Cloud Engineer
100+ Cloud Engineer Interview Questions and Answers
Q51. Why use events in Cloudwatch in AWS?
Events in CloudWatch are used to monitor and respond to changes in AWS resources and applications.
Events help in detecting and responding to operational changes in real-time.
They can trigger automated actions or notifications based on predefined rules.
Events can be used to monitor resource state changes, API calls, and system events.
They enable proactive troubleshooting and help in maintaining system health.
CloudWatch Events can integrate with various AWS services for seamles...read more
Q52. SQL to convert case to upper Union and Union all Decorators Generators
SQL query to convert case to upper, Union and Union all, Decorators, Generators
Use the UPPER() function in SQL to convert case to upper
UNION combines the result sets of two or more SELECT statements
UNION ALL also combines the result sets of two or more SELECT statements, including duplicates
Decorators in Python are used to modify or extend the behavior of functions or methods
Generators in Python are functions that return an iterator object
Q53. How was you Coding round ?
The coding round was challenging but I managed to complete it within the given time.
The coding round consisted of multiple programming questions.
I had to write code for various scenarios such as sorting, searching, and data manipulation.
I used my problem-solving skills to come up with efficient solutions.
I made sure to test my code thoroughly before submitting it.
Overall, it was a good experience and I learned a lot from it.
Q54. What is ELB? How many types are there?
ELB stands for Elastic Load Balancer. There are three types of ELB: Classic Load Balancer, Application Load Balancer, and Network Load Balancer.
ELB is a service provided by AWS to distribute incoming traffic across multiple EC2 instances.
Classic Load Balancer operates at both the request and connection level.
Application Load Balancer operates at the application layer and supports advanced routing features.
Network Load Balancer operates at the transport layer and is designed t...read more
Q55. Why do RDS and EC2 need a snapshots
RDS and EC2 need snapshots for data backup, disaster recovery, and creating new instances.
Snapshots provide a point-in-time backup of data stored in RDS and EC2 instances.
Snapshots are essential for disaster recovery in case of data loss or system failure.
Snapshots can be used to create new instances or restore existing ones to a previous state.
Snapshots help in scaling resources by creating copies of existing instances.
Snapshots can also be used for testing and development p...read more
Q56. There was two coding Fibonacci series Second largest
The candidate is asked to write code for generating Fibonacci series and finding the second largest number in an array.
For Fibonacci series, start with 0 and 1, then add the previous two numbers to get the next number in the series.
To find the second largest number in an array, sort the array in descending order and return the element at index 1.
Share interview questions and help millions of jobseekers 🌟
Q57. what is tf.state file
tf.state file is a file used by Terraform to store the current state of the infrastructure being managed.
The tf.state file is used to keep track of the resources that Terraform is managing.
It contains information about the current state of the infrastructure, such as the IDs of resources and their current configuration.
The tf.state file is created when you run 'terraform apply' and is updated every time you make changes to your infrastructure.
It is important to keep the tf.st...read more
Q58. Kinds of Storage account and its use case scenario
Types of storage accounts include Blob storage, File storage, Table storage, and Queue storage, each with specific use cases.
Blob storage: used for storing large amounts of unstructured data like images, videos, and documents
File storage: used for file sharing in the cloud, supports SMB protocol
Table storage: used for storing structured NoSQL data
Queue storage: used for reliable messaging between application components
Cloud Engineer Jobs
Q59. Antivirus software configuration and functional
Antivirus software configuration and functionality
Antivirus software should be configured to perform regular scans of the system
It should be set to automatically update virus definitions
It should have real-time protection enabled
Quarantine and removal options should be configured
Exclusions should be set for trusted files and directories
Q60. which automation tools you have worked
I have worked with automation tools such as Ansible, Terraform, and Jenkins.
Ansible
Terraform
Jenkins
Q61. Terraform state file usage
Terraform state file is used to store the state of your infrastructure managed by Terraform.
Terraform state file keeps track of the resources created by Terraform.
It helps Terraform understand the current state of the infrastructure.
State file is stored locally by default, but can also be stored remotely for collaboration.
It should be stored securely to prevent unauthorized access or modifications.
Q62. What is Iaas,Saas,Paas ?
IaaS, SaaS, and PaaS are cloud computing models that provide different levels of infrastructure, platform, and software services.
IaaS (Infrastructure as a Service) provides virtualized computing resources over the internet, such as servers, storage, and networking.
PaaS (Platform as a Service) provides a platform for developing, testing, and deploying applications without the need for infrastructure management.
SaaS (Software as a Service) provides software applications over th...read more
Q63. What do you mean TCP & UDP
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two different protocols used for transmitting data over the internet.
TCP is a connection-oriented protocol that guarantees delivery of data packets in the correct order.
UDP is a connectionless protocol that does not guarantee delivery of data packets or their order.
TCP is used for applications that require reliable and ordered delivery of data, such as web browsing and email.
UDP is used for applications ...read more
Q64. How to configure alerting for snapshot
Configure alerting for snapshot involves setting up monitoring tools to track snapshot creation, deletion, and status.
Use monitoring tools like CloudWatch, Prometheus, or Grafana to track snapshot creation, deletion, and status
Set up alerts based on predefined thresholds for snapshot age, size, or frequency
Configure notifications to be sent via email, SMS, or integration with incident management systems
Regularly review and adjust alerting configurations based on changing requ...read more
Q65. What is Az Acitve Directory ?
Azure Active Directory is a cloud-based identity and access management service provided by Microsoft.
Cloud-based identity and access management service
Allows users to sign in and access resources
Integrates with various Microsoft services like Office 365
Provides single sign-on capabilities
Supports multi-factor authentication
Q66. Explian about how to setup DR
DR setup involves identifying critical systems, selecting a DR site, replicating data, and testing the plan regularly.
Identify critical systems and prioritize them based on their importance
Select a DR site that is geographically distant from the primary site
Replicate data to the DR site using technologies like backup and recovery, replication, or clustering
Test the DR plan regularly to ensure it works as expected and make necessary adjustments
Consider factors like RPO and RTO...read more
Q67. What is the OSI Model?
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with adjacent layers.
For example, HTTP operates at...read more
Q68. Mention types of Services
Types of services in cloud computing include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (IaaS) provides virtualized computing resources such as virtual machines, storage, and networks.
Platform as a Service (PaaS) offers a platform for developing, testing, and deploying applications without the need to manage the underlying infrastructure.
Software as a Service (SaaS) delivers software applicati...read more
Q69. How to implement backup policies
Implementing backup policies involves defining backup frequency, retention periods, storage locations, and testing procedures.
Define backup frequency based on data criticality and change rate
Set retention periods for backups to meet compliance requirements
Choose appropriate storage locations for backups (on-premises, cloud, off-site)
Establish testing procedures to ensure backups are successful and can be restored
Automate backup processes to reduce human error and ensure consi...read more
Q70. How to monitor and log in AWS
Monitoring and logging in AWS involves using services like CloudWatch and CloudTrail.
Use CloudWatch to monitor AWS resources and applications in real-time.
Set up CloudWatch Alarms to receive notifications when certain thresholds are met.
Utilize CloudTrail to log all API calls made within your AWS account for auditing and compliance purposes.
Q71. Models and advantage of cloud
Cloud models include SaaS, PaaS, and IaaS. Advantages include scalability, cost-effectiveness, and accessibility.
SaaS (Software as a Service) allows users to access software applications through the internet.
PaaS (Platform as a Service) provides a platform for developers to build and deploy applications.
IaaS (Infrastructure as a Service) offers virtualized computing resources such as servers and storage.
Scalability allows for easy expansion or reduction of resources as needed...read more
Q72. Ask diff between list and touple
List is mutable and ordered while tuple is immutable and ordered.
Lists can be modified while tuples cannot.
Lists are defined using square brackets [] while tuples use parentheses ().
Lists are used for collections of data that need to be changed while tuples are used for fixed collections of data.
Example of a list: my_list = [1, 2, 3]
Example of a tuple: my_tuple = (1, 2, 3)
Q73. which cloud you have worked on
I have worked on AWS, Azure, and Google Cloud Platform.
Worked extensively on AWS services such as EC2, S3, RDS, and Lambda
Experience with Azure services like Virtual Machines, Blob Storage, and Azure Functions
Familiar with Google Cloud Platform services including Compute Engine, Cloud Storage, and Cloud Functions
Q74. what is GCP and its fetaures
GCP (Google Cloud Platform) is a suite of cloud computing services provided by Google.
Offers computing, storage, databases, machine learning, and more
Provides tools for data analytics, IoT, and AI
Supports serverless computing with Google Cloud Functions
Allows for easy scalability and flexibility
Offers a global network of data centers for low-latency performance
Q75. What is resourcs group ?
A resource group is a logical container in Azure that holds related resources for an application or solution.
Resource groups help manage and organize resources in Azure.
Resources within a resource group can be managed collectively, such as applying tags or permissions.
Resource groups can be used to deploy, manage, and monitor resources as a group.
Resource groups can span multiple regions and subscriptions.
Deleting a resource group will also delete all resources within it.
Q76. What is VNet ? Etc...
VNet stands for Virtual Network in Azure. It allows you to securely connect Azure resources together.
VNet is a representation of your own network in the cloud.
It allows you to control your own IP address range, DNS settings, security policies, and route tables.
You can connect VNets together, or connect an on-premises network to a VNet using VPN or ExpressRoute.
VNets are isolated from each other to ensure secure communication.
Azure resources like VMs, App Services, and databas...read more
Q77. what is OOPS concept?
OOPS (Object-Oriented Programming) concept is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain data and methods to manipulate that data.
Encapsulation, inheritance, polymorphism, and abstraction are key principles of OOPS.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Inheritance allows one class to inherit properties and behavior from another class.
Polymorphism enables objects to...read more
Q78. what is pros and cons of cloud
Pros and cons of cloud computing
Pros: scalability, cost-effectiveness, flexibility, automatic updates
Cons: security concerns, dependency on internet connection, potential downtime
Q79. What is cloud storage?
Cloud storage is a service that allows users to store and access data remotely over the internet.
Cloud storage provides scalable and flexible storage options.
Data is stored on remote servers maintained by a cloud service provider.
Users can access their data from anywhere with an internet connection.
Cloud storage eliminates the need for physical storage devices.
Examples of cloud storage providers include Amazon S3, Google Drive, and Dropbox.
Q80. Examples of serverless architecture
Serverless architecture is a cloud computing model where the cloud provider manages the infrastructure and automatically allocates resources.
AWS Lambda
Azure Functions
Google Cloud Functions
Firebase
IBM OpenWhisk
Kubeless
Q81. What is Azure VM ?
Azure VM is a virtual machine offered by Microsoft Azure cloud computing platform.
Azure VM allows users to create and manage virtual machines in the cloud.
Users can choose from a variety of VM sizes and configurations based on their needs.
Azure VMs can run Windows or Linux operating systems.
Users can easily scale up or down their VMs based on demand.
Azure VMs can be used for a wide range of applications, from development and testing to production workloads.
Q82. what is Tcp/ip
TCP/IP is a set of protocols used for communication between devices on the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
It is a suite of communication protocols used for transmitting data over the internet.
TCP is responsible for establishing a connection between devices and ensuring data is delivered without errors.
IP is responsible for routing data packets to their intended destination.
Examples of TCP/IP protocols include HTTP, FTP, and SMTP.
Q83. What is ip
IP stands for Internet Protocol. It is a set of rules that governs the format of data sent over the internet.
IP is responsible for routing data packets between devices on a network.
It assigns a unique address to each device on the network, known as an IP address.
There are two versions of IP: IPv4 and IPv6.
IPv4 addresses are 32-bit numbers, while IPv6 addresses are 128-bit numbers.
IP is a fundamental protocol of the internet and is used by all devices that connect to it.
Q84. Discuss technologies you have used
I have experience with AWS, Azure, Docker, Kubernetes, and Terraform.
AWS - Used for cloud computing services
Azure - Used for cloud services and solutions
Docker - Used for containerization
Kubernetes - Used for container orchestration
Terraform - Used for infrastructure as code
Q85. What is a pointer
A pointer is a variable that stores the memory address of another variable.
Pointers are used to indirectly access the value of a variable.
They are commonly used in programming languages like C and C++.
Example: int *ptr; // declaring a pointer to an integer variable
Q86. What is function
A function is a block of code that performs a specific task when called upon.
Functions can take input parameters and return output values.
Functions help in organizing code into reusable blocks.
Examples include functions to calculate the square root of a number or to sort an array.
Q87. What is integer
An integer is a whole number that does not have a fractional or decimal part.
Integers can be positive, negative, or zero.
Examples of integers include -3, 0, 7, and 100.
Integers are used in programming for tasks like counting and indexing.
Q88. How automation works
Automation involves using technology to perform tasks without human intervention.
Automation involves creating scripts or programs to execute repetitive tasks.
It can be achieved through tools like Ansible, Puppet, or Chef.
Automation helps in improving efficiency, reducing errors, and saving time.
Examples include automating server provisioning, software deployment, and monitoring tasks.
Q89. What is automation
Automation is the use of technology to perform tasks with minimal human intervention.
Automation involves using software or hardware to complete repetitive tasks efficiently.
It can streamline processes, reduce errors, and increase productivity.
Examples include automated testing, deployment pipelines, and infrastructure provisioning.
Q90. What is curl command
curl command is a tool used to transfer data to or from a server using various protocols like HTTP, HTTPS, FTP, etc.
curl command is a command line tool used to transfer data with URLs
It supports various protocols like HTTP, HTTPS, FTP, etc.
It can be used to send requests to servers and receive responses
Example: curl https://www.example.com -X GET
Q91. What is opps In java
Opps in Java stands for Object-Oriented Programming concepts.
Opps in Java refers to the principles of Object-Oriented Programming such as Inheritance, Encapsulation, Polymorphism, and Abstraction.
It allows for creating modular, reusable, and maintainable code by organizing data and behavior into objects.
Example: Creating classes and objects, using inheritance to create subclasses, and implementing interfaces.
Q92. Percentage of marks I acquired
I acquired 85% marks in my academic studies.
I received 85% marks in my academic studies.
I consistently performed well in my courses and exams.
My academic achievements reflect my dedication and hard work.
Q93. what is AD and RBAC
AD stands for Active Directory, a directory service developed by Microsoft for Windows domain networks. RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to users or groups.
AD is used to store information about network resources such as computers, users, and groups.
RBAC allows administrators to define roles with specific permissions and assign users or groups to those roles.
Example: An administrator can create a role for...read more
Q94. How can creat PST.
To create a PST file, you can use Microsoft Outlook or third-party software.
Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.
Name the file and choose a location to save it.
Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.
Make sure to regularly back up your PST files to prevent data loss.
Q95. What is fsmo role.
FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
These roles are responsible for performing specific tasks within the Active Directory environment.
For example, the PDC Emulator role is responsible for time synchronization in the domain.
Q96. Wat is cloud computing
Cloud computing is the delivery of computing services over the internet, including storage, databases, networking, software, and more.
Cloud computing allows users to access and use resources on-demand without the need for physical infrastructure.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
It offers scalability, flexibility, cost-effectiveness, and increased efficiency for businesses and individuals.
Cloud c...read more
Q97. SQL to find duplicates
SQL query to find duplicates in a table
Use GROUP BY and HAVING clause to identify duplicates
Select the columns you want to check for duplicates
Use COUNT() function to count the occurrences of each group
Q98. Daily work procedure
My daily work procedure involves monitoring and maintaining cloud infrastructure, troubleshooting issues, and implementing new solutions.
Check system logs and alerts for any issues
Respond to any incidents or service requests
Collaborate with development teams to deploy new applications
Implement security measures to protect data and systems
Perform regular backups and disaster recovery tests
Q99. Tools of cloud
Tools used in cloud computing for managing and deploying applications and infrastructure.
Amazon Web Services (AWS)
Microsoft Azure
Google Cloud Platform (GCP)
Docker
Kubernetes
Ansible
Terraform
Jenkins
Git
Nagios
Q100. Online vs offline studies
Online studies offer flexibility and convenience, while offline studies provide a more traditional learning environment.
Online studies allow for flexibility in scheduling and location
Offline studies offer face-to-face interaction with instructors and classmates
Online studies may require more self-discipline and motivation
Offline studies may have more structured schedules and deadlines
Combining online and offline studies can provide a well-rounded learning experience
Interview Questions of Similar Designations
Top Interview Questions for Cloud Engineer Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month