Premium Employer

HCLTech

3.5
based on 35.7k Reviews
Filter interviews by

50+ Parle Agro Interview Questions and Answers

Updated 8 Feb 2025
Popular Designations

Q1. Design the zabbix architecture and share how many servers are you gonna suggest the customer to have?

Ans.

The number of servers required for Zabbix architecture depends on the size of the environment and the level of monitoring required.

  • Assess the size of the environment and the number of devices to be monitored

  • Determine the level of monitoring required, such as real-time monitoring or historical data analysis

  • Consider the need for high availability and redundancy

  • Suggest a minimum of 3 servers for a basic setup: 1 for the Zabbix server, 1 for the database, and 1 for the web interf...read more

Add your answer

Q2. What is the process for creating users and groups in Active Directory?

Ans.

Creating users and groups in Active Directory involves using tools like Active Directory Users and Computers.

  • Open Active Directory Users and Computers tool

  • Navigate to the appropriate organizational unit (OU)

  • Right-click on the OU and select 'New' -> 'User' or 'Group'

  • Fill in the required user or group information such as name, username, password, etc.

  • Click 'OK' to create the user or group

Add your answer

Q3. What is the process for enabling and disabling users in Active Directory?

Ans.

Enabling and disabling users in Active Directory involves using the Active Directory Users and Computers tool.

  • Open Active Directory Users and Computers tool

  • Locate the user account to enable/disable

  • Right-click on the user account and select 'Enable Account' or 'Disable Account'

  • Click 'Apply' to save the changes

Add your answer

Q4. What is the process for applying Group Policy in Active Directory?

Ans.

Group Policy in Active Directory is applied through a hierarchical process based on site, domain, and organizational unit levels.

  • Group Policy objects (GPOs) are created and linked to sites, domains, or organizational units in Active Directory.

  • The order of precedence for applying Group Policy is Local, Site, Domain, and Organizational Unit.

  • Group Policy settings are inherited from parent containers to child containers unless explicitly blocked or overridden.

  • Group Policy process...read more

Add your answer
Discover Parle Agro interview dos and don'ts from real experiences

Q5. What is the precedence of Group Policy Objects (GPO) in Active Directory?

Ans.

GPOs are applied in the following order: Local, Site, Domain, OU. The last applied GPO takes precedence.

  • Local GPOs are applied first

  • Site GPOs are applied next

  • Domain GPOs are applied after Site GPOs

  • OU GPOs are applied last and take precedence over others

  • The last applied GPO takes precedence in case of conflicting settings

Add your answer

Q6. What is the difference between a distribution list and a shared mailbox?

Ans.

Distribution list is used for sending emails to a group of people, while a shared mailbox is used for multiple users to access and send emails from a single email address.

  • Distribution list is a group email address that sends emails to multiple recipients.

  • Shared mailbox is an email address that multiple users can access and send emails from.

  • Distribution list is mainly used for broadcasting emails to a group of people.

  • Shared mailbox is commonly used for team collaboration and s...read more

Add your answer
Are these interview questions helpful?

Q7. What are the differences between the E1, E3, and E5 plans in Microsoft Office 365?

Ans.

E1, E3, and E5 plans in Microsoft Office 365 differ in features and pricing.

  • E1 plan includes basic Office applications and online services.

  • E3 plan includes advanced Office applications, email hosting, and online services.

  • E5 plan includes all features of E3 plus advanced security and compliance tools.

  • E5 plan is the most expensive among the three plans.

Add your answer

Q8. How can an administrative role be assigned to a user in Active Directory?

Ans.

An administrative role can be assigned to a user in Active Directory by using the Active Directory Users and Computers tool.

  • Open Active Directory Users and Computers tool

  • Locate the user to whom you want to assign the administrative role

  • Right-click on the user and select Properties

  • Go to the Member Of tab

  • Click Add and enter the name of the administrative group

  • Click OK to save the changes

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is the purpose of the object management system in Active Directory?

Ans.

The object management system in Active Directory is used to organize and manage objects such as users, groups, and computers within the directory.

  • Allows for centralized management of objects within the directory

  • Enables administrators to create, modify, and delete objects

  • Helps in organizing objects into logical containers for easier management

  • Facilitates delegation of administrative tasks to specific users or groups

  • Supports security by controlling access to objects based on pe...read more

Add your answer

Q10. What is Windows Management Instrumentation (WMI) in Group Policy Objects (GPO)?

Ans.

WMI in GPO allows administrators to manage Windows settings and resources through a centralized interface.

  • WMI is a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.

  • In GPO, WMI filters can be used to apply policies based on specific conditions, such as hardware or software configurations.

  • Administrators can use WMI queries to target specific groups of computers or...read more

Add your answer

Q11. If vedge device not authenticating with controller and configuration is looking good, what steps will check to fixe this issue

Ans.

Check network connectivity, firmware version, certificate validity, and controller settings.

  • Verify network connectivity between vedge device and controller

  • Check if vedge device firmware version is compatible with controller

  • Ensure certificate on vedge device is valid and not expired

  • Review controller settings to confirm correct configuration

Add your answer

Q12. What is the role of Active Directory Users and Computers?

Ans.

Active Directory Users and Computers is a Microsoft Management Console snap-in that allows administrators to manage users, groups, computers, and organizational units in a Windows domain environment.

  • Allows administrators to create, delete, and manage user accounts

  • Enables administrators to create and manage security groups

  • Provides the ability to manage computer accounts and organizational units

  • Allows for delegation of administrative tasks to specific users or groups

Add your answer

Q13. What is the difference between cloud storage and on-premises storage?

Ans.

Cloud storage is stored on remote servers accessed over the internet, while on-premises storage is stored locally within an organization's physical location.

  • Cloud storage is accessed over the internet, providing flexibility and scalability.

  • On-premises storage is physically located within an organization's premises, providing more control over data security.

  • Cloud storage is typically managed by a third-party provider, while on-premises storage is managed by the organization it...read more

Add your answer

Q14. What is difference between omp and ztp and what is use of that

Ans.

OMP stands for Open Mobile Platform and ZTP stands for Zero Touch Provisioning. OMP is a mobile operating system while ZTP is a network provisioning method.

  • OMP is a mobile operating system developed by Samsung for their mobile devices.

  • ZTP is a network provisioning method that allows devices to be automatically configured and deployed without manual intervention.

  • OMP focuses on the software side of mobile devices, while ZTP focuses on the network setup and configuration.

  • Example...read more

Add your answer

Q15. What is use of bgp backdoor and it will be back impact on oir network topology

Ans.

BGP backdoor is used to influence routing decisions by making a specific route more preferred.

  • BGP backdoor is a technique used to manipulate the BGP routing table by making a specific route more preferred than others.

  • It is typically used when a more specific route needs to be preferred over a less specific route.

  • This can impact network topology by causing traffic to flow through a different path than intended, potentially affecting performance and security.

  • For example, if a c...read more

Add your answer

Q16. How Active setup works and what is advertised shortcut

Ans.

Active setup is a mechanism to ensure that software is installed correctly. Advertised shortcut is a shortcut that is created during installation.

  • Active setup is a registry key that runs a command to ensure that software is installed correctly

  • It is used to update or repair software installations

  • Advertised shortcut is a shortcut that is created during installation and points to a specific feature or component of the software

  • When the shortcut is clicked, it triggers the install...read more

Add your answer

Q17. What is a Distribution List in Exchange Server?

Ans.

A Distribution List in Exchange Server is a group of email recipients that can be addressed as a single recipient.

  • Used to send emails to multiple recipients at once

  • Can be created and managed by users or administrators

  • Can include both internal and external email addresses

  • Can be used for sending newsletters, announcements, etc.

Add your answer

Q18. What is a shared mailbox in Exchange Server?

Ans.

A shared mailbox in Exchange Server is a mailbox that multiple users can access to send and receive emails.

  • Allows multiple users to access the same mailbox

  • Users can send and receive emails on behalf of the shared mailbox

  • Useful for departments or teams to manage a common email address

  • Can be set up with permissions to control access levels

Add your answer

Q19. What is Active Directory Domain Services (ADDS)?

Ans.

ADDS is a service provided by Microsoft Windows Server for managing users, computers, and resources in a network.

  • ADDS is a directory service used to store information about network resources such as users, groups, and computers.

  • It allows administrators to manage and secure resources within a network.

  • ADDS uses a hierarchical structure with domains, trees, and forests to organize network resources.

  • It provides features like single sign-on, group policy management, and authentica...read more

Add your answer

Q20. 1. Explain GKE Architecture 2. Difference between VPC peering and VPC sharing 3. How load balancer works?

Ans.

GKE Architecture is a managed Kubernetes service provided by Google Cloud Platform.

  • GKE Architecture consists of master nodes and worker nodes.

  • Master nodes manage the Kubernetes cluster and worker nodes run the applications.

  • GKE provides automated scaling, monitoring, and management of the Kubernetes cluster.

  • GKE integrates with other Google Cloud services for seamless deployment and management.

Add your answer

Q21. What is Problem Management? What is PTask ?

Ans.

Problem Management is the process of identifying, analyzing, and resolving IT issues to prevent future incidents. PTask is not a known term.

  • Problem Management aims to minimize the impact of incidents on business operations.

  • It involves identifying the root cause of incidents and implementing solutions to prevent their recurrence.

  • PTask is not a commonly used term in ITIL or ITSM frameworks.

  • However, it could refer to a specific task within a problem management process.

Add your answer

Q22. Write a script to develop a well Architect AWS infrastructure in Terrafrom?

Ans.

Develop a well Architect AWS infrastructure in Terraform

  • Define the required AWS resources in Terraform configuration files

  • Use modules to organize and reuse code for different components

  • Leverage Terraform best practices such as state management and variable usage

  • Implement security best practices like IAM roles and policies

  • Utilize Terraform's plan and apply commands to create and update infrastructure

Add your answer

Q23. What is RBAC? How is access certification done?

Ans.

RBAC stands for Role-Based Access Control. Access certification is done by reviewing and verifying user access rights based on their assigned roles.

  • RBAC is a security model that restricts system access based on the roles assigned to users.

  • Access certification involves reviewing and verifying user access rights to ensure they align with their job responsibilities.

  • Access certification can be done manually or through automated tools.

  • Examples of RBAC include granting a doctor acc...read more

Add your answer

Q24. How will to check hardware issue

Ans.

Hardware issues can be checked by running diagnostic tests, checking for physical damage, and updating drivers.

  • Run diagnostic tests to identify any hardware issues

  • Check for physical damage such as cracks or loose connections

  • Update drivers to ensure they are functioning properly

  • Use specialized hardware diagnostic tools to identify specific issues

  • Check system logs for any error messages related to hardware

  • Test individual components such as RAM, hard drive, and graphics card

  • Cons...read more

Add your answer

Q25. Difference between Trusted source and Target Source Reconciliation

Ans.

Trusted source reconciliation compares data from a reliable source with the target source to identify discrepancies.

  • Trusted source is a reliable source of data used for comparison

  • Target source is the source of data being reconciled

  • Discrepancies are identified and resolved to ensure data accuracy

Add your answer

Q26. when we need DHCP relay .

Ans.

DHCP relay is needed when a DHCP server is not on the same subnet as the client.

  • DHCP relay is used to forward DHCP requests from clients on one subnet to a DHCP server on another subnet.

  • This is useful in large networks where there are multiple subnets and a centralized DHCP server.

  • Without DHCP relay, clients on different subnets would not be able to obtain IP addresses from the DHCP server.

  • DHCP relay can be configured on routers or layer 3 switches.

  • Examples of when DHCP relay...read more

Add your answer

Q27. What is ospf, bgp, eigrp protocol?

Ans.

OSPF, BGP, and EIGRP are routing protocols used in networking to determine the best path for data packets to travel.

  • OSPF (Open Shortest Path First) is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to a destination.

  • BGP (Border Gateway Protocol) is a path vector routing protocol used to exchange routing information between different autonomous systems on the internet.

  • EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco prop...read more

Add your answer

Q28. What is Azure. Types of services it provides

Ans.

Azure is a cloud computing platform by Microsoft offering various services like virtual machines, databases, AI, and more.

  • Infrastructure as a Service (IaaS) - Virtual machines, storage, networking

  • Platform as a Service (PaaS) - Web apps, databases, AI services

  • Software as a Service (SaaS) - Office 365, Dynamics 365

  • AI and Machine Learning services - Azure Cognitive Services, Azure Machine Learning

  • Big Data and Analytics services - Azure Data Lake, Azure HDInsight

Add your answer

Q29. How you do code debugging for Java application

Ans.

I use logging, breakpoints, and step-through debugging to identify and fix issues in Java applications.

  • Utilize logging statements to track the flow of the code and identify potential issues

  • Set breakpoints at critical points in the code to pause execution and inspect variables

  • Use step-through debugging to execute code line by line and identify the source of errors

Add your answer

Q30. What is MSI installer and MSI tables?

Ans.

MSI installer is a software installation package format used by Windows. MSI tables are database tables used by the installer.

  • MSI stands for Microsoft Installer and is a file format used for software installation on Windows.

  • MSI tables are database tables that store information about the software being installed, such as files, registry settings, and shortcuts.

  • MSI tables can be edited using tools like Orca or InstEd to customize the installation process.

  • MSI installers can be d...read more

Add your answer

Q31. Explain about the security protocols used in your previous organization.

Ans.

My previous organization used a combination of encryption, access control, and monitoring to ensure security.

  • Encryption protocols such as SSL/TLS were used to secure data in transit

  • Access control measures like role-based access control and multi-factor authentication were implemented to restrict unauthorized access

  • Monitoring tools like intrusion detection systems and security information and event management systems were used to detect and respond to security incidents

  • Regular...read more

Add your answer

Q32. What is Dns,tell me about yourlself.

Ans.

DNS stands for Domain Name System, it translates domain names to IP addresses.

  • DNS is a system that translates domain names to IP addresses.

  • It helps users access websites by translating human-readable domain names (e.g. google.com) to machine-readable IP addresses (e.g. 172.217.3.206).

  • DNS servers store a database of domain names and their corresponding IP addresses.

  • DNS plays a crucial role in the functioning of the internet by facilitating communication between devices.

  • Common ...read more

Add your answer

Q33. what are different types of Selenium waits

Ans.

Different types of Selenium waits include implicit, explicit, and fluent waits.

  • Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.

  • Explicit wait: Waits for a certain condition to occur before proceeding further in the code.

  • Fluent wait: Waits for a condition to be true with a specified frequency of checking.

  • Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);

Add your answer

Q34. What is Packaging/Repackaging Concept

Ans.

Packaging/repackaging concept refers to the process of designing and creating packaging for products.

  • Packaging is the process of creating a protective covering for a product.

  • Repackaging involves changing the existing packaging of a product to improve its marketability or to meet regulatory requirements.

  • Packaging/repackaging can include design, materials selection, labeling, and testing.

  • Examples include food packaging, pharmaceutical packaging, and consumer product packaging.

  • P...read more

Add your answer

Q35. What are the custom actions/Tables

Ans.

Custom actions/tables are user-defined actions and tables in a software system.

  • Custom actions are created by users to perform specific tasks that are not available in the system by default.

  • Custom tables are created by users to store additional data that is not available in the system by default.

  • Custom actions and tables can be created using programming languages or through the system's user interface.

  • Examples of custom actions/tables include custom reports, custom workflows, ...read more

Add your answer

Q36. What is Active Directory?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • Centralized database for managing network resources

  • Stores information about users, computers, and other network objects

  • Allows for authentication and authorization of users

  • Enables administrators to assign policies, deploy software, and apply updates

  • Example: Creating user accounts, managing group policies

Add your answer

Q37. What is a database schema?

Ans.

A database schema is a blueprint that defines the structure of a database, including tables, fields, relationships, and constraints.

  • Defines the organization of data into tables and columns

  • Specifies relationships between tables

  • Includes constraints to enforce data integrity

  • Can be represented visually using diagrams

  • Example: In a library database schema, there may be tables for books, authors, and borrowers with relationships between them

Add your answer

Q38. What is APT?, What Mittre Attack?

Ans.

APT stands for Advanced Persistent Threat. MITRE ATT&CK is a framework that categorizes and describes common attack techniques.

  • APT refers to a sophisticated and long-term cyber attack targeting specific organizations or individuals.

  • MITRE ATT&CK is a knowledge base that provides information on various attack techniques used by adversaries.

  • APT attacks are often carried out by skilled and well-funded threat actors.

  • MITRE ATT&CK helps organizations understand and defend against th...read more

Add your answer

Q39. What is osi layer, dhcp, dns?

Ans.

OSI layer is a conceptual framework that standardizes the functions of a telecommunication or computing system. DHCP is a network protocol that enables a server to automatically assign an IP address to a computer. DNS is a system that translates domain names to IP addresses.

  • OSI layer is a conceptual model that characterizes and standardizes the functions of a telecommunication or computing system.

  • DHCP (Dynamic Host Configuration Protocol) is a network protocol that enables a ...read more

Add your answer

Q40. Write and Explain about CICD groovy script

Ans.

CICD groovy script is used for automating the Continuous Integration and Continuous Deployment process.

  • CICD groovy script is written in Groovy language to automate the build, test, and deployment process.

  • It can be used with tools like Jenkins, GitLab CI/CD, etc. to define pipelines for automating the software delivery process.

  • Groovy scripts can be used to define stages, steps, triggers, and conditions in the CICD pipeline.

  • Example: Writing a groovy script to build a Java proje...read more

Add your answer

Q41. Troubleshooting techniques for system slowness

Ans.

Troubleshooting techniques for system slowness involve identifying potential causes and implementing solutions.

  • Check for high CPU usage by running task manager or activity monitor

  • Scan for malware or viruses using antivirus software

  • Clear temporary files and cache to free up disk space

  • Update system drivers and software to the latest versions

  • Check network connectivity and speed to ensure it's not the cause of slowness

Add your answer

Q42. What is stp, vtp, dtp, vlan

Ans.

STP, VTP, DTP, VLAN are networking protocols and technologies used in managing and organizing network traffic.

  • STP stands for Spanning Tree Protocol and is used to prevent loops in Ethernet networks.

  • VTP stands for VLAN Trunking Protocol and is used to manage VLAN configurations across a network.

  • DTP stands for Dynamic Trunking Protocol and is used to negotiate trunking between switches.

  • VLAN stands for Virtual Local Area Network and is used to logically segment a network into se...read more

Add your answer

Q43. What is domain controller?

Ans.

A domain controller is a server that manages network security, user access, and permissions within a Windows domain.

  • Manages network security within a Windows domain

  • Controls user access and permissions

  • Stores user account information and authentication data

  • Replicates data to other domain controllers for fault tolerance

  • Examples: Active Directory Domain Services (AD DS) in Windows Server

Add your answer

Q44. What is blue screen error

Ans.

Blue screen error is a system error that occurs in Windows operating system.

  • Also known as Blue Screen of Death (BSOD)

  • Occurs when the system encounters a critical error and cannot recover

  • Usually caused by hardware or software issues

  • Displays a blue screen with error message and system information

  • Requires a system restart to fix the issue

Add your answer

Q45. What is MSI Packaging?

Ans.

MSI Packaging is the process of creating an installer package for software applications.

  • MSI stands for Microsoft Installer

  • It is a file format used for installation, maintenance, and removal of software on Windows operating systems

  • MSI packages can be created using tools like InstallShield, WiX, and Advanced Installer

  • They can include files, registry entries, shortcuts, and other components needed for the software to run

  • MSI packages can be deployed using Group Policy, SCCM, or o...read more

Add your answer

Q46. What is Active directry.

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • Centralized management of network resources

  • Authentication and authorization of users and computers

  • Organizational units for organizing objects

  • Group policies for controlling user settings

  • DNS services for locating network resources

Add your answer

Q47. What is sla

Ans.

SLA stands for Service Level Agreement, which is a contract between a service provider and a customer that outlines the level of service expected.

  • SLA defines the level of service a customer can expect from a service provider

  • It outlines the metrics that will be used to measure the service provided

  • SLAs are commonly used in IT and telecommunications industries

  • Examples of SLA metrics include uptime, response time, and resolution time

Add your answer

Q48. What is Adminstudio toll?

Ans.

Adminstudio is a software packaging tool used for creating, testing, and deploying software packages.

  • Adminstudio helps in automating the software packaging process

  • It ensures that the software is compatible with the target environment

  • It also helps in identifying and resolving any potential issues with the software package

  • Adminstudio supports various packaging formats such as MSI, App-V, and ThinApp

  • It is widely used by IT professionals and software developers for software packa...read more

Add your answer

Q49. What is pervasive encryption

Ans.

Pervasive encryption is the practice of encrypting data at every point in its lifecycle.

  • Pervasive encryption ensures that data is protected at all times, whether it is at rest or in transit.

  • It involves encrypting data at every point in its lifecycle, from creation to deletion.

  • Examples of pervasive encryption include encrypting data on a hard drive, encrypting data in transit over a network, and encrypting data in a database.

  • Pervasive encryption is becoming increasingly import...read more

Add your answer

Q50. What was the ITSm processes

Ans.

IT Service Management (ITSM) processes are a set of activities that help organizations design, deliver, manage, and improve IT services.

  • ITSM processes include incident management, problem management, change management, service level management, and more.

  • These processes help ensure that IT services are aligned with the needs of the business and delivered efficiently.

  • For example, incident management involves resolving IT issues quickly to minimize impact on users.

  • Change managem...read more

Add your answer

Q51. tell about Problem management

Ans.

Problem management involves identifying, analyzing, and resolving recurring issues to prevent future incidents.

  • Identifying root causes of problems

  • Implementing solutions to prevent recurrence

  • Documenting and tracking problems and resolutions

  • Collaborating with other teams to address systemic issues

Add your answer

Q52. Explain about openshift and Kubernetes

Ans.

OpenShift is a container platform by Red Hat, while Kubernetes is an open-source container orchestration tool.

  • OpenShift is a commercial product by Red Hat that builds on top of Kubernetes for added features and support.

  • Kubernetes is an open-source container orchestration tool developed by Google.

  • Both OpenShift and Kubernetes are used for managing containerized applications in a clustered environment.

  • Kubernetes helps in automating the deployment, scaling, and management of con...read more

Add your answer

Q53. Discuss on CTC as per market

Ans.

CTC as per market varies based on industry, job role, experience and location.

  • CTC stands for Cost to Company and includes all the expenses incurred by the company on an employee

  • CTC varies based on industry, job role, experience and location

  • For example, a software engineer in Bangalore may have a higher CTC compared to a software engineer in a smaller city

  • CTC may include components like base salary, bonuses, health insurance, retirement benefits, etc.

Add your answer

Q54. What is the vpc

Ans.

VPC stands for Virtual Private Cloud, a virtual network dedicated to a user's AWS account.

  • VPC allows users to launch AWS resources into a virtual network that they've defined.

  • Users can configure their VPC with their own IP address range, subnets, and route tables.

  • VPC provides advanced security features such as security groups and network access control lists (ACLs).

Add your answer

Q55. What is a roadmap?

Ans.

A roadmap is a strategic plan that outlines the goals, milestones, and timeline for achieving a specific objective.

  • A roadmap helps to visualize the journey towards a goal or objective.

  • It typically includes key milestones, tasks, and deadlines.

  • Roadmaps are commonly used in project management, product development, and strategic planning.

  • Example: A product roadmap outlines the features and enhancements that will be developed over the next year.

Add your answer

Q56. Use case of chatbot I build

Ans.

Built a chatbot for a healthcare provider to assist patients with scheduling appointments and answering FAQs.

  • Implemented natural language processing to understand user queries

  • Integrated with appointment scheduling system for real-time availability

  • Provided personalized responses based on patient history and preferences

Add your answer

Q57. Steps of ISO implementation.

Ans.

Steps of ISO implementation involve planning, documentation, training, implementation, audit, and certification.

  • Develop an implementation plan outlining goals, resources, and timeline.

  • Document processes and procedures to meet ISO standards.

  • Provide training to employees on ISO requirements and procedures.

  • Implement the documented processes and procedures in the organization.

  • Conduct internal audits to ensure compliance with ISO standards.

  • Seek certification from an accredited cer...read more

Add your answer

Q58. AWS and its services

Ans.

AWS is a cloud computing platform that offers a wide range of services for computing, storage, networking, and more.

  • AWS offers over 200 services, including EC2, S3, RDS, Lambda, and more

  • EC2 provides scalable compute capacity in the cloud

  • S3 is a highly scalable object storage service

  • RDS is a managed relational database service

  • Lambda allows you to run code without provisioning or managing servers

  • AWS also offers AI/ML services, IoT services, and more

  • AWS provides a pay-as-you-go ...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Parle Agro

based on 64 interviews
4 Interview rounds
Technical Round - 1
Technical Round - 2
Technical Round - 3
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Specialist Interview Questions from Similar Companies

3.8
 • 39 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter