i
Cognizant
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Dec 2021. There were 3 interview rounds.
We use a variety of technologies including Java, Python, AWS, Docker, and Kubernetes.
Java for backend development
Python for scripting and data analysis
AWS for cloud infrastructure
Docker for containerization
Kubernetes for container orchestration
I applied via Recruitment Consulltant and was interviewed before Feb 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Nov 2021. There was 1 interview round.
Virtual DOM is a lightweight copy of the actual DOM used for efficient updates.
Virtual DOM is a concept used in modern web development frameworks like React.
It is a lightweight copy of the actual DOM that is used to track changes and update the actual DOM efficiently.
When a change is made to the virtual DOM, it is compared to the previous version to determine the minimum number of changes required to update the actual ...
What people are saying about Cognizant
I applied via LinkedIn and was interviewed in Jun 2021. There was 1 interview round.
Cognizant interview questions for designations
I was interviewed in Dec 2024.
I was interviewed in Oct 2024.
To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.
Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.
Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.
Ensure that the IPsec tunnel is properly configured and tested for secure d...
To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.
Check the IPsec configuration on both ends to ensure they match
Verify that the tunnel endpoints can reach each other
Monitor logs on both devices for any error messages related to the tunnel
Use packet capture tools like Wireshark to analyze traffic going through the tunnel
SSL VPN allows remote users to securely access the network from any location.
SSL VPN uses encryption to secure the connection between the remote user and the network.
It authenticates users before granting access to resources.
SSL VPN can be set up using a web browser or a client application.
It provides a secure way for remote employees to access company resources.
SSL VPN can be configured to restrict access based on use
Configuring IPsec tunnel for 3 different locations and explaining traffic flow
Configure IPsec tunnel on routers/firewalls at each location
Set up IPsec policies for encryption and authentication
Define IPsec tunnel endpoints and establish secure communication
Ensure proper routing between locations for traffic flow
Monitor and troubleshoot the IPsec tunnel for any issues
To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.
Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.
Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...
To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.
Check the IPsec configurations on both ends to ensure they match
Verify network connectivity between the two locations
Check firewall and security policies to ensure they are not blocking the IPsec traffic
Review logs on both ends for any error messages or indications of the issue
Restart the IPsec serv
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Ai interview backend microservices core java
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based applications.
Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.
It allows for easy setup of Spring projects with minimal configuration.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.
It provides product...
Serialisation is the process of converting an object into a stream of bytes to store or transmit data.
Serialisation is used to save the state of an object and recreate it when needed.
It allows objects to be converted into a format that can be easily stored or transmitted.
Common examples include JSON, XML, and binary serialisation.
Serialisation is important for data persistence and inter-process communication.
Interview experience
based on 19 reviews
Rating in categories
Associate
72.4k
salaries
| ₹5.1 L/yr - ₹15.9 L/yr |
Programmer Analyst
55.5k
salaries
| ₹2.4 L/yr - ₹9.7 L/yr |
Senior Associate
48.4k
salaries
| ₹8.9 L/yr - ₹27.1 L/yr |
Senior Processing Executive
28.7k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Technical Lead
17.6k
salaries
| ₹5.9 L/yr - ₹24.4 L/yr |
TCS
Infosys
Wipro
Accenture