Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
AWS has limitations such as service outages, data security concerns, and potential cost overruns.
Service outages can disrupt operations and impact business continuity.
Data security concerns may arise due to shared responsibility model and potential vulnerabilities.
Cost overruns can occur if resources are not properly managed or monitored.
Limited control over underlying infrastructure compared to on-premises solutions.
I applied via Company Website and was interviewed in Mar 2024. There were 2 interview rounds.
Amazon Elastic Compute Cloud (EC2) is the backbone service of AWS.
EC2 provides resizable compute capacity in the cloud.
It allows users to quickly scale up or down their compute resources as needed.
EC2 instances are virtual servers that can run various operating systems and applications.
It forms the foundation for many other AWS services and solutions.
EC2 instances can be used for a wide range of use cases, from hosting
EC2 is a web service that provides resizable compute capacity in the cloud.
EC2 stands for Elastic Compute Cloud
It allows users to rent virtual servers on which they can run their own applications
Users have full control over their instances, including choice of operating system, security settings, and networking
EC2 instances can be easily scaled up or down based on demand
It offers a wide range of instance types optimize...
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
There were 30 mcq questions asked
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
What is the coating structure
Social media, like inforgraphic, easally shared directly
To create an archive file in LINUX, use the 'tar' command.
Use the 'tar' command followed by the options and the name of the archive file.
To create a compressed archive, use the 'z' option for gzip compression or 'j' option for bzip2 compression.
To extract an archive, use the 'x' option followed by the name of the archive file.
To list the contents of an archive, use the 't' option followed by the name of the archive fil
The ping command is used to test the reachability of a host on an IP network, while the grep command is used to search for specific patterns in text files.
Ping command sends ICMP echo request packets to a target host and waits for a response.
Grep command searches for lines in files that match a given pattern.
Ping command can be used to troubleshoot network connectivity issues.
Grep command can be used to filter and extr...
To create a user and set a password, use the appropriate command-line tools or GUI interface.
For Linux systems, use the 'adduser' command to create a new user and 'passwd' command to set the password.
For Windows systems, use the 'net user' command to create a new user and 'net user
For AWS, use the IAM console to create a new user and set the password.
Ensure that the password meets the c
Linux features can be written using various programming languages and tools.
Identify the specific feature to be written
Choose a programming language and tool that is suitable for the feature
Write the code for the feature
Test the feature to ensure it works as expected
Document the feature for future reference
Devops Engineer
20
salaries
| ₹4.3 L/yr - ₹9.5 L/yr |
Hadoop Administrator
15
salaries
| ₹4 L/yr - ₹9.6 L/yr |
Software Engineer
12
salaries
| ₹3 L/yr - ₹9.5 L/yr |
Software Developer
10
salaries
| ₹3 L/yr - ₹5 L/yr |
Kafka Administrator
7
salaries
| ₹4.7 L/yr - ₹5 L/yr |
Sobha
DLF
Godrej Properties
Prestige Group