Operating Systems
Security
Software Troubleshooting
Operational Procedures
Networking
100

Windows has "Create a Restore Point". What does Mac use instead?

Time Machine

100

What is called when the human body and its characteristics/features are used for identification?

Biometrics

100

What command in command prompt would you use in order to lookup the IP Address of your computer?

IPConfig

100

What must you first do before fixing/working on a computer?

Back up the data.

100

What cable/connector is used for landlines?

RJ-11

200

Which version of Windows allows easier access to the multiple desktop feature?

Windows 11

200

What cyber attack involves sending an email that looks legitimate, but is actually trying to hijack your computer or attempting to gain Personal Information?

Phishing

200

You try to connect to the Wifi with your laptop, but notice that it is slow. You now try connecting to the Wifi with your phone but there now it is even slower. What should you try doing to get better Wifi?

Move closer to the Access Point.

200

What should you do with a client after you are done resolving an issue for them, but you think they may have more concerns?

Follow up/Call them back/Check on them.

200

You are an IT administrator that wants to install updates remotely at night to many computers. What method would you use to turn on the computers?

Wake-On-Lan

300

Which edition of Windows does not support Group Domain Policy?

Windows Home Edition

300

What is a vulnerability that can be exploited before developers even know about it?

Zero-day

300

You are having software issues on your phone. What is the first thing you should do?

Perform a power cycle/turn it off and on/reboot it

300

You are fixing a laptop and require the use of a new tool. When you receive it, you notice a vibrant, silver substance in a bag when you open up the package and are unsure what to do with it. What would you check to know what to do with it if there is no manual?

Material Safety Data Sheet (MSDS)

300

What replaced TKIP?

AES

400

What is an update with zero downtime called?

Rolling Update

400

Which biometric identification method is the most accurate?

Retina Scan

400

After verifying that the computer you are working on has malware, what is the first thing you should do towards getting rid of the malware?

Quarantine the files.

400

You are new to a company and need to ask your supervisor for the best practices for the job. What will the the supervisor refer you to?

Standard Operating Procedure

400

A server administrator for a corporation with an enterprise network was tasked with setting up a website hosted on-premise. How should the administrator set it up?

A screened subnet can also be referred to by the deprecated terminology demilitarized zone (DMZ). The idea of a screened subnet is that some hosts are placed in a separate network segment with a different IP subnet address range than the rest of the LAN.

500

Which Linux Command elevates privileges?

Su,Sudo

500

What type of virus hides in the ram and is nearly undetectable?

Fileless Malware


500

You are reviewing a script and come across this:

#until ping -c1 "$1" &>/dev/null

What will this execute/do? 

Nothing will execute because it is a comment.

500

What do the numbers in the 3-2-1 rule represent?

3 copies, 2 different medias, 1 stored off-site

500

You are pinging a host at 192.168.0.99 from a host at 192.168.0.200. The response is “Reply from 192.168.0.200: Destination host unreachable.” The hosts use the subnet mask 255.255.255.0. What could be the problem?

The host unreachable message indicates that there was no response, but the problem will be an issue such as the host being disconnected from the network or configured to block discovery rather than a gateway issue. 

The hosts are on the same IP network (192.168.0.0/24). This means that 192.168.0.200 does not try to use a router (the gateway) to send the probes. 192.168.0.200 uses address resolution protocol (ARP) to find the host with the IP 192.168.0.99.