IT Support Forum
  • Commonly used in enterprise networks for tracking and alerts.

    #A
    #B
    #C
    #D
    Explanation:
    SNMP (Simple Network Management Protocol) monitors devices like routers and switches, gathering performance data.
  • Used in Windows environments to manage users, groups, and permissions centrally.

    #A
    #B
    #C
    #D
    Explanation:
    AD is Microsoft’s central authentication and authorization system for managing users and policies.
  • #A
    #B
    #C
    #D
    Explanation:
    Port 443 is the default port for HTTPS traffic over SSL/TLS encryption.
  • A simple, everyday diagnostic command used by all IT techs.

    #A
    #B
    #C
    #D
    Explanation:
    The ping command sends packets to a host and checks response time to test connectivity.
  • Difficulty - Hard
    Total Plays - 2
    Allowed Time - 15 sec
    Best time - 15 sec

    What does the DNS stand for?

    Tip: Click "Play" to reveal options and start playing.

    Every time you visit a website, DNS helps translate domain names into IP addresses.

    #A
    #B
    #C
    #D
    Explanation:
    DNS is the system that converts readable domains (like google.com) into machine-friendly IPs.
  • #A
    #B
    #C
    #D
    Explanation:
    Ctrl + Shift + Esc opens Task Manager immediately without extra clicks. Useful when an app is unresponsive or for killing processes.
  • Difficulty - Easy
    Total Plays - 8
    Allowed Time - 5 sec
    Best time - 1.042 sec

    What does SSD stand for?

    Tip: Click "Play" to reveal options and start playing.
    #A
    #B
    #C
    #D
    Explanation:
    SSDs (Solid State Drive) use NAND flash memory for storage — no moving parts — giving faster boot and random access performance compared to HDDs
  • #A
    #B
    #C
    #D
    Explanation:
    DISM (Deployment Image Servicing and Management) repairs and restores the Windows image used for system recovery.
  • #A
    #B
    #C
    #D
    Explanation:
    Static IPs are manually set and remain constant, often used for servers, printers, and port forwarding where a predictable address is needed. Using static IPs incorrectly (assigning within DHCP pool) can cause address conflicts, so document and plan addressing schemes.
  • #A
    #B
    #C
    #D
    Explanation:
    Disk Management (diskmgmt.msc) creates, formats, extends, shrinks, and deletes partitions. It can convert disks between MBR and GPT (with caveats) and create volumes. For advanced tasks (command line, scripting, or low-level recovery), use diskpart. Always back up data before partition changes.
  • #A
    #B
    #C
    #D
    Explanation:
    ipconfig /flushdns clears the local DNS resolver cache, useful when DNS records have changed or stale entries cause resolution failures. After flushing, test with nslookup to confirm fresh lookups. On client machines, browser caches may also need clearing for web content updates.
  • #A
    #B
    #C
    #D
    Explanation:
    In older Windows (7 and earlier), F8 at boot opened Advanced Boot Options including Safe Mode. Modern Windows boots faster and often requires different methods (Shift + Restart or recovery options) to access safe modes. For legacy systems, F8 remains useful if fast boot isn’t enabled.
  • #A
    #B
    #C
    #D
    Explanation:
    Keyloggers secretly records keystrokes to steal credentials, PII, or other sensitive data and can be hardware or software based. Detecting them can be challenging; use reputable endpoint protection, monitor for suspicious processes, check startup entries, and employ two-factor authentication to mitigate credential theft.
  • #A
    #B
    #C
    #D
    Explanation:
    IT Support (Information Technology) refers to the services provided to help users troubleshoot, maintain, and optimize their computers, networks, and software systems.
  • #A
    #B
    #C
    #D
    Explanation:
    WPA2/WPA3 passphrases are limited to 8–63 ASCII characters. Longer, complex passphrases increase resilience against brute force attacks.
Home Channels Search Login Register