What does a switch use to forward data to the correct device on a LAN?
What is MAC address
What’s the purpose of a modem in a home network setup?
What is (To convert digital data into a signal for transmission to an ISP)
What folder in Windows typically stores installed 64-bit applications?
What is (Program Files)
What Windows tool is used to uninstall or repair programs?
What is (Programs and Features / Apps & Features)
What does the "C" in CIA triad stand for?
What is (Confidentiality)
What is the purpose of DNS?
What is (To resolve domain names to IP addresses)
True or False: A router connects multiple devices within a LAN.
What is (False – it connects different networks)
Which internet connection type uses coaxial cable and DOCSIS protocol?
What is (Cable)
Which layer of a three-tier application handles business logic?
What is (Application or middle layer)
What is the primary function of a file system?
What is (To manage storage and organize data on a drive)
Which wireless security standard should never be used due to weak encryption?
What is (WEP)
What is the role of a recursive DNS server?
What is (Performs the full lookup and returns the answer to the client)
What wireless technology allows contactless data transfer within 6 cm?
What is (NFC)
Describe how attenuation affects a wireless network.
What is (Signal weakens over distance, reducing speed and reliability)
A user installs a tool from a third-party site and their browser starts showing ads. What step could have prevented this?
What is (Validating software source; using OEM or signed apps)
True or False: NTFS supports file permissions, encryption, and journaling.
What is (True)
A coworker gets tricked into sharing their password over chat. What kind of attack is this?
What is (Social engineering / phishing)
What is a Fully Qualified Domain Name (FQDN)?
What is (The complete domain name including hostname + domain + TLD)
Explain why a device would need to send its packet to a router instead of directly to another device on the network.
What is (Because the destination IP is outside the sender's subnet)?
What is Dynamic Rate Switching (DRS) and how does it impact Wi-Fi performance?
What is (Reduces speed to maintain connection at greater distances)
What's the main difference between one-tier and three-tier application architectures?
What is (One-tier runs everything on one machine; three-tier separates UI, logic, and data layers)
A user receives a UAC prompt when running a setup file. What does UAC stand for and why does it appear?
What is (User Account Control – it protects system settings from unauthorized changes)
What’s the difference between authentication and authorization?
What is (Authentication = verify identity; Authorization = define access)
How does a client-side iterative DNS query work?
What is (The client follows referrals and contacts each server step-by-step)
You configure a static IP on a printer, but users on a different subnet can’t print. What network device must be involved to resolve this?
What is (Router).
You're configuring a transparent proxy. Why might users not need to adjust browser settings?
What is (Transparent proxies intercept traffic without client configuration)
A user’s VPN client fails to install due to missing system files. What tool might help verify and repair system dependencies?
What is (System File Checker or DISM)
You're configuring a transparent proxy. Why might users not need to adjust browser settings?
What is (Transparent proxies intercept traffic without client configuration)
A company wants to ensure data remains confidential during transmission.
What is Which concept and tool should be used? (Encryption; VPN, HTTPS, or TLS)
You notice a certificate warning when visiting a website. What could be the cause?
What is (Expired cert, wrong domain, or untrusted issuer)