i
CGI
Group
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Deploying a Python Azure Function involves creating, configuring, and publishing the function to Azure using various tools.
1. Create a Python Azure Function using Azure CLI: `func init MyFunctionApp --python`.
2. Develop your function in the created directory, e.g., `MyFunctionApp/MyFunction/__init__.py`.
3. Test locally using the Azure Functions Core Tools: `func start`.
4. Deploy to Azure using Azure CLI: `az funct...
Azure offers a wide range of services with Python SDK support for cloud development and management.
Azure Storage: Use the Azure Storage Blob SDK to manage blobs in Azure Storage.
Azure Cosmos DB: Interact with Cosmos DB using the Azure Cosmos SDK for Python.
Azure Machine Learning: Build and deploy machine learning models with the Azure ML SDK.
Azure Functions: Create serverless applications using the Azure Functions...
Extracting the domain name from an email ID involves parsing the string after the '@' symbol.
Use string manipulation functions to split the email ID at the '@' symbol.
For example, for 'user@example.com', the domain is 'example.com'.
In SQL, you can use SUBSTRING_INDEX(email, '@', -1) to get the domain.
In Python, you can use email.split('@')[1] to extract the domain.
Query to find employees in the same department as the highest-paid employee.
Use a subquery to find the highest salary: SELECT MAX(salary) FROM employees.
Join the employees table with itself to filter by department.
Example query: SELECT name FROM employees WHERE department_id = (SELECT department_id FROM employees WHERE salary = (SELECT MAX(salary) FROM employees));
To extract numeric data from a string, identify and isolate the digits within the text.
Use regular expressions to find digits: e.g., \d+ matches one or more digits.
Iterate through each character and check if it's a digit using isdigit() method.
Example: From 'AADFSDF$12324ASDFDFG', the extracted number is '12324'.
Identify email addresses that do not contain an underscore character.
Use a query to filter email addresses without '_'.
Example SQL: SELECT email FROM users WHERE email NOT LIKE '%_%';
Regular expressions can also be used for validation.
Example regex: ^[^_]+@[^_]+\.[a-z]{2,}$
A complete binary tree is fully filled except for the last level, while a perfect binary tree is completely filled at all levels.
A complete binary tree has all levels fully filled except possibly the last level, which is filled from left to right.
A perfect binary tree has all levels completely filled, meaning every node has two children except for the leaves.
Example of a complete binary tree: Levels 0, 1, and 2 ar...
Quicksort's time complexity can degrade to O(n^2) in worst-case scenarios, affecting performance significantly.
Worst-case occurs when the pivot is the smallest or largest element, e.g., sorting an already sorted array.
Average-case time complexity is O(n log n), which is efficient for most inputs.
Best-case occurs with a balanced pivot, leading to O(n log n) performance.
Using randomization or the median-of-three met...
Yes, I am open to relocating to Bangalore for this opportunity, as it aligns with my career goals and personal growth.
Bangalore is a major tech hub, offering numerous opportunities for networking and professional development.
Relocating would allow me to work closely with industry leaders and innovative companies.
I have researched the cost of living and found it manageable, making the move feasible.
I am excited abo...
Handling high traffic in a Node.js application involves optimizing performance, scaling, and managing resources effectively.
Load Balancing: Distribute incoming traffic across multiple server instances using tools like Nginx or AWS Elastic Load Balancing.
Clustering: Utilize Node.js's built-in cluster module to create multiple instances of your application, taking advantage of multi-core systems.
Caching: Implement c...
I applied via Naukri.com and was interviewed in Jan 2024. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2024. There were 3 interview rounds.
Average to easy difficulty level.
String manipulation in Java involves various methods like substring, concat, replace, etc.
Use substring() to extract a part of the string
Use concat() to concatenate two strings
Use replace() to replace a specific character or substring in a string
Various sorting algorithms in Java code
Bubble Sort: int[] arr = {5, 2, 8, 1, 3}; Arrays.sort(arr);
Selection Sort: int[] arr = {5, 2, 8, 1, 3}; Arrays.sort(arr);
Insertion Sort: int[] arr = {5, 2, 8, 1, 3}; Arrays.sort(arr);
Merge Sort: int[] arr = {5, 2, 8, 1, 3}; Arrays.sort(arr);
Quick Sort: int[] arr = {5, 2, 8, 1, 3}; Arrays.sort(arr);
The company is a leading software development firm specializing in creating innovative solutions for various industries.
Specializes in creating innovative software solutions
Works with clients from various industries
Known for high-quality and reliable products
Has a strong team of software engineers and developers
Handled conflicts by addressing issues directly, seeking compromise, and maintaining professionalism.
Addressed a disagreement with a colleague by scheduling a one-on-one meeting to discuss concerns and find common ground.
Resolved a conflict with a manager by actively listening to their perspective, providing feedback, and working together to find a solution.
Maintained professionalism during conflicts by staying calm, r...
I would gather more data to support my idea, present a compelling case to my manager, and be open to feedback and compromise.
Gather data to support the idea, such as market research, user feedback, or cost-benefit analysis.
Prepare a well-structured presentation highlighting the potential benefits of the product idea.
Listen to the manager's concerns and feedback, and be open to making adjustments or compromises.
Seek sup...
I appeared for an interview in Feb 2025, where I was asked the following questions.
Adding a new field in MVC requires updates in the backend and frontend for seamless data flow.
1. Update the Model: Add the new field to the data model class (e.g., 'public string NewField { get; set; }' in C#).
2. Update the Database: Modify the database schema to include the new field (e.g., using a migration in Entity Framework).
3. Update the Controller: Ensure the controller retrieves and sends the new field data to ...
I appeared for an interview in Mar 2025, where I was asked the following questions.
XSS (Cross-Site Scripting) is a security vulnerability allowing attackers to inject malicious scripts into web pages viewed by users.
Sanitize user input to remove harmful scripts. Example: Use libraries like DOMPurify.
Implement Content Security Policy (CSP) to restrict sources of scripts.
Use HTTPOnly and Secure flags on cookies to prevent access via JavaScript.
Validate and encode output data to prevent script execution...
SQL (Structured Query Language) is a standard language for managing and manipulating relational databases.
SQL is used to perform tasks such as querying data, updating records, and managing database structures.
Second-order SQL injection occurs when an attacker injects malicious SQL code into a database, which is then executed later.
For example, an attacker might input a value that is stored in the database, and when tha...
CSP header bypass involves exploiting misconfigurations or weaknesses in Content Security Policy to execute unauthorized scripts.
1. Use of 'unsafe-inline': If a CSP allows 'unsafe-inline', attackers can inject scripts directly into HTML.
2. Whitelisting domains: If a CSP whitelists a domain that is compromised, attackers can serve malicious scripts from that domain.
3. Data URIs: Some CSP configurations may allow data UR...
Yes, a web application can be vulnerable to both XSS and SQL injection due to improper input validation.
XSS (Cross-Site Scripting) occurs when an application includes untrusted data in a web page without proper validation or escaping.
SQL Injection happens when an application includes untrusted data in a SQL query without proper sanitization.
For example, an input field that allows users to enter comments could be vulner...
I appeared for an interview in Feb 2025.
Understanding JavaScript concepts like parameters, closures, and variable declarations is crucial for effective coding.
Parameters are variables listed as part of a function's definition, while arguments are the actual values passed to the function.
Example: function add(a, b) { return a + b; } - 'a' and 'b' are parameters; add(2, 3) - '2' and '3' are arguments.
Closures are functions that remember their lexical scope eve...
Create a simple Angular form to capture user details and display them in a table upon submission.
Use Angular Reactive Forms for form handling.
Create a form with fields: name, email, and mobile.
Bind form controls to the template using [(ngModel)].
On form submission, push the form data to an array.
Use *ngFor to display the array data in a table.
I appeared for an interview in Feb 2025.
Around 120 minutes. Had Different sections for coding, verbal, CS fundamentals.
I applied via Indeed and was interviewed in Dec 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
Formulating security for vendors implementing ISO 27001 involves risk assessment, policy development, and continuous monitoring.
Conduct a thorough risk assessment to identify potential vulnerabilities and threats.
Develop and implement security policies that align with ISO 27001 requirements.
Ensure vendor staff are trained on information security best practices.
Establish a continuous monitoring process to assess complia...
Evaluate security controls for applications handling data from internet and corporate connections to hybrid cloud storage.
Implement strong authentication mechanisms (e.g., multi-factor authentication) for users accessing the application.
Ensure data encryption in transit and at rest to protect sensitive information (e.g., using TLS for data in transit).
Conduct regular vulnerability assessments and penetration testing to...
I applied via Approached by Company and was interviewed in Oct 2024. There were 2 interview rounds.
Top trending discussions
Some of the top questions asked at the CGI Group interview -
The duration of CGI Group interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 468 interview experiences
Difficulty level
Duration
based on 5k reviews
Rating in categories
Software Engineer
8.4k
salaries
| ₹5 L/yr - ₹12 L/yr |
Senior Software Engineer
7.6k
salaries
| ₹7.8 L/yr - ₹18.6 L/yr |
Lead Analyst
3.3k
salaries
| ₹15.1 L/yr - ₹26.2 L/yr |
Associate Software Engineer
1.9k
salaries
| ₹2.5 L/yr - ₹7 L/yr |
Senior Test Engineer
1.3k
salaries
| ₹9.4 L/yr - ₹17.5 L/yr |
Accenture
Wipro
Cognizant
Capgemini