Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
. I strongly suggest you read it, especially the leadership principles and the STAR
format for formulating responses
There is a video of Jeff Bezos explaining the leadership principles in depth and
watching that really helped me prepare my STAR responses.
system design
--DNS
--URL LIFECYCLE
--IP AND MAC
security technology
risk assessmnet methodologies, policies and process
If you had to remove the "connected corp domain network" from your current
environment, how would you go about it?
Explain, in detail, how the process of password caching works when an Amazon
employee logs into their work computer at work, and subsequently goes home and logs
into their work account from an Amazon provisioned laptop or other trusted device.
How is pad lock icon in browser generated? How does DNS works? Explain symmetric
and asymmetric encryption? Applications of symmetric and asymmetric encryption?
Name some cryptographic algorithms? What is SQL Injection? What is CSRF? What is
Private Forward Secrecy? How would you detect malicious activity in Amazon ELB? How
Amazon Guard Duty works? What is ciphersuite? Explain working of TLS? How is
ciphersuite exchanged in TLS?
Windows
*Define DHCP and how it works.
Networking
*Define the OSI model and TCP/IP model; how many are in each?
*Define ping and the protocol used for ping.
*Define TCP and UDP; how they are different?
Easy stuff like what is Spanning Tree, what is a host file, what does DNS do, etc
Gave me a text file and asked me to process data from the file in some scripting
language
How would you write a function to check if a number is prime? What kind of tests
would you write for this function? Write a regular expression for a phone number.
(XXX-XXX-XXXX format)
What command would you use to find how much disk space a file is taking up?
Suppose you are managing a web site. The site's traffic is load-balanced between 10
machines. There is an attacker that is constantly visiting your site and scraping
sensitive data. How do you find the attacker?
How would you get just the second field of a .csv file?
How would you build out a system for a network-based log aggregator that takes
input from thousands of systems simultaneously? What would be your requirements?
What are the security vectors that could be exploited? How would you protect the
availability and integrity of the data? What would you use to secure the data? How
would you prevent forged data from being processed?
3P developer
· Knowledge of security technology, risk assessment methodologies, policies, and
processes
System Design
LP/LC - Amazon Leadership Principle
questions about SQL Injection and XSS (all of which I successfully answered), so
this item was only partially covered.