Skip to content

Latest commit

 

History

History
85 lines (65 loc) · 3 KB

README.md

File metadata and controls

85 lines (65 loc) · 3 KB

Great Interview Questions

TODO: 
- a sample of simple questions that I or my collegues have gotten on the interviews or encountered in day-to-day tasks
- aggregate them into a more open-ended questions, that take 3-5 minutes to answer and give candidates the ability to show their knowledge by getting into details

AS      | IP               | BGP Prefix          | CC | Registry | Allocated  | AS Name
6830    | 188.167.89.20    | 188.167.0.0/17      | SK | ripencc  | 2009-06-11 | LGI-UPC formerly known as UPC Broadband Holding B.V., AT

Networks

Question Answer

Systems

Linux

Q: Explain the difference between /etc/profile, ~/.bash_profile, etc. What are they used for, what is the orider of execution?
A: 

Windows



Cisco IOS



Security

# Question Answer
1 What is a public key finger print? What can you use if for and when? Do only public keys have fingerprints? It is a sequence of bytes, a shortened version of the full public key for which it is the fingerprint of. The fingerprint is generated by applying a cryptographic hash function (any cryptographic function can be used for that (SHA1 or MD5), the lenght of the fingerprint desired being the primary factor for choosing (md5 produces a 128 bit fingerprint, sha1 - 160 bit) ) to the initial public key. The primary uses include (i) simplified key management; (ii) identification of the public key; (iii)
2 You are working for a company that uses RAID10 NAS for its database server w/ 4 HDDs of 1TB. Name the reasons you would recommend a backup solution for them and not recommend it. The main reasons are (i) malware suceptability, (ii) intrusion possibility (all drives in the RAID are succeptable to the same malware and intrusions with backups being offline), (iii) single-location dangers (very miniscule considering todays datacenters), (iv) human error (accidental deletion).
vagrant@node1:~/.ssh$ ssh-keygen -lf public_git.key 
4096 ed:58:09:fc:95:63:9b:99:30:77:55:de:68:0e:11:93  [email protected] (RSA)
mindaugas@Mindaugas-Lenovo-Y50-70:~/.ssh/private_keys$ ssh-add node3.priv 
Enter passphrase for node3.priv: 
Identity added: node3.priv (node3.priv)
mindaugas@Mindaugas-Lenovo-Y50-70:~/.ssh/private_keys$ ssh-add -l
4096 70:33:6c:5d:30:38:42:f6:dc:54:1a:f2:03:05:84:cd node3.priv (RSA)

C/C++

Question Answer

Git

How sync branches from remote to local when remote branches were deleted?
Blah

Java

Question Answer

Android Development

Question Answer

QA/Testing

Question Answer