for any user?
asked in IBM
Q5. If a file is moved to another directory, what attributes change, ... read more
A Linux and Unix System Administrator was asked
Q. How do you scan a LUN and check the WWN number?
Ans. 

To scan a LUN and check the wwn number, use the 'multipath' command.

  • Run 'multipath -ll' to list all the available LUNs and their wwn numbers.

  • To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).

  • Use 'multipath -v3' for verbose output and troubleshooting.

  • Ensure that the necessary drivers and modules are loaded for the storage device.

  • Check the system ...

A Linux and Unix System Administrator was asked
Q. How do you determine the current working directory in Linux or Unix?
Ans. 

To know the current directory in Linux/Unix, use the 'pwd' command.

  • Type 'pwd' in the terminal and press enter.

  • The output will show the full path of the current directory.

  • Alternatively, you can use 'echo $PWD' to display the current directory path.

  • The command 'ls' can also be used to list the contents of the current directory.

What people are saying about IBM

View All
intellectualshinchan
Verified Icon
5d
ex -
TCS
Upcoming Coding Assessment with IBM
Hi All, I am having a Coding Assessment with IBM what should I prepare and from where I can prepare?
Got a question about IBM?
Ask anonymously on communities.
A Linux and Unix System Administrator was asked
Q. How do you activate a Boot Environment backup?
Ans. 

To activate Boot Environment back up, use the beadm command.

  • Use the beadm command with the activate option followed by the name of the Boot Environment.

  • For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.

  • This will make the Boot Environment the default one at the next system reboot.

A Linux and Unix System Administrator was asked
Q. How many run levels are in Solaris and Linux?
Ans. 

Saloris does not exist. Linux has 7 run levels.

  • Saloris is not a known operating system

  • Linux has 7 run levels numbered from 0 to 6

  • Each run level has a specific set of services and daemons that are started or stopped

  • Run level 0 is used for system halt

  • Run level 1 is used for single user mode

  • Run level 2 is used for multi-user mode without networking

  • Run level 3 is used for multi-user mode with networking

  • Run level 4 is ...

A Linux and Unix System Administrator was asked
Q. Describe the patch management process step by step.
Ans. 

Patch management process involves identifying, testing, deploying, and verifying patches.

  • Identify vulnerabilities and available patches

  • Test patches in a non-production environment

  • Deploy patches to production systems

  • Verify successful patch installation and functionality

  • Monitor for any issues or new vulnerabilities

  • Repeat the process regularly

  • Use automation tools for efficiency

Are these interview questions helpful?
A Linux and Unix System Administrator was asked
Q. How can we attach and detach a disk from a normal and mirrored pool?
Ans. 

To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.

  • To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'

  • To detach a disk from a normal pool, use 'zpool detach poolname device'

  • To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'

  • To detach a disk from a mirror pool, use 'zpool detach poolname mirro...

A Linux and Unix System Administrator was asked
Q. What is the purpose of the `pwd` command?
Ans. 

The command to display the present working directory in Linux/Unix is 'pwd'.

  • The 'pwd' command stands for 'print working directory'.

  • It displays the absolute path of the current working directory.

  • The output of 'pwd' does not contain any trailing slashes.

A Linux and Unix System Administrator was asked
Q. How do you replace a disk from a pool?
Ans. 

To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.

  • Identify the faulty disk using disk monitoring tools or error messages

  • Remove the faulty disk from the pool using the appropriate command or tool

  • Physically replace the faulty disk with a new disk

  • Add the new disk to the pool using the appropriate command or tool

  • Verify the disk replacement and ensure data integrity

IBM Linux and Unix System Administrator Interview Experiences

1 interview found

I applied via Walk-in and was interviewed in Mar 2022. There was 1 interview round.

Round 1 - HR 

(31 Questions)

  • Q1. How recover a user file deleted or file /etc/passwd ?
  • Ans. 

    To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.

    • Check if a backup of the file exists and restore it

    • If no backup is available, use data recovery tools like extundelete or scalpel

    • Stop writing to the disk immediately to prevent overwriting the deleted file

    • Consult with a professional if necessary

  • Answered by AI
  • Q2. How to switch a user ?
  • Ans. 

    To switch a user in Linux or Unix, use the 'su' command followed by the username.

    • Open the terminal

    • Type 'su' followed by the username of the user you want to switch to

    • Enter the password of the user when prompted

    • You will be switched to the specified user

  • Answered by AI
  • Q3. How to check a user password status for any users ?
  • Ans. 

    To check a user password status, use the 'passwd' command with the '-S' option followed by the username.

    • Open the terminal or command prompt.

    • Type 'passwd -S ' and press Enter.

    • The password status will be displayed, indicating if the password is locked, expired, or active.

  • Answered by AI
  • Q4. How to secure our system security user mangement ?
  • Ans. 

    To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.

    • Enforce strong password policies

    • Regularly audit user accounts and access permissions

    • Implement least privilege principle

    • Enable multi-factor authentication

    • Disable unnecessary user accounts

    • Regularly update and patch the system

    • Implement intrusion detection and preven...

  • Answered by AI
  • Q5. If one file move to another directory then what will change file name or other anything else ?
  • Ans. 

    Moving a file to another directory changes its location; the filename remains the same unless explicitly renamed.

    • The file retains its original name unless renamed during the move.

    • Example: Moving 'file.txt' from '/home/user/' to '/home/user/docs/' keeps it as 'file.txt'.

    • File permissions and ownership remain unchanged unless modified by the move command.

    • The file's metadata (like creation date) is preserved during the mov...

  • Answered by AI
  • Q6. How we can check groups lists & assinged users to them ?
  • Ans. 

    To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.

    • Use the 'getent group' command to list all the groups and their details

    • To check the users assigned to a specific group, use 'getent group '

    • The output will display the group name, group ID, and a list of users assigned to the group

  • Answered by AI
  • Q7. Can we modify user password and name ?
  • Ans. 

    Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.

    • To modify a user's password, you can use the 'passwd' command followed by the username.

    • To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.

    • Make sure to have the necessary permissions to modify user information.

  • Answered by AI
  • Q8. How to check that all port are connected to your computers and power supply or system configuration ?
  • Ans. 

    To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.

    • Use lsusb command to list USB devices connected to the computer

    • Use lspci command to list PCI devices connected to the computer

    • Use lshw command to list detailed hardware information

    • Physically check power cables and connections

    • Verify system configuration settings

  • Answered by AI
  • Q9. How we can putty frienly session ?
  • Ans. 

    Creating a PuTTY-friendly session involves configuring settings for better usability and security.

    • Set a session name in PuTTY for easy identification.

    • Adjust font size and type for better readability.

    • Enable 'Use system colors' for a familiar color scheme.

    • Configure SSH keys for secure authentication.

    • Save session settings to avoid reconfiguration.

  • Answered by AI
  • Q10. How to know that in which directory we are sitting presently ?
  • Ans. 

    To know the current directory in Linux/Unix, use the 'pwd' command.

    • Type 'pwd' in the terminal and press enter.

    • The output will show the full path of the current directory.

    • Alternatively, you can use 'echo $PWD' to display the current directory path.

    • The command 'ls' can also be used to list the contents of the current directory.

  • Answered by AI
  • Q11. #pwd for present working direcory.
  • Ans. 

    The command to display the present working directory in Linux/Unix is 'pwd'.

    • The 'pwd' command stands for 'print working directory'.

    • It displays the absolute path of the current working directory.

    • The output of 'pwd' does not contain any trailing slashes.

  • Answered by AI
  • Q12. How we scan a LUN & check the wwn number ?
  • Ans. 

    To scan a LUN and check the wwn number, use the 'multipath' command.

    • Run 'multipath -ll' to list all the available LUNs and their wwn numbers.

    • To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).

    • Use 'multipath -v3' for verbose output and troubleshooting.

    • Ensure that the necessary drivers and modules are loaded for the storage device.

    • Check the system logs ...

  • Answered by AI
  • Q13. #devfsadm & #fcinfo hba-port are used for this.
  • Q14. How to check data set & mount point information in human readable format ?
  • Ans. 

    To check data set & mount point info in human readable format, use the 'df' command.

    • Open the terminal and type 'df -h' to display the information in human-readable format.

    • The 'df' command shows the file system disk space usage, including the mount point and file system type.

    • The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.

    • You can also use...

  • Answered by AI
  • Q15. By using #df -h command . meaning disk free.
  • Ans. 

    The #df -h command displays disk space usage in a human-readable format, showing available and used space on mounted filesystems.

    • The '-h' option stands for 'human-readable', which formats sizes in KB, MB, or GB.

    • Example output: Filesystem Size Used Avail Use% Mounted on

    • It helps system administrators monitor disk usage and plan for storage needs.

    • You can check specific filesystems by adding their mount point, e.g., ...

  • Answered by AI
  • Q16. How can we create a mirror pool & what does it require for ?
  • Ans. 

    A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.

    • A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.

    • It requires at least two drives to create a mirror pool.

    • The data written to one drive is automatically duplicated to the other drive in real-time.

    • If one drive fails, the data can still be accessed from ...

  • Answered by AI
  • Q17. How to destroy a pool ?
  • Ans. 

    To destroy a pool in Linux or Unix, use the 'zpool destroy' command.

    • Open the terminal or command prompt.

    • Use the 'zpool destroy' command followed by the name of the pool to be destroyed.

    • Confirm the destruction by typing 'y' or 'yes' when prompted.

    • The pool and all its associated data will be permanently deleted.

  • Answered by AI
  • Q18. How to replace a disk from pool ?
  • Ans. 

    To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.

    • Identify the faulty disk using disk monitoring tools or error messages

    • Remove the faulty disk from the pool using the appropriate command or tool

    • Physically replace the faulty disk with a new disk

    • Add the new disk to the pool using the appropriate command or tool

    • Verify the disk replacement and ensure data integrity

  • Answered by AI
  • Q19. How we check all zpool status ?
  • Ans. 

    To check all zpool status, use the 'zpool status' command.

    • Open the terminal or command prompt.

    • Type 'zpool status' and press Enter.

    • The command will display the status of all zpools on the system.

    • You can also use additional options like '-v' for more detailed information.

  • Answered by AI
  • Q20. How can we check all disk information ?
  • Ans. 

    To check all disk information in Linux and Unix systems, you can use the 'df' command.

    • Use the 'df' command to display disk space usage information

    • Add the '-h' option to display sizes in a more human-readable format

    • Use the '-T' option to display the filesystem type

    • Use the '-i' option to display inode information

    • Combine options as needed to get the desired output

  • Answered by AI
  • Q21. How we can check all information destroy pool & get back them ?
  • Ans. 

    To check all information destroy pool & get back them, we can use ZFS snapshots and clones.

    • ZFS snapshots and clones can be used to recover data from a destroyed pool.

    • Snapshots capture the state of the pool at a specific point in time.

    • Clones can be created from snapshots and mounted as a separate file system.

    • Data can be copied from the clone to the new pool.

    • It is important to regularly create snapshots to ensure data ca...

  • Answered by AI
  • Q22. For this we require 2 commands , first #zpool import -D to get all information about destroys pools and to get back them we use #zpool import -D pool name .
  • Q23. How can we attach &detach disk from a normal and mirror pool ?
  • Ans. 

    To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.

    • To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'

    • To detach a disk from a normal pool, use 'zpool detach poolname device'

    • To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'

    • To detach a disk from a mirror pool, use 'zpool detach poolname mirror_dev...

  • Answered by AI
  • Q24. #zpool attach poolname old disk new disk & # zpool detach poolname diskid both command are required for particular action.
  • Q25. Tell all process of patch management by stepwise ?
  • Ans. 

    Patch management process involves identifying, testing, deploying, and verifying patches.

    • Identify vulnerabilities and available patches

    • Test patches in a non-production environment

    • Deploy patches to production systems

    • Verify successful patch installation and functionality

    • Monitor for any issues or new vulnerabilities

    • Repeat the process regularly

    • Use automation tools for efficiency

  • Answered by AI
  • Q26. First of all we require two pkg download from oracle support or Linux support - base repo and SRU in our system & we will require a software winscp for copy pkg desktop to server . we will open winscp and...
  • Q27. How many run level are in Saloris and Linux
  • Ans. 

    Saloris does not exist. Linux has 7 run levels.

    • Saloris is not a known operating system

    • Linux has 7 run levels numbered from 0 to 6

    • Each run level has a specific set of services and daemons that are started or stopped

    • Run level 0 is used for system halt

    • Run level 1 is used for single user mode

    • Run level 2 is used for multi-user mode without networking

    • Run level 3 is used for multi-user mode with networking

    • Run level 4 is not u...

  • Answered by AI
  • Q28. In Saloris 5 & Linux 6 have run level.
  • Q29. How we reboot system ?
  • Ans. 

    To reboot a system, use the 'reboot' command or the 'shutdown' command with the '-r' option.

    • Use the 'reboot' command to immediately reboot the system

    • Use the 'shutdown -r' command to schedule a reboot at a specific time

    • Ensure you have the necessary permissions to reboot the system

  • Answered by AI
  • Q30. How to activate Boot Environment back up ?
  • Ans. 

    To activate Boot Environment back up, use the beadm command.

    • Use the beadm command with the activate option followed by the name of the Boot Environment.

    • For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.

    • This will make the Boot Environment the default one at the next system reboot.

  • Answered by AI
  • Q31. We use for this action #beadm activate bename

Interview Preparation Tips

Topics to prepare for IBM Linux and Unix System Administrator interview:
  • LDOM
  • zfs snapshot
  • crontab
  • Service management
  • Process Management
  • NFS
Interview preparation tips for other job seekers - best experience i have done with this particular session . i covered all necessary question in this ambition box and more topic have remained that are useful like

Skills evaluated in this interview

Interview questions from similar companies

I applied via Campus Placement and was interviewed before Sep 2019. There were 3 interview rounds.

Interview Questionnaire 

7 Questions

  • Q1. Tell me about yourself?
  • Q2. Why did you choose this job role?
  • Q3. What kind of technologies did you choose in development?
  • Ans. 

    I have chosen a variety of technologies depending on the project requirements.

    • I have worked with programming languages such as Java, Python, and C++

    • I have experience with databases such as MySQL and MongoDB

    • I have used cloud technologies like AWS and Azure

    • I have worked with DevOps tools like Jenkins and Docker

    • I have also used machine learning frameworks like TensorFlow and Keras

  • Answered by AI
  • Q4. Which programming languages you are familiar with?
  • Q5. At what scale did you choose yourself in the programming language?
  • Ans. 

    I chose myself in the programming language at a small scale and gradually increased it.

    • Started with basic syntax and gradually moved to more complex concepts

    • Practiced on small projects before moving to larger ones

    • Learned from online resources and collaborated with peers

    • Continuously updated skills and learned new languages as needed

  • Answered by AI
  • Q6. Can you write some program you opt which you think it is at the average level in programming
  • Ans. 

    A simple program to calculate the average of numbers in an array, demonstrating basic programming concepts.

    • Define a function to calculate the average.

    • Use an array to store numbers.

    • Iterate through the array to sum the numbers.

    • Divide the sum by the number of elements to get the average.

    • Example: For array [1, 2, 3, 4, 5], average = (1+2+3+4+5)/5 = 3.

  • Answered by AI
  • Q7. At what place you can be after 5years?

Interview Preparation Tips

Interview preparation tips for other job seekers - As I was going to face my first interview in my Engineering life it was been a small tension in facing such a big MNC. Since I was been advised by my faculty to face the interview bravely, it was a bit shy to make this interview successful.

After I was entering my interviewer he asked me to take some water and cool down. I got some confidence and I decided to crack the interview at any cost, He started with asking about my family details, educational background, Languages I was known with.

At the end of the interview, he advised me to be more confident in every situation I am going to face. At that time I was bit encouraged by his words and I answered confidently that I will be a smart part of the company which has given me a wonderful opportunity to kick start my career.

Linux and Unix System Administrator Interview Questions Asked at Other Companies

asked in IBM
Q1. How do you check that all ports are connected to your computer an ... read more
asked in IBM
Q2. How do you check data set and mount point information in a human- ... read more
asked in IBM
Q3. How do you recover a deleted user file or the /etc/passwd file?
asked in IBM
Q4. How do you check the password status for any user?
asked in IBM
Q5. If a file is moved to another directory, what attributes change, ... read more

I applied via Walk-in and was interviewed in Aug 2019. There were 3 interview rounds.

Interview Questionnaire 

6 Questions

  • Q1. Difference between performance of arraylist and vector.
  • Ans. 

    ArrayList is faster than Vector due to synchronization overhead in Vector.

    • ArrayList is not synchronized while Vector is.

    • ArrayList is faster as it does not need to acquire a lock before performing operations.

    • Vector is thread-safe while ArrayList is not.

    • Use Vector when thread safety is required, else use ArrayList for better performance.

  • Answered by AI
  • Q2. What do you mean by serialization?
  • Ans. 

    Serialization is the process of converting an object into a stream of bytes to store or transmit it over a network.

    • Serialization is used to save the state of an object and recreate it later.

    • It is commonly used in network communication to transmit data between different systems.

    • Serialization can be done in different formats such as XML, JSON, or binary.

    • Examples of serialization libraries include Java Serialization, JSON...

  • Answered by AI
  • Q3. What does finally block do?
  • Ans. 

    Finally block is used in exception handling to execute code regardless of whether an exception is thrown or not.

    • Finally block is always executed after try and catch blocks.

    • It is used to release resources like file handles, database connections, etc.

    • It is also used to perform cleanup operations like closing streams, deleting temporary files, etc.

    • Finally block can be used without catch block but not vice versa.

    • Example: t...

  • Answered by AI
  • Q4. How does JVM work?
  • Ans. 

    JVM is a virtual machine that executes Java bytecode. It provides a runtime environment for Java programs.

    • JVM stands for Java Virtual Machine

    • It interprets compiled Java code into machine code

    • JVM provides memory management, garbage collection, and security

    • JVM is platform-independent, allowing Java programs to run on any system with a JVM installed

    • Examples of JVM implementations include Oracle's HotSpot and OpenJDK

  • Answered by AI
  • Q5. How hashmap works?
  • Ans. 

    Hashmap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values.

    • Hashmap uses a hash function to map keys to indices in an array.

    • Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.

    • Retrieving a value from a hashmap is typically an O(1) operation, but worst case can be O(n) if all keys map to the same in...

  • Answered by AI
  • Q6. Define oops concepts.
  • Ans. 

    OOPs concepts are the fundamental principles of object-oriented programming.

    • Abstraction

    • Encapsulation

    • Inheritance

    • Polymorphism

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be specific about your logic

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Sep 2019. There were 3 interview rounds.

Interview Questionnaire 

4 Questions

  • Q1. Architecture of your application
  • Ans. 

    Our application follows a microservices architecture with containerization using Docker and orchestration with Kubernetes.

    • Microservices architecture

    • Containerization with Docker

    • Orchestration with Kubernetes

  • Answered by AI
  • Q2. Core Java interview questions
  • Q3. Spring Mvc questions
  • Q4. Sql And Hibernate questions

Interview Preparation Tips

Interview preparation tips for other job seekers - The process took 4 hours.easy and happy with it.

Skills evaluated in this interview

What people are saying about IBM

View All
intellectualshinchan
Verified Icon
5d
ex -
TCS
Upcoming Coding Assessment with IBM
Hi All, I am having a Coding Assessment with IBM what should I prepare and from where I can prepare?
Got a question about IBM?
Ask anonymously on communities.

I applied via Company Website and was interviewed before Jan 2021. There were 6 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. There were so many questions, as I started answering most of the question in detailed manner.

Interview Preparation Tips

Interview preparation tips for other job seekers - The harder you train, the lesser you bleed.

Interview Questionnaire 

1 Question

  • Q1. Based on the experience they will ask questions.

Interview Preparation Tips

Interview preparation tips for other job seekers - Be calm composed and don't panic and if you dont know say that you don't know .But don't repeat it for every questiom

Interview Questionnaire 

1 Question

  • Q1. .net, coding

Interview Preparation Tips

Interview preparation tips for other job seekers - There was multiple mcq related questions regarding C#,angular.
Are these interview questions helpful?

I applied via Campus Placement and was interviewed before May 2021. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Questions relating to front end web designing(HTML, CSS, JS, Jquery, Ajax, SQL) which was one of my UG projects and Data structures
Round 3 - HR 

(3 Questions)

  • Q1. Mechanical Engineering concepts (as my UG is BE-Mech)
  • Q2. What you know about the company and key persons in the company?
  • Q3. Live walk through of website created by me

Interview Preparation Tips

Topics to prepare for TCS System Engineer interview:
  • datastructures
  • Programming
  • SQL
Interview preparation tips for other job seekers - This interview process is part of my campus placement. Some of my friends had an aptitude test as well to clear the initial screening process.
My suggestion would be work on an industry relevant project during UG, and get strong in the tools and technologies used in that project. Strong knowledge in any programming language, Data structures and SQL improve your chances of landing in your first job.

I applied via Campus Placement and was interviewed in Jan 2021. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Technical Interview - Questions Were related to my projects and some Basics of Programming and Software Testing

Interview Preparation Tips

Interview preparation tips for other job seekers - If you are Confident about you , its enough to crack the Interview

I applied via Campus Placement and was interviewed before Apr 2021. There were 2 interview rounds.

Round 1 - Aptitude Test 

The test consist verbal, logical and quantitative sections and you need to score 50% more in all three.

Round 2 - Technical 

(1 Question)

  • Q1. They ask you everything written on your resume and some basics of DBMS, data structures

Interview Preparation Tips

Interview preparation tips for other job seekers - Be calm, be yourself, and be honest while answering

IBM Interview FAQs

How many rounds are there in IBM Linux and Unix System Administrator interview?
IBM interview process usually has 1 rounds. The most common rounds in the IBM interview process are HR.
What are the top questions asked in IBM Linux and Unix System Administrator interview?

Some of the top questions asked at the IBM Linux and Unix System Administrator interview -

  1. How to check that all port are connected to your computers and power supply or ...read more
  2. How to check data set & mount point information in human readable forma...read more
  3. How recover a user file deleted or file /etc/passw...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.6
 • 11.1k Interviews
Accenture Interview Questions
3.7
 • 8.7k Interviews
Infosys Interview Questions
3.6
 • 7.9k Interviews
Wipro Interview Questions
3.7
 • 6.1k Interviews
Cognizant Interview Questions
3.7
 • 5.9k Interviews
Capgemini Interview Questions
3.7
 • 5.1k Interviews
Tech Mahindra Interview Questions
3.5
 • 4.1k Interviews
HCLTech Interview Questions
3.5
 • 4.1k Interviews
Genpact Interview Questions
3.7
 • 3.4k Interviews
DXC Technology Interview Questions
3.6
 • 842 Interviews
View all
IBM Linux and Unix System Administrator Salary
based on 4 salaries
₹3 L/yr - ₹7.9 L/yr
17% less than the average Linux and Unix System Administrator Salary in India
View more details

IBM Linux and Unix System Administrator Reviews and Ratings

based on 1 review

4.0/5

Rating in categories

4.0

Skill development

4.0

Work-life balance

3.0

Salary

4.0

Job security

4.0

Company culture

3.0

Promotions

4.0

Work satisfaction

Explore 1 Review and Rating
Application Developer
12.6k salaries
unlock blur

₹5.3 L/yr - ₹26.5 L/yr

Software Engineer
5.9k salaries
unlock blur

₹8.3 L/yr - ₹25 L/yr

Software Developer
5.7k salaries
unlock blur

₹13.4 L/yr - ₹39.5 L/yr

Senior Software Engineer
5.3k salaries
unlock blur

₹14.1 L/yr - ₹30 L/yr

Advisory System Analyst
4.6k salaries
unlock blur

₹13.6 L/yr - ₹23 L/yr

Explore more salaries
Compare IBM with

Oracle

3.7
Compare

TCS

3.6
Compare

Cognizant

3.7
Compare

Accenture

3.7
Compare
write
Share an Interview