Cloud Engineer
90+ Cloud Engineer Interview Questions and Answers
Q1. Can you please elaborate the best practices of Authentication and Authorisation for the web based applications ?
Best practices for Authentication and Authorization in web applications
Use strong encryption for storing passwords
Implement multi-factor authentication for added security
Regularly update and patch authentication systems
Implement role-based access control to restrict user permissions
Use secure protocols like HTTPS for data transmission
Q2. Tell me about where the AWS is use and why this service are using?
AWS is used for cloud computing, storage, and database management.
AWS provides scalable and cost-effective solutions for businesses and organizations.
It is used for hosting websites, running applications, and storing data.
AWS offers a wide range of services including EC2, S3, RDS, and Lambda.
It is used by companies like Netflix, Airbnb, and NASA.
AWS is also used for disaster recovery, backup, and data analytics.
Cloud Engineer Interview Questions and Answers for Freshers
Q3. SQL query : Write a query to find the employees from employee table whose middle name is 'Mohan' and have salary more than 2 lac
Query to find employees with middle name 'Mohan' and salary over 2 lac.
Use SELECT statement to retrieve data from employee table
Use WHERE clause to filter employees with middle name 'Mohan' and salary over 2 lac
Example: SELECT * FROM employee WHERE middle_name = 'Mohan' AND salary > 200000
Q4. Have you ever involved in configuring Architecture for web based application ?
Yes, I have experience configuring architecture for web-based applications.
Designed and implemented scalable architecture for a web-based e-commerce platform
Utilized cloud services like AWS to optimize performance and cost
Worked with microservices architecture to improve flexibility and maintainability
Q5. What were the best monitoring tools available in Cloud providers and how it actually works?
Some of the best monitoring tools in Cloud providers include AWS CloudWatch, Google Stackdriver, and Azure Monitor.
AWS CloudWatch provides monitoring for AWS resources and applications, with features like customizable dashboards, alarms, and logs.
Google Stackdriver offers monitoring, logging, and diagnostics for Google Cloud Platform, as well as AWS and Azure.
Azure Monitor provides monitoring and analytics for applications and infrastructure on Azure, with features like metri...read more
Q6. Python - how to read txt file and convert to structed data
Use Python to read a txt file and convert its contents into structured data.
Open the txt file using the 'open' function in Python.
Read the contents of the file using the 'read' method.
Parse the data into structured format such as dictionaries or lists.
Share interview questions and help millions of jobseekers 🌟
Q7. Can you please explain the difference between Blue-Green deployments ?
Blue-Green deployments involve switching between two identical production environments to minimize downtime and risk.
Blue-Green deployments involve having two identical production environments - one 'blue' and one 'green'.
During a deployment, traffic is routed to one environment (e.g. blue) while the other environment (e.g. green) is updated with new code or changes.
Once the green environment is updated and tested, traffic is switched to the green environment, making it the n...read more
Q8. why we use vpc and subnets,firewall, expalin briefly
VPC and subnets are used to create isolated network environments in the cloud. Firewalls are used to control network traffic.
VPC (Virtual Private Cloud) allows users to create their own virtual network in the cloud, providing isolation and control over network resources.
Subnets are subdivisions of a VPC and allow for further segmentation and organization of resources.
Firewalls are used to enforce security policies and control inbound and outbound network traffic.
Firewalls can...read more
Cloud Engineer Jobs
Q9. End to end process for migration for physical machine to cloud
The end to end process for migrating a physical machine to the cloud involves several steps.
Assess the physical machine's compatibility with the cloud environment
Choose a cloud provider and create an account
Select the appropriate cloud service and instance type
Create a virtual machine image of the physical machine
Upload the image to the cloud provider
Configure the virtual machine and network settings
Test the migrated machine for functionality and performance
Redirect traffic t...read more
Q10. How will you explain a non technical person technical stuff ?
I would use analogies and simple language to explain technical concepts to non-technical people.
Use analogies to relate technical concepts to everyday experiences
Avoid using technical jargon and use simple language
Provide visual aids such as diagrams or flowcharts
Encourage questions and feedback to ensure understanding
Use real-life examples to illustrate technical concepts
Q11. Count the common occurrence of elements of list A and list B
Count common elements in two lists
Iterate through both lists and count occurrences of each element
Use a dictionary to store counts of elements in both lists
Return the common elements and their counts
Q12. If you lost gui of Jenkins server what will do to analyse previous jobs?
I would access Jenkins logs and use command line interface to analyze previous jobs.
Access Jenkins logs to gather information on previous jobs
Use command line interface to view job status and output
Check job history to identify any issues or errors
Use Jenkins API to retrieve job information
Consider restoring a backup of the Jenkins server if necessary
Q13. Can we install docker inside docker
Yes, it is possible to install Docker inside Docker using a feature called Docker-in-Docker (DinD).
Docker-in-Docker (DinD) allows you to run a Docker container inside another Docker container.
It is commonly used for testing and development environments where nested containers are required.
To enable DinD, you need to mount the Docker socket inside the container and run the container with the necessary privileges.
Keep in mind that running Docker inside Docker can have performan...read more
Q14. Can you increase the size of the root volume without shutting down the instance?
Yes, you can increase the size of the root volume without shutting down the instance.
To increase the size of the root volume, you can use the AWS Management Console, AWS CLI, or AWS SDKs.
For example, using the AWS CLI, you can use the 'modify-instance-attribute' command to modify the 'BlockDeviceMappings' attribute of the instance.
You can specify the new size for the root volume and apply the changes without requiring a shutdown.
After modifying the root volume size, you may n...read more
Q15. If you lost the pem file then how will you connect to EC2?
To connect to EC2 without the pem file, create a new key pair, associate it with the instance, and then connect using the new key pair.
Create a new key pair in the EC2 console or using the AWS CLI.
Stop the EC2 instance for which the pem file is lost.
Detach the root volume from the instance.
Launch a new EC2 instance and associate the detached root volume with it.
Create a new key pair and associate it with the new instance.
Start the new instance and connect using the new key pa...read more
Q16. Difference between interpretation and complied language?
Interpreted languages are executed directly, while compiled languages are translated into machine code before execution.
Interpreted languages are easier to debug and modify.
Compiled languages are faster and more efficient.
Examples of interpreted languages include Python and JavaScript.
Examples of compiled languages include C++ and Java.
Q17. How to secure web application traffic ?
Secure web application traffic by using HTTPS, implementing firewalls, and regularly updating security patches.
Implement HTTPS to encrypt data transmitted between the web application and users
Use firewalls to monitor and control incoming and outgoing traffic
Regularly update security patches to protect against vulnerabilities
Implement multi-factor authentication for added security
Utilize web application firewalls to protect against common web application attacks
Q18. What do you know about AWS?
AWS is a cloud computing platform that provides a wide range of services for computing, storage, and databases.
AWS stands for Amazon Web Services
It offers services like EC2, S3, RDS, Lambda, etc.
AWS provides a pay-as-you-go pricing model
It has a global infrastructure with data centers in multiple regions
AWS offers security and compliance features like IAM, KMS, and CloudTrail
Q19. What is cloud computing
Cloud computing is the delivery of computing services over the internet.
Cloud computing allows users to access and use computing resources on-demand, such as storage, processing power, and software applications.
It eliminates the need for physical infrastructure and provides scalability, flexibility, and cost-effectiveness.
Examples include cloud storage services like Dropbox, cloud-based productivity tools like Google Docs, and cloud platforms like Amazon Web Services (AWS).
Q20. why linux is preferred instead of windows OS in IT high security system?
Linux is preferred over Windows in high security systems due to its open-source nature, strong security features, and minimal attack surface.
Linux is open-source, allowing for greater transparency and customization to meet security needs.
Linux has a strong permission system, making it easier to control access to sensitive data and resources.
Linux has a smaller attack surface compared to Windows, reducing the risk of vulnerabilities being exploited.
Linux distributions like Cen...read more
Q21. Describe any one project in detail with code manipulation
Developed a cloud-based data analytics platform using Python and AWS services
Used AWS Lambda functions for serverless computing
Implemented data processing pipelines with AWS Glue and S3
Utilized Python libraries like Pandas and NumPy for data analysis
Q22. WAP to convert a string into uppercase and lowercase
A program to convert a string into uppercase and lowercase.
Use built-in functions like toUpperCase() and toLowerCase() to convert the string.
Iterate through each character of the string and convert it to uppercase or lowercase accordingly.
Ensure to handle special characters and spaces appropriately.
Q23. How did you overcome fault tolerance issues of Cloud in AWS
I implemented fault tolerance in AWS by using multiple Availability Zones, auto-scaling groups, and load balancers.
Utilized multiple Availability Zones to ensure redundancy and minimize downtime in case of failures in one zone
Implemented auto-scaling groups to automatically adjust capacity based on traffic patterns and maintain performance
Configured load balancers to distribute traffic evenly across instances and prevent overload on any single instance
Q24. What is the difference between VPC-level security and system-level security?
VPC-level security focuses on securing the network infrastructure, while system-level security focuses on securing individual systems.
VPC-level security involves configuring network access control lists (ACLs), security groups, and network traffic routing.
System-level security involves securing individual instances or virtual machines by implementing firewalls, antivirus software, and access controls.
VPC-level security protects the entire network infrastructure, while system-...read more
Q25. what are the services you have worked on aws and thier use case?
I have worked on AWS services such as EC2, S3, RDS, Lambda, and CloudFormation for various use cases.
EC2 - for hosting applications and websites
S3 - for storing and retrieving large amounts of data
RDS - for managing relational databases
Lambda - for serverless computing and running code without provisioning or managing servers
CloudFormation - for automating the deployment of infrastructure as code
Q26. what is GIT and GIT commands like push, pull, etc.
GIT is a version control system used for tracking changes in code. Push and pull are commands used to sync code between repositories.
GIT is used to manage and track changes in code
Push command is used to upload changes to a remote repository
Pull command is used to download changes from a remote repository
Other GIT commands include commit, branch, merge, and clone
GIT is commonly used in software development to collaborate on code with multiple team members
Q27. What is Blob immutablity and it's uses and draw backs
Blob immutability refers to the characteristic of not being able to be modified once created. It is commonly used for storing data that should not be altered.
Blob immutability ensures data integrity by preventing unauthorized changes
It is commonly used for storing sensitive data like audit logs, financial records, and legal documents
Drawbacks include the inability to update or delete data once it is stored
Q28. What is cloud?
Cloud is a network of remote servers that store, manage, and process data, accessible via the internet.
Cloud refers to a network of servers located in data centers around the world.
It allows users to store and access data, run applications, and perform computing tasks remotely.
Cloud services are provided by companies like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Examples include cloud storage services like Dropbox, Google Drive, and iCloud.
Cloud c...read more
Q29. Hot to decide which location should be preferable to deploy a machine.
The location for deploying a machine should be decided based on factors like latency, data sovereignty, cost, and regulatory compliance.
Consider latency - Choose a location closer to end users to reduce latency.
Data sovereignty - Ensure compliance with data protection laws by deploying in a location that meets regulatory requirements.
Cost - Evaluate the cost of deployment in different locations, including infrastructure and operational expenses.
Regulatory compliance - Conside...read more
Q30. How do you do vpc peering if you have 20VPC's?
VPC peering can be done using AWS console or CLI for each pair of VPCs.
Create a VPC peering connection for each pair of VPCs
Accept the peering request on the other side
Update the route tables to allow traffic between the peered VPCs
Ensure that the CIDR blocks of the VPCs do not overlap
Consider using a transit VPC for better management of multiple VPCs
Q31. How can you implement disaster recovery solution on AWS
Implementing disaster recovery solution on AWS involves using services like AWS Backup, AWS Storage Gateway, and creating backup snapshots.
Utilize AWS Backup to automate and manage backups of your AWS resources.
Set up AWS Storage Gateway to replicate data to AWS for disaster recovery purposes.
Create backup snapshots of your EC2 instances and EBS volumes for quick recovery in case of a disaster.
Q32. What is the difference between EBS, S3, and EFS?
EBS, S3, and EFS are storage services in AWS. EBS is block-level storage, S3 is object storage, and EFS is file storage.
EBS is attached to EC2 instances and provides persistent block storage.
S3 is a scalable object storage service for storing and retrieving data.
EFS is a fully managed file storage service that can be accessed by multiple EC2 instances simultaneously.
Q33. What is Blob and blob tier is Azure storage
Blob is a type of data storage in Azure Storage, and blob tier is a way to manage the access and cost of storing blobs.
Blob is a type of object storage in Azure Storage used for storing unstructured data.
Blob tier in Azure Storage allows you to manage the access and cost of storing blobs by specifying the access tier (hot, cool, or archive).
Hot access tier is for frequently accessed data, cool access tier is for infrequently accessed data, and archive access tier is for rarel...read more
Q34. What is hierarchicalname space what is used for.
Hierarchical namespace is a way of organizing data in a tree-like structure for easier management and access.
Hierarchical namespace organizes data in a tree structure with parent and child relationships.
It helps in categorizing and managing data efficiently.
Examples include file systems where folders contain files, and DNS where domain names are organized hierarchically.
Q35. What is soft delete and point in time restore
Soft delete is a feature that allows data to be marked as deleted without actually removing it, while point in time restore is the ability to restore data to a specific point in time.
Soft delete retains data in case it needs to be recovered later
Point in time restore allows data to be restored to a specific timestamp
Soft delete is commonly used in databases to prevent accidental data loss
Point in time restore is useful for recovering data to a specific state before an error o...read more
Q36. What is ZRS and GRS redundancy is azure storage.
ZRS and GRS are redundancy options in Azure Storage for data durability and availability.
ZRS (Zone-redundant storage) replicates data across multiple availability zones within a region for high durability and availability.
GRS (Geo-redundant storage) replicates data to a secondary region, providing data redundancy across regions for disaster recovery.
ZRS is suitable for scenarios requiring high availability within a region, while GRS is ideal for disaster recovery and data res...read more
Q37. What cloud services have you used before?
I have experience using AWS, Azure, and Google Cloud Platform for various projects.
AWS - Amazon Web Services
Azure - Microsoft Azure
Google Cloud Platform
Q38. What is how to patching vm to vm in Azure
Patching VM to VM in Azure involves applying updates and patches to virtual machines to ensure security and performance.
Use Azure Update Management to automate patching across multiple VMs
Create a patch deployment schedule to specify when updates should be applied
Configure update classifications and products to determine which updates to install
Monitor patch compliance and review deployment status
Use Azure Automation to run scripts for custom patching requirements
Q39. Do you think VPC Peering is complex architecture.
VPC Peering can be complex due to network configurations and security considerations.
VPC Peering involves connecting two separate VPCs to communicate with each other using private IP addresses.
It requires careful planning of IP address ranges to avoid conflicts.
Security groups and route tables need to be properly configured to allow traffic between peered VPCs.
Transitive peering is not supported, meaning VPC A cannot communicate with VPC C through VPC B if A and C are not dir...read more
Q40. Tell me about oops concept?
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects.
OOPs focuses on creating objects that contain both data and functions to manipulate that data.
It emphasizes on encapsulation, inheritance, and polymorphism.
Encapsulation is the process of hiding the implementation details of an object from the outside world.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows objects to take on multiple f...read more
Q41. What do you mean by cloud
Cloud refers to the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection
Cloud services are typically provided by third-party companies, such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform
Cloud computing offers scalability, flexibility, and cost savings compared to tradi...read more
Q42. Who are the big cloud providers
The big cloud providers are Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and IBM Cloud.
Amazon Web Services (AWS) - the most popular cloud provider with a wide range of services
Microsoft Azure - offers a hybrid cloud solution and integrates well with Microsoft products
Google Cloud Platform (GCP) - known for its machine learning and data analytics capabilities
IBM Cloud - offers a variety of cloud deployment models and specializes in enterprise-level ...read more
Q43. What is IAAS ,PAAS ,SAAS
IAAS, PAAS, and SAAS are different models of cloud computing that provide varying levels of infrastructure, platform, and software services.
IAAS (Infrastructure as a Service) provides virtualized computing resources over the internet, such as virtual machines, storage, and networks.
PAAS (Platform as a Service) offers a platform for developing, testing, and deploying applications without worrying about infrastructure management.
SAAS (Software as a Service) delivers software ap...read more
Q44. Firewall configuration and function
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network (e.g. the Internet) that is not assumed to be secure.
It can be hardware, software, or a combination of both.
Firewall rules can be configured to allow or block traffic based on IP addresses, ports, protocols, and other criteria.
Firewalls can also be ...read more
Q45. What is a lambda, what is the use of it?
A lambda is a function that can be executed without being explicitly declared or defined.
A lambda is an anonymous function in programming.
It is used to write concise and efficient code.
Lambdas are often used in functional programming languages.
They can be used as arguments to higher-order functions.
Lambdas are commonly used in cloud computing platforms like AWS Lambda.
Q46. Why use events in Cloudwatch in AWS?
Events in CloudWatch are used to monitor and respond to changes in AWS resources and applications.
Events help in detecting and responding to operational changes in real-time.
They can trigger automated actions or notifications based on predefined rules.
Events can be used to monitor resource state changes, API calls, and system events.
They enable proactive troubleshooting and help in maintaining system health.
CloudWatch Events can integrate with various AWS services for seamles...read more
Q47. SQL to convert case to upper Union and Union all Decorators Generators
SQL query to convert case to upper, Union and Union all, Decorators, Generators
Use the UPPER() function in SQL to convert case to upper
UNION combines the result sets of two or more SELECT statements
UNION ALL also combines the result sets of two or more SELECT statements, including duplicates
Decorators in Python are used to modify or extend the behavior of functions or methods
Generators in Python are functions that return an iterator object
Q48. How was you Coding round ?
The coding round was challenging but I managed to complete it within the given time.
The coding round consisted of multiple programming questions.
I had to write code for various scenarios such as sorting, searching, and data manipulation.
I used my problem-solving skills to come up with efficient solutions.
I made sure to test my code thoroughly before submitting it.
Overall, it was a good experience and I learned a lot from it.
Q49. What is ELB? How many types are there?
ELB stands for Elastic Load Balancer. There are three types of ELB: Classic Load Balancer, Application Load Balancer, and Network Load Balancer.
ELB is a service provided by AWS to distribute incoming traffic across multiple EC2 instances.
Classic Load Balancer operates at both the request and connection level.
Application Load Balancer operates at the application layer and supports advanced routing features.
Network Load Balancer operates at the transport layer and is designed t...read more
Q50. Why do RDS and EC2 need a snapshots
RDS and EC2 need snapshots for data backup, disaster recovery, and creating new instances.
Snapshots provide a point-in-time backup of data stored in RDS and EC2 instances.
Snapshots are essential for disaster recovery in case of data loss or system failure.
Snapshots can be used to create new instances or restore existing ones to a previous state.
Snapshots help in scaling resources by creating copies of existing instances.
Snapshots can also be used for testing and development p...read more
Interview Questions of Similar Designations
Top Interview Questions for Cloud Engineer Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month