i
LTIMindtree
Filter interviews by
I am a dedicated Linux Administrator with 5 years of experience in managing servers, troubleshooting issues, and implementing security measures.
5 years of experience in Linux administration
Proficient in managing servers and troubleshooting issues
Skilled in implementing security measures
Familiar with scripting languages like Bash and Python
I am looking for a competitive salary based on my experience, skills, and the responsibilities of the role.
Research the average salary range for Linux Administrators in your area
Consider your level of experience and any specialized skills you bring to the role
Be prepared to negotiate based on the responsibilities and expectations of the position
I applied via Indeed and was interviewed in Dec 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
To troubleshoot a server that booted up with the old kernel after a new kernel update, check the bootloader configuration, verify the kernel installation, and review the update process.
Check the bootloader configuration to ensure it is pointing to the correct kernel version.
Verify the kernel installation to see if the new kernel was successfully installed.
Review the update process to identify any errors or issues that ...
Various commands to check CPU and Memory utilization in Linux server.
To check CPU utilization: top, mpstat, sar
To check Memory utilization: free, vmstat, sar -r
To add a new disk to the system using LVM, you need to initialize the disk, create a physical volume, extend the volume group, and finally extend the logical volume.
Initialize the disk using fdisk or parted command
Create a physical volume using pvcreate command
Extend the volume group using vgextend command
Extend the logical volume using lvextend command
Resize the filesystem using resize2fs or xfs_growfs command
Experienced Linux Administrator with a passion for troubleshooting and optimizing systems.
Over 5 years of experience managing Linux servers in a corporate environment
Skilled in shell scripting, server configuration, and system monitoring tools like Nagios
Strong problem-solving skills and ability to work well under pressure
Certified in Red Hat Enterprise Linux (RHCE)
Passionate about staying up-to-date with the latest te
Some additional skills I possess include scripting languages, troubleshooting abilities, and strong communication skills.
Proficiency in scripting languages such as Python, Bash, or Perl can be beneficial for automating tasks and improving efficiency.
Strong troubleshooting abilities are essential for quickly identifying and resolving issues that may arise in a Linux environment.
Effective communication skills are importa...
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
Grant SFTP access exclusively to user David
Create a new group specifically for David, e.g. 'davidgroup'
Set the ChrootDirectory in the SSH configuration file to restrict David's access to a specific directory
Add David to the 'davidgroup' and configure the necessary permissions for SFTP access
To lock a user out after 6 unsuccessful password attempts for 30 minutes, modify the PAM configuration file.
Edit the PAM configuration file (/etc/pam.d/common-auth) to include the 'pam_tally2' module.
Set the 'deny' option in the 'pam_tally2' module to lock the user out after 6 failed attempts.
Specify the 'unlock_time' option in the 'pam_tally2' module to set the duration of the lockout period to 30 minutes.
Example: aut
I applied via Approached by Company
NFS can be configured by setting up the NFS server, exporting directories, and configuring client access.
Install NFS server package on the server
Edit /etc/exports file to specify directories to be shared
Restart NFS service to apply changes
Configure client access by mounting NFS shares on client machines
Patching involves applying updates to software to fix vulnerabilities and improve performance.
Identify the software that needs to be patched
Download the necessary patches from the vendor's website
Test the patches in a non-production environment before applying them to production systems
Schedule a maintenance window to apply the patches
Apply the patches using tools like yum, apt-get, or Windows Update
Verify that the pat...
ACL stands for Access Control List, a set of permissions attached to an object that specifies which users or system processes are granted access to that object.
ACLs are used to control access to files, directories, and other resources on a system.
They define who can read, write, or execute a file or directory.
ACLs can be set on a per-user or per-group basis, allowing for more granular control over access permissions.
Ex...
LVM (Logical Volume Manager) is a tool used in Linux to manage storage by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without downtime.
It provides features like snapshots, striping, mirroring, and thin provisioning.
Physical volumes are divided into extents, which can be allocated to logical volumes.
Commands like pvcreate, vgcreate, lvcreate are used to create physic...
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There was 1 interview round.
The port number for DHCP is 67 (server) and 68 (client).
DHCP server uses port 67 for incoming requests from clients
DHCP client uses port 68 for outgoing requests to servers
To schedule a cron job, use the crontab command to edit the cron table file.
Use the crontab -e command to open the cron table file for editing
Add a new line to the file with the schedule timing and the command to be executed
Save and exit the file to schedule the cron job
Sticky bit is a permission in Unix/Linux that allows only the owner of a file to delete or rename it.
Sticky bit is represented by a 't' in the permissions of a file or directory.
When the sticky bit is set on a directory, only the owner of a file within that directory can delete or rename the file.
Commonly used on directories like /tmp to prevent users from deleting each other's files.
Example: chmod +t directory_name
File system integrity can be checked using fsck command in Linux.
Use fsck command to check and repair file system errors
Run fsck on unmounted file systems for accurate results
Use options like -y to automatically repair errors without user intervention
based on 1 interview
Interview experience
based on 7 reviews
Rating in categories
Senior Software Engineer
21.3k
salaries
| ₹5.1 L/yr - ₹18.7 L/yr |
Software Engineer
16.2k
salaries
| ₹2 L/yr - ₹10 L/yr |
Module Lead
6.7k
salaries
| ₹7 L/yr - ₹25.5 L/yr |
Technical Lead
6.4k
salaries
| ₹9.4 L/yr - ₹36 L/yr |
Senior Engineer
4.4k
salaries
| ₹4.2 L/yr - ₹16.3 L/yr |
Cognizant
Capgemini
Accenture
TCS