IT ARCHITECT –UEDCL COMPETENCY ROUND 2
Which of the following is a fundamental principle of secure architectural design?
Option 1 Trusting all internal systems by default.
Option 2 Implementing security as an afterthought once the system is built.
Option 3 Defense in Depth, employing multiple layers of security controls.
Option 4 Relying solely on perimeter security solutions.
As a Network IT Architect at UEDCL you are tasked with recommending modern technologies to enhance performance and reduce costs. Which of the following technologies is most likely to achieve both in a suitable scenario?
Option 1 Migrating on-premise legacy applications to a public cloud platform
Option 2 Investing heavily in custom-built hardware for every new service.
Option 3 Sticking to purely proprietary software solutions for all needs.
Option 4 Implementing more manual processes to save on automation tools.
Adherence to ICT policies and regulatory requirements is crucial. What is a relevant industry standard for information security management that UEDCL should consider?
Option 1 ISO 9001 (Quality Management)
Option 2 ISO 27001 (Information Security Management)
Option 3 ISO 14001 (Environmental Management)
Option 4 ISO 45001 (Occupational Health and Safety)
When an IT Architect aims to “future-proof” UEDCL’s ICT capabilities, they are primarily focusing on:
Option 1 Purchasing the most expensive hardware available to last longer.
Option 2 Designing systems with adaptability, modularity&comma& and open standards to accommodate future technological changes and growth.
Option 3 Limiting technology choices to only well-established, decades-old solutions.
Option 4 Preventing any new technology adoption to maintain stability.
In Azure, to restrict network access to a virtual machine by defining allowed protocols&comma& ports&comma& and source/destination IP addresses&comma& you would primarily use:
Option 1 Azure Firewall
Option 2 Network Security Groups (NSGs)
Option 3 Azure DDoS Protection
Option 4 Azure Key Vault
UEDCL intend to deploy a new critical application with specific network needs. How would you help START with Network planning:
Option 1 Purchasing new hardware immediately
Option 2 Implementing changes directly in production
Option 3 Gathering application requirements and assessing network impact
Option 4 Ignoring network requirements and focusing on application setup
You have been required to design a new network setup in a UEDCL service center in Kamdini town, you have visited site and ascertained requirements&comma& which of the following is a benefit of using DHCP in a network?
Option 1 Increased network latency
Option 2 Automatic IP address configuration
Option 3 Manual DNS server assignment
Option 4 Reduced network security
In AWS, what is the primary purpose of a Virtual Private Cloud (VPC)?
Option 1 To provide a global content delivery network (CDN).
Option 2 To launch resources in a logically isolated virtual network that you define.
Option 3 To store large amounts of unstructured data.
Option 4 To manage user access permissions to AWS resources.
In Google Cloud Platform (GCP), what is the primary function of a VPC Network?
Option 1 To define the hardware specifications for virtual machines
Option 2 To manage billing and resource quotas.
Option 3 To perform data analytics on network traffic.
Option 4 To provide a global, software-defined network that supports all GCP resources
Which architectural principle emphasizes designing systems to be independent and loosely coupled, allowing for easier updates and maintenance?
Option 1 Service-Oriented Architecture (SOA)
Option 2 Monolithic architecture
Option 3 Tightly coupled architecture
Option 4 Client-server architecture
When communicating complex technical concepts to non-ICT teams, what is the most effective approach?
Option 1 Using highly technical jargon to demonstrate expertise.
Option 2 Providing a raw dump of technical specifications.
Option 3 Translating technical details into business impact and using analogies.
Option 4 Avoiding communication with non-ICT teams as they won’t understand.
What is the main benefit of implementing a VPN (Virtual Private Network) connection between your on-premises network and your cloud VPC?
Option 1 To increase the overall bandwidth of your internet connection.
Option 2 To provide a secure and encrypted tunnel for private communication.
Option 3 To allow direct access to public cloud services without authentication.
Option 4 To reduce cloud computing costs.
When designing a hybrid cloud network, which component is typically used to manage routing between the on-premises network and multiple VPCs/VNets in the cloud?
Option 1 A single load balancer in the cloud.
Option 2 A central firewall appliance in the cloud.
Option 3 A Transit Gateway (AWS), Virtual Hub (Azure Virtual WAN)&comma& or VPC Network Peering/Shared VPC (GCP) with appropriate routing.
Option 4 Relying solely on public IP addresses for all communication.
In the context of IT architecture, what does “scalability” primarily refer to?
Option 1 The ability of a system to easily integrate with third-party applications.
Option 2 The capacity of a system to handle a growing amount of work or its potential to be enlarged to accommodate that growth.
Option 3 The level of security implemented within the IT infrastructure.
Option 4 The ease with which users can navigate and interact with a system.
What is a primary advantage of using a wireless controller to manage access points in a large enterprise network compared to using standalone access points?
Option 1 Significantly lower upfront cost for the initial wireless network deployment.
Option 2 Elimination of any single point of failure within the wireless network infrastructure.
Option 3 Simplified, centralized management and configuration of numerous access points from a single interface.
Option 4 Improved performance due to direct communication paths between access points, bypassing a central controller.
Which Azure networking component is used to distribute incoming network traffic across multiple virtual machines to ensure high availability and responsiveness?
Option 1 Azure Virtual Network (VNet)
Option 2 Azure DNS
Option 3 Azure Load Balancer
Option 4 Azure Traffic Manager
Why is detailed documentation of IT architecture, processes&comma& and system configurations crucial for an IT Architect?
Option 1 It serves as a single source of truth for reference, compliance&comma& troubleshooting&comma& and future planning.
Option 2 It’s a bureaucratic formality with little practical value.
Option 3 It’s primarily for external auditors and not for internal use.
Option 4 It allows for rapid, undocumented changes without stakeholder approval.
The systems administrator at UEDCL has asked you to help troubleshoot a server connection issue, which of the following is true regarding the operation of a virtual server’s virtual network interface card (also known as a “virtual NIC” or “vNIC”)?
Option 1 All virtual NICs share the MAC address of a physical NIC in the physical server. Option 2 All virtual NICs share a virtual MAC address.
Option 3 A virtual NIC can simultaneously connect to multiple virtual switches.
Option 4 Each virtual NIC within a virtual machine has a unique MAC address.
As an IT Architect at UEDCL, you are tasked with designing a new network system. Which of the following is the MOST critical initial step to ensure alignment with business goals?
Option 1 Selecting the latest cloud platform available.
Option 2 Conducting a thorough security audit of existing infrastructure.
Option 3 Gathering and understanding detailed business requirements and strategic objectives.
Option 4 Developing a comprehensive disaster recovery plan.
What is the primary benefit of adopting cloud solutions for an organization like UEDCL?
Option 1 Eliminating the need for any in-house IT staff.
Option 2 Gaining significant upfront cost savings by purchasing less hardware.
Option 3 Increased agility, scalability&comma& and potentially reduced operational overhead.
Option 4 Guaranteed 100% uptime with no shared responsibility model.
What is the main benefit of implementing Infrastructure as Code (IaC) for network configurations?
Option 1 It provides version control, automation&comma& and consistent deployments across environments.
Option 2 It makes manual configuration changes faster.
Option 3 It eliminates the need for any network engineers.
Option 4 It only applies to cloud environments, not on-premises.
What is the main purpose of VRF-Lite (Virtual Routing and Forwarding Lite) on a network device?
Option 1 To provide hardware-level virtualization for server workloads.
Option 2 To create multiple independent routing tables on a single router, allowing for network segmentation.
Option 3 To optimize voice-over-IP (VoIP) traffic.
Option 4 To perform deep packet inspection for security threats.
How should a Network Architect ideally handle working under pressure during network emergencies at UEDCL?
Option 1 Panic and blame others
Option 2 Avoid making decisions and escalate everything
Option 3 Remain calm, prioritize tasks&comma& communicate clearly&comma& and work efficiently
Option 4 Ignore the emergency and hope it resolves itself
The primary purpose of an IT architecture blueprint is to:
Option 1 Detail the specific coding logic for applications.
Option 2 Provide a high-level overview of IT systems, their relationships&comma& and how they support business goals.
Option 3 Document daily operational procedures for IT staff.
Option 4 Outline the budget allocation for IT projects.
What does the acronym VPN stand for in networking?
Option 1 Virtual Personal Network
Option 2 Very Private Network
Option 3 Virtual Private Network
Option 4 Verified Public Network
In a high-pressure situation during a network crisis, as a network architect at UEDCL how would you prioritize tasks?
Option 1 Based on personal preference
Option 2 Based on impact on critical business functions and users affected
Option 3 Based on ease of resolution
Option 4 Randomly prioritize tasks
What is the primary purpose of Network Performance Monitoring in a cloud environment?
Option 1 To track network latency, throughput&comma& and packet loss to identify performance degradation.
Option 2 To ensure all instances are running the latest operating system
Option 3 To manage user authentication for network devices.
Option 4 To automatically scale up all network resources indefinitely.
When designing a hybrid cloud connectivity solution for high bandwidth and consistent performance, which option is generally preferred over a VPN connection for connecting on premises to a major public cloud (e.g.&comma& AWS&comma& Azure&comma& GCP)?
Option 1 Public internet connection with increased bandwidth.
Option 2 Dedicated physical connectivity (e.g., AWS Direct Connect&comma& Azure ExpressRoute&comma& GCP Cloud Interconnect).
Option 3 Deploying all applications in the public cloud without on-premises integration.
Option 4 Using a cellular hotspot.
What protocol is used to dynamically assign IP addresses to devices on a network?
Option 1 DNS
Option 2 HTTP
Option 3 DHCP
Option 4 FTP
An architect needs to implement secure remote access for employees. Which technology is primarily used to create a secure, encrypted tunnel over an unsecure network?
Option 1 DNS (Domain Name System)
Option 2 DHCP (Dynamic Host Configuration Protocol)
Option 3 VPN (Virtual Private Network)
Option 4 SNMP (Simple Network Management Protocol)
What is the primary purpose of conducting a threat model during the design phase of a new IT system?
Option 1 To determine the budget for security software.
Option 2 To identify potential vulnerabilities and design countermeasures before implementation.
Option 3 To train end-users on security best practices.
Option 4 To generate a report for regulatory compliance, even if no action is taken.
An IT Architect is responsible for creating “innovative solutions.” What does this primarily entail in the context of IT architecture for an organization like UEDCL?
Option 1 Implementing experimental technologies without a clear business case.
Option 2 Identifying and leveraging emerging technologies and creative approaches to solve business challenges and create new opportunities.
Option 3 Copying the IT architecture of a competitor without customization.
Option 4 Only focusing on cost reduction, even if it compromises functionality.
You want to ensure an optimal performance of UEDCL network, which layer of the TCP/IP model is responsible for reliable&comma& ordered delivery of data?
Option 1 Network Layer
Option 2 Application Layer
Option 3 Transport Layer
Option 4 Data Link Layer
What is the address given to a computer connected to a network called?
Option 1 System Address
Option 2 IP Address
Option 3 Process ID
Option 4 Structure
What role does a Network Orchestrator play in a software-defined networking (SDN) environment?
Option 1 It configures individual device ports manually.
Option 2 ) It translates high-level network policies into low-level device configurations across multiple vendors and domains.
Option 3 It only monitors network uptime.
Option 4 It is responsible for physical cabling.
In a hybrid cloud environment, what does “hybrid” refer to?
Option 1 A mix of different operating systems within a single cloud provider.
Option 2 The combination of on-premise infrastructure with public and/or private cloud services.
Option 3 Using multiple public cloud providers simultaneously.
Option 4 Deploying all applications on a single public cloud platform.
You have been requested to redesign the network configuration at UEDCL towers, what is the primary purpose of VLANs in a network?
Option 1 Increase network broadcast traffic
Option 2 Simplify IP address assignment
Option 3 Segment the network for security and performance
Option 4 Enhance wireless signal strength
What is a key consideration for an IT Architect when designing a network for an organization like UEDCL that relies on critical infrastructure?
Option 1 Prioritizing the lowest cost network equipment, regardless of reliability.
Option 2 Ensuring high availability, redundancy&comma& and low latency for operational technology (OT) and IT systems.
Option 3 Limiting network access to only a few select users.
Option 4 Using only wireless connectivity for all systems.
Which of the following is a common best practice for securing cloud network access?
Option 1 Allowing all inbound traffic by default for ease of access.
Option 2 Implementing the principle of least privilege for network access controls.
Option 3 Using static IP addresses for all ephemeral instances.
Option 4 Disabling network logging to save storage space.
In a high-density wireless deployment with many access points, which strategy is MOST effective in minimizing co-channel interference (CCI) and optimizing overall network performance?
Option 1 Maximize the transmit power of all access points to ensure strong signal coverage. Option 2 Configure all access points to use the widest channel bandwidths (e.g., 80 MHz) for maximum speed.
Option 3 Implement a well-planned channel reuse strategy, carefully selecting non-overlapping channels and managing transmit power levels.
Option 4 Force all clients to connect to the 2.4 GHz band as it offers better range and penetration.
Why is accurate network documentation MOST important for UEDCL?
Option 1 To impress auditors
Option 2 To make the network administrator look organized
Option 3 For compliance, disaster recovery&comma& and efficient troubleshooting
Option 4 To increase network speed
A physical topology ____.
Option 1 Specifies device types
Option 2 Depicts a network in broad scope
Option 3 Specifies connectivity methods
Option 4 Specifies addressing schemes
Which AWS service would you use to control inbound and outbound traffic at the subnet level within your VPC?
Option 1 Security Groups
Option 2 Network Access Control Lists (NACLs)
Option 3 AWS WAF (Web Application Firewall)
Option 4 AWS Shield
Which layer of the OSI model is responsible for routing packets across networks?
Option 1 Physical Layer
Option 2 Data Link Layer
Option 3 Network Layer
Option 4 Transport Layer
Which security concept involves deploying multiple layers of security controls to protect network assets?
Option 1 Single Point of Failure
Option 2 Defense in Depth
Option 3 Flat Network Design
Option 4 Zero Trust Perimeter
When designing for high availability across different geographical locations, which approach is most effective for application resilience?
Option 1 Deploying all application components in a single data center with redundant power.
Option 2 Implementing active-passive failover within a single availability zone.
Option 3 Utilizing active-active deployments across multiple geographically dispersed data centers/regions.
Option 4 Backing up configurations nightly to an offsite location.
In a public cloud environment, what is the primary purpose of a “Network Security Group” (or Security Group in AWS)?
Option 1 To control traffic at the network interface or instance level by acting as a virtual firewall.
Option 2 To define IP address ranges for subnets.
Option 3 To manage user permissions for cloud resources.
Option 4 To distribute incoming traffic to multiple instances.
When designing a network for an organization with a strong BYOD (Bring Your Own Device) policy, which solution is critical for secure and segmented access for personal devices?
Option 1 Providing a single open Wi-Fi network for all devices.
Option 2 Implementing a robust Network Access Control (NAC) solution with guest and enterprise Wi Fi SSIDs.
Option 3 Disallowing all personal devices from connecting to the network.
Option 4 Manually configuring each personal device for network access.
What is the primary benefit of a well-designed IT architecture that ensures “seamless integration of hardware, software&comma& and network solutions”?
Option 1 Increased complexity for IT operations.
Option 2 Reduced interoperability issues and improved overall system efficiency.
Option 3 Higher maintenance costs due to diverse systems.
Option 4 Limited data sharing between different departments.
After successful merger of several distribution companies into UEDCL, it has become apparent that network optimisation is required. As the IT Network Architect when optimizing the existing IT architecture&comma& which of the following approaches is generally most effective for improving performance and resource utilization?
Option 1 Adding more hardware to every server without analysis.
Option 2 Re-evaluating existing system designs, identifying bottlenecks&comma& and implementing targeted improvements like code optimization or infrastructure scaling.
Option 3 Migrating all applications to a new, unfamiliar technology stack.
Option 4 Reducing the number of monitoring tools to minimize overhead.
Using a structured problem-solving approach, which of these tools is commonly used for issue resolution?
Option 1 Random Guessing
Option 2 Fishbone Diagram
Option 3 Avoidance Strategy
Option 4 Procrastination
Which PDU (Power Distribution Unit) type allows remote monitoring of power usage per outlet?
Option 1 Basic PDU
Option 2 Switched or Intelligent PDU
Option 3 Rackmount UPS
Option 4 Bypass switch
Which of the following is an example of technical documentation?
Option 1 A Company’s Employee Manual
Option 2 A company’s annual report
Option 3 A software user manual
Option 4 A restaurant menu
What is the purpose of a disaster recovery drill?
Option 1 To check hardware compatibility with backup solutions
Option 2 To encrypt recovery data for security
Option 3 To train employees on disaster response procedures
Option 4 To permanently delete old backups
What is the function of a static transfer switch (STS)?
Option 1 Switches internet providers
Option 2 Converts AC to DC
Option 3 Transfers power source between feeds without interruption
Option 4 Controls air conditioning
How do you conduct a risk assessment exercise?
Option 1 Training the system users, scanning for vulnerabilities&comma& implement risk controls
Option 2 By identifying threats, assessing assets&comma& calculating risk impact&comma& and implementing controls
Option 3 By identifying assets, assessing threats and vulnerabilities&comma& calculating risk impact&comma& and implementing controls
Option 4 None of the above
Which of these is an example of a security control?
Option 1 Firewalls
Option 2 Antivirus software
Option 3 Multi-factor authentication
Option 4 All of the above
What does a Service Level Agreement (SLA) define in issue resolution?
Option 1 The penalties for employees
Option 2 The expected time and quality of service
Option 3 The number of issues to be resolved per day
Option 4 The cost of issue resolution
What is the primary goal of preventive maintenance?
Option 1 To replace old equipment with new ones
Option 2 To fix equipment after failure
Option 3 To reduce unplanned downtime and increase equipment lifespan
Option 4 To operate machinery at maximum speed
What is a key sign that an AC system in the data center may need maintenance?
Option 1 Server speed increases
Option 2 Increased temperature/humidity
Option 3 More email alerts
Option 4 Users report login issues
What is the key difference between preventive and predictive maintenance?
Option 1 Preventive maintenance uses sensors, while predictive maintenance does not Option 2 Preventive maintenance is based on a schedule, while predictive maintenance uses real-time data
Option 3 Predictive maintenance is done before preventive maintenance
Option 4 There is no difference
Which of the following is NOT a key component of a disaster recovery plan?
Option 1 Recovery strategies
Option 2 Employee training
Option 3 Data encryption
Option 4 Risk assessment
Which cooling systems might be found in data centers?
Option 1 Computer room air conditioning
Option 2 Chilled water systems
Option 3 Raised floor airflow designs
Option 4 All the above
Which tool is most commonly used for diagnosing network issues?
Option 1 Solarwinds
Option 2 Ping and Traceroute
Option 3 TaskManager
Option 4 None of the above
What is the main purpose of a differential backup?
Option 1 To back up only files that have changed since the last full backup
Option 2 To store data across multiple locations
Option 3 To replace full backups entirely
Option 4 To restore individual files quickly
What is the best way to handle a recurring issue?
Option 1 Escalate every occurrence to management
Option 2 Train users to be self reliant
Option 3 Apply a temporary fix each time
Option 4 None of the Above
Preventive maintenance is usually scheduled based on:
Option 1 Equipment manufacturer recommendations and historical data
Option 2 Equipment failure reports
Option 3 Employee availability
Option 4 Customer complaints
When resolving an issue, why is customer feedback important?
Option 1 To make customers understand the solution
Option 2 To stop more customer complaints
Option 3 To identify areas for improvement
Option 4 To increase the number of complaints
What is the primary purpose of a root cause analysis (RCA)?
Option 1 To document User and system complaints
Option 2 To delay resolution until more data is available
Option 3 To confirm active listening on the part of the user
Option 4 To find and address the underlying reason for a problem
A User reports a system error, but you cannot replicate it. What should you do first?
Option 1 Engage the user to provide more information
Option 2 Ignore the user call and carry on with your activities
Option 3 Inform the line manager immediately
Option 4 Assume the user does not exist
What is the main risk of over-provisioning in capacity planning?
Option 1 Higher operational costs due to unused resources
Option 2 Increased efficiency
Option 3 Reduced downtime
Option 4 There is no risk at all
How do you ensure proper access controls within an organization?
Option 1 Implement System-based access control (SBAC)
Option 2 Disable User Access
Option 3 Train and Mentor system users
Option 4 None of the above
What is the purpose of version control in documentation?
Option 1 To keep outdated documents
Option 2 To restrict access to all documents
Option 3 To track changes and maintain the latest versions
Option 4 To increase the file size
What does “failover” mean in disaster recovery planning
Option 1 The process of permanently shutting down systems
Option 2 The time taken to restore a backup
Option 3 A system’s automatic switching to a backup resource
Option 4 A method for reducing storage costs
What is the difference between fault tolerance and disaster recovery?
Option 1 Fault tolerance involves restoring systems after catastrophic events while Disaster recovery allows a system to operate even in difficult condition using backup
Option 2 Fault tolerance allows a system to operate through component failures while Disaster recovery involves restoring systems after catastrophic events
Option 3 Fault tolerance demands use of backup tapes while Disaster recovery demands the use to storage disks
Option 4 There is no difference between Fault tolerance and Disaster recovery
IF YOU NEED HELP PREPARING FOR ANY APTITUDE TEST/ONLINE ASSESSMENT OR INTERVIEW, THE RECRUITMENT EXPERT IS AVAILABLE TO HELP YOU. WHATSAPP 0790381961
The recruitment expert holds a B. Stat & Econ, MA Econ, PGD in HRM.
