Filter interviews by
VLANs are virtual LANs that allow network administrators to group devices together based on their function or location.
VLANs improve network performance and security by separating traffic into different broadcast domains.
They can be used to segment a network by department, location, or application.
VLANs can also be used to isolate and prioritize traffic, such as voice or video traffic.
They are created by assigning...
CLM tools used include Salesforce, Conga Contracts, and DocuSign. Process involves contract drafting, negotiation, approval, and execution.
CLM tools used: Salesforce, Conga Contracts, DocuSign
Process: contract drafting, negotiation, approval, execution
ETL stands for Extract, Transform, Load. It is a process of extracting data from various sources, transforming it, and loading it into a target database or data warehouse.
ETL is used to integrate data from multiple sources into a single, consistent format.
The Extract phase involves retrieving data from source systems such as databases, files, or APIs.
The Transform phase involves cleaning, filtering, and manipulati...
GMfT stands for Global Manufacturing for Toyota and SFTP stands for Secure File Transfer Protocol.
GMfT is a global manufacturing system used by Toyota to manage their production processes.
SFTP is a secure way to transfer files over the internet using encryption.
GMfT and SFTP are both commonly used in the automotive industry for secure data transfer.
GMfT helps Toyota to optimize their production processes and impro...
EDI is Electronic Data Interchange and SFTP is Secure File Transfer Protocol.
EDI is a standard format for exchanging business documents electronically.
SFTP is a secure way to transfer files over the internet.
EDI and SFTP are often used together to securely exchange business documents.
EDI can be used for transactions like purchase orders, invoices, and shipping notices.
SFTP provides encryption and authentication to...
Information Security Analysts protect an organization's computer systems and networks from security breaches and threats.
Monitoring Security Alerts: Regularly reviewing security alerts and logs to identify potential threats, such as unusual login attempts or malware activity.
Conducting Vulnerability Assessments: Performing assessments to identify weaknesses in systems, like outdated software or misconfigured setti...
Regions supported include North America, Europe, Asia-Pacific, and Latin America.
North America
Europe
Asia-Pacific
Latin America
ETL stands for Extract, Transform, Load. It is a process of extracting data from various sources, transforming it, and loading it into a target database or data warehouse.
ETL is used to integrate data from multiple sources into a single, consistent format.
The Extract phase involves retrieving data from source systems such as databases, files, or APIs.
The Transform phase involves cleaning, filtering, and manipulating th...
Join inner outer functions are used in Datastage to combine data from multiple sources based on a common key.
Join function is used to combine rows from two or more tables based on a common key.
Inner join returns only the matching rows from both tables.
Outer join returns all the rows from both tables, including unmatched rows.
Examples: INNER JOIN, LEFT OUTER JOIN, RIGHT OUTER JOIN, FULL OUTER JOIN.
I appeared for an interview in Nov 2024, where I was asked the following questions.
I appeared for an interview in Sep 2023.
IPSec VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.
IPSec stands for Internet Protocol Security
It provides secure communication over the internet by encrypting and authenticating data
It is commonly used for remote access VPNs and site-to-site VPNs
IPSec operates at the network layer of the OSI model
Examples of IPSec VPN implementations include Ci...
To troubleshoot IPSec VPN issues, start by checking the configuration, verifying connectivity, and analyzing logs.
Verify the IPSec configuration on both ends to ensure they match
Check for any network connectivity issues between the VPN peers
Analyze the VPN logs for any error messages or warnings
Ensure that the correct encryption and authentication settings are being used
Check for any firewall rules blocking the VPN tra...
I prioritize tasks based on urgency and importance, use time management techniques, and communicate effectively with team members.
Prioritize tasks based on urgency and importance
Use time management techniques such as creating to-do lists and setting deadlines
Communicate effectively with team members to ensure tasks are completed efficiently
Stay organized and focused to avoid feeling overwhelmed by multiple tasks
Challenges faced in using JavaScript and Node.js technology
Handling asynchronous operations and callbacks
Managing dependencies and version compatibility
Debugging and troubleshooting in a non-blocking environment
I applied via Recruitment Consulltant and was interviewed in Sep 2022. There were 3 interview rounds.
Regions supported include North America, Europe, Asia-Pacific, and Latin America.
North America
Europe
Asia-Pacific
Latin America
CLM tools used include Salesforce, Conga Contracts, and DocuSign. Process involves contract drafting, negotiation, approval, and execution.
CLM tools used: Salesforce, Conga Contracts, DocuSign
Process: contract drafting, negotiation, approval, execution
I appeared for an interview before May 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Sep 2022. There were 2 interview rounds.
EDI is Electronic Data Interchange and SFTP is Secure File Transfer Protocol.
EDI is a standard format for exchanging business documents electronically.
SFTP is a secure way to transfer files over the internet.
EDI and SFTP are often used together to securely exchange business documents.
EDI can be used for transactions like purchase orders, invoices, and shipping notices.
SFTP provides encryption and authentication to prot...
GMfT stands for Global Manufacturing for Toyota and SFTP stands for Secure File Transfer Protocol.
GMfT is a global manufacturing system used by Toyota to manage their production processes.
SFTP is a secure way to transfer files over the internet using encryption.
GMfT and SFTP are both commonly used in the automotive industry for secure data transfer.
GMfT helps Toyota to optimize their production processes and improve ef...
Top trending discussions
The duration of CompuCom interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 25 interview experiences
Difficulty level
Duration
based on 516 reviews
Rating in categories
Technical Support Engineer
129
salaries
| ₹2.7 L/yr - ₹5.8 L/yr |
Senior Software Engineer
100
salaries
| ₹14.7 L/yr - ₹26.3 L/yr |
Network Engineer
71
salaries
| ₹3 L/yr - ₹5.9 L/yr |
Technical Lead
67
salaries
| ₹19.9 L/yr - ₹32.6 L/yr |
System Administrator
64
salaries
| ₹5.6 L/yr - ₹12.2 L/yr |
Xoriant
CitiusTech
HTC Global Services
Exela Technologies