Linux interview questions Daquan

  
 

One. Fill in the blanks

1. In Linux, access the device in a way.

2. When the Linux kernel boots, read the file system to be loaded from the file.

3. Each file in the Linux file system is used to identify it.

4. All disk blocks consist of four parts, respectively.

5. Links are divided into: and .

6. The super block contains important and important file system information.

7. The permission of a file is: drw-r--r--, the value is expressed in numeric form, then the octal number is: , the file attribute is .

8. The process started in the foreground is terminated with Ctrl+c.

9. After the static route is set, if the network topology changes, you need to modify the routing settings.

10. The important tasks of network management are: and .

11. When installing a Linux system to partition a hard disk, there must be two partition types: and .

13. The script file must be given permission to run the shell program before it is run.

14. One of the tasks of system management is to be able to secure, backup, restore and update programs and data in the environment.

15. The system swap partition is an area of ​​the system.

16. The kernel is divided into four subsystems, , , and .

17. Kernel configuration is an important operation that system administrators must perform when changing system configurations.

18. In the Linux installation, use the netconfig program to configure the network. The installer will prompt the user to enter the necessary information such as host name, domain name, domain name server, IP address, and so on.

19. Uniquely identifying each user is the user and username.

20. Protocols are the most common type of internal protocol and are generally referred to as dynamic routing protocols.

21. In Linux, everything is represented as a file, and various methods of organizing files are called .

22. DHCP can implement IP address allocation.

23. The network administrator's management objects are the server, and the various resources of the system.

24. Network management usually consists of three parts, of which the management part is the center of the entire network management.

25. When you want to delete this system, you must compile the kernel. When the kernel does not support the system, you must use the kernel.

26 The Ping command can test whether the local system in the network can reach, so it is often used to test the network.

27. The vi editor has two working modes: and .

28. You can use the ls –al command to observe the permissions of the file. The permissions of each file are represented by 10 digits and are divided into four segments, of which the first segment is occupied, indicating that the second segment Takes 3 digits and indicates the permissions on the file.

29. The difference between a process and a program lies in its dynamic nature, dynamic generation and termination, and the basic states that can be obtained from the generation to the termination process are: , , and .

30. DNS is actually a database of host information distributed over the Internet. Its role is to achieve and convert between and.

31. Apache is an application that implements the WWW server function, which is commonly referred to as "Browse web server". It is the apache application that provides browsing services for users.

32. There are two types of backups available on Linux systems: and . The former refers to the backup of the pair, and the latter refers to the backup of the pair.

33. The file system type of the CD-ROM standard is .

34. When lilo.conf is configured, make it effective. The commands and parameters that should be run are .

35. When using the ls command, the parameter should be used to display non-printing characters in octal.

36. Linux Support Windows
The type of file system for 9.x/2000 long filenames is .

37. The command to limit the user's use of disk space is .

38 In Linux systems, the directory used to store the configuration files and subdirectories required by the system is .

39. A hard link can only establish a pair of links. Can be created across different file systems.

40. The attribute bits of the socket file are .

41. The command to end the background process is .

42. There are two ways to run a process, namely .

43. Links are divided into .

44. Under the super user, all the processes running in the Linux system are displayed. The commands and parameters that should be used are .

45. The attribute bit of the pipe file is .

46. The standard output of the previous command is used as the standard input for the latter command, called .

47. The command and parameters for specifying execution rights for the script are .

48. The command to log in remotely is .

49. To send 10 packet messages to test connectivity with the host abc.tuu.edu.cn, the commands and parameters that should be used are:

50. The process of the DNS server is named named. When it starts, it automatically loads the DNS partition database file defined in the file in the /etc directory.

51. The Apache server process configuration file is .

52. In Linux, the command to generate a suffix with a .gz file after compressing the file is .

53. When editing a file with vi, save the contents of the file in the test.txt file and type it in command mode.

54 The commands and parameters that can display the calendar for the entire year on the standard output are .

55. In shell programming, the rule of using square brackets to indicate test conditions is: square brackets must have on both sides.

56. Check if the installed file system /dev/had5 is normal. If the check is wrong, it will be repaired automatically. The command and parameters are .

57. One tool for sharing user directories in Unix/Linux in the Windows 9.x environment is .

58. The system administrator's role is to perform system resource management, system performance management, device management, security management, and.

59 In Linux, test the DNS server to correctly resolve the client command of the domain name, using the command.

60. Under Linux, the hard disk (slave) of the second IDE channel is identified as .

61. When the system administrator needs to upgrade the kernel version and change the system hardware configuration, it should be.

62. If you only want to modify the system's IP address, you should modify the configuration file.

63. When there is no condition in the LAN to establish a DNS server, but you want users on the LAN to access each other using the computer name, you should configure the file.

64. In the vi editing environment, use mode conversion.

65. Slackware Linux 9.0 usually uses a file system, and all the disk blocks of the system are made up of parts.

66. Archive the /home/stud1/wang directory, compress it to generate the wang.tar.gz file, and save the file to the /home directory to implement the tar command format for this task.

67. The pipe is the last command of the previous command.

68. When configuring the network using the manual method, you can change the host name by modifying the file. To configure the domain name resolution client of the computer, you need to configure the file.

69. The startup process has two methods: manual startup and scheduled startup. The commonly used commands for scheduling startup are , , and .

70. The domain name of test.bns.com.cn is , if you want to configure a domain name server, you should define the working directory of the DNS database in the file.

71. The two main protocols used by the Sendmail mail system are: and , the former is used to send mail and the latter is used to receive mail.

72. DHCP is the abbreviation of Dynamic Host Configuration Protocol. Its role is: it is the host in the network.

73. At present, there are many kinds of software packages used by the proxy server, and the materials used in the textbook are .

74. The rm command deletes a file or directory. The main difference is whether to use a recursive switch.

Copyright © Windows knowledge All Rights Reserved