####[ ⬆ ] Hard Linux Questions:
- What is a tunnel and how you can bypass a http proxy? …
- What is the difference between IDS and IPS? …
- What shortcuts do you use on a regular basis? …
- What is the Linux Standard Base? …
- What is an atomic operation?
A curated awesome list of lists of interview questions. Feel free to contribute!
Git Questions for DevOps / Software Engineering Interviews
A reverse proxy takes HTTP requests coming in from the internet and delivers them to a web server inside the network. Some reasons for using a reverse proxy are to protect the webserver from the internet in general, to allow multiple webservers to serve content for one domain, to cache static content or compress the content being served by the webserver, etc.
HTTP, or Hypertext Transfer Protocol, is “an application protocol for distributed, collaborative, hypermedia information systems (Wikipedia)”, and is the foundation of the World Wide Web (distinct from the Internet as a whole). In the context of System Administration, HTTP is related to the applications or services that handle that protocol, most notably web servers like Apache or Nginx (among others).
Linux can borrow a large amount of free memory to use for buffering and disk caching. This is done to speed up the system in general, but does NOT mean the system is low on free memory. If more memory is needed for the processes on the system, they just use the memory allocated to disk cache.
A list of Linux Sysadmin/DevOPs questions and answers based on the Interview Questions compiled by https://github.com/chassing/linux-sysadmin-interview-questions, intended to assist current and future Sysadmins/DevOPs in learning the craft.
A forward proxy takes HTTP requests (web traffic) from a host on an internal network, and forwards them out to the internet. This can be done for various reasons, such as providing web access to hosts that dont have a direct route out, or for monitoring the traffic of the users on the network, or more.
This is very important information to obtain when problem solving why a computer process is running slowly and making decisions on what processes to kill/software to uninstall.
A process blocked in a system call is in uninterruptible sleep. The
top command will (on most unices) show it in state D.
Also you should run SSH client with
-v|--verbose – it is in first level of verbosity. Next, you can enable additional (level 2 and 3) verbosity for even more debugging messages as shown with e.g.
Earlier in this type of kernel architecture, all the basic system services like a process and memory management, interrupt handling etc were packaged into a single module in kernel space. This type of architecture led to some serious drawbacks like:
Within a POSIX system, a file has the following attributes which may be retrieved by the stat system call:
Simple Linux Questions:
ifconfig -a. What can be wrong?
chmod +x FILENAMEdo?
You may be asked one or more command based interview questions in the linux interview. You should prepare yourself with as many commands as you can. There are several commands that are used for tar archive which are commonly asked in the linux interview, so don’t miss to cover this question while going for the linux interview.
HTTP also defines commands such as GET and POST, which are used to handle form submissions on websites. The CONNECT command is used to facilitate a secure connection that is encrypted using SSL. Encrypted HTTP connections take place over HTTPS, an extension of HTTP designed for secure data transmissions.