AWS: Interview

1) Explain what is AWS?
AWS stands for Amazon Web Service. It is a collection of remote computing services also known as cloud computing platform.  This new realm of cloud computing is also known as IaaS or Infrastructure as a Service.
2) Mention what are the key components of AWS?
The key components of AWS are
·          Route 53: A DNS web service
·          Simple E-mail Service: It allows sending e-mail using RESTFUL API call or via regular SMTP
·          Identity and Access Management: It provides enhanced security and identity management for your AWS account
·          Simple Storage Device or (S3): It is a storage device and the most widely used AWS service
·          Elastic Compute Cloud (EC2): It provides on-demand computing resources for hosting applications. It is very useful in case of unpredictable workloads
·          Elastic Block Store (EBS): It provides persistent storage volumes that attach to EC2 to allow you to persist data past the lifespan of a single EC2
·          Cloud Watch: To monitor AWS resources, It allows administrators to view and collect key Also, one can set a notification alarm in case of trouble.

3) Explain what is S3?
S3 stands for Simple Storage Service. You can use S3 interface to store and retrieve any amount of data, at any time and from any where on the web.  For S3, the payment model is “pay as you go”.
4) Explain what is AMI?
AMI stands for Amazon Machine Image.  It’s a template that provides the information (an operating system, an application server and applications) required to launch an instance, which is a copy of the AMI running as a virtual server in the cloud.  You can launch instances from as many different AMIs as you need.

5) Mention what is the relation between an instance and AMI?
From a single AMI, you can launch multiple types of instances.  An instance type defines the hardware of the host computer used for your instance. Each instance type provides different compute and memory capabilities.  Once you launch an instance, it looks like a traditional host, and we can interact with it as we would with any computer.
 6) What does an AMI include?
An AMI includes the following things
·          A template for the root volume for the instance
·          Launch permissions decide which AWS accounts can avail the AMI to launch instances
·          A block device mapping that determines the volumes to attach to the instance when it is launched

7) How can you send request to Amazon S3?
Amazon S3 is a REST service, you can send request by using the REST API or the AWS SDK wrapper libraries that wrap the underlying Amazon S3 REST API.


8) Mention what is the difference between Amazon S3 and EC2?

The difference between EC2 and Amazon S3 is that


EC2
S3
·          It is a cloud web service used for hosting your application
·          It is a data storage system where any amount of data can be stored
·          It is like a huge computer machine which can run either Linux or Windows and can handle application like PHP, Python, Apache or any databases
·          It has a REST interface and uses secure HMAC-SHA1 authentication keys














9) How many buckets can you create in AWS by default? 
By default, you can create up to 100 buckets in each of your AWS accounts. 
10) Explain can you vertically scale an Amazon instance? How?
Yes, you can vertically scale on Amazon instance. For that
·          Spin up a new larger instance than the one you are currently running
·          Pause that instance and detach the root webs volume from the server and discard
·          Then stop your live instance and detach its root volume
·          Note the unique device ID and attach that root volume to your new server
·          And start it again

11) Explain what is T2 instances?
T2 instances are designed to provide moderate base line performance and the capability to burst to higher performance as required by workload.
12) In VPC with private and public subnets, database servers should ideally be launched into which subnet?
With private and public subnets in VPC, database servers should ideally launch into private subnets.
13) Mention what are the security best practices for Amazon EC2?
For secure Amazon EC2 best practices, follow the following steps
·          Use AWS identity and access management to control access to your AWS resources
·          Restrict access by allowing only trusted hosts or networks to access ports on your instance
·          Review the rules in your security groups regularly
·          Only open up permissions that your require
·          Disable password-based login, for instance, launched from your AMI

14) Explain how the buffer is used in Amazon web services?
The buffer is used to make the system more robust to manage traffic or load by synchronizing different component.  Usually, components receive and process the requests in an unbalanced way, With the help of buffer, the components will be balanced and will work at the same speed to provide faster services.
15) While connecting to your instance what are the possible connection issues one might face?
The possible connection errors one might encounter while connecting instances are
·          Connection timed out
·          User key not recognized by the server
·          Host key not found, permission denied
·          Unprotected private key file
·          Server refused our key or No supported authentication method available
·          Error using MindTerm on Safari Browser
·          Error using Mac OS X RDP Client

16)      What are the advantages of using cloud computing?
The advantages of using cloud computing are
a)      Data backup and storage of data
b)      Powerful server capabilities
c)       SaaS ( Software as a service)
d)      Information technology sandboxing capabilities
e)      Increase in productivity
f)       Cost effective & Time saving
17)      Mention platforms which are used for large scale cloud computing?
The platforms that are used for large scale cloud computing are
a)      Apache Hadoop
b)      MapReduce
 18)      Explain different models for deployment in cloud computing?
The different deployment models in cloud computing are
a)      Private Cloud
b)      Public Cloud
c)       Community Cloud
d)      Hybrid Cloud
19)      What is the difference in cloud computing and computing for mobiles?
Mobile computing uses the same concept as cloud computing.   Cloud computing becomes active with the data with the help of internet rather than individual device. It provides users with the data which they have to retrieve on demand.  In mobile, the applications runs on the remote server and gives user the access for storage and manage.
20)      How user can gain from utility computing?
Utility computing allows the user to pay only for what they are using. It is a plug-in managed by an organization which decides what type of services has to be deployed from the cloud.
Most organizations prefer hybrid strategy.
21)       For a transport in cloud how you can secure your data?
To secure your data while transporting them from one place to another, check that there is no leak with the encryption key implemented with the data you are sending.
22)      What are the security aspects provided with cloud?
a)      Identity management: It authorizes the application services
b)      Access control: permission has to be provided to the users so that they can control the access of another user who is entering into the cloud environment.
c)       Authentication and Authorization: Allows only the authorized and authenticated user only to access the data and applications
23)      List out different layers which define cloud architecture?
The different layers used by cloud architecture are
a)      CLC or Cloud Controller
b)      Walrus
c)       Cluster Controller
d)      SC or Storage  Controller
e)      NC or Node Controller
24)      What are system integrators in Cloud Computing?
In Cloud Computing, systems integrator provides the strategy of the complicated process used to design a cloud platform. Integrator allows to create more accurate hybrid and  private cloud network, as integrators have all the knowledge about the data center creation.
25)   What is “ EUCALYPTUS” stands for?
“ EUCALYPTUS” stands for Elastic Utility Computing Architecture For Linking Your Programs To Useful Systems”
26)    Explain what is the use of “EUCALYPTUS” in cloud computing?
“Eucalyptus” is an open source software infrastructure in cloud computing, which is used to implement clusters in cloud computing platform. It is used to build public, hybrid and private clouds. It has the ability to produce your own data center into a private cloud and allows you to use its functionality to many other organizations.
27)   What is the requirement of virtualization platform in implementing cloud?
The requirement of virtualization platform in implementing cloud is to
a)      Manage the service level policies
b)      Cloud Operating System
c)       Virtualization platforms helps to keep the backend level and user level concepts different from each other
28)   Before going for cloud computing plat form what are the essential things to be taken in concern by users?
a)      Compliance
b)      Loss of data
c)       Data storage
d)      Business continuity
e)      Up time
f)       Data integrity in cloud computing
29)   Mention some open source cloud computing platform databases?
The open source cloud computing platform databases are
a)      MongoDB
b)      CouchDB
c)       LucidDB
30)   What are the security laws which are implemented to secure data in a cloud ?
The security laws which are implemented to secure data in cloud are
a)      Processing: Control the data that is being processed correctly and completely in an application
b)      File: It manages and control the data being manipulated in any of the file
c)      Output reconciliation:  It controls the data which has to be reconciled from input to output
d)      Input Validation: Control the input data
e)      Security and Backup: It provides security and backup it also controls the security breaches logs
31)   Mention the name of some large cloud providers and databases?
a)      Google big table
b)      Amazon simpleDB
c)       Cloud based SQL
32)   Explain the difference between cloud and traditional data centers?
a)      The cost of the traditional data center is higher due to heating  and hardware/software issues
b)      Cloud gets scaled when the demand increases.  Majority of the expenses are spent on the maintenance of the data centers,  while that is not the case with cloud computing
33)   Explain what are the different modes of software as a service (SaaS)?
a)      Simple multi-tenancy :  In this each user has independent resources and are different from other users, it is an efficient mode.
b)      Fine grain multi-tenancy:  In this type, the resources can be shared by many but the functionality remains the same.


34)     What is the use of API’s in cloud services?
API’s ( Application Programming Interface) is very useful in cloud platforms
a)      It eliminates the need to write the fully fledged programs
b)      It provides the instructions to make communication between one or more applications
c)       It allows easy creation of applications and link the cloud services with other systems
35)   What are the different data centers deployed for cloud computing?
Cloud computing consists of different data centers like
a)      Containerized Datacenters
b)      Low Density Datacenters
36)   In cloud computing what are the different layers?
The different layers of cloud computing are:
a)      SaaS: Software as a Service , it provides users access directly to the cloud application without installing anything on the system.
b)      IaaS: Infrastructure as a service, it provides the infrastructure in terms of hardware like memory, processor speed etc.
c)       PaaS: Platform as a service, it provides cloud application platform for the developers
37)   How important is the platform as a service?
Platform as a service or PAAS is an important layer in cloud computing.  It provides application platform for providers.  It is responsible for providing complete virtualization of the infrastructure layer and makes it work like a single server.
38)   What is a cloud service?
Cloud service is used to build cloud applications using the server in a network through internet.  It provides the facility of using the cloud application without installing it on the computer. It also reduces the maintenance and support of the application which are developed using cloud service.
39)   List down the three basic clouds in cloud computing?
a)      Professional cloud
b)      Personal cloud
c)       Performance cloud
40)   As a infrastructure as a service what are the resources that are provided by it?
IAAS ( Infrastructure As A Service) provides virtual and physical resources that are used to build a cloud. It deals with the complexities of deploying and maintaining of the services provided by this layer. Here the infrastructure is the servers, storage and other hardware systems.
41)   What are the business benefits involved in cloud architecture?
The benefits involved in cloud architecture is
a)      Zero infrastructure investment
b)      Just in time infrastructure
c)       More efficient resource utilization
42)   What are the characteristics of cloud architecture that separates it from traditional one?
The characteristics that makes cloud architecture above traditional architecture is
a)      According to the demand cloud architecture provides the hardware requirement
b)      Cloud architecture is capable of scaling the resource on demand
c)       Cloud architecture is capable of managing and handling dynamic workloads without failure
43)   Mention what is the difference between elasticity and scalability in cloud computing?
Scalability is a characteristics of cloud computing through which increasing workload can be handled by increasing in proportion the amount of resource capacity.  Whereas, elasticity, is being one of the characteristics that  highlights the concept of commissioning and decommissioning of a large amount of resource capacity.
44)   Mention the services that are provided by Window Azure Operating System?
Window Azure provides three core services which are given as
a)      Compute
b)      Storage
c)       Management
45)   In cloud architecture what are the different components that are required?
a)      Cloud Ingress
b)      Processor Speed
c)       Cloud storage services
d)      Cloud provided services
e)      Intra-cloud communications
46)   In cloud architecture what are the different phases involved?
a)      Launch Phase
b)      Monitor Phase
c)       Shutdown Phase
d)      Cleanup Phase
47)   List down the basic characteristics of cloud computing?
a)      Elasticity and Scalability
b)      Self-service provisioning and automatic de-provisioning
c)       Standardized interfaces
d)      Billing self service based usage model
48)   In cloud architecture what are the building blocks?
a)      Reference architecture
b)      Technical architecture
c)       Deployment operation architecture
49)   Mention in what ways cloud architecture provide automation and performance transparency?
To provide the performance transparency and automation there are many tools used by cloud architecture.  It allows to manage the cloud architecture and monitor reports. It also allows them to share the application using the cloud architecture.  Automation is the key component of cloud architecture which helps to improve the degree of quality.
50)    In cloud computing explain the role of performance cloud?
Performance cloud is useful in transferring maximum amount of data instantly.  It is used by the professionals who work on high performance computing research.
51)   Explain hybrid and community cloud?
Hybrid cloud: It consists of multiple service providers. It is a combination of public and private cloud features. It is used by the company when they require both private and public clouds both.
Community Cloud:  This model is quite expensive and is used when the organizations having common goals and requirements, and are ready to share the benefits of the cloud service.
52)   In cloud what are the optimizing strategies?
To overcome the maintenance cost and to optimize the resources ,there is a concept of three data center in cloud which provides recovery and back-up in case of disaster or system failure and keeps all the data safe and intact.
53)   What is Amazon SQS?
To communicate between different connectors Amazon SQS message is used, between various components of AMAZON, it acts as a communicator.
54)   How buffer is used to Amazon web services?
In order to make system more efficient against the burst of traffic or load, buffer is used. It synchronizes different component . The component always receives and processes the request in an unbalanced way.  The balance between different components are managed by buffer, and makes them work at the same speed to provide faster services.
55)   Mention what is Hypervisor in cloud computing and their types?
Hypervisor is a Virtual Machine Monitor which manages resources for virtual machines. There are mainly two types of hypervisors
Type 1: The guest Vm runs directly over the host hardware, eg Xen, VmWare ESXI
Type 2: The guest Vm runs over hardware through a host OS, eg Kvm, oracle virtualbox

  
56) What is Amazon EC2 service?
Ans: EC2 uses Xen virtualization. Each virtual machine, called an “instance”. You can use Amazon EC2 to launch as many or as couple of virtual servers as you need, design security and networking, and manage storage. Amazon EC2 empowers you to scale up or down to handle changes in requirements.

57) What is Amazon Machine Image (AMI)?
Ans: An Amazon Machine Image (AMI) is a template that contains a software configuration (for example, an operating system, an application server, and applications). From an AMI, we launch an instance, which is a copy of the AMI running as a virtual server in the cloud. We can launch multiple instances of an AMI.

58) What is the relation between Instance and AMI?
Ans: We can launch different types of instances from a single AMI. An instance type essentially determines the hardware of the host computer used for your instance. Each instance type offers different compute and memory capabilities.

After we launch an instance, it looks like a traditional host, and we can interact with it as we would any computer. We have complete control of our instances; we can use sudo to run commands that require root privileges.

59) What are the Security Best Practices for Amazon EC2?
Ans: There are several best practices for secure Amazon EC2. Following are few of them.
·   Use AWS Identity and Access Management (IAM) to control access to your AWS resources.
·   Restrict access by only allowing trusted hosts or networks to access ports on your instance.
·   Review the rules in your security groups regularly, and ensure that you apply the principle of least
·   Privilege — only open up permissions that you require.
·   Disable password-based logins for instances launched from your AMI. Passwords can be found or cracked, and are a security risk.


60) Explain Stopping, Starting, and Terminating an Amazon EC2 instance?
Ans:
Stopping and Starting an instance: When an instance is stopped, the instance performs a normal shutdown and then transitions to a stopped state. All of its Amazon EBS volumes remain attached, and you can start the instance again at a later time. You are not charged for additional instance hours while the instance is in a stopped state.

Terminating an instance: When an instance is terminated, the instance performs a normal shutdown, then the attached Amazon EBS volumes are deleted unless the volume’s delete On Termination attribute is set to false. The instance itself is also deleted, and you can’t start the instance again at a later time.

61) How to use Amazon SQS?
Ans: Amazon SQS is a message passing mechanism that is used for communication between different connectors that are connected with each other. It also acts as a communicator between various components of Amazon. It keeps all the different functional components together. This functionality helps different components to be loosely coupled, and provide an architecture that is more failure resilient system.

62) How buffer is used in Amazon web services?
Ans: Buffer is used to make the system more resilient to burst of traffic or load by synchronizing different component. The components always receive and process the requests in unbalanced way. Buffer keeps the balance between different components and makes them work at the same speed to provide faster services.

63) How does cloud computing provides on-demand functionality?
Ans: Cloud computing is a metaphor used for internet. It provides on-demand access to virtualized IT resources that can be shared by others or subscribed by you. It provides an easy way to provide configurable resources by taking it from a shared pool. The pool consists of networks, servers, storage, applications and services.

64) What is the difference between scalability and elasticity?
Ans: Scalability is a characteristic of cloud computing through which increasing workload can be handled by increasing in proportion the amount of resource capacity. It allows the architecture to provide on demand resources if the requirement is being raised by the traffic. Whereas, elasticity is being one of the characteristic provide the concept of commissioning and decommissioning of large amount of resource capacity dynamically. It is measured by the speed by which the resources are coming on demand and the usage of the resources.

65) What are the different layers of cloud computing?
Ans: Cloud computing consists of 3 layers in the hierarchy and these are as follows:
1. Infrastructure as a Service (IaaS) provides cloud infrastructure in terms of hardware like memory, processor speed etc. 
2. Platform as a Service (PaaS) provides cloud application platform for the developers. 
3. Software as a Service (SaaS) provides cloud applications which are used by the user directly without installing anything on the system. The application remains on the cloud and it can be saved and edited in there only.

66) How to secure your data for transport in cloud?
Ans: Cloud computing provides very good and easy to use feature to an organization, but at the same time it brings lots of question that how secure is the data, which has to be transported from one place to another in cloud. So, to make sure it remains secure when it moves from point A to point B in cloud, check that there is no data leak with the encryption key implemented with the data you sending.


   67. What is an AMI?  How do I build one?
AMI stands for Amazon Machine Image.  It is effectively a snapshot of the root filesystem.  Commodity hardware servers have a bios that points the the master boot record of the first block on a disk.  A disk image though can sit anywhere physically on a disk, so Linux can boot from an arbitrary location on the EBS storage network.
68. Need an AWS expert?
Build a new AMI by first spinning up and instance from a trusted AMI.  Then adding packages and components as required.  Be wary of putting sensitive data onto an AMI.  For instance your access credentials should be added to an instance after spinup.  With a database, mount an outside volume that holds your MySQL data after spinup as well.

69. What is auto-scaling? How does it work?

Autoscaling is a feature of AWS which allows you to configure and automatically provision and spinup new instances without the need for your intervention.  You do this by setting thresholds and metrics to monitor.  When those thresholds are crossed a new instance of your choosing will be spun up, configured, and rolled into the load balancer pool.  Voila you’ve scaled horizontally without any operator intervention!
With MySQL databases autoscaling can get a little dicey, so we wrote a guide to autoscaling MySQL on amazon EC2.

70. What is S3?  What is it used for? Should encryption be used?

S3 stands for Simple Storage Service.  You can think of it like ftp storage, where you can move files to and from there, but not mount it like a filesystem.  AWS automatically puts your snapshots there, as well as AMIs there.  Encryption should be considered for sensitive data, as S3 is a proprietary technology developed by Amazon themselves, and as yet unproven vis-a-vis a security standpoint.


Cloud Computing:
Cloud Computing is nothing but sharing of computing resorcess.

Why  Cloud  service is popular?
·         Reduce to complexity of networks.

·         Do not have to buy software licenses.

·         Customization.

·         Scallability.

·         Reliability.

·         Efficiency.

·         Information at cloud are not easily lost.

·         Cloud Providers that have specialized in a particular area (such as a e-mail) can bring advanced services that a single company might not be able to afford or develop.

Redshift:
·         Redshift can  Provision a Redshift cluster with from a single node to 100 nodes configuration depending on the processing and storage capacity required.

·         Redshift node come in two sizes XL & 8XL.

·         XL node comes with 2TB attached storage and

·         8XL node comes with 16TB attached storage.


·         Clusters can have a maximum of 32XL node (64TB) (OR) 100 8XL nodes (1.6PB).


Amazon Redshift is what type of data warehouse service?
 ANSWER - Petabyte-scale
Amazon Redshift is a fully-managed, petabyte-scale data warehouse service.
What does MPP stand for when referring to the type of architecture Redshift has?
ANSWER - massively parallel processing
Redshift has a massively parallel processing architecture that parallelizes and distributes SQL operations to take advantage of available resources.
Redshift can provide fast query performance by leveraging _______ storage approaches and technology.
ANSWER - columnar
MORE INFORMATION:
Redshift can provide fast query performance by leveraging columnar storage approaches and technology, much of which is taken from enterprise database technology.
Amazon's Redshift data warehouse allows enterprise IT pros to execute ________ against ____ data sets.
ANSWER - complex SQL queries / large 
Amazon's Redshift data warehouse allows enterprise IT pros to execute complex SQL queries against large data sets.
Redshift was designed to alleviate the frustrating, time-consuming challenges database clusters have imposed on _____ administrators?
ANSWER - database
Redshift was designed to alleviate the frustrating, time-consuming challenges database clusters have imposed on database administrators.
True or False: Amazon Redshift is adept at handling data analysis workflows.
ANSWER - True
There currently are two Amazon data warehouse services adept at handling data analysis workflows: Amazon Redshift and Amazon Relational Database Service.
Adding nodes to a Redshift cluster provides _______ performance improvements.
ANSWER - both 
Adding nodes to a Redshift cluster provides linear or near-linear performance improvements.
The preferred way to load data into Redshift is through ______ using the COPY command.
·         Remote hosts
·         Simple Storage Service
·         Elastic MapReduce
·         All of the above

ANSWER - All of the above 
The preferred way to load data into Redshift is through remote hosts, Simple Storage Service or Elastic MapReduce using the COPY command. The COPY command executes loads in parallel and has the option to compress data during the load process.
Amazon Redshift has how many pricing components?
ANSWER - 3 
Amazon Redshift has three pricing components: data warehouse node hours, backup storage and data transfer.
What type of API provides a management interface to manage data warehouse clusters programmatically?
ANSWER - Query 
The Amazon Redshift Query API provides a management interface to manage data warehouse clusters programmatically.


4 comments: