
CompuCom


10+ CompuCom Interview Questions and Answers
Q1. What is etl and it works, architecture, connectivity
ETL stands for Extract, Transform, Load. It is a process of extracting data from various sources, transforming it, and loading it into a target database or data warehouse.
ETL is used to integrate data from multiple sources into a single, consistent format.
The Extract phase involves retrieving data from source systems such as databases, files, or APIs.
The Transform phase involves cleaning, filtering, and manipulating the extracted data to meet the requirements of the target sy...read more
Q2. How to configure username and password on router?
To configure username and password on a router, follow these steps:
Access the router's configuration page through a web browser
Navigate to the security settings section
Create a new username and password
Save the changes and log out of the configuration page
Test the new login credentials to ensure they work
Q3. What are protocols used at different layers?
Protocols used at different layers include TCP, IP, HTTP, FTP, SMTP, DNS, and more.
Transport layer protocols include TCP and UDP
Network layer protocols include IP and ICMP
Application layer protocols include HTTP, FTP, SMTP, DNS, and more
Data link layer protocols include Ethernet and Wi-Fi
Physical layer protocols include RS-232 and V.35
Q4. How would you tackle in a multi-tasking environment
I prioritize tasks based on urgency and importance, use time management techniques, and communicate effectively with team members.
Prioritize tasks based on urgency and importance
Use time management techniques such as creating to-do lists and setting deadlines
Communicate effectively with team members to ensure tasks are completed efficiently
Stay organized and focused to avoid feeling overwhelmed by multiple tasks
Q5. How would you troubleshoot IPSec vpn issues
To troubleshoot IPSec VPN issues, start by checking the configuration, verifying connectivity, and analyzing logs.
Verify the IPSec configuration on both ends to ensure they match
Check for any network connectivity issues between the VPN peers
Analyze the VPN logs for any error messages or warnings
Ensure that the correct encryption and authentication settings are being used
Check for any firewall rules blocking the VPN traffic
Q6. Talak 2 minuits with random topic you have 3, minuit.
The topic is the benefits of meditation.
Meditation can reduce stress and anxiety
It can improve focus and concentration
Meditation can increase self-awareness and promote emotional health
It may also lower blood pressure and improve sleep
Examples of meditation techniques include mindfulness, transcendental, and loving-kindness
Q7. Technology javascript node js specific challenges you faced
Challenges faced in using JavaScript and Node.js technology
Handling asynchronous operations and callbacks
Managing dependencies and version compatibility
Debugging and troubleshooting in a non-blocking environment
Q8. CLM tools used and Process follwed
CLM tools used include Salesforce, Conga Contracts, and DocuSign. Process involves contract drafting, negotiation, approval, and execution.
CLM tools used: Salesforce, Conga Contracts, DocuSign
Process: contract drafting, negotiation, approval, execution
Q9. Join inner outer functions
Join inner outer functions are used in Datastage to combine data from multiple sources based on a common key.
Join function is used to combine rows from two or more tables based on a common key.
Inner join returns only the matching rows from both tables.
Outer join returns all the rows from both tables, including unmatched rows.
Examples: INNER JOIN, LEFT OUTER JOIN, RIGHT OUTER JOIN, FULL OUTER JOIN.
Q10. What is GMfT and SFTP
GMfT stands for Global Manufacturing for Toyota and SFTP stands for Secure File Transfer Protocol.
GMfT is a global manufacturing system used by Toyota to manage their production processes.
SFTP is a secure way to transfer files over the internet using encryption.
GMfT and SFTP are both commonly used in the automotive industry for secure data transfer.
GMfT helps Toyota to optimize their production processes and improve efficiency.
SFTP is used to securely transfer sensitive data ...read more
Q11. Vlan and purpose of creating them
VLANs are virtual LANs that allow network administrators to group devices together based on their function or location.
VLANs improve network performance and security by separating traffic into different broadcast domains.
They can be used to segment a network by department, location, or application.
VLANs can also be used to isolate and prioritize traffic, such as voice or video traffic.
They are created by assigning a group of devices to a specific VLAN ID, which is then used t...read more
Q12. Explain OSI and TCP model.
OSI and TCP models are networking models that define how data is transmitted between devices.
OSI model has 7 layers and TCP model has 4 layers
OSI model is a theoretical model while TCP model is a practical model
OSI model is used for understanding how data is transmitted while TCP model is used for actual data transmission
OSI model layers include physical, data link, network, transport, session, presentation, and application
TCP model layers include network, transport, session,...read more
Q13. What is IpSec VPN
IPSec VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.
IPSec stands for Internet Protocol Security
It provides secure communication over the internet by encrypting and authenticating data
It is commonly used for remote access VPNs and site-to-site VPNs
IPSec operates at the network layer of the OSI model
Examples of IPSec VPN implementations include Cisco AnyConnect and Palo Alto GlobalProtect
Q14. What is EDI and SFTP
EDI is Electronic Data Interchange and SFTP is Secure File Transfer Protocol.
EDI is a standard format for exchanging business documents electronically.
SFTP is a secure way to transfer files over the internet.
EDI and SFTP are often used together to securely exchange business documents.
EDI can be used for transactions like purchase orders, invoices, and shipping notices.
SFTP provides encryption and authentication to protect data during transfer.
Q15. Regions supported.
Regions supported include North America, Europe, Asia-Pacific, and Latin America.
North America
Europe
Asia-Pacific
Latin America
Q16. Explain BGP, OSPF, RIP, STP.
Top HR Questions asked in CompuCom
Interview Process at CompuCom

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

