i
DXC Technology
Filter interviews by
A segment is a portion of a network that is separated by switches or routers.
Segments help to divide a network into smaller parts for better organization and management.
Each segment typically has its own subnet and can be controlled independently.
Segments can improve network performance by reducing congestion and improving security.
For example, a company may have separate segments for different departments like sales,
What people are saying about DXC Technology
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.
Access ports are used to connect end devices like computers, printers, etc. to the network.
Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.
Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.
Access ports do not tag frames while trunk ports ...
LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.
LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.
LAN has a higher data transfer rate and lower latency compared to WAN.
Examples of LAN technologies include Ethernet, Wi-F...
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk nati
Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.
Load balancer acts as a reverse proxy server
It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.
It monitors server health and redirects traffic to healthy servers
It can be hardware-based or software-based
Examples of load balancers include F5, HAProxy, Ngi
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are po
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can ...
DXC Technology interview questions for designations
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is online test. In this test there is question of apti and also coding and from 5g question.
There are two questions asked and time is enough to solve 60 minutes
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Check if the reversed string is equal to the original string
Create a function to add two numbers
Define a function that takes two parameters as input
Inside the function, add the two numbers together and return the result
Example: function addNumbers(num1, num2) { return num1 + num2; }
Binary search code implementation in Python
Define a function that takes a sorted array and a target value as input
Initialize two pointers, low and high, to the start and end of the array respectively
While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target
If array[mid] is equal to target, return mid
If array[mid] is less than target, update low to mid + 1
If array[mid]...
A program to check if a given name is a palindrome or not.
Convert the name to lowercase to handle case-insensitivity
Remove any spaces or special characters from the name
Reverse the name and compare it with the original name to check for palindrome
malloc and calloc are functions in C programming used for dynamic memory allocation.
malloc function is used to allocate a single block of memory of a specified size.
calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There was 1 interview round.
I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.
I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.
Configured routers and switches to optimize network performance
Assisted in setting up VLANs and implementing security protocols
Troubleshooted network connectivity issues for end users
Participated in network infrastructure upgrades and maintenance
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.
DNS servers store records of domain names and their corresponding IP addresses, allowing for effi...
DHCP stands for Dynamic Host Configuration Protocol, used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It assigns IP addresses dynamically, allowing for efficient use of available addresses
DHCP servers lease IP addresses to devices for a specific period of time
DHCP also provides other network configuration information, such as su...
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) are network protocols used for providing high availability in routing.
HSRP and VRRP are used to provide redundancy for routers in a network.
They allow for automatic failover in case of a router failure.
HSRP is a Cisco proprietary protocol, while VRRP is an open standard protocol.
Both protocols use a virtual IP address that clients use as t...
based on 23 reviews
Rating in categories
Associate Professional Software Engineer
2.2k
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Software Engineer
2k
salaries
| ₹2.4 L/yr - ₹11.7 L/yr |
Associate Professional
1.6k
salaries
| ₹2 L/yr - ₹7 L/yr |
Associate Software Engineer
1.2k
salaries
| ₹3 L/yr - ₹6.7 L/yr |
Professional 1
1.2k
salaries
| ₹3.4 L/yr - ₹13.6 L/yr |
Cognizant
Capgemini
TCS
Wipro