i
Cognizant
Filter interviews by
Malware is malicious software designed to harm, exploit, or otherwise compromise computer systems and networks.
Types of Malware: Includes viruses, worms, trojans, ransomware, spyware, and adware, each with distinct methods of attack.
Viruses: Malicious code that attaches itself to clean files and spreads throughout a computer system, often corrupting data.
Ransomware: A type of malware that encrypts files and demand...
SIEM stands for Security Information and Event Management, crucial for real-time analysis of security alerts generated by applications and network hardware.
Centralized Logging: SIEM collects and aggregates log data from various sources, such as firewalls, servers, and applications, for comprehensive analysis.
Real-Time Monitoring: SIEM systems provide real-time monitoring and alerting for suspicious activities, hel...
Ransomware is a type of malicious software that encrypts files, demanding payment for their release.
File Encryption: Ransomware encrypts files on the victim's system, making them inaccessible until a ransom is paid.
Ransom Demand: Victims typically receive a message demanding payment, often in cryptocurrency, to decrypt their files.
Delivery Methods: Ransomware can spread through phishing emails, malicious downloads...
Internal threats in cybersecurity arise from within an organization, often involving employees or trusted individuals compromising security.
Malicious Insiders: Employees who intentionally steal data or sabotage systems, such as a disgruntled employee leaking sensitive information.
Negligent Insiders: Employees who inadvertently cause security breaches through careless actions, like falling for phishing scams or mis...
What people are saying about Cognizant
An attack in cybersecurity refers to any attempt to exploit vulnerabilities in systems or networks to compromise data or functionality.
Malware: Malicious software like viruses or ransomware that can damage or disrupt systems. Example: WannaCry ransomware attack.
Phishing: Deceptive attempts to obtain sensitive information by masquerading as a trustworthy entity. Example: Email pretending to be from a bank.
Denial of...
Machine learning is a subset of AI that enables systems to learn from data and improve their performance over time without explicit programming.
Machine learning algorithms identify patterns in data, such as clustering customers based on purchasing behavior.
Supervised learning uses labeled data to train models, like predicting house prices based on features like size and location.
Unsupervised learning finds hidden ...
Reversing a string involves rearranging its characters in the opposite order, which can be done using various programming techniques.
Use built-in functions: In Python, use 'string[::-1]' to reverse a string. Example: 'hello' becomes 'olleh'.
Iterative approach: Loop through the string from the end to the beginning and build a new string. Example: 'world' becomes 'dlrow'.
Recursive method: Define a function that call...
To find the greatest number in an array, iterate through the elements and compare each to determine the maximum value.
Initialize a variable to hold the maximum value, starting with the first element of the array.
Loop through each element of the array, comparing it to the current maximum.
If an element is greater than the current maximum, update the maximum variable.
Return the maximum value after completing the loop...
SQL is a standard language for managing and manipulating relational databases, essential for data retrieval and analysis.
SQL stands for Structured Query Language, used for querying databases.
Common SQL commands include SELECT, INSERT, UPDATE, DELETE.
Example: SELECT * FROM employees WHERE department = 'Sales'; retrieves all employees in Sales.
SQL supports functions like COUNT(), AVG(), and SUM() for data aggregatio...
Improving CTR involves optimizing content, targeting the right audience, and enhancing user experience.
Optimize headlines: Use compelling and clear headlines that grab attention, e.g., '10 Tips for Better Health'.
Use high-quality images: Incorporate eye-catching visuals that relate to the content, like infographics or relevant photos.
A/B testing: Experiment with different versions of ads or emails to see which per...
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Absolute Xpath starts from the root element, while relative Xpath starts from any node in the DOM structure.
Absolute Xpath starts with a single forward slash (/) and starts selection from the root node.
Relative Xpath starts with a double forward slash (//) and starts selection from the current node or any node in the DOM structure.
Absolute Xpath is more brittle and prone to breaking if the structure of the page changes...
The return would be the number of tabs open in the browser.
The return value would be an integer representing the count of open tabs.
For example, if there are 5 tabs open, the return value would be 5.
Types of waits in Selenium include Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent Wait: Waits for a condition to be true with a defined polling frequency.
Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);
Exceptions in Selenium are errors that occur during test execution, disrupting the flow of the test script.
Exceptions are thrown when there is an unexpected behavior in the application under test or in the test script itself.
Common exceptions in Selenium include NoSuchElementException, ElementNotVisibleException, TimeoutException, and StaleElementReferenceException.
Handling exceptions in Selenium can be done using try-...
Feature files contain high-level description of the functionality to be tested, while step definitions are the implementation of the steps in the feature file using code.
Feature files are written in Gherkin syntax and describe the behavior of the application in plain text.
Step definitions are written in programming languages like Java, Ruby, etc., and map the steps in the feature file to automation code.
Feature files a...
Data can be input in Cucumber using feature files and step definitions.
Data can be input in feature files using scenarios and scenario outlines
Step definitions can be used to define the actions to be taken with the input data
Data tables can be used in feature files to input structured data
Examples keyword can be used in scenario outlines to provide multiple sets of input data
Test case is a set of conditions or variables under which a tester will determine whether a system under test satisfies requirements. Test plan is a document outlining the scope, approach, resources, and schedule of testing activities. Test scenarios are detailed descriptions of possible interactions with the system.
Test case: specific conditions to be tested, expected results, steps to execute
Test plan: overall strate...
Hooks in Java are methods that allow subclasses to override or extend the behavior of a superclass.
Hooks are commonly used in frameworks like JUnit and TestNG for test automation.
They are often used for setup and teardown operations before and after test methods.
Examples include @Before, @After, @BeforeClass, and @AfterClass annotations in JUnit.
I am a detail-oriented Process Executive with strong analytical skills and experience in process improvement.
Experienced in analyzing and optimizing business processes
Proficient in data analysis and reporting
Skilled in project management and problem-solving
Strong communication and teamwork abilities
I am a dedicated and detail-oriented professional with a strong background in process management and execution.
I have X years of experience in process management and execution.
I am skilled in analyzing data and identifying areas for improvement.
I have a proven track record of meeting deadlines and exceeding targets.
I am a team player and have excellent communication skills.
I am proficient in using various software tool...
My salary expectations are in line with industry standards and based on my experience and qualifications.
Research industry standards for the position
Consider my experience and qualifications
Be open to negotiation based on benefits package
Working night shifts can be challenging but offers benefits like higher pay and less traffic.
Night shifts often come with a higher pay rate, which can be financially beneficial.
They can provide a quieter work environment, allowing for increased focus.
Some people find they are more productive at night due to fewer distractions.
However, night shifts can disrupt sleep patterns and lead to health issues if not managed prop...
I applied via Campus Placement and was interviewed in Nov 2024. There was 1 interview round.
I appeared for an interview in Jun 2025, where I was asked the following questions.
Yes, I am comfortable with rotational shifts. I understand that flexibility is important in this role, and I am ready to adjust my schedule as needed.
Yes, I can speak Tamil fluently. I am confident in handling voice process roles in Tamil and can communicate clearly and effectively with customers.
Yes, I am comfortable working from both office and home. However, I prefer working from the office as it helps me stay focused, communicate easily with my team, and learn better.
Yes, I am ready to join immediately and contribute to the team with my skills and dedication.
I have completed all necessary formalities and am prepared to start right away.
I am eager to apply my skills in customer support and help enhance customer satisfaction.
My previous experience allows me to quickly adapt to new environments and processes.
I appeared for an interview in Jan 2025.
It was conducted in Superset.
I am a highly skilled Programmer Analyst with expertise in developing and maintaining software applications.
Experienced in programming languages such as Java, C++, and Python
Proficient in analyzing user requirements and designing solutions
Strong problem-solving skills and attention to detail
Familiar with database management systems like MySQL and Oracle
Developed a web-based application for managing student records and grades, enhancing efficiency and accessibility for faculty and students.
Utilized HTML, CSS, and JavaScript for front-end development.
Implemented a MySQL database for storing student information.
Created user authentication features for secure access.
Designed a responsive interface for mobile and desktop users.
Conducted user testing to gather feedback and...
Yes, I am open to relocating for the right opportunity.
I am willing to relocate for a position that aligns with my career goals and offers growth opportunities.
I have relocated in the past for job opportunities and have found it to be a positive experience.
I understand that relocating may be necessary for certain roles and am prepared to make that commitment.
I appeared for an interview in May 2025, where I was asked the following questions.
Key OOP concepts, ASP.NET Core MVC middleware, SQL Server features, and CTE explained with examples.
OOP Concepts: Encapsulation, Inheritance, Polymorphism, Abstraction.
Example of Encapsulation: Using properties in a class to restrict access.
ASP.NET Core Middleware: Components that handle requests and responses.
Example of Middleware: Authentication middleware that checks user credentials.
SOLID Principles: Five design pr...
I appeared for an interview in May 2025, where I was asked the following questions.
I am a dedicated professional with a passion for problem-solving and a strong background in analytical thinking.
Strong analytical skills: I excel in breaking down complex problems into manageable parts, as demonstrated in my previous role where I improved process efficiency by 20%.
Team player: I thrive in collaborative environments, having successfully led a project team to meet tight deadlines while maintaining high-q...
I appeared for an interview in Jul 2025, where I was asked the following questions.
I appeared for an interview in Jun 2025, where I was asked the following questions.
I have worked on various projects, including system upgrades, troubleshooting, and implementing new technologies.
Upgraded the network infrastructure for a local business, improving speed and reliability.
Troubleshot and resolved hardware issues for clients, ensuring minimal downtime.
Implemented a new inventory management system that streamlined operations and reduced errors.
Collaborated with a team to deploy a cloud-bas...
I had learn about Manual testing as per customer requirement how to test an application to find bugs
The Software Development Life Cycle (SDLC) is a structured process for developing software applications.
1. Requirement Analysis: Gathering and analyzing user requirements.
2. Design: Creating architecture and design specifications, e.g., UML diagrams.
3. Implementation: Writing code based on design specifications.
4. Testing: Verifying that the software meets requirements, e.g., unit testing.
5. Deployment: Releasing the s...
I applied via Campus Placement and was interviewed in Oct 2024. There were 2 interview rounds.
Some of the top questions asked at the Cognizant interview for freshers -
The duration of Cognizant interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 294 interview experiences
Difficulty level
Duration
based on 55.8k reviews
Rating in categories
Associate
71.2k
salaries
| ₹5.3 L/yr - ₹12.6 L/yr |
Programmer Analyst
56k
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Senior Associate
55.9k
salaries
| ₹10.1 L/yr - ₹23.8 L/yr |
Senior Processing Executive
30.1k
salaries
| ₹2.5 L/yr - ₹6.5 L/yr |
Technical Lead
18.6k
salaries
| ₹6 L/yr - ₹21.7 L/yr |
TCS
Infosys
Wipro
Accenture