Linux Administrator

30+ Linux Administrator Interview Questions and Answers for Freshers

Updated 16 Jul 2025
search-icon

Asked in Ericsson

6d ago

Q. How can we transfer a file from one server to another?

Ans.

Files can be transferred from one server to another using tools like SCP, SFTP, or rsync.

  • Use SCP (Secure Copy Protocol) to securely transfer files between servers. Example: scp file.txt user@server2:/path/to/directory

  • Use SFTP (SSH File Transfer Protocol) for interactive file transfers. Example: sftp user@server2

  • Use rsync for efficient synchronization of files between servers. Example: rsync -avz file.txt user@server2:/path/to/directory

Asked in Ericsson

1d ago

Q. You are unable to unmount a file system, what will you do?

Ans.

Check for any processes or open files using the file system, then force unmount if necessary.

  • Check for any processes or applications currently using the file system with 'lsof' command

  • Kill any processes that are using the file system if necessary

  • Try unmounting the file system again using 'umount -l' to force unmount if needed

Asked in Ericsson

4d ago

Q. A disk assigned from storage/VMware is not visible for file system expansion. What will you do?

Ans.

Check disk visibility and partitioning to ensure proper filesystem expansion in Linux after assigning a disk from VMware.

  • Verify if the disk is recognized by the OS using 'lsblk' or 'fdisk -l'.

  • Check if the disk is partitioned using 'parted' or 'fdisk'. If not, create a partition.

  • Use 'pvcreate' to initialize the disk for LVM if you're using logical volumes.

  • If the disk is already partitioned, ensure the filesystem is resized using 'resize2fs' or similar commands.

  • Reboot the VM if...read more

1d ago

Q. how to get MAC based routing table ? what happened at kernel level when we pung server.

Ans.

To get MAC based routing table, use 'ip neigh show' command. When pinging a server, kernel sends ICMP packets and updates ARP cache.

  • Use 'ip neigh show' command to display MAC based routing table

  • Kernel sends ICMP packets when pinging a server

  • Kernel updates ARP cache with MAC address of the server

Are these interview questions helpful?
6d ago

Q. Which performance tuning parameters do you know, and how do you set them permanently and temporarily?

Ans.

One performance tuning parameter is swappiness, which controls how often the system swaps data to disk.

  • To set swappiness temporarily, use the 'sysctl' command: sysctl vm.swappiness=10

  • To set swappiness permanently, edit the '/etc/sysctl.conf' file and add 'vm.swappiness=10'

  • Another performance tuning parameter is 'dirty_ratio' which controls the percentage of system memory that can be filled with dirty pages before processes are forced to write them out to disk

  • To set dirty_rati...read more

Asked in Ericsson

5d ago

Q. How can you schedule a job to run regularly?

Ans.

You can schedule a job regularly using cron jobs in Linux.

  • Use the crontab command to edit the cron table

  • Specify the schedule using the appropriate syntax (minute, hour, day of month, month, day of week)

  • For example, to schedule a job to run every day at 3am, you would add the following line to the cron table: 0 3 * * * /path/to/command

Linux Administrator Jobs

Wipro Limited logo
Linux Administrator 8-10 years
Wipro Limited
3.7
Chennai
Wipro Limited logo
Linux Admin 5-8 years
Wipro Limited
3.7
Chennai
Infosys logo
Linux Administrator 5-7 years
Infosys
3.6
Hyderabad / Secunderabad

Asked in Ericsson

4d ago

Q. What is a hard link and a soft link?

Ans.

Hard links and soft links are two types of links used in Unix-like operating systems to create shortcuts to files.

  • Hard links are direct pointers to the inode of a file, while soft links are indirect pointers to the file name.

  • Hard links cannot link directories or files on different filesystems, while soft links can.

  • If the original file is deleted, hard links will still point to the data, while soft links will be broken.

  • Example: 'ln file1 file2' creates a hard link, 'ln -s file...read more

6d ago

Q. how to data upload , what is samba, what is ftp, what is linux, what is firewall

Ans.

Data upload can be done using Samba or FTP on a Linux system, with firewall protection.

  • Data upload can be done using Samba, which is a file sharing protocol that allows users to access and share files over a network.

  • FTP (File Transfer Protocol) is another method for data upload, allowing users to transfer files between a client and a server.

  • Linux is an open-source operating system known for its stability, security, and flexibility.

  • Firewall is a security system that monitors a...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Asked in Ericsson

1d ago

Q. Define the steps of file system creation.

Ans.

Steps for file system creation involve partitioning, formatting, and mounting the file system.

  • Partition the disk using tools like fdisk or parted

  • Format the partition with a file system like ext4 or xfs

  • Create a mount point directory

  • Mount the file system to the mount point

  • Update /etc/fstab to automatically mount the file system on boot

Asked in CBSI

2d ago

Q. What is NFS?

Ans.

NFS (Network File System) is a distributed file system protocol that allows a user on a client computer to access files over a network.

  • NFS enables sharing of files and directories between multiple computers in a network.

  • It provides transparent access to remote files as if they were local.

  • NFS uses a client-server architecture where the server exports directories that can be mounted on client machines.

  • It supports both read and write operations on shared files.

  • NFS is commonly us...read more

3d ago

Q. sed command syntax and what are special permission

Ans.

sed command is used for text manipulation in Linux. Special permissions include setuid, setgid, and sticky bit.

  • sed command is used for text substitution and manipulation in Linux

  • Syntax: sed 's/pattern/replacement/g' filename

  • Special permissions in Linux include setuid, setgid, and sticky bit

  • Setuid: allows a user to execute a file with the permissions of the file owner

  • Setgid: allows a user to execute a file with the permissions of the group owner

  • Sticky bit: restricts the deleti...read more

Asked in Ericsson

2d ago

Q. What do you understand by NFS?

Ans.

NFS stands for Network File System, a distributed file system protocol that allows a user on a client computer to access files over a network.

  • NFS allows a user to access files on a remote server as if they were local files.

  • It is commonly used in Unix and Linux environments for sharing files and directories.

  • NFS uses RPC (Remote Procedure Call) to communicate between the client and server.

  • It provides centralized storage that can be accessed by multiple clients over a network.

  • NF...read more

Asked in Wipro

5d ago

Q. What is a programming language?

Ans.

Programming language is a set of instructions used to create software applications.

  • Programming languages are used to write code that computers can understand and execute.

  • There are many programming languages such as Java, Python, C++, and JavaScript.

  • Each programming language has its own syntax and rules for writing code.

  • Programming languages can be classified into low-level and high-level languages.

  • Examples of low-level languages include Assembly and Machine language, while hi...read more

1d ago

Q. How do you harden your Linux server?

Ans.

I harden my Linux server by implementing security measures to protect against potential threats.

  • Regularly update the operating system and software to patch vulnerabilities

  • Disable unnecessary services and ports to reduce attack surface

  • Implement strong password policies and use SSH keys for authentication

  • Set up a firewall to control incoming and outgoing traffic

  • Monitor logs for suspicious activities and set up intrusion detection systems

Asked in Ericsson

4d ago

Q. What are /mnt and fstab?

Ans.

The /mnt directory is used as a mount point for temporary mounting of filesystems, and fstab is a configuration file that lists filesystems to be mounted at boot.

  • The /mnt directory is commonly used for temporarily mounting external storage devices or network shares.

  • The fstab file is located at /etc/fstab and contains information about filesystems to be mounted at boot time.

  • Entries in fstab include the device to mount, the mount point, filesystem type, mount options, and dump ...read more

3d ago

Q. What are the complete steps to create a partition in LVM?

Ans.

Creating partitions in LVM involves initializing physical volumes, creating volume groups, and then creating logical volumes.

  • 1. Install LVM tools: Use 'sudo apt install lvm2' on Debian-based systems.

  • 2. Initialize physical volume: 'sudo pvcreate /dev/sdX' (replace sdX with your disk).

  • 3. Create a volume group: 'sudo vgcreate myvg /dev/sdX'.

  • 4. Create a logical volume: 'sudo lvcreate -n mylv -L 10G myvg'.

  • 5. Format the logical volume: 'sudo mkfs.ext4 /dev/myvg/mylv'.

  • 6. Mount the l...read more

Asked in Accenture

3d ago

Q. What is LVM and how does it work?

Ans.

LVM stands for Logical Volume Manager, a tool used to manage disk storage in Linux systems.

  • LVM allows for dynamic resizing of logical volumes without downtime.

  • It consists of physical volumes, volume groups, and logical volumes.

  • Commands like pvcreate, vgcreate, lvcreate are used to create and manage LVM.

  • LVM provides flexibility in managing storage space by allowing logical volumes to span multiple physical disks.

Asked in TCS

3d ago

Q. What do you know about cloud computing?

Ans.

Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, and more.

  • Cloud computing allows users to access and use resources on-demand without the need for physical infrastructure.

  • It offers scalability, flexibility, cost-effectiveness, and increased efficiency.

  • Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

5d ago

Q. Write a script to echo a line repeatedly.

Ans.

Script to echo a line repeatedly

  • Use a loop to echo the line multiple times

  • Specify the number of times to repeat the line

  • Example: for i in {1..5}; do echo 'Hello, World!'; done

3d ago

Q. How do you check the WWN number?

Ans.

To check WWN number, use commands like 'lsscsi' or 'lsblk' in Linux.

  • Use 'lsscsi' command to list SCSI devices and their WWN numbers

  • Use 'lsblk' command to list block devices and their WWN numbers

Asked in Ericsson

6d ago

Q. Why is tcpdump used?

Ans.

tcpdump is used for network troubleshooting and analysis by capturing and analyzing network packets.

  • Captures network packets for analysis

  • Helps in troubleshooting network issues

  • Can be used to monitor network traffic

  • Provides detailed information about network communication

  • Useful for security analysis and monitoring

Asked in Wipro

3d ago

Q. Write code to print the multiplication table of a given number.

Ans.

Code to print table of any number in Python

  • Use a loop to iterate from 1 to 10 (for a 10x table)

  • Multiply the number by the current iteration value

  • Print the result for each iteration

Asked in Mphasis

4d ago

Q. What is a JIT Compiler?

Ans.

JIT Compiler stands for Just-In-Time Compiler. It is a type of compiler that compiles code during runtime.

  • JIT Compiler is used to improve the performance of applications by compiling code on the fly.

  • It is commonly used in Java and .NET environments.

  • JIT Compiler compiles code into machine code, which can be executed directly by the CPU.

  • It can also optimize code by removing unnecessary instructions and reducing memory usage.

  • Examples of JIT Compiler include HotSpot for Java and ...read more

Q. What is the role of the kernel in Linux?

Ans.

The kernel is the core component of Linux, managing system resources and facilitating communication between hardware and software.

  • Manages system resources like CPU, memory, and I/O devices.

  • Acts as an intermediary between hardware and user applications.

  • Handles process management, including scheduling and multitasking.

  • Provides system calls for applications to interact with hardware.

  • Ensures security and access control through user permissions.

Asked in TCS

2d ago

Q. How do you rollback a package?

Ans.

To rollback a package, use package manager to uninstall current version and install previous version.

  • Use package manager to uninstall current version of the package

  • Install the previous version of the package using package manager

  • Check for any dependencies that may need to be rolled back as well

Asked in TCS

5d ago

Q. How do you remove older kernels?

Ans.

To remove older kernels in Linux, use package management tools like apt or yum.

  • Use 'apt autoremove' command in Debian-based systems to remove old kernels

  • Use 'yum remove ' command in Red Hat-based systems to remove old kernels

  • Check available kernels with 'uname -r' command before removing

Asked in TCS

5d ago

Q. How do you mount NFS?

Ans.

To mount NFS, use the 'mount' command with the NFS server IP address and the mount point on the local machine.

  • Use the 'mount' command followed by the NFS server IP address and the mount point on the local machine

  • For example: sudo mount 192.168.1.100:/shared_folder /mnt/nfs_share

  • Ensure that the NFS server is properly configured and accessible from the local machine

Asked in IBM

4d ago

Q. What is workload in Linux?

Ans.

Workload in Linux refers to the amount of work being done by the system at a given time.

  • Workload can include tasks such as running processes, handling network requests, and managing system resources.

  • Monitoring workload is important for ensuring system performance and stability.

  • Tools like top, htop, and sar can be used to track and analyze workload.

  • High workload can lead to system slowdowns or crashes.

  • Balancing workload across multiple servers can help improve overall system e...read more

Asked in Ericsson

2d ago

Q. Define the boot process.

Ans.

Boot process is the sequence of steps that occur when a computer system is starting up.

  • BIOS/UEFI initialization

  • Loading the bootloader

  • Loading the kernel

  • Init process starts

  • Launching user space processes

Asked in TCS

4d ago

Q. How do you perform patching?

Ans.

Patching involves applying updates to software to fix vulnerabilities and improve performance.

  • Identify the software that needs to be patched

  • Download the appropriate patches from the vendor's website

  • Test the patches in a non-production environment before applying them to production systems

  • Schedule downtime for applying patches to minimize disruption

  • Document the patching process for future reference

1
2
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Infosys Logo
3.6
 • 7.9k Interviews
Wipro Logo
3.7
 • 6.1k Interviews
Cognizant Logo
3.7
 • 5.9k Interviews
Capgemini Logo
3.7
 • 5.1k Interviews
View all

Top Interview Questions for Linux Administrator Related Skills

Interview Tips & Stories
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Linux Administrator Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits