Networking
Hardware
Security
Troubleshooting
Mystery Gambit
100

What identifies both the host computer and the network to which it belongs?

What is Subnet Mask

100

One of the downsides to upgrading to a more powerful video card is that you may also have to upgrade the _______.

Power supply

100

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection?

What is a Key Fob?

100

Intermittent lockups and reboots are most likely caused by ___________.

What is a failing power supply

100

Finish the name of this Egyptian landmark: _______ Pyramid of Giza

What is Great Pyramid of Giza

200

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

What is Peer-to-Peer

200

If virtually all desktop computers' power supplies come with a fan that blows air out of the system unit, why would someone add a fan to the front or side of the system unit?

What is to blow more cool air over other components

200

You have five salespeople who work out of your office and who frequently leave their laptops lying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops.

What is the BEST protection method to address your concerns?

What is using cable locks to chain the laptops to the desks.

200

Pamela's laptop will start only if the AC adapter is plugged into the laptop. What component/function is most likely to cause this problem?

What is a Bad Battery

200

What is the largest country in the world?

What is Russia

300

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols.

What is network type is in use?

What is Personal Area Network (PAN)

300

What is the maximum number of drive failures under RAID 6 at which the array will still function?

What is 2

300

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies.

Which of the following is this an example of?

What is Mobile Device Management? (MDM)
300

Janelle walks up to a computer and starts it up. After POST, she gets an "inaccessible boot drive" error. Which of the following would be the most obvious issue to initially consider?

What is someone leaving a flash drive in the computer.

300

How many ribs does a human skeleton have?

What is 24 (12 on each side)
400

MAC addresses can be represented by how many hexadecimal characters?

What is 12?

400

A crossover cable would normally be used in a 100BaseT network to connect __________.

What is a computer directly to another computer

400

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply.

What BEST describes the type of attack that just occurred?

What is Vishing

400

A Windows system is unable to connect to the network. A ping loopback test verifies that the network card is working. What is your next best step in troubleshooting the problem?

What is checking to see if the link light on the NIC is on.

400

What are human fingernails made of?

What is Keratin

500

As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user has had no problems running her web browser. You immediately know that:

What is Her computer is a DHCP client.

500

What’s the highest capacity that you can expect from a single-sided dual-layer DVD-R disc?

8.5 GB

500

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge.

What security measures would you MOST likely implement to keep this from happening in the future?

What is a Access control vestibule

500

James has replaced the CPU and added some RAM to his PC. He also blew some of the dust out of his system using canned air. When he rebooted his system, an annoying repetitive beep occurred. What was wrong?

The beep indicates a RAM problem.

500

What egg-laying mammal has a paddle-shaped tail, a sleek body covered in dense fur, a wide, flat bill, and big webbed feet?

What is a Platypus. If you said "Perry the Platypus you get double points"

M
e
n
u