Add office photos
Engaged Employer

Capgemini

3.8
based on 38.8k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

10+ Micro Technologies Interview Questions and Answers

Updated 20 Nov 2024
Popular Designations

Q1. What is dns? & What will u do secure a website?

Ans.

DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.

  • DNS is used to resolve domain names to IP addresses

  • It works by querying DNS servers to find the IP address associated with a domain name

  • To secure a website, one can use SSL/TLS certificates to encrypt data transmitted between the website and the user

  • Other security measures include implementing firewalls, using strong passwords, and keeping software up to date

Add your answer

Q2. Otn frame structure Fec in otn and Dwdm component

Ans.

OTN frame structure includes FEC for error correction and DWDM components for multiplexing.

  • OTN frame structure consists of a header and payload.

  • FEC (Forward Error Correction) is used for error correction in OTN.

  • DWDM (Dense Wavelength Division Multiplexing) components are used for multiplexing in OTN.

  • OTN frame structure is standardized by ITU-T G.709.

  • OTN is widely used in long-haul optical networks.

Add your answer

Q3. What is CSMA/CD, and how does this thing work in real life, give an example.

Ans.

CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is a network protocol used in Ethernet networks to avoid data collisions.

  • CSMA/CD is used in Ethernet networks to regulate access to the network medium.

  • Before sending data, a device using CSMA/CD listens to the network to check if it is busy.

  • If the network is clear, the device sends the data. If a collision is detected, the device stops transmitting and waits for a random amount of time before trying...read more

Add your answer

Q4. How arp generate and its packet flow across the network?

Ans.

ARP generates and sends packets to map IP addresses to MAC addresses in a network.

  • ARP request is broadcasted to all devices on the network

  • The device with the matching IP address responds with its MAC address

  • ARP table is updated with the IP-MAC mapping

  • ARP packets have source and destination MAC addresses, IP addresses, and ARP operation code

Add your answer
Discover Micro Technologies interview dos and don'ts from real experiences

Q5. What is malloc and calloc function

Ans.

malloc and calloc are functions in C programming used for dynamic memory allocation.

  • malloc function is used to allocate a single block of memory of a specified size.

  • calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.

  • Example: int *ptr = (int*)malloc(5 * sizeof(int));

  • Example: int *ptr = (int*)calloc(5, sizeof(int));

Add your answer

Q6. Wap for check your name is palindrome not

Ans.

A program to check if a given name is a palindrome or not.

  • Convert the name to lowercase to handle case-insensitivity

  • Remove any spaces or special characters from the name

  • Reverse the name and compare it with the original name to check for palindrome

Add your answer
Are these interview questions helpful?

Q7. Tell about the TCP/IP layer.

Ans.

TCP/IP is a protocol suite used for communication between devices on the internet.

  • TCP/IP has four layers: application, transport, internet, and network access.

  • The application layer includes protocols like HTTP, FTP, and SMTP.

  • The transport layer includes TCP and UDP protocols.

  • The internet layer is responsible for routing packets between networks.

  • The network access layer includes protocols like Ethernet and Wi-Fi.

  • TCP/IP is the foundation of the internet and is used for communic...read more

View 1 answer

Q8. How would deal with angry customers?

Ans.

I would listen to their concerns, empathize with them, and work towards finding a solution to address their issues.

  • Listen actively to understand the root cause of their anger

  • Empathize with their situation and show understanding

  • Apologize for any inconvenience caused and assure them that you will work towards resolving the issue

  • Offer solutions or alternatives to address their concerns

  • Follow up with the customer to ensure their satisfaction with the resolution

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What's firewall?

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic.

  • It acts as a barrier between a trusted internal network and an untrusted external network

  • It can be hardware, software, or a combination of both

  • It can be configured to block or allow traffic based on predefined rules

  • Examples include Cisco ASA, Fortinet FortiGate, and Palo Alto Networks firewall

Add your answer

Q10. difference between unicasting, Multicasting, Broadcasting.

Ans.

Unicasting sends data from one sender to one receiver, Multicasting sends data from one sender to multiple receivers, Broadcasting sends data from one sender to all receivers in the network.

  • Unicasting is one-to-one communication.

  • Multicasting is one-to-many communication.

  • Broadcasting is one-to-all communication.

  • Unicasting is used in TCP connections.

  • Multicasting is used in streaming video or audio to multiple users.

  • Broadcasting is used in network discovery protocols like ARP.

  • Ex...read more

Add your answer

Q11. What is VPN?

Ans.

VPN stands for Virtual Private Network. It is a secure and encrypted connection between two networks or devices over the internet.

  • VPN allows remote access to a private network over the internet

  • It provides security and privacy by encrypting the data transmitted

  • VPN can be used to bypass geo-restrictions and access content not available in your region

  • Examples of VPNs include OpenVPN, Cisco AnyConnect, and NordVPN

Add your answer

Q12. Tell about the BGP

Ans.

BGP stands for Border Gateway Protocol. It is a routing protocol used to exchange routing information between different networks.

  • BGP is used to connect different autonomous systems (AS) on the internet.

  • It is a path-vector protocol that selects the best path for data to travel based on policies set by network administrators.

  • BGP uses TCP port 179 for communication between routers.

  • BGP is used by internet service providers (ISPs) to connect to each other and exchange routing info...read more

Add your answer

Q13. Write a code for Binary search

Ans.

Binary search code implementation in Python

  • Define a function that takes a sorted array and a target value as input

  • Initialize two pointers, low and high, to the start and end of the array respectively

  • While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target

  • If array[mid] is equal to target, return mid

  • If array[mid] is less than target, update low to mid + 1

  • If array[mid] is greater than target, update high to mid - 1

  • If target i...read more

Add your answer

Q14. Wap for palindrome number

Ans.

A palindrome number is a number that remains the same when its digits are reversed.

  • Convert the number to a string

  • Reverse the string

  • Check if the reversed string is equal to the original string

Add your answer

Q15. Add two numbers by function

Ans.

Create a function to add two numbers

  • Define a function that takes two parameters as input

  • Inside the function, add the two numbers together and return the result

  • Example: function addNumbers(num1, num2) { return num1 + num2; }

Add your answer

Q16. Explain OSI modal.

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with the adjacent layers.

  • For example, the Physical layer deals with the physical connection between devices, while th...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Micro Technologies

based on 10 interviews in the last 1 year
1 Interview rounds
Technical Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Network Engineer Interview Questions from Similar Companies

3.7
 • 30 Interview Questions
4.0
 • 24 Interview Questions
3.9
 • 17 Interview Questions
3.7
 • 17 Interview Questions
4.2
 • 14 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter