Home  
 
  Ask Questions  
 
  Feed Back  
 
  My Questions  
 
  Contact Us  
 
  About Us  
 


 Interview Questions  
 Our Services  

Linux Interview Questions and Answers

NEW INTERVIEW QUESTIONS.COM OPERATING SYSTEMS INTERVIEW QUESTIONS LINUX INTERVIEW QUESTIONS QUESTIONS LISTING

Linux Interview Questions & Answers


A D V E R T I S E M E N T





Previous Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 Page 14 [ Page 15]

Newinterviewquestions.com: World's Largest Interview Questions Website.
Questions Question: All groups are defined in the /etc/group file. Each entry contains four fields in the following order. Choose one: a. groupname, password, GID, member list b. GID, groupname, password, member list c. groupname, GID, password, member list d. GID, member list, groupname, password
Ratings Rating:
View Answer View Answer: Here

Questions Question: After bob leaves the company you issue the command userdel bob. Although his entry in the /etc/passwd file has been deleted, his home directory is still there. What command could you have used to make sure that his home directory was also deleted? Choose one: a. userdel -m bob b. userdel -u bob c. userdel -l bob d. userdel -r bob
Ratings Rating:
View Answer View Answer: Here

Questions Question: Mary has recently gotten married and wants to change her username from mstone to mknight. Which of the following commands should you run to accomplish this? Choose one: a. usermod -l mknight mstone b. usermod -l mstone mknight c. usermod -u mknight mstone d. usermod -u mstone mknight
Ratings Rating:
View Answer View Answer: Here

Questions Question: You have created special configuration files that you want copied to each user's home directories when creating new user accounts. You copy the files to /etc/skel. Which of the following commands will make this happen? Choose one: a. useradd -m username b. useradd -mk username c. useradd -k username d. useradd -Dk username
Ratings Rating:
View Answer View Answer: Here

Questions Question: You issue the following command useradd -m bobm But the user cannot logon. What is the problem? Choose one: a. You need to assign a password to bobm's account using the passwd command. b. You need to create bobm's home directory and set the appropriate permissions. c. You need to edit the /etc/passwd file and assign a shell for bobm's account. d. The username must be at least five characters long.
Ratings Rating:
View Answer View Answer: Here

Questions Question: When using useradd to create a new user account, which of the following tasks is not done automatically. Choose one: a. Assign a UID. b. Assign a default shell. c. Create the user's home directory. d. Define the user's home directory.
Ratings Rating:
View Answer View Answer: Here

Questions Question: You create a new user by adding the following line to the /etc/passwd file bobm::501:501:Bob Morris:/home/bobm:/bin/bash You then create the user's home directory and use the passwd command to set his password. However, the user calls you and says that he cannot log on. What is the problem? Choose one: a. The user did not change his password. b. bobm does not have permission to /home/bobm. c. The user did not type his username in all caps. d. You cannot leave the password field blank when creating a new user.
Ratings Rating:
View Answer View Answer: Here

Questions Question: Which of the following tasks is not necessary when creating a new user by editing the /etc/passwd file? Choose one: a. Create a link from the user's home directory to the shell the user will use. b. Create the user's home directory c. Use the passwd command to assign a password to the account. d. Add the user to the specified group.
Ratings Rating:
View Answer View Answer: Here

Questions Question: You create a new user account by adding the following line to your /etc/passwd file. bobm:baddog:501:501:Bob Morris:/home/bobm:/bin/bash Bob calls you and tells you that he cannot logon. You verify that he is using the correct username and password. What is the problem? Choose one: a. The UID and GID cannot be identical. b. You cannot have spaces in the line unless they are surrounded with double quotes. c. You cannot directly enter the password; rather you have to use the passwd command to assign a password to the user. d. The username is too short, it must be at least six characters long.
Ratings Rating:
View Answer View Answer: Here

Questions Question: You attempt to use shadow passwords but are unsuccessful. What characteristic of the /etc/passwd file may cause this? Choose one: a. The login command is missing. b. The username is too long. c. The password field is blank. d. The password field is prefaced by an asterick.
Ratings Rating:
View Answer View Answer: Here

Questions Question: Can you use a commit statement within a database trigger?
Ratings Rating:
View Answer View Answer: Here

Previous Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 Page 14 [ Page 15]


 Sponsors  

Latest 10 Answers
When there is any situation that u should attach a new patch to ur kernel , then download the patch and install it,to make changes to kernel , go to ok prompt and type boot -r, it will update or reconfigure the kernel
Honesty, helpful and reliable
procedure is a set of sql statement ,are combined to gether to perform a specific task or to solve a specifi problem.it does not return value.
leadership is power to influence a group so that the members willingly exert efforts as aspired by the leader.
I have the unique combination of technical skill and the ability to build strong customer relationship. I have the ability to stay focussed in stressfull situation. I would be great addition to your team.
first execute the bc search spec to fetch the data then executes the applet search spec if applet search spec is not match with bc it skips
TCP-Transmission Control Protocol. TCP is Reliable. TCP is Connection oriented. UDP-User Datagram Protoco UDP is Unreliable. UDP is Connectionless.
By default in structure all data member and member function are public,i,e if you not mentation any access specifier. But in case of class By default all data member and member function are private.
Structure is a user defined data type. By default all structure variables are public type and we cann't use access specifier in structure type variable, where as in class we can define objects(variables) under required access specifier type.
variable cost is the cost which is not fixed in nature

Newinterviewquestions.com is a part of Vyom Network. Top



Copyright © 2017, newinterviewquestions.com. All rights reserved Privacy Policy | Terms and Conditions

Page URL: http://www.newinterviewquestions.com/cat/Linux-interview-questions/Default.asp?&iType=83&iDBLoc=280&cachecommand=bypass


Download Yahoo Messenger | Web Hosting | Dedicated Server | Free SMS Domain Registration | Windows Hosting | Linux Hosting | Java Hosting | Virtual Dedicated Server | Dedicated Server | Reseller Web Hosting | Unlimited Windows reseller hosting | Unlimited Linux reseller hosting | Cheap Windows reseller hosting | Cheap Linux reseller hosting | Cheap Windows hosting | Best Windows hosting | Windows hosting Multiple Domains | Unlimited Windows hosting | Compare hosting plans | Cheap Linux hosting | Best Linux hosting | Linux hosting Multiple Domains | Unlimited Linux hosting | Cheap asp.net hosting | Best asp.net hosting | unlimited asp.net hosting | Cheap asp.net reseller hosting | Unlimited asp.net reseller hosting | Java Features | Cheap Java hosting | Best Java hosting | unlimited Java Hosting | Unlimited Linux reseller hosting | Java Hosting Multiple Domains Quick2host Reviews Buy Online Traffic