Superb 1 Year Experienced DevOps Cloud Engineer Live Interview #cloud #interview #devopsengineer
Summary
TLDRIn this mock interview, Pritam Salun, a recent IT engineering graduate from Pune University, discusses his experience as a Java developer at TCS, working on a banking project for the Middle East. He shares his interest in cloud and DevOps, his basic understanding of Linux and networking, and his limited but growing experience with package managers and scripting. The interview delves into troubleshooting scenarios, understanding of networking protocols, and his approach to learning and adapting to new technologies. Pritam also reflects on handling stress and collaborating to resolve technical issues, providing insights into his problem-solving skills and adaptability in a professional environment.
Takeaways
- 😀 Pritam Salun is a recent graduate with a Bachelor's in Engineering from the Information Technology field and is currently working as a Java developer at TCS.
- 👨💻 Pritam has experience in implementing a banking teller solution for a Middle East Bank and has an interest in cloud and DevOps, which he is learning on his own.
- 🔧 Pritam has a basic understanding of Linux and networking and has done some automation using bash scripts, although he admits to not having full-fledged cloud and DevOps experience.
- 📚 In the interview, Pritam explains concepts such as user and group permissions in Linux, the process of creating and mounting new file systems, and the difference between system package managers like yum and apt.
- 💻 He also discusses commands used for system and network statistics, such as 'vmstat' and 'netstat', and approaches to troubleshooting service outages and internet access issues on Linux-based cloud instances.
- 🛡️ Pritam talks about network security, explaining the purpose of firewalls, the concept of subnet masks, and the process of DNS resolution when accessing websites.
- 🌐 He differentiates between UDP and TCP protocols, discussing their use cases and reliability, and shares his understanding of how to troubleshoot network communication issues between devices.
- 🔑 Pritam explains the concept of user accounts with 'sudo' access versus root access, highlighting the limited permissions compared to the root user.
- 🔒 He has some knowledge of securing applications against tampering and common attacks like SQL injection and cross-site scripting, although he admits to not having direct experience in the latter.
- 📡 Pritam is aware of wireless network security protocols like WPA and WPA2, and he has attempted to hack into Wi-Fi networks using tools to understand vulnerabilities.
- 🚀 To stay updated with the latest advancements in technology, Pritam relies on social media, technical blogs, and industry newsletters, as well as engaging with peers and seeking guidance to resolve technical issues.
Q & A
What is Pritam Salun's educational background?
-Pritam Salun has completed his Bachelor's in Engineering with an Information Technology background from Pune University.
When did Pritam Salun graduate?
-Pritam Salun graduated in 2023.
What is Pritam Salun's current role at TCS?
-Pritam Salun is working as a Java Developer on a banking project, implementing a banking teller solution for a Middle East Bank.
What areas is Pritam Salun passionate about and learning on his own?
-Pritam Salun is passionate about cloud and DevOps and is learning these areas on his own.
What has been Pritam Salun's experience with cloud and DevOps in his current role?
-Pritam Salun's role at TCS mainly revolves around Java development, but he has done some automation using Linux and bash scripts, and has done projects related to cloud and DevOps on his own.
What is the basic understanding Pritam Salun has of Linux and networking?
-Pritam Salun has a basic understanding of the Linux operating system and networking, including the use of Linux for projects and familiarity with basic commands.
Can you explain the process of creating and mounting a new file system in Linux as described by Pritam Salun?
-The process involves checking the disk with the 'fdisk' command, creating a new partition, formatting the partition, and then mounting it using the 'mount' command. After mounting, directories can be created on it with the 'mkdir' command.
What is the difference between the system package managers 'yum' and 'apt' according to Pritam Salun?
-Yum is used in distributions like CentOS, while apt is used in Debian-based distributions like Ubuntu. Both are used for package management, including installing new packages, managing dependencies, and accessing repositories.
What are the commands 'vmstat' and 'netstat' used for, as explained by Pritam Salun?
-'vmstat' is used for virtual memory statistics, including information about memory usage, CPU, and paging. 'netstat' is used for network statistics, displaying network connections and routing tables.
How would Pritam Salun approach troubleshooting a service outage on a Linux-based Cloud instance?
-Pritam Salun would first check if he can SSH into the system, then check the security groups or firewall rules, and if necessary, troubleshoot user account issues or specific device connectivity problems.
What are the commands Pritam Salun might use to troubleshoot a Linux server that cannot access the Internet?
-He would use commands like 'ip addr' to check the IP address, 'ping' to test connectivity, and 'resolve.conf' to check DNS configuration.
How does Pritam Salun explain the concept of user and group permissions in Linux?
-In Linux, users and groups are entities with different permissions for files. There are three types of permissions: read, write, and execute. Permissions can be set for the user, the group, and others, with the group being a collection of users sharing the same permissions.
What is the difference between a root user and a 'sudo' user in Linux, according to Pritam Salun?
-The root user has the highest privileges and is the superuser in Linux. A 'sudo' user, which stands for 'superuser do', has permissions to execute commands as the root user but with certain limitations.
What is Pritam Salun's experience with programming languages other than Java?
-Pritam Salun has experience with Python from his college days and is comfortable with the basics of programming languages, stating that with documentation and practice, he can quickly adapt to Python or even Go.
How does Pritam Salun stay informed about the latest advancements in technology?
-Pritam Salun stays informed by following social media platforms like LinkedIn and YouTube, subscribing to newsletters from industry experts, and reading technical blogs from organizations like Netflix and HashiCorp.
Can you describe a high-pressure situation Pritam Salun faced at work and how he managed it?
-Pritam Salun faced a situation where there was a miscommunication about his role in a project, leading to a short deadline for development. He managed the stress by prioritizing the task, seeking guidance from a senior team member, asking questions, and continuously working through issues, which ultimately boosted his confidence.
Outlines
😀 Introduction and Background
Pritam Salun introduces himself, having recently graduated in 2023 with a Bachelor's in Engineering from Information Technology at Pune University. He is currently working as a Java developer at TCS, focusing on a banking project for the Middle East Bank. Pritam expresses his interest in cloud and DevOps, which he is learning independently, and shares his limited experience in Linux and bash scripting.
🔧 Technical Discussion on Linux and Networking
The conversation delves into Linux, starting with user and group permissions, and progresses to the creation and mounting of new file systems. Pritam explains the basics of Linux commands and his understanding of networking. The discussion also covers system package managers like yum and apt, and the use of vmstat and netstat for system and network statistics. Pritam is then asked about troubleshooting a Linux-based Cloud instance and a Linux server's internet access, highlighting commands and checks involved in these processes.
🌐 Networking Concepts and User Account Management
Exploring networking further, Pritam discusses the use of traceroute to identify network hops and the concept of user accounts, particularly the difference between root and sudo access. He also explains the basics of UDP and TCP protocols, and how they differ in terms of reliability and use cases. The paragraph concludes with a description of the process that occurs when a user tries to access a website, including DNS resolution and TCP connection establishment.
🛡️ Security and Firewalls
The interview touches on security, specifically firewalls and their role in controlling network traffic. Pritam discusses the concept of subnet masks and how they define the number of IP addresses in a subnet. He also addresses how to troubleshoot network communication issues between devices on the same network, emphasizing the importance of checking inbound and outbound traffic rules.
💻 Programming Languages and Security Measures
Pritam's comfort with programming languages beyond Java is discussed, with a focus on Python and Go. He also talks about his experience in securing applications against common attacks like SQL injection and cross-site scripting, though he admits he hasn't directly worked on these. He mentions his knowledge of wireless network security protocols like WPA and WPA2, and his experience with hacking into Wi-Fi networks using tools.
🤔 Behavioral and Stress Management
The final part of the interview focuses on behavioral questions. Pritam shares his approach to explaining complex technical problems to non-technical team members and his experience collaborating with developers to resolve technical issues. He discusses how he stays informed about advancements in technology through social media, newsletters, and technical blogs. The interview concludes with Pritam describing a high-pressure situation at work, where he managed stress by prioritizing tasks, seeking guidance, and persistently working through challenges.
Mindmap
Keywords
💡Mock Interview
💡Java Developer
💡Cloud and DevOps
💡User and Group Permissions
💡Creating and Mounting File System
💡System Package Managers
💡VMstat and Netstat
💡Service Outage
💡Subnet Mask
💡TCP and UDP
💡DNS Resolution
Highlights
Pritam Salun introduces himself as a recent IT engineering graduate and a Java developer at TCS.
Pritam is currently working on a banking teller solution for the Middle East Bank, showcasing his project experience.
He expresses interest and self-driven learning in cloud and DevOps, indicating his passion for the field.
Pritam shares his basic understanding of Linux and networking, along with some hands-on experience.
He explains the process of creating and mounting a new filesystem in Linux, demonstrating technical knowledge.
Pritam discusses the difference between system package managers YUM and APT, highlighting Linux distribution diversity.
He describes the use of 'vmstat' and 'netstat' for system and network statistics, showing diagnostic skills.
Pritam approaches a Linux-based Cloud instance service outage by checking connectivity and security groups.
He lists commands useful for troubleshooting Linux server access and security issues.
Pritam explains how to troubleshoot a Linux server's inability to access the Internet, including checking IP addresses and routing.
He talks about using 'traceroute' to identify network hops for connection issues.
Pritam differentiates between a root user and a 'sudo' user in terms of Linux system privileges.
He explains the concepts of UDP and TCP protocols and their use cases, such as in online gaming and web browsing.
Pritam describes the process of resolving a website's IP address through DNS, including cache lookups and recursive queries.
He outlines the purpose of firewalls in network security and their role in controlling traffic.
Pritam discusses subnet masks and their function in creating IP addresses within a subnet.
He explains how to calculate the number of IP addresses based on different subnet masks like /32, /28, /24.
Pritam addresses troubleshooting network communication issues between devices on the same network.
He talks about his comfort level with other programming languages like Python and Go, beyond his Java experience.
Pritam shares his approach to explaining complex technical problems to non-technical team members using examples and analogies.
He describes a high-pressure situation at work where he had to quickly develop a project with a tight deadline.
Pritam discusses how he stays informed about the latest advancements in technology through social media, newsletters, and technical blogs.
Transcripts
hi pram welcome to the
interview as you know this this
interview will be recorded it might be
posted on social media uh but we can
start so I understand that you are
applying for one of the large
organizations now and here we are trying
to prepare a mock interview for that
yeah why don't you start up with
yourself your background your
career yeah so my name is pritam salun
uh I have completed my bachelor's in
engineering from information technology
background from Pune University so I
recently graduated in 2023 so uh after
graduating I started working with uh one
of large mnc's uh so I'm working at TCS
uh I'm working there as a Java developer
in a banking project so we are we are
implementing a banking uh teller
solution for Middle East Bank so yeah uh
yeah that's it about me I'm Ed about and
I'm interested in cloud and devops I'm
passionate about it so I'm learning it
on my
own right uh did you have any cloud and
devops experience while you're working
in your organization at the
moment uh we cannot say completely cloud
and devops like full-fledged experience
as my role is mainly mainly revolves
around uh Java Java development but uh I
have done few things uh in uh in Linux
like automating automating the like V
send patches so automating that patching
process like using bash scripts uh yeah
I've done few things and I I've done
projects on on my own related to cloud
and Dev okay
right and now this particular job
description as I understand it's mostly
Linux focused it's networking
Focus yeah how in depth are you
comfortable with these topics
yeah I have uh the basic understanding
of uh Linux operating system and uh
networking all the basics of it and I've
also did some like used Linux for some
projects and used it for a little while
so I have like uh few commands and that
I have experience of that okay all right
so let's start with the easy questions
first and let's see how in depth we can
go into it yeah so first can you explain
me the concept of user and group
permissions in
Linux yeah so user and groups they are
like uh different entities made in Linux
uh to separate the uh different
permissions for a file or like file so
uh users are there are different users
like root users uh system users and uh
to users we can uh Define uh different
uh permissions so there are three kinds
of permission read write and execute so
so in Linux we can give permissions to
user uh then groups then there is one
others so to all these three entities we
can uh give permissions in users a
single a single uh like user will get a
permission group would be a group of
users which will Define in Linux and
will once the permission is given to the
group suppose I give read and write
permission to a specific group so all
the users in that group will uh will
will be having that permission to access
the file yeah so yeah got that all right
so in terms of creating and mounting uh
new file system can you describe the
process on how it is
done yeah creating and mounting new file
system yeah
so
uh we can create new file system in
Linux uh using like first checking our
disk with uh S command and then creating
uh like new new new Partition using f
disk command so it will uh it will uh
create new Partition for us we can
specify uh like what what kind of
partition we need then after creating
the partition we'll need to format that
partition so that we can uh use it and
then once the partition is created we
can mount it uh using like uh Mount
command and then we can create
directories on it like mkdr we can
create directories on it and use it in
our system y that's correct so I was
looking for the two words Fisk and mount
so yeah you you covered them
both what's the difference between the
system package managers like yum and
apt okay so uh in different uh different
Linux uh distributions use different uh
different system package managers uh
like uh in uh in I think in UB 2 it's
yum uh uh and in red Linux there is app
so both package managers uh they are
they used to uh they are used to like uh
do package management for the system so
installing new packages uh so uh we can
install different dependencies uh we can
get uh repositories uh install plugins
uh we can uh install multiple packages
at once like group installation
so uh to use uh package manager like y
we can use sud sudo Y and just install
and the name of the package and it will
install that package
okay can you tell me what these two
commands are used for VM stat and net
stat okay so these both are used for uh
like uh getting the statistics of our uh
Network info and about like system info
of our our our Linux system so vmat is
used for like the virtual memory
statistics so and VM is used for virtu
virtual memory statistics the size of
the memory CPU it is using the paging
blog iio uh so vmat once the command and
there are some Flags so after entering
that it will show information related to
it and network statistics like net stat
is used for Network statistics so it
will display different network
connections routing tables and uh all
the information related to uh
Network
okay so let's let's assume that you
running a Linux based Cloud instance and
there is a service
outage how would you start approaching
that
problem yeah so first I'll check if I am
able to connect to that uh system or not
so I'll first SSH uh into
it uh then after connecting uh so there
is service outage means like we are not
able to connect to that
system yeah yeah so uh I'll try to check
if we first I'll do SSH from my system
if I'm able to access it then I'll check
uh which device are we trying to access
it where issue is getting caused then
I'll check the security groups if it is
allowing like firewall rules uh so for
ec2 I can check the rules for inbound
SSS traffic for the IP assigned to that
ec2 uh then uh uh user account I'll
check if there are any issues with the
user
account so if I'm able to check if I
able to connect to that ec2 and some
other devic is not able to connect then
I'll check about that like specific uh
issues related to the device which we
are trying to connect it
from okay can you tell me that the few
commands that might help you in doing
all these
activities yeah few few commands uh
would be uh first uh we can check
security groups uh that we can check
from the AWS console then uh we can uh
we can use like uh status of SSH like
are we able like SSH Services running or
not that we can check like like status
and sshd so it will show us the like
status and if it is not working we can
start sshd then if there are some s key
issues we can check the permissions
using CH mod command for the key if that
Keys is like the private key pem keys is
accessible or not then for user account
issues we can check using uh like uh we
can check uh user accounts using Pudo
cat Etc password so it will like pass WD
it will show like uh usern names uh for
different uh users so we can
troubleshoot it in this way okay and if
the problem is that a Linux server
cannot access
Internet okay how would you go about
that so if Linux server is not able to
access Internet uh we can uh we can
check uh its uh
uh nackle groups I think so uh we can we
can check
if a Linux server is not able to access
Internet first we can uh check the IP IP
address uh like by running the command
IP addr so it will it will show first
our like our network interface our IP
address then we can check the route if
it uh if it is uh routing we can ping
like we can ping any site like uh if if
we are able to reach that site or
not so yeah we can check configuration
configuration files like DNS
configuration using resolve. config file
we can check in that okay so yeah if you
if you need to identify how many Network
Hops uh is your server making for
connection what command would you
use uh Network Ops I think we can use
trace route uh for that so we can get uh
the like how many Network Hops uh are uh
it is making um
so we can we can install like sudo AP
install we can install trace route and
then we can use like if trace route
google.com so it will display us uh like
the Hop number and uh
like uh details about about that
connection okay now in terms of users uh
can you explain me the concept of user
account with the Pudo access
and how is it different from a root
axis okay so uh root is root user is the
like highest privileges it is the root
user and super user is uh has lower
privileges than the uh root user so uh
Pudo Pudo user is like Pudo stands for
super do so it it is granted permissions
to execute command as the like the root
user but uh Pudo pseudo commands like
author Pudo sudo commands have few
limitations over to the root
user
okay now in terms of networking can you
explain me the difference between UDP
and
TCP yeah so UDP UDP stands for user
datagram protocol and TCP stands for
transmission control protocol so TCP is
for uh reliable uh communication for
reli Reliable transmiss so what TCP does
TCP first does a three-way handshake and
first make first make sure that the
connection is made properly and then
starts transmitting the data uh and UDP
is UDP doesn't make a doesn't starts
with the connection it starts sending
data as fast as possible and in TCP data
will be transmitted into an order and uh
in UDP data won't be transmitted like
there is no guarantee of order or
reliability so there are different use
cases for TCP and UDP so suppose we need
to send reliable like we need to have
sure shity that data will go like
suppose we need to send email so we need
to send the complete email so we like
protocols will be TCP like for https
like we want to load a website protocol
will be TCP but for like online gaming
and video calls uh and there will be
protocol UDP because uh we are not uh we
want uh to run to run it in real time
even if there is some lag that is okay
so that's uh that's when we'll use UD so
that is the major difference
okay so let's say you are a user just an
internet user and you go through you
want to reach a website
abc.com yeah so what happens once you
press abc.com in your browser what
happen in the
background yeah so one I I enter like
let's go with the example of google.com
so that would make it easier so suppose
I enter google.com in my browser so my
browser would first look uh for like it
will try to resolve this DNS so there
there would be there will be coming the
concept of DNS domain name system so uh
it will try to look for the google.com's
IP address so first it will find it in
the like try to search it in the browser
C if I have visited that site earlier
that it will find it in the browser cach
if it is it is not found in browser
cache then it will look up to the like
my internet providers cache or the
system cache so generally it is found in
one of these cache and it will establish
TCP connection with that IP address and
I'll get served the https like the HTML
pages of the content of the site but uh
let's suppose a case when it is not able
to resolve it then there will be a
recursive DNS query so there there are
two types of quer is recursive and
iterative so Suppose there will be a
recursive query so what it will do it
will request to the root root server so
after that google.com one more dot will
be there so that is the root server so
root server will say like I don't have
address for google.com but hey I have
address for that do at the top level
domain so it will return the server of
the top Lev domain.com then uh to it
will again Ask the IP address for
google.com to the top level domain so it
will return the address for the
authoritative server of the like Google
and then the google.com that
authoritative server will return the IP
address so in this way the connection
will get
established okay can you explain me why
the concept of
firewalls concept of firewalls yeah so
firewalls are basically used to have
better control and security over our
Network so firewalls are like uh
essential essential network security
devices so they will uh control the
incoming and outgoing traffic they will
also monitor so there are different
firewalls like uh we can also say in AWS
there are security groups there
are network access control these are
also types of firewalls so they will
they they will inspect the incoming
traffic we can set different firewall
rules to like allow allow only from a
specific spefic IP address or from a
specific range of IP addresses uh or we
can set up like different conditions if
uh we are getting some kind of malicious
traffic then we can block it so this is
what firewalls are used for
okay explain me the purpose of a subnet
mask subnet mask
uh subnet I know subnet subnet mask uh
like like the after IP address we use
that slash and 32 for the cidr range
yeah so subnet mask we used to like uh
creates
uh uh create a specific number of IP
addresses in a subnet create a network
in a subnet so subnet mask is a like
32bit number so uh we for example we can
say there is some IP address and slash
there is 32 then if use like 31 there so
it will be the calculation will be like
32 minus 1 so there will be only one IP
address getting generated out of
it uh so yeah that's about subnet mask
do you know the computation of 32 and 28
24 so on what basis are the number of IP
addresses
calculated uh are based on the uh like
octed
uh the the capacity that that each uh
each can hold so they are calculated
based on that that the highest they can
hold from 0 to 255 so uh yeah so if it's
a sub mask of 16 how many IP
addresses yeah so it the calculation
will be like out of 32 minus 16 then the
uh number would be uh 16 and then 16 the
uh power of 16 power of two like 2 ra to
16 and the the number calculated uh will
be uh the number of IP addresses we'll
be able to get uh like a lot of like
something 65,000 something a lot of IP
addresses can be generated out of that
uh I all right one more networking
question uh can you how do you
troubleshoot a situation where two
devices on the same network they are not
able to communicate to each other
okay two devices are on same network but
they are not able to con uh so uh we can
we can check the both uh uh inbound and
outbound traffic rules Like knle rules
for both of them uh so if the we can
check if what what conditions are set
there like what are they allowing what
inbound traffic and outbound traffic are
they allowing we can set each other's IP
addresses as allowed in the inbound and
the outbound so that they can access
each
other we can ping one from the another
so ping IP address of the another device
from one and check if what's happening
or yeah okay all
right uh now coming back to your
profile you said that you have worked on
Java yeah how comfortable are you
working with python or go or any other
language yeah I'm comfortable uh because
uh like in college days also I have Lear
learned python as part of curriculum and
uh mostly programming languages will the
basics of programming will be similar
only there will be syntax different so
with help of like documentation and few
practice practicing for few days I think
I'll be comfortable in python or even go
okay now have you had any experience in
creating uh security uh in terms of
protecting against common attacks like
SQL injection cross-site
scripting uh yeah so uh for against SQL
injection and cross-site scripting I
haven't worked on but uh in my work
experience I worked on securing
applications against tampering so uh
suppose if application uh uh when a
client like client is sending something
to the like the request response client
is sending to the server and uh in
between uh if the network is
uh like if Network gets uh what we can
say tampered and someone tampers the uh
uh the response uh like the request
being sent to the server and if he
modifies that request Pampers that uh so
it can affect the application so the
approach Ive used uh I've used was to do
server side and client side hashing so
in that request uh first the client will
generate a hash and it will send that
hash to the server and if if the hash
gets matched only then the request will
get accepted otherwise like we can log
out or we can report that issue and
report that incident so in this way we
can handle security for
tempering okay now there are different
types of wireless network security
protocols so have you heard of we WPA
and
WPA2 uh yeah I have heard of uh w w web
like WP
so these are related to wireless this in
daytoday general like using Wi-Fi I have
used them so WP like WP is like old
older one and WPA is also I think now
older one like WPA was vulner vulnerable
to few few attacks so I have myself like
tried to hack into few Wi-Fi using like
like different tools so to get the
password so WPA was uh vulnerable like
there was one button uh on the routers
which was used to reset so it was uh
exploiting that uh and was able to
connect to the network and then the
latest one is I think WPA 2 uh which has
fixed that so it is using uh like Advan
encryption standards so WPA 2 WPA 3 have
come up and like they offer stronger so
nowadays you like newer routers you
won't be able to easily track into them
all right fre so I'm done with my
networking questions uh just on a few
behavioral questions where I want to
understand how you would react to
certain situations and if you have
handled any of
these because you have you don't have
much experience you're just a fresh grad
just a couple of years how much did you
say how many years of experience you
have one year right uh nine months I
think
Ned in August 2023 okay yep so 6 months
to an year so if you do not know the
answers or if you haven't dealt with any
of these scenarios just yeah you feel
free to say that you haven't but if you
have any ideas so I'm open for hearing
so tell me a situation if where you had
to explain a complex technical problem
to a customer with limited
knowledge have you had such a experience
yeah yeah yeah so uh similar experience
I have had was
uh uh a team member but he he didn't had
uh technical knowledge like he uh he uh
he was in the uh uh different different
sort of like we can say department so
business analysis so we had to explain
him so what uh things I did was uh I I
tried to uh break break down the I tried
to break down the solution whatever we
were implementing so I had to break down
that and I I tried to explain him using
like examples like uh uh giving
different
analogies uh so yeah and iy I I tried to
like uh give him different different
examples like different approaches so
yeah that's
how that's how I I encountered this all
right uh any time where you had to
collaborate with a developer to resolve
a technical
issue uh yeah this uh this happens like
usually this happens so if there is some
task assigned to me and I I do not have
like uh understanding of that uh I would
connect with uh like fellow developer
who has like I would ask in team like
who has worked on this module or
recently been working on this so I can I
I'll connect with him over teams or if
he's present in office then we can like
sit together in a meeting room and then
uh I I asked him like how did he
encounter we just go to through the
debugging mode so whatever he has
implemented we can just go like assign
like have some debugging points and uh
we can go through the whole flow and I
ask him different questions like uh like
in the way I need to uh Implement that
solution so what challenges would I face
and yeah we can have that uh sort of
discussion and then I I get a clear idea
of how like how can I Implement uh like
how can I like develop that
similar thing okay all right now because
the cloud develops all these
Technologies they keep on changing there
is always some new content coming up so
how do you stay informed on the latest
advancements which are happening in
these
fields so yeah I rely on mostly like
social media like on LinkedIn or on
YouTube you get to see lest things also
you can uh you can follow newsletters by
uh like few uh recognized people uh in
the industry who are working there so
they they post their own experiences you
can also there are like different
different uh organizations have their
own engineering pages so like hot star
has its own engineering page like blog
technical Blog then Netflix has its own
technical blog so there we can get the
whole white papers we can uh read them
like what problem they have uh
encountered what like business problem
they were trying to solve which
Technologies they leveraged for solving
it
so yeah also like if we want it less
like less serious we can also watch
podcasts and all to like yeah stay in
Trend okay so one last question in this
interview so describe a time where you
faced a high pressure situation at work
and how did you manage the stress and
ensure that the tasks
complete yeah so this was uh like uh
when I joined organization a few months
back uh like I was assigned on my first
project so the thing was that I was uh I
thought that I was told to Shadow the
project like it was assigned to one of
the senior member in my team and I was
just looped into that mail so there was
sort of miscommunication I thought that
it would be just shadowing me shadowing
and he'll be developing the project and
I just he'll be updating on and I'll be
asking him questions but the thing was
that it was actually expected that I
would be developing the project and he
would be just guiding me so there was
sort of miscommunication so it caused a
delay so and then I realized that whole
thing needs to be developed by me and
there was like short deadline so uh the
thing I did was like uh prioritize that
task so I I started focusing on the
single task like uh to deliver it uh
within the ETA uh so I took help of him
I like help in the way like I If I had
like I didn't understood the module like
what was the existing functionality
where like s where is the similar
functionality implemented so I can take
reference of it uh so he helped me in
that way like guided me and so I started
working on me so between I got into many
issues so at that time also I took his
help also I took like few other members
help to solve that issues like how can
this be done so asking lot of questions
that was my Approach and just not
stopping just I was just going on going
on so it was like a good experience I
would say because after handling that
stress uh during that stress it was like
painful I was thinking that what where I
have come but after completing that
project and after that project went into
production and all I like felt more
confident like if I can handle this like
I can do it in small time then I can do
like a lot more complex uh things so
even my lead started to assign me on
complex projects after that so yeah that
was my experience with uh like handling
stress cool all right thank you pram I'm
done with the interview and uh so I'll
be providing you a little bit of
feedback after I pause the recording but
thank you for your time today yeah thank
you sir thank you
Weitere ähnliche Videos ansehen
DevOps Interview For Experience : First Round Selected
Root Cause Analysis Mock Interview with Piyush Sharma, Product Manager at Cure.Fit
JuniorDev M Fadhil Ayudha 2024 08 01 20 40 41
Java Spring Boot 3 Years Experience Interview
917 Rackz Full Interview: Being White In Drill Music, Being GDK & Saying The N-Word for whites.
Excellent Devops and Cloud Engineer Interview questions for ~2 Year Experience including feedback
5.0 / 5 (0 votes)