Sollicitatievraag

Sollicitatiegesprek voor de functie Solutions Architect

-

Amazon

Below are some of the questions I could remember that they asked. Hope it helps What is CIDR block and what do you use it for Troubleshoot a webpage that can't access the DB Troubleshoot why you can't access a webpage server What is DOS/DDOS and how to mitigate this What is CDN and why is it important who would setup the CDN What is database indexing and why is it important Difference between NOSQL and RDBS Difference between object storage and file system Difference between Asymetric and symetric crypto Whats a three tier web page architect,and how do you monitor to see a bottleneck and how do you improve it How would you design an e-commerce web page and how would you improve it What is MSA If you collected logs and wanted to store them for 14 days then move them over to permanent storage for a few years how would you do this How would you analyze objects stored in S3 and share them with users What ports do databases use Difference between IOPS, Throughput, and Latency What is a web application firewall and how do you use it, what layer is it on How would you monitor utilization of equipment in a datacenter How do you secure a web site How would a developer make an API friendlier Of the 14 principles which one do you relate with mostly and use at work, Which one do you not agree with

Antwoord

Antwoorden op sollicitatievragen

5 antwoorden

1

CIDR - Classless Inter-domain Routing, Which replaced the old class based IP addressing scheme based on A,B & C. CIDR has 2 parts a network Address (samel like normal IP address) followed with a subnet prefix. the subnet prefix decides how many bits of the IP address has taken for network. and rest will be allocated for the subnet.

Ajeeb Peter op

0

DoS- Denial of Service DDos - Distributed Denial of service. AWS Shield will provide protection for CDN and S3 from DDoS attack .

Ajeeb Peter op

0

IOPS - Input and output per seconds - measure the capacity in terms of the number request can be served in a second. Throughput - The volume of data that can be handles and measured in MBPS Latency - is the time between a request and response.

Ajeeb Peter op

1

Symmetric Encryption - is a single key encryption method, which both producer and consumer using the same key for encryption and decryption. (Eg: Aws KMS) Asymmetric Encryption - is a key pair based method. Public key is used for encryption and private key is used for decryption. and source and consumer will share their public key to each other and keep private key secret and use only for decryption. In other words , The key pay pair have a special relation that , a public key encrypted message only can be decryption by it own private key pair.

Ajeeb Peter op

0

WAF is Web Application firewall, which protects web application from common web exploits like cross site scripting, SQL injection. and WAF provided rule based access (ACL), blacklisting and white listing. WAF works well with Cloudfront, API gateway and ALB.

Ajeeb Peter op

Voeg antwoorden of opmerkingen toe

Meld u aan of registreer u om hier een opmerking over te maken.