Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by TCS Team. If you also belong to the team, you can get access from here

TCS Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 86.2k Reviews

Filter interviews by

TCS Network and Security Engineer L2 Interview Questions, Process, and Tips

Updated 20 Nov 2023

TCS Network and Security Engineer L2 Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. How ipsec vpn work?
  • Ans. 

    IPsec VPN works by encrypting and authenticating all traffic between two endpoints over the internet.

    • IPsec VPN uses protocols like AH (Authentication Header) and ESP (Encapsulating Security Payload) to provide security.

    • It creates a secure tunnel between the two endpoints, ensuring confidentiality, integrity, and authenticity of the data.

    • IPsec VPN can be configured in different modes like transport mode and tunnel mode.

    • ...

  • Answered by AI
  • Q2. What is vpc ?
  • Ans. 

    VPC stands for Virtual Private Cloud, a virtual network dedicated to a single account within a cloud provider's infrastructure.

    • VPC allows users to define their own virtual network in the cloud

    • It provides control over network settings such as IP address range, subnets, route tables, and network gateways

    • VPC helps in isolating resources and providing a secure environment within the cloud

    • Examples of cloud providers offerin...

  • Answered by AI
Round 3 - Technical 

(5 Questions)

  • Q1. Brief description how sandbox inspection work ?
  • Ans. 

    Sandbox inspection is a security mechanism that isolates and analyzes suspicious files in a controlled environment.

    • Sandbox creates a virtual environment to execute and observe potentially malicious files.

    • It monitors the behavior of the file to determine if it is safe or malicious.

    • Sandbox can detect malware by analyzing its actions without risking the actual system.

    • Common sandbox tools include Cuckoo, FireEye, and Palo

  • Answered by AI
  • Q2. What is DNS sinkhole?
  • Ans. 

    DNS sinkhole is a technique used to redirect malicious traffic to a controlled server for analysis or blocking.

    • DNS sinkhole involves redirecting DNS queries for malicious domains to a sinkhole server.

    • It can be used to prevent malware from communicating with its command and control server.

    • Sinkholing can also be used to gather intelligence on malicious activities by analyzing the traffic.

    • Popular tools like BIND and Pi-ho

  • Answered by AI
  • Q3. Question related to bgp
  • Q4. Persistence type in load balancer?
  • Ans. 

    Persistence type in load balancer refers to the method used to maintain session affinity for client requests.

    • Persistence type ensures that subsequent requests from the same client are directed to the same server.

    • Common persistence types include source IP, cookie-based, SSL session ID, and URI-based.

    • For example, source IP persistence uses the client's IP address to route subsequent requests to the same server.

  • Answered by AI
  • Q5. Packet capture process?
  • Ans. 

    Packet capture process involves capturing network traffic for analysis and troubleshooting.

    • Use tools like Wireshark or tcpdump to capture packets

    • Specify the network interface to capture traffic from

    • Apply filters to capture specific packets of interest

    • Analyze captured packets for troubleshooting network issues

  • Answered by AI

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Feb 2023. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Day to day work on old job, VPN technology, ASA firewall, Questions on BGP routing
Round 2 - HR 

(1 Question)

  • Q1. Salary Discussion

Interview Preparation Tips

Topics to prepare for Capgemini Network and Security Engineer L2 interview:
  • Bgp
  • IPSEC VPN
  • Asa Firewall
  • OSPF
  • Switching
  • Routing
  • VLAN Configuration
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Apr 2024. There were 7 interview rounds.

Round 1 - Aptitude Test 

An aptitude is a component of a competence to do a certain kind of work at a certain level. Outstanding aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped

Round 2 - Coding Test 

Coding is the process of allowing humans to speak to computers. As computers only understand binary language — a series of zeros and ones — humans need to use a programming language as a translator of sorts.

Round 3 - Group Discussion 

Group discussion is a discussion between a group of participants on a given subject. A group discussion typically forms a part of the selection process used by organisations and educational institutions. The candidates talk about the given topic to present facts, opinions and conclusions.

Round 4 - Assignment 

An assignment is a task that someone in authority has asked you to do. The word assignment is just the noun form of the common verb assign, which you use when you want to give someone a duty or a job. When you assign something, that something is called an assignment.

Round 5 - Case Study 

Case study is an appropriate research design when you want to gain concrete, contextual, in-depth knowledge about a specific real-world subject. It allows you to explore the key characteristics, meanings, and implications of the case. Case studies are often a good choice in a

Round 6 - HR 

(3 Questions)

  • Q1. Human resources (HR) is the division of a business responsible for finding, recruiting, screening, and training job applicants.
  • Q2. Finding, recruiting, screening, and training job applicants
  • Q3. Human resources (HR) is the division of a business responsible for finding, recruiting, screening, and training job applicants. HR departments also handle employee compensation, benefits, and terminations.
Round 7 - Technical 

(2 Questions)

  • Q1. Examples of more advanced technical skills that a job might require include programming languages, technical writing, or data analysis. Unlike workplace skills, also called soft skills, such as communicati...
  • Ans. 

    Technical skills often require specific education, such as programming languages, technical writing, or data analysis.

    • Programming languages: Examples include Java, Python, C++, etc.

    • Technical writing: Ability to write technical documentation, manuals, and reports.

    • Data analysis: Skills in analyzing and interpreting data using tools like Excel, SQL, or R.

  • Answered by AI
  • Q2. Programming languages, technical writing, or data analysis
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. BGP and ospf and vlan
  • Q2. VSS and stacking switch
Round 2 - Technical 

(2 Questions)

  • Q1. BGP in depth ospf and vlan
  • Q2. Vss and switch stacking switch routing

Interview Preparation Tips

Interview preparation tips for other job seekers - Please prepare strong technical on routing switching and f5.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Not Selected

I applied via Referral and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What do you know about routing?
  • Ans. 

    Routing is the process of selecting the best path for network traffic to reach its destination.

    • Routing involves determining the optimal path for data packets to travel from the source to the destination.

    • Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.

    • There are different types of routing protocols such as RIP, OSPF, EIGRP, and BGP.

    • Static routing involves manually ...

  • Answered by AI
  • Q2. What do you know about switching?
  • Ans. 

    Switching is a networking technique used to forward data packets between devices on a computer network.

    • Switching involves the process of receiving, analyzing, and forwarding data packets within a network.

    • Switches operate at Layer 2 (Data Link Layer) of the OSI model.

    • Switches use MAC addresses to determine the destination of data packets.

    • Switches create separate collision domains and broadcast domains, improving network...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you are thoroughly prepared and have basic knowledge about everything in the JD

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Normal aptitude group discussion assignment case study

Round 2 - Coding Test 

Coding test assignment one on one round

Round 3 - Technical 

(2 Questions)

  • Q1. Technical vs no tech
  • Ans. 

    Technical skills are essential for a Network Engineer, but soft skills are also important for effective communication and teamwork.

    • Technical skills are necessary for configuring and troubleshooting network devices.

    • Soft skills like communication, teamwork, and problem-solving are crucial for working effectively with colleagues and clients.

    • Balancing technical expertise with interpersonal skills is key to success in the r...

  • Answered by AI
  • Q2. Dhcp vs dns gdp vs rdp frp vs 30nd
  • Ans. 

    DHCP is a protocol used to assign IP addresses dynamically to devices on a network, while DNS is a system that translates domain names to IP addresses.

    • DHCP assigns IP addresses to devices on a network dynamically

    • DNS translates domain names to IP addresses

    • RDP (Remote Desktop Protocol) allows users to remotely connect to a computer

    • FRP (Fiberglass Reinforced Plastic) is a material used in construction

    • 30nd does not seem to

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - no

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Q1. What is Protocol and full Explanation. Ans. Protocol is a set of rules which are used in digital communication to connect network device and Exchange information between them.
  • Ans. 

    Protocol is a set of rules used in digital communication to connect network devices and exchange information.

    • Protocols define the format, timing, sequencing, and error checking of data transmission.

    • Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.

    • Protocols ensure that devices can communicate effectively and understand each other's data.

    • Different protocols serve different purposes, such as routing data, sending

  • Answered by AI
  • Q2. Q2. What is a Gateway and full Explanation. Ans. Gateway is a hardware device that is used to connect two dissimilar type of network. It allows us to send and receive data through the internet event it is ...
  • Ans. 

    A gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.

    • Gateway acts as an entry and exit point for data traffic between networks

    • It translates data between different network protocols

    • Examples include routers and firewalls that connect a local network to the internet

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Every day You Can Searching job

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Dec 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. How many types of VLAN in Computer Networking Ans. (1) Defaults VLAN (2) Data VLAN (3) Voice VLAN (4) Management VLAN (5) Native VLAN
  • Ans. 

    There are five types of VLAN in computer networking: Default VLAN, Data VLAN, Voice VLAN, Management VLAN, and Native VLAN.

    • Default VLAN is the VLAN that all switch ports are assigned to by default.

    • Data VLAN is used to carry regular network traffic.

    • Voice VLAN is used to carry voice traffic for VoIP systems.

    • Management VLAN is used for managing network devices.

    • Native VLAN is used for untagged traffic on a trunk port.

  • Answered by AI
  • Q2. What is VLAN Ans. Divides on Single Broadcast into Multiple to Broadcast Domains (OR) VLAN Provide a way to Group devices within a VLAN
  • Ans. 

    VLAN stands for Virtual Local Area Network. It is a network technology that allows for the creation of multiple virtual networks within a single physical network.

    • VLANs divide a single broadcast domain into multiple broadcast domains.

    • They provide a way to group devices within a VLAN, allowing for better network management and security.

    • VLANs can be used to separate different departments or functions within an organizatio...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Nov 2023. There was 1 interview round.

Round 1 - Technical 

(4 Questions)

  • Q1. What is stuck switching?
  • Ans. 

    Stuck switching refers to a situation where a network switch is unable to forward traffic due to a malfunction or configuration issue.

    • Stuck switching can occur when a switch's forwarding table becomes corrupted or when there is a hardware failure.

    • It can also happen if there is a loop in the network causing broadcast storms.

    • Troubleshooting stuck switching involves checking the switch's configuration, monitoring network ...

  • Answered by AI
  • Q2. What is bgp path selection process
  • Ans. 

    BGP path selection process determines the best path for routing based on various attributes.

    • BGP selects the path with the highest weight attribute first

    • If weights are the same, BGP looks at the local preference attribute

    • Next, BGP considers the AS path length

    • BGP then checks the origin code attribute

    • After that, BGP looks at the MED (Multi-Exit Discriminator) attribute

    • If all else is equal, BGP chooses the path with the lo...

  • Answered by AI
  • Q3. What is stub area
  • Ans. 

    A stub area is an OSPF area that does not contain external routes.

    • Stub areas reduce the amount of routing information exchanged within an OSPF network.

    • Stub areas use a default route to reach external networks.

    • Stub areas are commonly used to reduce the size of the OSPF database and improve network performance.

  • Answered by AI
  • Q4. What is stp? how to work.
  • Ans. 

    STP stands for Spanning Tree Protocol, used in network environments to prevent loops and ensure redundant paths are utilized efficiently.

    • STP is a network protocol used to prevent loops in Ethernet networks.

    • It works by selecting a single path for data traffic while blocking redundant paths.

    • STP elects a root bridge and calculates the shortest path to each network segment.

    • If a link fails, STP recalculates the network topo...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
-
Result
Selected Selected
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(1 Question)

  • Q1. General discussion
Round 3 - Technical 

(2 Questions)

  • Q1. Questions related to networking
  • Q2. Routers switch configuration and commands
  • Ans. 

    Routers switch configuration and commands involve setting up and managing network devices for efficient data routing.

    • Routers use commands like 'show ip route' to display routing table information

    • Configuration involves setting up IP addresses, subnet masks, and default gateways

    • Commands like 'show interfaces' can display interface status and configuration details

  • Answered by AI

Skills evaluated in this interview

TCS Interview FAQs

How many rounds are there in TCS Network and Security Engineer L2 interview?
TCS interview process usually has 3 rounds. The most common rounds in the TCS interview process are Technical and Resume Shortlist.
What are the top questions asked in TCS Network and Security Engineer L2 interview?

Some of the top questions asked at the TCS Network and Security Engineer L2 interview -

  1. Brief description how sandbox inspection wor...read more
  2. What is DNS sinkho...read more
  3. Persistence type in load balanc...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

Accenture Interview Questions
3.9
 • 8.1k Interviews
Infosys Interview Questions
3.7
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
View all
TCS Network and Security Engineer L2 Salary
based on 19 salaries
₹3.9 L/yr - ₹11.4 L/yr
25% less than the average Network and Security Engineer L2 Salary in India
View more details

TCS Network and Security Engineer L2 Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

5.0

Skill development

5.0

Work-life balance

5.0

Salary

5.0

Job security

5.0

Company culture

5.0

Promotions

5.0

Work satisfaction

Explore 1 Review and Rating
System Engineer
1.1L salaries
unlock blur

₹1 L/yr - ₹9 L/yr

IT Analyst
67.6k salaries
unlock blur

₹5.1 L/yr - ₹15.9 L/yr

AST Consultant
51.2k salaries
unlock blur

₹8 L/yr - ₹25 L/yr

Assistant System Engineer
29.9k salaries
unlock blur

₹2.2 L/yr - ₹5.6 L/yr

Associate Consultant
28.8k salaries
unlock blur

₹8.9 L/yr - ₹32 L/yr

Explore more salaries
Compare TCS with

Amazon

4.1
Compare

Wipro

3.7
Compare

Infosys

3.7
Compare

Accenture

3.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview