InterviewStack.io LogoInterviewStack.io

Operating System Fundamentals Questions

Comprehensive knowledge of operating system concepts and practical administration across Linux, Unix, and Windows platforms. Core theoretical topics include processes and threads, process creation and termination, scheduling and context switching, synchronization and deadlock conditions, system calls, kernel versus user space, interrupt handling, memory management including virtual memory, paging and swapping, and input and output semantics including file descriptors. Practical administration and tooling expectations include file systems and permission models, user and group account management, common system utilities and commands such as grep, find, ps, and top, package management, service and process management, startup and boot processes, environment variables, shell and scripting basics, system monitoring, and performance tuning. Platform specific knowledge should cover Unix and Linux topics such as signals and signal handling, kernel modules, initialization and service management systems, and command line administration, as well as Windows topics such as the registry, service management, event logs, user account control, and graphical and command line administration tools. Security and infrastructure topics include basic system hardening, common misconfigurations, and an understanding of containerization and virtualization at the operating system level. Interview questions may probe conceptual explanations, platform comparisons, troubleshooting scenarios, or hands on problem solving.

HardSystem Design
73 practiced
Design a scalable forensic acquisition and analysis architecture for a large cloud environment containing thousands of Linux and Windows VMs plus containerized workloads. Address automated evidence collection, preservation of volatile data, use of snapshots and object storage, jurisdictional/legal constraints, integrity verification, indexing for search, and triage prioritization.
MediumTechnical
119 practiced
A Linux host may be compromised by a kernel module rootkit. Outline concrete forensic checks and evidence collection steps to detect kernel module tampering: examining /proc/modules, comparing loaded module lists with disk files, verifying module signatures, checking kallsyms and /sys/module, and capturing kernel memory for offline analysis.
HardTechnical
119 practiced
An attacker used time-stomping, log clearing, and file overwrites across a Windows estate to obscure activity. Propose advanced detection and timeline reconstruction methods: how to cross-correlate NTP and authentication logs, leverage USN Journal and MFT sequence numbers, use network device logs, and apply statistical anomaly detection to reconstruct likely sequences of events.
MediumTechnical
76 practiced
You suspect persistence via cron on a Linux server. Describe a structured approach to locate and analyze possible cron-based persistence across the system: which files and directories to inspect, commands to run, artifacts to collect for preservation, and anti-forensic cron techniques you should be aware of.
HardTechnical
80 practiced
You discover an encrypted container image (VeraCrypt or LUKS) spread across multiple devices and cloud backups with plausible deniability in use. Draft a practical investigative strategy to acquire all relevant evidence, attempt key recovery (volatile memory, hibernate files, keyfiles, backup metadata), evaluate legal options for compelled decryption, and document findings when content cannot be decrypted.

Unlock Full Question Bank

Get access to hundreds of Operating System Fundamentals interview questions and detailed answers.

Sign in to Continue

Join thousands of developers preparing for their dream job.