Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by TCS Team. If you also belong to the team, you can get access from here

TCS Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 86.4k Reviews

Filter interviews by

TCS Linux and Unix System Administrator Interview Questions and Answers

Be the first one to contribute and help others!

Interview questions from similar companies

I applied via Walk-in and was interviewed in Mar 2022. There was 1 interview round.

Round 1 - HR 

(31 Questions)

  • Q1. How recover a user file deleted or file /etc/passwd ?
  • Ans. 

    To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.

    • Check if a backup of the file exists and restore it

    • If no backup is available, use data recovery tools like extundelete or scalpel

    • Stop writing to the disk immediately to prevent overwriting the deleted file

    • Consult with a professional if necessary

  • Answered by AI
  • Q2. How to switch a user ?
  • Ans. 

    To switch a user in Linux or Unix, use the 'su' command followed by the username.

    • Open the terminal

    • Type 'su' followed by the username of the user you want to switch to

    • Enter the password of the user when prompted

    • You will be switched to the specified user

  • Answered by AI
  • Q3. How to check a user password status for any users ?
  • Ans. 

    To check a user password status, use the 'passwd' command with the '-S' option followed by the username.

    • Open the terminal or command prompt.

    • Type 'passwd -S ' and press Enter.

    • The password status will be displayed, indicating if the password is locked, expired, or active.

Answered by AI
  • Q4. How to secure our system security user mangement ?
  • Ans. 

    To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.

    • Enforce strong password policies

    • Regularly audit user accounts and access permissions

    • Implement least privilege principle

    • Enable multi-factor authentication

    • Disable unnecessary user accounts

    • Regularly update and patch the system

    • Implement intrusion detection and preven...

  • Answered by AI
  • Q5. If one file move to another directory then what will change file name or other anything else ?
  • Ans. Inodes number change of file , not change name or anything else . we can check it by #stat file name command .
  • Answered Anonymously
  • Q6. How we can check groups lists & assinged users to them ?
  • Ans. 

    To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.

    • Use the 'getent group' command to list all the groups and their details

    • To check the users assigned to a specific group, use 'getent group '

    • The output will display the group name, group ID, and a list of users assigned to the group

  • Answered by AI
  • Q7. Can we modify user password and name ?
  • Ans. 

    Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.

    • To modify a user's password, you can use the 'passwd' command followed by the username.

    • To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.

    • Make sure to have the necessary permissions to modify user information.

  • Answered by AI
  • Q8. How to check that all port are connected to your computers and power supply or system configuration ?
  • Ans. 

    To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.

    • Use lsusb command to list USB devices connected to the computer

    • Use lspci command to list PCI devices connected to the computer

    • Use lshw command to list detailed hardware information

    • Physically check power cables and connections

    • Verify system configuration settings

  • Answered by AI
  • Q9. How we can putty frienly session ?
  • Q10. How to know that in which directory we are sitting presently ?
  • Ans. 

    To know the current directory in Linux/Unix, use the 'pwd' command.

    • Type 'pwd' in the terminal and press enter.

    • The output will show the full path of the current directory.

    • Alternatively, you can use 'echo $PWD' to display the current directory path.

    • The command 'ls' can also be used to list the contents of the current directory.

  • Answered by AI
  • Q11. #pwd for present working direcory.
  • Ans. 

    The command to display the present working directory in Linux/Unix is 'pwd'.

    • The 'pwd' command stands for 'print working directory'.

    • It displays the absolute path of the current working directory.

    • The output of 'pwd' does not contain any trailing slashes.

  • Answered by AI
  • Q12. How we scan a LUN & check the wwn number ?
  • Ans. 

    To scan a LUN and check the wwn number, use the 'multipath' command.

    • Run 'multipath -ll' to list all the available LUNs and their wwn numbers.

    • To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).

    • Use 'multipath -v3' for verbose output and troubleshooting.

    • Ensure that the necessary drivers and modules are loaded for the storage device.

    • Check the system logs ...

  • Answered by AI
  • Q13. #devfsadm & #fcinfo hba-port are used for this.
  • Q14. How to check data set & mount point information in human readable format ?
  • Ans. 

    To check data set & mount point info in human readable format, use the 'df' command.

    • Open the terminal and type 'df -h' to display the information in human-readable format.

    • The 'df' command shows the file system disk space usage, including the mount point and file system type.

    • The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.

    • You can also use...

  • Answered by AI
  • Q15. By using #df -h command . meaning disk free.
  • Q16. How can we create a mirror pool & what does it require for ?
  • Ans. 

    A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.

    • A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.

    • It requires at least two drives to create a mirror pool.

    • The data written to one drive is automatically duplicated to the other drive in real-time.

    • If one drive fails, the data can still be accessed from ...

  • Answered by AI
  • Q17. How to destroy a pool ?
  • Ans. 

    To destroy a pool in Linux or Unix, use the 'zpool destroy' command.

    • Open the terminal or command prompt.

    • Use the 'zpool destroy' command followed by the name of the pool to be destroyed.

    • Confirm the destruction by typing 'y' or 'yes' when prompted.

    • The pool and all its associated data will be permanently deleted.

  • Answered by AI
  • Q18. How to replace a disk from pool ?
  • Ans. 

    To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.

    • Identify the faulty disk using disk monitoring tools or error messages

    • Remove the faulty disk from the pool using the appropriate command or tool

    • Physically replace the faulty disk with a new disk

    • Add the new disk to the pool using the appropriate command or tool

    • Verify the disk replacement and ensure data integrity

  • Answered by AI
  • Q19. How we check all zpool status ?
  • Ans. 

    To check all zpool status, use the 'zpool status' command.

    • Open the terminal or command prompt.

    • Type 'zpool status' and press Enter.

    • The command will display the status of all zpools on the system.

    • You can also use additional options like '-v' for more detailed information.

  • Answered by AI
  • Q20. How can we check all disk information ?
  • Ans. 

    To check all disk information in Linux and Unix systems, you can use the 'df' command.

    • Use the 'df' command to display disk space usage information

    • Add the '-h' option to display sizes in a more human-readable format

    • Use the '-T' option to display the filesystem type

    • Use the '-i' option to display inode information

    • Combine options as needed to get the desired output

  • Answered by AI
  • Q21. How we can check all information destroy pool & get back them ?
  • Ans. 

    To check all information destroy pool & get back them, we can use ZFS snapshots and clones.

    • ZFS snapshots and clones can be used to recover data from a destroyed pool.

    • Snapshots capture the state of the pool at a specific point in time.

    • Clones can be created from snapshots and mounted as a separate file system.

    • Data can be copied from the clone to the new pool.

    • It is important to regularly create snapshots to ensure data ca

  • Answered by AI
  • Q22. For this we require 2 commands , first #zpool import -D to get all information about destroys pools and to get back them we use #zpool import -D pool name .
  • Q23. How can we attach &detach disk from a normal and mirror pool ?
  • Ans. 

    To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.

    • To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'

    • To detach a disk from a normal pool, use 'zpool detach poolname device'

    • To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'

    • To detach a disk from a mirror pool, use 'zpool detach poolname mirror_dev

  • Answered by AI
  • Q24. #zpool attach poolname old disk new disk & # zpool detach poolname diskid both command are required for particular action.
  • Q25. Tell all process of patch management by stepwise ?
  • Ans. 

    Patch management process involves identifying, testing, deploying, and verifying patches.

    • Identify vulnerabilities and available patches

    • Test patches in a non-production environment

    • Deploy patches to production systems

    • Verify successful patch installation and functionality

    • Monitor for any issues or new vulnerabilities

    • Repeat the process regularly

    • Use automation tools for efficiency

  • Answered by AI
  • Q26. First of all we require two pkg download from oracle support or Linux support - base repo and SRU in our system & we will require a software winscp for copy pkg desktop to server . we will open winscp and...
  • Q27. How many run level are in Saloris and Linux
  • Ans. 

    Saloris does not exist. Linux has 7 run levels.

    • Saloris is not a known operating system

    • Linux has 7 run levels numbered from 0 to 6

    • Each run level has a specific set of services and daemons that are started or stopped

    • Run level 0 is used for system halt

    • Run level 1 is used for single user mode

    • Run level 2 is used for multi-user mode without networking

    • Run level 3 is used for multi-user mode with networking

    • Run level 4 is not u...

  • Answered by AI
  • Q28. In Saloris 5 & Linux 6 have run level.
  • Q29. How we reboot system ?
  • Ans. 

    To reboot a system, use the 'reboot' command or the 'shutdown' command with the '-r' option.

    • Use the 'reboot' command to immediately reboot the system

    • Use the 'shutdown -r' command to schedule a reboot at a specific time

    • Ensure you have the necessary permissions to reboot the system

  • Answered by AI
  • Q30. How to activate Boot Environment back up ?
  • Ans. 

    To activate Boot Environment back up, use the beadm command.

    • Use the beadm command with the activate option followed by the name of the Boot Environment.

    • For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.

    • This will make the Boot Environment the default one at the next system reboot.

  • Answered by AI
  • Q31. We use for this action #beadm activate bename
  • Interview Preparation Tips

    Topics to prepare for IBM Linux and Unix System Administrator interview:
    • LDOM
    • zfs snapshot
    • crontab
    • Service management
    • Process Management
    • NFS
    Interview preparation tips for other job seekers - best experience i have done with this particular session . i covered all necessary question in this ambition box and more topic have remained that are useful like

    Skills evaluated in this interview

    Interview experience
    4
    Good
    Difficulty level
    Moderate
    Process Duration
    Less than 2 weeks
    Result
    Selected Selected

    I applied via campus placement at NBKR Institute of Science and Technology, Vidyanagar and was interviewed in Nov 2024. There were 4 interview rounds.

    Round 1 - Aptitude Test 

    It was about an aptitude test which is on English grammar and athematic reasoning.

    Round 2 - Coding Test 

    The Fibonacci series can be applied to alphabets, and the same should be printed.

    Round 3 - Technical 

    (2 Questions)

    • Q1. Fibonancci series to print the alphabets?
    • Q2. Print the numbers in descending order 123456?
    • Ans. 

      Print numbers in descending order 123456

      • Create an array of strings containing the numbers 1 to 6

      • Sort the array in descending order

      • Print the sorted array

    • Answered by AI
    Round 4 - HR 

    (3 Questions)

    • Q1. Why are you choosing our organization?
    • Ans. 

      I am choosing your organization because of its reputation for innovation, strong company culture, and opportunities for growth.

      • Reputation for innovation in the industry

      • Strong company culture that values employee development

      • Opportunities for growth and advancement within the organization

    • Answered by AI
    • Q2. Are you open to relocation?
    • Ans. 

      Yes, I am open to relocation for the right opportunity.

      • I am willing to relocate for the right job opportunity that aligns with my career goals.

      • I am open to exploring new locations and experiencing different cultures.

      • I understand that relocation may be necessary for career advancement and personal growth.

    • Answered by AI
    • Q3. Are you comfortable with rotational shifts?
    • Ans. 

      Yes, I am comfortable with rotational shifts as I have prior experience working in such shifts.

      • I have previous experience working in rotational shifts at my previous job.

      • I am adaptable and can easily adjust my schedule to accommodate rotational shifts.

      • I understand the importance of being available during different shifts to ensure smooth operations.

      • I am willing to work in rotational shifts to support the team and meet

    • Answered by AI

    Interview Preparation Tips

    Interview preparation tips for other job seekers - Its good to work and get the opportunity in this organization
    Interview experience
    4
    Good
    Difficulty level
    Moderate
    Process Duration
    Less than 2 weeks
    Result
    Not Selected

    I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.

    Round 1 - Technical 

    (3 Questions)

    • Q1. If a server patched with new kernel update after reboot server came up with old kernel only. How will you troubleshoot it ?
    • Ans. 

      To troubleshoot a server that booted up with the old kernel after a new kernel update, check the bootloader configuration, verify the kernel installation, and review the update process.

      • Check the bootloader configuration to ensure it is pointing to the correct kernel version.

      • Verify the kernel installation to see if the new kernel was successfully installed.

      • Review the update process to identify any errors or issues that ...

    • Answered by AI
    • Q2. What are the various commands to check the CPU , Memory utilization in Linux server ?
    • Ans. 

      Various commands to check CPU and Memory utilization in Linux server.

      • To check CPU utilization: top, mpstat, sar

      • To check Memory utilization: free, vmstat, sar -r

    • Answered by AI
    • Q3. How will you create and add new disk to the system using LVM ? Write the commands of the process.
    • Ans. 

      To add a new disk to the system using LVM, you need to initialize the disk, create a physical volume, extend the volume group, and finally extend the logical volume.

      • Initialize the disk using fdisk or parted command

      • Create a physical volume using pvcreate command

      • Extend the volume group using vgextend command

      • Extend the logical volume using lvextend command

      • Resize the filesystem using resize2fs or xfs_growfs command

    • Answered by AI
    Round 2 - HR 

    (2 Questions)

    • Q1. Tell me about yourself
    • Ans. 

      Experienced Linux Administrator with a passion for troubleshooting and optimizing systems.

      • Over 5 years of experience managing Linux servers in a corporate environment

      • Skilled in shell scripting, server configuration, and system monitoring tools like Nagios

      • Strong problem-solving skills and ability to work well under pressure

      • Certified in Red Hat Enterprise Linux (RHCE)

      • Passionate about staying up-to-date with the latest te

    • Answered by AI
    • Q2. Can you let us know the skills other than mentioned skills in resume?
    • Ans. 

      Some additional skills I possess include scripting languages, troubleshooting abilities, and strong communication skills.

      • Proficiency in scripting languages such as Python, Bash, or Perl can be beneficial for automating tasks and improving efficiency.

      • Strong troubleshooting abilities are essential for quickly identifying and resolving issues that may arise in a Linux environment.

      • Effective communication skills are importa...

    • Answered by AI

    Skills evaluated in this interview

    Interview experience
    4
    Good
    Difficulty level
    Moderate
    Process Duration
    Less than 2 weeks
    Result
    -

    I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.

    Round 1 - One-on-one 

    (2 Questions)

    • Q1. How can I grant SFTP access exclusively to the user David?
    • Ans. 

      Grant SFTP access exclusively to user David

      • Create a new group specifically for David, e.g. 'davidgroup'

      • Set the ChrootDirectory in the SSH configuration file to restrict David's access to a specific directory

      • Add David to the 'davidgroup' and configure the necessary permissions for SFTP access

    • Answered by AI
    • Q2. How can a user be locked out after 6 unsuccessful password attempts for a duration of 30 minutes?
    • Ans. 

      To lock a user out after 6 unsuccessful password attempts for 30 minutes, modify the PAM configuration file.

      • Edit the PAM configuration file (/etc/pam.d/common-auth) to include the 'pam_tally2' module.

      • Set the 'deny' option in the 'pam_tally2' module to lock the user out after 6 failed attempts.

      • Specify the 'unlock_time' option in the 'pam_tally2' module to set the duration of the lockout period to 30 minutes.

      • Example: aut

    • Answered by AI
    Interview experience
    4
    Good
    Difficulty level
    Moderate
    Process Duration
    -
    Result
    No response

    I applied via Approached by Company

    Round 1 - Technical 

    (2 Questions)

    • Q1. How to configure NFS
    • Ans. 

      NFS can be configured by setting up the NFS server, exporting directories, and configuring client access.

      • Install NFS server package on the server

      • Edit /etc/exports file to specify directories to be shared

      • Restart NFS service to apply changes

      • Configure client access by mounting NFS shares on client machines

    • Answered by AI
    • Q2. How to perform patching
    • Ans. 

      Patching involves applying updates to software to fix vulnerabilities and improve performance.

      • Identify the software that needs to be patched

      • Download the necessary patches from the vendor's website

      • Test the patches in a non-production environment before applying them to production systems

      • Schedule a maintenance window to apply the patches

      • Apply the patches using tools like yum, apt-get, or Windows Update

      • Verify that the pat...

    • Answered by AI
    Round 2 - HR 

    (2 Questions)

    • Q1. Salary discussion
    • Q2. Location discussion

    Skills evaluated in this interview

    Interview experience
    5
    Excellent
    Difficulty level
    -
    Process Duration
    -
    Result
    -
    Round 1 - Aptitude Test 

    The questions were very relevant.

    Round 2 - Technical 

    (2 Questions)

    • Q1. What are the computer languages you know?
    • Ans. 

      I am proficient in languages like Python, Bash, and SQL.

      • Python

      • Bash

      • SQL

    • Answered by AI
    • Q2. Write a code in Java?
    • Ans. 

      A Java code snippet showcasing basic syntax and functionality.

      • Declare a class with a main method

      • Create variables and assign values

      • Use control structures like if-else or loops

      • Print output using System.out.println()

    • Answered by AI
    Round 3 - HR 

    (2 Questions)

    • Q1. Do you opt for relocation?
    • Q2. Where do want to see yourself in next 5 years?

    Interview Preparation Tips

    Interview preparation tips for other job seekers - Detailed and oriented iseries operator with extensive experience at Abbott laboratories. Proven expertise in managing and optimising as400 systems.

    Skills evaluated in this interview

    Interview experience
    3
    Average
    Difficulty level
    -
    Process Duration
    -
    Result
    -
    Round 1 - One-on-one 

    (2 Questions)

    • Q1. Why want to work in Tech m
    • Q2. Why want to work in Tech M

    Interview Preparation Tips

    Interview preparation tips for other job seekers - Tech Mahindra never focus in Noida, Gurgaon, they give priority to Pune, Mumbai.
    They hired employees for Noida office and send them to other location also do not give relocation if person change his/her location. Gratuity bonus , they give only 20,000 per employees after depending 5 years in name of bonus
    Interview experience
    5
    Excellent
    Difficulty level
    Easy
    Process Duration
    Less than 2 weeks
    Result
    Not Selected

    I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.

    Round 1 - HR 

    (3 Questions)

    • Q1. Tell me about yourself
    • Ans. My name is sumanth I'm from eluru and my graduation B. Tech mechanical from JNTUK university
    • Answered Anonymously
    • Q2. What is your strength and Weekness
    • Ans. My strength - creativity, flexibility, focused My weekends -hard skills, saying no and shy
    • Answered Anonymously
    • Q3. Why should we hire u
    • Ans. Because I'm hard worker who wants to help your company succeed
    • Answered Anonymously

    Interview Preparation Tips

    Topics to prepare for Accenture Linux System Administrator interview:
    • Redhat Linux
    Interview preparation tips for other job seekers - Set realastic goal
    Interview experience
    4
    Good
    Difficulty level
    -
    Process Duration
    -
    Result
    -
    Round 1 - Technical 

    (1 Question)

    • Q1. How to scheduled cron job
    • Ans. 

      To schedule a cron job, use the crontab command to edit the cron table file.

      • Use the crontab -e command to open the cron table file for editing

      • Add a new line to the file with the schedule timing and the command to be executed

      • Save and exit the file to schedule the cron job

    • Answered by AI
    Round 2 - Technical 

    (1 Question)

    • Q1. What is sticky bit
    • Ans. 

      Sticky bit is a permission in Unix/Linux that allows only the owner of a file to delete or rename it.

      • Sticky bit is represented by a 't' in the permissions of a file or directory.

      • When the sticky bit is set on a directory, only the owner of a file within that directory can delete or rename the file.

      • Commonly used on directories like /tmp to prevent users from deleting each other's files.

      • Example: chmod +t directory_name

    • Answered by AI
    Round 3 - HR 

    (1 Question)

    • Q1. Tell me about yourself and salary discussion

    Skills evaluated in this interview

    Interview experience
    4
    Good
    Difficulty level
    Moderate
    Process Duration
    Less than 2 weeks
    Result
    Selected Selected

    I applied via Referral and was interviewed before Sep 2022. There were 2 interview rounds.

    Round 1 - Resume Shortlist 
    Pro Tip by AmbitionBox:
    Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
    View all tips
    Round 2 - Technical 

    (2 Questions)

    • Q1. How to check Kernel and OS Version, How to change file permissions, Whar are the default permissions of few files, In which file user id and password stored, Network configuration stored in which file, How...
    • Ans. 

      To check Kernel and OS Version, change file permissions, view default permissions of files, locate user id and password file, find network configuration file, and filter keywords.

      • To check Kernel and OS Version: Use 'uname -a' command

      • To change file permissions: Use 'chmod' command followed by permission code and file name

      • Default permissions of few files: For example, /etc/passwd has 644 permissions

      • User id and password s...

    • Answered by AI
    • Q2. What is LVM, Explain LVM Architecture, What is Raid, What is the booting process of RHEL, How to manage failed unmount or mount, What are the issues you have faced in working with Linux Servers, What is sp...
    • Ans. 

      LVM is Logical Volume Manager used for managing disk space, RAID is Redundant Array of Independent Disks for data protection, RHEL boot process involves BIOS, GRUB, kernel loading, and init process.

      • LVM allows for dynamic resizing of logical volumes without downtime.

      • RAID combines multiple disks for data redundancy or performance improvement.

      • RHEL boot process involves BIOS POST, GRUB bootloader, kernel loading, and init ...

    • Answered by AI

    Interview Preparation Tips

    Interview preparation tips for other job seekers - Clear your basics.

    Skills evaluated in this interview

    Tell us how to improve this page.

    Interview Questions from Similar Companies

    Accenture Interview Questions
    3.9
     • 8.1k Interviews
    Infosys Interview Questions
    3.7
     • 7.6k Interviews
    Wipro Interview Questions
    3.7
     • 5.6k Interviews
    Cognizant Interview Questions
    3.8
     • 5.6k Interviews
    Capgemini Interview Questions
    3.8
     • 4.8k Interviews
    Tech Mahindra Interview Questions
    3.5
     • 3.8k Interviews
    HCLTech Interview Questions
    3.5
     • 3.8k Interviews
    Genpact Interview Questions
    3.9
     • 3k Interviews
    LTIMindtree Interview Questions
    3.8
     • 3k Interviews
    IBM Interview Questions
    4.0
     • 2.4k Interviews
    View all
    TCS Linux and Unix System Administrator Salary
    based on 6 salaries
    ₹4.1 L/yr - ₹6 L/yr
    14% less than the average Linux and Unix System Administrator Salary in India
    View more details
    System Engineer
    1.1L salaries
    unlock blur

    ₹1 L/yr - ₹9 L/yr

    IT Analyst
    67.6k salaries
    unlock blur

    ₹5.1 L/yr - ₹15.9 L/yr

    AST Consultant
    51.3k salaries
    unlock blur

    ₹8 L/yr - ₹25 L/yr

    Assistant System Engineer
    29.9k salaries
    unlock blur

    ₹2.2 L/yr - ₹5.6 L/yr

    Associate Consultant
    28.8k salaries
    unlock blur

    ₹8.9 L/yr - ₹32 L/yr

    Explore more salaries
    Compare TCS with

    Amazon

    4.1
    Compare

    Wipro

    3.7
    Compare

    Infosys

    3.7
    Compare

    Accenture

    3.9
    Compare
    Did you find this page helpful?
    Yes No
    write
    Share an Interview