i
CGI
Group
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Yes, a web application can be vulnerable to both XSS and SQL injection due to improper input validation.
XSS (Cross-Site Scripting) occurs when an application includes untrusted data in a web page without proper validation or escaping.
SQL Injection happens when an application includes untrusted data in a SQL query without proper sanitization.
For example, an input field that allows users to enter comments could be v...
CSP header bypass involves exploiting misconfigurations or weaknesses in Content Security Policy to execute unauthorized scripts.
1. Use of 'unsafe-inline': If a CSP allows 'unsafe-inline', attackers can inject scripts directly into HTML.
2. Whitelisting domains: If a CSP whitelists a domain that is compromised, attackers can serve malicious scripts from that domain.
3. Data URIs: Some CSP configurations may allow da...
Inheritance in object-oriented programming allows a class to inherit properties and behaviors from another class.
Inheritance allows for code reusability and promotes a hierarchical structure in classes.
Subclasses can access and modify the properties and methods of their parent class.
Example: class Animal { ... } class Dog extends Animal { ... }
Example: class Shape { ... } class Circle extends Shape { ... }
Reverse a string using array manipulation
Create an array of characters from the input string
Iterate through the array in reverse order and append each character to a new string
Return the reversed string
The time taken for the clock to tick from 8'o clock to 11'o clock is 105 seconds.
Each tick represents 1/8th of an hour (45 minutes) on the clock.
From 8'o clock to 11'o clock, there are 3 hours, so the total time taken is 3 * 45 = 135 minutes = 135 * 60 = 8100 seconds.
The time taken for the clock to tick from 8'o clock to 11'o clock is 8100 - 35 = 8065 seconds.
Use SQL query to select a particular column from a table and get the count of entries.
Use SELECT statement to specify the column you want to retrieve.
Use COUNT() function to get the count of entries in that column.
Combine both in a single query to achieve the desired result.
Developed a web-based application for managing project tasks and team collaboration.
Utilized React for the front-end to create a responsive user interface.
Implemented Node.js and Express for the back-end API to handle data requests.
Integrated MongoDB for database management to store user and project data.
Employed RESTful services for seamless communication between front-end and back-end.
Implemented user authentica...
To sell remaining items at original price, the salesman can create urgency or highlight value to attract buyers.
1. Create a sense of urgency: Use phrases like 'limited stock' or 'last chance' to encourage quick purchases.
2. Highlight the value: Emphasize the quality or benefits of the item to justify the original price.
3. Bundle offers: Consider bundling the item with another product to increase perceived value.
4....
Inheritance in Java allows a class to inherit properties and methods from another class.
Inheritance is a fundamental concept in object-oriented programming.
It promotes code reusability and allows for the creation of hierarchical relationships between classes.
The class that is being inherited from is called the superclass or parent class, while the class that inherits is called the subclass or child class.
The subcl...
Encapsulation is a mechanism in Java that binds data and methods together, hiding the internal details of an object.
Encapsulation helps in achieving data hiding and abstraction.
It allows the object to control its own state and behavior.
Data members are made private and accessed through public methods (getters and setters).
Encapsulation provides better maintainability, flexibility, and security.
Example: Class with ...
I appeared for an interview in Mar 2025, where I was asked the following questions.
XSS (Cross-Site Scripting) is a security vulnerability allowing attackers to inject malicious scripts into web pages viewed by users.
Sanitize user input to remove harmful scripts. Example: Use libraries like DOMPurify.
Implement Content Security Policy (CSP) to restrict sources of scripts.
Use HTTPOnly and Secure flags on cookies to prevent access via JavaScript.
Validate and encode output data to prevent script execution...
SQL (Structured Query Language) is a standard language for managing and manipulating relational databases.
SQL is used to perform tasks such as querying data, updating records, and managing database structures.
Second-order SQL injection occurs when an attacker injects malicious SQL code into a database, which is then executed later.
For example, an attacker might input a value that is stored in the database, and when tha...
CSP header bypass involves exploiting misconfigurations or weaknesses in Content Security Policy to execute unauthorized scripts.
1. Use of 'unsafe-inline': If a CSP allows 'unsafe-inline', attackers can inject scripts directly into HTML.
2. Whitelisting domains: If a CSP whitelists a domain that is compromised, attackers can serve malicious scripts from that domain.
3. Data URIs: Some CSP configurations may allow data UR...
Yes, a web application can be vulnerable to both XSS and SQL injection due to improper input validation.
XSS (Cross-Site Scripting) occurs when an application includes untrusted data in a web page without proper validation or escaping.
SQL Injection happens when an application includes untrusted data in a SQL query without proper sanitization.
For example, an input field that allows users to enter comments could be vulner...
I appeared for an interview in Feb 2025.
Around 120 minutes. Had Different sections for coding, verbal, CS fundamentals.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
Basically communication and sql 12 question and progaming mcq 12q and 2 coding question
Developed a web-based application for managing project tasks and team collaboration.
Utilized React for the front-end to create a responsive user interface.
Implemented Node.js and Express for the back-end API to handle data requests.
Integrated MongoDB for database management to store user and project data.
Employed RESTful services for seamless communication between front-end and back-end.
Implemented user authentication ...
Inheritance is a concept in object-oriented programming where a class inherits attributes and methods from another class.
Allows a class to inherit properties and behaviors from another class
Promotes code reusability and reduces redundancy
Derived class can add its own unique attributes and methods
Example: Class 'Car' can inherit from class 'Vehicle' and gain attributes like 'color' and methods like 'drive'
Inheritance in object-oriented programming allows a class to inherit properties and behaviors from another class.
Inheritance allows for code reusability and promotes a hierarchical structure in classes.
Subclasses can access and modify the properties and methods of their parent class.
Example: class Animal { ... } class Dog extends Animal { ... }
Example: class Shape { ... } class Circle extends Shape { ... }
Reverse a string using array manipulation
Create an array of characters from the input string
Iterate through the array in reverse order and append each character to a new string
Return the reversed string
Use SQL query to select a particular column from a table and get the count of entries.
Use SELECT statement to specify the column you want to retrieve.
Use COUNT() function to get the count of entries in that column.
Combine both in a single query to achieve the desired result.
To sell remaining items at original price, the salesman can create urgency or highlight value to attract buyers.
1. Create a sense of urgency: Use phrases like 'limited stock' or 'last chance' to encourage quick purchases.
2. Highlight the value: Emphasize the quality or benefits of the item to justify the original price.
3. Bundle offers: Consider bundling the item with another product to increase perceived value.
4. Targ...
The time taken for the clock to tick from 8'o clock to 11'o clock is 105 seconds.
Each tick represents 1/8th of an hour (45 minutes) on the clock.
From 8'o clock to 11'o clock, there are 3 hours, so the total time taken is 3 * 45 = 135 minutes = 135 * 60 = 8100 seconds.
The time taken for the clock to tick from 8'o clock to 11'o clock is 8100 - 35 = 8065 seconds.
Good,SQL query and c# programs
I applied via Referral and was interviewed in Aug 2024. There were 2 interview rounds.
Moderate difficulty level of the test
GD was conducted in a managed way
Moderate level of difficulty
I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.
Coding test held on Hipro platform which had 3 coding questions including mcqs
Top trending discussions
Some of the top questions asked at the CGI Group interview for freshers -
The duration of CGI Group interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 33 interview experiences
Difficulty level
Duration
based on 5k reviews
Rating in categories
Software Engineer
8.4k
salaries
| ₹5 L/yr - ₹12 L/yr |
Senior Software Engineer
7.7k
salaries
| ₹9 L/yr - ₹18.7 L/yr |
Lead Analyst
3.3k
salaries
| ₹15.2 L/yr - ₹26.3 L/yr |
Associate Software Engineer
1.9k
salaries
| ₹2.5 L/yr - ₹7 L/yr |
Senior Test Engineer
1.3k
salaries
| ₹9.7 L/yr - ₹17.7 L/yr |
Accenture
Wipro
Cognizant
Capgemini