linux interview questions github

Tell me about the last major Linux project you finished.

####[ ⬆ ] Hard Linux Questions:
  • What is a tunnel and how you can bypass a http proxy? …
  • What is the difference between IDS and IPS? …
  • What shortcuts do you use on a regular basis? …
  • What is the Linux Standard Base? …
  • What is an atomic operation?

:octocat: A curated awesome list of lists of interview questions. Feel free to contribute!

Git Questions for DevOps / Software Engineering Interviews

A reverse proxy takes HTTP requests coming in from the internet and delivers them to a web server inside the network. Some reasons for using a reverse proxy are to protect the webserver from the internet in general, to allow multiple webservers to serve content for one domain, to cache static content or compress the content being served by the webserver, etc.

HTTP, or Hypertext Transfer Protocol, is “an application protocol for distributed, collaborative, hypermedia information systems (Wikipedia)”, and is the foundation of the World Wide Web (distinct from the Internet as a whole). In the context of System Administration, HTTP is related to the applications or services that handle that protocol, most notably web servers like Apache or Nginx (among others).

Linux can borrow a large amount of free memory to use for buffering and disk caching. This is done to speed up the system in general, but does NOT mean the system is low on free memory. If more memory is needed for the processes on the system, they just use the memory allocated to disk cache.

A list of Linux Sysadmin/DevOPs questions and answers based on the Interview Questions compiled by, intended to assist current and future Sysadmins/DevOPs in learning the craft.

A forward proxy takes HTTP requests (web traffic) from a host on an internal network, and forwards them out to the internet. This can be done for various reasons, such as providing web access to hosts that dont have a direct route out, or for monitoring the traffic of the users on the network, or more.

This is very important information to obtain when problem solving why a computer process is running slowly and making decisions on what processes to kill/software to uninstall.

A process blocked in a system call is in uninterruptible sleep. The ps or top command will (on most unices) show it in state D.

Also you should run SSH client with -v|--verbose – it is in first level of verbosity. Next, you can enable additional (level 2 and 3) verbosity for even more debugging messages as shown with e.g. -vv.

Earlier in this type of kernel architecture, all the basic system services like a process and memory management, interrupt handling etc were packaged into a single module in kernel space. This type of architecture led to some serious drawbacks like:

Within a POSIX system, a file has the following attributes which may be retrieved by the stat system call:

Simple Linux Questions:

  • What is the name and the UID of the administrator user?
  • How to list all files, including hidden one, in a directory?
  • What is the Unix/Linux command to remove a directory and its contents?
  • Which command will show you free/used memory? Does free memory exist on Linux?
  • How to connect to a remote server or what is SSH?
  • I get “command not found” for ifconfig -a. What can be wrong?
  • What command will show the available disk space on the Unix/Linux system?
  • What Unix/Linux commands will alter a files ownership, files permissions?
  • What does chmod +x FILENAMEdo?
  • What does the permission 0750 on a file mean?
  • What does the permission 0750 on a directory mean?
  • How to redirect STDOUT and STDERR in bash? (> /dev/null 2>&1)
  • What is the difference between UNIX and Linux
  • What is the difference between Telnet and SSH?
  • Explain the three load averages and what do they indicate
  • You may be asked one or more command based interview questions in the linux interview. You should prepare yourself with as many commands as you can. There are several commands that are used for tar archive which are commonly asked in the linux interview, so don’t miss to cover this question while going for the linux interview.

    HTTP also defines commands such as GET and POST, which are used to handle form submissions on websites. The CONNECT command is used to facilitate a secure connection that is encrypted using SSL. Encrypted HTTP connections take place over HTTPS, an extension of HTTP designed for secure data transmissions.

    Related Posts

    Leave a Reply

    Your email address will not be published. Required fields are marked *