Solaris Administrator Interview Questions with Answers
Question: 1. Explain About Admin Command?
Answer:
Local Kerberos offerings may be managed by way of administering policies, key tabs and standards by dealing with the admin command. Admin.Neighborhood is used to grasp KDC and it does now not require any authentication. On the server login records is exceeded through a secured server. It exams the principle name by means of the value of the person surroundings variable.
Question: 2. Explain About The Command Prof_attr?
Answer:
This paperwork the RBAC profile database. It shows the relationship between the various profiles inside the database. It additionally gives authorizations between navigation for the ones files. One of the samples is Solaris.Admin.Fsmgr.Study.Solaris.Admin.Serialmgr.Read.
Linux Interview Questions
Question three. Explain The Differences Between Setting Files Using Octal Codes And Symbolic Codes?
Answer:
The essential difference between setting documents using octal and symbolic code files is symbolic codes are relative while octal codes are numeric codes. These settings will continue to be except you convert the settings explicitly by the use of symbolic codes. If organization execute get entry to receives performed it mechanically removes write get admission to permission.
Question: 4. What Is The Best Solution To Avoid Large Number Of Groups?
Answer:
The best answer for not developing big range of corporations lies with the system administrator. It is excellent to apply structural organization membership which reflects organizational divisions. To manage document get entry to a gadget admin can use access control lists.
Linux Tutorial
Question five. What Is Umask?
Answer:
Wide set permissions can be set by means of using umask that may set write, read and execute permissions on new files created via the person. These settings may be crafted from the command line to reflect huge settings. It also can be set from the global gadget settings report. Umask command presentations all the settings made with that command.
Linux Embedded structures Interview Questions
Question 6. How Can You Determine Whether A File Is Setuid?
Answer:
The easiest way to decide whether a record is setuid or not by way of checking for files which can be owned by the basis and after checking for files which might be owned through root you can test for s flag documents assigned to the user permissions. In the permission desk the first s refers to setuid root.
Question: 7. Explain About Sticky Bit Permissions?
Answer:
This command allows the network administrator to loosen up a piece. This command will now not permit the deletion of the common documents present within the not unusual location. This command enables the users via no longer allowing them to rewrite on different files. Certain permissions can be set in an effort to limit customers to delete files created with the aid of them.
Linux Embedded systems Tutorial Red Hat Linux Essentials Interview Questions
Question 8. Explain About The Command Ls?
Answer:
Ls command offers a manner to the principle directory and additionally offers access permissions for files in Solaris. It shows and prints person and organization ownerships, document access permissions, filename and files length and introduction date.
Question: nine. Explain About The Limitations Present In Sudo?
Answer:
There are some limitations for sudo which makes RBAC famous they are
It isn’t viable to assign a consumer to paintings on specific file or profile.
It is likewise now not viable to assign a user to paintings on a particular command.
By the use of shell instructions and certain features it’s miles feasible to have a few regulations on a consumer however it’d devour time for a bigger setup.
Red Hat Linux System Administration Interview Questions
Question 10. What Is Sudo?
Answer:
Sudo continues database of all the privileges assigned to a person call. These privileges can be diagnosed via distinctive instructions present within the database. This function facilitates a user to format a disk however the root device can’t be modified.
Question: 11. What Are The Different Ways To Execute Profiles?
Answer:
Profiles may be performed in many different ways some of them are
Pfexec executes a unmarried command in profile.
With some regulations pfsh and pfcsh can be done.
By at once logging into the account using su.
Solaris Interview Questions
Question 12. What Are The Three Different System Management Roles?
Answer:
There are three distinct roles specific by using Solaris they’re
Primary administrator who’s responsible for protection.
System administrator is responsible for day after day roles.
Operator is responsible for records back up and upkeep.
Linux Interview Questions
Question thirteen. What Is Solaris Roles?
Answer:
RBAC implementation relies upon upon the position detailed inside the administrator profiles. Roles are carried out consistent with the profile. Also get admission to to sure documents and configuration may be assigned through the user profile. It additionally permits RBAC to distinguish high technical know-how roles from low ones.
Question: 14. What Is Rbac?
Answer:
RBAC is brought into Solaris for managing precise responsibilities. These specific tasks are primarily based and described inside the administrator profile. It is based on the standard advanced with the aid of NIST. RBAC is a very vital device for performing multiple responsibilities. It additionally separates tasks which require excessive technical know-how from low ones.
Question: 15. Describe About Logical Domains And Its Functions?
Answer:
LDOMS machine administrator center gives assets and links to builders who are seeking to installation Ldoms generation. It offers you flexibility to organization gadget resources and discrete systems within a laptop device bodily. It permits you to institution machine resources physically inside its own operating machine, identification and sources.
Solaris UNIX version runs on Intel, AMD and SPARC platforms. It has migrated from solely a SPARC platform to include different systems from leading organizations. It affords interoperability throughout various technologies inclusive of developer merchandise, computer applications, records center, and so forth.
LINUX/UNIX/SOLARIS Interview Questions
Question sixteen. Explain About Solaris?
Answer:
Solaris is a UNIX based running device that is available at no cost. It helps workstations and servers from solar. It is widely recognized for its scalability. This product is almost supported via many server providers. It is the famous successor to sun running systems reduce -d”(” -f2 reduce -d”)” -f1’`Here in above command, see unmarried quote, double quote, grave accessory is used. Observe cautiously grep Mahesh vjHere, Mahesh vj is the username.
Linux Embedded systems Interview Questions
Question 19. List Some Hot Keys For Bash Shell?
Answer:
Ctrl+l . Clears the Screen. Ctrl+r . Does a seek in formerly given commands in shell. Ctrl+l – Clears the typing before the hotkey. Ctrl+a . Places cursor at the start of the command at shell. Ctrl+e . Places cursor at the end of the command at shell. Ctrl+d . Kills the shell. Ctrl+z . Places the currently jogging system into heritage.
Question: 20. How To Know The Date And Time For . When Script Is Executed ?
Answer:
Add the subsequent script line in shell script. Eval echo “Script is carried out at `date`” >> time information.Inf Here, .Timeinfo.Inf. Contains date & time information ie. When script is accomplished and records associated with execution.
Advanced Linux Interview Questions
Question 21. What File Do You Put The Umask Setting In?
Answer:
The UMASK price for Bourne and korn shell users can be changed system huge through enhancing the “umask” access within the “/and so on/profile” document. To alternate the default UMASK for the C shell, adjust the UMASK variable in “/etc/default/login” record.
Question: 22. Which Nfs Daemons Are Found On The Nfs Server?
Answer:
Nfsd
Mounted
Locked
Statd
Nfs Lockd
These five daemons can be in NFS server.
Statd and locked can be in NFS purchaser too.
Question: 23. What Is “piping” Solaris?
Answer:
Piping:- sending the output of a command to the enter of every other is known as WC
Will output total traces, words and individual WC total strains, words and person’s
A UNIX pipe gives a one-way drift of statistics.
For instance, if a UNIX customers problems typelpr.
Then the UNIX shell could create three tactics with pipes among them:
A pipe may be explicitly created in UNIX using the pipe gadget name. Two file descriptors are lower back–filedes [0] and filedes [1], and they are both open for studying and writing. A examine from filedes[0] accesses the data written to filedes[1] on a primary-in-first-out (FIFO) foundation and a study from filedes[1] accesses the data written to filedes[0] additionally on a FIFO foundation.
When a pipe is utilized in a UNIX command line, the primary manner is thought to be writing to stdout and the second one is thought to be analyzing from stdin. So, it’s miles commonplace exercise to assign the pipe write tool descriptor to stdout inside the first system and assign the pipe study device descriptor to stdin inside the 2d process. This is elaborated below within the dialogue of a couple of command pipelines.
Linux Device Drivers Interview Questions
Question 24. How Do We Know How Many Lan Cards We Have In Server?
Answer:
Just Type inside the following command at prompt#ifconfig -a. That shall provide the LAN Cards in addition to total Physical and Logical IP Addresses
dmesg – It displays all configured items on systems.
Red Hat Linux Essentials Interview Questions
Question 25. How Can I Disable Stop+a Utility On Sun Machines, Which Brings System Into Ok> Prompt?
Answer:
in /and many others/system set abort allow=zero will disable STOP-A
There are several ways to disable “STOP-A”
Edit the /and so on/default/kbd document KEYBOARD ABORT=disabled.
Use the “kbd -a disable” command.
Edit /and many others/device document set abort allow = zero.
Question 26. Consider The Following Crontab Entry: ?59 23 thirteen * 5 /wipe. Disk? What Time Will This Cronjob Run?
Answer:
That manner: on Black Friday, your difficult drive gets worn out.
==> (on 13th and Friday) 23:59, /wipe. Disk can be walking If the thirteen’Th Day of the month is Friday, the activity will run. (week day begins from Sunday day 1).
Linux Virtualization Interview Questions
Question 27. What Is The Command To Do An Interactive Boot From The Ok Prompt?
Answer:
The Interactive Boot Process:
At the ok activate, type boot -a and press Enter. The boot program prompts you interactively.
After Power on,
Press,
STOP+A
At the ok prompt type,
Ok>boot –a
Red Hat Linux System Administration Interview Questions
Question 28. What All Does The Nvram Store?
Answer:
Ethernet Address / Host ID / Time of Day (TOD) clock and EEPROM Parameters.
Question: 29. Where Are All The Port Numbers Stored?
Answer:
Port numbers are saved in /and many others/offerings.
Question: 30. Controlling The Tape Drive?
Answer:
Mt –f /dev/rmt/0n à ‘n’ indicates no rewind.
Question: 31. What Are The Network Utilities?
Answer:
Snoop à To seize network packets & show contents.
Netstat –i à Displays kingdom of Ethernet deal with.
Ndd command à Set & observe kernel parameters particularly TCP/IP drivers.
allow=”accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture” allowfullscreen=””>