Superb 1 Year Experienced DevOps Cloud Engineer Live Interview #cloud #interview #devopsengineer

Interviews - DevOps Engineer and Cloud Engineer
16 Jul 202429:19

Summary

TLDRIn this mock interview, Pritam Salun, a recent IT engineering graduate from Pune University, discusses his experience as a Java developer at TCS, working on a banking project for the Middle East. He shares his interest in cloud and DevOps, his basic understanding of Linux and networking, and his limited but growing experience with package managers and scripting. The interview delves into troubleshooting scenarios, understanding of networking protocols, and his approach to learning and adapting to new technologies. Pritam also reflects on handling stress and collaborating to resolve technical issues, providing insights into his problem-solving skills and adaptability in a professional environment.

Takeaways

  • πŸ˜€ Pritam Salun is a recent graduate with a Bachelor's in Engineering from the Information Technology field and is currently working as a Java developer at TCS.
  • πŸ‘¨β€πŸ’» Pritam has experience in implementing a banking teller solution for a Middle East Bank and has an interest in cloud and DevOps, which he is learning on his own.
  • πŸ”§ Pritam has a basic understanding of Linux and networking and has done some automation using bash scripts, although he admits to not having full-fledged cloud and DevOps experience.
  • πŸ“š In the interview, Pritam explains concepts such as user and group permissions in Linux, the process of creating and mounting new file systems, and the difference between system package managers like yum and apt.
  • πŸ’» He also discusses commands used for system and network statistics, such as 'vmstat' and 'netstat', and approaches to troubleshooting service outages and internet access issues on Linux-based cloud instances.
  • πŸ›‘οΈ Pritam talks about network security, explaining the purpose of firewalls, the concept of subnet masks, and the process of DNS resolution when accessing websites.
  • 🌐 He differentiates between UDP and TCP protocols, discussing their use cases and reliability, and shares his understanding of how to troubleshoot network communication issues between devices.
  • πŸ”‘ Pritam explains the concept of user accounts with 'sudo' access versus root access, highlighting the limited permissions compared to the root user.
  • πŸ”’ He has some knowledge of securing applications against tampering and common attacks like SQL injection and cross-site scripting, although he admits to not having direct experience in the latter.
  • πŸ“‘ Pritam is aware of wireless network security protocols like WPA and WPA2, and he has attempted to hack into Wi-Fi networks using tools to understand vulnerabilities.
  • πŸš€ To stay updated with the latest advancements in technology, Pritam relies on social media, technical blogs, and industry newsletters, as well as engaging with peers and seeking guidance to resolve technical issues.

Q & A

  • What is Pritam Salun's educational background?

    -Pritam Salun has completed his Bachelor's in Engineering with an Information Technology background from Pune University.

  • When did Pritam Salun graduate?

    -Pritam Salun graduated in 2023.

  • What is Pritam Salun's current role at TCS?

    -Pritam Salun is working as a Java Developer on a banking project, implementing a banking teller solution for a Middle East Bank.

  • What areas is Pritam Salun passionate about and learning on his own?

    -Pritam Salun is passionate about cloud and DevOps and is learning these areas on his own.

  • What has been Pritam Salun's experience with cloud and DevOps in his current role?

    -Pritam Salun's role at TCS mainly revolves around Java development, but he has done some automation using Linux and bash scripts, and has done projects related to cloud and DevOps on his own.

  • What is the basic understanding Pritam Salun has of Linux and networking?

    -Pritam Salun has a basic understanding of the Linux operating system and networking, including the use of Linux for projects and familiarity with basic commands.

  • Can you explain the process of creating and mounting a new file system in Linux as described by Pritam Salun?

    -The process involves checking the disk with the 'fdisk' command, creating a new partition, formatting the partition, and then mounting it using the 'mount' command. After mounting, directories can be created on it with the 'mkdir' command.

  • What is the difference between the system package managers 'yum' and 'apt' according to Pritam Salun?

    -Yum is used in distributions like CentOS, while apt is used in Debian-based distributions like Ubuntu. Both are used for package management, including installing new packages, managing dependencies, and accessing repositories.

  • What are the commands 'vmstat' and 'netstat' used for, as explained by Pritam Salun?

    -'vmstat' is used for virtual memory statistics, including information about memory usage, CPU, and paging. 'netstat' is used for network statistics, displaying network connections and routing tables.

  • How would Pritam Salun approach troubleshooting a service outage on a Linux-based Cloud instance?

    -Pritam Salun would first check if he can SSH into the system, then check the security groups or firewall rules, and if necessary, troubleshoot user account issues or specific device connectivity problems.

  • What are the commands Pritam Salun might use to troubleshoot a Linux server that cannot access the Internet?

    -He would use commands like 'ip addr' to check the IP address, 'ping' to test connectivity, and 'resolve.conf' to check DNS configuration.

  • How does Pritam Salun explain the concept of user and group permissions in Linux?

    -In Linux, users and groups are entities with different permissions for files. There are three types of permissions: read, write, and execute. Permissions can be set for the user, the group, and others, with the group being a collection of users sharing the same permissions.

  • What is the difference between a root user and a 'sudo' user in Linux, according to Pritam Salun?

    -The root user has the highest privileges and is the superuser in Linux. A 'sudo' user, which stands for 'superuser do', has permissions to execute commands as the root user but with certain limitations.

  • What is Pritam Salun's experience with programming languages other than Java?

    -Pritam Salun has experience with Python from his college days and is comfortable with the basics of programming languages, stating that with documentation and practice, he can quickly adapt to Python or even Go.

  • How does Pritam Salun stay informed about the latest advancements in technology?

    -Pritam Salun stays informed by following social media platforms like LinkedIn and YouTube, subscribing to newsletters from industry experts, and reading technical blogs from organizations like Netflix and HashiCorp.

  • Can you describe a high-pressure situation Pritam Salun faced at work and how he managed it?

    -Pritam Salun faced a situation where there was a miscommunication about his role in a project, leading to a short deadline for development. He managed the stress by prioritizing the task, seeking guidance from a senior team member, asking questions, and continuously working through issues, which ultimately boosted his confidence.

Outlines

00:00

πŸ˜€ Introduction and Background

Pritam Salun introduces himself, having recently graduated in 2023 with a Bachelor's in Engineering from Information Technology at Pune University. He is currently working as a Java developer at TCS, focusing on a banking project for the Middle East Bank. Pritam expresses his interest in cloud and DevOps, which he is learning independently, and shares his limited experience in Linux and bash scripting.

05:04

πŸ”§ Technical Discussion on Linux and Networking

The conversation delves into Linux, starting with user and group permissions, and progresses to the creation and mounting of new file systems. Pritam explains the basics of Linux commands and his understanding of networking. The discussion also covers system package managers like yum and apt, and the use of vmstat and netstat for system and network statistics. Pritam is then asked about troubleshooting a Linux-based Cloud instance and a Linux server's internet access, highlighting commands and checks involved in these processes.

10:05

🌐 Networking Concepts and User Account Management

Exploring networking further, Pritam discusses the use of traceroute to identify network hops and the concept of user accounts, particularly the difference between root and sudo access. He also explains the basics of UDP and TCP protocols, and how they differ in terms of reliability and use cases. The paragraph concludes with a description of the process that occurs when a user tries to access a website, including DNS resolution and TCP connection establishment.

15:06

πŸ›‘οΈ Security and Firewalls

The interview touches on security, specifically firewalls and their role in controlling network traffic. Pritam discusses the concept of subnet masks and how they define the number of IP addresses in a subnet. He also addresses how to troubleshoot network communication issues between devices on the same network, emphasizing the importance of checking inbound and outbound traffic rules.

20:06

πŸ’» Programming Languages and Security Measures

Pritam's comfort with programming languages beyond Java is discussed, with a focus on Python and Go. He also talks about his experience in securing applications against common attacks like SQL injection and cross-site scripting, though he admits he hasn't directly worked on these. He mentions his knowledge of wireless network security protocols like WPA and WPA2, and his experience with hacking into Wi-Fi networks using tools.

25:07

πŸ€” Behavioral and Stress Management

The final part of the interview focuses on behavioral questions. Pritam shares his approach to explaining complex technical problems to non-technical team members and his experience collaborating with developers to resolve technical issues. He discusses how he stays informed about advancements in technology through social media, newsletters, and technical blogs. The interview concludes with Pritam describing a high-pressure situation at work, where he managed stress by prioritizing tasks, seeking guidance, and persistently working through challenges.

Mindmap

Keywords

πŸ’‘Mock Interview

A mock interview is a simulated job interview that is conducted to help candidates prepare for the real interview process. In the script, the interviewee, Pritam Salun, is participating in a mock interview to prepare for a potential job application with a large organization. This concept is central to the video's theme, as it sets the stage for the discussion of various technical and behavioral aspects relevant to job interviews.

πŸ’‘Java Developer

A Java developer is a professional who designs, codes, and maintains applications using the Java programming language. In the script, Pritam mentions that he is currently working as a Java developer at TCS, where he is involved in implementing a banking teller solution for a Middle East Bank. This keyword is significant as it highlights the interviewee's current role and technical expertise.

πŸ’‘Cloud and DevOps

Cloud computing and DevOps are two key concepts in modern IT infrastructure and software development. Cloud computing involves delivering computing services over the internet, while DevOps is a set of practices that combines software development and IT operations. Pritam expresses his interest and self-learning in these areas, indicating his desire to expand his skill set beyond Java development.

πŸ’‘User and Group Permissions

In Linux, user and group permissions are fundamental for controlling access to files and resources. Permissions can be set for different entities such as users, groups, and others, specifying read, write, and execute access. In the script, Pritam explains this concept, which is essential for understanding Linux system administration and security.

πŸ’‘Creating and Mounting File System

Creating and mounting a file system in Linux involves several steps, including partitioning the disk, formatting the partition, and making it accessible in the system. Pritam describes the process using commands like 'fdisk', 'mkfs', and 'mount', which are crucial for managing storage and file organization on a Linux system.

πŸ’‘System Package Managers

System package managers like 'yum' and 'apt' are tools used to handle software packages on Linux distributions. They allow for the installation, update, and removal of software. In the script, Pritam discusses the difference between 'yum', typically used in CentOS, and 'apt', used in Debian-based distributions, which is important for understanding package management in Linux.

πŸ’‘VMstat and Netstat

VMstat and netstat are command-line utilities in Linux used for monitoring system performance and network statistics, respectively. VMstat provides information on memory, CPU, and I/O usage, while netstat displays network connections and routing tables. Pritam mentions these commands as tools for gathering system and network information, which is vital for troubleshooting and performance analysis.

πŸ’‘Service Outage

A service outage refers to a disruption in the availability of a service, such as a cloud instance or network service. In the script, Pritam discusses the steps to troubleshoot a service outage, including checking connectivity, security groups, and firewall rules. This keyword is relevant as it demonstrates the problem-solving approach in IT operations.

πŸ’‘Subnet Mask

A subnet mask is used in networking to divide a network into smaller subnetworks, allowing for more efficient use of IP addresses and better organization of networks. Pritam explains the concept of subnet masks and how they are used to calculate the number of available IP addresses within a subnet, which is essential for understanding network design and IP address allocation.

πŸ’‘TCP and UDP

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two core protocols used for communication over IP networks. TCP provides reliable, ordered delivery of data, while UDP is faster but does not guarantee delivery or order. Pritam differentiates between the two, explaining their use cases, which is important for understanding network communication principles.

πŸ’‘DNS Resolution

DNS (Domain Name System) resolution is the process of translating human-readable domain names, like 'google.com', into IP addresses that computers use to connect to servers. In the script, Pritam describes the steps involved in DNS resolution, including recursive and iterative queries, which is fundamental to understanding how internet navigation works.

Highlights

Pritam Salun introduces himself as a recent IT engineering graduate and a Java developer at TCS.

Pritam is currently working on a banking teller solution for the Middle East Bank, showcasing his project experience.

He expresses interest and self-driven learning in cloud and DevOps, indicating his passion for the field.

Pritam shares his basic understanding of Linux and networking, along with some hands-on experience.

He explains the process of creating and mounting a new filesystem in Linux, demonstrating technical knowledge.

Pritam discusses the difference between system package managers YUM and APT, highlighting Linux distribution diversity.

He describes the use of 'vmstat' and 'netstat' for system and network statistics, showing diagnostic skills.

Pritam approaches a Linux-based Cloud instance service outage by checking connectivity and security groups.

He lists commands useful for troubleshooting Linux server access and security issues.

Pritam explains how to troubleshoot a Linux server's inability to access the Internet, including checking IP addresses and routing.

He talks about using 'traceroute' to identify network hops for connection issues.

Pritam differentiates between a root user and a 'sudo' user in terms of Linux system privileges.

He explains the concepts of UDP and TCP protocols and their use cases, such as in online gaming and web browsing.

Pritam describes the process of resolving a website's IP address through DNS, including cache lookups and recursive queries.

He outlines the purpose of firewalls in network security and their role in controlling traffic.

Pritam discusses subnet masks and their function in creating IP addresses within a subnet.

He explains how to calculate the number of IP addresses based on different subnet masks like /32, /28, /24.

Pritam addresses troubleshooting network communication issues between devices on the same network.

He talks about his comfort level with other programming languages like Python and Go, beyond his Java experience.

Pritam shares his approach to explaining complex technical problems to non-technical team members using examples and analogies.

He describes a high-pressure situation at work where he had to quickly develop a project with a tight deadline.

Pritam discusses how he stays informed about the latest advancements in technology through social media, newsletters, and technical blogs.

Transcripts

play00:02

hi pram welcome to the

play00:04

interview as you know this this

play00:07

interview will be recorded it might be

play00:08

posted on social media uh but we can

play00:10

start so I understand that you are

play00:13

applying for one of the large

play00:14

organizations now and here we are trying

play00:16

to prepare a mock interview for that

play00:19

yeah why don't you start up with

play00:20

yourself your background your

play00:22

career yeah so my name is pritam salun

play00:26

uh I have completed my bachelor's in

play00:28

engineering from information technology

play00:30

background from Pune University so I

play00:33

recently graduated in 2023 so uh after

play00:36

graduating I started working with uh one

play00:39

of large mnc's uh so I'm working at TCS

play00:43

uh I'm working there as a Java developer

play00:46

in a banking project so we are we are

play00:49

implementing a banking uh teller

play00:53

solution for Middle East Bank so yeah uh

play00:58

yeah that's it about me I'm Ed about and

play01:00

I'm interested in cloud and devops I'm

play01:03

passionate about it so I'm learning it

play01:05

on my

play01:06

own right uh did you have any cloud and

play01:11

devops experience while you're working

play01:13

in your organization at the

play01:14

moment uh we cannot say completely cloud

play01:17

and devops like full-fledged experience

play01:20

as my role is mainly mainly revolves

play01:22

around uh Java Java development but uh I

play01:26

have done few things uh in uh in Linux

play01:30

like automating automating the like V

play01:33

send patches so automating that patching

play01:35

process like using bash scripts uh yeah

play01:38

I've done few things and I I've done

play01:41

projects on on my own related to cloud

play01:44

and Dev okay

play01:46

right and now this particular job

play01:49

description as I understand it's mostly

play01:51

Linux focused it's networking

play01:54

Focus yeah how in depth are you

play01:57

comfortable with these topics

play02:01

yeah I have uh the basic understanding

play02:03

of uh Linux operating system and uh

play02:06

networking all the basics of it and I've

play02:08

also did some like used Linux for some

play02:11

projects and used it for a little while

play02:14

so I have like uh few commands and that

play02:18

I have experience of that okay all right

play02:20

so let's start with the easy questions

play02:22

first and let's see how in depth we can

play02:24

go into it yeah so first can you explain

play02:27

me the concept of user and group

play02:29

permissions in

play02:31

Linux yeah so user and groups they are

play02:34

like uh different entities made in Linux

play02:37

uh to separate the uh different

play02:40

permissions for a file or like file so

play02:44

uh users are there are different users

play02:47

like root users uh system users and uh

play02:51

to users we can uh Define uh different

play02:55

uh permissions so there are three kinds

play02:57

of permission read write and execute so

play02:59

so in Linux we can give permissions to

play03:02

user uh then groups then there is one

play03:05

others so to all these three entities we

play03:08

can uh give permissions in users a

play03:10

single a single uh like user will get a

play03:13

permission group would be a group of

play03:16

users which will Define in Linux and

play03:18

will once the permission is given to the

play03:21

group suppose I give read and write

play03:23

permission to a specific group so all

play03:25

the users in that group will uh will

play03:28

will be having that permission to access

play03:30

the file yeah so yeah got that all right

play03:34

so in terms of creating and mounting uh

play03:37

new file system can you describe the

play03:40

process on how it is

play03:42

done yeah creating and mounting new file

play03:47

system yeah

play03:50

so

play03:52

uh we can create new file system in

play03:55

Linux uh using like first checking our

play03:58

disk with uh S command and then creating

play04:02

uh like new new new Partition using f

play04:06

disk command so it will uh it will uh

play04:10

create new Partition for us we can

play04:12

specify uh like what what kind of

play04:15

partition we need then after creating

play04:18

the partition we'll need to format that

play04:20

partition so that we can uh use it and

play04:24

then once the partition is created we

play04:26

can mount it uh using like uh Mount

play04:29

command and then we can create

play04:31

directories on it like mkdr we can

play04:34

create directories on it and use it in

play04:36

our system y that's correct so I was

play04:38

looking for the two words Fisk and mount

play04:40

so yeah you you covered them

play04:43

both what's the difference between the

play04:45

system package managers like yum and

play04:48

apt okay so uh in different uh different

play04:52

Linux uh distributions use different uh

play04:55

different system package managers uh

play04:57

like uh in uh in I think in UB 2 it's

play05:03

yum uh uh and in red Linux there is app

play05:08

so both package managers uh they are

play05:11

they used to uh they are used to like uh

play05:13

do package management for the system so

play05:15

installing new packages uh so uh we can

play05:18

install different dependencies uh we can

play05:21

get uh repositories uh install plugins

play05:24

uh we can uh install multiple packages

play05:28

at once like group installation

play05:30

so uh to use uh package manager like y

play05:34

we can use sud sudo Y and just install

play05:37

and the name of the package and it will

play05:39

install that package

play05:42

okay can you tell me what these two

play05:45

commands are used for VM stat and net

play05:49

stat okay so these both are used for uh

play05:52

like uh getting the statistics of our uh

play05:56

Network info and about like system info

play05:59

of our our our Linux system so vmat is

play06:03

used for like the virtual memory

play06:04

statistics so and VM is used for virtu

play06:09

virtual memory statistics the size of

play06:10

the memory CPU it is using the paging

play06:14

blog iio uh so vmat once the command and

play06:17

there are some Flags so after entering

play06:19

that it will show information related to

play06:21

it and network statistics like net stat

play06:23

is used for Network statistics so it

play06:25

will display different network

play06:27

connections routing tables and uh all

play06:30

the information related to uh

play06:32

Network

play06:34

okay so let's let's assume that you

play06:37

running a Linux based Cloud instance and

play06:40

there is a service

play06:42

outage how would you start approaching

play06:44

that

play06:46

problem yeah so first I'll check if I am

play06:49

able to connect to that uh system or not

play06:52

so I'll first SSH uh into

play06:55

it uh then after connecting uh so there

play07:00

is service outage means like we are not

play07:03

able to connect to that

play07:06

system yeah yeah so uh I'll try to check

play07:11

if we first I'll do SSH from my system

play07:15

if I'm able to access it then I'll check

play07:18

uh which device are we trying to access

play07:20

it where issue is getting caused then

play07:23

I'll check the security groups if it is

play07:25

allowing like firewall rules uh so for

play07:27

ec2 I can check the rules for inbound

play07:30

SSS traffic for the IP assigned to that

play07:33

ec2 uh then uh uh user account I'll

play07:38

check if there are any issues with the

play07:40

user

play07:41

account so if I'm able to check if I

play07:44

able to connect to that ec2 and some

play07:46

other devic is not able to connect then

play07:48

I'll check about that like specific uh

play07:51

issues related to the device which we

play07:54

are trying to connect it

play07:56

from okay can you tell me that the few

play07:58

commands that might help you in doing

play08:01

all these

play08:02

activities yeah few few commands uh

play08:05

would be uh first uh we can check

play08:09

security groups uh that we can check

play08:12

from the AWS console then uh we can uh

play08:15

we can use like uh status of SSH like

play08:18

are we able like SSH Services running or

play08:22

not that we can check like like status

play08:25

and sshd so it will show us the like

play08:28

status and if it is not working we can

play08:30

start sshd then if there are some s key

play08:34

issues we can check the permissions

play08:35

using CH mod command for the key if that

play08:39

Keys is like the private key pem keys is

play08:42

accessible or not then for user account

play08:46

issues we can check using uh like uh we

play08:50

can check uh user accounts using Pudo

play08:53

cat Etc password so it will like pass WD

play08:58

it will show like uh usern names uh for

play09:01

different uh users so we can

play09:05

troubleshoot it in this way okay and if

play09:08

the problem is that a Linux server

play09:11

cannot access

play09:12

Internet okay how would you go about

play09:15

that so if Linux server is not able to

play09:18

access Internet uh we can uh we can

play09:21

check uh its uh

play09:24

uh nackle groups I think so uh we can we

play09:28

can check

play09:29

if a Linux server is not able to access

play09:32

Internet first we can uh check the IP IP

play09:36

address uh like by running the command

play09:38

IP addr so it will it will show first

play09:42

our like our network interface our IP

play09:44

address then we can check the route if

play09:47

it uh if it is uh routing we can ping

play09:50

like we can ping any site like uh if if

play09:52

we are able to reach that site or

play09:55

not so yeah we can check configuration

play09:58

configuration files like DNS

play10:00

configuration using resolve. config file

play10:04

we can check in that okay so yeah if you

play10:08

if you need to identify how many Network

play10:10

Hops uh is your server making for

play10:12

connection what command would you

play10:15

use uh Network Ops I think we can use

play10:18

trace route uh for that so we can get uh

play10:22

the like how many Network Hops uh are uh

play10:27

it is making um

play10:30

so we can we can install like sudo AP

play10:34

install we can install trace route and

play10:36

then we can use like if trace route

play10:40

google.com so it will display us uh like

play10:43

the Hop number and uh

play10:47

like uh details about about that

play10:50

connection okay now in terms of users uh

play10:55

can you explain me the concept of user

play10:57

account with the Pudo access

play10:59

and how is it different from a root

play11:03

axis okay so uh root is root user is the

play11:08

like highest privileges it is the root

play11:10

user and super user is uh has lower

play11:14

privileges than the uh root user so uh

play11:18

Pudo Pudo user is like Pudo stands for

play11:21

super do so it it is granted permissions

play11:24

to execute command as the like the root

play11:27

user but uh Pudo pseudo commands like

play11:30

author Pudo sudo commands have few

play11:34

limitations over to the root

play11:36

user

play11:38

okay now in terms of networking can you

play11:41

explain me the difference between UDP

play11:43

and

play11:44

TCP yeah so UDP UDP stands for user

play11:49

datagram protocol and TCP stands for

play11:51

transmission control protocol so TCP is

play11:54

for uh reliable uh communication for

play11:58

reli Reliable transmiss so what TCP does

play12:00

TCP first does a three-way handshake and

play12:02

first make first make sure that the

play12:04

connection is made properly and then

play12:06

starts transmitting the data uh and UDP

play12:10

is UDP doesn't make a doesn't starts

play12:13

with the connection it starts sending

play12:16

data as fast as possible and in TCP data

play12:20

will be transmitted into an order and uh

play12:24

in UDP data won't be transmitted like

play12:27

there is no guarantee of order or

play12:30

reliability so there are different use

play12:32

cases for TCP and UDP so suppose we need

play12:35

to send reliable like we need to have

play12:38

sure shity that data will go like

play12:40

suppose we need to send email so we need

play12:42

to send the complete email so we like

play12:45

protocols will be TCP like for https

play12:48

like we want to load a website protocol

play12:51

will be TCP but for like online gaming

play12:53

and video calls uh and there will be

play12:55

protocol UDP because uh we are not uh we

play12:59

want uh to run to run it in real time

play13:02

even if there is some lag that is okay

play13:04

so that's uh that's when we'll use UD so

play13:07

that is the major difference

play13:10

okay so let's say you are a user just an

play13:13

internet user and you go through you

play13:16

want to reach a website

play13:18

abc.com yeah so what happens once you

play13:22

press abc.com in your browser what

play13:25

happen in the

play13:26

background yeah so one I I enter like

play13:30

let's go with the example of google.com

play13:32

so that would make it easier so suppose

play13:35

I enter google.com in my browser so my

play13:38

browser would first look uh for like it

play13:40

will try to resolve this DNS so there

play13:43

there would be there will be coming the

play13:45

concept of DNS domain name system so uh

play13:49

it will try to look for the google.com's

play13:52

IP address so first it will find it in

play13:54

the like try to search it in the browser

play13:56

C if I have visited that site earlier

play13:58

that it will find it in the browser cach

play14:00

if it is it is not found in browser

play14:02

cache then it will look up to the like

play14:04

my internet providers cache or the

play14:08

system cache so generally it is found in

play14:10

one of these cache and it will establish

play14:13

TCP connection with that IP address and

play14:15

I'll get served the https like the HTML

play14:17

pages of the content of the site but uh

play14:20

let's suppose a case when it is not able

play14:22

to resolve it then there will be a

play14:25

recursive DNS query so there there are

play14:28

two types of quer is recursive and

play14:30

iterative so Suppose there will be a

play14:32

recursive query so what it will do it

play14:34

will request to the root root server so

play14:38

after that google.com one more dot will

play14:40

be there so that is the root server so

play14:42

root server will say like I don't have

play14:45

address for google.com but hey I have

play14:48

address for that do at the top level

play14:50

domain so it will return the server of

play14:53

the top Lev domain.com then uh to it

play14:57

will again Ask the IP address for

play15:00

google.com to the top level domain so it

play15:02

will return the address for the

play15:04

authoritative server of the like Google

play15:06

and then the google.com that

play15:07

authoritative server will return the IP

play15:10

address so in this way the connection

play15:12

will get

play15:13

established okay can you explain me why

play15:18

the concept of

play15:20

firewalls concept of firewalls yeah so

play15:23

firewalls are basically used to have

play15:26

better control and security over our

play15:28

Network so firewalls are like uh

play15:30

essential essential network security

play15:33

devices so they will uh control the

play15:35

incoming and outgoing traffic they will

play15:37

also monitor so there are different

play15:40

firewalls like uh we can also say in AWS

play15:43

there are security groups there

play15:45

are network access control these are

play15:48

also types of firewalls so they will

play15:52

they they will inspect the incoming

play15:53

traffic we can set different firewall

play15:55

rules to like allow allow only from a

play15:58

specific spefic IP address or from a

play16:00

specific range of IP addresses uh or we

play16:03

can set up like different conditions if

play16:07

uh we are getting some kind of malicious

play16:10

traffic then we can block it so this is

play16:12

what firewalls are used for

play16:16

okay explain me the purpose of a subnet

play16:19

mask subnet mask

play16:23

uh subnet I know subnet subnet mask uh

play16:28

like like the after IP address we use

play16:31

that slash and 32 for the cidr range

play16:34

yeah so subnet mask we used to like uh

play16:37

creates

play16:39

uh uh create a specific number of IP

play16:42

addresses in a subnet create a network

play16:45

in a subnet so subnet mask is a like

play16:49

32bit number so uh we for example we can

play16:54

say there is some IP address and slash

play16:56

there is 32 then if use like 31 there so

play17:01

it will be the calculation will be like

play17:03

32 minus 1 so there will be only one IP

play17:06

address getting generated out of

play17:09

it uh so yeah that's about subnet mask

play17:14

do you know the computation of 32 and 28

play17:19

24 so on what basis are the number of IP

play17:21

addresses

play17:23

calculated uh are based on the uh like

play17:28

octed

play17:29

uh the the capacity that that each uh

play17:33

each can hold so they are calculated

play17:36

based on that that the highest they can

play17:38

hold from 0 to 255 so uh yeah so if it's

play17:45

a sub mask of 16 how many IP

play17:47

addresses yeah so it the calculation

play17:50

will be like out of 32 minus 16 then the

play17:53

uh number would be uh 16 and then 16 the

play17:57

uh power of 16 power of two like 2 ra to

play18:01

16 and the the number calculated uh will

play18:05

be uh the number of IP addresses we'll

play18:08

be able to get uh like a lot of like

play18:12

something 65,000 something a lot of IP

play18:14

addresses can be generated out of that

play18:17

uh I all right one more networking

play18:20

question uh can you how do you

play18:23

troubleshoot a situation where two

play18:24

devices on the same network they are not

play18:27

able to communicate to each other

play18:30

okay two devices are on same network but

play18:33

they are not able to con uh so uh we can

play18:37

we can check the both uh uh inbound and

play18:39

outbound traffic rules Like knle rules

play18:42

for both of them uh so if the we can

play18:46

check if what what conditions are set

play18:48

there like what are they allowing what

play18:50

inbound traffic and outbound traffic are

play18:52

they allowing we can set each other's IP

play18:54

addresses as allowed in the inbound and

play18:56

the outbound so that they can access

play18:59

each

play19:00

other we can ping one from the another

play19:04

so ping IP address of the another device

play19:06

from one and check if what's happening

play19:08

or yeah okay all

play19:11

right uh now coming back to your

play19:14

profile you said that you have worked on

play19:17

Java yeah how comfortable are you

play19:19

working with python or go or any other

play19:23

language yeah I'm comfortable uh because

play19:26

uh like in college days also I have Lear

play19:28

learned python as part of curriculum and

play19:32

uh mostly programming languages will the

play19:34

basics of programming will be similar

play19:37

only there will be syntax different so

play19:39

with help of like documentation and few

play19:42

practice practicing for few days I think

play19:44

I'll be comfortable in python or even go

play19:48

okay now have you had any experience in

play19:52

creating uh security uh in terms of

play19:57

protecting against common attacks like

play19:58

SQL injection cross-site

play20:02

scripting uh yeah so uh for against SQL

play20:06

injection and cross-site scripting I

play20:08

haven't worked on but uh in my work

play20:10

experience I worked on securing

play20:12

applications against tampering so uh

play20:15

suppose if application uh uh when a

play20:18

client like client is sending something

play20:20

to the like the request response client

play20:23

is sending to the server and uh in

play20:25

between uh if the network is

play20:29

uh like if Network gets uh what we can

play20:33

say tampered and someone tampers the uh

play20:36

uh the response uh like the request

play20:39

being sent to the server and if he

play20:41

modifies that request Pampers that uh so

play20:44

it can affect the application so the

play20:46

approach Ive used uh I've used was to do

play20:49

server side and client side hashing so

play20:52

in that request uh first the client will

play20:55

generate a hash and it will send that

play20:57

hash to the server and if if the hash

play21:00

gets matched only then the request will

play21:02

get accepted otherwise like we can log

play21:04

out or we can report that issue and

play21:06

report that incident so in this way we

play21:08

can handle security for

play21:11

tempering okay now there are different

play21:14

types of wireless network security

play21:17

protocols so have you heard of we WPA

play21:21

and

play21:22

WPA2 uh yeah I have heard of uh w w web

play21:27

like WP

play21:29

so these are related to wireless this in

play21:31

daytoday general like using Wi-Fi I have

play21:34

used them so WP like WP is like old

play21:39

older one and WPA is also I think now

play21:42

older one like WPA was vulner vulnerable

play21:45

to few few attacks so I have myself like

play21:48

tried to hack into few Wi-Fi using like

play21:52

like different tools so to get the

play21:54

password so WPA was uh vulnerable like

play21:58

there was one button uh on the routers

play22:00

which was used to reset so it was uh

play22:03

exploiting that uh and was able to

play22:06

connect to the network and then the

play22:08

latest one is I think WPA 2 uh which has

play22:12

fixed that so it is using uh like Advan

play22:15

encryption standards so WPA 2 WPA 3 have

play22:19

come up and like they offer stronger so

play22:21

nowadays you like newer routers you

play22:23

won't be able to easily track into them

play22:28

all right fre so I'm done with my

play22:30

networking questions uh just on a few

play22:33

behavioral questions where I want to

play22:35

understand how you would react to

play22:36

certain situations and if you have

play22:38

handled any of

play22:39

these because you have you don't have

play22:42

much experience you're just a fresh grad

play22:44

just a couple of years how much did you

play22:46

say how many years of experience you

play22:48

have one year right uh nine months I

play22:51

think

play22:52

Ned in August 2023 okay yep so 6 months

play22:56

to an year so if you do not know the

play22:58

answers or if you haven't dealt with any

play23:00

of these scenarios just yeah you feel

play23:02

free to say that you haven't but if you

play23:04

have any ideas so I'm open for hearing

play23:08

so tell me a situation if where you had

play23:10

to explain a complex technical problem

play23:13

to a customer with limited

play23:15

knowledge have you had such a experience

play23:19

yeah yeah yeah so uh similar experience

play23:22

I have had was

play23:24

uh uh a team member but he he didn't had

play23:28

uh technical knowledge like he uh he uh

play23:31

he was in the uh uh different different

play23:35

sort of like we can say department so

play23:37

business analysis so we had to explain

play23:40

him so what uh things I did was uh I I

play23:44

tried to uh break break down the I tried

play23:48

to break down the solution whatever we

play23:50

were implementing so I had to break down

play23:53

that and I I tried to explain him using

play23:56

like examples like uh uh giving

play23:58

different

play23:59

analogies uh so yeah and iy I I tried to

play24:06

like uh give him different different

play24:10

examples like different approaches so

play24:12

yeah that's

play24:14

how that's how I I encountered this all

play24:18

right uh any time where you had to

play24:21

collaborate with a developer to resolve

play24:23

a technical

play24:25

issue uh yeah this uh this happens like

play24:28

usually this happens so if there is some

play24:31

task assigned to me and I I do not have

play24:33

like uh understanding of that uh I would

play24:37

connect with uh like fellow developer

play24:39

who has like I would ask in team like

play24:41

who has worked on this module or

play24:43

recently been working on this so I can I

play24:46

I'll connect with him over teams or if

play24:49

he's present in office then we can like

play24:51

sit together in a meeting room and then

play24:54

uh I I asked him like how did he

play24:56

encounter we just go to through the

play24:58

debugging mode so whatever he has

play25:00

implemented we can just go like assign

play25:04

like have some debugging points and uh

play25:07

we can go through the whole flow and I

play25:09

ask him different questions like uh like

play25:12

in the way I need to uh Implement that

play25:15

solution so what challenges would I face

play25:18

and yeah we can have that uh sort of

play25:21

discussion and then I I get a clear idea

play25:24

of how like how can I Implement uh like

play25:27

how can I like develop that

play25:28

similar thing okay all right now because

play25:32

the cloud develops all these

play25:34

Technologies they keep on changing there

play25:35

is always some new content coming up so

play25:38

how do you stay informed on the latest

play25:40

advancements which are happening in

play25:42

these

play25:43

fields so yeah I rely on mostly like

play25:47

social media like on LinkedIn or on

play25:50

YouTube you get to see lest things also

play25:52

you can uh you can follow newsletters by

play25:56

uh like few uh recognized people uh in

play25:59

the industry who are working there so

play26:01

they they post their own experiences you

play26:03

can also there are like different

play26:06

different uh organizations have their

play26:08

own engineering pages so like hot star

play26:10

has its own engineering page like blog

play26:12

technical Blog then Netflix has its own

play26:14

technical blog so there we can get the

play26:17

whole white papers we can uh read them

play26:20

like what problem they have uh

play26:22

encountered what like business problem

play26:24

they were trying to solve which

play26:26

Technologies they leveraged for solving

play26:28

it

play26:28

so yeah also like if we want it less

play26:32

like less serious we can also watch

play26:34

podcasts and all to like yeah stay in

play26:38

Trend okay so one last question in this

play26:41

interview so describe a time where you

play26:44

faced a high pressure situation at work

play26:46

and how did you manage the stress and

play26:48

ensure that the tasks

play26:51

complete yeah so this was uh like uh

play26:55

when I joined organization a few months

play26:57

back uh like I was assigned on my first

play27:00

project so the thing was that I was uh I

play27:02

thought that I was told to Shadow the

play27:04

project like it was assigned to one of

play27:06

the senior member in my team and I was

play27:08

just looped into that mail so there was

play27:11

sort of miscommunication I thought that

play27:13

it would be just shadowing me shadowing

play27:15

and he'll be developing the project and

play27:17

I just he'll be updating on and I'll be

play27:20

asking him questions but the thing was

play27:22

that it was actually expected that I

play27:24

would be developing the project and he

play27:27

would be just guiding me so there was

play27:28

sort of miscommunication so it caused a

play27:30

delay so and then I realized that whole

play27:34

thing needs to be developed by me and

play27:37

there was like short deadline so uh the

play27:40

thing I did was like uh prioritize that

play27:43

task so I I started focusing on the

play27:47

single task like uh to deliver it uh

play27:49

within the ETA uh so I took help of him

play27:53

I like help in the way like I If I had

play27:57

like I didn't understood the module like

play27:59

what was the existing functionality

play28:01

where like s where is the similar

play28:03

functionality implemented so I can take

play28:05

reference of it uh so he helped me in

play28:08

that way like guided me and so I started

play28:11

working on me so between I got into many

play28:14

issues so at that time also I took his

play28:16

help also I took like few other members

play28:18

help to solve that issues like how can

play28:20

this be done so asking lot of questions

play28:22

that was my Approach and just not

play28:24

stopping just I was just going on going

play28:26

on so it was like a good experience I

play28:29

would say because after handling that

play28:31

stress uh during that stress it was like

play28:34

painful I was thinking that what where I

play28:36

have come but after completing that

play28:39

project and after that project went into

play28:41

production and all I like felt more

play28:43

confident like if I can handle this like

play28:46

I can do it in small time then I can do

play28:48

like a lot more complex uh things so

play28:51

even my lead started to assign me on

play28:54

complex projects after that so yeah that

play28:56

was my experience with uh like handling

play28:59

stress cool all right thank you pram I'm

play29:03

done with the interview and uh so I'll

play29:05

be providing you a little bit of

play29:07

feedback after I pause the recording but

play29:09

thank you for your time today yeah thank

play29:11

you sir thank you

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Mock InterviewTech SkillsCareer InsightsLinux SystemsJava DeveloperCloud ComputingDevOpsNetworkingSecurityStress ManagementInterview Tips