Qs: FullStack
What does e2e stand for?
Authentication
What Is Authentication ?
Authentication vs Authorization ?
Common Types Of Authentication ?
What's Password-Based Authentication?
Session Cookies Authentication vs Token-Based Authentication ?
What % of cases is Token-based authentication favored ?
Context / Use Case
Token-Based Auth (JWT, OAuth2, etc.)
Session Cookies
What's Session Cookies Authentication?
What's Token-Based Authentication?
What's JWT ?
How Related Are OAuth, OIDC, and JWT ?
How Related Are OAuth, OIDC, and Delegated Authentication ?
Access Tokens vs Refresh Tokens
Feature
Access Token
Refresh Token
Why fragments for access tokens?
Refresh Token Storage: JWT-only vs Database storage ?
Requirement
DB Refresh Token
JWT-Only Refresh
Server Side Optimization
What's Server Side Optimization?
What are the headers for http/client/browser caching?
How does ETag work?
How does Last-Modified work?
A TTL value of zero in a cache means that ...
What are the best practices when using Lighthouse in chrome?
What are the best practices when measuring performances in chrome?
How do you optimize the Static Assets?
HTTP Requests, APIs
What are valid ways to version an API in the case of breaking changes?
Which of the following methods are idempotent in REST?
Which one is true about the PUT and POST methods in REST?
What's the difference between PUT and PATCH ?
Which HTTP Status Code represents Forbidden Access to the endpoint/resource?
What is a preflight request in the context of HTTP?
When using the Basic Auth mechanism what does the Authorization Header contains?
Basic Auth mechanism what does the Authorization Header contains?How are cookies sent from the browser to the server?
What's Content Negotiation?
In the context of TLS and HTTPS
What is the relationship between an HTTPS certificate and the public and private keys in the context of establishing a secure connection?
In HTTPS, which type of encryption is actually used during the communication session after the initial connection is established?
What measures can help prevent a Distributed Denial-of-Service (DDoS) attack?
API endpoint: Scenario
Scenario
Scenario: web security attack
Databases
What are some advantages of using an ORM?
What is the purpose of a database migration?
What is the main purpose of a FOREIGN KEY constraint in relational databases?
Which aspects of the CAP Theorem?
How does an index makes database queries faster?
index makes database queries faster?Which of the following are disadvantages of indexing a database table? (2 options apply)
An API Service receives input field values from the frontend and use it them directly in database queries. Which web security attacks does this make it vulnerable to?
Backend ↔ Frontend
What and why DTOs?
What and why domain models ?
How related are DTOs and domain models?
Domain Entities vs Domain models ?
Architecture, Deployment, CI/CD, Docker,
Advantages of a micro-frontends architecture?
Which Architecture Style achieves the maximum decoupling between services?
Which deployment styles have zero downtime?
What deployment styles requires a load balancer?
How much downtime does a five nines(99.999%) SLA allows for over a day?
What is the main advantage of using containers in CI/CD?
What is Kubernetes ?
Docker Orchestrators run many containers on a single machine. Is that correct?
Isn't it very heavy to include a Linux in every single Container, even if a light version of Linux ?
Image type
Approx. size
Notes
Feature
Virtual Machine
Container
A proxy service that acts on behalf of the server (like a load balancer) is also called a ...
What devices qualify as a reverse proxy?
We know our service will be scaled horizontally across a couple of instances. When designing it, we should?
A load balancer implementing a Round-Robin algorithm will forward requests to ...
Last updated