Networking
Cybersecurity
Active Directory
Troubleshooting
Misc IT
100

What does IP stand for?

Internet Protocol

100

What does MFA stand for?

Multi-Factor Authentication

100

What is Active Directory primarily used for?

Managing users, computers, and resources in a Windows domain.

100

A user says, “The internet isn’t working.” What is the first basic thing you should check?

Check network connection (Wi-Fi/Ethernet).

100

What does CPU stand for?

Central Processing Unit

200

What device assigns IP addresses automatically on most networks?

DHCP Server

*Double Jeopardy*

200

What type of attack attempts to trick users into giving sensitive information through fake emails?

Phishing

200

What is a GPO?

Group Policy Object

*Double Jeopardy*

200

What does the “ipconfig” command show you?

It displays IP configuration information for the device (IP address, subnet mask, default gateway).

200


What does RAM store?

Temporary working data for active processes.

*Double Jeopardy*

300

What is the difference between HTTP and HTTPS

HTTP transmits data in plain text, while HTTPS encrypts data using SSL/TLS to secure communication.

300

What is the purpose of a firewall?

To monitor and control incoming and outgoing network traffic based on security rules.

*Double Jeopardy*

300

What container is commonly used to organize users and computers in AD?

Organizational Unit (OU)

300

If a computer powers on but shows no display, what is one thing you should check first?

Monitor connections / cables (or if monitor is powered on).

300

When cleaning the inside of a computer, what is one important safety precaution you should take or something you should avoid?

  • The computer should be powered off and unplugged.

  • Avoid using liquid cleaners inside the case.

  • Do not let compressed air spin the fans freely.

  • Ground yourself to avoid static discharge.

  • Do not open the power supply.

400

What is the difference between a switch and a router?

A switch connects devices within the same network (Layer 2), while a router connects different networks together (Layer 3).

400

What is the difference between hashing and encryption?

-  Hashing is one-way and used for integrity verification.
-  Encryption is reversible and protects confidentiality.

400

What service does a Domain Controller provide?

Authentication and authorization within a domain.

400

What is Safe Mode used for in Windows troubleshooting?

It starts Windows with minimal drivers and services to help diagnose and fix system issues.


400

What is a virtual machine (VM)?  

A computer running inside another computer.

An emulated system that runs on a host.

A virtualized operating system environment.

A virtual test environment.

500

How does a VPN protect users on public Wi-Fi networks?

By encrypting traffic, preventing attackers from intercepting or reading transmitted data and randomizing your MAC Address.

500

What is the principle of least privilege?

Users should only have the minimum access necessary to perform their job.

*Double Jeopardy*

500

What role does the Global Catalog server play in Active Directory?
 

 It stores a partial replica of all objects in the forest and allows users to search and authenticate across domains.

500

A user can access websites by IP address but not by domain name. What is most likely the issue?

DNS problem.

*Double Jeopardy*

500

What is the difference between a centralized system and a distributed system?

A centralized system relies on a single central server or authority to manage resources and processing.

A distributed system spreads processing and resources across multiple machines or nodes.

*Double Jeopardy*

M
e
n
u