SME Questions
SME Questions
1.What is networking.
3.What is router?
A router is used in LAN (Local Area Network) and WAN (Wide Area
Network) environments. For example, it is used in offices for connectivity, and
you can also establish the connection between distant networks such as from
Bhopal to
It shares information with other routers in networking.
It uses the routing protocol to transfer the data across a network.
Furthermore, it is more expensive than other networking devices like switches
and hubs
Why Routers?
A router is more capable as compared to other network devices, such as a hub,
switch, etc., as these devices are only able to execute the basic functions of the
network. For example, a hub is a basic networking device that is mainly used to
forward the data between connected devices, but it cannot analyze or change
anything with the transferring data. On the other hand, the router has the
capability to analyze and modify the data while transferring it over a network,
and it can send it to another network. For example, generally, routers allow
sharing a single network connection between multiple devices
The server version also allows more concurrent remote connections, either as a file
share system or as a remote desktop host (though the latter requires some
additional licensing to enable that.)
The major differences between DAS, NAS, and SAN are costs, scalability,
and how storage is shared. The three systems also use different storage
mechanisms: DAS primarily uses hard-drive storage with sectors, NAS uses
shared files, and SAN uses block storage.
Different technologies are also used for transmitting data. DAS uses IDE/SCSI,
NAS uses TCP/IP and Ethernet, and SAN uses Fibre Channel and IP.
7.What is SSH?
Ans - SSH, also known as Secure Shell or Secure Socket Shell, is a network
protocol that gives users, particularly system administrators, a secure way to access
a computer over an unsecured network.
8.What is Dns?
Ans- When users type domain names into the URL bar in their browser, DNS
servers are responsible for translating those domain names to numeric IP
addresses, leading them to the correct websitIP
DNS servers translate requests for names into IP addresses, controlling which
server an end user will reach when they type a domain name into their web
browser. These requests are called queries.
9.OSI and TCP ip model layers names.
Ans- OSI layers are -
Application Layer,
Presentation Layer,
Session Layer,
Transport layer,
Network layer,
Data Link Layer,
Physical layer.
TCP IP model layers are --
Process/Application Layer,
Host-to-Host/Transport Layer,
Internet Layer,
Network Access/Link Layer
Difference between Hub, Switch and Router
1. Hub :A Hub is just a connector that connects the wires coming from
different sides. There is no signal processing or regeneration. It is an electronic
device that operates only on physical layers of the OSI model.
2. Switch :Switch is a point to point communication device. It operators at the
data link layer of OSI model. It uses switching table to find out the correct
destination.
3. Router :Routers are the multiport devices and more sophisticated as
compared to repeaters and bridges. It contains a routing table that enables it to
make decision about the route i.e. to determine which of several possible paths
between the source and destination is the best for a particular transmission.
SAN acts on block level over network. Storage which can be accessed using ISCSI
or FC. Suitable for business-critical applications and where high performance is
required. The main benefit to a SAN-based storage solution is ability to share
storage arrays to multiple servers. This allows you to configure storage capacity as
needed, usually by a dedicated SAN administrator. Higher levels of performance
throughput are typical in a SAN environment, and data is highly available through
redundant disk controllers and drives.
1. What is firewall?
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established
security policies. At its most basic, a firewall is essentially the barrier that sits
between a private internal network and the public Internet.
20.What is DNS?
DNS servers translate requests for names into IP addresses, controlling which
server an end user will reach when they type a domain name into their web
browser. These requests are called queries.
24.What is OSI Layer?
OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer moves
through a physical medium to the software application in another computer.OSI
consists of seven layers, and each layer performs a particular network function.
In this system, a primary DNS server is a server that hosts a website’s primary
zone file. This is a text database file that contains all of the authoritative
information for a domain, including its IP address, the identity of the domain
administrator, and various resource records. Resource records list domain
names alongside their corresponding IP addresses, and can take several
different forms:
Zone transfers become more complicated when they are completed between
multiple secondary servers. If several secondary servers are in use, one may be
designated as a higher-tier secondary server so that it is capable of replicating
zone file copies to the remaining pool of secondary servers.
How is a primary DNS server configured?
A server administrator may choose to designate a DNS server as a primary or
secondary server. In some cases, a server can be primary for one zone and
secondary for another zone.
Although each zone is limited to one primary DNS server, it can have any number
of secondary DNS servers. Maintaining one or more secondary servers ensures
that queries can be resolved even if the primary server becomes unresponsive.
83.What is Powershell?
PowerShell is a cross-platform task automation solution made up of a
command-line shell, a scripting language, and a configuration management
framework. PowerShell runs on Windows, Linux, and macOS.
But while TCP is instinctively reliable, its feedback mechanisms also result in
a larger overhead, translating to greater use of the available bandwidth on
your network.
What is UDP?
User Datagram Protocol (UDP) is a simpler, connectionless Internet protocol
wherein error-checking and recovery services are not required. With UDP,
there is no overhead for opening a connection, maintaining a connection, or
terminating a connection; data is continuously sent to the recipient,
whether or not they receive it.
WHAT IS VIRTUALIZATION ?
Cloud computing is possible because of a technology called virtualization.
Virtualization allows for the creation of a simulated, digital-only "virtual"
computer that behaves as if it were a physical computer with its own
hardware. The technical term for such a computer is virtual machine.
99.What is cloud?
"The cloud" refers to servers that are accessed over the Internet, and the software
and databases that run on those servers. Cloud servers are located in data
centers all over the world. By using cloud computing, users and companies do
not have to manage physical servers themselves or run software applications on
their own machines.
Formerly, SaaS, PaaS, and IaaS were the three main models of cloud computing,
and essentially all cloud services fit into one of these categories. However, in
recent years a fourth model has emerged:
2) Location Independent
Public cloud is location independent because its services are offered through the
internet.
3) Save Time
In Public cloud, the cloud service provider is responsible for the manage and
maintain data centers in which data is stored, so the cloud user can save their
time to establish connectivity, deploying new products, release product updates,
configure, and assemble servers.
5) Business Agility
Public cloud provides an ability to elastically re-size computer resources based on
the organization's requirements.
3) Improved performance
Private cloud offers better performance with improved speed and space capacity.
Disadvantages of Private Cloud
1) High cost
The cost is higher than a public cloud because set up and maintain hardware
resources are costly.
2) Restricted area of operations
As we know, private cloud is accessible within the organization, so the area of
operations is limited.
3) Limited scalability
Private clouds are scaled only within the capacity of internal hosted resources.
4) Skilled people
Skilled people are required to manage and operate cloud services.
Security
Community cloud is more secure than the public cloud but less secure than the
private cloud.
Sharing infrastructure
Community cloud allows us to share cloud resources, infrastructure, and other
capabilities among various organizations.
2. Schedule smartly
Do whatever it takes to not mess with regular operations so that the programmers
don’t get frustrated. Scheduling resource-intensive migration tasks for off-hours
can be helpful if you think they’ll slow down customers or cause database
downtime.
QUE .What will you do if your application in cloud is down? And All AZ are
down?
QUE.Which mechanism will you use for secure connection? (VPN/Some other
options)?
The two most widely used mechanisms for transport layer encryption are
Transport Layer Security (TLS) or IPsec.IPsec, TLS, and SSH share a
common goal, that is, to provide a secure connection between two
peers/devices/endpoints.
105. Which backup type will you choose if you want to take backup per
hour?
DIFFERENCES
In DBMS, the storage of data is in the files. It is arranged either in a
hierarchical form or navigational form.
In RDBMS, the data is stored in tables. There is no hierarchy and instead,
follow a relational model. Columns are the headers and rows contain the
corresponding values.
RBMS allows users to store a large set of data.
Read Only Memory (ROM) is a type of memory where the data has been
prerecorded. Data stored in ROM is retained even after the computer is turned
off ie, non-volatile.
Types of ROM:
Programmable ROM, where the data is written after the memory chip has been
created. It is non-volatile.
Erasable Programmable ROM, where the data on this non-volatile memory chip
can be erased by exposing it to high-intensity UV light.
Electrically Erasable Programmable ROM, where the data on this non-volatile
memory chip can be electrically erased using field electron emission.
Mask ROM, in which the data is written during the manufacturing of the memory
chip.
Accessibility: Cloud-based applications and data are accessible from virtually any
internet-connected device.
Speed to market: Developing in the cloud enables users to get their applications
to market quickly.
Data security: Hardware failures do not result in data loss because of networked
backups.
Savings on equipment: Cloud computing uses remote resources, saving
organizations the cost of servers and other equipment.
Pay structure: A “utility” pay structure means users only pay for the resources
they use.
Scalability: Cloud infrastructure scales on demand to support fluctuating
workloads.
Storage options: Users can choose public, private, or hybrid storage offerings,
depending on security needs and other considerations.
Control choices: Organizations can determine their level of control with
as-a-service options. These include software as a service (SaaS), platform as a
service (PaaS), and infrastructure as a service (IaaS).
Tool selection: Users can select from a menu of prebuilt tools and features to build
a solution that fits their specific needs.
Security features: Virtual private cloud, encryption, and API keys help keep data
secure.
Process automation
Process automation manages business processes for uniformity and transparency. It
is typically handled by dedicated software and business apps. Using process
automation can increase productivity and efficiency within your business. It can
also deliver new insights into business challenges and suggest solutions.
Process mining and workflow automation are types of process automation.
Integration automation
Integration automation is where machines can mimic human tasks and repeat the
actions once humans define the machine rules. One example is the “digital
worker.” In recent years, people have defined digital workers as software robots
that are trained to work with humans to perform specific tasks. They have a
specific set of skills, and they can be “hired” to work on teams.
Human error
Accidents, weak passwords, password sharing, and other unwise or uninformed
user behaviors continue to be the cause of nearly half (49%) of all reported data
breaches.(Link resides outside IBM)
Malware
Malware is software written specifically to exploit vulnerabilities or otherwise
cause damage to the database. Malware may arrive via any endpoint device
connecting to the database’s network.
Attacks on backups
Organizations that fail to protect backup data with the same stringent controls used
to protect the database itself can be vulnerable to attacks on backups.
Best practices
When evaluating database security in your environment to decide on your team’s
top priorities, consider each of the following areas:
Packet-based transfer
Separation of control functions among bearer capabilities, call/session, and
application/service
Decoupling of service provision from transport, and provision of open
interfaces
Support for a wide range of services, applications and mechanisms based on
service building blocks (including real time/streaming/non-real time services
and multi-media)
Pipelines automate testing and reporting on isolated changes in a larger code base
in real time and facilitates the integration of disparate branches of the code into
a main branch. They also rapidly detect defects in a code base, build the
software, automate testing of their builds, prepare the code base for deployment
(delivery), and ultimately deploy code to containers and virtual machines, as
well as bare metal and cloud servers. There are several commercial versions of
Jenkins. This definition only describes the upstream open source project.
The goal of the SVM algorithm is to create the best line or decision boundary that
can segregate n-dimensional space into classes so that we can easily put the new
data point in the correct category in the future. This best decision boundary is
called a hyperplane.
SVM chooses the extreme points/vectors that help in creating the hyperplane.
These extreme cases are called as support vectors, and hence algorithm is
termed as Support Vector Machine. Consider the below diagram in which there
are two different categories that are classified using a decision boundary or
hyperplane:
52.2.What VPN
53.3.Device Manager
66. Difficult situations in your life and how u over come it?
John vector ;
FILE SYSTEMS
sar command
What is subnet?
What is IAM?
what is SSL?
What is sharepoint
Why cts?
What is firewall?
What is linux?
Difference between linux and unix
Commands in linux