AWS Interview Questions and Answer Part – 33

To take advantage of the greatest number of features available in Active Directory while having Amazon responsible for the management of the operating system and underlying hardware, you should choose:…

Read more »

AWS Interview Questions and Answer Part – 32

The best tool to identify excess access keys and passwords that have NOT been rotated recently is: Cloud Trail Trusted Advisor Amazon Inspector Access Advisor Credential Report (Ans) Which of…

Read more »

Docker Interview Questions and Answer Part – 11

Which of the following are the standard secured and unsecured Docker engine daemon ports? 2375 (unsecured), 2376 (secured) (Ans) 4000 (unsecured), 4001 (secured) 3375 (unsecured), 3376 (secured) 80 (unsecured), 443…

Read more »

Docker Interview Questions and Answer Part – 10

What is a dangling volume? The default volume for the container file system that’s unpacked from the image A volume that’s removed from a running container A volume that’s not…

Read more »

AWS Interview Questions and Answer Part – 31

What is the definition of a managed policy? Custom policy controlled by the customer Deployed by the customer Created and maintained by AWS (Ans) Policies applied to users and groups…

Read more »

AWS Interview Questions and Answer Part – 30

If resources at AWS have been created by a no other account, what feature can be enabled to share access to resources? Cross Account Access (Ans) Creating additional accounts for…

Read more »

Docker Interview Questions and Answer Part – 9

Where does the file system come from for a container? From a remote network share hosted through Hyper-V From the machine the container is started on From the image used…

Read more »

AWS Interview Questions and Answer Part – 29

What security feature ensures no compromise of session keys during operation? Perfect forward secrecy (Ans) Sticky sessions Server order preference SSL offload When EBS volumes are created, who has access?…

Read more »

AWS Interview Questions and Answer Part – 28

Security Groups are: Stateless – traffic strictly filtered Stateless – return traffic not allowed (Ans) Stateful – return traffic allowed Stateful – traffic strictly filtered Read replicas are synchronously replicated:…

Read more »

Docker Interview Questions and Answer Part – 8

The docker history command shows output similar to which of the following? Dockerfile (Ans) docker-compose.yml docker images docker layers docker ps What is a tag? A reference to a registry…

Read more »

AWS Interview Questions and Answer Part – 27

What is one benefit of adding CDN services to a distributed cloud system? Lower latency for application users Better availability of static content All of the above (Ans) Less load…

Read more »

AWS Interview Questions and Answer Part – 26

You can use the free tier for: 12 months (Ans) Free tier is always available 3 months 6 months One ECU is based on which generation of Intel processor? 2008…

Read more »

AWS Interview Questions and Answer Part – 25

Which of the following is not an AWS security method? Active Directory Authentication (Ans) IAM Security Groups VPC AWS infrastructure is built in such a way that it will never…

Read more »

AWS Interview Questions and Answer Part – 24

Database clients can connect to Redshift using ODBC and JDBC drivers for Postgres. True (Ans) False Cloudera Impala is included on EMR clusters by default. True False (Ans) EC2 stands…

Read more »

Kubernetes Commands: kubectl get – Tutorials and Examples

kubectl get- Display one or many resources Prints a table of the most important information about the specified resources. You can filter the list using… A label selector and The…

Read more »

Working with Kustomization.yaml and tutorials

Currently this blog is under progress. Please read following url meanwhile. https://github.com/kubernetes-sigs/kustomize https://github.com/kubernetes-sigs/kustomize/tree/master/examples/wordpress https://kubernetes.io/docs/tasks/manage-kubernetes-objects/kustomization/ https://levelup.gitconnected.com/kubernetes-change-base-yaml-config-for-different-environments-prod-test-6224bfb6cdd6 https://blog.scottlowe.org/2019/09/13/an-introduction-to-kustomize/ https://blog.stack-labs.com/code/kustomize-101/ Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have…

Read more »

Kubernetes Commands: kubectl config – Tutorials and Examples

The kubectl command-line tool uses kubeconfig files(file named with – config) to find the information it needs to choose a cluster and communicate with the API server of a cluster….

Read more »

Kubernetes Port requirement during Kubernetes Installing using kubeadm

Control-plane node(s) – required ports Protocol Direction Port Range Purpose Used By TCP Inbound 6443* Kubernetes API server All TCP Inbound 2379-2380 etcd server client API kube-apiserver, etcd TCP Inbound…

Read more »

Kubeadm Errors: network plugin is not ready: cni config uninitialized

Error Message Solution Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at DevOps School, travel stories at Holiday…

Read more »

uDeploy Interview Questions and Answer Part-1

Is it right defintion of “Application” in uDeploy? One or more computer programs or software components that provide a function in direct support of a specific business process or processes….

Read more »

UrbanCode Deploy Interview Questions and Answer Part-1

IBM UrbanCode Deploy provides two types of plugins to define deployment processes, with one type being referred to as Source Configuration plugins. What is the other plugin type? Workflow (Ans)…

Read more »

uBuild Interview Questions and Answer Part-1

IBM UrbanCode Build (uBuild) can be only installed in Windows? True False (Ans) What is the embedded database for IBM UrbanCode Build (uBuild) server? Derby (Ans) Oracle database MySQL database…

Read more »

Subversion Interview Questions and Answer Part-1

When checking out code from SVN you usually want to check out from __ not from the root of the repository. repo tags trunk (Ans) branches A source control system…

Read more »

Splunk Interview Questions and Answer Part – 4

Which file is used for role and mapping authorize.conf (Ans) authorizes.conf authentication.conf limits.conf You can not search the data in frozen stage of bucket True (Ans) False Attributes in indexes.conf…

Read more »

Function in Javascript

Function are subprograms which are used to compute a value or perform a task. Type of Function – Library or Built-in functions Ex: – valueOf( ) , write( ), alert(…

Read more »

Splunk Interview Questions and Answer Part – 3

Of the following, which is the best description of Splunk? Splunk is a log collector. Splunk is a business intelligence tool. Splunk is operational intelligence that consumes and makes machine…

Read more »

Splunk Interview Questions and Answer Part – 2

Which port is the default forwarding port? 8683 8089 9997 (Ans) 8079 9907 9090 80 8080 Universal forwarders do not parse data. False True (Ans) Which port is the default…

Read more »

Splunk Interview Questions and Answer Part – 1

Where is the best place to get help with general Splunk questions? Splunk Answers (Ans) Stack Overflow Course Q and A Splunk is primarily a business intelligence tool. False (Ans)…

Read more »

SonarQube Interview Questions and Answer Part – 1

Is it right definition of Sonarqube? SonarQube (formerly Sonar) is a quality management platform focusing on continuous analysis of source code quality. YES (Ans) NO Which is not a severities…

Read more »

Puppet Interview Questions and Answer Part – 3

To which parameter do you assign PHP.INI configurations when declaring the mayflower-php class? settings (Ans) config ini php When dealing with a large number of ephemeral nodes that consume licenses,…

Read more »