Monday, June 25, 2012

SharePoint Interview Questions with Answers part 2

SharePoint Interview Questions with Answers

Q.What are the features of the new Content management in Office SharePoint 2007?
Ans: The new and enhanced content management features in Office SharePoint Server 2007 fall within three areas:
* Document management
* Records management.
* Web content managementOffice SharePoint Server 2007 builds on the core document management functionality providedby Windows SharePoint Services 3.0, including check in and check out, versioning, metadata, and role-based granular access controls. Organizations can use this functionality to deliver enhancedauthoring, business document processing, Web content management and publishing, recordsmanagement, policy management, and support for multilingual publishing.
Q.Does a SharePoint Web site include search functionality?
Ans: Yes. SharePoint Team Services provides a powerful text-based search feature that helps you finddocuments and information fast.
Q.What are the benefits of Microsoft Office SharePoint Server 2007?
Ans: * Provide a simple, familiar, and consistent user experience.* Boost employee productivity by simplifying everyday business activities.* Help meet regulatory requirements through comprehensive control over content.* Effectively manage and repurpose content to gain increased business value.* Simplify organization-wide access to both structured and unstructured information acrossdisparate systems.* Connect people with information and expertise.* Accelerate shared business processes across organizational boundaries.* Share business data without divulging sensitive information.* Enable people to make better-informed decisions by presenting business-critical information inone central location.* Provide a single, integrated platform to manage intranet, extranet, and Internet applicationsacross the enterprise.
Q.Will SharePoint Portal Server and Team Services ever merge?
Ans: The products will come together because they are both developed by the Office team.
Q.What does partial trust mean the Web Part developer?
Ans: If an assembly is installed into the BIN directory, the code must be ensured that provides errorhandling in the event that required permissions are not available. Otherwise, unhandled securityexceptions may cause the Web Part to fail and may affect page rendering on the page where theWeb Part appears.
Q.How can I raise the trust level for assemblies installed in the BIN directory?
Ans: Windows SharePoint Services can use any of the following three options from ASP.NET and the CLR to provide assemblies installed in the BIN directory with sufficient permissions. The following table outlines the implications and requirements for each option.
1.Option Pros Cons Increase the trust level for the entire virtual server.
In a development environment,increasing the trust level allows you to test an assembly with increased permissions while allowing you to recompile assemblies directly into the BIN directory without resetting IIS. This option is least secure. This option affects all assemblies used by the virtual server.There is no guarantee the destination server has the required trust level. Therefore, Web Parts may not work once installed on the destination server.
2.Create a custom policy file for your assemblies. For more information, see "How do I create acustom policy file?" Recommended approach.This option is most secure.An assembly can operate with a unique policy that meets the minimum permission requirementsfor the assembly.By creating a custom security policy, you can ensure the destination server can run your WebParts.
3.Requires the most configuration of all three options.Install your assemblies in the GACEasy to implement.This grants Full trust to your assembly without affecting the trust level of assemblies installed inthe BIN directory.This option is less secure.Assemblies installed in the GAC are available to all virtual servers and applications on a serverrunning Windows SharePoint Services. This could represent a potential security risk as itpotentially grants a higher level of permission to your assembly across a larger scope thannecessaryIn a development environment, you must reset IIS every time you recompile assemblies.Licensing issues may arise due to the global availability of your assembly.
Q. Does SharePoint work with NFS?
Ans: Yes and no.
It can crawl documents on an NFS volume, but the sharepoint database or logs cannotbe stored there.
Q.How is SharePoint Portal Server different from the Site Server?
Ans: Site Server has search capabilities but these are more advanced using SharePoint. SPS uses digital dashboard technology which provides a nice interface for creating web parts and showing them ondashboards (pages). SS doesn't have anything as advanced as that. The biggest difference wouldbe SPS document management features which also integrate with web folders and MS Office.

SharePoint Interview Questions with Answers part 1

SharePoint Interview Questions with Answers

Q. 1 What is the difference between SharePoint Portal Server and Windows SharePoint Services?

Ans: SharePoint Portal Server is the global portal offering features like global navigation and searching.Windows SharePoint Services is more content management based with document libraries andlists. You apply information to certain areas within your portal from windows sharepoint Services or directly to portal areas.

Q2. What is a document library?

Ans: A document library is where you upload your core documents. They consist of a row and columnview with links to the documents. When the document is updated so is the link on your site. Youcan also track metadata on your documents. Metadata would consist of document properties.

Q3. What is a meeting workspace?

Ans: A meeting workspace is a place to store information, attendees, and tasks related to a specificmeeting.

Q4. What is a document workspace?

Ans: Document workspaces consist of information surrounding a single or multiple documents.

Q5. What is the difference between a document library and a form library?

Ans:Document libraries consist of your core documents. An example would be a word document,excel, Powerpoint, visio, pdf, etc… Form libraries consist of XML forms.

Q6. What is a web part zone?

Ans: Web part zones are what your web parts reside in and help categorize your web parts when designing a page.

Q7. How is security managed in SharePoint?

Ans: Security can be handled at the machine,domain, or sharepoint level.

Q8. How are web parts developed?

Ans: Web parts are developed in Visual Studio .Net. VS.Net offers many web part and page templates and can also be downloaded from the Microsoft Site.

Q9. What is a site definition?

Ans: It’s a methods for providing prepackaged site and list content.

Q 10.What is a template?

A template is a pre-defined set of functions or settings that can be used over time. There are manytemplates within SharePoint,Site Templates, Document Templates, Document Library and ListTemplates.

Q11. How do you install web parts?

Ans: Web Parts should be distributed as a .CAB (cabinet) file using the MSI Installer.

Q 12.What is CAML?

Ans: CAML stands for Collaborative Application Markup Language and is an XML-based languagethat is used in Microsoft Windows SharePoint Services to define sites and lists, including, for Eg, fields, views, or forms, but CAML is also used to define tables in the Windows SharePoint Servies database during site provisioning.

Q 13.What is a DWP?

Ans: The file extension of a web part.

Q 14.What is the GAC?

Ans: Global Assembly Cache folder on the server hosting SharePoint. You place your assemblies there for web parts and services to share them.

Q 15.What are the differences between web part page gallery, site gallery,Virtual server galleryand online gallery?

Ans: Web Part Page Gallery is the default gallery that comes installed with SharePoint. Site Gallery isspecific to one site. Virtual Server gallery is specific to that virtual server and online gallery aredownloadable web parts from Microsoft.

Q 16.What is the difference between a site and a web?

Ans: The pages in a web site generally cover one or more topics and are interconnected through hyperlinks. Most Websites have a home page as their starting point. While a Web is simply a blank site with SharePoint functionality built in; meaning you have to create the site from the ground up.

Q17. What is Microsoft Windows SharePoint Services? How is it related to Microsoft OfficeSharePoint Server 2007?

Ans: Windows SharePoint Services is the solution that enables you to create Web site for information sharing and document collaboration. Windows SharePoint Services — a key piece of theinformation worker infrastructure delivered in Microsoft Windows Server 2003 — providesadditional functionality to the Microsoft Office system and other desktop applications, and itserves as a platform for application development.Office SharePoint Server 2007 builds on top of Windows SharePoint Services 3.0 to provideadditional capabilities including collaboration, portal, search,Enterprise content management,business process and forms, and business intelligence.

Q18. Who is Office SharePoint server 2007 designed for?

Ans: Office SharePoint Server 2007 can be used by information workers, IT administrators, and application developers.

Q19. What are the main benefits of Office SharePoint Server 2007?

Ans: Office SharePoint Server 2007 provides a single integrated platform to manage intranet, extranet,and Internetapplications across the enterprise.

* Business users gain greater control over the storage, security, distribution, and management oftheir electronic content, with tools that are easy to use and tightly integrated into familiar,everyday applications.

* Organizations can accelerate shared business processes with customers and partners acrossorganizational boundaries using InfoPath Forms Services–driven solutions.

* Information workers can find information and people efficiently and easily through thefacilitated information-sharing functionality and simplified content publishing. In addition, accessto back-end data is achieved easily through a browser, and views into this data can bepersonalized.

* Administrators have powerful tools at their fingertips that ease deployment, management, and system administration, so they can spend more time on strategic tasks.

* Developers have a rich platform to build a new class of applications, called Office BusinessApplications, that combine powerful developer functionality with the flexibility and ease ofdeployment of Office SharePoint Server 2007. Through the use of out-of-the-box applicationservices, developers can build richer applications with less code.

Q20. What is the difference between Microsoft Office SharePoint Server 2007 for Internet sites and Microsoft Office SharePoint Server 2007?

Ans: Microsoft Office SharePoint Server 2007 for Internet sites and Microsoft Office SharePoint Server2007 have identical feature functionality. While the feature functionality is similar, the usagerights are different.If you are creating an Internet, or Extranet, facing website, it is recommended that you useMicrosoft Office SharePoint Server 2007 for Internet sites which does not require the purchase client access licenses. Websites hosted using an “Internet sites” edition can only be used forInternet facing websites and all content, information, and applications must be accessible to nonemployees.Websites hosted using an “Internet sites” edition cannot be accessed by employees creating, sharing, or collaborating on content which is solely for internal use only, such as an Intranet Portal scenario.

Q21.What suites of the 2007 Microsoft Office system work with Office SharePoint Server 2007?

Ans: Office Outlook 2007 provides bidirectional offline Synchronization with SharePoint documentlibraries, discussion groups, contacts, calendars, and tasks.vabnix.page.tlMicrosoft Office Groove 2007, included as part of Microsoft Office Enterprise 2007, will enablebidirectional offline synchronization with SharePoint document libraries.Features such as the document panel and the ability to publish to Excel Services will only beenabled when using Microsoft Office Professional Plus 2007or Office Enterprise 2007.Excel Services will only work with documents saved in the new Office Excel 2007 file format(XLSX).

Q22. How do I invite users to join a Windows SharePoint Services Site? Is the site secure?

Ans: SharePoint-based Web sites can be password-protected to restrict access to registered users, whoare invited to join via e-mail. In addition, the site administrator can restrict certain members' rolesby assigning different permission levels to view post and edit.

Q23. Can I post any kind of document?

Ans: You can post documents in many formats, including .pdf, .htm and .doc. In addition, if you areusing Microsoft Office XP, you can save documents directly to your Windows SharePointServices site.

Q24. Can I create custom templates?

Ans: Yes you can. You can have templates for business plans, doctor's office, lawyer's office etc.

Q25. How can I make My site public?

Ans: By default, all sites are created private.If you want your site to be a public Web site, enable anonymous access for the entire site. Then you can give out your URL to anybody in yourbusiness card, e-mail or any other marketing material. The URL for your Web site will be:http:// yoursitename.wss.bcentral.comHence, please take special care to name your site.These Web sites are ideal for information and knowledge intensive sites and/or sites where youneed to have shared Web workspace.Remember: Under each parent Web site, you can create up to 10 sub-sites each with uniquepermissions, settings and security rights.

Q26. How do the sub sites work?

Ans: You can create a sub site for various categories.

For example:* Departments - finance, marketing, IT* Products - electrical, mechanical, hydraulics* Projects - Trey Research, Department of Transportation, FDA* Team - Retention team, BPR team* Clients - new clients, old clients* Suppliers - Supplier 1, Supplier 2, Supplier 3* Customers - Customer A, Customer B, Customer C* Real estate - property A, property BThe URLs for each will be, for example:* http://yoursitename.wss.bcentral.com/finance* http://yoursitename.wss.bcentral.com/marketingYou can keep track of permissions for each team separately so that access is restricted whilevabnix.page.tlmaintaining global access to the parent site.

Q27.How do I make my site non-restricted?

Ans: If you want your site to have anonymous access enabled (i.e., you want to treat it like any site onthe Internet that does not ask you to provide a user name and password to see the content of thesite), follow these simple steps:

# Login as an administrator

# Click on site settings

# Click on Go to Site Administration

# Click on Manage anonymous access

# Choose one of the three conditions on what Anonymous users can access:** Entire Web site** Lists and libraries** NothingDefault condition is nothing; your site has restricted access.

The default conditions allow you to create a secure site for your Web site.

Q28. Can I ask users outside of my organization to participate in my Windows SharePointServices site?

Ans: Yes. You can manage this process using the Administration Site Settings. Simply add users via their e-mail alias and assign permissions such as Reader or Contributor.

Q29. Are there any restrictions or requirements for accessing the Windows SharePoint Services?

Ans: No. There are no system or bandwidth limitations for international trial users. Additionallylanguage packs have been installed which allow users to set up sub-webs in languages other thanEnglish. These include: Arabic, Danish, Dutch, Finnish, French, German, Hebrew, Italian,Japanese, Polish, Portuguese (Brazilian), Spanish and Swedish.

Q30. Are there any browser recommendations?

Ans: Yes. Microsoft recommends using the following browsers for viewing and editing WindowsSharePoint Services sites: Microsoft Internet Explorer 5.01 with Service Pack 2, MicrosoftInternet Explorer 5.5 with Service Pack 2, Internet Explorer 6, Netscape Navigator


Q31.What security levels are assigned to users?

Ans: Security levels are assigned by the administrator who is adding the user. There are four levels bydefault and additional levels can be composed as necessary.

* Reader - Has read-only access to the Web site.

* Contributor - Can add content to existing document libraries and lists.

* Web Designer - Can create lists and document libraries and customize pages in the Web site.

* Administrator - Has full control of the Web site.

Q32.What is the difference between an Internet and an intranet site?

Ans: An internet site is a normal site that anyone on the internet can access (e.g., www.msn.com, www.microsoft.com, etc.). You can set up a site for your company that can be accessed by anyonewithout any user name and password.An intranet (or internal network), though hosted on the Web, can only be accessed by people whoare members of the network. They need to have a login and password that was assigned to them when they were added to the site by the site administrator.

Q33. What is a workspace?

Ans: A site or workspace is when you want a new place for collaborating on Web pages, lists anddocument libraries. For example, you might create a site to manage a new team or project,collaborate on a document or prepare for a meeting.

Q34.How customizable is the user-to-user access?

Ans: User permissions apply to an entire Web, not to documents themselves. However, you can haveadditional sub webs that can optionally have their own permissions. Each user can be given any offour default roles. Additional roles can be defined by the administrator.

Q35.Can each user have access to their own calendar?

Ans: Yes there are two ways to do this,

* by creating a calendar for each user, or

* by creating a calendar with a view for each user.

Q36. What types of files can I upload / post to the site?

Ans: The only files restricted are those ending with the following extensions: .asa, .asp, .ida, .idc, .idq.Microsoft reserves the right to add additional file types to this listing at any time. Also, no content that violates the terms of service may be uploaded or posted to the site.

Q37.Can SharePoint be linked to an external data source?

Ans: SharePoint data can be opened with Access and Excel as an external data source. Thus, SharePoint can be referenced as an external data source. SharePoint itself cannot reference an external datasource.

Q38. Can SharePoint be linked to a SQL database?

Ans: This is possible via a custom application, but it not natively supported by SharePoint or SQLServer.

Q39.Can I customize my Windows SharePoint Services site?

Ans: YES! Windows SharePoint Services makes updating sites and their content from the browser easier then ever.SharePoint includes tools that let you create custom lists, calendars, page views, etc. You can apply a theme; add List, Survey and Document Library Web Parts to a page; create personalviews; change logos; connect Web Parts and more.To fully customize your site, you can use Microsoft FrontPage 2003. Specifically, you can useFrontPage themes and shared borders, and also use FrontPage to create photo galleries and top tenlists, utilize standard usage reports, and integrate automatic Web content.

Q40. Will Microsoft Office SharePoint Server 2007 run on a 64-bit version of MicrosoftWindows?Ans: Windows SharePoint Services 3.0, Office SharePoint Server 2007, Office Forms Server 2007, andOffice SharePoint Server 2007 for Search will support 64-bit versions of Windows Server 2003.

Q41. What are the features that the portal components of Office SharePoint Server 2007 include?

Ans: The portal components of Office SharePoint Server 2007 include features that are especially useful for designing, deploying, and managing enterprise intranet portals, corporate Internet Websites, and divisional portal sites. The portal components make it easier to connect to people withinthe organization who have the right skills, knowledge, and project experience.

Q42.What are the advanced features of MOSS 2007?

Ans: * User Interface (UI) and navigation enhancements

* Document management enhancements

* The new Workflow engine

* Office 2007 Integration

* New Web Parts

* New Site-type templates

* Enhancements to List technology

* Web Content Management

* Business Data Catalog

* Search enhancements

* Report Center

* Records Management

* Business Intelligence and Excel Server

* Forms Server and InfoPath

* The “Features” feature

* Alternate authentication providers and Forms-based authentication

Sunday, June 24, 2012

Linux Interview Questions and Answers part 2

Linux Interview Questions and Answers part 2



What key combination can you press to suspend a running job and place it in the background?
ctrl-z

Using ctrl-z will suspend a job and put it in the background.
The easiest, most basic form of backing up a file is to _____ it to another location. 
copy

The easiest most basic form of backing up a file is to make a copy of that file to another location such as a floppy disk.
What type of server is used to remotely assign IP addresses to machines during the installation process? 
A) SMB
B) NFS
C) DHCP
D) FT
E) HTTP


C - You can use a DHCP server to assign IP addresses to individual machines during the installation process. Answers a, b, d, and e list legitimate Linux servers, but these servers do not provide IP addresses. The SMB, or Samba, tool is used for file and print sharing across multi-OS networks. An NFS server is for file sharing across Linux net-works. FTP is a file storage server that allows people to browse and retrieve information by logging in to it, and HTTP is for the Web.
Which password package should you install to ensure that the central password file couldn't be stolen easily? 
A) PAM
B) tcp_wrappers
C) shadow
D) securepass
E) ssh


C - The shadow password package moves the central password file to a more secure location. Answers a, b, and e all point to valid packages, but none of these places the password file in a more secure location. Answer d points to an invalid package.
When using useradd to create a new user account, which of the following tasks is not done automatically.
Choose one:
a. Assign a UID.
b. Assign a default shell.
c. Create the user's home directory.
d. Define the user's home directory.


c

The useradd command will use the system default for the user's home directory. The home directory is not created, however, unless you use the -m option.
You want to enter a series of commands from the command-line. What would be the quickest way to do this? 
Choose One
a. Press enter after entering each command and its arguments
b. Put them in a script and execute the script
c. Separate each command with a semi-colon (;) and press enter after the last command
d. Separate each command with a / and press enter after the last command


c

The semi-colon may be used to tell the shell that you are entering multiple commands that should be executed serially. If these were commands that you would frequently want to run, then a script might be more efficient. However, to run these commands only once, enter the commands directly at the command line.
You attempt to use shadow passwords but are unsuccessful. What characteristic of the /etc/passwd file may cause this? 
Choose one:
a. The login command is missing.
b. The username is too long.
c. The password field is blank.
d. The password field is prefaced by an asterisk. 


c

The password field must not be blank before converting to shadow passwords.
When you install a new application, documentation on that application is also usually installed. Where would you look for the documentation after installing an application called MyApp?
Choose one:
a. /usr/MyApp
b. /lib/doc/MyApp
c. /usr/doc/MyApp
d. In the same directory where the application is installed.


c

The default location for application documentation is in a directory named for the application in the /usr/doc directory.
What file would you edit in your home directory to change which window manager you want to use? 
A) Xinit
B) .xinitrc
C) XF86Setup
D) xstart
E) xf86init


Answer: B - The ~/.xinitrc file allows you to set which window man-ager you want to use when logging in to X from that account.
Answers a, d, and e are all invalid files. Answer c is the main X server configuration file.
What command allows you to set a processor-intensive job to use less CPU time? 
A) ps
B) nice
C) chps
D) less
E) more


Answer: B - The nice command is used to change a job's priority level, so that it runs slower or faster. Answers a, d, and e are valid commands but are not used to change process information. Answer c is an invalid command.
While logged on as a regular user, your boss calls up and wants you to create a new user account immediately. How can you do this without first having to close your work, log off and logon as root? 
Choose one:
a. Issue the command rootlog.
b. Issue the command su and type exit when finished.
c. Issue the command su and type logoff when finished.
d. Issue the command logon root and type exit when finished. 


Answer: b
You can use the su command to imitate any user including root. You will be prompted for the password for the root account. Once you have provided it you are logged in as root and can do any administrative duties.

There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the correct order?
Choose one:
a. username, UID, GID, home directory, command, comment
b. username, UID, GID, comment, home directory, command
c. UID, username, GID, home directory, comment, command
d. username, UID, group name, GID, home directory, comment
Answer: b
The seven fields required for each line in the /etc/passwd file are username, UID, GID, comment, home directory, command. Each of these fields must be separated by a colon even if they are empty.
Which of the following commands will show a list of the files in your home directory including hidden files and the contents of all subdirectories?
Choose one:
a. ls -c home
b. ls -aR /home/username
c. ls -aF /home/username
d. ls -l /home/username


Answer: b
The ls command is used to display a listing of files. The -a option will cause hidden files to be displayed as well. The -R option causes ls to recurse down the directory tree. All of this starts at your home directory.
In order to prevent a user from logging in, you can add a(n) ________at the beginning of the password field. 
Answer: asterick

If you add an asterick at the beginning of the password field in the /etc/passwd file, that user will not be able to log in.
You have a directory called /home/ben/memos and want to move it to /home/bob/memos so you issue the command mv /home/ben/memos /home/bob. What is the results of this action?
Choose one:
a. The files contained in /home/ben/memos are moved to the directory /home/bob/memos/memos.
b. The files contained in /home/ben/memos are moved to the directory /home/bob/memos.
c. The files contained in /home/ben/memos are moved to the directory /home/bob/.
d. The command fails since a directory called memos already exists in the target directory. 


Answer: a
When using the mv command to move a directory, if a directory of the same name exists then a subdirectory is created for the files to be moved.
Which of the following tasks is not necessary when creating a new user by editing the /etc/passwd file? 
Choose one:
a. Create a link from the user's home directory to the shell the user will use.
b. Create the user's home directory
c. Use the passwd command to assign a password to the account.
d. Add the user to the specified group.


Answer: a
There is no need to link the user's home directory to the shell command. Rather, the specified shell must be present on your system.
You issue the following command useradd -m bobm But the user cannot logon. What is the problem?
Choose one:
a. You need to assign a password to bobm's account using the passwd command.
b. You need to create bobm's home directory and set the appropriate permissions.
c. You need to edit the /etc/passwd file and assign a shell for bobm's account.
d. The username must be at least five characters long.


Answer: a
The useradd command does not assign a password to newly created accounts. You will still need to use the passwd command to assign a password.
You wish to print the file vacations with 60 lines to a page. Which of the following commands will accomplish this? Choose one:
a. pr -l60 vacations | lpr
b. pr -f vacations | lpr
c. pr -m vacations | lpr
d. pr -l vacations | lpr


Answer: a
The default page length when using pr is 66 lines. The -l option is used to specify a different length.
Which file defines all users on your system? 
Choose one:
a. /etc/passwd
b. /etc/users
c. /etc/password
d. /etc/user.conf


Answer: a
The /etc/passwd file contains all the information on users who may log into your system. If a user account is not contained in this file, then the user cannot log in.
Which two commands can you use to delete directories? 
A) rm
B) rm -rf
C) rmdir
D) rd
E) rd -rf


Answer(s): B, C - You can use rmdir or rm -rf to delete a directory. Answer a is incorrect, because the rm command without any specific flags will not delete a directory, it will only delete files. Answers d and e point to a non-existent command.
Which partitioning tool is available in all distributions? 
A) Disk Druid
B) fdisk
C) Partition Magic
D) FAT32
E) System Commander


Answer(s): B - The fdisk partitioning tool is available in all Linux distributions. Answers a, c, and e all handle partitioning, but do not come with all distributions. Disk Druid is made by Red Hat and used in its distribution along with some derivatives. Partition Magic and System Commander are tools made by third-party companies. Answer d is not a tool, but a file system type. Specifically, FAT32 is the file system type used in Windows 98.
Which partitions might you create on the mail server's hard drive(s) other than the root, swap, and boot partitions? 
[Choose all correct answers]
A) /var/spool
B) /tmp
C) /proc
D) /bin
E) /home

Answer(s): A, B, E - Separating /var/spool onto its own partition helps to ensure that if something goes wrong with the mail server or spool, the output cannot overrun the file system. Putting /tmp on its own partition prevents either software or user items in the /tmp directory from overrunning the file system. Placing /home off on its own is mostly useful for system re-installs or upgrades, allowing you to not have to wipe the /home hierarchy along with other areas. Answers c and d are not possible, as the /proc portion of the file system is virtual-held in RAM-not placed on the hard drives, and the /bin hierarchy is necessary for basic system functionality and, therefore, not one that you can place on a different partition.
When planning your backup strategy you need to consider how often you will perform a backup, how much time the backup takes and what media you will use. What other factor must you consider when planning your backup strategy? _________ 

what to backup
Choosing which files to backup is the first step in planning your backup strategy.
What utility can you use to automate rotation of logs? 
Answer: logrotate
The logrotate command can be used to automate the rotation of various logs.
In order to display the last five commands you have entered using the history command, you would type___________ .

Answer: history 5
The history command displays the commands you have previously entered. By passing it an argument of 5, only the last five commands will be displayed.
What command can you use to review boot messages? 
Answer: dmesg
The dmesg command displays the system messages contained in the kernel ring buffer. By using this command immediately after booting your computer, you will see the boot messages.
What is the minimum number of partitions you need to install Linux? 
Answer: 2
Linux can be installed on two partitions, one as / which will contain all files and a swap partition.
What is the name and path of the main system log? 
Answer: /var/log/messages
By default, the main system log is /var/log/messages.
Of the following technologies, which is considered a client-side script? 
A) JavaScript
B) Java
C) ASP
D) C++


Answer: A - JavaScript is the only client-side script listed. Java and C++ are complete programming languages. Active Server Pages are parsed on the server with the results being sent to the client in HTML

Linux Interview Questions and Answers



Linux Interview Questions and Answers part 1


You need to see the last fifteen lines of the files dog, cat and horse. What command should you use?tail -15 dog cat horse


The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file.
Who owns the data dictionary? 
The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created.
You routinely compress old log files. You now need to examine a log from two months ago. In order to view its contents without first having to decompress it, use the _________ utility. 
zcat


The zcat utility allows you to examine the contents of a compressed file much the same way that cat displays a file.
You suspect that you have two commands with the same name as the command is not producing the expected results. What command can you use to determine the location of the command being run? 
which


The which command searches your path until it finds a command that matches the command you are looking for and displays its full path.
You locate a command in the /bin directory but do not know what it does. What command can you use to determine its purpose. 
whatis


The whatis command displays a summary line from the man page for the specified command.
You wish to create a link to the /data directory in bob's home directory so you issue the command ln /data /home/bob/datalink but the command fails. What option should you use in this command line to be successful. 
Use the -F option


In order to create a link to a directory you must use the -F option.
When you issue the command ls -l, the first character of the resulting display represents the file's___________. 
type


The first character of the permission block designates the type of file that is being displayed.
What utility can you use to show a dynamic listing of running processes? __________ 
top


The top utility shows a listing of all running processes that is dynamically updated.
Where is standard output usually directed? 
to the screen or display


By default, your shell directs standard output to your screen or display.
You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type? 
tar xf MyBackup.tar memo.ben


This command uses the x switch to extract a file. Here the file memo.ben will be restored from the tarfile MyBackup.tar.
You need to view the contents of the tarfile called MyBackup.tar. What command would you use?
tar tf MyBackup.tar


The t switch tells tar to display the contents and the f modifier specifies which file to examine.
You want to create a compressed backup of the users' home directories. What utility should you use? 
tar


You can use the z modifier with tar to compress your archive at the same time as creating it.
What daemon is responsible for tracking events on your system? 
syslogd


The syslogd daemon is responsible for tracking system information and saving it to specified log files.
You have a file called phonenos that is almost 4,000 lines long. What text filter can you use to split it into four pieces each 1,000 lines long? 
split


The split text filter will divide files into equally sized pieces. The default length of each piece is 1,000 lines.
You would like to temporarily change your command line editor to be vi. What command should you type to change it? 
set -o vi


The set command is used to assign environment variables. In this case, you are instructing your shell to assign vi as your command line editor. However, once you log off and log back in you will return to the previously defined command line editor.
What account is created when you install Linux? 
root


Whenever you install Linux, only one user account is created. This is the superuser account also known as root.
What command should you use to check the number of files and disk space used and each user's defined quotas? 


repquota


The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space.

In order to run fsck on the root partition, the root partition must be mounted as readonly


You cannot run fsck on a partition that is mounted as read-write.
In order to improve your system's security you decide to implement shadow passwords. What command should you use? 
pwconv


The pwconv command creates the file /etc/shadow and changes all passwords to 'x' in the /etc/passwd file.
Bob Armstrong, who has a username of boba, calls to tell you he forgot his password. What command should you use to reset his command? 
passwd boba


The passwd command is used to change your password. If you do not specify a username, your password will be changed.
The top utility can be used to change the priority of a running process? Another utility that can also be used to change priority is ___________
nice


Both the top and nice utilities provide the capability to change the priority of a running process.
What command should you type to see all the files with an extension of 'mem' listed in reverse alphabetical order in the /home/ben/memos directory. 
ls -r /home/ben/memos/*.mem


The -c option used with ls results in the files being listed in chronological order. You can use wildcards with the ls command to specify a pattern of filenames.
What file defines the levels of messages written to system log files? 
kernel.h


To determine the various levels of messages that are defined on your system, examine the kernel.h file.
What command is used to remove the password assigned to a group? 
gpasswd -r


The gpasswd command is used to change the password assigned to a group. Use the -r option to remove the password from the group.
What command would you type to use the cpio to create a backup called backup.cpio of all the users' home directories? 
find /home | cpio -o > backup.cpio


The find command is used to create a list of the files and directories contained in home. This list is then piped to the cpio utility as a list of files to include and the output is saved to a file called backup.cpio.
What can you type at a command line to determine which shell you are using? 
echo $SHELL


The name and path to the shell you are using is saved to the SHELL environment variable. You can then use the echo command to print out the value of any variable by preceding the variable's name with $. Therefore, typing echo $SHELL will display the name of your shell.
What type of local file server can you use to provide the distribution installation materials to the new machine during a network installation?
A) Inetd
B) FSSTND
C) DNS
D) NNTP
E) NFS 

E - You can use an NFS server to provide the distribution installation materials to the machine on which you are performing the installation. Answers a, b, c, and d are all valid items but none of them are file servers. Inetd is the superdaemon which controls all intermittently used network services. The FSSTND is the Linux File System Standard. DNS provides domain name resolution, and NNTP is the transfer protocol for usenet news.
If you type the command cat dog & > cat what would you see on your display? Choose one:
a. Any error messages only.
b. The contents of the file dog.
c. The contents of the file dog and any error messages.
d. Nothing as all output is saved to the file cat. 

d


When you use & > for redirection, it redirects both the standard output and standard error. The output would be saved to the file cat.
You are covering for another system administrator and one of the users asks you to restore a file for him. You locate the correct tarfile by checking the backup log but do not know how the directory structure was stored. What command can you use to determine this? 
Choose one:
a. tar fx tarfile dirname
b. tar tvf tarfile filename
c. tar ctf tarfile
d. tar tvf tarfile 



d


The t switch will list the files contained in the tarfile. Using the v modifier will display the stored directory structure.
You have the /var directory on its own partition. You have run out of space. What should you do? Choose one:
a. Reconfigure your system to not write to the log files.
b. Use fips to enlarge the partition.
c. Delete all the log files.
d. Delete the partition and recreate it with a larger size. 



d


The only way to enlarge a partition is to delete it and recreate it. You will then have to restore the necessary files from backup.
You have a new application on a CD-ROM that you wish to install. What should your first step be? 
Choose one:
a. Read the installation instructions on the CD-ROM.
b. Use the mount command to mount your CD-ROM as read-write.
c. Use the umount command to access your CD-ROM.
d. Use the mount command to mount your CD-ROM as read-only. 



d


Before you can read any of the files contained on the CD-ROM, you must first mount the CD-ROM.
When you create a new partition, you need to designate its size by defining the starting and ending_____________. 
cylinders


When creating a new partition you must first specify its starting cylinder. You can then either specify its size or the ending cylinder.