Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Cognizant Team. If you also belong to the team, you can get access from here

Cognizant Verified Tick

Compare button icon Compare button icon Compare

Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

Cognizant Cyber Security Engineer Interview Questions and Answers

Updated 12 Feb 2022

Cognizant Cyber Security Engineer Interview Experiences

2 interviews found

I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Questions about Firewall, WAF and cloud were asked!

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep your resume precise and accurate.
Most of the questions will be asked from your resume and from the answer you answer for the previous questions.
Be clear and to be point.
Have an effective communication with the interviewer.
Don't keep the whole session as QnA sessions, try to interact and discuss with the interviewer.

I applied via campus placement at Uttar Pradesh Technical University (UPTU) and was interviewed in Aug 2021. There were 3 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Difference between virus and Trojan?
  • Ans. 

    A virus is a self-replicating program that spreads by infecting other programs, while a Trojan is a program that appears harmless but actually has malicious intent.

    • Viruses attach themselves to clean files and spread when the infected file is executed.

    • Trojans are often disguised as legitimate software and trick users into installing them.

    • Viruses can cause damage to files and systems, while Trojans can steal data or give...

  • Answered by AI
  • Q2. Recent cyber attack
  • Q3. About OSI layer?

Interview Preparation Tips

Interview preparation tips for other job seekers - Basic technical knowledge. And good soft skills
Keep yourself interested during whole interview
Have a good listening skills
Use gesture to explain

Cyber Security Engineer Interview Questions Asked at Other Companies

asked in Cyient
Q1. What is your approach to Vulnerability Assessment and Penetration ... read more
Q2. What is private and public IP address
asked in Cyient
Q3. What are the port numbers used for HTTP, SMTP, and TCP?
Q4. Explain about web application VAPT & in depth concepts in it
asked in Singtel
Q5. What happens when you search for something on the internet?

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Normal aptitude group discussion assignment case study

Round 2 - Coding Test 

Coding test assignment one on one round

Round 3 - Technical 

(2 Questions)

  • Q1. Technical vs no tech
  • Ans. 

    Technical skills are essential for a Network Engineer, but soft skills are also important for effective communication and teamwork.

    • Technical skills are necessary for configuring and troubleshooting network devices.

    • Soft skills like communication, teamwork, and problem-solving are crucial for working effectively with colleagues and clients.

    • Balancing technical expertise with interpersonal skills is key to success in the r...

  • Answered by AI
  • Q2. Dhcp vs dns gdp vs rdp frp vs 30nd
  • Ans. 

    DHCP is a protocol used to assign IP addresses dynamically to devices on a network, while DNS is a system that translates domain names to IP addresses.

    • DHCP assigns IP addresses to devices on a network dynamically

    • DNS translates domain names to IP addresses

    • RDP (Remote Desktop Protocol) allows users to remotely connect to a computer

    • FRP (Fiberglass Reinforced Plastic) is a material used in construction

    • 30nd does not seem to

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - no

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Nov 2023. There was 1 interview round.

Round 1 - Technical 

(4 Questions)

  • Q1. What is stuck switching?
  • Ans. 

    Stuck switching refers to a situation where a network switch is unable to forward traffic due to a malfunction or configuration issue.

    • Stuck switching can occur when a switch's forwarding table becomes corrupted or when there is a hardware failure.

    • It can also happen if there is a loop in the network causing broadcast storms.

    • Troubleshooting stuck switching involves checking the switch's configuration, monitoring network ...

  • Answered by AI
  • Q2. What is bgp path selection process
  • Ans. 

    BGP path selection process determines the best path for routing based on various attributes.

    • BGP selects the path with the highest weight attribute first

    • If weights are the same, BGP looks at the local preference attribute

    • Next, BGP considers the AS path length

    • BGP then checks the origin code attribute

    • After that, BGP looks at the MED (Multi-Exit Discriminator) attribute

    • If all else is equal, BGP chooses the path with the lo...

  • Answered by AI
  • Q3. What is stub area
  • Ans. 

    A stub area is an OSPF area that does not contain external routes.

    • Stub areas reduce the amount of routing information exchanged within an OSPF network.

    • Stub areas use a default route to reach external networks.

    • Stub areas are commonly used to reduce the size of the OSPF database and improve network performance.

  • Answered by AI
  • Q4. What is stp? how to work.
  • Ans. 

    STP stands for Spanning Tree Protocol, used in network environments to prevent loops and ensure redundant paths are utilized efficiently.

    • STP is a network protocol used to prevent loops in Ethernet networks.

    • It works by selecting a single path for data traffic while blocking redundant paths.

    • STP elects a root bridge and calculates the shortest path to each network segment.

    • If a link fails, STP recalculates the network topo...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I was interviewed in Oct 2023.

Round 1 - Technical 

(3 Questions)

  • Q1. What is VRRP ?
  • Ans. 

    VRRP stands for Virtual Router Redundancy Protocol, used to provide high availability for routers by creating a virtual IP address.

    • VRRP allows multiple routers to work together in a group, with one router acting as the master and others as backups.

    • If the master router fails, one of the backup routers takes over the virtual IP address to ensure continuous network connectivity.

    • VRRP uses a priority value to determine whic...

  • Answered by AI
  • Q2. Why do we create VLAN?
  • Ans. 

    VLANs are created to segment network traffic, improve network performance, enhance security, and simplify network management.

    • Segment network traffic to improve performance and reduce congestion

    • Enhance security by isolating sensitive data or devices

    • Simplify network management by grouping devices logically

    • Allow for easier troubleshooting and maintenance

    • Enable better control over broadcast domains

    • Example: Creating separat

  • Answered by AI
  • Q3. How do we configure FAILOVER via static Route?
  • Ans. 

    Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.

    • Create multiple static routes with different next-hop IP addresses

    • Assign different administrative distances to each static route

    • Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - HR 

(2 Questions)

  • Q1. Question related to retention
  • Q2. Question related to aspirations

Interview Preparation Tips

Interview preparation tips for other job seekers - Good company

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Dec 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Must Hsrp, access list, stp and routing protocols
  • Q2. Switching protocol, GRE tunnel, ipsec tunnel, Cisco WLC
Round 3 - Technical 

(1 Question)

  • Q1. Bgp, vtp , vlan, DHCP

Interview Preparation Tips

Interview preparation tips for other job seekers - Must have troubleshooting skills in switching and routing protocols

I applied via Referral and was interviewed in Aug 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(8 Questions)

  • Q1. Routing tables in bgp and explain
  • Ans. 

    BGP routing tables store information about routes to different networks and the best path to reach them.

    • BGP uses a path-vector routing protocol to determine the best path for a packet to reach its destination.

    • BGP routing tables contain information about the network prefixes, the next hop to reach them, and the path attributes that determine the best path.

    • BGP routers exchange routing information with their neighbors to ...

  • Answered by AI
  • Q2. BGP Neighbor Table – table containing information about BGP neighbors. 2) BGP Table (also known as BGP topology table, BGP RIB) contains the network layer reachability information (NLRI) learned in compli...
  • Q3. What is nat and port number that can be used
  • Ans. 

    NAT is a technique used to map private IP addresses to public IP addresses. Port numbers are used to identify specific applications.

    • NAT stands for Network Address Translation

    • It is used to allow devices with private IP addresses to access the internet using a public IP address

    • Port numbers are used to identify specific applications or services

    • Common port numbers include 80 for HTTP, 443 for HTTPS, and 22 for SSH

  • Answered by AI
  • Q4. If neither the port range in source NAT pools nor the default port range are configured, the default single port range is 1024 through 63,487.
  • Ans. 

    Default single port range when neither port range in source NAT pools nor default port range are configured.

    • When neither port range in source NAT pools nor default port range are configured, the default single port range is 1024 through 63,487.

    • This range is used for outbound traffic initiated by the device.

    • It is important to configure the port range to avoid conflicts with other devices on the network.

    • For example, if m...

  • Answered by AI
  • Q5. What is mss in tcp explain
  • Ans. 

    MSS in TCP refers to the maximum segment size, which is the largest amount of data that can be sent in a single TCP segment.

    • MSS is negotiated during the TCP three-way handshake

    • It is determined by the maximum transmission unit (MTU) of the network

    • MSS can be adjusted by the sender or receiver using TCP options

    • A smaller MSS can help prevent fragmentation and improve network performance

  • Answered by AI
  • Q6. The maximum segment size is a parameter of the options field of the TCP header that specifies the largest amount of data, specified in bytes, that a computer or communications device can receive in a singl...
  • Q7. Troubleshooting pAcket drops
  • Ans. 

    Packet drops can be caused by various factors. Troubleshooting involves identifying the root cause and implementing a solution.

    • Check for network congestion or bandwidth limitations

    • Verify if the packet is being dropped at the source or destination

    • Inspect network devices for errors or misconfigurations

    • Use packet capture tools to analyze the traffic

    • Consider implementing Quality of Service (QoS) policies

    • Update firmware or

  • Answered by AI
  • Q8. Chekc port and duplex setting. Check mss and mtu Check link utilization
  • Ans. 

    To check port and duplex setting, MSS and MTU, and link utilization in network engineering.

    • Use command 'show interface' to check port and duplex setting.

    • Use command 'ping -f -l ' to check MTU.

    • Use command 'netstat -s' to check MSS.

    • Use command 'show interface' or 'show interfaces utilization' to check link utilization.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - This was kind mass hiring.
I worked as sdwan and network security, interviewer asked him generic question regarding networking.
I would not consider infy because pay is low and we are unaware which project we will end up in.
The HR offered me less salary then the offering I was holding.
Unless job is referral, and salary is discussed upfront with project.
I Wil not advice infy for experienced folks for network and security background

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - One-on-one 

(2 Questions)

  • Q1. Bgp ospf,stp,nexus
  • Q2. Aws,azure,vxlan,vnet

Cognizant Interview FAQs

How many rounds are there in Cognizant Cyber Security Engineer interview?
Cognizant interview process usually has 1 rounds. The most common rounds in the Cognizant interview process are Technical.
What are the top questions asked in Cognizant Cyber Security Engineer interview?

Some of the top questions asked at the Cognizant Cyber Security Engineer interview -

  1. Difference between virus and Troj...read more
  2. Questions about Firewall, WAF and cloud were ask...read more
  3. About OSI lay...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.8
 • 8.2k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.8
 • 3.1k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
View all
Cognizant Cyber Security Engineer Salary
based on 44 salaries
₹4 L/yr - ₹11.7 L/yr
22% less than the average Cyber Security Engineer Salary in India
View more details

Cognizant Cyber Security Engineer Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

5.0

Skill development

5.0

Work-life balance

4.0

Salary

5.0

Job security

4.0

Company culture

3.0

Promotions

4.0

Work satisfaction

Explore 1 Review and Rating
Associate
72.2k salaries
unlock blur

₹5.1 L/yr - ₹16 L/yr

Programmer Analyst
55.5k salaries
unlock blur

₹2.4 L/yr - ₹9.5 L/yr

Senior Associate
48.6k salaries
unlock blur

₹9 L/yr - ₹27.3 L/yr

Senior Processing Executive
28.9k salaries
unlock blur

₹1.8 L/yr - ₹9 L/yr

Technical Lead
17.6k salaries
unlock blur

₹5.9 L/yr - ₹24.7 L/yr

Explore more salaries
Compare Cognizant with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

Accenture

3.8
Compare
Did you find this page helpful?
Yes No
write
Share an Interview