Top 20 Cloud Computing Interview Questions in 2022 for Fresher’s
Q1. What is Cloud Computing?
It is a trending technology that allows the cloud to supply services internationally based on the needs of the users. It allows you to connect to servers all around the world.
Q2. What is a Cloud?
A cloud is a networking, hardware, service, storing, and application combination that aids in the delivery of computing as a service. It is used by three people:
- Business management personnel.
- Providers of cloud services.
Q3. Mention the layers of PaaS architecture.
- Creates virtual machine instances and controllers automatically.
- Applications are deployed.
- Provides access to services.
- Scales upwards and downwards automatically.
Services for storing items
- No SQL.
- Storing in blocks.
Storage Services for Programs
- Simple-to-implement apps.
- Easier failures recovery.
Q4. What is Function as a Service?
FaaS provides customers with a perfectly functioning framework on which to design, administer, and execute business applications without having to be concerned about infrastructure maintenance.
Q5. Who are the cloud consumers in a cloud ecosystem?
People and teams inside your business who employ various sorts of cloud services.
Q6. Who are the direct consumers in a cloud ecosystem?
Individuals that use your company’s service construct within a virtual environment.
Q7. Who are the Cloud service providers in a cloud ecosystem?
Cloud service providers are businesses that market cloud capabilities to others. These businesses may also offer cloud services to their partners, employees, and others.
Q8. What are microservices and how it is important to cloud?
Microservices assist in the creation of applications comprised of programming that is independently of each other and the platform on which it was created. Microservices are critical in the cloud for the following reasons:
- Each one is designed for a certain function. It enables application creation simpler.
- They facilitate and accelerate change, and their flexibility makes it easy to modify the services as required.
Q9. What is an AMI?
AMI stands for Amazon Machine Image, and it is essentially a duplicate of the root file system. It provides the information required to start an instantiation.
We use AMI by supplying an AMI every time we would like to launch an instance. Multipleversions that have the same configuration can be started from a single AMI.
Q10. Explain security management in terms of Cloud Computing.
- Identity management capability allows application services to be approved.
- Access control permission is granted to customers so that they may completely manage the accessibility of another customer who enters the cloud environment.
- Authentication and authorization allow only registered and registered users can access applications and data.
Q11. Mention the layers of Cloud Computing?
The following are the various levels employed by cloud architecture:
- Cloud Controller or CLC.
- Cluster Manager.
- Storage Manager (SM).
- Node Manager (NM).
Q12. Explain the difference between cloud and traditional data centers.
- Because of heating and hardware/software concerns, conventional data centres are costly. The majority of the money is spent on data centre upkeep.
- Because the cloud is built up in response to increased demand, such expense difficulties are avoided in cloud computing.
Q13. What is Edge Computing?
The distributed software framework includes edge computing. It puts businesses closer to data sources. It benefits organizations by providing them with greater insights, faster reaction times, and more bandwidth.
Q14. What are the uses of APIs in cloud services?
- APIs (Application Programming Interfaces) are used to avoid the need for whole programmes to be written.
- Instructions for communicating between one or more applications are offered here.
- The creation of apps for connecting cloud services to other systems is made simple and accessible.
Q15. Mention different data center deployments of Cloud Computing.
Cloud computing is made up of the following data centres:
- Containerized data centres:
Containerized data centres are packages containing a complete suite of servers, networking equipment, and storage that are distributed to big warehouse-type facilities. Each deployment is relatively unique in this case.
- Low-density data centres:
Containerized data centres encourage high density, which generates a lot of heat and causes a lot of technical problems. The solution to this challenge is low-density data centres. The equipment is placed widely apart in order to cool the produced heat.
Q16. What are the building blocks of cloud architecture?
- Reference architecture
- Technical architecture
- Deployment operation architecture
Q17. What is AWS?
AWS is an abbreviation for Amazon Web Services, a set of remotely computing services commonly known as Cloud Computing. This technology is also referred to as IaaS or Infrastructure as a Service.
Q18. Mention the key components of AWS.
AWS’s primary components are as follows:
- AWS Route 53:
AWS Route 53 is a web-based DNS (Domain Name Server) service platform.
- Basic E-mail Service:
E-mail is sent via a RESTFUL API call or even using conventional SMTP (Simple Mail Transfer Protocol).
- Identity and Access Management:
An AWS account comes with increased security and access control.
- Simple Storage Device (S3):
This is a massive storage medium that is commonly utilized by AWS services.
- Elastic Compute Cloud (EC2):
This service provides on-demand computing capacity for hosting applications and is particularly suitable for unexpected workloads.
- Elastic Block Stores (EBS):
These are storage volumes that are linked to EC2 and allow the data lifespan of a single EC2 to be extended.
Amazon CloudWatch is utilized to manage Aws services, and it allows managers to observe and gather the keys necessary. Access is granted so that a monitoring alert could be established in the event of a problem.
Q19. Briefly explain how you can vertically scale an Amazon instance.
This is a critical aspect of AWS and cloud simulation. To start spinning a newly constructed big instances, pause it, and then disconnect and trash the root EBS disc from the server. Later, we halt our live instance and disconnect its root volume. We record the unique device ID, add the same root disc to the new server, and restart it. As a result, an Amazon instances is vertical extended.
Q20. Describe the security usage in the Amazon Web Services model.
AWS offers security groups, and permission is granted to build a security group for a jump box with SSH access restricted to port 22. A webserver group and a database group are then formed. The webserver group supplies ports 80 and 443, however only port 22 will be critical among the jump box group. The database group accepts webserver groups port 3306 and jump box group port 22. Any computer added to the webserver group can be stored in the database. No one can SSH into any of our boxes.