1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
A technician notices a PC randomly restarts under heavy load. (A. Faulty keyboard B. Overheating CPU C. Corrupt OS D. Bad monitor)
B
Which device would MOST likely store the system firmware? (A. RAM B. ROM C. Cache D. SSD)
B
A user cannot access websites but can ping an IP address. (A. DHCP failure B. DNS problem C. Bad NIC D. Firewall failure)
B
Which layer of the OSI model is responsible for end-to-end communication? (A. Network B. Transport C. Session D. Data Link)
B
What happens when defragmentation is performed? (A. Deletes unused files B. Encrypts disk C. Rearranges fragmented data D. Installs updates)
C
Which component would you replace FIRST if no power is detected? (A. GPU B. PSU C. RAM D. SSD)
B
A network uses IP addresses 192.168.x.x. What type of network is this? (A. Public B. Private C. Government D. External)
B
Which attack involves intercepting communication between two systems? (A. Phishing B. Brute force C. Man-in-the-middle D. Trojan)
C
Which command displays IP configuration in Windows? (A. ping B. netstat C. ipconfig D. tracert)
C
Which protocol is connection-oriented? (A. UDP B. TCP C. HTTP D. FTP)
B
A technician installs new RAM but the system fails to boot. What is MOST likely? (A. Wrong browser B. Incompatible RAM C. Virus D. GPU failure)
B
What is the function of a subnet mask? (A. Encrypt data B. Identify network and host C. Assign IP addresses D. Store DNS records)
B
Which port is associated with SMTP? (A. 21 B. 25 C. 53 D. 80)
B
What type of malware disguises itself as legitimate software? (A. Worm B. Trojan C. Spyware D. Rootkit)
B
Which device forwards data to all connected devices? (A. Switch B. Router C. Hub D. Firewall)
C
What is the purpose of a UPS? (A. Increase speed B. Provide backup power C. Cool system D. Store data)
B
Which OSI layer handles MAC addresses? (A. Physical B. Data Link C. Network D. Transport)
B
Which file system supports permissions and encryption? (A. FAT32 B. NTFS C. exFAT D. EXT2)
B
Which component executes instructions? (A. RAM B. CPU C. SSD D. NIC)
B
Which network topology has a single point of failure at the center? (A. Mesh B. Bus C. Star D. Ring)
C
A user reports slow performance. What should you check FIRST? (A. Replace CPU B. Restart system C. Check running processes D. Reinstall OS)
C
Which protocol translates IP addresses to MAC addresses? (A. DNS B. ARP C. DHCP D. FTP)
B
Which device is MOST responsible for network security? (A. Switch B. Router C. Firewall D. Hub)
C
What is the main purpose of virtualization? (A. Increase RAM physically B. Run multiple OS on one machine C. Delete data faster D. Improve cooling)
B
Which action is BEST for preventing ESD damage? (A. Wear gloves B. Ground yourself C. Turn off monitor D. Remove RAM)
B
Which type of storage is volatile? (A. SSD B. HDD C. RAM D. ROM)
C
Which protocol is used for secure web browsing? (A. HTTP B. HTTPS C. FTP D. SMTP)
B
Which device converts packets between networks? (A. Switch B. Hub C. Router D. NIC)
C
Which malware records keystrokes? (A. Worm B. Keylogger C. Trojan D. Virus)
B
Which Windows utility monitors performance? (A. Task Manager B. Notepad C. Paint D. Calculator)
A
Which type of attack sends large amounts of traffic to overwhelm a system? (A. Phishing B. DoS C. Trojan D. Spoofing)
B
Which OSI layer handles encryption? (A. Presentation B. Network C. Physical D. Data Link)
A
Which cable type is used for long-distance high-speed networking? (A. Coaxial B. Twisted pair C. Fiber optic D. USB)
C
Which command shows active connections? (A. ping B. netstat C. dir D. copy)
B
What does RAID provide? (A. Faster CPU B. Data redundancy C. Better graphics D. More RAM)
B
Which type of IP address changes automatically? (A. Static B. Dynamic C. Private D. Public)
B
Which component stores BIOS settings? (A. CMOS battery B. RAM C. SSD D. GPU)
A
Which wireless security is weakest? (A. WPA3 B. WPA2 C. WEP D. WPA)
C
Which tool removes malware? (A. Antivirus B. Defrag C. Disk cleanup D. BIOS)
A
Which protocol resolves domain names? (A. DNS B. DHCP C. FTP D. TCP)
A
Which part of a URL identifies the resource location? (A. Protocol B. Domain C. Path D. Port)
C
Which device assigns IP addresses automatically? (A. DNS B. DHCP server C. Router only D. Switch)
B
Which storage type is BEST for speed? (A. HDD B. SSD C. Tape D. Optical)
B
Which term describes unauthorized access attempts? (A. Authentication B. Intrusion C. Backup D. Encryption)
B
Which is an example of social engineering? (A. Virus B. Fake email asking for password C. Firewall D. Encryption)
B
Which protocol transfers files? (A. HTTP B. FTP C. SMTP D. DNS)
B
Which device operates at Layer 3? (A. Switch B. Router C. Hub D. NIC)
B
Which process ensures data is unreadable to unauthorized users? (A. Backup B. Encryption C. Compression D. Formatting)
B
Which type of backup copies only changed files? (A. Full B. Incremental C. Mirror D. Complete)
B
Which device allows wireless connectivity? (A. Access Point B. Switch C. Hub D. Modem)
A