i
DXC Technology
Filter interviews by
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.
Access ports are used to connect end devices like computers, printers, etc. to the network.
Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.
Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.
Access ports do not tag frames while trunk ports ...
LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.
LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.
LAN has a higher data transfer rate and lower latency compared to WAN.
Examples of LAN technologies include Ethernet, Wi-F...
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk nati
Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.
Load balancer acts as a reverse proxy server
It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.
It monitors server health and redirects traffic to healthy servers
It can be hardware-based or software-based
Examples of load balancers include F5, HAProxy, Ngi
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are po
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can ...
A segment is a portion of a network that is separated by switches or routers.
Segments help to divide a network into smaller parts for better organization and management.
Each segment typically has its own subnet and can be controlled independently.
Segments can improve network performance by reducing congestion and improving security.
For example, a company may have separate segments for different departments like sales,
What people are saying about DXC Technology
DXC Technology interview questions for designations
I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.
DNS servers store records of domain names and their corresponding IP addresses, allowing for effi...
DHCP stands for Dynamic Host Configuration Protocol, used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It assigns IP addresses dynamically, allowing for efficient use of available addresses
DHCP servers lease IP addresses to devices for a specific period of time
DHCP also provides other network configuration information, such as su...
Normal aptitude group discussion assignment case study
Coding test assignment one on one round
Technical skills are essential for a Network Engineer, but soft skills are also important for effective communication and teamwork.
Technical skills are necessary for configuring and troubleshooting network devices.
Soft skills like communication, teamwork, and problem-solving are crucial for working effectively with colleagues and clients.
Balancing technical expertise with interpersonal skills is key to success in the r...
DHCP is a protocol used to assign IP addresses dynamically to devices on a network, while DNS is a system that translates domain names to IP addresses.
DHCP assigns IP addresses to devices on a network dynamically
DNS translates domain names to IP addresses
RDP (Remote Desktop Protocol) allows users to remotely connect to a computer
FRP (Fiberglass Reinforced Plastic) is a material used in construction
30nd does not seem to
Breaking root's password is unethical and illegal. It is important to prioritize security and follow proper protocols.
It is unethical and illegal to break root's password without proper authorization.
Always follow security protocols and guidelines set by the organization.
If you suspect a security breach or unauthorized access, report it to the appropriate authorities.
Focus on implementing strong security measures to pr...
I was interviewed in Oct 2023.
VRRP stands for Virtual Router Redundancy Protocol, used to provide high availability for routers by creating a virtual IP address.
VRRP allows multiple routers to work together in a group, with one router acting as the master and others as backups.
If the master router fails, one of the backup routers takes over the virtual IP address to ensure continuous network connectivity.
VRRP uses a priority value to determine whic...
VLANs are created to segment network traffic, improve network performance, enhance security, and simplify network management.
Segment network traffic to improve performance and reduce congestion
Enhance security by isolating sensitive data or devices
Simplify network management by grouping devices logically
Allow for easier troubleshooting and maintenance
Enable better control over broadcast domains
Example: Creating separat
Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.
Create multiple static routes with different next-hop IP addresses
Assign different administrative distances to each static route
Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails
based on 23 reviews
Rating in categories
Associate Professional Software Engineer
2.2k
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Software Engineer
2k
salaries
| ₹2.4 L/yr - ₹11.7 L/yr |
Associate Professional
1.6k
salaries
| ₹2 L/yr - ₹7 L/yr |
Associate Software Engineer
1.2k
salaries
| ₹3 L/yr - ₹6.7 L/yr |
Professional 1
1.2k
salaries
| ₹3.4 L/yr - ₹13.6 L/yr |
Cognizant
Capgemini
TCS
Wipro