Add office photos
Employer?
Claim Account for FREE

NTT

4.0
based on 698 Reviews
Video summary
Filter interviews by

40+ Microsoft Corporation Interview Questions and Answers

Updated 10 Oct 2024
Popular Designations

Q1. Why do you want to join NTT? What is the function of Pre-sales? Which project management tools used? And lots of other project management related to the point questions and some behaviour questions were asked.

Add your answer

Q2. What are the model of software engineerwat

Ans.

The models of software engineering refer to different approaches or methodologies used in software development.

  • Waterfall model

  • Agile model

  • Iterative model

  • Spiral model

  • V-model

View 1 answer

Q3. What is DATA structure

Ans.

A data structure is a way of organizing and storing data in a computer so that it can be accessed and manipulated efficiently.

  • Data structures provide a means to manage and organize data in a logical and efficient manner.

  • They define the relationship between the data, allowing for easy retrieval and modification.

  • Examples of data structures include arrays, linked lists, stacks, queues, trees, and graphs.

View 1 answer

Q4. Definition of java and benifit of java

Ans.

Java is a popular programming language known for its platform independence and extensive libraries.

  • Java is an object-oriented language that allows developers to write code once and run it on any platform.

  • It provides a robust and secure environment for developing and executing applications.

  • Java has a vast collection of libraries and frameworks that simplify development and enhance productivity.

  • It supports multithreading, allowing concurrent execution of tasks.

  • Java is widely us...read more

View 1 answer
Discover Microsoft Corporation interview dos and don'ts from real experiences

Q5. How to allow or disallow a networking port in Azure server

Ans.

To allow or disallow a networking port in Azure server, you can use Network Security Groups (NSG) to control inbound and outbound traffic.

  • Create a Network Security Group (NSG) in Azure portal

  • Associate the NSG with the Azure server or subnet

  • Define inbound and outbound security rules to allow or disallow specific ports

  • Priority of rules determines which rule takes precedence

  • Use Azure PowerShell or Azure CLI to manage NSG rules

Add your answer

Q6. What is software engineer (se)

Ans.

A software engineer is a professional who designs, develops, and maintains software applications.

  • Software engineers use programming languages and tools to create software solutions.

  • They analyze user requirements and design software architecture.

  • Software engineers write code, test and debug software, and ensure its functionality.

  • They collaborate with other team members and follow software development best practices.

  • Examples of software engineers include backend developers, fro...read more

View 1 answer
Are these interview questions helpful?

Q7. What is operating system

Ans.

An operating system is a software that manages computer hardware and software resources and provides common services for computer programs.

  • Manages computer hardware and software resources

  • Provides common services for computer programs

  • Controls and coordinates computer operations

  • Acts as an intermediary between users and computer hardware

  • Examples: Windows, macOS, Linux, Android, iOS

View 1 answer

Q8. Explain resk management system

Ans.

A risk management system is a software tool or platform that helps organizations identify, assess, and mitigate risks.

  • A risk management system helps organizations identify potential risks and their impact on business operations.

  • It assesses the likelihood of risks occurring and the severity of their impact.

  • The system provides tools for documenting and tracking risks, assigning responsibilities, and implementing mitigation strategies.

  • It may include features like risk assessment...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. Characters of java script

Ans.

JavaScript characters include letters, numbers, symbols, and special characters.

  • JavaScript characters can be used to create strings, numbers, and perform operations.

  • Examples of JavaScript characters include 'a', '1', '$', and '&'.

View 1 answer

Q10. What are FSMO roles and state the functions

Ans.

FSMO roles are Flexible Single Master Operations roles in Active Directory that perform specific functions.

  • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • Schema Master - Controls all updates and modifications to the schema.

  • Domain Naming Master - Manages the addition or removal of domains in the forest.

  • RID Master - Allocates unique Relative Identifier (RID) pools to domain controllers.

  • PDC Emulator - Provides bac...read more

Add your answer

Q11. Explain bgp , brief introduction of mpls , basic router command, etc

Ans.

BGP is a routing protocol used to exchange routing information between different networks. MPLS is a protocol used for efficient data transfer. Basic router commands include show ip route, show interfaces, etc.

  • BGP stands for Border Gateway Protocol and is used to exchange routing information between different networks.

  • MPLS stands for Multiprotocol Label Switching and is used for efficient data transfer.

  • Basic router commands include show ip route, show interfaces, show running...read more

Add your answer

Q12. defiNe software testing

Ans.

Software testing is the process of evaluating a software system to identify defects or errors.

  • Software testing is essential to ensure the quality and reliability of software.

  • It involves executing the software with the intention of finding bugs or issues.

  • Testing can be done manually or using automated tools.

  • Different types of testing include unit testing, integration testing, system testing, and acceptance testing.

  • Examples of software testing tools include Selenium, JUnit, and...read more

View 1 answer

Q13. Exception handling in Java. How do you use it in selenium?

Add your answer

Q14. What is network and basic things which u will use

Ans.

A network is a group of interconnected devices that communicate with each other to share resources and information.

  • Basic things used in networking include routers, switches, hubs, and cables.

  • Network protocols such as TCP/IP, DNS, and DHCP are also essential.

  • Network security measures like firewalls and VPNs are important to protect against unauthorized access.

  • Monitoring tools like Wireshark and Nagios are used to troubleshoot network issues.

  • Networking concepts like subnetting,...read more

Add your answer

Q15. State the process to build a server in Azure

Ans.

To build a server in Azure, you need to follow a process involving creating a virtual machine, configuring settings, and deploying the server.

  • Create a virtual machine in the Azure portal

  • Choose the appropriate size and configuration for the server

  • Configure networking settings and security options

  • Deploy the virtual machine and install necessary software

  • Monitor the server performance and manage resources

Add your answer

Q16. What is the function of domain

Ans.

A domain is a group of network resources and devices that are managed by a centralized authority.

  • Domains help to organize and manage network resources such as computers, users, and printers.

  • They provide a centralized authentication and authorization mechanism for users to access resources.

  • Domains can be used to apply group policies and security settings across multiple devices.

  • Examples of domain controllers include Active Directory in Windows Server environments.

Add your answer

Q17. what is regression testing and performance testing

Ans.

Regression testing is retesting of software to ensure new code changes do not adversely affect existing functionality. Performance testing is testing to assess the speed, responsiveness, and stability of a system under a particular workload.

  • Regression testing ensures that new code changes do not introduce new bugs or issues in existing functionality.

  • Performance testing evaluates the speed, responsiveness, and stability of a system under specific workloads.

  • Regression testing i...read more

Add your answer

Q18. Tell me about Yourself Tell me about NTT What is networking What is router 7layer of OSI model

Ans.

I am a network enthusiast with a passion for learning and problem-solving. NTT is a global technology services company. Networking involves connecting devices to share information. A router is a device that forwards data packets between computer networks. The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • NTT is a leading global technology services company providing networking solutions.

  • Networki...read more

Add your answer

Q19. What AWS tools are you familiar with?

Ans.

I am familiar with AWS tools such as AWS CodePipeline, AWS CodeBuild, AWS CodeDeploy, AWS CloudFormation, AWS Config, and AWS Security Hub.

  • AWS CodePipeline

  • AWS CodeBuild

  • AWS CodeDeploy

  • AWS CloudFormation

  • AWS Config

  • AWS Security Hub

Add your answer

Q20. Explain detailed working of UPS, DG, Transformer.

Ans.

UPS, DG, and Transformer are electrical devices used for power backup and voltage regulation.

  • UPS (Uninterruptible Power Supply) provides backup power during power outages and voltage fluctuations.

  • DG (Diesel Generator) is used as a backup power source when the main power supply fails.

  • Transformer is used to step up or step down the voltage of an alternating current (AC) power supply.

  • UPS and DG are commonly used in data centers, hospitals, and other critical facilities to ensure...read more

Add your answer

Q21. What is APD situation

Ans.

APD situation refers to All Paths Down situation in VMware environments.

  • APD situation occurs when a storage device becomes inaccessible to the ESXi host.

  • This can lead to data corruption or loss if not handled properly.

  • Common causes of APD include storage array failures, network issues, or misconfigurations.

  • To handle APD situations, VMware recommends setting up proper monitoring and alerting systems.

  • It is important to have a solid disaster recovery plan in place to mitigate th...read more

Add your answer

Q22. How can you convince a customer?

Ans.

By understanding their needs, building trust, providing solutions, and offering value.

  • Listen actively to understand their needs and concerns.

  • Build trust by being knowledgeable, reliable, and transparent.

  • Provide tailored solutions that address their specific challenges.

  • Demonstrate the value of your product or service through case studies or testimonials.

  • Offer exceptional customer service to ensure satisfaction and loyalty.

Add your answer

Q23. What is group policy

Ans.

Group Policy is a feature in Windows Server that allows administrators to manage user and computer settings centrally.

  • Group Policy allows administrators to set rules and configurations for users and computers in a Windows Server environment

  • It helps in enforcing security settings, software installation policies, and other configurations across a network

  • Group Policy settings are applied to users and computers based on their membership in Active Directory groups

  • Administrators ca...read more

Add your answer

Q24. Write java code to get the Fibonacci series

Add your answer

Q25. Share experience Arcsight & Splunk tool

Ans.

Arcsight & Splunk are SIEM tools used for log management and security analytics.

  • Arcsight is a legacy SIEM tool used for log management and security analytics.

  • Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.

  • Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.

  • Arcsight has a complex architecture and requires more resources to manage compared to Splunk.

  • Splunk...read more

Add your answer

Q26. what is the defect life cycle

Ans.

Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing software defects.

  • Defect identification: Defects are identified through testing or user feedback.

  • Defect reporting: Defects are reported in a defect tracking system with details like steps to reproduce, severity, and priority.

  • Defect fixing: Developers analyze and fix the reported defects.

  • Defect retesting: Testers verify that the fixed defects are resolved.

  • Defect closing: Once the defects ...read more

Add your answer

Q27. why we use Ping command

Ans.

Ping command is used to test the reachability of a host on an IP network.

  • Ping command sends ICMP echo request packets to the target host

  • It waits for ICMP echo reply packets to confirm the host's availability

  • Ping command helps in troubleshooting network connectivity issues

  • It can also be used to measure round-trip time between the source and target host

Add your answer

Q28. What is LDAP server

Ans.

LDAP server stands for Lightweight Directory Access Protocol server, used for accessing and managing directory information.

  • LDAP server is a protocol used for accessing and managing directory information.

  • It allows users to query and update information in a directory service.

  • Commonly used for authentication and authorization purposes in network environments.

  • Examples of LDAP servers include Microsoft Active Directory and OpenLDAP.

Add your answer

Q29. difference between ipv4vand ipv6

Ans.

IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.

  • IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

  • IPv4 supports around 4.3 billion unique addresses while IPv6 supports an astronomical number of unique addresses.

  • IPv4 has a header length of 20 bytes while IPv6 has a fixed header length of 40 bytes.

  • IPv4 uses ARP (Address Resolution Protocol) for mappin...read more

Add your answer

Q30. Forecasting techniques

Ans.

Forecasting techniques involve using historical data and statistical models to predict future demand.

  • Time series analysis

  • Regression analysis

  • Exponential smoothing

  • Moving averages

  • Seasonal decomposition

  • Judgmental forecasting

  • Collaborative forecasting

Add your answer

Q31. Explain working of HVAC system.

Ans.

HVAC system regulates temperature, humidity and air quality in a building.

  • HVAC stands for Heating, Ventilation and Air Conditioning.

  • It uses a network of ducts and vents to circulate air throughout the building.

  • The system can be centralized or decentralized.

  • It can be controlled by a thermostat or a building automation system.

  • Examples of HVAC equipment include air handlers, chillers, boilers, and heat pumps.

Add your answer

Q32. Do you program in Python

Ans.

Yes, I am proficient in Python programming.

  • Yes, I have experience programming in Python for various projects.

  • I have used Python for automation, scripting, web development, and data analysis.

  • Familiar with popular Python libraries and frameworks like Django, Flask, and NumPy.

Add your answer

Q33. What are the layers of tcp

Ans.

TCP has four layers: Application, Transport, Internet, and Network Interface.

  • Application layer: Responsible for interacting with the user and providing network services.

  • Transport layer: Manages end-to-end communication and ensures data delivery.

  • Internet layer: Handles routing of data packets between networks.

  • Network Interface layer: Deals with the physical connection to the network.

Add your answer

Q34. What is windows patching

Ans.

Windows patching is the process of applying updates, fixes, and security patches to the Windows operating system.

  • Windows patching helps to keep the operating system secure and up-to-date.

  • Patches can include bug fixes, security updates, and new features.

  • Regular patching is important to protect against vulnerabilities and cyber attacks.

  • Examples of patching tools include Windows Update, WSUS (Windows Server Update Services), and SCCM (System Center Configuration Manager).

Add your answer

Q35. what is quality

Ans.

Quality is the measure of excellence or superiority in a product, service, or process.

  • Quality refers to meeting or exceeding customer expectations.

  • It involves consistent performance and reliability.

  • Quality can be measured through various metrics such as defect rates, customer satisfaction, and adherence to standards.

  • Examples of quality include a durable and well-designed product, efficient and error-free processes, and exceptional customer service.

Add your answer

Q36. what is 7 qc tools

Ans.

The 7 QC tools are a set of problem-solving techniques used in quality management.

  • The 7 QC tools are: Check Sheet, Pareto Chart, Cause and Effect Diagram, Histogram, Scatter Diagram, Control Chart, and Flowchart.

  • These tools help identify, analyze, and solve quality-related issues in a systematic manner.

  • For example, a Check Sheet can be used to collect data on defects, while a Pareto Chart helps prioritize the most significant problems.

  • The Cause and Effect Diagram (also known ...read more

Add your answer

Q37. what is kaizen in

Ans.

Kaizen is a Japanese business philosophy that focuses on continuous improvement in all aspects of an organization.

  • Kaizen emphasizes small, incremental changes over time rather than large, drastic changes.

  • It involves all employees in the organization and encourages them to identify and implement improvements.

  • Kaizen aims to eliminate waste, improve efficiency, and enhance quality.

  • Examples of kaizen practices include 5S methodology, value stream mapping, and daily team huddles.

  • K...read more

Add your answer

Q38. Explain STLC in SOftware Testing

Add your answer

Q39. Explain the StaleElementException

Add your answer

Q40. What is Hard assert

Ans.

Hard assert is a type of assertion in test automation that stops the test execution immediately when a failure occurs.

  • Hard assert is used to validate the expected outcome of a test case

  • If the assertion fails, the test execution is halted and marked as failed

  • It is commonly used in automated test scripts to ensure the correctness of the application under test

Add your answer

Q41. What is soft assert

Ans.

Soft assert is a way to continue the execution of a test case even after an assertion failure.

  • Soft assert does not stop the execution of the test case when an assertion fails.

  • It is useful when you want to log the failure but continue with the remaining test steps.

  • Soft assert is commonly used in test automation frameworks like TestNG in Java.

Add your answer

Q42. What is ip address

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network.

  • IP address stands for Internet Protocol address

  • It is used to identify and locate devices on a network

  • There are two types of IP addresses - IPv4 and IPv6

  • Example of IPv4 address: 192.168.1.1

  • Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Add your answer

Q43. What is DHCP ?

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol used to automatically assign IP addresses to devices on a network.

  • Automatically assigns IP addresses to devices on a network

  • Helps in managing and organizing network resources efficiently

  • Reduces the need for manual configuration of IP addresses

  • Ensures that each device on the network has a unique IP address

  • DHCP server leases IP addresses to devices for a specific period of time

Add your answer

Q44. What is LAN ?

Ans.

LAN stands for Local Area Network, a network that connects computers and devices within a limited area such as a home, office, or building.

  • LAN is a network that covers a small geographic area, typically within a single building or campus.

  • It allows connected devices to communicate with each other and share resources such as files, printers, and internet access.

  • LANs are commonly used in homes, offices, schools, and other small-scale environments.

  • Ethernet and Wi-Fi are common te...read more

Add your answer

Q45. Reason for switching

Ans.

Seeking new challenges and growth opportunities in a larger organization.

  • Desire for career advancement

  • Opportunity to work with a larger team

  • Seeking new challenges and learning opportunities

Add your answer

Q46. write a x path

Ans.

An x path is a way to navigate through elements in XML or HTML documents.

  • Start with a forward slash (/) to indicate the root element

  • Use element names to navigate through the document

  • Use square brackets to specify conditions for selecting elements

  • Use @ symbol to select attributes of elements

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Microsoft Corporation

based on 53 interviews
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.3
 • 458 Interview Questions
4.1
 • 367 Interview Questions
4.0
 • 173 Interview Questions
4.2
 • 147 Interview Questions
4.1
 • 141 Interview Questions
3.3
 • 135 Interview Questions
View all
Top NTT Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter