0% found this document useful (0 votes)
2 views

ICT-Practice Set-2

The document contains practice questions for the UPPSC AE 2024 Combined State Engineering Services Examination, focusing on Information and Communication Technologies, specifically Computer Networks. It covers various topics including the functions of routers, secure file transfer protocols, OSI model layers, and network security concepts. Each question is accompanied by an explanation of the correct answer and related concepts.

Uploaded by

talksthelife
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

ICT-Practice Set-2

The document contains practice questions for the UPPSC AE 2024 Combined State Engineering Services Examination, focusing on Information and Communication Technologies, specifically Computer Networks. It covers various topics including the functions of routers, secure file transfer protocols, OSI model layers, and network security concepts. Each question is accompanied by an explanation of the correct answer and related concepts.

Uploaded by

talksthelife
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

UPPSC AE 2024 Combined State Engineering Services Examination

Practice questions | Information and Communication technologies


Computer Networks
1. What is the primary function of a router in a network?
A) To amplify signals
B) To connect different networks and route data packets
C) To filter incoming and outgoing traffic based on rules
D) To provide high-speed data storage
Answer: B) To connect different networks and route data packets
Explanation:
• The primary function of a router in a network is to direct data packets between networks. This is done
by reading the data packets, prioritizing them, and choosing the best route for each transmission.
A) Signal amplification is the role of repeaters, not routers.
B) Routers determine the best path for data to travel between networks.
C) Filtering traffic is a function of firewalls, though some routers also include this feature.
D) High-speed storage is unrelated to routers.
2. Which protocol is used for secure file transfer over the Internet?
A) FTP
B) HTTP
C) HTTPS
D) SFTP
Answer: D) SFTP
Explanation:
A) FTP (File Transfer Protocol) is not secure.
B) HTTP is for web page transmission, not file transfer.
C) HTTPS secures HTTP communication, not file transfer.
D) SFTP (Secure File Transfer Protocol) uses encryption for secure file transfer.
3. Which device operates at the data link layer of the OSI model?
A) Router
B) Switch
C) Firewall
D) Modem

Use code DrSwati to get maximum discount on Unacademy Plus subscription.


UPPSC AE 2024 Combined State Engineering Services Examination
Answer: B) Switch
Explanation:
A) Routers operate at the network layer.
B) Switches operate at the data link layer, forwarding data based on MAC addresses.
C) Firewalls operate at multiple layers but are not specific to the data link layer.
D) Modems work at the physical and data link layers but are primarily for signal modulation.
4. What is the purpose of the ARP (Address Resolution Protocol)?
A) To resolve IP addresses to domain names
B) To resolve MAC addresses to IP addresses
C) To resolve IP addresses to MAC addresses
D) To translate private IPs to public IPs
Answer: C) To resolve IP addresses to MAC addresses
Explanation:
• The Address Resolution Protocol (ARP) is a communication protocol that maps IP addresses to MAC
addresses. It's used to connect a device's IP address to its physical MAC address.
• ARP (Address Resolution Protocol) is essential for proper functioning IP networks as it facilitates
communication between devices on a local network by mapping IP addresses to physical (MAC)
addresses.
A) Resolving IP to domain names is the function of DNS.
B) ARP works in reverse, mapping IP to MAC, not vice versa.
C) ARP maps an IP address to its corresponding MAC address.
D) Translating private to public IPs is done by NAT (Network Address Translation).
5. Which protocol is primarily used to send emails?
A) IMAP
B) SMTP
C) POP3
D) HTTP
Answer: B) SMTP
Explanation:
A) IMAP is used to retrieve emails from a server.
B) SMTP (Simple Mail Transfer Protocol) sends emails from clients to servers.
C) POP3 retrieves emails from the server.
D) HTTP is used for web browsing, not email transmission.
6. Which layer of the OSI model ensures reliable data transfer?
Use code DrSwati to get maximum discount on Unacademy Plus subscription.
UPPSC AE 2024 Combined State Engineering Services Examination
A) Network Layer
B) Transport Layer
C) Data Link Layer
D) Application Layer
Answer: B) Transport Layer
Explanation:
A) The Network Layer handles routing and addressing but not reliability.
B) The Transport Layer ensures reliable delivery with protocols like TCP.
C) The Data Link Layer handles error detection, not reliability.
D) The Application Layer interacts with user-level software.
7. Which type of DNS record is used to map a domain name to an IP address?
A) MX
B) A
C) CNAME
D) TXT
Answer: B) A
Explanation:
A) MX records are for mail servers.
B) A records map domain names to IPv4 addresses.
C) CNAME maps a domain name to another domain name.
D) TXT records store arbitrary text information.
8. What is the primary purpose of a firewall?
A) To block all incoming traffic
B) To filter and monitor incoming and outgoing traffic based on rules
C) To encrypt network traffic
D) To resolve domain names
Answer: B) To filter and monitor incoming and outgoing traffic based on rules
Explanation:
• The primary use of a firewall in networking is to secure the network from cyberattacks. For example,
a firewall prevents malicious and unwanted content from entering your environment. As well, a
firewall protects vulnerable systems and private data in the network from unauthorized access–such as
hackers or insiders.
A) Firewalls selectively block traffic, not all incoming traffic.

Use code DrSwati to get maximum discount on Unacademy Plus subscription.


UPPSC AE 2024 Combined State Engineering Services Examination
B) Firewalls apply rules to control network traffic.
C) Encryption is handled by protocols like TLS/SSL, not firewalls.
D) Domain name resolution is handled by DNS.
9. What is the default subnet mask for a Class B IP address?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Answer: B) 255.255.0.0
Explanation:
A) 255.0.0.0 is the default mask for Class A.
B) Correct. Class B uses a 16-bit subnet mask (255.255.0.0).
C) 255.255.255.0 is common in Class C.
D) 255.255.255.255 is a broadcast mask.
10. What encryption protocol does HTTPS use?
A) SSL/TLS
B) IPsec
C) WPA2
D) AES
Answer: A) SSL/TLS
Explanation:
A) HTTPS uses SSL/TLS for secure communication.
B) IPsec secures IP communication, not HTTPS specifically.
C) WPA2 secures Wi-Fi networks.
D) AES is an encryption algorithm, but HTTPS uses SSL/TLS.
11. Which protocol is used to automatically assign IP addresses to devices in a network?
A) DNS
B) DHCP
C) SNMP
D) ARP
Answer: B) DHCP
Explanation:

Use code DrSwati to get maximum discount on Unacademy Plus subscription.


UPPSC AE 2024 Combined State Engineering Services Examination
A) DNS resolves domain names.
B) DHCP assigns IP addresses dynamically.
C) SNMP is for network management.
D) ARP resolves IP to MAC addresses.
12. What is the primary purpose of NAT (Network Address Translation)?
A) To encrypt data
B) To translate private IPs into public IPs
C) To assign IP addresses dynamically
D) To create virtual private networks
Answer: B) To translate private IPs into public IPs
Explanation:
• Network Address Translation (NAT) is a process in which one or more local IP addresses are translated
into one or more Global IP addresses and vice versa to provide Internet access to the local hosts.
A) Encryption is not related to NAT.
B) NAT enables devices with private IPs to communicate on the Internet using public IPs.
C) Dynamic IP assignment is done by DHCP.
D) Virtual private networks (VPNs) are unrelated to NAT.
13. What is the function of the three-way handshake in TCP?
A) To close a connection
B) To establish a reliable connection
C) To check for errors in transmission
D) To encrypt data
Answer: B) To establish a reliable connection
Explanation:
• The TCP 3-Way Handshake is a fundamental process used in the Transmission Control Protocol
(TCP) to establish a reliable connection between a client and a server before data transmission begins.
This handshake ensures that both parties are synchronized and ready for communication.
A) Closing a connection uses a FIN-ACK sequence.
B) The three-way handshake establishes a reliable connection.
C) Error-checking is part of the TCP process but not specific to the handshake.
D) Encryption is not related to the handshake.
14. Which of the following is a common symmetric encryption algorithm?
A) RSA
Use code DrSwati to get maximum discount on Unacademy Plus subscription.
UPPSC AE 2024 Combined State Engineering Services Examination
B) DES
C) ECC
D) SHA-256
Answer: B) DES
Explanation:
A) RSA is asymmetric encryption.
B) DES (Data Encryption Standard) is a symmetric encryption algorithm.
C) ECC is asymmetric encryption.
D) SHA-256 is a hashing algorithm, not encryption.
15. Which attack involves overwhelming a server with traffic to disrupt service?
A) Phishing
B) Man-in-the-Middle
C) Denial-of-Service (DoS)
D) SQL Injection
Answer: C) Denial-of-Service (DoS)
Explanation:
A) Phishing targets users to steal sensitive information.
B) Man-in-the-Middle involves intercepting communication.
C) DoS floods servers to disrupt services.
D) SQL Injection manipulates database queries.

Use code DrSwati to get maximum discount on Unacademy Plus subscription.

You might also like