Linux industry Recruitment technical face question summary __linux

Source: Internet
Author: User
Tags gz file domain name server file permissions

Linux industry Recruitment technical face question summary

1. In a Linux system, access the device in a file format.

2. When the Linux kernel boots, read the file system to be loaded from the file/etc/fstab.

3. Each file in the Linux file system is identified by the I node.

4. All disk blocks are composed of four parts, namely, the boot block, the private block, the I node table block and the data storage block.

5. Links are divided into: hard links and symbolic links.

6. The Super block contains important file system information, such as I node table and free block table.

7. The permission for a file is: drw-r--r--, which represents the permission in numeric form, the octal number is: 644, the file property is a directory.

8. The foreground START process uses CTRL + C to terminate.

9. After static route setting, if the network topology changes, the system administrator should modify the routing settings.

10. The important tasks of network management are: control and monitoring.

11. When installing a Linux system to partition a hard disk, you must have two types of partitions: file system partitions and swap partitions.

13. The script file must be given permission to execute before the shell program is written to run.

14. One of the tasks of system management is the ability to secure, backup, recover, and update programs and data in a distributed environment.

15. The system swap partition is an area of the system's virtual memory.

16. The kernel is divided into four subsystems such as process management system, memory management system, I/O management system and file management system.

17. Kernel configuration is an important operation that the system administrator will perform when changing the system configuration hardware.

18. In installing the Linux system, the network is configured with the Netconfig program, which prompts the user to enter the necessary information such as host name, domain name, domain name server, IP address, gateway address and subnet mask step by step.

19. Each user is uniquely identified by the user ID and user name.

20. The RIP protocol is one of the most common internal protocols, commonly called dynamic routing protocols.

21. All content in a Linux system is represented as a file, and various methods of organizing files are called file systems.

DHCP can implement dynamic IP address assignment.

23. The System network administrator's management object is the server, the user and the server process as well as the system's various resources.

24. Network management is usually composed of three parts, monitoring, transmission and management, in which the management part is the center of the whole network management.

25. You must compile the kernel when you want to remove a device driver that is not used by the system, and you must upgrade the kernel when the kernel does not support device drivers on the system.

The ping command can test whether the local system in the network can reach a remote host, so it is often used to test the connectivity of the network.

The VI editing apparatus has two modes of operation: Command mode and input mode.

28. You can use the Ls–al command to observe the file's permissions, each file's permissions are expressed in 10-bit, and divided into four paragraphs, where the first paragraph accounted for 1 digits, the file type, the second paragraph accounted for 3, representing the file owner of the file permissions.

29. The difference between process and procedure lies in its dynamics, the generation and termination of dynamics, and the basic States from which the process can be produced to terminate: The running state, the ready state and the waiting state (blocking state).

DNS is actually a database of host information that is distributed over the Internet, and its role is to convert between IP addresses and host names.

Apache is an application that implements the WWW server functionality, commonly referred to as "browsing the Web server," which is the Apache application that provides users with browsing Web services on the server side.

32. There are two types of backup available on Linux systems: System backup and user backup. The former refers to the backup of the operating system, which refers to the backup of the application and user files.

The file system type of the CD-ROM standard is iso9660.

34. When the lilo.conf configuration is completed, make it effective, the command and parameters should be run is lilo.

35. When using the LS command, use the parameter-B to display nonprinting characters in octal form.

The type of file system that Linux uses to support Windows 9.x/2000 long file names is vfat.

37. Setting limits the user to use the disk space the command is quota.

38 in a Linux system, the directory used to store the configuration files and subdirectories required for the system is/etc.

39. Hard connection can only establish a link to the file. Symbolic links can be created across different file systems.

40. The property bit of the socket file is S.

41. The command to end the background process is kill.

42. There are two ways in which a process can run, that is, running independently and using the parent process.

Link is divided into hard links and symbolic links.

44. The command and parameter to be used is ps-aux, which displays all the processes running in the Linux system under the Super user.

45. The property bit of the pipe file is p.

46. The standard output of the previous command as the standard input for the latter command, called a pipe.

47. The command and parameter for assigning execution rights to the script program is chmod a+x filename.

48. The command to log on remotely is telnet.

49. To send 10 packet message test and host abc.tuu.edu.cn connectivity, the command and parameters should be used: Ping abc.tuu.edu.cn–c 10.

The process of the DNS server is named named, which automatically mounts the DNS partition database files defined in the named.conf file in the/etc directory when it is started.

The Apache server process configuration file is httpd.conf.

52. In the Linux system, the command to generate the suffix. gz file after compressing the file is gzip.

53. When editing a file with VI, the contents of the file are saved in the Test.txt file and should be typed in the command mode: w test.txt.

54 commands and parameters that can display the whole year calendar on standard output are cal-y.

55. In shell programming, the rule for using square brackets to represent test conditions is that there must be spaces on both sides of the square brackets.

56. Check the installed file system/dev/had5 is normal, if the inspection error, then automatically repair, its command and parameters are FSCK–A/DEV/HAD5.

57. One tool for sharing user directories in Unix/linux in a windows9.x environment is the samba server.

58. System administrators are responsible for system resource management, systems performance management, device management, security management, and systematic performance monitoring.

59 in a Linux system, test the DNS server for the ability to correctly resolve client commands for domain names, using the command nslookup.

60. Under the Linux system, the hard drive (from disk) of the second IDE channel is identified as HDB.

61. When the system administrator needs to upgrade the kernel version and change the system hardware configuration, the kernel should be recompiled.

62. If you only want to modify the system's IP address, you should modify the/etc/rc.d/rc.inet1 configuration file.

63./etc/hosts files should be configured when there are no conditions within the LAN to establish a DNS server, but want users within the LAN to be able to access each other using the computer name.

64. In the VI editing environment, the ESC key is used for mode conversion.

Slackware Linux 9.0 typically uses a ext3 file system, and the entire disk block of the system is made up of four parts.

66. Archive the/home/stud1/wang directory for compression, compressed to generate wang.tar.gz files, and save this file to the/home directory, the TAR command format to achieve this task tar zcvf/home/wang.tar.gz/home/ Stud1/wang.

67. Piping is the standard input of the previous command as the standard output of the latter command.

68. When you use a manual method to configure a network, you can modify the/etc/hostname file to change the hostname, and to configure the domain name resolution client for that computer, configure the/etc/resolv.conf file.

69. The startup process has two methods, manual start and dispatch start, in which the scheduler starts the common commands for at, batch and crontab.

test.bns.com.cn domain name is bns.com.cn, if you want to configure a domain name server, you should define the working directory of the DNS database in the named.conf file.

The two major protocols used by the SendMail messaging system are: SMTP and POP, used to send mail, and the latter to receive mail.

DHCP is the abbreviation for a Dynamic Host Configuration Protocol, which is to assign an IP address to a host in a network.

73. There are many kinds of packages used by proxy server, and the use of squid in textbooks.

The main difference is whether a recursive switch-R or R is used to delete a file or directory.

MV commands can move files and directories, and can also be renamed for files and directories.

76. The Hops of routing Protocol (RIP) represent the number of gateways that must pass before the destination is reached, and the longest distance that RIP receives is 15 hops.

The ping command is used to test network connectivity, and the ping command is implemented through the ICMP protocol.

The NFS protocol is used to implement file system sharing between UNIX (/linux) hosts.

79. In the Linux operating system, devices are accessed through special files.

Shell is not only a user-command interpreter, it is also a powerful programming language. Bash is the default shell for Linux.

81. Use >;>; The symbol attaches the output redirection content to the back of the original text.

82. The command to add one user is: AddUser or Useradd.

83 for string lookup, using the grep command.

84. Use * to match several characters at a time.

The/sbin directory is used to store the management programs used by the system administrator.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.