You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+94-3
Original file line number
Diff line number
Diff line change
@@ -3268,6 +3268,16 @@ For more details about errors and exceptions follow this [https://docs.python.or
3268
3268
3269
3269
<details>
3270
3270
<summary>What is Lambda? How is it used?</summary><br><b>
3271
+
3272
+
Lambda is an anonymous function is known as a lambda function. This function can have any number of parameters but, can have just one statement.
3273
+
3274
+
Example:
3275
+
```
3276
+
1 a = lambda x,y : x+y
3277
+
2 print(a(5, 6))
3278
+
Output: 11
3279
+
```
3280
+
3271
3281
</b></details>
3272
3282
3273
3283
#### Properties
@@ -4622,6 +4632,13 @@ func main() {
4622
4632
4623
4633
<details>
4624
4634
<summary>What are the advantages of MongoDB? Or in other words, why choosing MongoDB and not other implementation of NoSQL?</summary><br><b>
4635
+
4636
+
MongoDB advantages are as followings:
4637
+
- Schemaless
4638
+
- Easy to scale-out
4639
+
- No complex joins
4640
+
- Structure of a single object is clear
4641
+
4625
4642
</b></details>
4626
4643
4627
4644
<details>
@@ -4707,10 +4724,19 @@ as key-value pair, document-oriented, etc.
4707
4724
4708
4725
<details>
4709
4726
<summary>Tell me about your experience with shell scripting</summary><br><b>
4727
+
4710
4728
</b></details>
4711
4729
4712
4730
<details>
4713
4731
<summary>What this line in scripts mean?: <code>#!/bin/bash</code></summary><br><b>
4732
+
4733
+
4734
+
`#!/bin/bash` is She-bang
4735
+
4736
+
/bin/bash is the most common shell used as default shell for user login of the linux system. The shell’s name is an acronym for Bourne-again shell. Bash can execute the vast majority of scripts and thus is widely used because it has more features, is well developed and better syntax.
4737
+
4738
+
4739
+
4714
4740
</b></details>
4715
4741
4716
4742
<details>
@@ -4799,10 +4825,40 @@ Using the keyword <code>read</code> so for example <code>read x</code> will wait
4799
4825
4800
4826
<details>
4801
4827
<summary>Write a script to determine whether a host is up or down</summary><br><b>
mailx -s "Server $SERVERIP is down" -t "$NOTIFYEMAIL" < /dev/null
4840
+
fi
4841
+
```
4842
+
4802
4843
</b></details>
4803
4844
4804
4845
<details>
4805
4846
<summary>Write a script to remove all the empty files in a given directory (also nested directories)</summary><br><b>
4847
+
4848
+
**EXAMPLE ONE**
4849
+
```
4850
+
#! /bin/bash
4851
+
for x in *
4852
+
do
4853
+
if [ -s $x ]
4854
+
then
4855
+
continue
4856
+
else
4857
+
rm -rf $x
4858
+
fi
4859
+
done
4860
+
```
4861
+
4806
4862
</b></details>
4807
4863
4808
4864
<aname="shell-scripting-advanced"></a>
@@ -5031,6 +5087,10 @@ the pseudo table to retrieve the sum of the prices spent by each customer, then
5031
5087
5032
5088
<details>
5033
5089
<summary>Explain availability sets and availability zones</summary><br><b>
5090
+
5091
+
An availability set is a logical grouping of VMs that allows Azure to understand how your application is built to provide redundancy and availability. It is recommended that two or more VMs are created within an availability set to provide for a highly available application and to meet the 99.95% Azure SLA.
5092
+
5093
+
5034
5094
</b></details>
5035
5095
5036
5096
<details>
@@ -5236,28 +5296,45 @@ Authorization is the process of identifying what level of access the service or
5236
5296
5237
5297
<details>
5238
5298
<summary>Explain what is Single Sign-On</summary><br><b>
5299
+
5300
+
SSO (Single Sign-on), is a method of access control that enables a user to log in once and gain access to the resources of multiple software systems without being prompted to log in again.
Multi-Factor Authentication (Also known as 2FA). Allows the user to present two pieces of evidence, credentials, when logging into an account.
5309
+
5310
+
- The credentials fall into any of these three categories: something you know (like a password or PIN), something you have (like a smart card), or something you are (like your fingerprint). Credentials must come from two different categories to enhance security.
Access control based on user roles (i.e., a collection of access authorizations a user receives based on an explicit or implicit assumption of a given role). Role permissions may be inherited through a role hierarchy and typically reflect the permissions needed to perform defined functions within an organization. A given role may apply to a single individual or to several individuals.
5318
+
5319
+
- RBAC mapped to job function, assumes that a person will take on different roles, overtime, within an organization and different responsibilities in relation to IT systems.
A asymmetric encryption is any technique where the there is two different keys that are used for encryption and decryption, these keys are known as public key and private key.
5334
+
5259
5335
</b></details>
5260
5336
5337
+
5261
5338
<details>
5262
5339
<summary>Explain the following:
5263
5340
@@ -5376,6 +5453,9 @@ You can use OWASP ZAP to analyze a "request", and if it appears that there no pr
HTTP Header Injection vulnerabilities occur when user input is insecurely included within server responses headers. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.
5458
+
5379
5459
</b></details>
5380
5460
5381
5461
<details>
@@ -5580,6 +5660,11 @@ This allows Elasticsearch to scale to an entire cluster of servers.
5580
5660
5581
5661
<details>
5582
5662
<summary>Explain Replicas</summary><br><b>
5663
+
5664
+
In a network/cloud environment where failures can be expected any time, it is very useful and highly recommended to have a failover mechanism in case a shard/node somehow goes offline or disappears for whatever reason.
5665
+
To this end, Elasticsearch allows you to make one or more copies of your index’s shards into what are called replica shards, or replicas for short.
5666
+
5667
+
5583
5668
</b></details>
5584
5669
5585
5670
<details>
@@ -5701,6 +5786,10 @@ In general the process is as follows:
5701
5786
5702
5787
<details>
5703
5788
<summary>What is a A record?</summary><br><b>
5789
+
5790
+
5791
+
A (Address) Maps a host name to an IP address. When a computer has multiple adapter cards and IP addresses, it should have multiple address records.
5792
+
5704
5793
</b></details>
5705
5794
5706
5795
<details>
@@ -5715,6 +5804,8 @@ While an A record points a domain name to an IP address, a PTR record does the o
5715
5804
5716
5805
<details>
5717
5806
<summary>What is a MX record?</summary><br><b>
5807
+
MX (Mail Exchange) Specifies a mail exchange server for the domain, which allows mail to be delivered to the correct mail servers in the domain.
0 commit comments