PC Hardware
Processors and Motherboards
Networking
Virtualization and Cloud Computing
Cybersecurity
100

What precaution should you take before touching internal computer components to prevent static discharge?

Ground yourself using an ESD strap

100

What is stored in memory?

Data and Instructions

100

What is an IP address used for?

Identifying devices on a network

100

What is it called when software is used to simulate the hardware of a physical computer?

Virtualization

100

What type of malware spreads automatically without user interaction?

Worm

200

Alexa is asked to upgrade the memory on a desktop computer. Which component is she replace expected to replace?

RAM (DIMM)

200

What is the name of the expansion slot where a modern video card would be inserted into your motherboard?

PCIe

200

What does DNS do?

Translates domain names to IP addresses

200

What is the difference between Type I and Type II hypervisors?

Type I runs on hardware; Type II runs on top of OS

200

What is phishing?

Social engineering attack pretending to be legitimate to steal info

300

When you build a computer from parts, you usually start by deciding on which two parts listed below?

CPU (processor) and Motherboard

300

What motherboard chip contains software that configures hardware settings, identifies a boot device, and initializes essential hardware before the operating system starts?

UEFI/BIOS

300

What does DHCP do?

Automatically assigns IP addresses on a network

300

Name one hypervisor system.

VirtualBox
VMWare Workstation
Hyper-V

300

Which protocol is secure: HTTP or HTTPS?

HTTPS

400

Which motherboard size is larger?
Mini-ATX or Micro-ATX

Mini-ATX

400

What cache level is closest to the CPU?

Level 1

400

What command would you use to view your IP configuration in Windows?

ipconfig

400

Name the three cloud service models. *aaS

Paas (platform as a service)

Saas (software as a service)

Iaas (Infrastructure as a service)

400

You require employees to enter a password AND a code from their phone to log in. What security strategy is this?

MFA or 2FA

500

What key is commonly pressed during startup to enter BIOS/UEFI settings?

Delete, or F2 (Really any of the F keys, because why not)

500

What component of UEFI helps prevent malware from hijacking the system during or before the operating system loads?

Secure Boot

500

What is the purpose of a subnet mask?

Determines network vs host portion of IP address

500

What command-line command should you use to check if you can reach a server on your network?

ping

500

Name one advantage and one limitation of biometric authentication.

1. Hard to Steal
2. Cannot be changed if compromised

M
e
n
u