Question 1. What Is An Aws Availability Zone?: Answer
Question 1. What Is An Aws Availability Zone?: Answer
Question 1. What Is An Aws Availability Zone?: Answer
SSH
SSH stands for secure shell. It is an encrypted protocol implemented in the application
layer that can be used to communicate with a remote server in a secure way. Many
additional technologies are built around this protocol because of its end-to-end
encryption and ubiquity.
There are many other protocols that we haven’t covered that are equally important.
However, this should give you a good overview of some of the fundamental
technologies that make the internet and networking possible.
The next step is DNS lookup. The system sends a request to find out the corresponding
MTA of the recipient. This will be done with the help of the MX record. In the DNS zone,
for the receiver address’ domain, there will be an MX record (stands for Mail Exchanger
record). This is a DNS resource record which specifies the mail server of a domain. So,
after the DNS lookup, a response is given to the requested mail server with the IP
address of the recipient’s mail server. This way the ‘to’ mail server is identified.
The next step is transferring the message between the mail servers. The SMTP protocol
is used for this communication. Now our message is with the recipient mail server
(MTA).
Now, this message is transferred to the Mail Delivery Agent and then it is transferred to
the recipient’s local computer. As we have seen earlier, two protocols can be used here.
If we use POP3, then the whole email will be downloaded to the local computer and the
copy at the server gets deleted. If the protocol used is IMAP, then the email message is
stored in the mail server itself, but the user can easily manipulate the emails on the mail
server as in the local computer. This is the difference when using both the protocols and
this is how your email gets delivered. If some error occurred to send the email, the
emails will be delayed. There is a mail queue in every mail server. These mails will be
pending in the mail queue. The mail server will keep trying to resend the email. Once
the email sending fails permanently, the mail server may send a bounce back email
message to the sender’s email address.
This explains why you maybe getting bounce back emails sometimes. The reason for
bouncing back will be explained in the message. There are many reasons for getting an
email to bounce back such as as incorrect email address in the ‘to’ field.
cloud computing means storing and accessing data and programs over the internet
instead of your computer's hard drive.
Be Preventative
Many server crashes can be prevented if you follow some key safety guidelines. Make
sure that the server room is clean and temperature-controlled. Keep the doors to the
server room closed to keep out dust, that might cause overheating. Keep it locked to
keep out unauthorized people.
Use firewalls and cryptographic keys to authenticate users. Conduct regular audits so
you catch problems as soon as possible. And make sure to conduct routine backups.
The best way to do this is to have your server set up to back itself up automatically.
IPSec is an Internet Engineering Task Force (IETF) standard suite of protocols between
2 communication points across the IP network that provide data authentication, integrity,
and confidentiality. It also defines the encrypted, decrypted and authenticated packets.
MTU: Stands for "Maximum Transmission Unit." MTU is a networking term that defines
the largest packet size that can be sent over a network connection.
WHAT HAPPENS WHEN URL IS TYPED
This is how I would explain it:
1. You enter a URL into a web browser
2. The browser looks up the IP address for the domain name via DNS
3. The browser sends a HTTP request to the server
4. The server sends back a HTTP response
5. The browser begins rendering the HTML
6. The browser sends requests for additional objects embedded in HTML (images,
css, JavaScript) and repeats steps 3-5.
7. Once the page is loaded, the browser sends further async requests as needed.
The difference between hard links and soft (or symbolic) links comes down to what they
reference. Hard links point, or reference, to a specific space on the hard drive. You can
have multiple files hard linked to the same place in the hard drive, but if you change the
data on one of those files, the other files will also reflect that change.
Symbolic links work a bit differently. A symbolic link still points to a specific point on the
hard drive, but if you create a second file, this second file does not point to the harddrive,
but instead, to the first file.
Routing protocols, according to the OSI routing framework, are layer management
protocols for the network layer, regardless of their transport mechanism:
NsLookup queries the specified DNS server and retrieves the requested records that are
associated with the domain name you provided. These records contain information like the
domain name’s IP addresses.
IP Address - a unique string of characters that identifies each computer using the Internet Protocol to
communicate over a network.
TCP/IP Model
The TCP/IP model, more commonly known as the Internet protocol suite, is another layering
model that is simpler and has been widely adopted. It defines the four separate layers, some
of which overlap with the OSI model:
Application: In this model, the application layer is responsible for creating and transmitting
user data between applications. The applications can be on remote systems, and should
appear to operate as if locally to the end user.
dive deep -Leaders operate at all levels, stay connected to the details, audit frequently, and are skeptical
when metrics and anecdote differ. No task is beneath them.
customer obsession - Leaders start with the customer and work backwards. They work vigorously to
earn and keep customer trust. Although leaders pay attention to competitors, they obsess over customers.
be curious -Leaders are never done learning and always seek to improve themselves. They are curious
about new possibilities and act to explore them.
Amazon Web Services (AWS) is a secure cloud services platform, offering compute power, database
storage, content delivery and other functionality to help businesses scale and grow. Running web and
application servers in the cloud to host dynamic websites.
1. Do you know our CEO? How do you pronounce his name? Jeff Bezos
2. How would you solve problems if you were from Mars?
3. Tell the story of the last time you had to apologize to someone.
4. What is the most difficult situation you have ever faced in your life? How did you handle
it?
5. Walk me through how Amazon Kindle books would be priced.
6. Who was your most difficult customer?
7. What would you do if you found out that your closest friend at work was stealing?
8. If your direct manager was instructing you to do something you disagreed with, how
would you handle it?
9. What would you do if you saw someone being unsafe at work?
10. Do you think you'll reach a point where you storm off the floor and never return?
1. Can you describe your most difficult customer and how you were able to handle
their needs?
“In my previous role as a consultant, a customer was upset that a product they ordered was put
on backorder unexpectedly after they made their purchase. They needed a functional version of
the item as quickly as possible, and the possibility that that wouldn’t happen increased their
stress levels, leaving them somewhat hostile. To resolve their issue, I began by listening to their
concern, rephrasing what was being shared, and asking clarifying questions to ensure my full
understanding. I then reassured them that I’d work with them to find a solution. I discussed
alternative products that were in stock that could meet their needs. As soon as a substitute was
identified, we canceled the old order and initiated the new one. I applied a free shipping upgrade
to expedite delivery, ensuring it would arrive before the customer’s deadline. In the end, they
were fully satisfied with the solution.”
2. Can you tell me about a time when you were more than halfway through a project
and had to pivot quickly due to an unexpected change? How did you handle it?
“While setting up a network for a client, a requirement came in late. Since the project was
rapidly nearing completion, integrating the feature became a challenge. The point in
development where it would have been addressed typically had already passed. To address the
new requirement, I first took a step back and reexamined all the existing work. The goal was to
minimize disruption to segments that were complete, and a bit of planning ensured I didn’t use a
less-than-ideal approach simply because I was under pressure. After identifying a course of
action, I implemented the changes methodically. I relied heavily on testing to ensure there were
no unexpected ramifications or that issues could be addressed quickly. By using a strategic
approach, I was able to minimize the negative implications of a last-minute change, expediting
the remainder of the process while ensuring the result met every need.”
3. If one of your close work colleagues stole a $1 item, what would you do?
“Theft, in any amount, is against policy and is illegal, so it needs to be addressed. If I witnessed a
colleague stealing, I would report the activity per Amazon corporate procedures.”
o A recursive DNS server is a domain name system server that takes website name
or URL (uniform resource locator) requests from users and checks the records
attained from authoritative DNS servers for the associated IP address.
o Authoritative DNS has the final authority over a domain and is responsible for
providing answers to recursive DNS servers with the IP address information
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used
to automate the process of configuring devices on IP networks, thus allowing them
to use network services such as DNS, NTP, and any communication protocol based on UDP or
TCP.
User Datagram Protocol (UDP) – a communications protocol that facilitates the exchange of
messages between computing devices in a network. It's an alternative to the transmission
control protocol (TCP).
TCP (Transmission Control Protocol) is a standard that defines how to establish and
maintain a network conversation through which application programs can exchange data.
TCP/IP is the underlying communication language of the Internet. In base terms, TCP/IP allows
one computer to talk to another computer via the Internet through compiling packets of data and
sending them to right location
DDOS - the intentional paralyzing of a computer network by flooding it with data sent
simultaneously from many individual computers.
The key difference between DoS and DDoS attacks is that the DDoS uses multiple
internet connections to put the victim’s computer network offline whereas the former
uses a single connection.
tcpdump is a data-network packet analyzer computer program that runs under a command line
interface.
SSL secure sockets layer. Protocol for web browsers and servers that allows for the
authentication, encryption and decryption of data sent over the Internet.
Load balancing is defined as the methodical and efficient distribution of network or application
traffic across multiple servers in a server farm.
IDS/IPS
Intrusion Detection Systems (IDS): analyze and monitor network traffic for signs that
indicate attackers are using a known cyberthreat to infiltrate or steal data from your
network. IDS systems compare the current network activity to a known threat database to
detect several kinds of behaviors like security policy violations, malware, and port
scanners.
Intrusion Prevention Systems (IPS): live in the same area of the network as a firewall,
between the outside world and the internal network. IPS proactively deny network traffic
based on a security profile if that packet represents a known security threat.
Stateful inspection firewall keeps track of the state of a connection by monitoring the TCP 3-
way handshake. This allows it to keep track of the entire connection – from start to end –
permitting only expected return traffic inbound.
Proxy firewall serves as an intermediate device between internal and external systems
communicating over the Internet. It protects a network by forwarding requests from the original
client and masking it as its own. Proxy means to serve as a substitute and, accordingly, that is the
role it plays. It substitutes for the client that is sending the request.
Proxy is the intermediary that the client puts forward between itself and any server. The reverse
proxy is at the other end – something the server puts forward between itself and any client. In
short, a reverse proxy is an intermediary on the side of the server you are connecting to.
It performs the above task by using a logical network addressing and subnetting designs of
the network. Irrespective of the two different networks working on the same or different
protocol or different topologies the function of this layer is to route the packets from the
source to destination by using the logical IP addressing and routers for communication.
The main function of this layer is to provide sync in the dialogue between the two distinctive
applications. The synchronization is necessary for efficient delivery of data without any loss at the
receiver end.
It plays the role of a translator so that the two systems come on the same platform for communication
and will easily understand each other.
The data which is in the form of characters and numbers are split into bits before transmission by the
layer. It translates the data for networks in the form in which they require it and for devices like
phones, PC, etc in the format they require it.
The layer also performs data encryption at the sender’s end and data decryption at the receiver’s end.
It also performs data compression for multimedia data before transmitting, as the length of
multimedia data is very big and much bandwidth will be required to transmit it over media, this data
is compressed into small packets and at the receiver’s end, it will be decompressed to get the original
length of data in its own format.
This layer grants a direct interface and access to the users with the network. The users can directly
access the network at this layer. Few Examples of services provided by this layer include e-mail,
sharing data files, FTP GUI based software like Netnumen, Filezilla (used for file sharing), telnet
network devices etc.
There is vagueness in this layer as is not all user-based information and the software can be planted
into this layer.
FIPS (Federal Information Processing Standards) are a set of standards that describe document
processing, encryption algorithms and other information technology standards for use within non-military
government agencies and by government contractors and vendors who work with the agencies.
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID and password to
any of several related, yet independent, software systems.
Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP)
to pass authorization credentials to service providers (SP). What that jargon means is that you can use one
set of credentials to log into many different websites
A federated identity in information technology is the means of linking a person's electronic identity and
attributes, stored across multiple distinct identity management systems.
If You Suffer A Ransomware Attack
Realizing your business is a victim to a ransomware attack is stressful. Nevertheless, the first
thing to do is try to react calmly. These additional strategies can help you prevent a wider
infection and regain access to computers and files.
Disconnect. This is a little like amputating a limb to avoid the spread of the infection to the rest
of the body. Disconnecting the infected device from the Internet and any other devices is
necessary to the safety of the larger network.
Determine what you’re dealing with. Use the information in the ransom note to help you
research the situation. Enter the email address, the name of the ransomware, or even the text of
the note into a search engine to learn more. You may find the cybercriminal is bluffing, or you
might be able to access an available decryptor.
Remove the ransomware. Simple ransomware viruses can be cleaned up with malware removal
in a system safe mode. However, aggressive ransomware disables system restore options and you
may need to run a virus scanner from a bootable disc or USB drive.
Report the crime. Contact law enforcement, typically the closest FBI office, to report that you
have been the victim of a ransomware attack. This can feel frustrating, as they may not be able to
help much, yet making them aware might help others avoid a similar fate.
Revert to backups. Seriously, did we mention yet how smart it is to backup often? By
reinstalling the operating system and restoration of files from your backups, you’ll be back in
business with your most important files at the ready once again.
1. Can you walk me through a typical day here at as cloud support engineer?
2. How will I be trained, one on one, in a virtual classroom setting?
3. Where do you see the company in 5 years? 10?
4. Can you tell me what the career paths are for this department and what
sort of advancements I could work towards?
5. Can you tell me what you love the most about working here?
6. How would you describe the working environment here? Is work done in a
collaborative style or are employees more independent?