UNIX Commands questions

1. Why is the . not included in the path?

2. How will you mirror a volume and how will you find if a volume is mirrored ? lsvg –l (vol gp name)

3. A system is echoing the ping but not able to login via telnet why ?

Etc /services etc/inetd.conf

4. what is the migration path from 4.3 to 5.1 ? (or any versions)

5. A system is able to ping within the network but not outside why ?

6. What are the components of a HACMP ? (did you use serial interface)

7. What are the resource groups in HACMP?

8. What are the apar install if so for what ?

9. How will you log in or start the system in what mode if you don’t know the root password?

10. What is ip address and subnet means ?

11. what types of san or nas devices were used ?

12. Were the storage on the hard drive or any tape used ?

13. how will you check the if a system is paging excessively ?

14. There is too much of processor utilization what could be possible reason?

15. How is paging space is allocated?

16. How will you configure sendmail ?

17. How will you assign superuser privilege to an ordinary user temporarily (sudo)

18. Based on what one will choose to use shell or perl scripting?

19. Difference between telnet or ssh .

20. How will you truncate a log file?

21. What is a sticky bit? What is the effect on file and directory?

Questions by psvprasad_123

Showing Answers 1 - 3 of 3 Answers

goksn

  • Sep 6th, 2009
 

Telnet is not secured but SSH is secured. Telenet and FTP can be easily traced by hackers where as SSH (which uses SSL) cannot be easily traced.

  Was this answer useful?  Yes

Give your answer:

If you think the above answer is not correct, Please select a reason and add your answer below.

 

Related Answered Questions

 

Related Open Questions