Did you ever write any inerface files / profile file to
support unix environment setup ?
In order to improve your system’s security you decide to implement shadow passwords. What command should you use?
What does sh do in linux?
Which Command used to lock user password in Linux?
what are the linux boot files?
what are the init levels in Linux?
What does make clean command do?
Which command is used to review boot messages?
What does umask 077 mean?
Which commands are used to set a processor-intensive job to use less cpu time?
If we transfer 100 files by ftp to remote server, how to know the files are successfully transfer or some file are not transferred?
How we can set the password length in linux?
what is major and minor?