i
Cigniti Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
final, finally, and finalize are keywords in Java with different meanings.
final is a keyword used to declare a constant value that cannot be modified
finally is a block used in exception handling to ensure a piece of code is always executed
finalize is a method in the Object class used for garbage collection before an object is destroyed
Var is used to declare implicitly typed local variables, while Ref is used for passing arguments by reference.
Var keyword allows the compiler to infer the type of the variable based on the assigned value.
Ref keyword is used to pass arguments by reference, allowing the called method to modify the original value.
Var example: var number = 10; // Compiler infers the type as int
Ref example: void ModifyValue(ref int value) {...
A framework is a reusable set of libraries or tools that provide a structure for developing software applications.
Framework provides a foundation for building software applications
It includes pre-written code, libraries, and tools to help developers
Frameworks can be specific to a programming language or platform
Examples: React for front-end web development, Django for back-end web development
I applied via Walk-in and was interviewed in Apr 2023. There were 4 interview rounds.
Agile is a flexible and iterative approach to project management, while SAFe agile is a framework for scaling Agile to larger organizations.
Agile focuses on individual teams working in short iterations, while SAFe agile extends this to multiple teams and departments working together.
Agile values individuals and interactions over processes and tools, while SAFe agile emphasizes alignment, collaboration, and delivery acr...
Performance testing involves evaluating the speed, responsiveness, and stability of a system under various conditions.
Performance testing is used to identify bottlenecks, assess system capacity, and ensure reliability.
It involves simulating real-world scenarios to measure the system's response time, throughput, and resource utilization.
Performance engineering focuses on optimizing system performance through design, dev...
I applied via Company Website
Cigniti Technologies interview questions for popular designations
I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.
Blind XSS is a type of XSS attack where the attacker does not receive the output of the injected script.
Blind XSS is also known as non-persistent XSS.
It is difficult to detect as the attacker does not receive any feedback.
One technique to find Blind XSS is to use a tool like Burp Suite to inject a payload and monitor the server response.
Another technique is to use a third-party service like XSS Hunter to track the payl...
My favorite vulnerability is SQL injection.
SQL injection is a type of attack where an attacker injects malicious SQL code into a database query.
It can be used to steal sensitive information, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized queries, input validation, and proper error handling.
Examples of high-profile SQL injection attacks include th...
CRLF stands for Carriage Return Line Feed. It is a sequence of characters used to represent a line break in text files.
CRLF consists of two ASCII control characters: CR (carriage return) and LF (line feed).
It is commonly used in HTTP headers to separate lines of text.
CRLF can be exploited by attackers to inject malicious code or perform attacks such as HTTP response splitting.
To prevent such attacks, input validation a...
There are numerous types of XSS attacks. Mitigation involves input validation and output encoding.
There are three main types of XSS attacks: stored, reflected, and DOM-based.
Mitigation involves input validation to ensure that user input is safe and output encoding to prevent malicious code from being executed.
Examples of input validation include limiting the length of input and restricting the types of characters that ...
SQLi is a type of injection attack where an attacker injects malicious SQL code into a vulnerable application to gain unauthorized access to sensitive data.
SQLi involves exploiting vulnerabilities in web applications that allow user input to be executed as SQL commands
Attackers can use SQLi to bypass authentication, access sensitive data, modify or delete data, and even take control of the entire database
Mitigation tec...
CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.
The attacker creates a website with a form that submits a request to the target website
The user visits the attacker's website and submits the form, unknowingly performing an action on the target website
The target website cannot distinguish between a legitimate request and the forged request from the attacke...
The best way to send CSRF token in client-server communication is through HTTP headers.
HTTP headers are the most secure way to send CSRF tokens.
The token should be sent in the 'X-CSRF-Token' header.
The header should be set to 'SameSite=Strict' to prevent cross-site request forgery attacks.
The token should be regenerated for each session to prevent replay attacks.
Options to take over a higher-privilege account with an existing lower-privilege account.
Use privilege escalation techniques to gain higher privileges
Exploit vulnerabilities in the system to gain access to higher-privilege accounts
Use social engineering to obtain login credentials for higher-privilege accounts
Use brute-force attacks to crack passwords for higher-privilege accounts
XSS or Cross-Site Scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: The attacker injects a script that is reflected back to the user through a search query or form input.
Stored XSS: The attacker injects a script that is stored on the server and executed whenever the user visits the affected page.
DOM-based XSS: The attacker...
Get interview-ready with Top Cigniti Technologies Interview Questions
I applied via Naukri.com and was interviewed in Mar 2023. There were 4 interview rounds.
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
I have used T codes such as FBL5N, FBL1N, FB50, FB60, FB70 in SAP ISU for various testing purposes.
FBL5N - Display Customer Line Items
FBL1N - Display Vendor Line Items
FB50 - G/L Account Posting
FB60 - Vendor Invoice Posting
FB70 - Customer Invoice Posting
Billing customers in SAP ISU involves creating billing documents based on meter reads.
Billing in SAP ISU involves creating billing documents using transaction code EA16
Different meter reads include actual reads, estimated reads, and manual reads
Actual reads are readings taken directly from the meter, estimated reads are calculated based on previous consumption patterns, and manual reads are entered by the user
Basic java questions
Reverse a given string
Use a loop to iterate through the characters of the string and build a new string in reverse order
Alternatively, use built-in functions like reverse() or StringBuilder in some programming languages
I was interviewed in Jan 2023.
Top trending discussions
Some of the top questions asked at the Cigniti Technologies interview -
The duration of Cigniti Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 60 interviews
Interview experience
based on 667 reviews
Rating in categories
Senior Test Engineer
609
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
513
salaries
| ₹0 L/yr - ₹0 L/yr |
Test Lead
389
salaries
| ₹0 L/yr - ₹0 L/yr |
Test Engineer
358
salaries
| ₹0 L/yr - ₹0 L/yr |
Engineer
262
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Infosys
HCLTech