1. What is SSH? A) SSH (Secure Shell) is a cryptographic network protocol used to securely access and manage remote systems over an unsecured network. It encrypts all communication between [ … ]
YUM & RPM
YUM (Yellowdog Updater, Modified) 1. What is YUM in Linux? A) YUM is a package manager used in RHEL/CentOS/Fedora systems to install, update, and manage software packages automatically with dependency [ … ]
IP Configuration
1. What is an IP address? A) A unique numerical identifier assigned to a device on a network. 2. What is a Public IP address? A) Public IP is an [ … ]
Crontab
1. What is crontab used for in Linux? A) crontab schedules tasks (cron jobs) to run automatically at specific times or intervals. 2. What is the syntax of a crontab [ … ]
Compress The Folders And Files
1. What is the use of the tar command in Linux? A) tar is used to create, extract, and manage archive files. It bundles multiple files into a single file, [ … ]
ACL Permissions
1. What is ACL in Linux? A) ACL (Access Control List) provides fine-grained permissions beyond standard rwx for owner, group, and others. It allows setting permissions for multiple users or [ … ]
File Permission
1.What are file permissions in Linux .How do you change permissions?A) Linux uses read (r), write (w), execute (x) permissions for owner, group, and others.Using chmod 2. How do you [ … ]
Group Administration
Group Administration 1.What is a group in Linux? A) A group is a collection of users. Groups allow shared permissions on files and directories. 2.What’s the difference between primary and [ … ]
User Administration
User Administration 1 .Where are user details stored in Linux? A) In /etc/passwd (basic account info) and /etc/shadow (password hashes & aging). 2. How to set a username and password [ … ]