500 interview questions milestone

Thank you for all the contributors. Now let's get to 1000 :)
This commit is contained in:
abregman 2019-10-26 03:29:45 +03:00
parent c1c4d22f21
commit 4f9442d398

View File

@ -1,19 +1,14 @@
# DevOps Interview Questions # DevOps Interview Questions
:information_source:  This repository contains interview questions on various DevOps and SRE related topics
:information_source:  This repository contains interview questions on various DevOps related topics :bar_chart:  There are currently **500** questions
:bar_chart:  There are currently **485** questions
:warning:  You don't need to know how to answer all the questions in this repo. DevOps is not about knowing all :)
:thought_balloon:  Different interviewers focus on different things. Some will focus on your resume while others might focus on scenario questions or specific technical questions. I tried to cover different types of questions for you to practice and test your skills :thought_balloon:  Different interviewers focus on different things. Some will focus on your resume while others might focus on scenario questions or specific technical questions. I tried to cover different types of questions for you to practice and test your skills
:page_facing_up:  Some questions are also relevant to similar roles like SRE and Production Engineer
:pencil:  You can add more questions & answers by submitting pull requests :) You can read more about it [here](CONTRIBUTING.md) :pencil:  You can add more questions & answers by submitting pull requests :) You can read more about it [here](CONTRIBUTING.md)
:cn:  You can find the [中文](README-ZH_CN.md) chinese translation right [here](README-zh_CN.md) :cn:  You can find a [中文](README-ZH_CN.md) Chinese translation right [here](README-zh_CN.md)
**** ****
@ -679,6 +674,10 @@ TCP establishes a connection between the client and the server to guarantee the
<summary>What is MTU?</summary><br><b> <summary>What is MTU?</summary><br><b>
</b></details> </b></details>
<details>
<summary>True or False? ping is using UDP because it doesn't care about reliable connection</summary><br><b>
</b></details>
<details> <details>
<summary>What is SDN?</summary><br><b> <summary>What is SDN?</summary><br><b>
</b></details> </b></details>
@ -867,6 +866,10 @@ Using the `chmod` command.
3. Check I/O stats with <code>iostat</code> 3. Check I/O stats with <code>iostat</code>
</b></details> </b></details>
<details>
<summary>How to debug binaries?</summary><br><b>
</b></details>
<details> <details>
<summary>What is a Linux kernel module and how do you load a new module?</summary><br><b> <summary>What is a Linux kernel module and how do you load a new module?</summary><br><b>
</b></details> </b></details>
@ -3278,6 +3281,10 @@ the pseudo table to retrieve the sum of the prices spent by each customer, then
<summary>Explain "Privilege Restriction"</summary><br><b> <summary>Explain "Privilege Restriction"</summary><br><b>
</b></details> </b></details>
<details>
<summary>How HTTPS is different from HTTP?</summary><br><b>
</b></details>
<details> <details>
<summary>What types of firewalls are there?</summary><br><b> <summary>What types of firewalls are there?</summary><br><b>
</b></details> </b></details>
@ -3319,6 +3326,46 @@ the pseudo table to retrieve the sum of the prices spent by each customer, then
<a name="puppet-advanced"></a> <a name="puppet-advanced"></a>
</b></details> </b></details>
<details>
<summary>Explain "Format String Vulnerability"</summary><br><b>
</b></details>
<details>
<summary>Explain "Buffer Overflow"</summary><br><b>
</b></details>
<details>
<summary>Explain DMZ</summary><br><b>
</b></details>
<details>
<summary>Explain TLS</summary><br><b>
</b></details>
<details>
<summary>What is CSRF? How to handle CSRF?</summary><br><b>
</b></details>
<details>
<summary>Explain HTTP Header Injection vulnerability</summary><br><b>
</b></details>
<details>
<summary>What security sources are you using to keep updated on latest news?</summary><br><b>
</b></details>
<details>
<summary>What TCP and UDP vulnerabilities are you familiar with?</summary><br><b>
</b></details>
<details>
<summary>Do using VLANs contribute to network security?</summary><br><b>
</b></details>
<details>
<summary>What are some examples of security architecture requirements?</summary><br><b>
</b></details>
##### Containers ##### Containers
<details> <details>
@ -3336,6 +3383,14 @@ the pseudo table to retrieve the sum of the prices spent by each customer, then
<summary>Explain MAC flooding attach</summary><br><b> <summary>Explain MAC flooding attach</summary><br><b>
</b></details> </b></details>
<details>
<summary>What is "Diffie-Hellman key exchange" and how does it work?</summary><br><b>
</b></details>
<details>
<summary>Explain "Forward Secrecy"</summary><br><b>
</b></details>
## Puppet ## Puppet
<a name="puppet-beginner"></a> <a name="puppet-beginner"></a>