i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Superset and was interviewed in Apr 2022. There were 4 interview rounds.
Tricky question
1 minute for candidate on a topic
VPN is a secure connection between two devices over the internet. Cashless payments eliminate the need for physical currency. Servers store and manage data for networked devices.
VPN stands for Virtual Private Network and is used to securely connect two devices over the internet.
Cashless payments refer to transactions made without the use of physical currency, such as credit cards or mobile payments.
Servers are computer...
posted on 16 Nov 2023
I applied via Naukri.com and was interviewed in Oct 2023. There were 2 interview rounds.
Use remote access tools like SSH or RDP to connect to the server without physical access.
Use SSH (Secure Shell) for connecting to Linux servers remotely.
Use RDP (Remote Desktop Protocol) for connecting to Windows servers remotely.
Set up VPN (Virtual Private Network) for secure remote access.
Utilize tools like TeamViewer or AnyDesk for remote desktop access.
Ensure proper security measures like strong passwords and two-f
Handle critical issues by prioritizing, troubleshooting, communicating, and documenting.
Prioritize critical issues based on impact and urgency
Troubleshoot systematically to identify root cause
Communicate effectively with stakeholders and team members
Document the issue, resolution, and steps taken for future reference
posted on 10 May 2024
OOPS stands for Object-Oriented Programming System. Its pillars are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation restricts access to certain components within a class, protecting the data.
Abstraction hides the complex implementation details and only shows the necessary features to the outside world.
Polymorphism a...
O365 provides secure transport rules and email flow using SMTP.
Office 365 (O365) ensures secure transport rules for email flow.
Transport rules in O365 allow administrators to control email flow and apply security measures.
SMTP (Simple Mail Transfer Protocol) is used for sending and receiving emails securely.
O365 offers various security features like encryption, anti-malware, and anti-spam filters to protect email commu
Online assesment first HR person call, then the online versant test and online assesment. Then call for an interview.
posted on 20 Aug 2022
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Sep 2023. There were 2 interview rounds.
Modules in Terraform are reusable components that allow you to encapsulate and organize your infrastructure code.
Modules help in breaking down complex infrastructure into smaller, manageable components
They promote reusability and maintainability of code
Modules can be shared and used across different projects
Example: Creating a module for provisioning a virtual machine in Azure
Use encrypted variables, limit access to credentials, and utilize secure storage solutions.
Encrypt sensitive variables using tools like Vault or AWS KMS
Limit access to credentials by using least privilege principles
Store credentials securely in a password manager or key vault
Avoid hardcoding credentials in Terraform configuration files
VPC is a virtual private cloud that allows you to create isolated networks, NAT Gateway enables instances in a private subnet to connect to the internet, NACL controls inbound and outbound traffic at the subnet level, SG controls traffic at the instance level.
VPC is a virtual network in the cloud that you can define and customize, providing a secure environment for your resources.
NAT Gateway allows instances in a priva...
A Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image.
Start with a base image
Use the FROM keyword to specify the base image
Add any necessary dependencies using the RUN keyword
Copy application code into the image using the COPY keyword
Expose any necessary ports using the EXPOSE keyword
Specify the command to run when the container starts using the CMD ke
CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.
Stages: Build, Test, Deploy, Monitor
Issues: Integration challenges, Pipeline failures
Example: Integration challenges with third-party tools delaying deployment
To check if a pod in ReplicaSet went down or failed, monitor the pod status, logs, and events.
Monitor the pod status using kubectl get pods command
Check the pod logs for any error messages using kubectl logs command
Review the events related to the pod using kubectl describe pod command
Set up alerts or notifications for pod failures using monitoring tools like Prometheus or Grafana
Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.
I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.
I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.
I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.
Associate
72.4k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
Programmer Analyst
55.5k
salaries
| ₹2.4 L/yr - ₹8 L/yr |
Senior Associate
48.4k
salaries
| ₹9 L/yr - ₹27.2 L/yr |
Senior Processing Executive
28.8k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹24.2 L/yr |
TCS
Infosys
Wipro
Accenture