Microsoft Corporation
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.
Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.
Developed by MIT in the 1980s
Uses symmetric key cryptography
Involves a Key Distribution Center (KDC)
Prevents eavesdropping and replay attacks
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.
Client sends a SYN (synchronize) packet to the server to initiate a connection
Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request
Client sends an ACK (acknowledgment) packet back to the server to confirm the connection
TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.
TLS encrypts data to ensure confidentiality during transmission.
It uses cryptographic algorithms to authenticate the parties involved in the communication.
TLS also provides mechanisms for data integrity to prevent tampering.
Handshake process involves negotiation of encryption algorithms and exchange o...
VCN stands for Virtual Cloud Network, which is a customizable and private network in the cloud.
VCN allows you to define your own IP address range, subnets, route tables, and gateways.
It provides isolation and security for your cloud resources.
You can connect multiple VCNs together or to your on-premises network using VPN or dedicated connections.
I applied via Job Portal
I was interviewed in Jul 2023.
To rectify a PC generating broadcast, check for misconfigured network settings, update network drivers, disable unnecessary services, and monitor network traffic.
Check for misconfigured network settings such as incorrect IP address or subnet mask
Update network drivers to ensure compatibility and stability
Disable unnecessary services or applications that may be causing excessive network traffic
Monitor network traffic us...
Types of network cables include Ethernet, coaxial, fiber optic, and twisted pair cables.
Ethernet cables are commonly used for wired networks and come in categories like Cat5, Cat6, and Cat7.
Coaxial cables are often used for cable television and internet connections.
Fiber optic cables use light to transmit data and are known for their high speed and reliability.
Twisted pair cables, such as Cat5e and Cat6, are commonly u...
Stacking is a method of connecting multiple network switches to increase performance, redundancy, and manageability.
Stacking allows multiple switches to be managed as a single entity
It provides increased bandwidth and redundancy by combining the capabilities of multiple switches
Stacking simplifies network management tasks by allowing configuration changes to be applied to all switches in the stack at once
I applied via Naukri.com and was interviewed in Feb 2023. There were 2 interview rounds.
An aptitude test is a measure of your ability to learn or perform required tasks and succeed in the environment you're in.
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.
Firewall is a security system that filters network traffic based on predetermined security rules.
Gateway is a node that acts as an entry and exit point for data between two networks.
Firewall can be a software program or a hardware device, while gateway is typical...
To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.
Implement firewalls to filter out malicious traffic
Use intrusion detection systems to detect and block suspicious activity
Implement rate limiting to prevent overwhelming the network with excessive requests
I applied via LinkedIn and was interviewed before Aug 2022. There were 3 interview rounds.
Had a good knowledge with oracle aptitude test
Switches operate at layer 2 of the OSI model, forwarding data based on MAC addresses. Routers operate at layer 3, forwarding data based on IP addresses.
Switches operate at layer 2 of the OSI model, while routers operate at layer 3.
Switches forward data based on MAC addresses, while routers forward data based on IP addresses.
Switches are used to create LANs, while routers are used to connect different networks.
Switches ...
I applied via Naukri.com and was interviewed before Aug 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Mar 2022. There were 2 interview rounds.
SOC stands for Security Operations Center. It is a centralized unit that monitors and manages an organization's security posture.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor the organization's network, systems, and applications.
SOC analysts investigate security alerts and incidents to determine their severity and impact.
They also dev...
based on 1 interview
Interview experience
Software Engineer
1.9k
salaries
| ₹13 L/yr - ₹50 L/yr |
Senior Software Engineer
1.1k
salaries
| ₹25 L/yr - ₹85 L/yr |
Software Engineer2
1k
salaries
| ₹20 L/yr - ₹70 L/yr |
Consultant
599
salaries
| ₹13 L/yr - ₹36.7 L/yr |
Support Engineer
578
salaries
| ₹7.7 L/yr - ₹30 L/yr |
Amazon
Deloitte
TCS