i
Ericsson
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
App protection for private apps involves implementing security measures to prevent unauthorized access and protect sensitive data.
Implement encryption to secure data transmission and storage
Use authentication mechanisms like biometrics or multi-factor authentication
Implement secure coding practices to prevent vulnerabilities
Regularly update and patch the app to address security flaws
Monitor and analyze app usage for an
Android enrollment methods include NFC, QR code, zero-touch, and manual enrollment.
NFC (Near Field Communication) - allows users to enroll devices by tapping them against an NFC tag or device
QR code - users can scan a QR code to quickly enroll their device
Zero-touch enrollment - devices are automatically enrolled when turned on for the first time
Manual enrollment - users manually enter their credentials and settings to
Android devices can be protected from data sharing by implementing encryption, using secure connections, and restricting app permissions.
Implement encryption on the device to protect data from being accessed by unauthorized users
Use secure connections such as VPNs when transferring sensitive information
Restrict app permissions to limit the data that apps can access and share
Regularly update the device's operating syste...
I applied via Recruitment Consulltant and was interviewed in Oct 2022. There were 3 interview rounds.
The OSI model is a conceptual model that describes the communication functions of a telecommunication or computing system.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the adjacent layers.
The model helps in understanding how data is transmitted over a network.
Example: W...
OSI model devices are specific to each layer of the model, facilitating communication between devices.
Layer 1 (Physical): hubs, repeaters, cables
Layer 2 (Data Link): switches, bridges
Layer 3 (Network): routers, layer 3 switches
Layer 4 (Transport): gateways, firewalls
Layer 5 (Session): not applicable
Layer 6 (Presentation): encryption/decryption devices
Layer 7 (Application): servers, workstations
TCP/IP model is a networking protocol that defines how data is transmitted over the internet.
TCP/IP model has four layers: application, transport, internet, and network access.
Each layer has its own set of protocols that work together to transmit data.
TCP/IP model is used for communication between devices on the internet.
Examples of protocols used in TCP/IP model include HTTP, FTP, TCP, and IP.
Routers are networking devices that forward data packets between computer networks.
Routers connect multiple networks together and determine the best path for data to travel.
They use routing tables to make decisions about where to send data packets.
Routers can also provide security by blocking unwanted traffic and filtering incoming data.
Examples of routers include home routers, enterprise routers, and core routers used
Switches are networking devices that connect devices together and enable communication between them.
Switches forward data packets between devices on a network
They use MAC addresses to identify devices and determine where to send data
Switches can improve network performance by reducing network congestion
They can also enhance network security by isolating traffic between devices
Examples of switches include Ethernet switc
What people are saying about Ericsson
I applied via Company Website and was interviewed in Nov 2024. There were 8 interview rounds.
Aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped.
Coding tests are typically programming challenges that help technical recruiters test programming skills and competencies of a developer or programmer. A good coding test will measure a candidate's capacity for problem-solving skills and understanding of coding
Group discussion (GD) is a comprehensive technique to judge the suitability of an individual and his appropriateness for admission, scholarship, job, etc.
Assessment is the systematic basis for making inferences about the learning and development of students. It is the process of defining, selecting, designing, collecting, analyzing,
Case study, detailed description and assessment of a specific situation in the real world created for the purpose of deriving generalizations and other insights from it.
Technical refers to anything related to technology, machinery, or scientific knowledge.
Relating to technology or machinery
Involving scientific knowledge or skills
Concerned with practical application of knowledge
Examples: coding, testing software, troubleshooting hardware
Technical missings refer to bugs or defects in the software code that cause unexpected behavior or errors.
Technical missings are issues in the code that lead to incorrect functionality.
They can include syntax errors, logic errors, or missing error handling.
Examples of technical missings include null pointer exceptions, infinite loops, and memory leaks.
HR stands for Human Resources. HR is responsible for managing employee relations, recruitment, training, and other personnel-related tasks.
HR is used by organizations to manage their workforce and ensure compliance with labor laws.
HR departments handle tasks such as recruitment, onboarding, training, performance evaluations, and employee relations.
HR professionals also play a key role in developing and implementing com...
HR can play a crucial role in recruitment, employee relations, training, and development.
Recruitment - HR can source, screen, and interview candidates for open positions.
Employee relations - HR can handle conflicts, provide support, and ensure a positive work environment.
Training and development - HR can organize training programs, workshops, and career development opportunities.
Policy implementation - HR can ensure co...
System requirements are used to define the functionalities, constraints, and quality attributes of a software system.
System requirements help in understanding what the software should do and how it should behave.
They serve as a basis for design, development, testing, and validation of the software.
Examples of system requirements include performance metrics, security features, user interface specifications, and compatib
System requirements are a detailed description of the functions and capabilities a system must have in order to meet the needs of its users.
System requirements outline the necessary features, functions, and capabilities of a software system.
They are typically documented in a requirements specification document.
System requirements help ensure that the software meets the needs and expectations of its users.
Examples of sy...
I applied via LinkedIn and was interviewed in Dec 2024. There were 3 interview rounds.
Initially had a string based coding problem. Then was asked technical questions and then had a small break before doing system design with same interviewer for building book my show system and db schema.
I applied via Referral
I am open to any location that offers growth opportunities and a challenging work environment.
Open to relocation for the right opportunity
Prefer locations with strong networking infrastructure
Interested in locations with tech hubs or opportunities for professional development
My current CCTC is $80,000 per year.
Current CCTC is $80,000 per year
CCTC may include salary, bonuses, benefits, etc.
Negotiable based on experience and qualifications
Border Gateway Protocol
BGP stands for Border Gateway Protocol
It is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet
BGP helps in determining the best path for data to travel between networks
It is commonly used by Internet Service Providers (ISPs) and large organizations to connect to multiple networks
BGP operates on TCP port 179
Routers are networking devices that forward data packets between computer networks.
Routers operate at the network layer of the OSI model
They use routing tables to determine the best path for data packets
Routers can connect different types of networks, such as LANs and WANs
Expected CTC (Cost to Company) for the position
ECTC stands for Expected Cost to Company
It includes salary, bonuses, benefits, and any other compensation offered by the employer
Candidates should provide their expected salary range based on their experience and skills
Worked as a Network Engineer at XYZ Company for 3 years.
Managed and maintained network infrastructure
Configured routers, switches, and firewalls
Troubleshooted network issues and implemented solutions
Collaborated with cross-functional teams for project implementations
LAN technology refers to the methods and protocols used to create local area networks for connecting devices within a limited geographical area.
LAN technology includes Ethernet, Wi-Fi, and Token Ring.
Ethernet is the most common LAN technology, using CSMA/CD for collision detection.
Wi-Fi uses wireless signals to connect devices within a LAN.
Token Ring is a less common LAN technology that uses a token-passing protocol.
LA...
Router technique refers to the method used by a router to determine the best path for forwarding data packets.
Routing protocols like OSPF, EIGRP, and BGP are used to determine the best path for data packets
Static routing involves manually configuring the routes on the router
Dynamic routing allows routers to communicate with each other to determine the best path
Packet switching is used by routers to forward data packets
The OSI Model defines the functions of each layer in a network communication system.
Physical layer - transmits raw data bits over a physical medium
Data link layer - provides error detection and correction, and organizes data into frames
Network layer - routes data packets between different networks
Transport layer - ensures reliable data delivery and manages end-to-end communication
Session layer - establishes, maintains,...
TCP/IP model is a conceptual framework used for understanding networking protocols.
Consists of four layers: Application, Transport, Internet, Link
Each layer has specific functions and protocols
Data is encapsulated and decapsulated as it moves through the layers
Example: HTTP operates at the Application layer, TCP at the Transport layer
posted on 30 Dec 2024
I applied via LinkedIn
posted on 29 Sep 2024
Queue question - create queue from array
based on 3 interviews
Interview experience
based on 17 reviews
Rating in categories
Senior Solution Integrator
2.4k
salaries
| ₹6.4 L/yr - ₹23 L/yr |
Senior Engineer
2.3k
salaries
| ₹6.3 L/yr - ₹19 L/yr |
Solution Architect
2.2k
salaries
| ₹13 L/yr - ₹39 L/yr |
Network Engineer
1.8k
salaries
| ₹2.4 L/yr - ₹9.5 L/yr |
Solution Integrator
1.7k
salaries
| ₹4 L/yr - ₹13.5 L/yr |
Nokia
Cisco
Huawei Technologies
Qualcomm