Linux System Administrator

100+ Linux System Administrator Interview Questions and Answers

Updated 12 Jul 2025
search-icon

Asked in Capgemini

1d ago

Q. What could prevent a user from logging into the application?

Ans.

Possible causes of user not able to login to an application

  • Incorrect username or password

  • Account locked or disabled

  • Expired password

  • Network connectivity issues

  • Application server down

  • Incorrect permissions or access rights

  • Firewall blocking access

  • Authentication server issues

  • Application configuration errors

Asked in Capgemini

3d ago

Q. How do you create a user using single-line commands?

Ans.

A user can be created in a single line command using the 'useradd' command in Linux.

  • Use the 'useradd' command followed by the username to create a user.

  • Specify additional options like home directory, shell, etc. if required.

  • Example: useradd john -m -s /bin/bash

Linux System Administrator Interview Questions and Answers for Freshers

illustration image

Q. Which command is used to check the memory status?

Ans.

The command used to check memory status is 'free'.

  • The 'free' command displays the total amount of free and used physical and swap memory in the system.

  • It also shows the buffers and cache used by the kernel.

  • The output of the 'free' command can be customized using various options like '-h' for human-readable format and '-s' for a continuous display.

  • Another command that can be used to check memory status is 'top', which displays the memory usage of individual processes in real-t...read more

1d ago

Q. Prepare Apache virtualization,Tomcat installation and configuration with Linux,centos,AWS EC2,S3 bucket, VMware management,zone replication.Database migration (MySQL&PostgreSQL),LVM configuration and management...

read more
Ans.

The question is about Linux System Administration and covers various topics such as Apache virtualization, Tomcat installation and configuration, AWS EC2 and S3 bucket, VMware management, database migration, LVM configuration and management, SSL configuration, ISCSI server and client configuration, haproxy configuration and management, and database replication.

  • Apache virtualization

  • Tomcat installation and configuration

  • AWS EC2 and S3 bucket

  • VMware management

  • Database migration (M...read more

Are these interview questions helpful?

Q. What is LVM and why is it required?

Ans.

LVM stands for Logical Volume Manager. It is required for flexible management of storage devices in Linux systems.

  • LVM allows for the creation of logical volumes that span multiple physical disks.

  • It enables resizing of logical volumes without the need to unmount the file system.

  • LVM also provides features such as snapshots and mirroring for data backup and redundancy.

  • It is commonly used in enterprise environments where storage requirements are dynamic and constantly changing.

Q. What is the maximum size (in bytes) of a filename in Linux?

Ans.

The maximum size of a filename in Linux is 255 bytes.

  • The maximum length includes the entire path and filename.

  • The limit is imposed by the file system, not the operating system.

  • Some file systems, such as ext4, support longer filenames with special configuration.

  • Long filenames can cause issues with some applications and scripts.

Linux System Administrator Jobs

Justdial logo
Justdial - L3 Linux System Administrator (4-9 yrs) 4-9 years
Justdial
3.5
BMC Software India Pvt. Ltd logo
zVM and zLinux Systems Admin 7-12 years
BMC Software India Pvt. Ltd
4.0
Pune
Marwadi Financial Services logo
Linux System Administrator 1-1 years
Marwadi Financial Services
4.2
₹ 3 L/yr - ₹ 3 L/yr
Rajkot

Asked in Capgemini

3d ago

Q. What is a cron job and how do you write one?

Ans.

A cron job is a scheduled task that runs automatically at specific intervals on a Linux system.

  • Cron jobs are managed by the cron daemon, which reads a configuration file called crontab.

  • To write a cron job, you need to edit the crontab file using the 'crontab' command.

  • Each line in the crontab file represents a separate cron job and follows a specific format.

  • The format consists of five fields: minute, hour, day of month, month, and day of week.

  • You can use various symbols and op...read more

Asked in Capgemini

5d ago

Q. How do you set a password for a newly created user?

Ans.

To set the password for a newly created user in Linux, use the 'passwd' command followed by the username.

  • Open the terminal or SSH into the Linux system

  • Run the 'passwd' command followed by the username of the new user

  • Enter and confirm the new password when prompted

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Asked in NTT Data

4d ago

Q. What is Networking how dns cluster works in Linux?

Ans.

Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.

  • Networking involves connecting devices to share resources such as files, printers, and internet access.

  • DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.

  • DNS cluster can be configured using tools like BIND and PowerDNS.

  • DNS cluster can improve the performance and rel...read more

6d ago

Q. Ssh port number? Difference between rpm and yum? Remove text file in Linux? Chmod use?

Ans.

SSH port number is 22 by default. RPM is a package manager for Red Hat-based systems, while YUM is a higher-level package manager that uses RPM as its backend. To remove a text file in Linux, you can use the 'rm' command. Chmod is a command used to change the permissions of a file or directory.

  • SSH port number is typically 22, but it can be changed in the SSH server configuration file.

  • RPM is a low-level package manager used for installing, upgrading, and removing software pack...read more

Asked in ZenoCloud

3d ago

Q. How do you reset the root password?

Ans.

To reset the root password, you can use the single-user mode or a bootable Linux distribution.

  • Boot into single-user mode by interrupting the boot process and appending 'init=/bin/bash' to the kernel command line.

  • Remount the root filesystem as read-write using the 'mount -o remount,rw /' command.

  • Change the root password using the 'passwd' command.

  • Alternatively, boot from a bootable Linux distribution like a Live CD or USB and mount the root partition to reset the password.

Asked in Capgemini

5d ago

Q. What are decommissioning and recommissioning?

Ans.

Decommission is the process of retiring a system or service, while recommission is the process of bringing it back into service.

  • Decommission involves shutting down and removing a system or service from operation.

  • Recommission involves restoring a decommissioned system or service back into operation.

  • Decommission and recommission are common processes in IT infrastructure management.

  • Examples include retiring an old server and replacing it with a new one, or taking a website offli...read more

Q. What is the function of the grep command?

Ans.

grep command is used to search for a specific pattern in a file or output.

  • Used to search for a specific pattern in a file or output

  • Can be used with regular expressions

  • Can be used to search for multiple patterns at once

  • Can be used with other commands like find and ls

  • Example: grep 'error' file.txt

6d ago

Q. How do you configure an Apache server in Red Hat 7.9?

Ans.

To configure Apache server in Red Hat 7.9, follow these steps:

  • Install Apache using yum package manager

  • Start Apache service and enable it to start at boot

  • Configure firewall to allow HTTP traffic

  • Create virtual hosts for multiple websites

  • Configure SSL/TLS encryption for secure connections

Asked in Capgemini

1d ago

Q. What is LVM, and why do we use it?

Ans.

LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.

  • LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.

  • It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.

  • LVM enables dynamic allocation of storage space, making it easier to add or remove storage devices without disrupting the system.

  • It allows ...read more

3d ago

Q. How do you create a blank file in RHEL?

Ans.

To create a blank file in RHEL, you can use the 'touch' command.

  • Open the terminal in RHEL.

  • Use the 'touch' command followed by the desired file name to create a blank file.

  • For example, to create a file named 'example.txt', you would run: touch example.txt

  • The 'touch' command can also be used to update the timestamp of an existing file.

1d ago

Q. What is the use of the lsblk command in RHEL?

Ans.

lsblk command is used to list block devices in RHEL.

  • Displays information about all available or the specified block devices.

  • Shows the device name, size, mount point, and file system type.

  • Can be used to identify unmounted disks or partitions.

  • Can also be used to check the status of a disk or partition.

  • Example: lsblk -a -o NAME,SIZE,MOUNTPOINT,FSTYPE

Asked in Sorcflow

2d ago

Q. How do you configure LVM?

Ans.

LVM (Logical Volume Manager) is configured by creating physical volumes, volume groups, and logical volumes.

  • Create physical volumes using the 'pvcreate' command

  • Create volume groups using the 'vgcreate' command

  • Create logical volumes using the 'lvcreate' command

  • Format the logical volumes with a file system using the 'mkfs' command

  • Mount the logical volumes to desired mount points using the 'mount' command

  • Update the '/etc/fstab' file to mount the logical volumes at boot

Asked in Capgemini

6d ago

Q. what is NFS advantages of NFS

Ans.

NFS allows remote access to files and directories, providing centralized storage and easy sharing.

  • Enables sharing of files and directories across multiple systems

  • Reduces storage costs by centralizing data on a single server

  • Improves data availability and reliability through redundancy

  • Simplifies administration by allowing for centralized management

  • Examples: Sharing files between a web server and a database server, sharing user home directories across a network

5d ago

Q. What is the ping command?

Ans.

The pink command is not a valid Linux command.

  • There is no pink command in Linux.

  • It is possible that the interviewer is testing the candidate's honesty and ability to admit when they don't know something.

  • The candidate should respond honestly and explain that they are not familiar with the pink command.

  • Alternatively, the candidate could ask for clarification or context to better understand the question.

4d ago

Q. How do you kill a process in RHEL 7.2?

Ans.

To kill a process in RHEL 7.2, use the 'kill' command followed by the process ID.

  • Identify the process ID using 'ps' command

  • Use 'kill' command followed by the process ID to terminate the process

  • Use 'kill -9' command to force kill the process if it doesn't respond to regular kill command

Asked in Wipro

5d ago

Q. How do you perform patching on physical servers?

Ans.

Patching physical servers involves identifying vulnerabilities, testing patches, scheduling downtime, and applying patches.

  • Identify vulnerabilities through vulnerability scanning or manual review

  • Test patches in a non-production environment to ensure compatibility and stability

  • Schedule downtime with stakeholders and communicate the impact of the patching

  • Apply patches using a patch management tool or manually

  • Verify the success of the patching and monitor for any issues post-pat...read more

Asked in Kyndryl

6d ago

Q. How do you migrate a SUSE Enterprise Server, for example, SLES 12 SP2 to SLES 15 SP2?

Ans.

To migrate a SUSE enterprise server from SLES 12 SP2 to SLES 15 SP2, you can use the online migration method.

  • Ensure that the server meets the minimum requirements for SLES 15 SP2

  • Backup all important data before starting the migration process

  • Use the 'zypper' package manager to perform the online migration

  • Follow the official SUSE documentation for detailed steps and best practices

2d ago

Q. Do you have hands-on experience with LVM, and can you describe the flow of LVM in a Linux file system?

Ans.

LVM (Logical Volume Manager) allows flexible disk management in Linux, enabling dynamic resizing and efficient storage allocation.

  • LVM abstracts physical storage into logical volumes, allowing for easier management.

  • It consists of Physical Volumes (PVs), Volume Groups (VGs), and Logical Volumes (LVs).

  • Example: Create a PV with 'pvcreate /dev/sdb1', then a VG with 'vgcreate myvg /dev/sdb1'.

  • Logical Volumes can be resized with commands like 'lvextend' and 'lvreduce'.

  • LVM supports sn...read more

5d ago

Q. What is the procedure for taking a snapshot of a machine?

Ans.

To take a snapshot of a machine, you can use the built-in tools provided by the virtualization platform or third-party software.

  • Use the snapshot feature provided by the virtualization platform such as VMware vSphere or Hyper-V.

  • For Linux machines, you can use tools like LVM (Logical Volume Manager) to create snapshots of the filesystem.

  • Third-party backup and snapshot tools like Veeam or Acronis can also be used for taking snapshots.

  • Ensure that the machine is in a stable state ...read more

Q. What is the netstat command?

Ans.

Netstat is a command-line tool used to display network connections, routing tables, and network interface statistics.

  • Displays active network connections and their status

  • Shows routing tables and network interface statistics

  • Can be used to troubleshoot network issues

  • Can be used to identify open ports and listening services

  • Syntax: netstat [options]

Asked in Infosys

3d ago

Q. What is FSMO? Explain in detail.

Ans.

FSMO stands for Flexible Single Master Operations. It is a role in Active Directory that controls specific domain-wide operations.

  • FSMO roles are divided into two categories: forest-wide and domain-wide.

  • There are five FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • The Schema Master controls all updates and modifications to the schema.

  • The Domain Naming Master controls the addition or removal of domains in the forest.

  • The RID ...read more

Asked in Capgemini

4d ago

Q. What is an inode number?

Ans.

An I node number is a unique identifier assigned to each file in a Unix-like file system.

  • I node number is also known as index node number.

  • It contains metadata about the file such as ownership, permissions, timestamps, etc.

  • It is used by the operating system to locate and access the file on the disk.

  • The command 'ls -i' can be used to display the I node number of a file.

3d ago

Q. What is cron tab and how do you set it up?

Ans.

Cron tab is a time-based job scheduler in Linux used to automate repetitive tasks. It runs in the background and executes commands at specified intervals.

  • Cron tab is configured using the 'crontab' command

  • Each user has their own crontab file located in /var/spool/cron/crontabs/

  • The syntax for setting up a cron job is: * * * * * command-to-be-executed

  • The five asterisks represent the minute, hour, day of the month, month, and day of the week respectively

  • Examples: 0 0 * * * /path/...read more

4d ago

Q. What is patching?

Ans.

Patching is the process of applying updates or fixes to software or systems to address vulnerabilities or improve functionality.

  • Patching involves downloading and installing updates provided by software vendors.

  • It helps to fix bugs, security vulnerabilities, and improve performance.

  • Patches can be applied to operating systems, applications, or firmware.

  • Regular patching is crucial to maintain system integrity and protect against cyber threats.

  • Examples include applying security p...read more

1
2
3
4
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Accenture Logo
3.7
 • 8.7k Interviews
Infosys Logo
3.6
 • 7.9k Interviews
Wipro Logo
3.7
 • 6.1k Interviews
Amazon Logo
4.0
 • 5.4k Interviews
View all

Top Interview Questions for Linux System Administrator Related Skills

interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Linux System Administrator Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits