Posts

Top 10 Interview questions on ceph

1. What is cephx ? Ans: It is a ceph authentication protocol.cephx operates like kerberos, but it has no single point of failure. 2. What is ceph stack ? Ans: A collection of two or more components of ceph. 3. What is Reliable autonomic distributed object store ? Ans: The core set of storage software which stores the user's data (MON+OSD). 4. What is cluster map ? Ans: The set of maps comprising the monitor map, OSD map, PG map , MDS map and CRUSH map. 5.What is ceph object storage ? Ans: The object storage “product”,service or capabilities, which consists essentially of a ceph storage cluster and a ceph object gateway. 6. What is RBD ? Ans: It is block storage component of ceph. 7. What is Ceph FS ? Ans: It is an POSIX filesystem components of ceph. 8. What is OSD ? Ans: A physical or logical storage unit . Sometimes, ceph users use the term “OSD” to refer to Ceph OSD Daemon. 9. What is ceph OSD ?...

Top 10 Interview Question on Bootstrap

1. What is bootstrap ? Ans: It is sleek, intuitive and powerful mobile first front-end framework for faster and easier web development.It uses HTML, CSS & Javascript. 2. Who developed boostrap ? Ans: Bootstrap was developed by Mark otto and Jacob Thornton at Twitter. 3. What are the uses of the bootstrap ? Ans: a. Mobile first approach b. Browser support c. Easy to get started d. Responsive design 4.In graphic design what is grid ? Ans: A grid is a structure made up of a series of intersecting straight lines used to structure the content. 5. How to establish cross browser consistency ? Ans: Bootstrap uses normalize to establish cross browser consistency.It is a small CSS file that provides better cross-browser consistency in the default styling of HTML elements. 6. How to create headings , paragraphs , lists and other inline elements ? Ans: Using typography feature of boostrap you can create headings , paragraph...

Top 10 Interview Questions on chef

Image
1. What is the use of the chef ? Ans: Chef is a powerful automation platform that transforms infrastructure into code. 2. What is the location where users interact with chef ? Ans: Chef DK workstation 3. What is the use of the chef client ? Ans: It is used to configure the node to its desired state. 4. Who stores the cookbooks , policies and metadata ? Ans: Chef server 5. Who use the chef client to ask the chef server for configuration details such as recipes, templates and file distributions ? Ans: Nodes Click on below link to explore more about Chef: https://amzn.to/35lGX9O 6. What is chef development kit ? Ans: It is a package from chef that provides a recommended set of tooling, including chef itself, the chef command line tool , Test Kitchen , ChefSpec and more. 7. What is the location in which community cookbooks are shared and managed ? Ans: Chef Supermarket 8. Who is the user interface for the chef s...

Top 10 Interview questions on cloud computing

Image
1. What is a cloud ? Ans: Cloud refers to a separate IT environment that is created for remotely provisioning measured and scalable IT resources. 2. What are the two components of the cloud ? Ans: a. Frontend components b. Backend components 3. What are the different component of the frontend ? Ans: Devices through which the end users interact.Smartphones and tablets constitute mobile clients, while computers without an internal hard drive is a thin client and thick clients are your typical computers. 4. What are the different components of backend ? Ans: a. Datacenter: server or a collection of servers. b. Distributed Servers: Servers spread across multiple locations. 5. What are the core attributes of cloud computing services ? Ans: 1. Elasticity 2. On-demand 3. Provider-pooled computing resources 4. metered service usage 5. Broad network access Click on below link to explore more about Cloud Computing: https:...

Practical uses of SSH

Image
1. As you know, ssh is configured on port no 22. Due to security reason, your team lead asked you to change the port number. How will you perform this task? Ans: First open the configuration file say (/etc/ssh/ssh_config) and then search for Port .Change it to the any other port number 3xxx or available port no. After doing this restart the ssh service using  service ssh restart command. In above diagram, as you can see we are changing the port number from 22 to 3xxx. Benefits : It provide more security. 2. Suppose you are taking care of Linux server but forget to disable the root login.How will you disable the root login?  Ans: First open the configuration file say (/etc/ssh/ssh_config) and then search for this string “PermitRootlogin” and make it to no. After doing this restart the ssh service. As you can see in the above diagram we are disabling the root login.It is highly recommended not to enable the permitrootlogin in...

Top 50 Interview question based on C++ Programming language

Image
1. C++ is a ______________ programming language. a. middle-level b. low-level c. high-level d. none Ans: a. C++ is a middle programming language because it consists of features of both high-level and low-level language. 2. C++ was developed by ________________. a. Bjarne Stroustrup b. Mark henry. c. Martin d. none Ans: a 3. C++ was developed in _________ a. 1979 b. 1981 c. 1982 d. none Ans: a 4. C++ is a ____________ of C. a. subset b. superset c. set d. none Ans: b Any legal C program is a legal C++ program. 5. C++ consists __________ pillars of object-oriented development: a. Three b. Four c. Two d. none Ans: b Four pillars are as follows: 1encapsulation 2. data-hiding 3. inheritance 4. polymorphism. 6. The ___________ giving a rich set of methods manipulating data structures. a. Standard template library b. library c. data d.none Ans: a. It contain the...

Practical uses of Linux Command

Image
1. cp a. It is a command which is used to copy the files or directories from one place to another place. Example: ~$ cp Topics.odt /home/anil/Downloads/ ~$ Real Time Problem: Suppose you are working in a company and your manager ask you to copy the file in one more location. At this point of time above example help you. b. We can preserve the permission of the files or directories while copying from source to destination. Example: ~$ cp -dR --preserve=all Text.txt /home/anil/Downloads Real Time Problem: Suppose you are working in a company and your manager ask you to copy the file in to another location by preserving the ownership and permission of the file. At this point of time above example help you. 2. scp a. It is a command which is used to copy files over the network between the host. Example: ~# scp /home/anil/Text.txt anil@127.0.0.1:/home/anil anil@127.0.0.1's password: Text.txt ...