Cloud Engineer

90+ Cloud Engineer Interview Questions and Answers

Updated 16 Dec 2024

Popular Companies

search-icon

Q1. Can you please elaborate the best practices of Authentication and Authorisation for the web based applications ?

Ans.

Best practices for Authentication and Authorization in web applications

  • Use strong encryption for storing passwords

  • Implement multi-factor authentication for added security

  • Regularly update and patch authentication systems

  • Implement role-based access control to restrict user permissions

  • Use secure protocols like HTTPS for data transmission

Q2. Tell me about where the AWS is use and why this service are using?

Ans.

AWS is used for cloud computing, storage, and database management.

  • AWS provides scalable and cost-effective solutions for businesses and organizations.

  • It is used for hosting websites, running applications, and storing data.

  • AWS offers a wide range of services including EC2, S3, RDS, and Lambda.

  • It is used by companies like Netflix, Airbnb, and NASA.

  • AWS is also used for disaster recovery, backup, and data analytics.

Cloud Engineer Interview Questions and Answers for Freshers

illustration image

Q3. SQL query : Write a query to find the employees from employee table whose middle name is 'Mohan' and have salary more than 2 lac

Ans.

Query to find employees with middle name 'Mohan' and salary over 2 lac.

  • Use SELECT statement to retrieve data from employee table

  • Use WHERE clause to filter employees with middle name 'Mohan' and salary over 2 lac

  • Example: SELECT * FROM employee WHERE middle_name = 'Mohan' AND salary > 200000

Q4. Have you ever involved in configuring Architecture for web based application ?

Ans.

Yes, I have experience configuring architecture for web-based applications.

  • Designed and implemented scalable architecture for a web-based e-commerce platform

  • Utilized cloud services like AWS to optimize performance and cost

  • Worked with microservices architecture to improve flexibility and maintainability

Are these interview questions helpful?

Q5. What were the best monitoring tools available in Cloud providers and how it actually works?

Ans.

Some of the best monitoring tools in Cloud providers include AWS CloudWatch, Google Stackdriver, and Azure Monitor.

  • AWS CloudWatch provides monitoring for AWS resources and applications, with features like customizable dashboards, alarms, and logs.

  • Google Stackdriver offers monitoring, logging, and diagnostics for Google Cloud Platform, as well as AWS and Azure.

  • Azure Monitor provides monitoring and analytics for applications and infrastructure on Azure, with features like metri...read more

Q6. Python - how to read txt file and convert to structed data

Ans.

Use Python to read a txt file and convert its contents into structured data.

  • Open the txt file using the 'open' function in Python.

  • Read the contents of the file using the 'read' method.

  • Parse the data into structured format such as dictionaries or lists.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. Can you please explain the difference between Blue-Green deployments ?

Ans.

Blue-Green deployments involve switching between two identical production environments to minimize downtime and risk.

  • Blue-Green deployments involve having two identical production environments - one 'blue' and one 'green'.

  • During a deployment, traffic is routed to one environment (e.g. blue) while the other environment (e.g. green) is updated with new code or changes.

  • Once the green environment is updated and tested, traffic is switched to the green environment, making it the n...read more

Q8. why we use vpc and subnets,firewall, expalin briefly

Ans.

VPC and subnets are used to create isolated network environments in the cloud. Firewalls are used to control network traffic.

  • VPC (Virtual Private Cloud) allows users to create their own virtual network in the cloud, providing isolation and control over network resources.

  • Subnets are subdivisions of a VPC and allow for further segmentation and organization of resources.

  • Firewalls are used to enforce security policies and control inbound and outbound network traffic.

  • Firewalls can...read more

Cloud Engineer Jobs

SRE Cloud Engineer 5-10 years
Ford India Private Limited
4.4
Chennai
Cloud Engineer 5-8 years
Infosys
3.7
₹ 7 L/yr - ₹ 9 L/yr
Pune
Cloud Engineer - Middleware 2-7 years
CGI Information Systems and Management Consultants
4.0
Mumbai

Q9. End to end process for migration for physical machine to cloud

Ans.

The end to end process for migrating a physical machine to the cloud involves several steps.

  • Assess the physical machine's compatibility with the cloud environment

  • Choose a cloud provider and create an account

  • Select the appropriate cloud service and instance type

  • Create a virtual machine image of the physical machine

  • Upload the image to the cloud provider

  • Configure the virtual machine and network settings

  • Test the migrated machine for functionality and performance

  • Redirect traffic t...read more

Q10. How will you explain a non technical person technical stuff ?

Ans.

I would use analogies and simple language to explain technical concepts to non-technical people.

  • Use analogies to relate technical concepts to everyday experiences

  • Avoid using technical jargon and use simple language

  • Provide visual aids such as diagrams or flowcharts

  • Encourage questions and feedback to ensure understanding

  • Use real-life examples to illustrate technical concepts

Q11. Count the common occurrence of elements of list A and list B

Ans.

Count common elements in two lists

  • Iterate through both lists and count occurrences of each element

  • Use a dictionary to store counts of elements in both lists

  • Return the common elements and their counts

Q12. If you lost gui of Jenkins server what will do to analyse previous jobs?

Ans.

I would access Jenkins logs and use command line interface to analyze previous jobs.

  • Access Jenkins logs to gather information on previous jobs

  • Use command line interface to view job status and output

  • Check job history to identify any issues or errors

  • Use Jenkins API to retrieve job information

  • Consider restoring a backup of the Jenkins server if necessary

Q13. Can we install docker inside docker

Ans.

Yes, it is possible to install Docker inside Docker using a feature called Docker-in-Docker (DinD).

  • Docker-in-Docker (DinD) allows you to run a Docker container inside another Docker container.

  • It is commonly used for testing and development environments where nested containers are required.

  • To enable DinD, you need to mount the Docker socket inside the container and run the container with the necessary privileges.

  • Keep in mind that running Docker inside Docker can have performan...read more

Q14. Can you increase the size of the root volume without shutting down the instance?

Ans.

Yes, you can increase the size of the root volume without shutting down the instance.

  • To increase the size of the root volume, you can use the AWS Management Console, AWS CLI, or AWS SDKs.

  • For example, using the AWS CLI, you can use the 'modify-instance-attribute' command to modify the 'BlockDeviceMappings' attribute of the instance.

  • You can specify the new size for the root volume and apply the changes without requiring a shutdown.

  • After modifying the root volume size, you may n...read more

Q15. If you lost the pem file then how will you connect to EC2?

Ans.

To connect to EC2 without the pem file, create a new key pair, associate it with the instance, and then connect using the new key pair.

  • Create a new key pair in the EC2 console or using the AWS CLI.

  • Stop the EC2 instance for which the pem file is lost.

  • Detach the root volume from the instance.

  • Launch a new EC2 instance and associate the detached root volume with it.

  • Create a new key pair and associate it with the new instance.

  • Start the new instance and connect using the new key pa...read more

Q16. Difference between interpretation and complied language?

Ans.

Interpreted languages are executed directly, while compiled languages are translated into machine code before execution.

  • Interpreted languages are easier to debug and modify.

  • Compiled languages are faster and more efficient.

  • Examples of interpreted languages include Python and JavaScript.

  • Examples of compiled languages include C++ and Java.

Q17. How to secure web application traffic ?

Ans.

Secure web application traffic by using HTTPS, implementing firewalls, and regularly updating security patches.

  • Implement HTTPS to encrypt data transmitted between the web application and users

  • Use firewalls to monitor and control incoming and outgoing traffic

  • Regularly update security patches to protect against vulnerabilities

  • Implement multi-factor authentication for added security

  • Utilize web application firewalls to protect against common web application attacks

Q18. What do you know about AWS?

Ans.

AWS is a cloud computing platform that provides a wide range of services for computing, storage, and databases.

  • AWS stands for Amazon Web Services

  • It offers services like EC2, S3, RDS, Lambda, etc.

  • AWS provides a pay-as-you-go pricing model

  • It has a global infrastructure with data centers in multiple regions

  • AWS offers security and compliance features like IAM, KMS, and CloudTrail

Q19. What is cloud computing

Ans.

Cloud computing is the delivery of computing services over the internet.

  • Cloud computing allows users to access and use computing resources on-demand, such as storage, processing power, and software applications.

  • It eliminates the need for physical infrastructure and provides scalability, flexibility, and cost-effectiveness.

  • Examples include cloud storage services like Dropbox, cloud-based productivity tools like Google Docs, and cloud platforms like Amazon Web Services (AWS).

Frequently asked in, ,

Q20. why linux is preferred instead of windows OS in IT high security system?

Ans.

Linux is preferred over Windows in high security systems due to its open-source nature, strong security features, and minimal attack surface.

  • Linux is open-source, allowing for greater transparency and customization to meet security needs.

  • Linux has a strong permission system, making it easier to control access to sensitive data and resources.

  • Linux has a smaller attack surface compared to Windows, reducing the risk of vulnerabilities being exploited.

  • Linux distributions like Cen...read more

Q21. Describe any one project in detail with code manipulation

Ans.

Developed a cloud-based data analytics platform using Python and AWS services

  • Used AWS Lambda functions for serverless computing

  • Implemented data processing pipelines with AWS Glue and S3

  • Utilized Python libraries like Pandas and NumPy for data analysis

Q22. WAP to convert a string into uppercase and lowercase

Ans.

A program to convert a string into uppercase and lowercase.

  • Use built-in functions like toUpperCase() and toLowerCase() to convert the string.

  • Iterate through each character of the string and convert it to uppercase or lowercase accordingly.

  • Ensure to handle special characters and spaces appropriately.

Q23. How did you overcome fault tolerance issues of Cloud in AWS

Ans.

I implemented fault tolerance in AWS by using multiple Availability Zones, auto-scaling groups, and load balancers.

  • Utilized multiple Availability Zones to ensure redundancy and minimize downtime in case of failures in one zone

  • Implemented auto-scaling groups to automatically adjust capacity based on traffic patterns and maintain performance

  • Configured load balancers to distribute traffic evenly across instances and prevent overload on any single instance

Q24. What is the difference between VPC-level security and system-level security?

Ans.

VPC-level security focuses on securing the network infrastructure, while system-level security focuses on securing individual systems.

  • VPC-level security involves configuring network access control lists (ACLs), security groups, and network traffic routing.

  • System-level security involves securing individual instances or virtual machines by implementing firewalls, antivirus software, and access controls.

  • VPC-level security protects the entire network infrastructure, while system-...read more

Q25. what are the services you have worked on aws and thier use case?

Ans.

I have worked on AWS services such as EC2, S3, RDS, Lambda, and CloudFormation for various use cases.

  • EC2 - for hosting applications and websites

  • S3 - for storing and retrieving large amounts of data

  • RDS - for managing relational databases

  • Lambda - for serverless computing and running code without provisioning or managing servers

  • CloudFormation - for automating the deployment of infrastructure as code

Q26. what is GIT and GIT commands like push, pull, etc.

Ans.

GIT is a version control system used for tracking changes in code. Push and pull are commands used to sync code between repositories.

  • GIT is used to manage and track changes in code

  • Push command is used to upload changes to a remote repository

  • Pull command is used to download changes from a remote repository

  • Other GIT commands include commit, branch, merge, and clone

  • GIT is commonly used in software development to collaborate on code with multiple team members

Q27. What is Blob immutablity and it's uses and draw backs

Ans.

Blob immutability refers to the characteristic of not being able to be modified once created. It is commonly used for storing data that should not be altered.

  • Blob immutability ensures data integrity by preventing unauthorized changes

  • It is commonly used for storing sensitive data like audit logs, financial records, and legal documents

  • Drawbacks include the inability to update or delete data once it is stored

Q28. What is cloud?

Ans.

Cloud is a network of remote servers that store, manage, and process data, accessible via the internet.

  • Cloud refers to a network of servers located in data centers around the world.

  • It allows users to store and access data, run applications, and perform computing tasks remotely.

  • Cloud services are provided by companies like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

  • Examples include cloud storage services like Dropbox, Google Drive, and iCloud.

  • Cloud c...read more

Q29. Hot to decide which location should be preferable to deploy a machine.

Ans.

The location for deploying a machine should be decided based on factors like latency, data sovereignty, cost, and regulatory compliance.

  • Consider latency - Choose a location closer to end users to reduce latency.

  • Data sovereignty - Ensure compliance with data protection laws by deploying in a location that meets regulatory requirements.

  • Cost - Evaluate the cost of deployment in different locations, including infrastructure and operational expenses.

  • Regulatory compliance - Conside...read more

Q30. How do you do vpc peering if you have 20VPC's?

Ans.

VPC peering can be done using AWS console or CLI for each pair of VPCs.

  • Create a VPC peering connection for each pair of VPCs

  • Accept the peering request on the other side

  • Update the route tables to allow traffic between the peered VPCs

  • Ensure that the CIDR blocks of the VPCs do not overlap

  • Consider using a transit VPC for better management of multiple VPCs

Q31. How can you implement disaster recovery solution on AWS

Ans.

Implementing disaster recovery solution on AWS involves using services like AWS Backup, AWS Storage Gateway, and creating backup snapshots.

  • Utilize AWS Backup to automate and manage backups of your AWS resources.

  • Set up AWS Storage Gateway to replicate data to AWS for disaster recovery purposes.

  • Create backup snapshots of your EC2 instances and EBS volumes for quick recovery in case of a disaster.

Q32. What is the difference between EBS, S3, and EFS?

Ans.

EBS, S3, and EFS are storage services in AWS. EBS is block-level storage, S3 is object storage, and EFS is file storage.

  • EBS is attached to EC2 instances and provides persistent block storage.

  • S3 is a scalable object storage service for storing and retrieving data.

  • EFS is a fully managed file storage service that can be accessed by multiple EC2 instances simultaneously.

Q33. What is Blob and blob tier is Azure storage

Ans.

Blob is a type of data storage in Azure Storage, and blob tier is a way to manage the access and cost of storing blobs.

  • Blob is a type of object storage in Azure Storage used for storing unstructured data.

  • Blob tier in Azure Storage allows you to manage the access and cost of storing blobs by specifying the access tier (hot, cool, or archive).

  • Hot access tier is for frequently accessed data, cool access tier is for infrequently accessed data, and archive access tier is for rarel...read more

Q34. What is hierarchicalname space what is used for.

Ans.

Hierarchical namespace is a way of organizing data in a tree-like structure for easier management and access.

  • Hierarchical namespace organizes data in a tree structure with parent and child relationships.

  • It helps in categorizing and managing data efficiently.

  • Examples include file systems where folders contain files, and DNS where domain names are organized hierarchically.

Q35. What is soft delete and point in time restore

Ans.

Soft delete is a feature that allows data to be marked as deleted without actually removing it, while point in time restore is the ability to restore data to a specific point in time.

  • Soft delete retains data in case it needs to be recovered later

  • Point in time restore allows data to be restored to a specific timestamp

  • Soft delete is commonly used in databases to prevent accidental data loss

  • Point in time restore is useful for recovering data to a specific state before an error o...read more

Q36. What is ZRS and GRS redundancy is azure storage.

Ans.

ZRS and GRS are redundancy options in Azure Storage for data durability and availability.

  • ZRS (Zone-redundant storage) replicates data across multiple availability zones within a region for high durability and availability.

  • GRS (Geo-redundant storage) replicates data to a secondary region, providing data redundancy across regions for disaster recovery.

  • ZRS is suitable for scenarios requiring high availability within a region, while GRS is ideal for disaster recovery and data res...read more

Q37. What cloud services have you used before?

Ans.

I have experience using AWS, Azure, and Google Cloud Platform for various projects.

  • AWS - Amazon Web Services

  • Azure - Microsoft Azure

  • Google Cloud Platform

Q38. What is how to patching vm to vm in Azure

Ans.

Patching VM to VM in Azure involves applying updates and patches to virtual machines to ensure security and performance.

  • Use Azure Update Management to automate patching across multiple VMs

  • Create a patch deployment schedule to specify when updates should be applied

  • Configure update classifications and products to determine which updates to install

  • Monitor patch compliance and review deployment status

  • Use Azure Automation to run scripts for custom patching requirements

Q39. Do you think VPC Peering is complex architecture.

Ans.

VPC Peering can be complex due to network configurations and security considerations.

  • VPC Peering involves connecting two separate VPCs to communicate with each other using private IP addresses.

  • It requires careful planning of IP address ranges to avoid conflicts.

  • Security groups and route tables need to be properly configured to allow traffic between peered VPCs.

  • Transitive peering is not supported, meaning VPC A cannot communicate with VPC C through VPC B if A and C are not dir...read more

Q40. Tell me about oops concept?

Ans.

OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects.

  • OOPs focuses on creating objects that contain both data and functions to manipulate that data.

  • It emphasizes on encapsulation, inheritance, and polymorphism.

  • Encapsulation is the process of hiding the implementation details of an object from the outside world.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism allows objects to take on multiple f...read more

Q41. What do you mean by cloud

Ans.

Cloud refers to the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection

  • Cloud services are typically provided by third-party companies, such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform

  • Cloud computing offers scalability, flexibility, and cost savings compared to tradi...read more

Q42. Who are the big cloud providers

Ans.

The big cloud providers are Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and IBM Cloud.

  • Amazon Web Services (AWS) - the most popular cloud provider with a wide range of services

  • Microsoft Azure - offers a hybrid cloud solution and integrates well with Microsoft products

  • Google Cloud Platform (GCP) - known for its machine learning and data analytics capabilities

  • IBM Cloud - offers a variety of cloud deployment models and specializes in enterprise-level ...read more

Q43. What is IAAS ,PAAS ,SAAS

Ans.

IAAS, PAAS, and SAAS are different models of cloud computing that provide varying levels of infrastructure, platform, and software services.

  • IAAS (Infrastructure as a Service) provides virtualized computing resources over the internet, such as virtual machines, storage, and networks.

  • PAAS (Platform as a Service) offers a platform for developing, testing, and deploying applications without worrying about infrastructure management.

  • SAAS (Software as a Service) delivers software ap...read more

Q44. Firewall configuration and function

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewall acts as a barrier between a trusted, secure internal network and another network (e.g. the Internet) that is not assumed to be secure.

  • It can be hardware, software, or a combination of both.

  • Firewall rules can be configured to allow or block traffic based on IP addresses, ports, protocols, and other criteria.

  • Firewalls can also be ...read more

Q45. What is a lambda, what is the use of it?

Ans.

A lambda is a function that can be executed without being explicitly declared or defined.

  • A lambda is an anonymous function in programming.

  • It is used to write concise and efficient code.

  • Lambdas are often used in functional programming languages.

  • They can be used as arguments to higher-order functions.

  • Lambdas are commonly used in cloud computing platforms like AWS Lambda.

Q46. Why use events in Cloudwatch in AWS?

Ans.

Events in CloudWatch are used to monitor and respond to changes in AWS resources and applications.

  • Events help in detecting and responding to operational changes in real-time.

  • They can trigger automated actions or notifications based on predefined rules.

  • Events can be used to monitor resource state changes, API calls, and system events.

  • They enable proactive troubleshooting and help in maintaining system health.

  • CloudWatch Events can integrate with various AWS services for seamles...read more

Q47. SQL to convert case to upper Union and Union all Decorators Generators

Ans.

SQL query to convert case to upper, Union and Union all, Decorators, Generators

  • Use the UPPER() function in SQL to convert case to upper

  • UNION combines the result sets of two or more SELECT statements

  • UNION ALL also combines the result sets of two or more SELECT statements, including duplicates

  • Decorators in Python are used to modify or extend the behavior of functions or methods

  • Generators in Python are functions that return an iterator object

Q48. How was you Coding round ?

Ans.

The coding round was challenging but I managed to complete it within the given time.

  • The coding round consisted of multiple programming questions.

  • I had to write code for various scenarios such as sorting, searching, and data manipulation.

  • I used my problem-solving skills to come up with efficient solutions.

  • I made sure to test my code thoroughly before submitting it.

  • Overall, it was a good experience and I learned a lot from it.

Q49. What is ELB? How many types are there?

Ans.

ELB stands for Elastic Load Balancer. There are three types of ELB: Classic Load Balancer, Application Load Balancer, and Network Load Balancer.

  • ELB is a service provided by AWS to distribute incoming traffic across multiple EC2 instances.

  • Classic Load Balancer operates at both the request and connection level.

  • Application Load Balancer operates at the application layer and supports advanced routing features.

  • Network Load Balancer operates at the transport layer and is designed t...read more

Q50. Why do RDS and EC2 need a snapshots

Ans.

RDS and EC2 need snapshots for data backup, disaster recovery, and creating new instances.

  • Snapshots provide a point-in-time backup of data stored in RDS and EC2 instances.

  • Snapshots are essential for disaster recovery in case of data loss or system failure.

  • Snapshots can be used to create new instances or restore existing ones to a previous state.

  • Snapshots help in scaling resources by creating copies of existing instances.

  • Snapshots can also be used for testing and development p...read more

1
2
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions for Cloud Engineer Related Skills

Interview experiences of popular companies

3.7
 • 10k Interviews
3.9
 • 7.8k Interviews
3.7
 • 7.3k Interviews
3.8
 • 2.8k Interviews
3.6
 • 2.3k Interviews
4.1
 • 2.3k Interviews
4.3
 • 147 Interviews
3.1
 • 132 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Cloud Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter