Filter interviews by
I applied via Approached by Company and was interviewed before Jun 2023. There was 1 interview round.
AWS offers a wide range of features including compute, storage, networking, databases, analytics, machine learning, security, and more.
Compute services like EC2, Lambda, and Elastic Beanstalk provide scalable computing resources.
Storage services like S3, EBS, and Glacier offer scalable and durable storage options.
Networking services like VPC, Route 53, and CloudFront help manage network resources.
Database services like...
MongoDB is used for backend processes.
MongoDB is a NoSQL database that is commonly used for storing and managing data on the backend of applications.
It is often used to store large amounts of unstructured data, making it ideal for backend processes.
Frontend processes typically involve user interface design and interaction, which MongoDB is not directly involved in.
Top trending discussions
I applied via Company Website and was interviewed in Jan 2022. There were 4 interview rounds.
Red hot linux
Kick start and network information instalation
To install a new server, follow these steps:
Choose the appropriate hardware and operating system
Configure network settings
Install necessary software packages
Set up security measures
Configure backups and monitoring
Test the server to ensure it is functioning properly
LVM stands for Logical Volume Manager, a tool used to manage disk storage in Linux systems.
LVM allows for dynamic resizing of logical volumes without downtime.
It consists of physical volumes, volume groups, and logical volumes.
Commands like pvcreate, vgcreate, lvcreate are used to create and manage LVM.
LVM provides flexibility in managing storage space by allowing logical volumes to span multiple physical disks.
To mount NFS, use the 'mount' command with the NFS server IP address and the mount point on the local machine.
Use the 'mount' command followed by the NFS server IP address and the mount point on the local machine
For example: sudo mount 192.168.1.100:/shared_folder /mnt/nfs_share
Ensure that the NFS server is properly configured and accessible from the local machine
Patching involves applying updates to software to fix vulnerabilities and improve performance.
Identify the software that needs to be patched
Download the appropriate patches from the vendor's website
Test the patches in a non-production environment before applying them to production systems
Schedule downtime for applying patches to minimize disruption
Document the patching process for future reference
To rollback a package, use package manager to uninstall current version and install previous version.
Use package manager to uninstall current version of the package
Install the previous version of the package using package manager
Check for any dependencies that may need to be rolled back as well
To remove older kernels in Linux, use package management tools like apt or yum.
Use 'apt autoremove' command in Debian-based systems to remove old kernels
Use 'yum remove
Check available kernels with 'uname -r' command before removing
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
Grant access to S3 bucket securely by using IAM policies and roles.
Create an IAM policy with specific permissions for the S3 bucket
Attach the IAM policy to an IAM role
Assign the IAM role to the user or group that needs access
Use bucket policies for more granular control if needed
IAM role is used to grant permissions to entities, while IAM group is used to group users with similar permissions.
IAM role is used to delegate permissions to entities like EC2 instances or Lambda functions
IAM group is used to group users with similar permissions for easier management
IAM role can be assumed by trusted entities, while IAM group is used for managing user permissions
I applied via Company Website and was interviewed in May 2023. There were 5 interview rounds.
AWS (Amazon Web Services) is a cloud computing platform that offers a wide range of services for businesses and individuals.
Provides services such as computing power, storage, databases, machine learning, and more
Allows users to scale resources up or down based on demand
Offers a pay-as-you-go pricing model
Popular services include EC2 (Elastic Compute Cloud), S3 (Simple Storage Service), and RDS (Relational Database Ser
Cloud providers are companies that offer cloud computing services, allowing users to access and store data and applications on remote servers.
Amazon Web Services (AWS)
Microsoft Azure
Google Cloud Platform
IBM Cloud
Oracle Cloud
What are the tools on devops
The first service used on AWS was Amazon Elastic Compute Cloud (EC2).
Amazon EC2 was launched in 2006 as one of the first services offered by AWS.
It allows users to rent virtual servers on which to run their own applications.
EC2 provides scalable computing capacity in the cloud.
Many other AWS services, such as S3 and RDS, rely on EC2 instances for their functionality.
Cloud computing models include SaaS, PaaS, and IaaS.
Software as a Service (SaaS) - applications hosted on cloud and accessed via web browser (e.g. Gmail)
Platform as a Service (PaaS) - platform and tools provided to develop, test, and deploy applications (e.g. AWS Elastic Beanstalk)
Infrastructure as a Service (IaaS) - virtualized computing resources like servers, storage, and networking (e.g. AWS EC2)
Four sections were there in aptitude test
Code to print table of any number in Python
Use a loop to iterate from 1 to 10 (for a 10x table)
Multiply the number by the current iteration value
Print the result for each iteration
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, and more.
Cloud computing allows users to access and use resources on-demand without the need for physical infrastructure.
It offers scalability, flexibility, cost-effectiveness, and increased efficiency.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azur
I applied via Job Portal and was interviewed in Aug 2022. There were 2 interview rounds.
VPC stands for Virtual Private Cloud, a virtual network dedicated to an AWS account. SCERIOUS is not a recognized term in AWS.
VPC is used to create isolated virtual networks within AWS
It allows users to define their own IP address range, subnets, and route tables
VPC provides control over network traffic, security, and connectivity options
S3 bucket names are globally unique.
S3 bucket names must be unique across all AWS accounts.
Bucket names can contain lowercase letters, numbers, and hyphens.
Bucket names cannot contain underscores, uppercase letters, or periods.
Example of a valid bucket name: my-bucket-123
Example of an invalid bucket name: My_Bucket
Bound refers to a variable that is assigned to a specific value, while unbound refers to a variable that has not yet been assigned a value.
Bound variables have a specific value assigned to them, while unbound variables do not.
Bound variables are used in programming to store and manipulate data, while unbound variables are used to represent unknown values.
Examples of bound variables include constants and variables that ...
Slaves and masters are used in distributed systems for load balancing and fault tolerance.
In a distributed system, the master node controls and coordinates the work of the slave nodes.
Slaves perform tasks assigned by the master and report back their results.
Masters can be used for load balancing, where they distribute tasks evenly among slaves.
Masters can also be used for fault tolerance, where they can detect when a s...
AWS is a cloud computing platform that provides a wide range of services for building and deploying applications.
AWS offers services such as compute, storage, databases, and more
It allows users to easily scale their applications and pay only for what they use
Brefi is a serverless PHP runtime for AWS Lambda
I applied via Recruitment Consultant and was interviewed in Apr 2021. There was 1 interview round.
LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.
LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.
It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.
LVM enables dynamic allocation of storage space, making it easier to add or remov...
Patching is the process of applying updates or fixes to software or systems to address vulnerabilities or improve functionality.
Patching involves downloading and installing updates provided by software vendors.
It helps to fix bugs, security vulnerabilities, and improve performance.
Patches can be applied to operating systems, applications, or firmware.
Regular patching is crucial to maintain system integrity and protect ...
LVM (Logical Volume Manager) is configured by creating physical volumes, volume groups, and logical volumes.
Create physical volumes using the 'pvcreate' command
Create volume groups using the 'vgcreate' command
Create logical volumes using the 'lvcreate' command
Format the logical volumes with a file system using the 'mkfs' command
Mount the logical volumes to desired mount points using the 'mount' command
Update the '/etc/
Decommission is the process of retiring a system or service, while recommission is the process of bringing it back into service.
Decommission involves shutting down and removing a system or service from operation.
Recommission involves restoring a decommissioned system or service back into operation.
Decommission and recommission are common processes in IT infrastructure management.
Examples include retiring an old server ...
NFS allows remote access to files and directories, providing centralized storage and easy sharing.
Enables sharing of files and directories across multiple systems
Reduces storage costs by centralizing data on a single server
Improves data availability and reliability through redundancy
Simplifies administration by allowing for centralized management
Examples: Sharing files between a web server and a database server, sharin
A user can be created in a single line command using the 'useradd' command in Linux.
Use the 'useradd' command followed by the username to create a user.
Specify additional options like home directory, shell, etc. if required.
Example: useradd john -m -s /bin/bash
To reset the root password, you can use the single-user mode or a bootable Linux distribution.
Boot into single-user mode by interrupting the boot process and appending 'init=/bin/bash' to the kernel command line.
Remount the root filesystem as read-write using the 'mount -o remount,rw /' command.
Change the root password using the 'passwd' command.
Alternatively, boot from a bootable Linux distribution like a Live CD or U...
Possible causes of user not able to login to an application
Incorrect username or password
Account locked or disabled
Expired password
Network connectivity issues
Application server down
Incorrect permissions or access rights
Firewall blocking access
Authentication server issues
Application configuration errors
To set the password for a newly created user in Linux, use the 'passwd' command followed by the username.
Open the terminal or SSH into the Linux system
Run the 'passwd' command followed by the username of the new user
Enter and confirm the new password when prompted
A cron job is a scheduled task that runs automatically at specific intervals on a Linux system.
Cron jobs are managed by the cron daemon, which reads a configuration file called crontab.
To write a cron job, you need to edit the crontab file using the 'crontab' command.
Each line in the crontab file represents a separate cron job and follows a specific format.
The format consists of five fields: minute, hour, day of month,...
An I node number is a unique identifier assigned to each file in a Unix-like file system.
I node number is also known as index node number.
It contains metadata about the file such as ownership, permissions, timestamps, etc.
It is used by the operating system to locate and access the file on the disk.
The command 'ls -i' can be used to display the I node number of a file.
The Linux kernel is the core component of the Linux operating system, responsible for managing hardware resources and providing essential services.
The Linux kernel is open-source and developed by a community of developers worldwide.
It is released under the GNU General Public License (GPL).
The kernel version can be checked using the 'uname -r' command.
Examples of popular Linux kernel versions include 2.6, 3.x, 4.x, and
Workload in Linux refers to the amount of work being done by the system at a given time.
Workload can include tasks such as running processes, handling network requests, and managing system resources.
Monitoring workload is important for ensuring system performance and stability.
Tools like top, htop, and sar can be used to track and analyze workload.
High workload can lead to system slowdowns or crashes.
Balancing workload...
TCS
Accenture
Wipro
Cognizant