i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Campus Placement and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Campus Placement and was interviewed before Sep 2021. There were 3 interview rounds.
A C program for designing calculator
Use switch case for different operations
Use scanf to take input from user
Use printf to display output
Use functions for each operation
Use loops for continuous calculations
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Naukri.com and was interviewed before Nov 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 4 interview rounds.
based on 2 interviews
Interview experience
based on 33 reviews
Rating in categories
Associate
72.2k
salaries
| ₹5.2 L/yr - ₹16 L/yr |
Programmer Analyst
55.6k
salaries
| ₹2.4 L/yr - ₹9.4 L/yr |
Senior Associate
49.5k
salaries
| ₹8.9 L/yr - ₹28 L/yr |
Senior Processing Executive
29k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹25 L/yr |
TCS
Infosys
Wipro
Accenture