1) Have you worked on Linux?
Yes, I have extensive experience working on Linux systems, managing and maintaining
servers, and automating tasks.
2) What are the Linux flavors?
Linux flavors (distributions) include Ubuntu, CentOS, Fedora, Debian, Red Hat
Enterprise Linux (RHEL), Arch Linux, and many others.
3) What is process management?
Process management in Linux involves managing the running processes, including their
creation, scheduling, and termination.
4) How to create a User? and How to give permissions to the user.
To create a user: `sudo adduser username`
To give permissions: `sudo chmod permissions filename`
5) How do add a user to an Existing Group In Linux?
Use the command: `sudo usermod -aG groupname username`
6) How to Change the owner permissions of the User or the file?
Use the command: `sudo chown newowner filename`
7) How to check the disk space in Linux?
Use the command: `df -h`
8) How to check memory in Linux?
Use the command: `free -m`
9) What does the top command Display?
The `top` command displays real-time system information, including CPU usage, memory
usage, and a list of running processes.
10) What is the use of lsblk command in Linux?
The `lsblk` command lists information about all available or the specified block
devices.
11) How to do Disk partition in Ubuntu?
Use the `fdisk` or `parted` command followed by the disk name.
12) Where is fstab in Linux?
The `fstab` file is located in `/etc/fstab`.
13) What is the Linux boot process?
The Linux boot process includes BIOS/UEFI, bootloader (GRUB), kernel initialization,
and starting system services.
14) What is a Linux filesystem? and what is /etc and /bin?
A Linux filesystem organizes files and directories on a storage device. `/etc`
contains configuration files, and `/bin` contains essential binary executables.
15) What are Crontab and Cronjob?
Crontab is a file containing scheduled tasks (cron jobs) to be executed at specified
times.
16) What is virtualization?
Virtualization is the creation of virtual versions of hardware, operating systems,
storage devices, or network resources.
17) What is SElinux?
SELinux (Security-Enhanced Linux) is a security architecture for Linux systems that
provides mechanisms for enforcing mandatory access control (MAC) policies.
18) How DNS works?
DNS (Domain Name System) translates domain names into IP addresses. It involves
querying DNS servers to resolve the domain name to the corresponding IP address.
19) What is Apache?
Apache is a widely used open-source web server software.
20) What is PHPAdmin?
phpMyAdmin is a web-based tool for managing MySQL databases.
21) Do you know about firewalls?
Yes, firewalls are network security systems that monitor and control incoming and
outgoing network traffic based on predetermined security rules.
22) What is an SSL certificate? How we can create the SSL certificate and where we
will do the configurations in apache for the SSL certificate?
An SSL certificate is a digital certificate that provides authentication for a
website and enables an encrypted connection. To create an SSL certificate, use tools
like OpenSSL. Configure SSL in Apache by editing the `/etc/httpd/conf.d/ssl.conf` or
`/etc/apache2/sites-available/default-ssl.conf` file.
23) Which is better, Apache or Nginx? For higher load which webserver is best?
Nginx is generally better for handling higher loads due to its event-driven
architecture, while Apache is preferred for its flexibility and .htaccess support.
24) What is the path of apache configuration files?
The main configuration files are located in `/etc/httpd/` or `/etc/apache2/`
depending on the distribution.
25) What is Cloud Computing?
Cloud computing is the delivery of computing services over the internet, including
storage, processing, and software, on a pay-as-you-go basis.
26) What is AWS?
AWS (Amazon Web Services) is a comprehensive cloud computing platform provided by
Amazon.
27) What is EC2?
EC2 (Elastic Compute Cloud) is a web service that provides resizable compute
capacity in the cloud.
28) How we can configure the EC2 instance?
Configure EC2 by launching an instance from the AWS Management Console, selecting an
AMI, instance type, configuring security groups, and key pairs.
29) What is AMI?
AMI (Amazon Machine Image) is a template that contains a software configuration (OS,
application server, applications) for launching an EC2 instance.
30) How we can choose which instance type is required?
Choose an instance type based on your workload requirements for CPU, memory,
storage, and networking capacity.
31) From where can we enable termination protection in EC2?
Enable termination protection from the AWS Management Console under the instance
settings.
32) Suppose we have to install Ubuntu then where do we have to define OS while
launching the EC2 instance?
Define the OS by selecting an Ubuntu AMI during the instance launch process.
33) What is .pem?
.pem is a file format that contains cryptographic keys and certificates, commonly
used for SSH key pairs.
34) If we stop the EC2 instance then is the Private IP will change? or Not?
The private IP will not change if you stop and start the instance.
35) Can you explain about inbound rules of the default security group?
Inbound rules define the traffic that is allowed to reach your instances. The
default security group allows all inbound traffic from instances assigned to the
same security group.
36) What is the use of public and private IP?
Public IPs are used for communication over the internet, while private IPs are used
for internal communication within a network.
37) What is a Security Group?
A security group acts as a virtual firewall for your instances to control inbound
and outbound traffic.
38) Security Group is stateful How?
Security groups are stateful, meaning if you allow an incoming request, the response
is automatically allowed regardless of outbound rules.
39) What is VPC?
VPC (Virtual Private Cloud) is a virtual network dedicated to your AWS account where
you can launch AWS resources in a logically isolated section.
40) What is CIDR?
CIDR (Classless Inter-Domain Routing) is a method for allocating IP addresses and
routing that replaces the traditional IP address classes.
41) What is Subnetting?
Subnetting is the process of dividing a network into smaller sub-networks to improve
performance and security.
42) What is an internet gateway?
An internet gateway allows communication between instances in your VPC and the
internet.
43) What is NAT and why do we use NAT gateway?
NAT (Network Address Translation) gateway enables instances in a private subnet to
connect to the internet or other AWS services without exposing their private IP
addresses.
44) What is Elastic IP?
Elastic IP is a static IPv4 address designed for dynamic cloud computing, allowing
you to mask the failure of an instance by remapping the address to another instance.
45) Tell me about VPC peering.
VPC peering allows you to connect two VPCs using private IP addresses, enabling
instances in different VPCs to communicate as if they are within the same network.
46) What is S3?
S3 (Simple Storage Service) is an object storage service that offers scalability,
data availability, security, and performance.
47) What is CloudTrail?
CloudTrail is a service that enables governance, compliance, and operational and
risk auditing of your AWS account.
48) What is CloudFront?
CloudFront is a content delivery network (CDN) service that delivers content to
users with low latency and high transfer speeds.
49) What is blue/green deployment?
Blue/green deployment is a release management strategy that reduces downtime and
risk by running two identical production environments.
50) What is CloudFormation and Terraform?
CloudFormation and Terraform are infrastructure-as-code tools that allow you to
define and manage your infrastructure using code.
51) What is Elastic Beanstalk?
Elastic Beanstalk is an AWS service for deploying and scaling web applications and
services.
52) What is RDS? Is there a need to worry about backups?
RDS (Relational Database Service) is a managed database service. Automated backups
are provided, but you should configure additional backups based on your needs.
53) What is Autoscaling and How many types of autoscaling policies?
Autoscaling automatically adjusts the number of instances based on demand. There are
three types of policies: target tracking, step scaling, and scheduled scaling.
54) What is Loadbalancer?
A load balancer distributes incoming network traffic across multiple servers to
ensure no single server becomes overwhelmed.
55) What is the difference between ALB and ELB?
ALB (Application Load Balancer) operates at the application layer (Layer 7) and can
distribute traffic based on content, while ELB (Classic Load Balancer) operates at
both the transport and application layers (Layer 4 and Layer 7).
56) What is PAAS?
PaaS (Platform as a Service) provides a platform allowing customers to develop, run,
and manage applications without dealing with the infrastructure.
57) Suppose you are working in a new company and you don’t know how to work on new
projects for the new company then which approach you will follow?
I would start by understanding the company's processes, studying documentation,
seeking guidance from colleagues, and leveraging any available training resources.
58) What is ACM?
ACM (AWS Certificate Manager) is a service that lets you easily provision, manage,
and deploy SSL/TLS certificates for use with AWS services.
59) What is shell scripting? How do we use the script for Automation?
Shell scripting is writing a series of commands for the shell to execute. Scripts
can perform system administration tasks, automate repetitive tasks, and manage
processes.
60) What is MySQL? How many ways we can use to take backup?
MySQL is an open-source relational database management system (RDBMS) that uses
Structured Query Language (SQL) for managing and manipulating databases
There are several ways to take a backup of MySQL databases:
mysqldump
mysqlhotcopy
MySQL Enterprise Backup
Physical Backup
Percona XtraBackup
Replication