IT Quiz

quiz

Test your IT knowledge with fun, multiple-choice quizzes on tech support, troubleshooting, networking, hardware, software, and more.

  • Difficulty - Medium
    Total Plays - 2
    Allowed Time - 10 sec
    Best time - 2.159 sec

    Which protocol is used to receive emails?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    POP3 (and IMAP) are used for receiving emails, while SMTP is used for sending.
  • Difficulty - Easy
    Total Plays - 3
    Allowed Time - 10 sec
    Best time - 3.167 sec

    Which of these is NOT an operating system?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Microsoft Office is an application suite, not an OS.
  • Difficulty - Easy
    Total Plays - 7
    Allowed Time - 10 sec
    Best time - 1.989 sec

    What does VPN stand for?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    A VPN encrypts internet traffic and provides privacy and security.
  • Difficulty - Easy
    Total Plays - 7
    Allowed Time - 10 sec
    Best time - 1.000 sec

    Which device assigns IP addresses on a network?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    The router often acts as a DHCP server, assigning IP addresses automatically.
  • Difficulty - Medium
    Total Plays - 9
    Allowed Time - 10 sec
    Best time - 1.264

    Why does Windows 11 require TPM 2.0?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Windows 11 uses TPM 2.0 to defend against modern security threats such as malware and ransomware. TPM ensures the system boots securely and keeps encryption keys safe from attackers.
  • Difficulty - Medium
    Total Plays - 9
    Allowed Time - 10 sec
    Best time - 2.014

    What does TPM stands for?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    TPM (Trusted Platform Module) is a hardware-based security feature that stores encryption keys and helps protect a computer from unauthorized access and malware.
  • Difficulty - Hard
    Total Plays - 10
    Allowed Time - 15 sec
    Best time - 15

    What’s the key role of SNMP in IT infrastructure?

    Tip: Click "Play" to reveal options and start playing.

    Commonly used in enterprise networks for tracking and alerts.

    #A
    #B
    #C
    #D
    Explanation:
    SNMP (Simple Network Management Protocol) monitors devices like routers and switches, gathering performance data.
  • Difficulty - Hard
    Total Plays - 9
    Allowed Time - 15 sec
    Best time - 3.548

    What’s the main function of Active Directory?

    Tip: Click "Play" to reveal options and start playing.

    Used in Windows environments to manage users, groups, and permissions centrally.

    #A
    #B
    #C
    #D
    Explanation:
    AD is Microsoft’s central authentication and authorization system for managing users and policies.
  • Difficulty - Medium
    Total Plays - 12
    Allowed Time - 10 sec
    Best time - 0.945

    What’s the default port for HTTPS?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Port 443 is the default port for HTTPS traffic over SSL/TLS encryption.
  • Difficulty - Medium
    Total Plays - 9
    Allowed Time - 10 sec
    Best time - 10

    Which command checks network connectivity?

    Tip: Click "Play" to reveal options and start playing.

    A simple, everyday diagnostic command used by all IT techs.

    #A
    #B
    #C
    #D
    Explanation:
    The ping command sends packets to a host and checks response time to test connectivity.
  • Difficulty - Hard
    Total Plays - 10
    Allowed Time - 15 sec
    Best time - 3.461 sec

    What does the DNS stand for?

    Tip: Click "Play" to reveal options and start playing.

    Every time you visit a website, DNS helps translate domain names into IP addresses.

    #A
    #B
    #C
    #D
    Explanation:
    DNS is the system that converts readable domains (like google.com) into machine-friendly IPs.
  • Difficulty - Easy
    Total Plays - 12
    Allowed Time - 5 sec
    Best time - 1.849

    Which Windows shortcut opens Task Manager directly?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Ctrl + Shift + Esc opens Task Manager immediately without extra clicks. Useful when an app is unresponsive or for killing processes.
  • Difficulty - Easy
    Total Plays - 14
    Allowed Time - 5 sec
    Best time - 1.042

    What does SSD stand for?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    SSDs (Solid State Drive) use NAND flash memory for storage — no moving parts — giving faster boot and random access performance compared to HDDs
  • Difficulty - Medium
    Total Plays - 11
    Allowed Time - 10 sec
    Best time - 10

    Which command repairs corrupted Windows images?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    DISM (Deployment Image Servicing and Management) repairs and restores the Windows image used for system recovery.
  • Difficulty - Easy
    Total Plays - 12
    Allowed Time - 5 sec
    Best time - 1.798

    Which type of IP is permanently assigned and doesn’t change?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Static IPs are manually set and remain constant, often used for servers, printers, and port forwarding where a predictable address is needed. Using static IPs incorrectly (assigning within DHCP pool) can cause address conflicts, so document and plan addressing schemes.
  • Difficulty - Easy
    Total Plays - 11
    Allowed Time - 5 sec
    Best time - 0.697

    Which tool manages partitions in Windows?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Disk Management (diskmgmt.msc) creates, formats, extends, shrinks, and deletes partitions. It can convert disks between MBR and GPT (with caveats) and create volumes. For advanced tasks (command line, scripting, or low-level recovery), use diskpart. Always back up data before partition changes.
  • Difficulty - Easy
    Total Plays - 10
    Allowed Time - 5 sec
    Best time - 3.822

    Which command clears the DNS cache in Windows?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    ipconfig /flushdns clears the local DNS resolver cache, useful when DNS records have changed or stale entries cause resolution failures. After flushing, test with nslookup to confirm fresh lookups. On client machines, browser caches may also need clearing for web content updates.
  • Difficulty - Easy
    Total Plays - 8
    Allowed Time - 5 sec
    Best time - 0.791

    Which key is often used to enter Safe Mode in older Windows versions?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    In older Windows (7 and earlier), F8 at boot opened Advanced Boot Options including Safe Mode. Modern Windows boots faster and often requires different methods (Shift + Restart or recovery options) to access safe modes. For legacy systems, F8 remains useful if fast boot isn’t enabled.
  • Difficulty - Easy
    Total Plays - 12
    Allowed Time - 5 sec
    Best time - 1.800

    Which malware records everything a user types?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Keyloggers secretly records keystrokes to steal credentials, PII, or other sensitive data and can be hardware or software based. Detecting them can be challenging; use reputable endpoint protection, monitor for suspicious processes, check startup entries, and employ two-factor authentication to mitigate credential theft.
  • Difficulty - Medium
    Total Plays - 21
    Allowed Time - 10 sec
    Best time - 1.464

    What is Information Technology (IT) Support?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    IT Support (Information Technology) refers to the services provided to help users troubleshoot, maintain, and optimize their computers, networks, and software systems.