Wednesday, 30 November 2016

// // Leave a Comment

How you will change the font size/style in SQL Server?

Ans:- By following below steps

Read More
// // Leave a Comment

Write a query to get all employee detail from "EmployeeDetail" table?


1. Write a query to get all employee detail from "EmployeeDetail" table 
SELECT * FROM [EmployeeDetail]

Read More

Wednesday, 23 November 2016

// // Leave a Comment

What are the Goals of CRM Security Model?

Microsoft Dynamics 365 and Microsoft Dynamics 365 (online) provide a security model that protects data integrity and privacy, and supports efficient data access and collaboration. The goals of the model are as follows:

  • Provide users with the access only to the appropriate levels of information that is required to do their jobs.
  • Categorize users by role and restrict access based on those roles.
  • Support data sharing so that users and teams can be granted access to records that they do not own for a specified collaborative effort.
  • Prevent a user's access to records the user does not own or share.
Read More
// // Leave a Comment

Difference between Role based Record based and Field Level Security in Dynamics CRM

  • Role-based security: Role-based security in Microsoft Dynamics 365 focuses on grouping a set of privileges together that describe the responsibilities (or tasks that can be performed) for a user. Microsoft Dynamics 365 includes a set of predefined security roles. Each aggregates a set of user rights to make user security management easier. Also, each application deployment can define its own roles to meet the needs of different users.
  • Record-based security: Record-based security in Microsoft Dynamics 365 focuses on access rights to specific records.
  • Field-level security: Field-level security in Microsoft Dynamics 365 restricts access to specific high business impact fields in an entity only to specified users or teams.

Combine role-based security, record-level security, and field-level security to define the overall security rights that users have within your custom Microsoft Dynamics 365 application.

Read More
// // Leave a Comment

Field Level Security in Microsoft Dynamics CRM

In Microsoft Dynamics 365 and Microsoft Dynamics 365 (online), you use field-level security to restrict access to high business impact fields to specific users and teams. For example, you use this to enable only certain users to read or update the credit score for a customer. For this release, field-level security can be applied to both custom fields and many out-of-box fields.

The following steps describe how to restrict access to a field:

  1. Enable field-level security for an attribute
  2. Create a field-level security profile
  3. Associate users or teams with the profile
  4. Add specific field permissions, such as Create, Update or Read for a specific attribute to the profile
Read More
// // Leave a Comment

What is MS CRM? MS Dynamics CRM Interview Question

CRM stands for customer relationship management. CRM is a category of integrated, data-driven solutions that improve how you interact and do business with your customers. CRM systems and applications are designed to manage and maintain customer relationships, track engagements and                               sales, and deliver actionable data all in one place.
Read More

Monday, 21 November 2016

// // Leave a Comment

TRUNCATE is DDL or DML command in SQL Server?

Ans: DDL
Read More

Thursday, 17 November 2016

// // Leave a Comment

Difference between Session and Connection in SQL Server?

  • Sessions – when the client application connects to SQL Server the two sides establish a “session” on which to exchange information. Strictly speaking a session is not the same as the underlying physical connection, it is a SQL Server logical representation of a connection. But for practical purposes, you can think of this as being a connection (session =~ connection). See sys.dm_exec_sessions. This is the old SPID that existed in SQL Server 2000 and earlier. You may sometimes notice a single session repeating multiple times in a DMV output. This happens because of parallel queries. A parallel query uses the same session to communicate with the client, but on the SQL Server side multiple worker (threads) are assigned to service this request. So if you see multiple rows with the same session ID, know that the query request is being serviced by multiple threads.

  • Connections – this is the actual physical connection established at the lower protocol level with all of its characteristics sys.dm_exec_connections . There is a 1:1 mapping between a Session and a Connection.
Read More
// // Leave a Comment

What is a Data Page in SQL Server?

A page is the most basic unit of storage in SQL Server. The disk space allocated to a data file (.mdf or .ndf) in a database is logically divided into pages numbered contiguously from 0 to n. Disk I/O operations are performed at the page level. That is, SQL Server reads or writes whole data pages.

Read More
// // Leave a Comment

What is Fill Factor in SQL Server? SQL Server Interview Question

In SQL Server a page(8KB size) is the basic unit of data storage in SQL server. Data is stored in the leaf-level pages of Index.  The percentage of space to be filled with data in a leaf level page is decided by fill factor. The remaining space left is used for future growth of data in the page.
Fill factor is a number from 1 to 100. Its default value is 0, which is same as 100. So when we say fill factor is 80 means, 80% of space is filled with data and remaining 20% is vacant for future use. So higher the fill factor, more data is stored in the page. Fill factor setting is applied when we create/rebuild index.
To check it right click on your server instance and click property the below window will appear.

Referance: codeproject

Read More
// // Leave a Comment

What is the difference between TRY_CONVERT and Convert? 2016 SQL Server Interview Question

Convert: enables you to convert data stored in one data type to another. The conversion might fail if you attempt to convert between data types where conversion is not possible.
TRY_CONVERT: is the same but if conversion fails, a NULL value is written.
Read More

Tuesday, 15 November 2016

// // Leave a Comment

What is the maximum length of a file-name in S3?

Names are the object keys. The name for a key is a sequence of Unicode characters whose UTF-8 encoding is at most 1024 bytes long.
Read More
// // Leave a Comment

How to access/ping a server located on AWS?

Using UI:
In your security group:

    • Click the inbound tab
    • Create a custom ICMP rule
    • Select echo request
    • Use range for everyone or lock it down to specific IPs
    • Apply the changes
    • and you'll be able to ping.
Using cmd: To do this on the command line you can run:
    • ec2-authorize <group> -P icmp -t -1:-1 -s
Read More
// // Leave a Comment

How to delete files recursively from an S3 bucket?

aws s3 rm --recursive s3://your_bucket_name/foo/

Or delete everything under the bucket:
aws s3 rm --recursive s3://your_bucket_name

If what you want is to actually delete the bucket, there is one-step shortcut:
aws s3 rb --force s3://your_bucket_name
Read More
// // Leave a Comment

How many objects you can put in a S3 bucket? is there a limit to the number of objects I can put in an S3 bucket?

Write, read, and delete objects containing from 1 byte to 5 terabytes of data each. The number of objects you can store is unlimited.
Read More
// // Leave a Comment

What is the difference between Amazon SNS and Amazon SQS?

  • Amazon SNS allows applications to send time-critical messages to multiple subscribers through a “push” mechanism, eliminating the need to periodically check or “poll” for updates.
  • Amazon SQS is a message queue service used by distributed applications to exchange messages through a polling model, and can be used to decouple sending and receiving components—without requiring each component to be concurrently available.
Read More
// // Leave a Comment

How you will change the root EBS device of my amazon EC2 instance?

  • Stop the instance.
  • Detach the root EBS volume.
  • Attach the alternate EBS volume (as the root e.g. /dev/sda1)
  • Start the instance.
  • This presupposes that your alternate EBS volume is bootable, of course - it has to contain the bootable OS image.
Read More
// // Leave a Comment

Write down the command you will use to copy all files from one S3 bucket to another with s3cmd?

s3cmd sync s3://from/this/bucket/ s3://to/this/bucket/
Read More
// // Leave a Comment

Explain what happens when I reboot an EC2 instance?

Rebooting an instance is like rebooting a PC. The hard disk isn't affected. You don't return to the image's original state, but the contents of the hard disks are those before the reboot.
Rebooting isn't associated with billing. Billing starts when you instantiate an image and stops when you terminate it. Rebooting in between hasn't any effect.
Read More
// // Leave a Comment

How do you see how much disk space is using by S3 bucket?

s3cmd can show you this by running s3cmd du, optionally passing the bucket name as an argument.
Read More
// // Leave a Comment

How step you follow to make 10,000 files as public in S3?

I will generate a bucket policy which gives access to all the files in the bucket. The bucket policy can be added to a bucket through AWS console.
    "Id": "...",
    "Statement": [ {
        "Sid": "...",
        "Action": [
        "Effect": "Allow",
        "Resource": "arn:aws:s3:::bucket/*",
        "Principal": {
            "AWS": [ "*" ]
    } ]

Read More
// // Leave a Comment

Is it possible to use AWS as a web host? What are the way of using AWS as a web host?

Yes it is completely possible to host websites on AWS in 2 ways:
  1.  Easy - S3 (Simple Storage Solution) is a bucket storage solution that lets you serve static content e.g. images but has recently been upgraded so you can use it to host flat .html files and your site will get served by a default Apache installation with very little configuration on your part (but also little control).
  2. Trickier - You can use EC2 (Elastic Compute Cloud) and create a virtual Linux instance then install Apache/NGinx (or whatever) on that to give you complete control over serving whatever/however you want. You use Security Groups to enable/disable ports for individual machines or groups of them.
Read More
// // Leave a Comment

How do you pass custom environment variable on Amazon Elastic Beanstalk (AWS EBS)?

As a heads up to anyone who uses the .ebextensions/*.config way: nowadays you can add, edit and remove environment variables in the Elastic Beanstalk web interface.

The variables are under Configuration → Software Configuration:

Read More
// // Leave a Comment

How you will find out the instance id from within an ec2 machine?

wget -q -O - http://instance-data/latest/meta-data/instance-id

If you need programatic access to the instance ID from within a script
die() { status=$1; shift; echo "FATAL: $*"; exit $status; }
EC2_INSTANCE_ID="`wget -q -O - http://instance-data/latest/meta-data/instance-id || die \"wget instance-id has failed: $?\"`"
Read More
// // Leave a Comment

What are the benefits of EBS vs. instance-store?

  • EBS backed instances can be set so that they cannot be (accidentally) terminated through the API.
  • EBS backed instances can be stopped when you're not using them and resumed when you need them again (like pausing a Virtual PC), at least with my usage patterns saving much more money than I spend on a few dozen GB of EBS storage.
  • EBS backed instances don't lose their instance storage when they crash (not a requirement for all users, but makes recovery much faster)
  • You can dynamically resize EBS instance storage.
  • You can transfer the EBS instance storage to a brand new instance (useful if the hardware at Amazon you were running on gets flaky or dies, which does happen from time to time)
  • It is faster to launch an EBS backed instance because the image does not have to be fetched from S3.
Read More
// // Leave a Comment

Which AWS responsible for managed email and calendaring?

WorkMail is a managed email and calendaring service with strong security controls and support for existing desktop and mobile email clients. You can access their email, contacts, and calendars wherever you use Microsoft Outlook, your browser, or your iOS and Android mobile devices. You can integrate Amazon WorkMail with your existing corporate directory and control both the keys that encrypt your data and the location where your data is stored.
Read More
// // Leave a Comment

What is Amazon AppStream and advantage of using AppStreaming?

Amazon AppStream is an application streaming service that lets you stream your existing resource-intensive applications from the cloud without code modifications.

Advantages of Streaming Your Application
Interactively streaming your application from the cloud provides several benefits:
  • Remove Device Constraints – You can leverage the compute power of AWS to deliver experiences that wouldn't normally be possible due to the GPU, CPU, memory or physical storage constraints of local devices.
  • Support Multiple Platforms – You can write your application once and stream it to multiple device platforms. To support a new device, just write a small client to connect to your streaming application.
  • Fast and Easy Updates – Because your streaming application is centrally managed by Amazon AppStream, updating your application is as simple as providing a new version of your streaming application to Amazon AppStream. You can immediately upgrade all of your customers without any action on their part.
  • Instant On – Streaming your application with Amazon AppStream lets your customers start using your application or game immediately, without the delays associated with large file downloads and time-consuming installations.
  • Improve Security – Unlike traditional boxed software and digital downloads, where your application is available for theft or reverse engineering, Amazon AppStream stores your streaming application binary securely in AWS datacenters.
  • Automatic Scaling – You can use Amazon AppStream to specify capacity needs, and then the service automatically scales your streamed application and connects customers’ devices to it.
Read More
// // 1 comment

How to find your regions and Availability Zones using the Amazon EC2 CLI?

Use the ec2-describe-regions command as follows to describe your regions.
PROMPT> ec2-describe-regions
REGION us-east-1
REGION  ap-northeast-1
REGION  ap-southeast-1
Read More
// // Leave a Comment

Explain what is Regions and Endpoints in AWS?

To reduce data latency in your applications, most Amazon Web Services products allow you to select a regional endpoint to make your requests. An endpoint is a URL that is the entry point for a web service. For example, is an entry point for the Amazon DynamoDB service.
Some services, such as IAM, do not support regions; their endpoints therefore do not include a region. A few services, such as Amazon EC2, let you specify an endpoint that does not include a specific region, for example, In that case, AWS routes the endpoint to us-east-1.
Read More
// // Leave a Comment

What Is Amazon CloudSearch and its features?

Amazon CloudSearch is a fully managed service in the cloud that makes it easy to set up, manage, and scale a search solution for your website or application.
You can use Amazon CloudSearch to index and search both structured data and plain text. Amazon CloudSearch features:
  • Full text search with language-specific text processing
  • Boolean search
  • Prefix searches
  • Range searches
  • Term boosting
  • Faceting
  • Highlighting
  • Autocomplete Suggestions
Read More
// // Leave a Comment

What is Amazon Kinesis Firehose?

Amazon Kinesis Firehose is a fully managed service for delivering real-time streaming data to destinations such as Amazon Simple Storage Service (Amazon S3) and Amazon Redshift.
Read More
// // Leave a Comment

What is AWS Data Pipeline? and what are the components of AWS Data Pipeline?

AWS Data Pipeline is a web service that you can use to automate the movement and transformation of data. With AWS Data Pipeline, you can define data-driven workflows, so that tasks can be dependent on the successful completion of previous tasks.

The following components of AWS Data Pipeline work together to manage your data:

  • A pipeline definition specifies the business logic of your data management. For more information, see Pipeline Definition File Syntax.
  • A pipeline schedules and runs tasks. You upload your pipeline definition to the pipeline, and then activate the pipeline. You can edit the pipeline definition for a running pipeline and activate the pipeline again for it to take effect. You can deactivate the pipeline, modify a data source, and then activate the pipeline again. When you are finished with your pipeline, you can delete it.
  • Task Runner polls for tasks and then performs those tasks. For example, Task Runner could copy log files to Amazon S3 and launch Amazon EMR clusters. Task Runner is installed and runs automatically on resources created by your pipeline definitions. You can write a custom task runner application, or you can use the Task Runner application that is provided by AWS Data Pipeline. For more information, see Task Runners.
Read More
// // Leave a Comment

What is Amazon EMR?

Amazon Elastic MapReduce (Amazon EMR) is a managed cluster platform that simplifies running big data frameworks, such as Apache Hadoop and Apache Spark, on AWS to process and analyze vast amounts of data. By using these frameworks and related open-source projects, such as Apache Hive and Apache Pig, you can process data for analytics purposes and business intelligence workloads. Additionally, you can use Amazon EMR to transform and move large amounts of data into and out of other AWS data stores and databases, such as Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB.
Read More
// // Leave a Comment

What is AWS WAF? What are the potential benefits of using WAF?

AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to Amazon CloudFront and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked.
Benefits of using WAF:
  • Additional protection against web attacks using conditions that you specify. You can define conditions by using characteristics of web requests such as the IP address that the requests originate from, the values in headers, strings that appear in the requests, and the presence of malicious SQL code in the request, which is known as SQL injection.
  • Rules that you can reuse for multiple web applications
  • Real-time metrics and sampled web requests
  • Automated administration using the AWS WAF API
Read More
// // Leave a Comment

What is the AWS Key Management Service?

The AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data.
Read More
// // Leave a Comment

Explain what is ElastiCache?

ElastiCache is a web service that makes it easy to set up, manage, and scale distributed in-memory cache environments in the cloud.
Read More
// // 1 comment

Explain what is DynamoDB in AWS?

Amazon DynamoDB is a fully managed NoSQL database service that provides fast and predictable performance with seamless scalability. You can use Amazon DynamoDB to create a database table that can store and retrieve any amount of data, and serve any level of request traffic. Amazon DynamoDB automatically spreads the data and traffic for the table over a sufficient number of servers to handle the request capacity specified by the customer and the amount of data stored, while maintaining consistent and fast performance.
Read More
// // Leave a Comment

Explain how the buffer is used in Amazon web services?

The buffer is used to make the system more robust to manage traffic or load by synchronizing different component.  Usually, components receive and process the requests in an unbalanced way, With the help of buffer, the components will be balanced and will work at the same speed to provide faster services.
Read More
// // Leave a Comment

Explain what is C4 instances?

C4 instances are ideal for compute-bound applications that benefit from high performance processors.
Read More
// // Leave a Comment

Explain what is T2 instances?

T2 instances are designed to provide moderate baseline performance and the capability to burst to significantly higher performance as required by your workload.
Read More
// // Leave a Comment

How many buckets can you create in AWS by default?

By default, you can create upto 100 buckets in each of your AWS accounts.
Read More
// // Leave a Comment

Mention what are the differences between Amazon S3 and EC2 ?

S3: Amazon S3 is just a storage service, typically used to store large binary files. Amazon also has other storage and database services, like RDS for relational databases and DynamoDB for NoSQL.

EC2: An EC2 instance is like a remote computer running Windows or Linux and on which you can install whatever software you want, including a Web server running PHP code and a database server.
Read More
// // Leave a Comment

Explain some features of Amazon EC2?

Amazon EC2 provides the following features:
  • Virtual computing environments, known as instances
  • Preconfigured templates for your instances, known as Amazon Machine Images (AMIs), that package the bits you need for your server (including the operating system and additional software)
  • Various configurations of CPU, memory, storage, and networking capacity for your instances, known as instance types
  • Secure login information for your instances using key pairs (AWS stores the public key, and you store the private key in a secure place)
  • Storage volumes for temporary data that's deleted when you stop or terminate your instance, known as instance store volumes
  • Persistent storage volumes for your data using Amazon Elastic Block Store (Amazon EBS), known as Amazon EBS volumes
  • Multiple physical locations for your resources, such as instances and Amazon EBS volumes, known as regions and Availability Zones
  • A firewall that enables you to specify the protocols, ports, and source IP ranges that can reach your instances using security groups
  • Static IP addresses for dynamic cloud computing, known as Elastic IP addresses
Read More
// // Leave a Comment

Explain what Is Amazon EC2 instance?

An EC2 instance is a virtual server in Amazon's Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure.
Read More
// // Leave a Comment

What Is Amazon EC2?

Amazon Elastic Compute Cloud (Amazon EC2) provides scalable computing capacity in the Amazon Web Services (AWS) cloud. Using Amazon EC2 eliminates your need to invest in hardware up front, so you can develop and deploy applications faster. You can use Amazon EC2 to launch as many or as few virtual servers as you need, configure security and networking, and manage storage. Amazon EC2 enables you to scale up or down to handle changes in requirements or spikes in popularity, reducing your need to forecast traffic.
Read More

Explain what is Redshift?

Redshift is a fast, fully managed, petabyte-scale data warehouse service that makes it simple and cost-effective to efficiently analyze all your data using your existing business intelligence tools.
Read More
// // 1 comment

Mention what is the relation between an instance and AMI?

From a single AMI, you can launch multiple types of instances.  An instance type defines the hardware of the host computer used for your instance. Each instance type provides different compute and memory capabilities.  Once you launch an instance, it looks like a traditional host, and we can interact with it as we would with any computer.
Read More
// // Leave a Comment

Explain what is AMI ( Amazon Machine Image )?

It’s a template that provides the information (an operating system, an application server and applications) required to launch an instance, which is a copy of the AMI running as a virtual server in the cloud.  You can launch instances from as many different AMIs as you need.
Read More
// // Leave a Comment

Explain what is S3 in AWS?

S3 stands for Simple Storage Service. You can use S3 interface to store and retrieve any amount of data, at any time and from anywhere on the web.  Also we can host a website in Amazon S3. most of the companies storing the documents, images and other files to S3. For S3, the payment model is “pay as you go”.
Read More
// // Leave a Comment

What is AWS Certificate Manager?

AWS Certificate Manager (ACM) handles the complexity of provisioning, deploying, and managing certificates provided by ACM (ACM Certificates) for your AWS-based websites and applications. You use ACM to request and manage the certificate and then use other AWS services to provision the ACM Certificate for your website or application. As shown by the following illustration, ACM Certificates are currently available for use with only Elastic Load Balancing and Amazon CloudFront. You cannot use ACM Certificates outside of AWS.
Read More
// // Leave a Comment

Explain what is IAM service?

AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources for your users. You use IAM to control who can use your AWS resources (authentication) and what resources they can use and in what ways (authorization). AWS INTERVIEW QUESTIONS 2016
Read More
// // Leave a Comment

Explain what are the key components of AWS( Amazon Web Service )?

The key components of AWS are :- (AWS 2016 INTERVIEW QUESTIONS)
  • Route 53: A DNS web service
  • Simple E-mail Service: It allows sending e-mail using RESTFUL API call or via regular SMTP
  • Identity and Access Management: It provides enhanced security and identity management for your AWS account
  • Simple Storage Device or (S3): It is a storage device and the most widely used AWS service
  • Elastic Compute Cloud (EC2): It provides on-demand computing resources for hosting applications. It is very useful in case of unpredictable workloads
  • Elastic Block Store (EBS): It provides persistent storage volumes that attach to EC2 to allow you to persist data past the lifespan of a single EC2
  • CloudWatch: To monitor AWS resources, It allows administrators to view and collect key Also, one can set a notification alarm in case of trouble.
Read More
// // Leave a Comment

Explain what is AWS(Amazon Web Service)?

AWS stands for Amazon Web Service; it is a collection of remote computing services also known as cloud computing platform.  This new realm of cloud computing is also known as IaaS or Infrastructure as a Service.
Read More

Friday, 4 November 2016

// // Leave a Comment


Read More

Thursday, 3 November 2016

// // Leave a Comment

What is the underlying Hypervisor for EC2? AWS INTERVIEW QUESTION

What is the underlying Hypervisor for EC2?
Ans: Xen
Read More
// // Leave a Comment

What are the 4 level of AWS premium support?

What are the 4 level of AWS premium support?
Ans: Basic, Developer, Business, Enterprise
Read More
// // Leave a Comment

In S3, what does RRS stand for? AWS INTERVIEW QUESTION

In S3, what does RRS stand for?
Ans: Reduced Redundancy Storage
Read More

TCS AWS Interview Question Answers

If you want to run a database on an EC2 instance, which is the most recommended Amazon storage option, S3, RDS or EBS?
Ans: EBS
Click here for next Questions Answers
Read More
// // Leave a Comment

In RDS, Automated backups are enabled by default for new DB Instance, true or false?

Ans: True
Read More
// // Leave a Comment

In RDS, what is the maximum value you can set for my backup retention period? AWS INTERVIEW QUESTION

Ans: 35 Days

Note : This questions asked during Aon Hewitt Interview
Read More
// // Leave a Comment


RDS stand for Relational Database Service is a web service that makes it easier to set up, operate, and scale a relational database in the cloud. It provides cost-efficient, resize-able capacity for an industry-standard relational database and manages common database administration tasks.

Note : This questions asked during TCS Interview
Read More
// // Leave a Comment

What is the difference between Elastic Beanstalk and CloudFormation? AWS Interview Question

Elastic Beanstalk automatically handles the deployment, from capacity provisioning, load balancing, auto-scaling to application health monitoring based on the code you upload to it.
CloudFormation is an automated provisioning engine to deploy entire cloud environments via JSON.

Read More
// // Leave a Comment

What action is required to establish an Amazon Virtual Private Cloud (VPC) VPN?

We need to assign a static internet-routable IP address to an Amazon VPC customer gateway.

Note : This questions asked during Prospecta Soft Pvt. Interview

Read More

Wednesday, 2 November 2016

// // Leave a Comment

Samsung AWS Interview Question

Suppose that you are working with a customer who has 10 TB of archival data that they want to migrate to Glacier. The customer has a 1-Mbps connection to the internet. Which service or feature provides the fastest method of getting data into Amazon Glacier?
Ans: AWS Import/Export

Note : This questions asked during Samsung Interview
Read More
// // Leave a Comment

What is MFA in AWS? AWS Interview questions

AWS Multi-Factor Authentication (MFA) is a simple best practice that adds an extra layer of protection on top of your user name and password. With MFA enabled, when a user signs in to an AWS website, they will be prompted for their user name and password (the first factor—what they know), as well as for an authentication code from their AWS MFA device (the second factor—what they have). Taken together, these multiple factors provide increased security for your AWS account settings and resources.

Note : This questions asked during Aon Hewitt Interview
Read More
// // Leave a Comment

What is Amazon VPC?

Amazon Virtual Private Cloud (Amazon VPC) enables you to launch Amazon Web Services (AWS) resources into a virtual network that you've defined. This virtual network closely resembles a traditional network that you'd operate in your own data center, with the benefits of using the scalable infrastructure of AWS.

Read More
// // Leave a Comment

Example, how you will create a VPC and Subnets using the AWS CLI? NASA

Click here for answer
Note : This questions asked during NASA Interview
Read More
// // Leave a Comment


Normally, each EC2 instance you launch is randomly assigned a public IP address in the amazon EC2 address space. VPC allows you to create an isolated portion of the AWS cloud and launch EC2 instances that have private address in the range of your choice (, for instance)

Note : Questions asked during Adobe Systems Interview
Read More
// // Leave a Comment

Can you descrive the steps of create default VPC in AWS? AWS Interview Question

When we create a default VPC, we do the following to set it up for you: (

  1. Create a default subnet in each Availability Zone.
  2. Create an Internet gateway and connect it to your default VPC.
  3. Create a main route table for your default VPC with a rule that sends all traffic destined for the Internet to the Internet gateway.
  4. Create a default security group and associate it with your default VPC.
  5. Create a default network access control list (ACL) and associate it with your default VPC.
  6. Associate the default DHCP options set for your AWS account with your default VPC.
  7. The following figure illustrates the key components that we set up for a default VPC.
Note : Question asked in TCS
Read More
// // Leave a Comment

What are the three features provided by Amazon that you can use to increase and monitor the security? AWS Interview

Amazon VPC provides three features that you can use to increase and monitor the security for your VPC:

  • Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level
  • Network access control lists (ACLs) — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level
  • Flow logs — Capture information about the IP traffic going to and from network interfaces in your VPC
Read More
// // Leave a Comment

What benefits to VPC security groups give you that EC2 security groups do not?

What benefits to VPC security groups give you that EC2 security groups do not? (AWS Interview Questions Answers)
Ans: 1. Being able to change the security group after the instance is launched
2. Being able to specify any protocol with a standard number, rather than just TCP, UDP, or ICMP
Read More
// // Leave a Comment

What is the difference between Network ACLs and Security Groups in AWS? AWS Interivew Question

What is the difference between Network ACLs and Security Groups in AWS? Amazon Web Services Interview Question

  • Network ACLs: A network access control list (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. You might set up network ACLs with rules similar to your security groups in order to add an additional layer of security to your VPC. For more information about the differences between security groups and network ACLs, see Comparison of Security Groups and Network ACLs.
  • Security Groups: A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign the instance to up to five security groups. Security groups act at the instance level, not the subnet level. Therefore, each instance in a subnet in your VPC could be assigned to a different set of security groups. If you don't specify a particular group at launch time, the instance is automatically assigned to the default security group for the VPC.
The following table summarizes the basic differences between network ACLs and security groups.
Network ACLSecurity Group
Operates at the subnet level (second layer of defense) Operates at the instance level (first layer of defense)
Supports allow rules and deny rules Supports allow rules only
Is stateless: Return traffic must be explicitly allowed by rules Is stateful: Return traffic is automatically allowed, regardless of any rules
We process rules in number order when deciding whether to allow traffic We evaluate all rules before deciding whether to allow traffic
Automatically applies to all instances in the subnets it's associated with (backup layer of defense, so you don't have to rely on someone specifying the security group) Applies to an instance only if someone specifies the security group when launching the instance, or associates the security group with the instance later on

Read More

Tuesday, 1 November 2016


Top 20 Telerik Test Studio Interview Questions Answers PDF

Here are the Top 20 Telerik Test Studio Interview Question with Answers, If you looking for job change and preparing for interview then this post is for you. Must go through all questions.

Describe Automated Testing?
Automated Testing/(test automation) is the use of special software(Testing tools) to control the execution of tests and the comparison of actual outcomes with predicted outcomes. Test automation can automate some repetitive but necessary tasks in a formalized testing process already in place, or perform additional testing that would be difficult to do manually. Test automation is critical for continuous delivery and continuous testing.

Describe Telerik Test Studio?
Telerik Test Studio is a Windows-based software testing tool for web and desktop functional testing, software performance testing, load testing and mobile application testing developed by Telerik.

What is Functional testing?
Functional testing is a quality assurance (QA) process and a type of black-box testing that bases its test cases on the specifications of the software component under test. Functions are tested by feeding them input and examining the output, and internal program structure is rarely considered (unlike white-box testing). Functional testing usually describes what the system does.

What do you understand by coded step in Telerik Test Studio?
Test Studio supports coded steps. This allows you to write code and have it executed as a test step. Use a coded step for a scenario that requires more complexity than what can be composed with the Verification Builder or by actions from the Elements Menu.

How create code behind file in Telerik Test Studio?
There are two methods of creating a code behind file for your test.
1.  Add a coded step from the Step Builder.
2.  Right click on a step and select Edit in Code from the Test Step Context Menu.

Tell me the steps of add an Assembly Reference (Standalone version)?
1. Open or create a test project in the Standalone version. Click the Project tab the Show button in the Settings ribbon.
2. The Project Settings menu loads.
3. Click Script.
4. This lists the Project References.
5. Click Add Reference to browse for an assembly in DLL form.
6. Locate the assembly and click Open. The new DLL should appear in your Project References list. execute your test. Test Studio will build the coded step(s) and alert you to any compilation errors.

Can you do  automate testing of a PDF file using Test Studio?
Unfortunately Test Studio is unable to connect to and parse browser windows that open a PDF file. PDF files do not contain a Document Object Model, they do not contain HTML. Test Studio can only connect to HTML, Silverlight and WPF type of windows.

How you will run your tests in different browser versions?
To run your tests in multiple versions of the same browser requires you to setup multiple machines. Test Studio can only use the version of the browser that is currently installed on one machine. If you want to do something like run your tests in IE 8 & IE 9 & IE 10 requires you to setup 3 different machines (which can be VM's) each with a different version of IE installed on it.

How you can create a performance test with N concurrent users?
A Test Studio Performance test will only do one user at a time. It is not possible create this type of test with more than one user. To stress your web server with multiple users you must create and execute a Test Studio Load test.

What are the .Net Framework based languages supported by Telerik Test Studio?
Test Studio supports coding in C# and VB.NET. By using them one can easily leverage the capabilities of the .NET framework and Telerik Testing Framework which is in the base of Test Studio.

Can we detect JavaScript errors using Test Studio?
Test Studio cannot interact with the browser console and it cannot detect and report on JavaScript errors. Test Studio can only detect JavaScript popups.

What are the advantage and disadvantage of using Test Studio?

What's the diff between Exact and same compare types?
The difference between Exact and Same is that Exact is case sensitive and Same is not.

How you will select checkboxes randomly if you have checkbox ID?
You can search for an HTML input checkbox and cast it properly like this:
HtmlInputCheckBox chkBox = ActiveBrowser.Find.ById<HtmlInputCheckBox>("my random id here");

What is in Telerik Test Studio? is an open source unit testing tool for the .NET framework, written by the original author of NUnit. Telerik Testing Framework comes with built-in support for 1.8 and higher. 

What is the latest version of Telerik Test Studio?
Test Studio R3 2016

What are the new features of Test Studio R3 2016?

What are the Key Steps to Prepare and Execute the Testing of a Project? 

Name all options available under Record dropdown in Test Studio?

Read More
// // Leave a Comment

What are the Key Steps to Prepare and Execute the Testing of a Project? Testing Interview Question

Below are the Key Steps to Prepare and Execute the Testing of a Project

  1. Get to know the domain expert and user community. Fundamentally understand the business goals of the application.
  2. Break down user stories into prioritized testing needs and track those needs until completion. Use automated systems to capture user stories, distill requirements and trace requirements through to implementation, and back to user stories.
  3. Translate testing needs into test cases as early as possible. Work with users and business analysts to ensure the test cases reflect real business needs. Work with developers to devise technology-facing tests, such as integration and unit tests. Use automation tools such as Telerik’s TeamPulse and Telerik Test Studio suite to enhance communication between developers, testers and users.
  4. Automate test cases and test execution using automated testing tool so tests can be rerun automatically, ideally as part of the build process.
  5. Track test case execution to ensure the fitness of the application. Be ready to report on test execution at any time, so decisions can be made on the deployment side.
  6. Trace requirements and user stories from inception to delivery to ensure business needs have been adequately addressed.

Read More
// // Leave a Comment

Telerik Test Studio R3 2016 new features? Interview Question

The third major Test Studio R3 2016 is live now. Here are the new features of R3 2016 include support for Angular, iOS 10, our very own NativeScript as well as Android hybrid apps.
Below are the major features Telerik Test Studio R3 come with.

  • Support for Angular:
    If you are using the Angular framework (Angular 1.x as well as Angular 2) to build web apps now you can leverage Test Studio to easily test your applications.
  • Support for hybrid mobile apps:
    Now you can connect your Android hybrid apps to Test Studio and record/execute actions and verifications against them. All the features that we have for native app testing will be available for hybrid as well - elements, DOM explorer, test lists, results, etc.
  • API Testing Adds Support for Fiddler:
    As promised with the initial launch of API Testing back in June, Beta 2 adds support for Fiddler. Test Studio Ultimate and API Testing users can export Fiddler recorded traffic into a .saz file and easily upload it to Test Studio. You can now create a Test Studio API test from these Fiddler traffic logs or plug them into an existing API test.
  • Support for NativeScript:
    Test Studio Mobile users can now easily instrument their NativeScript apps to make them testable with Test Studio. Leverage a specifically built for the purpose plugin to extend your app with a few quick commands. See more on NativeScript support.
  • Recorder Gets a Better Startup Page:
    We are replacing the recorder startup page with launch & navigate dialog inside Test Studio. This will enable users to take advantage of a couple of new features: auto-complete and history of previous recording sessions.
  • Enhanced Mobile Recording:
    The Test Studio DOM explorer now reveals the app element attributes during mobile web test recording.

Read More