What component is known as the “brain” of the computer?
CPU
What Microsoft operating system is commonly used on personal computers?
Windows
What device connects multiple computers within a LAN?
Switch
What is the first step in the CompTIA troubleshooting process?
Identify the problem
What type of malware locks files and demands payment?
Ransomware
Which hardware component stores data permanently, even when the computer is powered off?
Hard drive or SSD
What OS is open-source and commonly used on servers?
Linux
What does IP stand for?
Internet Protocol
What tool is used to test network connectivity?
ping
What security principle gives users only the access they need?
Principle of Least Privilege
What component temporarily stores instructions and data that the CPU is actively using?
RAM
What Windows tool allows you to manage disks and partitions?
Disk management
What port number is used for HTTP?
80
What Windows utility shows running processes and resource usage?
Task manager
What authentication method uses two forms of verification?
MFA
Which hardware component is responsible for converting AC power from the wall into DC power usable by the computer?
PSU or Power Supply Unit
What command-line tool checks and repairs disk errors in Windows?
CHKDSK
What wireless standard supports the fastest speeds: 802.11n, ac, or ax?
802.11ax
A user reports that their printer is not printing, even though it appears online. Other computers can print to the same printer. What is the first step in troubleshooting?
Check the user’s computer for connection issues or print queue problems
What attack tricks users into giving up personal information?
Phishing
Which component stores the motherboard’s firmware and is responsible for starting the computer and initializing hardware during boot?
BIOS or the more modern UEFI chip
What feature allows multiple operating systems to run on one physical machine at the same time?
Virtualization
What protocol automatically assigns IP addresses to devices?
DHCP
Which type of troubleshooting involves testing one component at a time to isolate the cause of a hardware or software problem?
Divide and conquer / Isolation troubleshooting
Which security measure ensures that only authorized users can access sensitive areas, devices, or data by using methods such as key cards, biometrics, or security guards?
Physical security