Premium Employer

Ericsson

4.1
based on 7k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

NetSutra Interview Questions and Answers

Updated 27 Feb 2024
Popular Designations

Q1. Explain OSI model devices on each layer ?

Ans.

OSI model devices are specific to each layer of the model, facilitating communication between devices.

  • Layer 1 (Physical): hubs, repeaters, cables

  • Layer 2 (Data Link): switches, bridges

  • Layer 3 (Network): routers, layer 3 switches

  • Layer 4 (Transport): gateways, firewalls

  • Layer 5 (Session): not applicable

  • Layer 6 (Presentation): encryption/decryption devices

  • Layer 7 (Application): servers, workstations

Add your answer

Q2. What is the role of router's ?

Ans.

Routers are networking devices that forward data packets between computer networks.

  • Routers connect multiple networks together and determine the best path for data to travel.

  • They use routing tables to make decisions about where to send data packets.

  • Routers can also provide security by blocking unwanted traffic and filtering incoming data.

  • Examples of routers include home routers, enterprise routers, and core routers used by internet service providers.

Add your answer

Q3. What is the role of switches ?

Ans.

Switches are networking devices that connect devices together and enable communication between them.

  • Switches forward data packets between devices on a network

  • They use MAC addresses to identify devices and determine where to send data

  • Switches can improve network performance by reducing network congestion

  • They can also enhance network security by isolating traffic between devices

  • Examples of switches include Ethernet switches, LAN switches, and data center switches

Add your answer

Q4. how can we protect Android devices from data sharing

Ans.

Android devices can be protected from data sharing by implementing encryption, using secure connections, and restricting app permissions.

  • Implement encryption on the device to protect data from being accessed by unauthorized users

  • Use secure connections such as VPNs when transferring sensitive information

  • Restrict app permissions to limit the data that apps can access and share

  • Regularly update the device's operating system and apps to patch any security vulnerabilities

  • Avoid conn...read more

Add your answer
Discover NetSutra interview dos and don'ts from real experiences

Q5. What is TCP/IP Model ?

Ans.

TCP/IP model is a networking protocol that defines how data is transmitted over the internet.

  • TCP/IP model has four layers: application, transport, internet, and network access.

  • Each layer has its own set of protocols that work together to transmit data.

  • TCP/IP model is used for communication between devices on the internet.

  • Examples of protocols used in TCP/IP model include HTTP, FTP, TCP, and IP.

Add your answer

Q6. tell me the enrollment methods of android

Ans.

Android enrollment methods include NFC, QR code, zero-touch, and manual enrollment.

  • NFC (Near Field Communication) - allows users to enroll devices by tapping them against an NFC tag or device

  • QR code - users can scan a QR code to quickly enroll their device

  • Zero-touch enrollment - devices are automatically enrolled when turned on for the first time

  • Manual enrollment - users manually enter their credentials and settings to enroll their device

Add your answer

Q7. Explain OSI model in brief ?

Ans.

The OSI model is a conceptual model that describes the communication functions of a telecommunication or computing system.

  • OSI stands for Open Systems Interconnection.

  • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the adjacent layers.

  • The model helps in understanding how data is transmitted over a network.

  • Example: When you open a website, the Application layer sends a requ...read more

Add your answer

Q8. app protection for private apps

Ans.

App protection for private apps involves implementing security measures to prevent unauthorized access and protect sensitive data.

  • Implement encryption to secure data transmission and storage

  • Use authentication mechanisms like biometrics or multi-factor authentication

  • Implement secure coding practices to prevent vulnerabilities

  • Regularly update and patch the app to address security flaws

  • Monitor and analyze app usage for any suspicious activity

Add your answer

More about working at Ericsson

Top Rated Large Company - 2024
HQ - Stockholm, Stockholm County, Sweden
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at NetSutra

based on 3 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter