1
Which Windows tool is commonly used to view and manage storage volumes and partitions?
Task Manager
Disk Management
Paint
Snipping Tool
Disk Management is the Windows utility commonly used to manage disks, partitions, and volumes.
2
Which Windows feature allows you to boot into a limited environment for troubleshooting driver or software issues?
Safe Mode
Airplane Mode
Hibernate
Clipboard History
Safe Mode starts Windows with minimal drivers and services, making it useful for troubleshooting.
3
Which command checks Windows system files and attempts to repair corrupted protected files?
ping
ipconfig
format
sfc /scannow
The System File Checker command sfc /scannow checks protected Windows files and repairs issues when possible.
4
What does Task Manager help you do?
Edit BIOS firmware
Replace hardware components
View running apps, processes, and system performance
Install physical memory modules
Task Manager shows running applications, background processes, startup items, and performance information.
5
Which file system is most commonly used by modern Windows installations?
ext4
NTFS
HFS+
APFS
NTFS is the standard file system used by most modern Windows systems.
6
What is the best reason to use multi-factor authentication?
It adds another layer of identity verification
It speeds up internet downloads
It replaces antivirus software completely
It increases storage space automatically
MFA improves security by requiring more than one form of verification during sign-in.
7
Which of the following is an example of phishing?
A scheduled Windows update
A printer running out of toner
A user changing their desktop wallpaper
A fake email trying to trick a user into entering login credentials
Phishing is a social engineering tactic that tricks users into disclosing sensitive information.
8
What is the purpose of a firewall?
To physically cool the CPU
To filter and control network traffic
To replace a router
To store passwords offline
A firewall helps protect systems by allowing or blocking traffic based on rules.
9
Which action is the best response to a suspicious email attachment from an unknown sender?
Open it quickly to see what it is
Forward it to coworkers
Do not open it and report or delete it
Rename the file and then open it
Suspicious attachments should not be opened. They should be reported or deleted according to policy.
10
What is least privilege?
Giving users only the access they need to do their job
Making every user a local administrator
Removing all passwords from a system
Allowing unrestricted USB usage
Least privilege means a user should have only the minimum access necessary for their role.
11
A computer is running unusually slow. What is a good first troubleshooting step?
Replace the motherboard immediately
Delete the operating system
Physically remove the SSD
Check Task Manager for high resource usage
Task Manager can quickly show if CPU, memory, disk, or apps are causing slowdown.
12
An application keeps crashing right after launch. Which is a reasonable early troubleshooting step?
Replace all RAM immediately
Update or reinstall the application
Disable the keyboard
Format the whole drive first
Updating or reinstalling the affected application is a common and sensible first step for repeat crashes.
13
A browser keeps redirecting to strange pages. What is a likely cause?
A dead CMOS battery
A monitor cable issue
Malware or a malicious browser extension
A broken Ethernet connector on the switch
Unexpected redirects are often caused by adware, malware, or malicious browser extensions.
14
A system is stuck in a boot loop after a bad update. Which recovery approach is often helpful?
Boot into recovery options or Safe Mode
Open the printer tray
Swap the mouse batteries
Disconnect the monitor and reboot repeatedly
Recovery options and Safe Mode are common routes for undoing or troubleshooting a failed update or boot issue.
15
What is a common symptom of ransomware?
The monitor becomes brighter
The keyboard types faster
The battery charges beyond 100%
Files become inaccessible and a payment demand appears
Ransomware typically encrypts or locks files and then demands payment for restoration.
16
Why is documentation important during troubleshooting?
It slows the process down on purpose
It records what was tried and helps future support
It permanently fixes the hardware
It replaces backups entirely
Good documentation helps avoid repeated steps, supports handoffs, and improves future troubleshooting.
17
What is the best reason to create backups before major system changes?
To make the computer louder
To increase network speed
To protect data in case something goes wrong
To disable Windows updates forever
Backups help recover important data if a system change, update, migration, or repair goes badly.
18
When working inside a PC, which practice helps reduce the risk of electrostatic discharge damage?
Use proper ESD precautions such as grounding yourself
Rub your socks on carpet first
Touch circuit contacts directly
Place components on metal shelves without protection
Using proper ESD precautions reduces the chance of damaging sensitive electronic components.
19
What is the most professional way to handle a frustrated user during support?
Argue until they admit they are wrong
Ignore their concerns and work silently
Blame another technician
Stay calm, communicate clearly, and remain professional
Professional communication matters. Stay calm, set expectations, and communicate clearly.
20
Why is change management useful in IT environments?
It makes random changes faster
It helps plan, review, and control system changes
It removes the need for backups
It guarantees zero outages forever
Change management helps reduce risk by reviewing, planning, approving, and documenting changes.
21
Which utility shows IP configuration details on a Windows system?
chkdsk
taskkill
ipconfig
copy
ipconfig is a common Windows command-line utility used to display IP configuration details.
22
What is the best reason to keep operating systems and applications updated?
To patch bugs and security vulnerabilities
To make every password optional
To disable firewalls
To permanently increase battery size
Updates fix known bugs and close security gaps that attackers may otherwise exploit.
23
A user says they accidentally deleted an important file. What should you check first?
CPU temperature
Display resolution
Whether Bluetooth is enabled
Recycle Bin or available backups
For deleted files, start with the Recycle Bin and any existing backup or restore options.
24
Which type of account should be used for everyday computing whenever possible?
Local administrator account only
Standard user account
Guest account with no password
Shared root account
A standard user account helps limit risk and follows good security practice for daily use.
25
What should you do before disposing of or repurposing an old storage drive that held sensitive data?
Put it directly in regular trash
Leave the files as they are
Use proper data destruction or sanitization procedures
Only remove the desktop shortcuts
Sensitive data should be sanitized or destroyed properly before a drive is reused or discarded.