December 23, 2019

Top 20 BlockChain interview Questions & Answers


Ques: 1. What are the differences between a traditional database and Blockchain database?

Ans: The difference between a traditional database and blockchain database is as follows:

1. Storage of Records: In a traditional system the records are centralized whereas in Blockchain the records are decentralized.

2. Operations Done: In a Blockchain system, you can only perform insert operations whereas in the traditional system you can read, edit, create and update the transactions.

3. Validations of transactions: You can validate any number of transactions on the network in a Blockchain whereas in the traditional database only specific nodes are allowed to validate the transactions.


Ques: 2. What are Ethereum Smart Contracts and in which language is Ethereum written?

Ans: A Smart Contract is a set of program that gets automatically executed on meeting the certain requirements of Blockchain. Ethereum is generally written in Solidity programming language.


Ques: 3. What are the types of record that can be kept in Blockchain?

Ans: In Blockchain, you can keep any number of records. Few of the records that can be kept in the blockchain ledger are:

1. Medical Transactions and history

2. The identity of numerous persons

3. Several numbers of events that take place in an organization and organizational records

4. Management records of companies that can be accessed from anywhere in the world with proper secure transactions

5. Documents that are to be kept at high-level security


Ques: 4. What are the benefits of Blockchain in business?

Ans: European Banks have already launched their projects to use this technology. The international payments system VISA has also joined them. Blockchain gives several advantages to the financial sector some of which are listed below:
  • Money Transfer will become faster and cheaper payments are possible and significantly reduce their costs. 
  • With the help of the Smart Contracts are computer programs which facilitate to verify and negotiation of the agreement. 
  • In stock exchange Blockchain can remove brokers as intermediaries and decentralize the stock exchange system.

Ques: 5. What are the basic components of the Blockchain Ecosystem?

Ans: There are four basic components of Blockchain ecosystem as explained here:
  • Shared Ledger:  It is a distributed data structure shared among peers managed inside Node application. 
  • Node Application: Each of the nodes is installed and run on a computer to become a part of the blockchain network. 
  • Virtual Machine: Here the implementation of instruction takes place and every participant runs that VM. 
  • Consensus Algorithm: It is implemented as a part of node application which provides the rules for validation of transactions.

Ques: 6. How many cryptographic algorithms are used in Blockchain?

Ans: Here are some of the widely used cryptographic algorithms:
  • Triple DES: DES stands for digital encryption system which uses 3 different keys of 56 bits. 
  • RSA: It is used in several areas in the digital certificate which is a public key encryption algorithm to encrypt the information transferred on the internet. 
  • Blowfish: It is highly effective and works with great speed which encrypts the cipher messages individually. 
  • Twofish: It is similar to blowfish with keys of length 256 bits. 
  • AES: Of all algorithms, AES is the strongest encryption algorithm to breach out as it uses 192 and 256 length bit keys for heavy encryption.

Ques: 7. Can you explain pragma and provide its syntax?

Ans: Pragma is a version of Solidity that will be used by the code that is written in the solidity. For using solidity as a compiler and writing smart contracts the version should be higher than 0.4.0. Every Smart contract starts with pragma only.

Syntax: version pragma ^0.4.00.


Ques: 8. What do you mean by Merkle trees and explain its importance in Blockchain?

Ans: Also called as the hash tree, Merkle tree is the fundamental part of a Blockchain. merkle tree uses cryptographic blocks which are used to securely transact large chunks of data. Both Ethereum and Bitcoin use Merkle trees.


Ques: 9. What do you understand by 51% attack?

Ans: The blockchain is a chain of blocks that stores all transactional data in a period. Once the block enters the system it cannot be altered, and the fraudulent data would be automatically rejected by network users. However, if 51% of the miners are controlled then a group of attackers can interfere with the process of recording of new blocks. 
They can block other users transactions and reverse it also. It is also known as double spending. A network that would allow double spending could suffer a loss of confidence. Then this kind of attack is called a 51% attack.


Ques: 10. What is a block in blockchain technology?

Ans: Blocks are the storage unit of the blockchain. They are fundamental to the network, and the transactions data is stored within them. They be books with each page equivalent to a transaction. Blocks are immutable. This means if a data is recorded, it cannot be changed or deleted. Also, blocks are organized linearly in a blockchain.
A block is mined by a miner which acts to verify the transaction. This means that until a transaction is not mined, it will not be shown on the blockchain and the transaction will be deemed incomplete.


Ques: 11. What is the role of encryption in blockchain?

Ans: Encryption is an age-old technique to protect data from third parties or leak. It is the basics of data security in the modern world. Blockchain also utilizes encryption to good effect. The data before it is sent off to the receiver is encrypted. The received will only be able to unlock it as it is only meant for him. Once the receiver receives it, it is unencrypted and can be used as liked.
Blockchain also uses encryption in other ways. Also, modern blockchain solution tends to improve encryption and provide complete privacy-based experience for users.


Ques: 12. What is the difference between the standard ledger and a blockchain ledger?

Ans: The biggest difference between these two types of ledger is the decentralization that they have to offer. Blockchain ledger is decentralized which means that it offers unique capabilities such as trust, immutability, transparency, and security. Standard ledger does carry these features but is limited to certain extent.
As humans create, modify and monitor the standard ledger, there is always a chance of an error creeping in or worse a security breach. Blockchain ledger solves all the problems that standard ledger has by providing a decentralized version.


Ques: 13. What is Node Application? Explain in detail.

Ans: Node application is a computer application that a computer needs to be part of the ecosystem. Without the node application, it is not possible for a device to participate in blockchain activity.
There is different node application when it comes to the blockchain. Bitcoin, for example, uses the Bitcoin wallet application to make a computer compatible with the blockchain.
Technically, there is a service overlay network(SON) that interfaces between the blockchain and the computer. The computer needs to use the node application to read and reply in a specific manner,
Not all node application is free from restriction. Some blockchains are stick when allowing a node to join the application. It needs permission to do so.


Ques: 14. What are the different types of Consensus Algorithm? Explain each of them briefly.

Ans: There are three main types of consensus algorithm.
  1. Proof-of-Work(PoW): Proof-of-Work(PoW) is used by the most popular cryptocurrencies out there. Bitcoin, Ethereum, and Litecoin use it. It works by solving complex mathematical problems. The hash needs to be solved for the block to be mined. Once it is done, the transaction is validated, and the consensus is made.
  2. Proof-of-Stake(PoS): Proof-of-Stake(PoS) works by staking coins. The nodes need to stake a minimum amount of coins to become part of the consensus network. Once they become part, they actively take part in making decisions on the network. Unlike Proof-of-Work, PoS doesn’t require huge computational power, and hence power. 
  3. Delegated Proof-of-Stake(DPoS): Delegated Proof-of-Stake is a centralized approach to a blockchain network. In this consensus method, the stakes choose delegates which in turn validate the transactions.

Ques: 15. What is ‘blind signature’ and why is it used?

Ans: Blind Signature is a digital signature wherein all the information pertaining to a contract is made blind before it is actually agreed upon and sealed with a sign. This approach is a crucial component of cryptography and is mainly used for privacy-related protocols (for example, digital cash scheme) where the author and the signing parties are different.


Ques: 16. What are the fundamental principles in Blockchain that are used to eliminate security threats?
Ans: The fundamental principles in Blockchain that must be followed to eliminate security threats are:
  1. Auditing 
  2. Securing applications 
  3. Securing testing and similar approaches 
  4. Database security 
  5. Continuity planning 
  6. Digital workforce training

Ques: 17. What do you understand by the terms – ‘public key’ and ‘private key.’?

Ans: A public key is one which is used in cryptographic algorithms that allow all the users/peers in a Blockchain network to receive funds in their wallet. This key is essentially an alphanumeric string that is unique to a particular node or address.
A private key, on the other hand, is an alphanumeric phrase that is used in pair with a public key for encryption and decryption purposes. This key remains with a single individual who is the key generator for it. In case, anyone else gets their hand on the private key, the data within the wallet of the generator will be compromised.


Ques: 18. What do you mean by ‘off-chain’ transactions?

Ans: An off-chain transaction occurs when values are moved or placed outside the Blockchain. In this sense, it is merely a ‘transaction’ and not a ‘Blockchain transaction.’ Such transactions have no bearings on the values stored within the blocks of a Blockchain. 


Ques: 19. Explain ‘secret sharing.’

Ans: Secret Sharing is a method dedicated to protecting data integrity in Blockchain. In this method, the information or data is divided into different units and then transferred to the users on the Blockchain network. To complete the entire information, users who received the chunks of broken information must agree to share their pieces of information and combine them together.


Ques: 20. Explain a real-time blockchain use case?

Ans: Healthcare can use blockchain to their advantage. Many startups are currently working on a blockchain powered health app that lets patients store their information on the blockchain. The decentralized nature means that they don’t have to carry documents. Healthcare specialist can also take advantage of it as they can access the patient’s data anytime they want. Researchers also benefit from public blockchain where they can access large public data.


Top 20 AWS (Amazon Web Services ) Interview Questions and Answers



Ques: 1. What is Data warehouse in AWS?

Answer: 

Data ware house is a central repository for data that can come from one or more sources. Organization typically use data warehouse to compile reports and search the database using highly complex queries. Data warehouse also typically updated on a batch schedule multiple times per day or per hour compared to an OLTP (Online Transaction Processing) relational database that can be updated thousands of times per second.

 

AWS Outposts Interview Questions and Answers

AWS Cloud Interview Questions and Answers

 

Ques: 2. What is NAT Instance and NAT Gateway?

Answer:

NAT instance: A network address translation (NAT) instance is an Amazon Linux machine Image (AMI) that is designed to accept traffic from instances within a private subnet, translate the source IP address to the Public IP address of the NAT instance and forward the traffic to IWG.

NAT Gateway: A NAT gateway is an Amazon managed resources that is designed to operate just like a NAT instance, but it is simpler to manage and highly available within an availability Zone. To allow instance within a private subnet to access internet resources through the IGW via a NAT gateway.

  

AWS AppSync Interview Questions and Answers

AWS Cloud9 Interview Questions and Answers

  

Ques: 3. What type of performance can you expect from Elastic Block Storage? How do you back it up and enhance the performance?

Answer: 

Performance of an elastic block storage varies i.e. it can go above the SLA performance level and after that drop below it. SLA provides an average disk I/O rate which can at times frustrate performance experts who yearn for reliable and consistent disk throughput on a server. Virtual AWS instances do not behave this way. One can backup EBS volumes through a graphical user interface like elasticfox or use the snapshot facility through an API call. Also, the performance can be improved by using Linux software raid and striping across four volumes.

 

Amazon Athena Interview Questions and Answers

AWS RedShift Interview Questions and Answers

 

Ques: 4. How will you access the data on EBS in AWS?

Answer: 

Elastic block storage as the name indicates provides persistent, highly available and high-performance block level storage that can be attached to a running EC2 instance. The storage can formatted and mounted as a file system or the raw storage can be accessed directly.

  

AWS Cloud Practitioner Essentials Questions and Answers

AWS EC2 Interview Questions and Answers

  

Ques: 5. Is it possible to vertically scale on an Amazon Instance?  If yes, how?

Answer: 

Following are the steps to scale an Amazon Instance vertically –

  1. Spin up a larger Amazon instance than the existing one. 
  2. Pause the existing instance to remove the root ebs volume from the server  and discard. 
  3. Stop the live running instance and detach its root volume. 
  4. Make a note of the unique device ID and attach that root volume to the new server. 
  5. Start the instance again.

 

AWS Lambda Interview Questions and Answers

AWS Cloud Security Interview Questions and Answers

  

Ques: 6. What is the total number of buckets that can be created in AWS by default?

Answer: 

100 buckets can be created in each of the AWS accounts. If additional buckets are required, increase the bucket limit by submitting a service limit increase.

 

AWS Simple Storage Service (S3) Interview Questions and Answers

AWS Fargate Interview Questions and Answers

 

Ques: 7. How will you configure an instance with the application and its dependencies, and make it ready to serve traffic?

Answer: 

You can achieve this with the use of life cycle hooks. They are powerful as they let you pause the creation or termination of an instance so that you can sneak peak in and perform custom actions like configuring the instance, downloading the required files, and any other steps that are required to make the instance ready. Every auto scaling group can have multiple life cycle hooks.

 

AWS SageMaker Interview Questions and Answers

AWS DynamoDB Interview Questions and Answers

  

Ques: 8. What are some of the key best practices for security in Amazon EC2?

Answer:

  • Create individual IAM (Identity and Access Management) users to control access to your AWS recourses. 
  • Creating separate IAM user provides separate credentials for every user making it possible to assign different permissions to each user based on the access requirements. 
  • Secure the AWS Root account and its access keys. 
  • Harden EC2 instances by disabling unnecessary services and applications by installing only necessary software and tools on EC2 instances. 
  • Grant least privileges by opening permissions that are required to perform a specific task and not more than that. Additional permissions can be granted as required. 
  • Define and review the security group rules on a regular basis. 
  • Have a well-defined strong password policy for all the users. 
  • Deploy anti-virus software on the AWS network to protect it from Trojans, Viruses, etc.

 

AWS Cloudwatch interview Questions and Answers

AWS Elastic Block Store (EBS) Interview Questions and Answers

 

Ques: 9. What are the important features of a classic load balancer in EC2?

Answer: 

·         The high availability feature ensures that the traffic is distributed among EC2 instances in single or multiple availability zones. This ensures high scale of availability for incoming traffic.

·         Classic load balancer can decide whether to route the traffic or not based on the results of health check.

·         You can implement secure load balancing within a network  by creating security groups in a VPC.

·         Classic load balancer supports sticky sessions which ensure that the traffic from a user is always routed to the same instance for a seamless experience.

 

AWS Amplify Interview Questions and Answers

AWS Secrets Manager Interview Questions and Answers

 

Ques: 10. What happens when you reboot an EC2 instance?

Answer: 

Rebooting an instance is just like rebooting a PC. You do not return to image’s original state; however, the contents of the hard disk are same as before the reboot.


AWS Django Interview Questions and Answers

AWS Cloud Support Engineer Interview Question and Answers


Ques: 11. What Are the main features of Amazon Cloud Front?

Answer: 

Amazon Cloud Front is a web service that speeds up delivery of your static and dynamic web content, such as .html, .css, .js, and image files, to your users. CloudFront delivers your content through a universal network of data centres called edge locations


AWS Solution Architect Interview Questions and Answers

AWS Glue Interview Questions and Answers


Ques: 12. Explain storage for Amazon Ec2 Instance?

Answer: 

An instance store is a provisional storing type located on disks that are physically attached to a host machine. … This article will present you to the AWS instance store storage type, compare it to AWS Elastic Block Storage (AWS EBS), and show you how to backup data stored on instance stores to AWS EBS

Amazon SQS is a message queue service used by scattered requests to exchange messages through a polling model, and can be used to decouple sending and receiving components


AWS Cloud Interview Questions and Answers

AWS VPC Interview Questions and Answers         


Ques: 13. What is AWS Certificate Manager?

Answer: 

AWS Certificate Manager is an administration that lets you effortlessly arrangement, oversee, and send open and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) endorsements for use with AWS administrations and your inward associated assets. SSL/TLS declarations are utilized to anchor arrange interchanges and set up the character of sites over the Internet and additionally assets on private systems. AWS Certificate Manager expels the tedious manual procedure of obtaining, transferring, and reestablishing SSL/TLS endorsements.


AWS DevOps Cloud Interview Questions and Answers

AWS Aurora Interview Questions and Answers


Ques: 14. What is the AWS Key Management Service?

Answer: 

AWS Key Management Service (AWS KMS) is an overseen benefit that makes it simple for you to make and control the encryption keys used to scramble your information. AWS KMS is additionally coordinated with AWS CloudTrail to give encryption key use logs to help meet your inspecting, administrative and consistence needs.


AWS Database Interview Questions and Answers

AWS ActiveMQ Interview Questions and Answers


Ques: 15. What is Amazon EMR?

Answer: 

Amazon Elastic MapReduce (EMR) is one such administration that gives completely oversaw facilitated Hadoop system over Amazon Elastic Compute Cloud (EC2).


AWS CloudFormation Interview Questions and Answers

AWS GuardDuty Questions and Answers


Ques: 16. What is Amazon Kinesis Firehose?

Answer: 

Amazon Kinesis Data Firehose is the least demanding approach to dependably stack gushing information into information stores and examination devices. … It is a completely overseen benefit that consequently scales to coordinate the throughput of your information and requires no continuous organization.


AWS Control Tower Interview Questions and Answers

AWS Lake Formation Interview Questions and Answers


Ques: 17. What Is Amazon CloudSearch and its highlights?

Answer: 

Amazon CloudSearch is a versatile cloud-based hunt benefit that frames some portion of Amazon Web Services (AWS). CloudSearch is normally used to incorporate tweaked seek abilities into different applications. As indicated by Amazon, engineers can set a pursuit application up and send it completely in under 60 minutes.


AWS Data Pipeline Interview Questions and Answers

Amazon CloudSearch Interview Questions and Answers 


Ques: 18. What is the Difference between the Service Role and SAML Federated Role?

Answer: 

Service Role are meant for usage of AWS Services and based upon the policies attached to it, it will have the scope to do its task. Example : In case of automation we can create a service role and attached to it.

Federated Roles are meant for User Access and getting access to AWS as per designed role. Example: We can have a federated role created for our office employee and corresponding to that a Group will be created in the AD and user will be added to it.


AWS Transit Gateway Interview Questions and Answers

Amazon Detective Interview Questions and Answers


Ques: 19. Distinguish between Scalability and Flexibility?

Answer: 

Cloud computing offers industries flexibility and scalability when it comes to computing needs:

Flexibility. Cloud computing agrees your workers to be more flexible – both in and out of the workplace. Workers can access files using web-enabled devices such as smartphones, laptops and notebooks. In this way, cloud computing empowers the use of mobile technology.

One of the key assistances of using cloud computing is its scalability. Cloud computing allows your business to easily expensive or downscale your IT requests as and when required. For example, most cloud service workers will allow you to increase your existing resources to accommodate increased business needs or changes. This will allow you to support your commercial growth without exclusive changes to your present IT systems.


Amazon EMR Interview Questions and Answers

Amazon OpenSearch Interview Questions and Answers


Ques: 20 What is SES, SQS and SNS?

Answer: 

SES (Simple Email Service): SES is SMTP server provided by Amazon which is designed to send bulk mails to customers in a quick and cost-effective manner.SES does not allows to configure mail server.

SQS (Simple Queue Service): SQS is a fast, reliable and scalable, fully managed message queuing service. Amazon SQS makes it simple and cost Effective. It’s temporary repository for messages to waiting for processing and acts as a buffer between the component producer and the consumer.

SNS (Simple Notification Service): SNS is a web service that coordinates and manages the delivery or sending of messages to recipients.

 

AWS FinSpace Interview Questions and Answers

AWS MSK Interview Questions and Answers



More AWS Interview Questions and Answers:


AWS EventBridge Interview Questions and Answers

AWS Simple Notification Service (SNS) Interview Questions and Answers

AWS QuickSight Interview Questions and Answers

AWS SQS Interview Questions and Answers

AWS AppFlow Interview Questions and Answers

AWS QLDB Interview Questions and Answers

AWS STEP Functions Interview Questions and Answers

Amazon Managed Blockchain Questions and Answers

AWS Message Queue(MQ) Interview Questions and Answers

AWS Serverless Application Model(SAM) Interview Questions and Answers

AWS X-Ray Interview Questions and Answers

AWS Wavelength Interview Questions and Answers

AWS Lightsail Questions and Answers

AWS Keyspaces Interview Questions and Answers