1/87
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Private IP Range (Class A)
10.0.0.0 – 10.255.255.255
Private IP Range (Class B)
172.16.0.0 – 172.31.255.255
Private IP Range (Class C)
192.168.0.0 – 192.168.255.255
Public IP Address
Any IP not in a private range; globally routable
Loopback Address (Main)
127.0.0.1
Loopback Range
127.0.0.0 – 127.255.255.255
APIPA Range
169.254.0.0 – 169.254.255.255
How are tickets prioritized in help desk?
By business impact: High (many users/revenue/security), Normal (one user), Low (minor). SLAs set response/resolution times.
Steps for expired AD password
Reset in ADUC, check “User must change password at next logon,” assist user logging in
Why a user cannot access shared drive
Permissions changed/removed; check folder permissions, restore if needed, verify AD account status
Why help desks exist
Provide tech support, reduce downtime, track issues, keep business running smoothly
What is an OS?
Sits between hardware and user, allows programs to run
Purpose of subnet mask
Identifies Network ID vs Host ID in IP address
What are graphics cards?
Processors for rendering graphics and some ML tasks
Difference router vs switch
Router connects networks; switch connects devices on same network
What is a motherboard?
Hardware connecting CPU, RAM, GPU, storage, and other components
Definition of a computer network
Connected computers sharing data and resources
DNS ports?
TCP/UDP 53
Purpose of NIC
Allows device to communicate on network; can be physical or virtual
Is 192.168.255.1 valid?
Yes
Choose HDD vs SSD
SSD for performance
What is CPU?
Executes instructions, measured in cycles/sec
Handling email error when specialist out
Take ownership, gather details, troubleshoot, update user, escalate if needed
Command to fix DNS cache
ipconfig /flushdns
NIC functions
Connects device to network, sends/receives data, can be virtualized
Binary 1000 0001
129
Program vs process
Program is file on disk; process is running instance in memory
Are motherboards only in desktops?
False
Should you delete Azure resource groups after labs?
Yes, to avoid charges
Is 1.2.3.4 valid IP?
Yes
HTTP/HTTPS ports
80 and 443
False statement about RDP
“Only used for IT support” is false
Which user lockout ticket first?
Highest business impact
System that manages users in large orgs
Active Directory (AD)
Best infrastructure for variable traffic
Cloud platforms, scale resources as needed
Should SLAs affect prioritization?
Yes
TCP vs UDP
TCP reliable; UDP faster but unreliable
Best secure remote access traveling employees
Company laptop with VPN
Benefits of VMs
Run multiple OSes, save hardware cost, quick testing
Is 172.16.1.3 private?
Yes
Most likely issue with 169.254.x.x
DHCP unreachable/failing
What is RAM
Short-term memory for active programs/data
CIDR for 255.255.0.0
/16
How to update customer while waiting on another team
Update even if no progress
HDD vs SSD for 2000-PC refresh
Choose SSDs for performance
Command to check connectivity
ping
Is 10.255.256.1 valid?
No, 256 invalid
Is 172.32.1.244 private?
No, private ends at 172.31.x.x
APIPA problem but DHCP working
Switch/router blocking DHCP
What are SLAs
Agreements defining required response and resolution times
Binary 1111 1111
255
Can Azure VMs be deployed in one region only?
False
Prioritize user lockout tickets (equal impact)
By intake time
Least used OS on smartphones
Microsoft Windows
What to do if you don’t know how to fix an issue
Be honest, research, follow up
Best long-term remote-work solution
VPN
Is 192.168.99.55 private?
Yes
Which ticket first (CEO, CFO virus, Accounting, Sales)?
CFO virus — highest security risk
Purpose of nslookup
Find IP from hostname or hostname from IP
Which is an output device?
Monitor
What to do when blocked by another team
Provide updates even without progress
DHCP ports
UDP 67 and 68
Programs vs processes statement
True — programs on disk, processes in memory
Used to remotely access desktops
Remote Desktop Protocol (RDP)
How to handle manager requesting another task while on high-priority ticket
Inform priority, ask which task first, escalate if needed
Physical Layer
Transmits raw bits over a physical medium, including cables, switches, and hubs; deals with voltage, timing, and data rate.
Data Link Layer
Responsible for node-to-node delivery, framing, MAC addressing, and error detection/correction.
Network Layer
Handles logical addressing, routing, and packet forwarding; uses IP addresses to send data across networks.
Transport Layer
Provides reliable or unreliable delivery of data between hosts; manages flow control, segmentation, and error recovery (TCP/UDP).
Session Layer
Manages sessions and connections between applications, including setup, maintenance, and termination of communication.
Presentation Layer
Translates, encrypts, or compresses data for the application layer; ensures data is in a usable format.
Application Layer
Provides network services directly to end-user applications like email, web browsing, FTP, and remote desktop.
OSI Model Layers
1) Physical – transmits raw bits; 2) Data Link – frames and error detection; 3) Network – routing/logical addressing; 4) Transport – reliable/unreliable delivery; 5) Session – manages sessions; 6) Presentation – translates/encrypts/compresses data; 7) Application – interface for user apps
Wireless Network
A network that uses radio waves or other wireless methods to connect devices instead of cables. Examples include Wi-Fi, Bluetooth, and cellular networks.
Advanced Encryption Standard (AES)
A widely used symmetric encryption algorithm that secures data by converting it into unreadable ciphertext using a secret key. AES is fast, secure, and commonly used for data protection in wireless and cloud communications.
Purpose of an IP address
To assign a unique identifier to a device on a network so data can be sent to and received from the correct device.
MAC addresses
48 bits
IPv4 address
32 bits
Purpose of hexadecimal structure
To make MAC addresses more compact
First 24 bits of MAC address
Organizationally Unique Identifier (OUI)
Last 24 bits of MAC address
Randomly assigned to each user
MAC spoofing
Faking a MAC address to impersonate another device on a network
Primary use of ICMP protocol
Message control and error reporting
APIPA address meaning
Assigned by system when DHCP is unreachable; cannot access network properly
File system
Organizes how data is stored and retrieved on storage devices
Operating system (OS)
Sits between hardware and user, allows programs to run
Router vs Switch
Router forwards traffic between networks; switch forwards traffic between devices on the same network
Purpose of CIDR notation
Shorthand to represent IPv4 addresses