SlideShare a Scribd company logo
AWS Interview Questions
1) Explain what is AWS?
AWS stands for Amazon Web Service; it is a collection of remote computing services also
known as cloud computing platform. This new realm of cloud computing is also known as
IaaS or Infrastructure as a Service.
2) Mention what are the key components of AWS?
The key components of AWS are
 Route 53: A DNS web service
 Simple E-mail Service: It allows sending e-mail using RESTFUL API call or via regular
SMTP
 Identity and Access Management: It provides enhanced security and identity management
for your AWS account
 Simple Storage Device or (S3): It is a storage device and the most widely used AWS service
 Elastic Compute Cloud (EC2): It provides on-demand computing resources for hosting
applications. It is very useful in case of unpredictable workloads
 Elastic Block Store (EBS): It provides persistent storage volumes that attach to EC2 to
allow you to persist data past the lifespan of a single EC2
 CloudWatch: To monitor AWS resources, It allows administrators to view and collect key
Also, one can set a notification alarm in case of trouble.
3) Explain what is S3?
S3 stands for Simple Storage Service. You can use S3 interface to store and retrieve any
amount of data, at any time and from anywhere on the web. For S3, the payment model is
“pay as you go”.
4) Explain what is AMI?
AMI stands for Amazon Machine Image. It’s a template that provides the information (an
operating system, an application server and applications) required to launch an instance,
which is a copy of the AMI running as a virtual server in the cloud. You can launch
instances from as many different AMIs as you need.
5) Mention what is the relation between an instance and AMI?
From a single AMI, you can launch multiple types of instances. An instance type defines
the hardware of the host computer used for your instance. Each instance type provides
different compute and memory capabilities. Once you launch an instance, it looks like a
traditional host, and we can interact with it as we would with any computer.
6) What does an AMI include?
An AMI includes the following things
 A template for the root volume for the instance
 Launch permissions decide which AWS accounts can avail the AMI to launch instances
 A block device mapping that determines the volumes to attach to the instance when it is
launched
7) How can you send request to Amazon S3?
Amazon S3 is a REST service, you can send request by using the REST API or the AWS
SDK wrapper libraries that wrap the underlying Amazon S3 REST API.
8) Mention what is the difference between Amazon S3 and EC2?
The difference between EC2 and Amazon S3 is that
EC2 S3
 It is a cloud web service used for hosting your application
 It is a data storage systemwhere any amoun
stored
 It is like a huge computer machine which can run either Linux or
Windows and can handle application like PHP, Python,Apache or any
databases
 It has a REST interface and uses secure HM
authentication keys
9) How many buckets can you create in AWS by default?
By default, you can create upto 100 buckets in each of your AWS accounts.
10) Explain can you vertically scale an Amazon instance? How?
Yes, you can vertically scale on Amazon instance. For that
 Spin up a new larger instance than the one you are currently running
 Pause that instance and detach the root webs volume from the server and discard
 Then stop your live instance and detach its root volume
 Note the unique device ID and attach that root volume to your new server
 And start it again
11) Explain what is T2 instances?
T2 instances are designed to provide moderate baseline performance and the capability to
burst to higher performance as required by workload.
12) In VPC with private and public subnets, database servers should ideally be launched into
which subnet?
With private and public subnets in VPC, database servers should ideally launch into private
subnets.
13) Mention what are the security best practices for Amazon EC2?
For secure Amazon EC2 best practices, follow the following steps
 Use AWS identity and access management to control access to your AWS resources
 Restrict access by allowing only trusted hosts or networks to access ports on your instance
 Review the rules in your security groups regularly
 Only open up permissions that your require
 Disable password-based login, for instance, launched from your AMI
14) Explain how the buffer is used in Amazon web services?
The buffer is used to make the system more robust to manage traffic or load by
synchronizing different component. Usually, components receive and process the requests
in an unbalanced way, With the help of buffer, the components will be balanced and will
work at the same speed to provide faster services.
15) While connecting to your instance what are the possible connection issues one might face?
The possible connection errors one might encounter while connecting instances are
 Connection timed out
 User key not recognized by the server
 Host key not found, permission denied
 Unprotected private key file
 Server refused our key or No supported authentication method available
 Error using MindTerm on Safari Browser
 Error using Mac OS X RDP Client
16) What is Amazon EC2 service?
Ans: EC2 uses Xen virtualization. Each virtual machine, called an “instance”. You can use Amazon
EC2 to launch as many or as couple of virtual servers as you need, design security and networking,
and manage storage. Amazon EC2 empowers you to scale up or down to handle changes in
requirements.
17) What is Amazon Machine Image (AMI)?
Ans: An Amazon Machine Image (AMI) is a template that contains a software configuration (for
example, an operating system, an application server, and applications). From an AMI, we launch an
instance, which is a copy of the AMI running as a virtual server in the cloud. We can launch multiple
instances of an AMI.
18) What is the relation between Instance and AMI?
Ans: We can launch different types of instances from a single AMI. An instance type essentially
determines the hardware of the host computer used for your instance. Each instance type offers
different compute and memory capabilities.
After we launch an instance, it looks like a traditional host, and we can interact with it as we would
any computer. We have complete control of our instances; we can use sudo to run commands that
require root privileges.
19) What are the Security Best Practices for Amazon EC2?
Ans: There are several best practices for secure Amazon EC2. Following are few of them.
Use AWS Identity and Access Management (IAM) to control access to your AWS resources.
Restrict access by only allowing trusted hosts or networks to access ports on your instance.
Review the rules in your security groups regularly, and ensure that you apply the principle of least
Privilege — only open up permissions that you require.
Disable password-based logins for instances launched from your AMI. Passwords can be found or
cracked, and are a security risk.
20) Explain Stopping, Starting, and Terminating an Amazon EC2 instance?
Ans:
Stopping and Starting an instance: When an instance is stopped, the instance performs a normal
shutdown and then transitions to a stopped state. All of its Amazon EBS volumes remain attached,
and you can start the instance again at a later time. You are not charged for additional instance hours
while the instance is in a stopped state.
Terminating an instance: When an instance is terminated, the instance performs a normal shutdown,
then the attached Amazon EBS volumes are deleted unless the volume’s deleteOnTermination
attribute is set to false. The instance itself is also deleted, and you can’t start the instance again at a
later time.
21) How to use Amazon SQS?
Ans: Amazon SQS is a message passing mechanism that is used for communication between
different connectors that are connected with each other. It also acts as a communicator between
various components of Amazon. It keeps all the different functional components together. This
functionality helps different components to be loosely coupled, and provide an architecture that is
more failure resilient system.
22) How buffer is used in Amazon web services?
Ans: Buffer is used to make the system more resilient to burst of traffic or load by synchronizing
different component. The components always receive and process the requests in unbalanced way.
Buffer keeps the balance between different components and makes them work at the same speed to
provide faster services.
23) How does cloud computing provides on-demand functionality?
Ans: Cloud computing is a metaphor used for internet. It provides on-demand access to virtualized IT
resources that can be shared by others or subscribed by you. It provides an easy way to provide
configurable resources by taking it from a shared pool. The pool consists of networks, servers,
storage, applications and services.
24) What is the difference between scalability and elasticity?
Ans: Scalability is a characteristic of cloud computing through which increasing workload can be
handled by increasing in proportion the amount of resource capacity. It allows the architecture to
provide on demand resources if the requirement is being raised by the traffic. Whereas, elasticity is
being one of the characteristic provide the concept of commissioning and decommissioning of large
amount of resource capacity dynamically. It is measured by the speed by which the resources are
coming on demand and the usage of the resources.
25) What are the different layers of cloud computing?
Ans: Cloud computing consists of 3 layers in the hierarchy and these are as follows:
1. Infrastructure as a Service (IaaS) provides cloud infrastructure in terms of hardware like memory,
processor speed etc.
2. Platform as a Service (PaaS) provides cloud application platform for the developers.
3. Software as a Service (SaaS) provides cloud applications which are used by the user directly
without installing anything on the system. The application remains on the cloud and it can be saved
and edited in there only.
26) How to secure your data for transport in cloud?
Ans: Cloud computing provides very good and easy to use feature to an organization, but at the same
time it brings lots of question that how secure is the data, which has to be transported from one place
to another in cloud. So, to make sure it remains secure when it moves from point A to point B in
cloud, check that there is no data leak with the encryption key implemented with the data you
sending.
Enjoy it!

More Related Content

What's hot

Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
Amazon Web Services
 
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Amazon Web Services
 
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
Edureka!
 
AWS 101
AWS 101AWS 101
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
Ian Massingham
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
Nagesh Ramamoorthy
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
Amazon Web Services
 
AWS EC2
AWS EC2AWS EC2
AWS EC2
Mahesh Raj
 
Technical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate OttawaTechnical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate Ottawa
Amazon Web Services
 
Amazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | Edureka
Amazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | EdurekaAmazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | Edureka
Amazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | Edureka
Edureka!
 
Basics AWS Presentation
Basics AWS PresentationBasics AWS Presentation
Basics AWS Presentation
Shyam Kumar
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
Amazon Web Services
 
Aws IAM
Aws IAMAws IAM
천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트:: AWS Summit Online Korea 2020
천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트::  AWS Summit Online Korea 2020천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트::  AWS Summit Online Korea 2020
천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트:: AWS Summit Online Korea 2020
Amazon Web Services Korea
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
Amazon Web Services
 
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Amazon Web Services
 
Aws concepts-power-point-slides
Aws concepts-power-point-slidesAws concepts-power-point-slides
Aws concepts-power-point-slides
Sushil Thapa
 
AWS core services
AWS core servicesAWS core services
AWS core services
Nagesh Ramamoorthy
 
[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅
[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅
[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅
Amazon Web Services Korea
 
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
Simplilearn
 

What's hot (20)

Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
 
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
 
AWS 101
AWS 101AWS 101
AWS 101
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
 
AWS EC2
AWS EC2AWS EC2
AWS EC2
 
Technical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate OttawaTechnical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate Ottawa
 
Amazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | Edureka
Amazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | EdurekaAmazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | Edureka
Amazon AWS | What is Amazon AWS | AWS Tutorial | AWS Training | Edureka
 
Basics AWS Presentation
Basics AWS PresentationBasics AWS Presentation
Basics AWS Presentation
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Aws IAM
Aws IAMAws IAM
Aws IAM
 
천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트:: AWS Summit Online Korea 2020
천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트::  AWS Summit Online Korea 2020천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트::  AWS Summit Online Korea 2020
천만사용자를 위한 AWS 클라우드 아키텍처 진화하기 – 문종민, AWS솔루션즈 아키텍트:: AWS Summit Online Korea 2020
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
 
Aws concepts-power-point-slides
Aws concepts-power-point-slidesAws concepts-power-point-slides
Aws concepts-power-point-slides
 
AWS core services
AWS core servicesAWS core services
AWS core services
 
[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅
[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅
[AWS Builders] AWS와 함께하는 클라우드 컴퓨팅
 
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
 

Similar to Aws interview questions

Aws interview questions and answers
Aws interview questions and answersAws interview questions and answers
Aws interview questions and answers
kavinilavuG
 
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IOT Academy
 
AWS Interview Questions and Answers -CREDO SYSTEMZ.pdf
AWS Interview Questions and Answers -CREDO SYSTEMZ.pdfAWS Interview Questions and Answers -CREDO SYSTEMZ.pdf
AWS Interview Questions and Answers -CREDO SYSTEMZ.pdf
nishajeni1
 
Aws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, CloudwatchAws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, Cloudwatch
sawsan slii
 
AWS Interview Questions and Answers.pdf
AWS Interview Questions and Answers.pdfAWS Interview Questions and Answers.pdf
AWS Interview Questions and Answers.pdf
nishajeni1
 
AWS Interview Questions and Answers_2023.pdf
AWS Interview Questions and Answers_2023.pdfAWS Interview Questions and Answers_2023.pdf
AWS Interview Questions and Answers_2023.pdf
nishajeni1
 
Aws101
Aws101Aws101
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
SamreenAkhtar8
 
Survey of International and Thai Cloud Providers and Cloud Software Projects
Survey of International and Thai Cloud Providers and Cloud Software ProjectsSurvey of International and Thai Cloud Providers and Cloud Software Projects
Survey of International and Thai Cloud Providers and Cloud Software Projects
t b
 
Amazon EC2
Amazon EC2Amazon EC2
Amazon EC2
sonal parmar
 
Cloud Computing With AWS
Cloud Computing With AWSCloud Computing With AWS
Cloud Computing With AWSMunish Gupta
 
Aws top 50 interview questions
Aws top 50 interview questionsAws top 50 interview questions
Aws top 50 interview questions
InfosecTrain
 
EC2 The AWS Compute Service.pptx
EC2 The AWS Compute Service.pptxEC2 The AWS Compute Service.pptx
EC2 The AWS Compute Service.pptx
Infosectrain3
 
AWS.pdf
AWS.pdfAWS.pdf
AWS.pdf
Nambi Nam
 
Interview Questions on AWS Elastic Compute Cloud (EC2).pdf
Interview Questions on AWS Elastic Compute Cloud (EC2).pdfInterview Questions on AWS Elastic Compute Cloud (EC2).pdf
Interview Questions on AWS Elastic Compute Cloud (EC2).pdf
Datacademy.ai
 
Aws class demo
Aws class demoAws class demo
Aws class demo
Animesh Roy
 
AWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the CloudAWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the Cloud
Amazon Web Services
 
Amazon AWS Quick start course
Amazon AWS Quick start courseAmazon AWS Quick start course
Amazon AWS Quick start course
Morgan Hill Consultants Ltd
 
Architecting Enterprise Applications In The Cloud
Architecting Enterprise Applications In The CloudArchitecting Enterprise Applications In The Cloud
Architecting Enterprise Applications In The Cloud
Amazon Web Services
 

Similar to Aws interview questions (20)

Aws interview questions and answers
Aws interview questions and answersAws interview questions and answers
Aws interview questions and answers
 
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaas
 
AWS Interview Questions and Answers -CREDO SYSTEMZ.pdf
AWS Interview Questions and Answers -CREDO SYSTEMZ.pdfAWS Interview Questions and Answers -CREDO SYSTEMZ.pdf
AWS Interview Questions and Answers -CREDO SYSTEMZ.pdf
 
Aws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, CloudwatchAws principle services: IAM,VPC, EC2, Cloudwatch
Aws principle services: IAM,VPC, EC2, Cloudwatch
 
AWS Interview Questions and Answers.pdf
AWS Interview Questions and Answers.pdfAWS Interview Questions and Answers.pdf
AWS Interview Questions and Answers.pdf
 
AWS Interview Questions and Answers_2023.pdf
AWS Interview Questions and Answers_2023.pdfAWS Interview Questions and Answers_2023.pdf
AWS Interview Questions and Answers_2023.pdf
 
Aws coi7
Aws coi7Aws coi7
Aws coi7
 
Aws101
Aws101Aws101
Aws101
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Survey of International and Thai Cloud Providers and Cloud Software Projects
Survey of International and Thai Cloud Providers and Cloud Software ProjectsSurvey of International and Thai Cloud Providers and Cloud Software Projects
Survey of International and Thai Cloud Providers and Cloud Software Projects
 
Amazon EC2
Amazon EC2Amazon EC2
Amazon EC2
 
Cloud Computing With AWS
Cloud Computing With AWSCloud Computing With AWS
Cloud Computing With AWS
 
Aws top 50 interview questions
Aws top 50 interview questionsAws top 50 interview questions
Aws top 50 interview questions
 
EC2 The AWS Compute Service.pptx
EC2 The AWS Compute Service.pptxEC2 The AWS Compute Service.pptx
EC2 The AWS Compute Service.pptx
 
AWS.pdf
AWS.pdfAWS.pdf
AWS.pdf
 
Interview Questions on AWS Elastic Compute Cloud (EC2).pdf
Interview Questions on AWS Elastic Compute Cloud (EC2).pdfInterview Questions on AWS Elastic Compute Cloud (EC2).pdf
Interview Questions on AWS Elastic Compute Cloud (EC2).pdf
 
Aws class demo
Aws class demoAws class demo
Aws class demo
 
AWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the CloudAWS Webcast - Best Practices in Architecting for the Cloud
AWS Webcast - Best Practices in Architecting for the Cloud
 
Amazon AWS Quick start course
Amazon AWS Quick start courseAmazon AWS Quick start course
Amazon AWS Quick start course
 
Architecting Enterprise Applications In The Cloud
Architecting Enterprise Applications In The CloudArchitecting Enterprise Applications In The Cloud
Architecting Enterprise Applications In The Cloud
 

More from Puneet Kumar Bhatia (MBA, ITIL V3 Certified)

Container Orchestration using kubernetes
Container Orchestration using kubernetesContainer Orchestration using kubernetes
Container Orchestration using kubernetes
Puneet Kumar Bhatia (MBA, ITIL V3 Certified)
 
Containerization using docker and its applications
Containerization using docker and its applicationsContainerization using docker and its applications
Containerization using docker and its applications
Puneet Kumar Bhatia (MBA, ITIL V3 Certified)
 
Java Microservices_64 Hours_Day wise plan (002).pdf
Java Microservices_64 Hours_Day wise plan (002).pdfJava Microservices_64 Hours_Day wise plan (002).pdf
Java Microservices_64 Hours_Day wise plan (002).pdf
Puneet Kumar Bhatia (MBA, ITIL V3 Certified)
 
Changing paradigm in job market
Changing paradigm in job marketChanging paradigm in job market
Changing paradigm in job market
Puneet Kumar Bhatia (MBA, ITIL V3 Certified)
 

More from Puneet Kumar Bhatia (MBA, ITIL V3 Certified) (12)

Introduction to Devops and its applications
Introduction to Devops and  its applicationsIntroduction to Devops and  its applications
Introduction to Devops and its applications
 
Container Orchestration using kubernetes
Container Orchestration using kubernetesContainer Orchestration using kubernetes
Container Orchestration using kubernetes
 
Containerization using docker and its applications
Containerization using docker and its applicationsContainerization using docker and its applications
Containerization using docker and its applications
 
Containerization using docker and its applications
Containerization using docker and its applicationsContainerization using docker and its applications
Containerization using docker and its applications
 
Java Microservices_64 Hours_Day wise plan (002).pdf
Java Microservices_64 Hours_Day wise plan (002).pdfJava Microservices_64 Hours_Day wise plan (002).pdf
Java Microservices_64 Hours_Day wise plan (002).pdf
 
Java Microservices_64 Hours_Day wise plan (002).pdf
Java Microservices_64 Hours_Day wise plan (002).pdfJava Microservices_64 Hours_Day wise plan (002).pdf
Java Microservices_64 Hours_Day wise plan (002).pdf
 
Changing paradigm in job market
Changing paradigm in job marketChanging paradigm in job market
Changing paradigm in job market
 
Kaizen08
Kaizen08Kaizen08
Kaizen08
 
Writing first-hudson-plugin
Writing first-hudson-pluginWriting first-hudson-plugin
Writing first-hudson-plugin
 
Network
NetworkNetwork
Network
 
Disney itil journey
Disney itil journeyDisney itil journey
Disney itil journey
 
Using itil prince2_together_august_2010
Using itil prince2_together_august_2010Using itil prince2_together_august_2010
Using itil prince2_together_august_2010
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Aws interview questions

  • 1. AWS Interview Questions 1) Explain what is AWS? AWS stands for Amazon Web Service; it is a collection of remote computing services also known as cloud computing platform. This new realm of cloud computing is also known as IaaS or Infrastructure as a Service. 2) Mention what are the key components of AWS? The key components of AWS are  Route 53: A DNS web service  Simple E-mail Service: It allows sending e-mail using RESTFUL API call or via regular SMTP  Identity and Access Management: It provides enhanced security and identity management for your AWS account  Simple Storage Device or (S3): It is a storage device and the most widely used AWS service  Elastic Compute Cloud (EC2): It provides on-demand computing resources for hosting applications. It is very useful in case of unpredictable workloads  Elastic Block Store (EBS): It provides persistent storage volumes that attach to EC2 to allow you to persist data past the lifespan of a single EC2  CloudWatch: To monitor AWS resources, It allows administrators to view and collect key Also, one can set a notification alarm in case of trouble. 3) Explain what is S3? S3 stands for Simple Storage Service. You can use S3 interface to store and retrieve any amount of data, at any time and from anywhere on the web. For S3, the payment model is “pay as you go”. 4) Explain what is AMI? AMI stands for Amazon Machine Image. It’s a template that provides the information (an operating system, an application server and applications) required to launch an instance, which is a copy of the AMI running as a virtual server in the cloud. You can launch instances from as many different AMIs as you need. 5) Mention what is the relation between an instance and AMI? From a single AMI, you can launch multiple types of instances. An instance type defines the hardware of the host computer used for your instance. Each instance type provides different compute and memory capabilities. Once you launch an instance, it looks like a traditional host, and we can interact with it as we would with any computer. 6) What does an AMI include? An AMI includes the following things
  • 2.  A template for the root volume for the instance  Launch permissions decide which AWS accounts can avail the AMI to launch instances  A block device mapping that determines the volumes to attach to the instance when it is launched 7) How can you send request to Amazon S3? Amazon S3 is a REST service, you can send request by using the REST API or the AWS SDK wrapper libraries that wrap the underlying Amazon S3 REST API. 8) Mention what is the difference between Amazon S3 and EC2? The difference between EC2 and Amazon S3 is that EC2 S3  It is a cloud web service used for hosting your application  It is a data storage systemwhere any amoun stored  It is like a huge computer machine which can run either Linux or Windows and can handle application like PHP, Python,Apache or any databases  It has a REST interface and uses secure HM authentication keys 9) How many buckets can you create in AWS by default? By default, you can create upto 100 buckets in each of your AWS accounts. 10) Explain can you vertically scale an Amazon instance? How? Yes, you can vertically scale on Amazon instance. For that  Spin up a new larger instance than the one you are currently running  Pause that instance and detach the root webs volume from the server and discard  Then stop your live instance and detach its root volume  Note the unique device ID and attach that root volume to your new server  And start it again 11) Explain what is T2 instances? T2 instances are designed to provide moderate baseline performance and the capability to burst to higher performance as required by workload. 12) In VPC with private and public subnets, database servers should ideally be launched into which subnet? With private and public subnets in VPC, database servers should ideally launch into private subnets. 13) Mention what are the security best practices for Amazon EC2? For secure Amazon EC2 best practices, follow the following steps
  • 3.  Use AWS identity and access management to control access to your AWS resources  Restrict access by allowing only trusted hosts or networks to access ports on your instance  Review the rules in your security groups regularly  Only open up permissions that your require  Disable password-based login, for instance, launched from your AMI 14) Explain how the buffer is used in Amazon web services? The buffer is used to make the system more robust to manage traffic or load by synchronizing different component. Usually, components receive and process the requests in an unbalanced way, With the help of buffer, the components will be balanced and will work at the same speed to provide faster services. 15) While connecting to your instance what are the possible connection issues one might face? The possible connection errors one might encounter while connecting instances are  Connection timed out  User key not recognized by the server  Host key not found, permission denied  Unprotected private key file  Server refused our key or No supported authentication method available  Error using MindTerm on Safari Browser  Error using Mac OS X RDP Client 16) What is Amazon EC2 service? Ans: EC2 uses Xen virtualization. Each virtual machine, called an “instance”. You can use Amazon EC2 to launch as many or as couple of virtual servers as you need, design security and networking, and manage storage. Amazon EC2 empowers you to scale up or down to handle changes in requirements. 17) What is Amazon Machine Image (AMI)? Ans: An Amazon Machine Image (AMI) is a template that contains a software configuration (for example, an operating system, an application server, and applications). From an AMI, we launch an instance, which is a copy of the AMI running as a virtual server in the cloud. We can launch multiple instances of an AMI. 18) What is the relation between Instance and AMI? Ans: We can launch different types of instances from a single AMI. An instance type essentially determines the hardware of the host computer used for your instance. Each instance type offers different compute and memory capabilities. After we launch an instance, it looks like a traditional host, and we can interact with it as we would any computer. We have complete control of our instances; we can use sudo to run commands that require root privileges. 19) What are the Security Best Practices for Amazon EC2?
  • 4. Ans: There are several best practices for secure Amazon EC2. Following are few of them. Use AWS Identity and Access Management (IAM) to control access to your AWS resources. Restrict access by only allowing trusted hosts or networks to access ports on your instance. Review the rules in your security groups regularly, and ensure that you apply the principle of least Privilege — only open up permissions that you require. Disable password-based logins for instances launched from your AMI. Passwords can be found or cracked, and are a security risk. 20) Explain Stopping, Starting, and Terminating an Amazon EC2 instance? Ans: Stopping and Starting an instance: When an instance is stopped, the instance performs a normal shutdown and then transitions to a stopped state. All of its Amazon EBS volumes remain attached, and you can start the instance again at a later time. You are not charged for additional instance hours while the instance is in a stopped state. Terminating an instance: When an instance is terminated, the instance performs a normal shutdown, then the attached Amazon EBS volumes are deleted unless the volume’s deleteOnTermination attribute is set to false. The instance itself is also deleted, and you can’t start the instance again at a later time. 21) How to use Amazon SQS? Ans: Amazon SQS is a message passing mechanism that is used for communication between different connectors that are connected with each other. It also acts as a communicator between various components of Amazon. It keeps all the different functional components together. This functionality helps different components to be loosely coupled, and provide an architecture that is more failure resilient system. 22) How buffer is used in Amazon web services? Ans: Buffer is used to make the system more resilient to burst of traffic or load by synchronizing different component. The components always receive and process the requests in unbalanced way. Buffer keeps the balance between different components and makes them work at the same speed to provide faster services. 23) How does cloud computing provides on-demand functionality? Ans: Cloud computing is a metaphor used for internet. It provides on-demand access to virtualized IT resources that can be shared by others or subscribed by you. It provides an easy way to provide configurable resources by taking it from a shared pool. The pool consists of networks, servers, storage, applications and services. 24) What is the difference between scalability and elasticity? Ans: Scalability is a characteristic of cloud computing through which increasing workload can be handled by increasing in proportion the amount of resource capacity. It allows the architecture to provide on demand resources if the requirement is being raised by the traffic. Whereas, elasticity is
  • 5. being one of the characteristic provide the concept of commissioning and decommissioning of large amount of resource capacity dynamically. It is measured by the speed by which the resources are coming on demand and the usage of the resources. 25) What are the different layers of cloud computing? Ans: Cloud computing consists of 3 layers in the hierarchy and these are as follows: 1. Infrastructure as a Service (IaaS) provides cloud infrastructure in terms of hardware like memory, processor speed etc. 2. Platform as a Service (PaaS) provides cloud application platform for the developers. 3. Software as a Service (SaaS) provides cloud applications which are used by the user directly without installing anything on the system. The application remains on the cloud and it can be saved and edited in there only. 26) How to secure your data for transport in cloud? Ans: Cloud computing provides very good and easy to use feature to an organization, but at the same time it brings lots of question that how secure is the data, which has to be transported from one place to another in cloud. So, to make sure it remains secure when it moves from point A to point B in cloud, check that there is no data leak with the encryption key implemented with the data you sending. Enjoy it!