AWS - Interview Questions and Answers
AWS - Interview Questions and Answers
Do you believe that you have the right stuff to be a section in the
advancement of future AWS, the GangBoard is here to control you to
sustain your vocation. Various fortune 1000 organizations around the
world are utilizing the innovation of AWS to meet the necessities of
their customers. AWS is being utilized as a part of numerous
businesses. To have a great development in AWS work, our page
furnishes you with nitty-gritty data as AWS prospective employee
meeting questions and answers. Amazon Redshift Interview
Questions and answers are prepared by 10+ years experienced
industry experts. Amazon Redshift Interview Questions and answers
are very useful to the Fresher or Experienced person who is looking
for the new challenging job from the reputed company. Our Amazon
Redshift Questions and answers are very simple and have more
examples for your better understanding.
Answer:
Answer:
Answer:
Scalability up/down
Pay for what ever we use
Answer: PostgreSQL
Answer: Answer:
AWS RDS is used for database using MariaDB, Oracle DB, Amazon
Aurora, Mysql and others.
Yes
Uses only foreign keys
No
Answer: YES
key-value
database
row
columnar
Answer: columnar
Small queries
complex queries
small data
Storage service
database
System Storage
Answer: database
Answer: Redshift can go from one node up to 128 nodes and each
node has so many cores,and each node by itself has 160 gigabytes of
space. So, Overall it provides lot of space.
There is a leader node and the leader node is used to planning the
queries and aggregate results across all compute nodes.So the
compute nodes are going to actually be performing the queries and
they will send the results back to the leader.If you have one node, then
that nodeis both a leader node and a compute node.
Answer:
Q44) What are the business intelligent tools to which Redshift can
be integrated with?
Answer:
RDS
MYSQL
DYNAMO DB
REDSHIFT
Answer:
Answer:
Answer: Postgresql
Do you believe that you have the right stuff to be a section in the
advancement of future AWS, the GangBoard is here to control you to
sustain your vocation. Various fortune 1000 organizations around the
world are utilizing the innovation of AWS to meet the necessities of
their customers. AWS is being utilized as a part of numerous
businesses. To have a great development in AWS work, our page
furnishes you with nitty-gritty data as AWS prospective employee
meeting questions and answers. AWS Interview Questions and
answers are prepared by 10+ years experienced industry
experts. AWS Interview Questions and answers are very useful to the
Fresher or Experienced person who is looking for the new challenging
job from the reputed company. Our AWS Questions and answers are
very simple and have more examples for your better understanding.
By this AWS Interview Questions and answers, many students are got
placed in many reputed companies with high package salary. So
utilize our AWS Interview Questions and answers to grow in your
career.
On-demand
Reserved
Spot
Scheduled
Dedicated
Answer:
General purpose
Provisioned IOPS
Magnetic
Cold HDD
Throughput optimized
General purpose
Computer Optimized
Storage Optimized
Memory Optimized
Accelerated Computing
Q12)What is an AMI?
Q16) What are the cloudwatch metrics that are available for EC2
instances?
Answer: Glacier is the back up or archival tool that you use to back
up your data in S3.
Answer: There are two ways that you can control the access to your
S3 buckets,
Answer: You can encrypt the data by using the below methods,
Storage used
Number of requests you make
Storage management
Data transfer
Transfer acceleration
Q26) What are policies and what are the types of policies?
Answer: Policies are permissions that you can attach to the users that
you create. These policies will contain that access that you have
provided to the users that you have created. There are 2 types of
policies.
Managed policies
Inline policies
Answer: Edge location is the place where the contents will be cached.
When a user tries to access some content, the content will be searched
in the edge location. If it is not available then the content will be made
available from the origin location and a copy will be stored in the
edge location.
Q29) What is the maximum individual archive that you can store
in glacier?
Answer: VPC stands for Virtual Private Cloud. VPC allows you to
easily customize your networking configuration. VPC is a network
that is logically isolated from other network in the cloud. It allows
you to have your own IP address range, subnets, internet gateways,
NAT gateways and security groups.
Answer: You can use security groups and NACL (Network Access
Control List) to control the security to your
VPC.
File gateway
Volume gateway
Tape gateway
Aurora
Oracle
MYSQL server
Postgresql
MariaDB
SQL server
Simple routing
Latency routing
Failover routing
Geolocation routing
Weighted routing
Multivalue answer
Standard queue
FIFO (First In First Out)
Automated backups
Manual backups which are known as snapshots.
Q47) What are the two types of access that you can provide when
you are creating users?
Answer: Following are the two types of access that you can create.
Programmatic access
Console access
Answer: Security groups acts as a firewall that contains the traffic for
one or more instances. You can associate one or more security groups
to your instances when you launch then. You can add rules to each
security group that allow traffic to and from its associated instances.
You can modify the rules of a security group at any time, the new
rules are automatically and immediately applied to all the instances
that are associated with the security group
Answer: Shared AMI’s are the AMI that are created by other
developed and made available for other developed to use.
Answer: 5
Answer: no it’s not possible, we can increase it but not reduce them
Answer: These are ipv4 address which are used to connect the
instance from internet, they are charged if the instances are not
attached to it
Answer: yes its possible from console use modify volumes in section
give the size u need then for windows go to disk management for
Linux mount it to achieve the modification
Answer: Yes it’s possible to stop rds. Instance which are non-
production and non multi AZ’s
Q62) What is the use of tags and how they are useful?
Answer: As AWS user I don’t have access to use it, I need to have
permissions to use it further
Q66) You are enabled sticky session with ELB. What does it do
with your instance?
Answer: To verify that there is a rule that allows traffic from EC2
Instance to your computer
Q70) You have chosen a windows instance with Classic and you
want to make some change to the
Q71) Load Balancer and DNS service comes under which type of
cloud service?
Answer: IAAS-Storage
Q78) Which the AWS services will you use to the collect and the
process e-commerce data for the near by real-time analysis?
Q80) Which the statement use to cases are suitable for Amazon
DynamoDB?
Q85) How will change the instance give type for the instances,
which are the running in your applications tier and Then using
Auto Scaling. Where will you change it from areas?
Answer: Let Create a load balancer, and Give register the Amazon
EC2 instance with it.
Q89) What are the life cycle to hooks used for the AutoScaling?
Answer: They are used to the put an additional taken wait time to the
scale in or scale out events.
Answer: The user should be attach an IAM roles with the DynamoDB
access to EC2 instance.
Answer:An Create an IAM role for the EC2 that allows list access to
objects in S3 buckets. Launch to instance with this role, and
retrieve an role’s credentials from EC2 Instance make metadata.
Answer: Check the service limits in the Trusted Advisors and adjust
as necessary, so that forecasted count remains within the limits.
Answer: To use a separate ELB for the each instance type and the
distribute load to ELBs with a Route 53 weighted round of robin.
Enroll Now!
Answer:
Answer:
Private Cloud
Public Cloud
Hybrid cloud
Community cloud 4
Answer:
Q116)What is AWS?
Answer:
AWS Console
AWS CLI (Command line interface)
AWS SDK (Software Development Kit)
Benefits:
On-Demand Instances
Reserved Instances
Spot Instances
Dedicated Host
Answer:
General Purpose
Compute Optimized
Memory optimized
Storage Optimized
Accelerated Computing (GPU Based)
Answer:
Types of AMI:
Published by AWS
AWS Marketplace
Generated from existing instances
Uploaded virtual server
Answer:
Q129)What is EBS?
Answer: Cold HDD: Cold HDD volumes are designed for less
frequently accessed workloads. These volumes are significantly less
expensive than throughput-optimized HDD volumes.
Answer:
Para virtualization: This AMI boot with a special boot loader called
PV-GRUB. The ability of the guest kernel to communicate directly
with the hypervisor results in greater performance levels than
other virtualization approaches but they cannot take advantage of
hardware extensions such as networking, GPU etc. Its customized
Virtualization image. Virtualization image can be used only for
particular service.
Answer:
Answer:
Answer:
Answer:
Amazon S3 Standard
Amazon S3 Standard-Infrequent Access
Amazon S3 Reduced Redundancy Storage
Amazon Glacier
Answer:
Answer:
NAT instance: A network address translation (NAT) instance is an
Amazon Linux machine Image (AMI) that is designed to accept
traffic from instances within a private subnet, translate the source IP
address to the Public IP address of the NAT instance and forward the
traffic to IWG.
Answer:
User Name/Password
Access Key
Access Key/ Session Token
Data ware house is a central repository for data that can come from
one or more sources. Organization typically use data warehouse to
compile reports and search the database using highly complex
queries. Data warehouse also typically updated on a batch schedule
multiple times per day or per hour compared to an OLTP (Online
Transaction Processing) relational database that can be updated
thousands of times per second.
Answer:
Manual Scaling
Scheduled Scaling
Dynamic Scaling
Answer:
Answer:
Simple
Weighted
Latency Based
Failover
Geolocation
Users: IT Administrators
Answer:The API tools can be used for spin up services and also for
the written scripts. Persons scripts could be coded in Perl, bash or
other languages of your preference. There is one more option that is
flowery management and stipulating tools such as a dummy or
improved descendant. A tool called Scalar can also be used and
finally we can go with a controlled explanation like a Right scale.
Which automation gears can help with pinup service.
Use the following process to create your own AMI using the AWS
Administration Console:
Read the message box that appears. To view the AMI standing, go to
the AMIs page. Here you can see your AMI being created. It can take
a though to create the AMI. Plan for at least 20 minutes, or slower if
you’ve connected a lot of additional applications or data.
Answer:
Answer:
Q180)
Answer:Truly, it very well may be pushed off for examples with root
approaches upheld by local event stockpiling. By utilizing Amazon
S3, engineers approach the comparative to a great degree versatile,
reliable, quick, low-valued information stockpiling substructure that
Amazon uses to follow its own overall system of sites. So as to
perform frameworks in the Amazon EC2 air, engineers utilize the
instruments giving to stack their Amazon Machine Images (AMIs)
into Amazon S3 and to exchange them between Amazon S3 and
Amazon EC2. Extra use case may be for sites facilitated on EC2 to
stack their stationary substance from S3.
Answer:You may run over at least one AMI related AWS engineer
inquiries amid your AWS designer meet. Along these lines, set
yourself up with a decent learning of AMI.
Mapping for square gadget to compute the aggregate volume that will
be appended to the example at the season of dispatch
Amazon S3
Amazon EC2
Amazon EBS
Amazon EC2 Instance Store
Amazon S3
Adding Storage
Amazon EC2 is the basic subject you may run over while
experiencing AWS engineer inquiries questions. Get a careful
learning of the EC2 occurrence and all the capacity alternatives for
the EC2 case.
Minimum Access: Make beyond any doubt that your EC2 example
has controlled access to the case and in addition to the system. Offer
access specialists just to the confided in substances.
Policies are for users and groups, Where we can assign permission to
user’s and groups.
Answer:
Route Table
Network ACL
Security Group
Public Subnet will have internet access and Private subnet will not
have the internet access directly.
Q206) How do you access the Ec2 which has private IP which is in
private Subnet ?
Answer: We can access using VPN if the VPN is configured into that
Particular VPC where Ec2 is assigned to that VPC in the Subnet. We
can access using other Ec2 which has the Public access.
Answer:
Answer:
MariaDB
MYSQL DB
MS SQL DB
Postgre DB
Oracle DB
Answer: System Status Checks – System Status checks will look into
problems with instance which needs AWS help to resolve the issue.
When we see system status check failure, you can wait for AWS to
resolve the issue, or do it by our self.
Network connectivity
System power
Software issues Data Centre’s
Hardware issues
Instance Status Checks – Instance Status checks will look into
issues which need our involvement to fix the issue. if status
check fails, we can reboot that particular instance.
Failed system status checks
Memory Full
Corrupted file system
Kernel issues
Q215) EBS: its block-level storage volume which we can use after
mounting with EC2 instances.
Answer:
Answer:
Df –k
mkfs.ext4 /dev/xvdf
Fdisk –l
Mkdir /my5gbdata
Mount /dev/xvdf /my5gbdata
Cd /etc/fstab
Answer: Service Role are meant for usage of AWS Services and
based upon the policies attached to it,it will have the scope to do its
task. Example : In case of automation we can create a service role and
attached to it.
Federated Roles are meant for User Access and getting access to
AWS as per designed role. Example : We can have a federated role
created for our office employee and corresponding to that a Group
will be created in the AD and user will be added to it.
Answer: Root User will have acces to entire AWS environment and it
will not have any policy attached to it. While IAM User will be able
to do its task on the basis of policies attached to it.
Answer: When an IAM user is created and it is not having any policy
attached to it,in that case he will not be able to access any of the AWS
Service until a policy has been attached to it.
Answer: 5TB
Answer:Yes
Answer: False
Answer: No
Answer: Yes
Q249) Which AWS service will you use to collect and process
ecommerce data for near real time analysis?
Answer: a
Explanation: The standard instances are deemed to be suitable for
standard server applications.
Answer: a
Explanation: Pricing varies by zone, instance, and pricing model.
Answer: d
Explanation: Hundreds of free and paid AMIs can be found on AWS.
Answer: d
Explanation: There are four different EC2 service zones or regions.
Answer: c
Explanation: In S3, storage containers are referred to as buckets.
8. Which of the following can be done with S3 buckets through the
SOAP and REST APIs ?
a) Upload new objects to a bucket and download them
b) Create, edit, or delete existing buckets
c) Specify where a bucket should be stored
d) All of the mentioned
View Answer
Answer: d
Explanation: The REST API is preferred to the SOAP API, because it
is easier to work with large binary objects with REST.
Answer: b
Explanation: Versioning also can be used for preserving data and for
archiving purposes.
Answer: c
Explanation: S3 excels in applications where storage is archival in
nature.
Automated backup are the key processes here as they work in the
background without requiring any manual intervention. Whenever
there is a need to back up the data, AWS API and AWS CLI play a
vital role in automating the process through scripts. The best way is to
prepare for a timely backup of EBS of the EC2 instance. The EBS
snapshot should be stored on Amazon S3 and can be used for
recovery of the database instance in case of any failure or downtime.
Spot Instances are spare unused EC2 instances which one can bid for.
Once the bid exceeds the existing spot price (which changes in real-
time based on demand and supply) the spot instance will be launched.
If the spot price becomes more than the bid price then the instance can
go away anytime and terminated within 2 minutes of notice. The best
way to decide on the optimal bid price for a spot instance is to check
the price history of last 90 days that is available on AWS console. The
advantage of spot instances is that they are cost-effective and the
drawback is that they can be terminated anytime. Spot instances are
ideal to use when –
The boot time for an Amazon Instance Store -Backed AMI is usually
less than 5 minutes.
When the users are up to 100, an EC2 instance alone is enough to run
the entire web application or the database until the traffic ramps up.
Under such circumstances when the traffic ramps up, it is better to
scale vertically by increasing the capacity of the EC2 instance to meet
the increasing demands of the application. AWS supports instances up
to 128 virtual cores or 488GB RAM.
When the users for your application grow up to 1000 or more, vertical
cannot handle requests and there is need for horizontal scaling which
is achieved through distributed file system, clustering, and load
balancing.
13. If you have half of the workload on public cloud while the
other half is on local storage, what kind of architecture will you
use for this ?
You can acheive this with the use of lifecycle hooks. They are
powerful as they let you pause the creation or termination of an
instance so that you can sneak peak in and perform custom actions
like configuring the instance, downloading the required files, and any
other steps that are required to make the instance ready.Every auto
scaling group can have multiple lifecycle hooks.
AWS Security groups associated with EC2 instances can help you
safeguard EC2 instances running in a VPC by providing security at
the protocol and port access level. You can configure both INBOUND
and OUTBOUND traffic to enables secured access for the EC2
instance.AWS security groups are much similar to a firewall-they
contain set of rules which filter the traffic coming into and out of an
EC2 instance and deny any kind of unauthorized access to EC2
instances.
18. What are some of the key best practices for security in
Amazon EC2?
We can use a c4.8x large instance or i2.large for this, but using a
c4.8x will require a better configuration on PC.
Using the REST API or the AWS SDK wrapper libraries which wrap
the underlying Amazon S3 REST API.
26. How will you bind the user session with a specific instance
in ELB (Elastic Load Balancer) ?
Amazon S3 EBS
Paradigm Object Store Filesystem
Private Key or Public Visible only to your
Security
Key EC2
Redundancy Across data centers Within the data center
Performance Fast Superfast
34. You are launching an instance under the free usage tier
from AMI having a snapshot size of 50GB. How will you launch
the instance under the free usage tier ?
It is not possible to launch this instance under the free usage tier.
Cloud is like a third-party server where we can store data big data, no
hardware software needed, if you have internet you can work from
anywhere just like Gmail. E.g.- Gmail, you go to the browser type
Gmail and enters credentials and can access it from anywhere.
Multi-tenant
Subscription
No large setup fee
Fixed, predictable cost
Scales with your business
Automatic Upgrade
Here are the reasons why you should consider cloud computing as a
developer. A cloud system takes care of your Network, storage
approach, Operating System, database, etc. infrastructure related
services all by itself and you need not bother. It helps you weave up
quick applications that itself takes care of Security, sharing of the
apps, integration models, etc. you get inbuilt in cloud apps.
Q5). What are the basic structures of the Amazon EC2 service?
When you dispatch an instance, the root device volume has the
picture that was utilized to boot up the case in any case.
Q14). How will you monitor the network traffic in your AWS
VPC?
100 buckets can be made in every one of the AWS accounts. If extra
buckets are required then you can increment the bucket limit by
presenting a service limit increase.
Q19). Imagine that you are launching an instance under the free
usage tier from AMI having a snapshot size of 50GB. How are
you going to launch the instance under the free usage tier?
It is not possible to launch this particular instance under the free usage
tier.
AWS Edge locations are the AWS services which superfluously cache
data and images.
Further, the database bunch permits port 3306 from the web server
gathering and port 22 from the hop box gathering. Add any machines
to the web server gathering, and they would all be able to hit the
database. Nobody from the world can, and nobody can
straightforwardly ssh to any of your cases.
The Amazon virtual private cloud classic link will allow EC2
examples in the EC2 great stage. This happens so it can speak with
the occasions that are available in the virtual private cloud. The
correspondence happens with the assistance of private IP addresses.
To utilize a great connection, it is significant that you empower it to
for virtual private cloud in your record. At that point, you should
relate a security bunch with a case in the EC2 great. This security
bunch is from the VPC for which you empowered the great
connection in your record. Every single principle that is there for the
VPC security bunch is relevant for the correspondences between the
examples in EC2 exemplary and those cases in the VPC.
Security groups in Amazon EC2 are one of the routes through which
the security of the cloud organize is ensured. They go about as a
firewall and are utilized for controlling both the inbound just as
outbound traffic at the dimension of the instance.
Q42). Which instance will you use for deploying a 4-node Hadoop
cluster in AWS?
We can utilize a c4.8x large instance or i2. large for this, yet utilizing
a c4.8x will require a superior configuration on PC.
Q43). How can you bind a user session with the specific instance
in ELB (Elastic Load Balancer)?
We can do that by utilizing the REST API or the AWS SDK wrapper
libraries which wrap the basic Amazon S3 REST API.
Q54). Where do you think an AMI fits, when you are designing an
architecture for a solution?
When a system has a greater number of hosts, dealing with these hosts
can be very tasking under an extensive solitary system. Subsequently,
we partition this huge system into effortless small sub-systems
(subnets) with the goal that the tasks of management under each
subnet winds up being less demanding.
GET operation helps you to retrieve the newest version of the object.
The virtual private cloud is associated with the server farm with the
assistance of an equipment VPN association. Web convention security
VPN associations are upheld by Amazon. To assistant the uprightness
and privacy of any information which is in travel, this information is
exchanged between the VPN and the server farms are directed over a
scrambled VPN association. To set up an equipment VPN association,
you needn't bother with the accessibility of an Internet passage.
Boolean searches
Prefix Searches
Range searches
Entire text search
AutoComplete advice
Key – pairs are secure login data for your virtual machines. To
associate with the occurrences, you can utilize key-sets which contain
a public-key and private-key.
Utilizing a fixed root secret key for an open AMI is a security chance
that can rapidly become known. Not with standing depending on
clients to change the password after the first login opens a lucky little
opening for potential maltreatment.
1. What is AWS?
Answer : AWS full form (amazon web services). AWS is a secure
cloud services platform offering compute, database, storage, content
delivery and many other functionality to help business grow up.
AWS is fully on-demand.
AWS is Flexibility, availability and Scalability.
1. Username / Password
2. Access Key (.pem)
3. Access Key / Session Token.
SC - (Storage Controller)
CLC- (Cloud Controller)
NC- (Node Controller)
CC- (Cluster Controller)
Walrus.
14. What is s3 ?
Answer :- S3 full form (Simple Storage Service). S3 used interface to
store and retrieve amount of data, at any time and from anywhere on
the web.
4) What is AMI?
AMI stands for Amazon Machine Image. It’s a template that provides
the information (an operating system, an application server, and
applications) required to launch an instance, which is a copy of the
AMI running as a virtual server in the cloud. You can launch
instances from as many different AMIs as you need.
EC2 S3
It is a data storage system
It is a cloud web service used for
where any amount of data can
hosting your application
be stored
Spin up a new larger instance than the one you are currently
running
Pause that instance and detach the root webs volume from the
server and discard
Then stop your live instance and detach its root volume
Note the unique device ID and attach that root volume to your
new server
And start it again
13) Mention what the security best practices for Amazon EC2
are?
For secure Amazon EC2 best practices, follow the following steps
General purpose
Computer Optimized
Memory Optimized
Storage Optimized
Accelerated Computing
Edge location is the area where the contents will be cached. So, when
a user is trying to accessing any content, the content will
automatically be searched in the edge location.
VPC stands for Virtual Private Cloud. It allows you to customize your
networking configuration. It is a network which is logically isolated
from another network in the cloud. It allows you to have your IP
address range, internet gateways, subnet and security groups.
31) DNS and Load Balancer service comes under which type of
cloud service?
DNS and Load Balancer and DNS services come under IAAS-storage
cloud service.
38) Name the AWS service exists only to redundantly cache data
and images?
AWS Edge locations are service which redundantly cache data and
images.
41) What is boot time taken for the instance stored backed AMI?
The boot time for an Amazon instance store-backend AMI is less than
5 minutes.
Yes, the Internet gateway is needed to use VPC (virtual private cloud
peering) connections.
Boolean searches
Prefix Searches
Range searches
Entire text search
AutoComplete advice
Lifecycle hooks are used for autoscaling to put an additional wait time
to a scale in or scale out event.
Cloud controller
Cluster controller
Storage Controller
Node Controller
Amazon S3 standard
Amazon S3 standard-infrequent Access
Amazon S3 Reduced Redundancy Storage
Amazon Glacier
53) Name some of the DB engines which can be used in AWS RDS
1. MS-SQL DB
2. MariaDB
3. MYSQL DB
4. OracleDB
5. PostgreDB