You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TODO:
- a sample of simple questions that I or my collegues have gotten on the interviews or encountered in day-to-day tasks
- aggregate them into a more open-ended questions, that take 3-5 minutes to answer and give candidates the ability to show their knowledge by getting into details
AS | IP | BGP Prefix | CC | Registry | Allocated | AS Name
6830 | 188.167.89.20 | 188.167.0.0/17 | SK | ripencc | 2009-06-11 | LGI-UPC formerly known as UPC Broadband Holding B.V., AT
Networks
Question
Answer
Systems
Linux
Q: Explain the difference between /etc/profile, ~/.bash_profile, etc. What are they used for, what is the orider of execution?
A:
Windows
Cisco IOS
Security
#
Question
Answer
1
What is a public key finger print? What can you use if for and when? Do only public keys have fingerprints?
It is a sequence of bytes, a shortened version of the full public key for which it is the fingerprint of. The fingerprint is generated by applying a cryptographic hash function (any cryptographic function can be used for that (SHA1 or MD5), the lenght of the fingerprint desired being the primary factor for choosing (md5 produces a 128 bit fingerprint, sha1 - 160 bit) ) to the initial public key. The primary uses include (i) simplified key management; (ii) identification of the public key; (iii)
2
You are working for a company that uses RAID10 NAS for its database server w/ 4 HDDs of 1TB. Name the reasons you would recommend a backup solution for them and not recommend it.
The main reasons are (i) malware suceptability, (ii) intrusion possibility (all drives in the RAID are succeptable to the same malware and intrusions with backups being offline), (iii) single-location dangers (very miniscule considering todays datacenters), (iv) human error (accidental deletion).