#1. When installing a new operating system, which of the following processes prepares the hard drive for the installation?
#2. Which of the following network protocols is used for remote access to a server over a secure encrypted connection?
#3. A user complains that their computer takes a long time to boot up and load the operating system. Which of the following could be the cause of this issue?
#4. Which of the following is a common symptom of a failing hard drive?
#5. Which of the following components is responsible for storing the computer’s BIOS and other firmware?
#6. Which of the following network devices allows multiple computers to share a single public IP address?
#7. Which of the following network devices connects multiple networks together and forwards packets based on IP addresses?
#8. Which of the following connectors is typically used to connect a monitor to a computer’s video card?
#9. A user wants to secure their wireless network from unauthorized access. Which of the following security protocols should they choose for their wireless router?
#10. A technician is troubleshooting a printer that consistently prints faded pages. Which of the following components should the technician check first?
#11. Which type of memory is non-volatile and retains its data even when power is disconnected?
#12. Which of the following is a command-line interface used in Linux and Unix-based operating systems?
#13. Which of the following wireless standards provides the fastest data transfer rate?
#14. Which of the following IP address ranges is reserved for private networks?
#15. A technician needs to connect two computers directly using an Ethernet cable. Which type of cable should be used for this connection?
#16. Which of the following attacks involves sending unsolicited messages or requests to a network device to consume its resources and cause a denial of service?
#17. Which of the following IP addresses belongs to the loopback address range?
#18. A user reports that their laptop’s battery is not holding a charge. Which of the following components is most likely at fault?
#19. Which of the following network devices operates at Layer 2 of the OSI model and uses MAC addresses to forward data?
#20. Which of the following protocols is used to resolve IP addresses to MAC addresses in IPv4 networks?