Skip to main content

Red Hat Linux Networking and System Administration


Popular Questions (Find your question and click to view)

1.Give a brief introduction to UNIX.
2.Introduction to Linux.
3.What is GNU project?
4.What are Linux Distributions?
5.Who is System administrator?
6.What are servers?
7.Explain the process of installing and configuring application software.
8.Explain the process of creating and maintaining user accounts in Linux.
9.Explain the backing up and restoring files in Linux.
10.How monitoring and tuning performance of system is done by system administrator.
11.How to configure secure system in Linux.
12.Explain the tools used to monitor system security.
13.Explain the boot process in Linux.
14.Explain the Boot loader GRUB used in Linux.
15.How to use GRUB during the Boot process?
16.Explain the ‘/sbin/init’ or ‘init’ program.
17.Explain the runlevels in Linux.
18.Explain the rc script and how they can be managed by manually.
19.Explain the GRUB configuration file.
20.Explain file system structure in Linux.
21.Explain the file systems supported by Linux.
22.Explain memory and virtual file system in Linux.
23.Explain dispartitioning on X86 machine.
24.How to mount other operating system partitions/slices in Linux.
25.What are metadevices?
26.What are logical volumes?
27.What is RAID? Explain types of RAID in detail.
28.How to manage rc scripts using chkconfig?
29.How loader works? State the difference between GRUB and LILO.
30.Discuss System wide shell configuration Scripts in Linux.
31.Write a note on ‘etc/motd’.
32.Write a note on issue file.
33.Write a note on issue.net file.
34.Write a note on fstab file.
35.Write a note on cron files.
36.Write a note on syslog.conf file.
37.Write a note on ‘ld.so.conf’ file.
38.Write a note on ‘logrotate.conf’ file.
39.How to manage rc script using chkconfig?
40.Explain different configuration files in the /etc/sysconfig directory.
41.Explain network configuration files in /etc/sysconfig/network-scripts.
42.Explain TCP/IP networking.
43.Explain network classes.
44.Explain process of setting up a NIC (Network interface card).
45.Explain how to set an alias for the NIC.
46.Explain the IPv4 address with the help of
a) Different formats of representation i.e. dotted decimals and binary.
b) Classes in both the formats.
c) Interpretation of the IP addresses.
47.Explain submit mask and subnetting and advantages.
48.Explain the concept of subnetting the network.
49.How to configure Routers and Gateways?
50.Explain how to configure DHCP client?
51.How to configure network using Network Configuration Tool?
52.How to add an Ethernet device using Network configuration tool ?
53.How to change the NIC configuration?
54.How to manage host in Linux?
55.Explain Network file system (NFS).
56.Explain Network File System V 4 (NFSv4).
57.What are the advantages of Network file system (NFS)?
58.What are the disadvantages of Network file system (NFS)?
59.How to plan NFS installation?
60.List the NFS Configuration files, status files, daemon, commands and scripts.

Comments

Popular posts from this blog

Explain the tools used to monitor system security.

12.Explain the tools used to monitor system security. Ans. 1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’. 2. If there is a vulnerability in a system they will find it and use it against you. 3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone. 4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds. 5. You need to configure those tools and understand how to sense the warning they provide. 6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system. 7. Red hat is careful enough to making available new, patched version in which potential exploits have been found. 8. You should make sure to download and install the repaired package. 9. This line of defence...

Explain the file systems supported by Linux.

21.Explain the file systems supported by Linux. Ans. 1. Linux can read/write to several file system that originated with other operating system much different from Linux. 2. One reason that Linux supports so many file systems is the design of its virtual file system (VFS) layer, its provides a fairly universal forms of file support, file systems supported by Linux are as follows: 3. ext3: • Ext3 stands for third extended file system. • Starting from Linux Kernel 2.4.15 ext3 was available. • The main benefit of ext3 is that it allows journaling. • Journaling has a dedicated area in the file system, where all the changes are tracked. • When the system crashes, the possibility of file system corruption is less because of journaling. (If no journaling, then fsck command (file system consistency check) is used to check for the corrupted file and to repair that file). • ext3 keeps a record of uncommitted file transactions and applies only those transactions when the sy...

Explain the boot process in Linux.

13.Explain the boot process in Linux. Ans. 1. When we turn on our PC, it runs a program called “Basic input/output System” (BIOS). 2. BIOS is the only way to communicate with the system components until the operating system is up and running and able to take over the system management functions. 3. BIOS is installed on Read only memory (ROM) chip physically attached to system board. 4. The ROM type of chip is usually referred as to as an EEPROM chip, meaning it’s not writeable by user. 5. After the BIOS loads, it performs some diagnostics on the hardware, checks the installed components to be sure they are functioning and checks the system RAM (Random access memory). 6. Next the BIOS tries to find system drives from which it can load the boot program to begin the process of starting the operating system/kernel. 7. We can specify the search order for drives by changing the setting in the system BIOS configuration. 8. Usually the first hard drive...