Cloud Developer
Cloud Developer Interview Questions and Answers
Q1. what is friend function, what is function overloading and overriding. difference between run time polymorphism and compile time polymorphism.
Friend function is a function that is not a member of a class but has access to its private and protected members. Function overloading is defining multiple functions with the same name but different parameters. Function overriding is redefining a base class function in a derived class. Runtime polymorphism is achieved through virtual functions and late binding, while compile time polymorphism is achieved through function overloading and templates.
Friend function can access p...read more
Q2. Difference between cloud and mobile computing?
Cloud computing refers to the delivery of computing services over the internet, while mobile computing refers to the use of mobile devices for computing tasks.
Cloud computing involves accessing and using resources and services hosted on remote servers via the internet.
Mobile computing focuses on the use of mobile devices like smartphones and tablets for computing tasks.
Cloud computing allows for scalability, flexibility, and cost-effectiveness as resources can be easily provi...read more
Q3. Difference betwee sec grp and nat gateway
Security groups control inbound/outbound traffic while NAT gateway allows instances in private subnets to access internet.
Security groups act as a virtual firewall for instances and control inbound/outbound traffic based on rules defined by the user.
NAT gateway allows instances in private subnets to access the internet while keeping them secure by not exposing their IP addresses to the internet.
Security groups are associated with instances while NAT gateway is associated with...read more
Q4. Difference between pem file and key
A pem file contains both the private key and the certificate, while a key file only contains the private key.
A pem file is used for SSL/TLS certificates
A key file is used for SSH authentication
Pem files can be converted to key files using OpenSSL
Pem files are often used in web servers like Apache and Nginx
Q5. How do manage AWS security?
AWS security can be managed through various tools and best practices to ensure data protection and compliance.
Utilize IAM (Identity and Access Management) to control access to AWS resources
Enable MFA (Multi-Factor Authentication) for added security
Implement encryption for data at rest and in transit using services like AWS KMS and SSL/TLS
Regularly monitor and audit AWS resources for any security vulnerabilities
Use AWS CloudTrail for logging and tracking user activity
Q6. ControllerAdvice in Java
ControllerAdvice in Java is used to handle exceptions globally in Spring MVC applications.
ControllerAdvice is an annotation used in Spring MVC to define global exception handlers.
It allows you to centralize exception handling logic in one place.
You can define methods annotated with @ExceptionHandler inside a ControllerAdvice class to handle specific exceptions.
ControllerAdvice can also be used to define model attributes that are shared across multiple controllers.
Share interview questions and help millions of jobseekers 🌟
Q7. @Qualifier keyword in Java
The @Qualifier keyword in Java is used to disambiguate beans when multiple beans of the same type are present in the Spring application context.
Used in Spring framework to specify which bean should be autowired when multiple beans of the same type are present
Can be used on fields, constructor arguments, or method parameters
Example: @Qualifier("beanName")
Q8. To remove duplicates in list
Use a Set data structure to remove duplicates from a list of strings.
Create a Set to store unique elements
Iterate through the list and add each element to the Set
Convert the Set back to a list to get the list without duplicates
Cloud Developer Jobs
Interview Questions of Similar Designations
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month