The Network Patch
Fix it or Forget it
Security Lockdown
TECH+ Infrastructure
MOS Word and Power Point
100

This protocol uses Port 443 to provide secure, encrypted web browsing.

What is HTTPS?

100

If a PC makes a series of loud beeps during startup and fails to show a screen, it has failed this internal diagnostic check.

What is the POST (Power-On Self-Test)?

100

This physical security breach occurs when an unauthorized person follows an authorized employee into a secure building.

What is Tailgating (or Piggybacking)?

100

This type of storage is considered "volatile," meaning it loses all data once the power is turned off.

What is RAM (Random Access Memory)?

100

This Word feature allows you to automatically create personalized letters or envelopes for a large list of recipients.

What is Mail Merge?

200

This networking device operates at Layer 2 and makes forwarding decisions based on MAC addresses.

What is a Switch?

200

This command line tool is used to test connectivity between two devices by sending ICMP Echo Request packets.

What is ping?

200

This type of malware encrypts a user's files and demands payment in exchange for the decryption key.

What is Ransomware?

200

This "connector" is the current industry standard for charging mobile devices and high-speed data transfer, known for being reversible.

What is USB-C?

200

In PowerPoint, modifying this "Master" view allows you to change the font or logo on every slide in the deck simultaneously.

What is the Slide Master?

300

This is the protocol used to automatically assign IP addresses, Subnet Masks, and Default Gateways to hosts.

What is DHCP?

300

You see "ghost images" on a laser-printed page. This is likely a failure of which printer component?

What is the Cleaning Blade (or the Drum)?

300

This security principle dictates that users should only be given the minimum level of access required to perform their job.

What is Least Privilege?

300

Between 2.4 GHz and 5 GHz, this Wi-Fi frequency offers higher speeds but a shorter physical range.

What is 5 GHz?

300

This feature in Word highlights every change made to a document, allowing a collaborator to approve or reject them.

What is Track Changes?

400

This 802.11 standard operates in both the 2.4GHz and 5GHz bands and introduced "High Efficiency" wireless (Wi-Fi 6).

What is 802.11ax?

400

A user reports their laptop's battery is bulging and the touchpad is popping out. This is the first thing a technician should do.

What is remove the battery and dispose of it safely (Safety first!)?

400

This type of "Phishing" attack specifically targets high-ranking executives within an organization.

What is Whaling?

400

This is the very first step in the CompTIA standard troubleshooting methodology.

What is Identify the problem?

400

This is the difference between a Transition and an Animation in PowerPoint.

What is Transitions happen between slides; Animations happen to objects on a slide?

500

This specific DNS record type is used to map a domain name to an IPv6 address.

What is a AAAA (Quad-A) record?

500

This tool would be used to find the specific location of a break in a long Ethernet cable run behind a wall.

What is a TDR (Time Domain Reflectometer)?

500

This specific type of malware is designed to hide its presence and the presence of other malware by subverting the OS kernel.

What is Rootkit?

500

This low-power CPU architecture is commonly found in smartphones and tablets, differing from the x86 chips in most PCs.

What is ARM?

500

To ensure a Word document looks the same on every computer, you should use this feature to include the specific typefaces within the file.

What is Embedding Fonts?

M
e
n
u