HARDWARE
NETWORKING
TROUBLESHOOTING
SECURITY
OPERATING SYSTEM
100

This component is known as the “brain” of the computer.

What is the CPU?

100

This device connects multiple devices within a local network and forwards data to the correct destination.

What is a switch?

100

The first step in troubleshooting methodology: identify this.

What is the problem?

100

This type of malware disguises itself as legitimate software (the sneaky imposter).

What is a Trojan?

100

This operating system is developed by Microsoft and widely used in businesses.

What is Windows?

200

This hardware stores data permanently, even when the computer is turned off.

What is a hard drive (HDD/SSD)?

200

This protocol assigns IP addresses automatically to devices on a network.

What is DHCP?

200

A computer that won’t power on might first require checking this basic component.

What is the power cable / power source?

200

This practice requires users to verify their identity using two or more methods.

What is multi-factor authentication (MFA)?

200

This command-line tool in Windows displays IP configuration info.

What is ipconfig?

300

This port type is commonly used to connect modern displays and can carry both audio and video signals.

What is HDMI?

300

This type of network covers a small geographic area like a home or office.

What is a LAN?

300

This tool can test whether a network device is reachable by sending echo requests.

What is ping?

300

This type of attack tricks users into revealing sensitive information via fake emails.

What is phishing?

300

This open-source OS kernel is the foundation for many distributions like Ubuntu.

What is Linux?

400

This motherboard form factor is smaller than ATX but larger than Mini-ITX.

What is Micro-ATX?

400

This port number is used by HTTP (aka the “not secure but still hanging around” protocol).

What is port 80?

400

If your computer randomly restarts, overheats, and sounds like a jet engine, this component may be failing.

What is the cooling system / fan?

400

This encryption protocol secures wireless networks and replaced WPA (RIP old security).

What is WPA2 (or WPA3)?

400

This macOS feature allows you to quickly search for files, apps, and info (your digital bloodhound).

What is Spotlight?

500

This type of RAM is synchronized with the system clock and is the standard used in modern systems (not your grandma’s RAM).

What is DDR (Double Data Rate) SDRAM?

500

This networking model has 7 layers and makes IT students question their life choices.

What is the OSI Model?

500

This Windows tool allows you to view system logs for troubleshooting mysterious issues.

What is Event Viewer?

500

This principle gives users only the access necessary to perform their job—no more, no less.

What is the principle of least privilege?

500

This Windows administrative tool allows you to manage hardware devices and drivers.

What is Device Manager?

M
e
n
u