NOCTI New Questions to study

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:03 AM on 4/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

A technician notices a PC randomly restarts under heavy load. (A. Faulty keyboard B. Overheating CPU C. Corrupt OS D. Bad monitor)

B

2
New cards

Which device would MOST likely store the system firmware? (A. RAM B. ROM C. Cache D. SSD)

B

3
New cards

A user cannot access websites but can ping an IP address. (A. DHCP failure B. DNS problem C. Bad NIC D. Firewall failure)

B

4
New cards

Which layer of the OSI model is responsible for end-to-end communication? (A. Network B. Transport C. Session D. Data Link)

B

5
New cards

What happens when defragmentation is performed? (A. Deletes unused files B. Encrypts disk C. Rearranges fragmented data D. Installs updates)

C

6
New cards

Which component would you replace FIRST if no power is detected? (A. GPU B. PSU C. RAM D. SSD)

B

7
New cards

A network uses IP addresses 192.168.x.x. What type of network is this? (A. Public B. Private C. Government D. External)

B

8
New cards

Which attack involves intercepting communication between two systems? (A. Phishing B. Brute force C. Man-in-the-middle D. Trojan)

C

9
New cards

Which command displays IP configuration in Windows? (A. ping B. netstat C. ipconfig D. tracert)

C

10
New cards

Which protocol is connection-oriented? (A. UDP B. TCP C. HTTP D. FTP)

B

11
New cards

A technician installs new RAM but the system fails to boot. What is MOST likely? (A. Wrong browser B. Incompatible RAM C. Virus D. GPU failure)

B

12
New cards

What is the function of a subnet mask? (A. Encrypt data B. Identify network and host C. Assign IP addresses D. Store DNS records)

B

13
New cards

Which port is associated with SMTP? (A. 21 B. 25 C. 53 D. 80)

B

14
New cards

What type of malware disguises itself as legitimate software? (A. Worm B. Trojan C. Spyware D. Rootkit)

B

15
New cards

Which device forwards data to all connected devices? (A. Switch B. Router C. Hub D. Firewall)

C

16
New cards

What is the purpose of a UPS? (A. Increase speed B. Provide backup power C. Cool system D. Store data)

B

17
New cards

Which OSI layer handles MAC addresses? (A. Physical B. Data Link C. Network D. Transport)

B

18
New cards

Which file system supports permissions and encryption? (A. FAT32 B. NTFS C. exFAT D. EXT2)

B

19
New cards

Which component executes instructions? (A. RAM B. CPU C. SSD D. NIC)

B

20
New cards

Which network topology has a single point of failure at the center? (A. Mesh B. Bus C. Star D. Ring)

C

21
New cards

A user reports slow performance. What should you check FIRST? (A. Replace CPU B. Restart system C. Check running processes D. Reinstall OS)

C

22
New cards

Which protocol translates IP addresses to MAC addresses? (A. DNS B. ARP C. DHCP D. FTP)

B

23
New cards

Which device is MOST responsible for network security? (A. Switch B. Router C. Firewall D. Hub)

C

24
New cards

What is the main purpose of virtualization? (A. Increase RAM physically B. Run multiple OS on one machine C. Delete data faster D. Improve cooling)

B

25
New cards

Which action is BEST for preventing ESD damage? (A. Wear gloves B. Ground yourself C. Turn off monitor D. Remove RAM)

B

26
New cards

Which type of storage is volatile? (A. SSD B. HDD C. RAM D. ROM)

C

27
New cards

Which protocol is used for secure web browsing? (A. HTTP B. HTTPS C. FTP D. SMTP)

B

28
New cards

Which device converts packets between networks? (A. Switch B. Hub C. Router D. NIC)

C

29
New cards

Which malware records keystrokes? (A. Worm B. Keylogger C. Trojan D. Virus)

B

30
New cards

Which Windows utility monitors performance? (A. Task Manager B. Notepad C. Paint D. Calculator)

A

31
New cards

Which type of attack sends large amounts of traffic to overwhelm a system? (A. Phishing B. DoS C. Trojan D. Spoofing)

B

32
New cards

Which OSI layer handles encryption? (A. Presentation B. Network C. Physical D. Data Link)

A

33
New cards

Which cable type is used for long-distance high-speed networking? (A. Coaxial B. Twisted pair C. Fiber optic D. USB)

C

34
New cards

Which command shows active connections? (A. ping B. netstat C. dir D. copy)

B

35
New cards

What does RAID provide? (A. Faster CPU B. Data redundancy C. Better graphics D. More RAM)

B

36
New cards

Which type of IP address changes automatically? (A. Static B. Dynamic C. Private D. Public)

B

37
New cards

Which component stores BIOS settings? (A. CMOS battery B. RAM C. SSD D. GPU)

A

38
New cards

Which wireless security is weakest? (A. WPA3 B. WPA2 C. WEP D. WPA)

C

39
New cards

Which tool removes malware? (A. Antivirus B. Defrag C. Disk cleanup D. BIOS)

A

40
New cards

Which protocol resolves domain names? (A. DNS B. DHCP C. FTP D. TCP)

A

41
New cards

Which part of a URL identifies the resource location? (A. Protocol B. Domain C. Path D. Port)

C

42
New cards

Which device assigns IP addresses automatically? (A. DNS B. DHCP server C. Router only D. Switch)

B

43
New cards

Which storage type is BEST for speed? (A. HDD B. SSD C. Tape D. Optical)

B

44
New cards

Which term describes unauthorized access attempts? (A. Authentication B. Intrusion C. Backup D. Encryption)

B

45
New cards

Which is an example of social engineering? (A. Virus B. Fake email asking for password C. Firewall D. Encryption)

B

46
New cards

Which protocol transfers files? (A. HTTP B. FTP C. SMTP D. DNS)

B

47
New cards

Which device operates at Layer 3? (A. Switch B. Router C. Hub D. NIC)

B

48
New cards

Which process ensures data is unreadable to unauthorized users? (A. Backup B. Encryption C. Compression D. Formatting)

B

49
New cards

Which type of backup copies only changed files? (A. Full B. Incremental C. Mirror D. Complete)

B

50
New cards

Which device allows wireless connectivity? (A. Access Point B. Switch C. Hub D. Modem)

A