Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Cigniti Technologies Team. If you also belong to the team, you can get access from here

Cigniti Technologies Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Cigniti Technologies Information Security Consultant Interview Questions, Process, and Tips

Updated 19 Feb 2023

Cigniti Technologies Information Security Consultant Interview Experiences

1 interview found

Interview experience
2
Poor
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(7 Questions)

  • Q1. What is Blind XSS? What is the technique to find one?
  • Ans. 

    Blind XSS is a type of XSS attack where the attacker does not receive the output of the injected script.

    • Blind XSS is also known as non-persistent XSS.

    • It is difficult to detect as the attacker does not receive any feedback.

    • One technique to find Blind XSS is to use a tool like Burp Suite to inject a payload and monitor the server response.

    • Another technique is to use a third-party service like XSS Hunter to track the payl...

  • Answered by AI
  • Q2. What is your favorite vulnerability? explain that
  • Ans. 

    My favorite vulnerability is SQL injection.

    • SQL injection is a type of attack where an attacker injects malicious SQL code into a database query.

    • It can be used to steal sensitive information, modify or delete data, or even take control of the entire database.

    • Preventing SQL injection involves using parameterized queries, input validation, and proper error handling.

    • Examples of high-profile SQL injection attacks include th...

  • Answered by AI
  • Q3. What is CRLF? explain that
  • Ans. 

    CRLF stands for Carriage Return Line Feed. It is a sequence of characters used to represent a line break in text files.

    • CRLF consists of two ASCII control characters: CR (carriage return) and LF (line feed).

    • It is commonly used in HTTP headers to separate lines of text.

    • CRLF can be exploited by attackers to inject malicious code or perform attacks such as HTTP response splitting.

    • To prevent such attacks, input validation a...

  • Answered by AI
  • Q4. How many XSS are there? what will be the mitigation?
  • Ans. 

    There are numerous types of XSS attacks. Mitigation involves input validation and output encoding.

    • There are three main types of XSS attacks: stored, reflected, and DOM-based.

    • Mitigation involves input validation to ensure that user input is safe and output encoding to prevent malicious code from being executed.

    • Examples of input validation include limiting the length of input and restricting the types of characters that ...

  • Answered by AI
  • Q5. Explain the process of SQLi. Mitigation?
  • Ans. 

    SQLi is a type of injection attack where an attacker injects malicious SQL code into a vulnerable application to gain unauthorized access to sensitive data.

    • SQLi involves exploiting vulnerabilities in web applications that allow user input to be executed as SQL commands

    • Attackers can use SQLi to bypass authentication, access sensitive data, modify or delete data, and even take control of the entire database

    • Mitigation tec...

  • Answered by AI
  • Q6. Explain the process of CSRF
  • Ans. 

    CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.

    • The attacker creates a website with a form that submits a request to the target website

    • The user visits the attacker's website and submits the form, unknowingly performing an action on the target website

    • The target website cannot distinguish between a legitimate request and the forged request from the attacke...

  • Answered by AI
  • Q7. What will be the best way to send CSRF token in the Clint Server communication?
  • Ans. 

    The best way to send CSRF token in client-server communication is through HTTP headers.

    • HTTP headers are the most secure way to send CSRF tokens.

    • The token should be sent in the 'X-CSRF-Token' header.

    • The header should be set to 'SameSite=Strict' to prevent cross-site request forgery attacks.

    • The token should be regenerated for each session to prevent replay attacks.

  • Answered by AI
Round 3 - Technical 

(3 Questions)

  • Q1. Help me understand If I need to take over a higher-privilege account with an existing lower-privilege account what are the options available?
  • Ans. 

    Options to take over a higher-privilege account with an existing lower-privilege account.

    • Use privilege escalation techniques to gain higher privileges

    • Exploit vulnerabilities in the system to gain access to higher-privilege accounts

    • Use social engineering to obtain login credentials for higher-privilege accounts

    • Use brute-force attacks to crack passwords for higher-privilege accounts

  • Answered by AI
  • Q2. Some scenario-based questions that are going to land take over an account with XSS
  • Q3. Different types of XSS
  • Ans. 

    XSS or Cross-Site Scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • Reflected XSS: The attacker injects a script that is reflected back to the user through a search query or form input.

    • Stored XSS: The attacker injects a script that is stored on the server and executed whenever the user visits the affected page.

    • DOM-based XSS: The attacker...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I was interviewed by Cigniti and their client Linde, the second interview was organized by Linde. Both interviews cleared, but because of the time delay by Linde, the Final interview was not scheduled till now, now it's almost one month. If anyone get this kind of opportunity from Cigniti think before you accept the offer, in the end, they will not take responsibility for your time and effort. Because of the incident, I loose one of the good opportunities from another organization.

Skills evaluated in this interview

Interview questions from similar companies

I applied via Referral and was interviewed before Nov 2020. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. How will you approach a problem

Interview Preparation Tips

Interview preparation tips for other job seekers - just keep calm. It went good as expected.

I appeared for an interview before Oct 2021.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Pairing 

(1 Question)

  • Q1. Assignment is given before hand and after that you'll have to pair with TW developer. While pairing, code smells/improvements are discussed
Round 3 - Technical 

(1 Question)

  • Q1. Questions related: to your last project to OOPS with system design

Interview Preparation Tips

Interview preparation tips for other job seekers - Know your current project well and explain it in detailed manner.
Prepare for some system design questions and DS Algo

I applied via Company Website and was interviewed before May 2021. There were 5 interview rounds.

Round 1 - Aptitude Test 

Online test with questions from probability and reasoning

Round 2 - Case Study 

A case study for which we need to create a dashboard and a power point presentation.

Round 3 - Coding Test 

SQL written test

Round 4 - Technical 

(2 Questions)

  • Q1. Technical round. Interviewed by two member panel.
  • Q2. About Tableau Previous projects SQL
Round 5 - HR 

(1 Question)

  • Q1. Common questions like expectations, salary expectations etc.

Interview Preparation Tips

Topics to prepare for Tiger Analytics Business Analyst interview:
  • SQL
  • Data Visualization
  • PROBABILITY
Interview preparation tips for other job seekers - Be confident and prepare well. Practice different SQL scenarios and get well versed with all the advanced sql functions.

I applied via Referral and was interviewed in Jun 2020. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. It was discussion on how to you did your project.and gave some scenario

Interview Preparation Tips

Interview preparation tips for other job seekers - Initially the time decided as 11 am,when i joined the interviewer told he has some urgent call.so he will call e at 3 pm in same link.
I was ok, because i need job,then he called a t 3 pm and he did not even bothered to say thanks,and asked the question and he just rejected i do not what was the issue.i said all the answer.
i have taken interview of many candidate we need to look the attitude of candidate and his willing to achieve success and how he will deliver good result to organization.

The interviewer should think that they also gained knowledge because somebody gave them opportunity.

Interview Questionnaire 

2 Questions

  • Q1. Oops and database modelling
  • Q2. Design Book my show

I applied via Job Portal and was interviewed in Jan 2022. There were 2 interview rounds.

Round 1 - Case Study 

Case study discussion and interview

Round 2 - One-on-one 

(1 Question)

  • Q1. Learning from the current jo.

Interview Preparation Tips

Interview preparation tips for other job seekers - First round covers previous job experience , skills and case study
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Agile scrum requirement gathering
Round 3 - Technical 

(1 Question)

  • Q1. Req priority, scrum , scenarios
Round 4 - HR 

(1 Question)

  • Q1. Salary etc etc etc

Consultant Interview Questions & Answers

Xoriant user image Shivam Vishwakarma

posted on 9 Mar 2025

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview before Mar 2024.

Round 1 - Coding Test 

Technical Discussion

Round 2 - Coding Test 

Technical Discussion with Coding Test

Round 3 - HR 

(2 Questions)

  • Q1. Previous Job Details
  • Ans. 

    I worked as a project manager at a consulting firm, leading teams to deliver strategic solutions for clients across various industries.

    • Managed a team of 10 consultants to deliver a market entry strategy for a tech startup.

    • Conducted data analysis to identify key trends, resulting in a 20% increase in client revenue.

    • Facilitated workshops with clients to align project goals and expectations, enhancing client satisfaction.

    • ...

  • Answered by AI
  • Q2. Salary discussion

Interview Preparation Tips

Interview preparation tips for other job seekers - Don't work as a contractual employee in xoriant , you won't get permanent position. no job security
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed before Jan 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

Typical aptitude questions along with a few multiple-choice questions from operating systems, computer networks, and programming languages.

Round 2 - One-on-one 

(1 Question)

  • Q1. Basic understanding of C program, operating systems, DBMS, data structures and 1 live coding test
Round 3 - HR 

(1 Question)

  • Q1. Behavioural test, willingness to relocate, package discussion.

Interview Preparation Tips

Topics to prepare for Xoriant Associate Software Engineer interview:
  • Computer Networking
  • Operating Systems
  • Data Structures
  • programming languages

Cigniti Technologies Interview FAQs

How many rounds are there in Cigniti Technologies Information Security Consultant interview?
Cigniti Technologies interview process usually has 3 rounds. The most common rounds in the Cigniti Technologies interview process are Technical and Resume Shortlist.
What are the top questions asked in Cigniti Technologies Information Security Consultant interview?

Some of the top questions asked at the Cigniti Technologies Information Security Consultant interview -

  1. Help me understand If I need to take over a higher-privilege account with an ex...read more
  2. What is Blind XSS? What is the technique to find o...read more
  3. What will be the best way to send CSRF token in the Clint Server communicati...read more

Tell us how to improve this page.

Cigniti Technologies Information Security Consultant Interview Process

based on 1 interview

Interview experience

2
  
Poor
View more

Interview Questions from Similar Companies

CitiusTech Interview Questions
3.4
 • 272 Interviews
Tiger Analytics Interview Questions
3.7
 • 225 Interviews
Altimetrik Interview Questions
3.8
 • 218 Interviews
Incedo Interview Questions
3.1
 • 182 Interviews
Xoriant Interview Questions
4.1
 • 182 Interviews
Globant Interview Questions
3.8
 • 175 Interviews
ThoughtWorks Interview Questions
3.9
 • 147 Interviews
Iris Software Interview Questions
4.0
 • 144 Interviews
Apexon Interview Questions
3.3
 • 141 Interviews
View all
Senior Test Engineer
618 salaries
unlock blur

₹5.5 L/yr - ₹21.4 L/yr

Senior Engineer
587 salaries
unlock blur

₹7 L/yr - ₹28 L/yr

Test Lead
387 salaries
unlock blur

₹8 L/yr - ₹28 L/yr

Test Engineer
367 salaries
unlock blur

₹4 L/yr - ₹11.5 L/yr

Project Lead
275 salaries
unlock blur

₹9.4 L/yr - ₹31 L/yr

Explore more salaries
Compare Cigniti Technologies with

Xoriant

4.1
Compare

Photon Interactive

4.1
Compare

CitiusTech

3.3
Compare

Iris Software

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview