Filter interviews by
6.7 has improved security, performance, and scalability compared to 6.5.
6.7 has enhanced support for virtualization technologies like VMware vSphere 6.7 and Microsoft Hyper-V 2016.
6.7 has improved security features like TPM 2.0 support, secure boot support, and support for virtual TPM.
6.7 has better performance with faster boot times, improved vCenter Server Appliance management, and increased vSAN performance.
6.7 has ...
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure and encrypted connection between the user's device and the private network
It helps in protecting sensitive data from unauthorized access
VPN can be used to access resources remotely, bypass geo-restrictions, and enhance privacy online
Examples of VPN services include NordVPN, ExpressV
HTTP is a protocol used for transferring data over the internet, while HTTPS is a secure version of HTTP that encrypts data.
HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet
HTTPS is a secure version of HTTP that uses encryption to protect data
HTTPS is commonly used for secure transactions such as online banking or shopping
HTTP operates on port 80, while HTTPS operates on po
The port number of UDP is 17.
UDP uses port number 17 for communication.
UDP is a connectionless protocol, so it does not require a specific port number for each connection.
Port number 17 is commonly used for the Daytime Protocol.
UDP port numbers range from 0 to 65535.
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
Permissions applied on types determine the level of access and actions that can be performed on them.
Permissions can be applied to various types such as files, folders, databases, etc.
Examples of permissions include read, write, execute, delete, modify, etc.
Permissions can be granted to individual users or groups of users.
Permissions can be inherited from parent objects or explicitly set on individual objects.
A file is a collection of data or information that is stored on a computer or other digital device.
A file can contain text, images, audio, video, or any other type of digital data.
Files are organized into directories or folders for easy access and management.
Files can be created, edited, moved, copied, and deleted by users or programs.
Examples of files include documents, spreadsheets, presentations, photos, music, and
I applied via Referral and was interviewed in Mar 2022. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Apr 2022. There were 2 interview rounds.
I applied via Company Website and was interviewed in Dec 2021. There were 5 interview rounds.
To create a Repository file/YUM client Configuration, follow these steps:
Create a new repository file in the /etc/yum.repos.d/ directory
Specify the repository name, base URL, enabled status, and other options in the file
Save the file and exit the editor
Run 'yum clean all' command to clear the cache
Run 'yum repolist' command to verify the repository configuration
Restarting a service stops and then starts it again, while reloading a service refreshes its configuration without stopping it.
Restarting a service completely stops it and then starts it again
Reloading a service refreshes its configuration without stopping it
Restarting a service is useful when there are critical changes or issues
Reloading a service is useful when only the configuration needs to be updated
To recover root password, boot into single-user mode and reset the password.
Reboot the system and press 'e' at the GRUB menu to edit the boot options.
Add 'single' or 'init=/bin/bash' to the end of the 'linux' line and press F10 to boot.
Run 'passwd' command to reset the root password.
Reboot the system and login with the new password.
To check available physical volumes, volume groups, and logical volumes, you can use the 'pvdisplay', 'vgdisplay', and 'lvdisplay' commands.
Use 'pvdisplay' command to display information about physical volumes.
Use 'vgdisplay' command to display information about volume groups.
Use 'lvdisplay' command to display information about logical volumes.
These commands provide detailed information about the available physical vol...
To extend LVM, follow these steps: 1. Create a new partition. 2. Initialize the partition as a physical volume. 3. Add the physical volume to the volume group. 4. Extend the logical volume. 5. Resize the file system.
Create a new partition using tools like fdisk or parted.
Initialize the partition as a physical volume using the pvcreate command.
Add the physical volume to the volume group using the vgextend command.
Extend...
based on 3 reviews
Rating in categories
System Administrator
85
salaries
| ₹3.8 L/yr - ₹6.5 L/yr |
Vmware Administrator
12
salaries
| ₹4.5 L/yr - ₹6.5 L/yr |
Sharepoint Developers
11
salaries
| ₹5 L/yr - ₹8.5 L/yr |
Software Engineer
10
salaries
| ₹4.5 L/yr - ₹7 L/yr |
Devops Engineer
10
salaries
| ₹4.5 L/yr - ₹10.3 L/yr |
Accenture
Jio
IBM
Genpact