DXC Technology Interview Questions
Go Back1. Tell me the key to ensuring your company or client complies with all laws, regulations, and standards when leadership defines a business integration strategy?
2. Can you tell me what the difference is between stored and reflected XSS, and the common defenses against XSS?
3. What's the difference between a threat, vulnerability, and a risk, and how do you assess the severity of a threat for example?
4. What is the differences between 'scalability' and 'elasticity' when speaking in terms of cloud hosting?
5. If a client is considering moving from an internal data center environment to our platform. What are the key issues you would recommend them addressing before making this move?
6. Explain what the difference is between Data Mining and Data Analytics, and tell me how you have used both in your recent projects?
7. How does data drive a business' success?
8. Please share an experience in which you recommended a technology improvement, which helped the process, service, and performance of your company or your clients'?
9. How would you convince a company that is still undecided about whether or not they should continue managing their own data center or move to a hosted cloud?
10. Big Data can be an efficient tool to monitor and grow a business, but can have challenges if not properly implemented. What challenges have you encountered while working with big data?
11. What actions do you take when you recognize project deadlines will not be met?
12. As part of the IT team, how do you approach your role in the implementation and roll out of new software and technical programs?
13. Can you explain what a public and private key is in the world of public-key cryptography, and which key is used for which function?
14. There are many different definitions of a 'Cloud' in the IT industry. In order to make sure we are on the same page can you provide your definition of a cloud hosting environment and describe its components?
15. Tell me what your favorite security assessment tools are, and why you prefer them over others?
16. Give me an example of how you could solve a data migration security problem using a PaaS platform?
17. What is your experience with Azure, AWS, and Google Cloud as a PaaS platform, and give me an example of how you used all three?
18. How do you approach your role in business processes and operations when your department or the Project Management Office (PMO) is operating smoothly or there are no pending improvement projects in the queue?
19. Your customer wants you to explain the benefits of the Big Data model you developed, how do you communicate the insights they can use for their business?
20. In your opinion, what's the ultimate goal of information security to an organization, and why is it important?
21. Can you explain to me the basic characteristics of a hosted cloud?
22. In your opinion, what is the most exciting collaboration between data analysis and artificial intelligence in the past year?
23. As a business process and operations expert, how do you approach a situation when a project is failing to progress and is not meeting its deliverables?
24. What tools do you use when managing a project?
25. Explain the difference between symmetric and public-key cryptography, and what their importance is to encryption technology?