i
Cigniti Technologies
Filter interviews by
I applied via Company Website
I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.
Blind XSS is a type of XSS attack where the attacker does not receive the output of the injected script.
Blind XSS is also known as non-persistent XSS.
It is difficult to detect as the attacker does not receive any feedback.
One technique to find Blind XSS is to use a tool like Burp Suite to inject a payload and monitor the server response.
Another technique is to use a third-party service like XSS Hunter to track the payl...
My favorite vulnerability is SQL injection.
SQL injection is a type of attack where an attacker injects malicious SQL code into a database query.
It can be used to steal sensitive information, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized queries, input validation, and proper error handling.
Examples of high-profile SQL injection attacks include th...
CRLF stands for Carriage Return Line Feed. It is a sequence of characters used to represent a line break in text files.
CRLF consists of two ASCII control characters: CR (carriage return) and LF (line feed).
It is commonly used in HTTP headers to separate lines of text.
CRLF can be exploited by attackers to inject malicious code or perform attacks such as HTTP response splitting.
To prevent such attacks, input validation a...
There are numerous types of XSS attacks. Mitigation involves input validation and output encoding.
There are three main types of XSS attacks: stored, reflected, and DOM-based.
Mitigation involves input validation to ensure that user input is safe and output encoding to prevent malicious code from being executed.
Examples of input validation include limiting the length of input and restricting the types of characters that ...
SQLi is a type of injection attack where an attacker injects malicious SQL code into a vulnerable application to gain unauthorized access to sensitive data.
SQLi involves exploiting vulnerabilities in web applications that allow user input to be executed as SQL commands
Attackers can use SQLi to bypass authentication, access sensitive data, modify or delete data, and even take control of the entire database
Mitigation tec...
CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.
The attacker creates a website with a form that submits a request to the target website
The user visits the attacker's website and submits the form, unknowingly performing an action on the target website
The target website cannot distinguish between a legitimate request and the forged request from the attacke...
The best way to send CSRF token in client-server communication is through HTTP headers.
HTTP headers are the most secure way to send CSRF tokens.
The token should be sent in the 'X-CSRF-Token' header.
The header should be set to 'SameSite=Strict' to prevent cross-site request forgery attacks.
The token should be regenerated for each session to prevent replay attacks.
Options to take over a higher-privilege account with an existing lower-privilege account.
Use privilege escalation techniques to gain higher privileges
Exploit vulnerabilities in the system to gain access to higher-privilege accounts
Use social engineering to obtain login credentials for higher-privilege accounts
Use brute-force attacks to crack passwords for higher-privilege accounts
XSS or Cross-Site Scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: The attacker injects a script that is reflected back to the user through a search query or form input.
Stored XSS: The attacker injects a script that is stored on the server and executed whenever the user visits the affected page.
DOM-based XSS: The attacker...
I applied via Naukri.com and was interviewed in Mar 2023. There were 4 interview rounds.
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
Cigniti Technologies interview questions for popular designations
I have used T codes such as FBL5N, FBL1N, FB50, FB60, FB70 in SAP ISU for various testing purposes.
FBL5N - Display Customer Line Items
FBL1N - Display Vendor Line Items
FB50 - G/L Account Posting
FB60 - Vendor Invoice Posting
FB70 - Customer Invoice Posting
Billing customers in SAP ISU involves creating billing documents based on meter reads.
Billing in SAP ISU involves creating billing documents using transaction code EA16
Different meter reads include actual reads, estimated reads, and manual reads
Actual reads are readings taken directly from the meter, estimated reads are calculated based on previous consumption patterns, and manual reads are entered by the user
Get interview-ready with Top Cigniti Technologies Interview Questions
Basic java questions
Reverse a given string
Use a loop to iterate through the characters of the string and build a new string in reverse order
Alternatively, use built-in functions like reverse() or StringBuilder in some programming languages
I was interviewed in Jan 2023.
I applied via Naukri.com and was interviewed before Aug 2023. There was 1 interview round.
I was interviewed before Jan 2024.
It was good 30 questions 30 min
It went well . everyone got chance to speak
Explaining manual and automation testing, types of bugs, HTTP methods, sanity testing, functional testing, retesting, regression testing, iframe and multiple windows handling.
Manual testing is done manually by a tester, while automation testing is done using tools and scripts.
Bugs can be functional, performance, security, usability, etc.
HTTP methods include GET, POST, PUT, DELETE, HEAD, OPTIONS, CONNECT, TRACE.
Sanity t...
Answering questions related to software quality analysis
Dimension and Point classes are used in software testing to represent the size and location of objects on a screen
Screenshots in Selenium can be taken using the TakesScreenshot interface and getScreenshotAs() method
Synchronization is the process of ensuring that the application waits for a certain condition to be met before proceeding with the next step
Parameteriz...
Top trending discussions
Interview experience
based on 621 reviews
Rating in categories
Senior Test Engineer
620
salaries
| ₹5.5 L/yr - ₹17.5 L/yr |
Senior Engineer
506
salaries
| ₹6.5 L/yr - ₹24.4 L/yr |
Test Lead
386
salaries
| ₹6.8 L/yr - ₹27 L/yr |
Test Engineer
360
salaries
| ₹4 L/yr - ₹12.5 L/yr |
Project Lead
255
salaries
| ₹10.2 L/yr - ₹29 L/yr |
TCS
Wipro
Infosys
HCLTech