i
Quantta Analytics
Filter interviews by
Clear (1)
I applied via Campus Placement and was interviewed in Apr 2023. There were 3 interview rounds.
Gave assignment on fullstack project and gave one day time
Top trending discussions
I was interviewed in Sep 2016.
I am a recent graduate with a degree in Computer Science and a passion for coding and problem-solving.
Graduated with a degree in Computer Science
Passionate about coding and problem-solving
Completed internships at tech companies
I was responsible for managing social media accounts and creating engaging content for a marketing agency.
Managed social media accounts for clients
Created content calendars and posts for various platforms
Analyzed engagement metrics to optimize content strategy
MBA provides advanced business knowledge, skills, and networking opportunities.
MBA helps develop strategic thinking and leadership skills.
It provides a deeper understanding of business concepts and practices.
MBA graduates often have better job prospects and higher earning potential.
Networking opportunities with industry professionals and alumni can lead to valuable connections.
Specializations in areas like finance, mar...
Key takeaways from MBA include leadership skills, strategic thinking, and networking opportunities.
Developing strong leadership skills through coursework and group projects
Learning strategic thinking and decision-making through case studies and simulations
Building a strong professional network through internships, networking events, and alumni connections
Cognizant offers a diverse range of opportunities for growth and development in the IT industry.
Cognizant is a global leader in IT services and consulting.
They have a strong reputation for delivering high-quality solutions to clients.
Cognizant provides a collaborative and inclusive work environment.
They offer extensive training and learning programs to enhance skills.
Cognizant has a strong focus on innovation and digit...
Studied case studies on marketing strategies and ethical dilemmas in business.
Analyzed a case study on how Coca-Cola's marketing strategies helped increase sales and brand awareness.
Discussed a case study on a company facing an ethical dilemma and the consequences of their decisions.
Explored the impact of social media on consumer behavior in a case study on a successful marketing campaign.
My goal in life is to make a positive impact on others and contribute to the betterment of society.
To work towards improving healthcare access and quality
To advocate for social justice and equality
To continuously learn and grow both personally and professionally
To build meaningful relationships and support others in their journeys
To leave a lasting legacy that inspires future generations
I resolved a disagreement between two team members by facilitating a meeting and encouraging open communication.
Identified the root cause of the disagreement
Scheduled a meeting with both parties to discuss the issue
Encouraged open communication and active listening
Facilitated a compromise that satisfied both parties
I was interviewed before Jul 2021.
I applied via Campus Placement and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via Campus Placement and was interviewed before Aug 2022. There were 5 interview rounds.
This was easy. All questions were answerable.
Number of coding questions are 3 and 3 are able to solve.
posted on 8 Jun 2023
I applied via Job Portal
Discussion about information security fundamentals and CIA traid
posted on 18 Aug 2023
I applied via Campus Placement and was interviewed before Aug 2022. There were 4 interview rounds.
Basic and medium problems
An array is a data structure that stores a collection of elements of the same type in a contiguous memory location.
Arrays have a fixed size determined at the time of declaration.
Elements in an array are accessed using an index starting from 0.
Example: string[] names = {"Alice", "Bob", "Charlie"};
I applied via Campus Placement
Aptitude normal level
DSA questions were asked from medium to difficult
I applied via Referral and was interviewed in May 2023. There were 2 interview rounds.
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Big Data Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Science Executive
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Cognizant
Sutherland Global Services
Optum Global Solutions
Hexaware Technologies