i
DXC Technology
Filter interviews by
I applied via Naukri.com and was interviewed in Mar 2022. There were 4 interview rounds.
Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.
Pre-stage the image on the device before the upgrade window
Use fast transfer methods like TFTP or FTP to transfer the image quickly
Ensure all necessary configurations are saved and backed up before the upgrade
Have a rollback plan in case of any issues during the upgrade
Top trending discussions
I applied via Company Website and was interviewed before Mar 2021. There were 2 interview rounds.
posted on 4 Mar 2024
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing helps in directing network traffic efficiently
It determines the best path for data packets to travel from source to destination
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information
Routing tables are used to store information about network paths
Dynamic routing adjusts to network changes a
IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.
IPS is a network security technology that monitors network traffic in real-time.
It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.
IPS works by analyzing network packets, comparing them to a databa...
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters and controls incoming and outgoing network traffic based on predetermined security rules.
Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.
Firewall generations refer to the evolution of firewall technology and their roles in network security.
First generation firewalls - packet filtering based on IP addresses and ports
Second generation firewalls - stateful inspection and improved security features
Third generation firewalls - application layer filtering and deep packet inspection
Fourth generation firewalls - next-generation firewalls with advanced threat pr...
IP Spoofing is a technique where an attacker impersonates another device by falsifying IP address in order to gain unauthorized access.
IP Spoofing involves manipulating the source IP address in a packet to deceive the recipient.
It is commonly used in DDoS attacks to hide the true source of the attack traffic.
Prevention methods include implementing ingress and egress filtering on network devices.
Examples of tools used f
I appeared for an interview before Mar 2024, where I was asked the following questions.
EIGRP Authentication is a security feature that ensures only authorized routers can participate in EIGRP routing.
EIGRP Authentication uses a shared secret key between routers to authenticate each other.
It can be configured in two modes - MD5 authentication and SHA authentication.
MD5 authentication is more commonly used and provides better security.
SHA authentication is newer and provides stronger security.
EIGRP Authent...
OSPF DR and BDR are routers elected to manage communication within a multi-access network.
DR stands for Designated Router and BDR stands for Backup Designated Router.
They are elected by OSPF routers on a multi-access network to manage communication.
DR and BDR are responsible for maintaining the topology database and forwarding updates to other routers.
They reduce the amount of OSPF traffic on the network by acting as a...
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on their function, project or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Devices in a VLAN can communicate with each other as if they were on the same physical network, even if they are physically located on different switches.
VLANs can improve network security...
I applied via Naukri.com and was interviewed in Oct 2022. There were 3 interview rounds.
I prefer not to disclose my current CTC. As for expected salary, I am open to negotiation based on the job requirements and market standards.
I am looking for a fair compensation based on my skills and experience
I am open to negotiation based on the job requirements and market standards
I prefer not to disclose my current CTC
I applied via Naukri.com and was interviewed in Jan 2024. There were 2 interview rounds.
C fibonacci series program asked, Area of interest, about any additional certification
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
based on 4 reviews
Rating in categories
Associate Professional Software Engineer
2.2k
salaries
| ₹2.6 L/yr - ₹7.8 L/yr |
Software Engineer
2k
salaries
| ₹2.4 L/yr - ₹12 L/yr |
Associate Professional
1.5k
salaries
| ₹2 L/yr - ₹7 L/yr |
Associate Software Engineer
1.2k
salaries
| ₹3 L/yr - ₹7 L/yr |
Professional 1
1.1k
salaries
| ₹3.2 L/yr - ₹14 L/yr |
Cognizant
Capgemini
TCS
Wipro