UNIX Command Questions Answers Asked in Interview
UNIX Command Questions Answers Asked in Interview
UNIX or Linux operating system has become default Server operating system and for whichever programming
job you give interview you find some UNIX command interview questions there. These UNIX command
interview questions are mostly asked during Java development and Support role interviews on various
investment banks mostly because most of electronic trading systems or stock trading system works on Unix
servers. As we know that high volume low latency systems which wants to take advantage of little bit of volatility in
market for Equity , Futures and options or Foreign exchange trading need a stable server side operating system
and Redhat Linux is doing great job there. with the advent ofAlgorithmic trading this speed factor becomes more
important so getting someone who has good knowledge of operating system and commands on which these trading
system runs is definitely required. but these UNIX command interview questions are equally applicable for any job
interview which requires some work on Unix Operating System. With the growing use of Linux in form of RedHat,
Solaris and IBM AIX its must to keep you familiar with essential Linux commands available on various platforms.
Long back I had once asked one of my friend why are you preparing Unix Command interview questions if
you going for a Java Interview and he told me that this job doesn't only require knowledge of Java but also
knowledge of Unix, Linux, SQL and other scripting language , which is quite true. After that I thought to collect
various UNIX command interview questions asked to Java developers or trading system support interviews and this
is the result of that compilation. This list of UNIX command interview questions are by means complete and would
be great if you guys contribute some genuine and good Unix Command Interview questions and answers
asked during interviews. I have divided the questions on three categories for sake of managing and keeping this
list of Unix Interview questions up to date.
This is a simple UNIX command interview questions where you need to create a file and change its parameter to
read-only by using chmod command you can also change your umask to create read only file.
touch file
chmod 400 file
read more about file and directory permission in unix and linux here.
3. How will you find which operating system your system is running on in UNIX?
By using command "uname -a" in UNIX
4. How will you run a process in background? How will you bring that into foreground and how will you
kill that process?
For running a process in background use "&" in command line. For bringing it back in foreground use command "fg
jobid" and for getting job id you use command "jobs", for killing that process find PID and use kill -9 PID
command. This is indeed a good Unix Command interview questions because many of programmer not familiar
with background process in UNIX.
By using "df" command in UNIX. For example "df -h ." will list how full your current drive is. This is part of
anyone day to day activity so I think this Unix Interview question will be to check anyone who claims to working in
UNIX but not really working on it.
2. How do you find how many cpu are in your system and there details?
By looking into file /etc/cpuinfo for example you can use below command:
cat /proc/cpuinfo
4. What is Zombie process in UNIX? How do you find Zombie process in UNIX?
When a program forks and the child finishes before the parent, the kernel still keeps some of its information about
the child in case the parent might need it - for example, the parent may need to check the child's exit status. To be
able to get this information, the parent calls 'wait()'; In the interval between the child terminating and the parent
calling 'wait()', the child is said to be a 'zombie' (If you do 'ps', the child will have a 'Z' in its status field to indicate
this.)
Zombie : The process is dead but have not been removed from the process table.
5. What is "chmod" command? What do you understand by this line r-- -w- --x?
6. There is a file some where in your system which contains word "UnixCommandInterviewQuestions
How will find that file in Unix?
By using find command in UNIX for details see here 10 example of using find command in Unix
7. In a file word UNIX is appearing many times? How will you count number?
grep -c "Unix" filename
8. How do you set environment variable which will be accessible form sub shell?
By using export
9. How do you check if a particular process is listening on a particular port on remote host?
By using telnet command for example telnet hostname port, if it able to successfully connect then some process
is listening on that port. To read more about telnet read networking command in UNIX
By using lsofcommand in UNIX. It wills list down PID of all the process which is using a particular file.
2. How do you find which remote hosts are connecting to your host on a particular port say 10123?
By using netstat command execute netstat -a | grep "port" and it will list the entire host which is connected to
this host on port 10123.
5. If one process is inserting data into your MySQL database? How will you check how many rows
inserted into every second?
Purpose of this Unix Command Interview is asking about "watch" command in UNIX which is repeatedly execute
command provided with specified delay.
6. There is a file Unix_Test.txt which contains words Unix, how will you replace all Unix to UNIX?
You can answer this Unix Command Interview question by using SED command in UNIX for example you can
execute sed s/Unix/UNIX/g fileName.
7. You have a tab separated file which contains Name, Address and Phone Number, list down all Phone
Number without there name and Addresses?
To answer this Unix Command Interview question you can either you AWK or CUT command here. CUT use tab as
default separator so you can use
cut -f3 filename.
8. Your application home directory is full? How will you find which directory is taking how much space?
By using disk usage (DU) command in Unix for example du sh . | grep G will list down all the directory which
has GIGS in Size.
9. How do you find for how many days your Server is up?
By using uptime command in UNIX
10. You have an IP address in your network how will you find hostname and vice versa?
This is a standard UNIX command interview question asked by everybody and I guess everybody knows its answer
as well. By using nslookup command in UNIX, you can read more about Convert IP Address to hostname in
Unix here.
I hope this UNIX command interview questions and answers would be useful for quick glance before going for
any UNIX or Java job interview. Please share any interesting UNIX command interview you have come across and I
will add into this list. If you are going for any Unix interview on brokerage firm or stock trading company or any
Investment bank you can have a quick look here, though most of questions you might already know but its good to
review it. if you like this you can see my other unix command tutorial for beginners as well
tar
included]
This syntax of tar command is for easy understanding you can also check detailed syntax by using
command "tar --usage" in unix machine.
Most of use use either winzip or winrar in windows machine to zipping or creating archives of content
so when we move to command line interface like Unix or Linux we struggle without those tools. UNIX
tar command is similar to winzip or winrar and you can use UNIX tar command to create both
compressed or uncompressed (zipped) archives in UNIX.
In this example of tar command we will create tar file including all the files and directories or selected
files and directories in Unix.
stock_trader@system:~/test ls -lrt
total 0
-r--r--r--
it has two files and one directory. now we will create a tar file with all these contents.
You see unix tar command is creating tar file with name "trading" with contents shown above. just to
review here "-c" is used to create tar file "v" is used to be verbose and "f" is used to tell tar file name.
You can see the tar file here
stock_trader@system:~/test ls -lrt
-r--r--r--
-r--r--r--
-rw-r--r--
------------------------------------------------------------In earlier example of tar command in Unix or Linux we have created a uncompressed tar file called
"trading.tar" now in this example we will see the actual content of that tar file.
here option "t" is used to display content of tar file in unix while options "v" and "f" are for "verbose"
and "following". now you can clearly see that all the files which we wanted to be included in tar file are
there.
stock_trader@system:~/test/new ls -lrt
total 12K
-rw-r--r-- 1 stock_trader Domain Users 10K Jul 18 12:37 trading.tar
This unix tar command will extract content of trading.tar in current directory. "x" is used for
extracting. "v" is again for verbose and optional parameter in all our example.
stock_trader@system:~/test/new ls -lrt
-r--r--r--
-r--r--r--
-rw-r--r--
Now you can see that all the files and directories which were included in tar file (stocks, equity and
currency) has been extracted successfully.
Now in our current directory we have both files and directories and we just want to include two files
equity and currency in our tar file.
stock_trader@system:~/test ls -lrt
-r--r--r--
-r--r--r--
-rw-r--r--
you see only two files equity and currency are included in our tar file.
In our previous example of Linux tar command we have created uncompressed tar file but most of the
time we also need to create compressed tar file using gzip or bzip2. In this example of tar command in
you see creating tar file with gzip is very easy just use "-z" option and it will crate a gzip tar. .tgz or
tar.gz extension is used to denote tar file with gzip. size of a compressed tar file is far less than
uncompressed one.
stock_trader@system:~/test ls -lrt
-r--r--r--
-r--r--r--
-rw-r--r--
you can also view contents of gzip tar file by using earlier command in combination of "z" option and
same is true for extracting content from gzip tar. below examples of unix tar command will show how
to view contents of .tgz or .tar.gz file in unix.
Similarly we can extract contents from a .tgz or .tar.gz file as shown in below example of unix tar
command :
equity
stocks/
stocks/online_stock_exchanges.txt
stock_trader@system:~/test/new ls -lrt
-r--r--r--
-r--r--r--
-rw-r--r--
.tar.bz2 is used to denote a tar file with bzip2 compression. for viewing contents of bzip2 tar file and
extracting content we can use as shown inexample of UNIX tar command with gzip compression,
just replace "-z" with "-j" for bzip2.
In previous examples of extracting contetns from tar file we have extracted everything. sometime we
just need a specific file from tar file. in this example of unix tar command we will extract a particular
file from a tar archive.
its simple just specify name of file in this case its "equity". if your tar file is gzip one then use "-z"
that's it. You can also use combination of grep and find command with tar to get more dynamic use.
How to extract group of file or directory from form .tar, .tar.gz or .tar.bzip2 in UNIX
--------------------------------------------------------------------------------------------------you can extract a group of file form .tar, .tar.gz or .tar.bzip2 in Unix by specifying a matching pattern
and using option "--wildcards". let's an example of tar command in unix with --wildcards
In above example of UNIX tar command we are extracting all files or directory which names starts
with "s".
Apparently can not update compressed archives.if you try to do you will get error "tar: Cannot
update compressed archives"
Size shown here is in KB and you can also calculate size for compressed tar file by using "z" for gzip
and "j" for bzip21. What is ldd?
sendmail
-e remove
3. What is the command for finding the highest memory occupied file in
Linux?
du ah / | sort n r | head n 1
du
-a
write
estimate
counts
for
file
files,
all
space
not
just
usage
directories
sort
lines
-n
compare
according
-r reverse the result of comparisons
head
-n number of lines
output
to
the
of
text
string
numerical
first
part
files
value
of
files
contains
contains
File systems
Contains
boot
which need
default
disk
to
mount at
run
parameters
boot
time
level
chattr
-iIu
example
100
ftp> ls l
9. I know ssh, telnet, dns,apache all are worked on TCP/UDP but i want to
know any one service which are working on UDP only?
snmptrap
snmptrap
simple
network
management
snmptrapd is an SNMP application that receives and logs
162/udp
protocol
trap
14. In my linux machine, i lost /etc/passwd file and /etc/shadow file, then how
can i recover it?
Normally in linux we must have backup by default for /etc/passwd and /etc/shadow files
/etc/passwd
>
/etc/passwd-
/etc/shadow > /etc/shadowfrom there we can copy or restore. If both are not available. Then follow below steps:
1.
2.
3.
4.
Single
check
user
mode
/etc/passwd
and
single
/etc/shadow
reboot
init=/bin/bash
]
files
5.
6. init 3 or reboot with init 3
are
pwconv
there
sync
15. what r the different command to check ram,process and hdd of linux
machine
To
#free
check
ram
To
#ps
in
check
your
system:
process
#top
To
check
hdd
#fdisk
#sfdisk -l
16.If i run ls command it will show me the junk output what is problem and
how to resolve it
Set your terminal setting by stty and before that, export ls command to PATH variable
17. WHAT IS THE MEANING OF AIX
AIX (Advanced Interactive eXecutive) is an open operating system from IBM which is
based on a version of UNIX. AIX/ESA was designed for IBMs System/390 or large server
hardware platform. AIX/6000 is an operating system that runs on IBMs workstation
platform, the RISC System/6000.
18. Why ls -F dev/log file output indicate as = sign at end of the file name?
Standard output
19. What is nis server?
NIS is a service that provides any user on a network with the same working environment
irrespective of the system on that network, which has been used for login purpose.
For example if NIS server is set up in a single system and configured to hold user
accounts and their passwords and access information. Then any user on that network
can login to his/her account from any system (with nis client running) on that configured
network. This gives a look and feel that the user is logged into his/her own system. But
actually its the account on the NIS server that is mounted on the local sytem user login.
20. What command can you use to review boot messages?
Dmesg
21. Who invented unix?
Unix was created in 1969 by Ken Thompson and Dennis Ritchie at Bell Laboratories.
22. Write a cron entry for the following scenario:- At 10:30 AM for every
Sunday of every 1st month of a quarter.
30 10 * 1-12/3 7
23. What is the difference between RHEL4 & RHEL5?
RHEL4:
No
yum
server,
Selinux,
secure,
RHEL5: yum server, advanced selinux, more secure, virtualization
no
cd
key
24. What is the command to make a process to run in the foreground from
background?
When the process is running, press control+Z. Now at the command prompt, type
bg
25. What are the init levels in Linux?
7 level
server
Apache
nfs /var/lib/nfs/rmtab
/var/log/mail/maillog
[RedHat,centos]
/var/log/secure
/var/log/http/access.log
4. How to FTP user access other directory except his own home directory?
vim
Chroot_list_enable=yes
5. What are the Linux-based security tools?
Selinux
Firewall
iptables
Tcp-wrappers
6. What are the basic elements of firewall?
/etc/vsftpd/vsftpd.conf
A firewall should be able to filter packets (drop/pass them) based on certain rules
specified by the user. The rules may be used to identify an incoming packet to the
computer or outgoing packet from the computer, it can be based on target port
number/ip add , traffic from a particular Network card etc
The firewall rules can be in a tabular form (saved on the disk) from where the firewall
software can read them and implement it. iptables firewall on Linux is a great example
7. What is a command to display top 10 users who are using huge space?
du -sh /home/* | sort -r | head -10
8. How do find all failed login attempts via ssh?
tail -f /var/log/secure | grep Failed
9. How do you configure Linux system as a router?
vim
/etc/sysctl.conf
net.ipv4.ip_forward=1
system-config-network
eth0
255.255.255.0
192.168.1.120
eth0:1
172.24.0.1
255.255.0.0
172.24.0.1 192.168.1.120
10. What is the UID and GID of root user? Can a normal user can change the
ownership of a file? What is the command to change ownership of a file?
The root UID/GID is 0 (zero). Which is why he can able to intervene in all normal users
files even though he dont had permission. A normal user will dont have the permission
to change ownership of file. The command to change ownership is < chown user.user
file >
11. What is the diff b/w ext2 and ext3?
Ext3 is a tiny bit slower than ext2 is, but it holds tremendous advantages. There is really
only one difference between ext2 and ext3, and that is that ext3 uses a journal to
prevent filesystem corruption in the case of an unclean shutdown (ie. before the
filesystem is synced to disk). That makes ext3 a bit slower than ext2 since all metadata
changes are written to the journal, and then flushed to disk, but on the other hand you
dont risk having the entire filesystem destroyed at power failure or if an unwitted
person turns the computer off uncleanly. You dont have to check the filesystem after an
unclean shutdown either. Ext3 has three levels of journalling. Metadata (ie. internal
filesystem structures) are always journalled, so that the filesystem itself is never
corrupted. How ordinary data is written to the file system is controllable, though. The
default option is the ordered mode, which causes file contents to be written to the
filesystem before metadata is even committed to the journal. The highest reliable mode
is called the journal mode, which causes file data to be committed to the journal
before it is flushed to its final place, like the metadata. The least reliable mode, but
rumoured to be the fastest, is called the writeback mode, which makes no promises at
all regarding the consistency of file data. Only metadata is output reliably in writeback
mode. So as for anything else, its mainly a matter of priority. If you dont want ultimate
speed, go with ext3. If you need the highest speed that is theoratically aquirable
though, then go with ext2. For that to be effective youll probably need a really
advanced hard drive controller, though.
12. As the system administrator you need to review Bobs cronjobs. What
command would you use?
crontab lu Bob
13. What command is used to remove the password assigned to a group?
gpasswd r groupname
14. What are the different RAID levels?
RAID
RAID
level
level
RAID
level
1
2
RAID
RAID
level
level
3
4
RAID
RAID
level
level
5
6
RAID
RAID
0
level
level
10
RAID level 50
15. How do you create a swapfile?
dd
if=/dev/zero
mkswap
swapon /swapfile
16. What does nslookup do?
of=/swapfile
bs=1024
count=200M
/swapfile
Nslookup is a program used to find information about internet Domain Name server.
The
two
modes
of
nslookup
are:
Interactive
and
non-interactive.
Using interactive mode user can query the name servers for the information pertaining
to
hosts
and
domains.
Using non-interactive mode the user can just print the name and requested
information of a host.
17. What is the difference between UDP and TCP?
TCP
is
Transmission
Control
UDP
is
a
User
There are four major differences between UDP and TCP:
Protocol.
Datagram
Protocol.
remove
the
remove
remove
entry
on
LVM
VG
/etc/fstab
file
&
save
lvremove
vgremove
quit.
lvname
vgname
vi /etc/samba/smb.conf
comment
path
valid
windows
=
users
writable
browseable = yes
sharing
path/your/share/directory
surendra
yes
-a
username
smb
restart
smbpasswd -e username
service
chkconfig smb on
21. How to schedule cron backup to run on 4th Saturday of month?
* * * * 6 weekdaynum 4 && sh /backup/test.sh
22. What is an inode?
ext2 and ext3 file systems keep a list of the files they contain in a table called an inode
table. The inode is referenced by its number. This is unique within a file system.
The inode contains the metadata about files. Among the data stored in the inode is
File type
File permissions
Link count
User ID number of the file owner and the group ID number of the associated group
Last modification time
Location of the data on the hard disk
Other metadata about the file
ls -li view inode number only
Uptime
System
Find
out
Tell
ps
free
iostat
sar
Process
Activity,
Hardware
Activity
and
System
Who
Is
Logged
on
And
What
They
Are
Doing
How
Long
the
System
Has
Been
Running
Displays
the
Processes
Usage
Memory
Average
Collect
Command
Information
CPU
Load,
Report
and
mpstat
Disk
System
Multiprocessor
Activity
Activity
Usage
and
iptraf
tcpdump
ss
Real-time
Detailed
Network
Network
Statistics
Network
Traffic
Statistics
Analysis
Kernel
Statistics
file
system
Various
#
#
cat
cat
/proc/cpuinfo
/proc/meminfo
#
# cat /proc/mounts
cat
/proc/zoneinfo
Nagios
Cacti
Server
And
Web-based
Network
Monitoring
Monitoring
Tool
Gnome
System
Monitor
Real-time
28. What is mean by system calls?
Systems
Reporting
and
Graphing
A system call is the mechanism used by an application program to request service from
the operating system.
On Unix-based and POSIX-based systems, popular system calls are open, read, write,
close, wait, exec, fork, exit, and kill. Many of todays operating systems have hundreds
of system calls. For example, Linux has 319 different system calls. FreeBSD has about
the same (almost 330). Tools such as strace and truss report the system calls made by a
running process.
29. Important port no:
NFS
FTP
2049
21
SAMBA
SSH
445
22
DNS
POP3
53
110
IMAP
HTTPS
143
443
HTTP 80
30. How do u extract files from iso cd images in linux?
mount o loop disk1.iso /mnt/iso