SlideShare a Scribd company logo
Linux Interview
Questions and
Answers
the most beautiful interview questions with Answers based on Linux.
Q1. What is SSH? Explain in brief
SSH is the abbreviation for Socket Shell or Secure Shell. It is a protocol that is used to connect to a remote
server or system securely. It uses an SSH protocol as the data transfers between the client and the host are
encrypted. The primary role of the SSH command in Linux is to manage remote systems. Normally, this would
be another Linux system. However, it could also be a router, firewall, or even a computer with a different
operating system.
In a nutshell, SSH is a cryptographic network protocol used for an encrypted connection between a client and
a server.
Q2. How does SSH work?
To set up an SSH connection, we need two important components, a client and a host. The host can either be
a domain name, IP address, server, and more. The client uses the given host information to establish the
connection. If the credential provided is verified, an encrypted connection is established.
This technique of encryption generates a key for encrypting as well as decrypting. This key is distributed
among the hosts and clients to create a secure connection.
Q3. What is symmetric encryption?
Q4. What is asymmetric encryption?
Asymmetric encryption works on the principle of factoring in really large numbers. This technique
generates 2 keys called the private and public keys. The private key encrypts messages, while the public key
decrypts messages that are encrypted using the respective private key. This is kept with the client machine,
whereas the public key is distributed to other machines. The private key must always be kept a secret.
Otherwise, it will compromise the entire secure connection.
Q5. List a few file management commands and
explain their role.
Below is a list of various file management commands:
a. Pwd – displaying the current working directory
b. Cd – used for navigating through the file system
c. ls – used to list the contents of the directory
d. Touch – used to create a file
e. Cat – used to view a file
f. Mv – used to move a file
g. Cp – used to copy a file
h. Mkdir – used to create a directory
i. Rmdir – used to delete a directory
j. Rm – used to delete files
k. Find – used to locate a file in the filesystem
l. Wc – used to print count information of a file
We can list the contents of the file in a long listing by pairing the ls command with the option “-l”. By doing
so, the command prints out the following information: The file type, the file permissions, the number of hard
links to the file, file owner, file group, the file size, the date, time, and file name.
Q6. How do you list the contents of a file in a long listing?
Q7. How do you make the cp command ask before overwriting
a file?
When you use the cp command to copy the contents of a file into another existing file, it completely
overwrites the contents instead of appending. If at all you are not sure if the destination file exists already
and has contents you feel are important, you can make cp to prompt you to allow overwriting.
Q8. What is the fdisk command?
Fdisk is the abbreviation for “Fixed disk” or “Format disk”. The fdisk command manipulates partition tables
on the hard disk for Linux-based operating systems. Fdisk is also in MSDOS, Windows, IBM OS/2, Flex OS, and
many more.
Q9. What is the LSOF command?
LSOF is short for List of Open Files. This command retrieves details about various types of files opened by
different running processes. This command can not only list common or regular files but it can also perform
tasks like listing things like a shared library, a special file, a named pipe, a regular pipe, a character special file,
and many more.
The Chroot command changes the apparent root directory for the currently running process. In a nutshell,
chroot does one thing — It runs a command with a different root directory. Chroot does not make any
modifications to your disk. Nonetheless, it can make it appear that way from the POV of the processes
running under it. This command runs in such a modified environment that it cannot access files outside the
root directory.
Q10. What is chroot? Explain in brief
Ad

More Related Content

Similar to Linux Interview Questions and Answers.pdf (20)

linux
linuxlinux
linux
Ajay Chawda
 
managing-the-linux-file-system_suse_.ppt
managing-the-linux-file-system_suse_.pptmanaging-the-linux-file-system_suse_.ppt
managing-the-linux-file-system_suse_.ppt
submarinoaguadulce1
 
managing-the-linux-file-system________________________
managing-the-linux-file-system________________________managing-the-linux-file-system________________________
managing-the-linux-file-system________________________
saurabhbquest
 
prateekporwal
prateekporwalprateekporwal
prateekporwal
prateekporwal
 
Unix Security
Unix SecurityUnix Security
Unix Security
replay21
 
Linux
LinuxLinux
Linux
sravan kumar
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
Linux
LinuxLinux
Linux
SINGH PROJECTS
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
Deepak Upadhyay
 
Solaris basics
Solaris basicsSolaris basics
Solaris basics
Ashwin Pawar
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.ppt
Kalkey
 
Linux remote
Linux remoteLinux remote
Linux remote
yarden hanan
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
Hemant Shah
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
Muhammad Qazi
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
Shashwat Shriparv
 
Linux basic
Linux basicLinux basic
Linux basic
Pragyagupta37
 
Red Hat Linux.pptx
Red Hat Linux.pptxRed Hat Linux.pptx
Red Hat Linux.pptx
ssuser16fc07
 
Linux
LinuxLinux
Linux
Rathan Raj
 
Linux security
Linux securityLinux security
Linux security
trilokchandra prakash
 
beginner.en.print
beginner.en.printbeginner.en.print
beginner.en.print
Aniruddh Tyagi
 

More from SudhanshiBakre1 (20)

IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
SudhanshiBakre1
 
Top Java Frameworks.pdf
Top Java Frameworks.pdfTop Java Frameworks.pdf
Top Java Frameworks.pdf
SudhanshiBakre1
 
Numpy ndarrays.pdf
Numpy ndarrays.pdfNumpy ndarrays.pdf
Numpy ndarrays.pdf
SudhanshiBakre1
 
Float Data Type in C.pdf
Float Data Type in C.pdfFloat Data Type in C.pdf
Float Data Type in C.pdf
SudhanshiBakre1
 
IoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfIoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdf
SudhanshiBakre1
 
Internet of Things – Contiki.pdf
Internet of Things – Contiki.pdfInternet of Things – Contiki.pdf
Internet of Things – Contiki.pdf
SudhanshiBakre1
 
Java abstract Keyword.pdf
Java abstract Keyword.pdfJava abstract Keyword.pdf
Java abstract Keyword.pdf
SudhanshiBakre1
 
Node.js with MySQL.pdf
Node.js with MySQL.pdfNode.js with MySQL.pdf
Node.js with MySQL.pdf
SudhanshiBakre1
 
Collections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfCollections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdf
SudhanshiBakre1
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
SudhanshiBakre1
 
Types of AI you should know.pdf
Types of AI you should know.pdfTypes of AI you should know.pdf
Types of AI you should know.pdf
SudhanshiBakre1
 
Streams in Node .pdf
Streams in Node .pdfStreams in Node .pdf
Streams in Node .pdf
SudhanshiBakre1
 
Annotations in Java with Example.pdf
Annotations in Java with Example.pdfAnnotations in Java with Example.pdf
Annotations in Java with Example.pdf
SudhanshiBakre1
 
RESTful API in Node.pdf
RESTful API in Node.pdfRESTful API in Node.pdf
RESTful API in Node.pdf
SudhanshiBakre1
 
Top Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfTop Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdf
SudhanshiBakre1
 
Epic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfEpic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdf
SudhanshiBakre1
 
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfDjango Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
SudhanshiBakre1
 
Benefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfBenefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdf
SudhanshiBakre1
 
Epic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfEpic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdf
SudhanshiBakre1
 
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfPython Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
SudhanshiBakre1
 
Float Data Type in C.pdf
Float Data Type in C.pdfFloat Data Type in C.pdf
Float Data Type in C.pdf
SudhanshiBakre1
 
IoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfIoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdf
SudhanshiBakre1
 
Internet of Things – Contiki.pdf
Internet of Things – Contiki.pdfInternet of Things – Contiki.pdf
Internet of Things – Contiki.pdf
SudhanshiBakre1
 
Java abstract Keyword.pdf
Java abstract Keyword.pdfJava abstract Keyword.pdf
Java abstract Keyword.pdf
SudhanshiBakre1
 
Collections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfCollections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdf
SudhanshiBakre1
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
SudhanshiBakre1
 
Types of AI you should know.pdf
Types of AI you should know.pdfTypes of AI you should know.pdf
Types of AI you should know.pdf
SudhanshiBakre1
 
Annotations in Java with Example.pdf
Annotations in Java with Example.pdfAnnotations in Java with Example.pdf
Annotations in Java with Example.pdf
SudhanshiBakre1
 
Top Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfTop Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdf
SudhanshiBakre1
 
Epic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfEpic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdf
SudhanshiBakre1
 
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfDjango Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
SudhanshiBakre1
 
Benefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfBenefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdf
SudhanshiBakre1
 
Epic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfEpic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdf
SudhanshiBakre1
 
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfPython Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
SudhanshiBakre1
 
Ad

Recently uploaded (20)

Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
Ad

Linux Interview Questions and Answers.pdf

  • 1. Linux Interview Questions and Answers the most beautiful interview questions with Answers based on Linux.
  • 2. Q1. What is SSH? Explain in brief SSH is the abbreviation for Socket Shell or Secure Shell. It is a protocol that is used to connect to a remote server or system securely. It uses an SSH protocol as the data transfers between the client and the host are encrypted. The primary role of the SSH command in Linux is to manage remote systems. Normally, this would be another Linux system. However, it could also be a router, firewall, or even a computer with a different operating system. In a nutshell, SSH is a cryptographic network protocol used for an encrypted connection between a client and a server. Q2. How does SSH work? To set up an SSH connection, we need two important components, a client and a host. The host can either be a domain name, IP address, server, and more. The client uses the given host information to establish the connection. If the credential provided is verified, an encrypted connection is established.
  • 3. This technique of encryption generates a key for encrypting as well as decrypting. This key is distributed among the hosts and clients to create a secure connection. Q3. What is symmetric encryption? Q4. What is asymmetric encryption? Asymmetric encryption works on the principle of factoring in really large numbers. This technique generates 2 keys called the private and public keys. The private key encrypts messages, while the public key decrypts messages that are encrypted using the respective private key. This is kept with the client machine, whereas the public key is distributed to other machines. The private key must always be kept a secret. Otherwise, it will compromise the entire secure connection.
  • 4. Q5. List a few file management commands and explain their role. Below is a list of various file management commands: a. Pwd – displaying the current working directory b. Cd – used for navigating through the file system c. ls – used to list the contents of the directory d. Touch – used to create a file e. Cat – used to view a file f. Mv – used to move a file g. Cp – used to copy a file h. Mkdir – used to create a directory i. Rmdir – used to delete a directory j. Rm – used to delete files k. Find – used to locate a file in the filesystem l. Wc – used to print count information of a file
  • 5. We can list the contents of the file in a long listing by pairing the ls command with the option “-l”. By doing so, the command prints out the following information: The file type, the file permissions, the number of hard links to the file, file owner, file group, the file size, the date, time, and file name. Q6. How do you list the contents of a file in a long listing? Q7. How do you make the cp command ask before overwriting a file? When you use the cp command to copy the contents of a file into another existing file, it completely overwrites the contents instead of appending. If at all you are not sure if the destination file exists already and has contents you feel are important, you can make cp to prompt you to allow overwriting.
  • 6. Q8. What is the fdisk command? Fdisk is the abbreviation for “Fixed disk” or “Format disk”. The fdisk command manipulates partition tables on the hard disk for Linux-based operating systems. Fdisk is also in MSDOS, Windows, IBM OS/2, Flex OS, and many more. Q9. What is the LSOF command? LSOF is short for List of Open Files. This command retrieves details about various types of files opened by different running processes. This command can not only list common or regular files but it can also perform tasks like listing things like a shared library, a special file, a named pipe, a regular pipe, a character special file, and many more.
  • 7. The Chroot command changes the apparent root directory for the currently running process. In a nutshell, chroot does one thing — It runs a command with a different root directory. Chroot does not make any modifications to your disk. Nonetheless, it can make it appear that way from the POV of the processes running under it. This command runs in such a modified environment that it cannot access files outside the root directory. Q10. What is chroot? Explain in brief
  翻译: