i
Soffit Infrastructure Services
Filter interviews by
I appeared for an interview in May 2024.
To manage a DDoS attack, it is important to have a robust defense strategy in place.
Implement a DDoS mitigation solution to detect and block malicious traffic.
Utilize a content delivery network (CDN) to distribute traffic and reduce the impact of the attack.
Monitor network traffic and look for patterns that indicate a DDoS attack.
Have a response plan in place to quickly mitigate the attack and minimize downtime.
Conside...
IDS stands for Intrusion Detection System and IPS stands for Intrusion Prevention System.
IDS monitors network traffic for suspicious activity and alerts the administrator.
IPS not only detects but also takes action to block or prevent the detected threats.
IDS is passive while IPS is active in responding to threats.
Examples of IDS include Snort and Suricata, while examples of IPS include Cisco Firepower and Palo Alto Net
Top trending discussions
The CIA Triad is a foundational security model that consists of three core principles: Confidentiality, Integrity, and Availability.
Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.
Integrity: Ensuring that information is accurate and has not been tampered with.
Availability: Ensuring that information is accessible when needed by authorized users.
Example: Encrypting sen...
I applied via LinkedIn and was interviewed in Jun 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Apr 2023. There were 4 interview rounds.
It was related to the Soc analyst and vapt medium to hard level
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include physical layer, data link layer, network layer, tra
Router works at the network layer (Layer 3) in the OSI model.
Routers operate at the network layer (Layer 3) of the OSI model.
They use IP addresses to forward packets between different networks.
Routers make decisions based on routing tables to determine the best path for data transmission.
Examples of routers include Cisco routers, Juniper routers, and home Wi-Fi routers.
I applied via LinkedIn and was interviewed before Oct 2022. There were 4 interview rounds.
Test related to cyber security
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
SOC Analyst
21
salaries
| ₹2 L/yr - ₹6 L/yr |
Network Engineer
14
salaries
| ₹2.2 L/yr - ₹4 L/yr |
System Administrator
10
salaries
| ₹1.5 L/yr - ₹3 L/yr |
IT Infrastructure Engineer
8
salaries
| ₹2.5 L/yr - ₹3.5 L/yr |
Security Analyst
7
salaries
| ₹3 L/yr - ₹8.5 L/yr |
Signature Global
Sunteck Realty
Pittie Group
Pin Click