Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Take the IT Systems Technician Knowledge Test

Assess Core IT Support and Networking Skills

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art depicting a quiz on IT Systems Technician Knowledge Test.

Ready to challenge your skills with an IT systems technician quiz? This practice test covers essential support, networking, and troubleshooting concepts to prepare you for real-world tasks. Whether you're a student, trainee, or seasoned professional, you'll gain valuable insights and confidence. Feel free to customise this free quiz in our editor or explore additional quizzes like the IT Support Technician Knowledge Quiz and the I/O Systems Knowledge Test to broaden your expertise.

Which hardware component provides persistent data storage?
Network Interface Card (NIC)
Solid State Drive (SSD)
Random Access Memory (RAM)
Central Processing Unit (CPU)
An SSD stores data persistently even when the system is powered off. RAM is volatile and loses data when power is removed. The CPU processes data and the NIC handles network connectivity, neither of which store data long term.
Which of the following is considered system software?
Operating System
Media Player
Email Client
Word Processor
An operating system is system software that manages hardware resources and provides services for applications. Word processors, media players, and email clients are application software used by end users.
In which network topology are devices connected in a closed loop, with each device having exactly two neighbors?
Mesh topology
Bus topology
Ring topology
Star topology
A ring topology connects each device to exactly two neighbors, forming a closed loop. In star topology all devices connect to a central hub. Bus uses a single backbone and mesh connects devices with multiple paths.
Which service automatically assigns IP addresses to devices on a network?
DNS
ARP
DHCP
FTP
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and network settings to devices. DNS resolves domain names to IP addresses, FTP transfers files, and ARP maps IP to MAC addresses locally.
Which command-line utility tests connectivity to another IP address?
ping
nslookup
traceroute
ipconfig
The ping utility sends ICMP echo requests to test reachability of an IP address. nslookup queries DNS records, traceroute shows the path packets take, and ipconfig displays local network configuration.
Which network protocol uses TCP port 443 by default?
HTTP
FTP
SMTP
HTTPS
HTTPS uses TLS encryption over TCP port 443 by default. HTTP uses port 80, FTP uses ports 20/21, and SMTP typically uses port 25.
Which cable type is commonly used for 1 Gbps Ethernet connections?
Cat5e
HDMI
Cat3
Coaxial
Category 5e (Cat5e) cable supports 1 Gbps Ethernet at distances up to 100 meters. Coaxial and Cat3 do not support gigabit speeds, and HDMI is for video signals.
Which command-line tool displays active network connections and listening ports in Windows?
nslookup
traceroute
ping
netstat
The netstat utility shows active connections and listening ports on a system. ping tests reachability, traceroute traces packet routes, and nslookup resolves DNS records.
In Windows, which utility would you use to view system event logs for troubleshooting?
Task Manager
Services
Event Viewer
Disk Management
Event Viewer displays system, security, and application logs useful for troubleshooting. Task Manager monitors processes, Disk Management handles storage, and Services manages background services.
To secure a wireless network with strong encryption, which protocol is recommended?
WEP
WPA2
WPS
WPA
WPA2 provides robust encryption using AES and is widely recommended for wireless security. WEP is outdated and insecure, WPA is less secure than WPA2, and WPS is a setup protocol, not encryption.
In the OSI model, at which layer does routing occur?
Session Layer
Data Link Layer
Network Layer
Transport Layer
Routing decisions occur at the Network Layer (Layer 3) of the OSI model, where packets are forwarded between different networks. The Data Link layer handles local node-to-node data transfer.
When documenting a system change, which information is most critical to include?
Hardware serial number and warranty information
Only the list of error codes encountered
User's subjective feedback on performance
Date of change with detailed description and technician name
Effective change documentation includes the date, a clear description of what was changed, and who performed it. Serial numbers or warranties may be useful but are not central to the change record.
Which CIDR notation corresponds to a subnet mask of 255.255.255.0?
/30
/32
/16
/24
A subnet mask of 255.255.255.0 corresponds to a /24 CIDR notation, indicating 24 bits are used for the network prefix.
In Linux, which command is traditionally used to configure and display network interfaces?
ifconfig
route
ipconfig
netstat
The ifconfig command has traditionally been used on Linux to configure and display network interface settings. ipconfig is used on Windows, and route/netstat serve different purposes.
Which protocol resolves a known IP address to a MAC address on a local network?
ICMP
ARP
DNS
DHCP
ARP (Address Resolution Protocol) maps an IP address to its corresponding MAC address on a local network segment. DNS resolves domain names to IP addresses.
Which IEEE standard specifies VLAN tagging on Ethernet networks?
802.11
802.1Q
802.3
802.1X
IEEE 802.1Q defines the standard for VLAN tagging on Ethernet frames, allowing multiple VLANs to traverse the same physical link. 802.3 covers Ethernet physical and MAC layers.
Which PowerShell cmdlet retrieves entries from the Windows event logs?
Get-Service
Get-ChildItem
Get-EventLog
Get-Process
Get-EventLog is a PowerShell cmdlet used to read entries from Windows event logs. Get-Process lists processes, Get-Service lists services, and Get-ChildItem lists filesystem items.
What is the primary role of a root Certificate Authority (CA) in a public key infrastructure?
Encrypt all network traffic on the LAN
Issue and sign certificates for subordinate CAs and end entities
Provide password authentication services
Store all users' private keys centrally
A root CA is the trust anchor in a PKI and issues digital certificates, signing subordinate CA certificates and end-entity certificates. It does not store private keys for users or encrypt general network traffic.
Which TCP port is commonly used by the iSCSI protocol for block-level storage over IP networks?
445
3260
3389
22
iSCSI typically uses TCP port 3260 to transport SCSI commands over IP networks. Port 3389 is for RDP, 445 for SMB, and 22 for SSH.
Which version of SNMP provides built-in authentication and encryption for network management?
SNMPv2c
SNMPv3
SNMPv4
SNMPv1
SNMPv3 adds strong authentication and optional encryption to the protocol. SNMPv1 and v2c only support community strings without encryption, and SNMPv4 does not exist in standard implementations.
0
{"name":"Which hardware component provides persistent data storage?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which hardware component provides persistent data storage?, Which of the following is considered system software?, In which network topology are devices connected in a closed loop, with each device having exactly two neighbors?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Identify hardware and software components in complex IT systems.
  2. Evaluate network topologies and communication protocols accurately.
  3. Configure operating systems and peripheral devices for optimal performance.
  4. Troubleshoot common connectivity and performance issues effectively.
  5. Secure IT infrastructures using best practices and security tools.
  6. Document maintenance procedures and system changes clearly.

Cheat Sheet

  1. Understand Computer Hardware Components - Dive into the core of every PC by getting to know how the CPU processes bits, how RAM stores quick data, and how the motherboard ties it all together. It's like assembling the dream team: each part must play its role to keep your system humming. Explore hardware labs
  2. Ciscopress Hardware & Software Labs Guide
  3. Master Operating System Installation and Configuration - Get hands-on installing Windows, Linux, or macOS, from partitioning drives to setting up user profiles and tweaking updates. You'll learn hot tricks to optimize boot times and keep the system purring like a well-oiled machine. OS Installation Guide
  4. Ciscopress OS Installation & Config
  5. Grasp Networking Fundamentals - Explore how data travels across LANs and WANs, dive into topologies like star or mesh, and get cozy with protocols that make the internet tick. These building blocks are vital for diagnosing that dreaded "no connection" panic. Networking Study Guide
  6. Skillsoft Networking Exam Guide
  7. Develop Troubleshooting Skills - Become the IT hero by learning systematic steps: identify the issue, hypothesize causes, test solutions, and confirm resolution. Debugging hardware and software hitches becomes a fun puzzle instead of a headache. Troubleshooting Labs
  8. Ciscopress Troubleshooting Labs Guide
  9. Implement Security Best Practices - Learn to fortify systems with firewalls, antivirus, encryption, and strong password strategies. Think of it as adding layers of super-shield so you can stop cyber baddies in their tracks. Security Best Practices Guide
  10. Skillsoft Security Guide
  11. Document System Changes and Maintenance - Keep a clear log of every tweak, update, and fix you perform; it's like writing a diary for your machines. Good documentation means smoother upgrades, faster troubleshooting, and bragging rights when your notes save the day. Documentation Labs
  12. Ciscopress System Documentation Guide
  13. Understand Peripheral Device Configuration - Master the art of hooking up printers, scanners, and external drives so they play nice with any OS. Get ready to banish driver woes and make smooth connections feel like magic. Peripheral Setup Guide
  14. Ciscopress Peripheral Configuration Labs
  15. Practice Preventive Maintenance - Schedule regular check-ups: disk cleanups, OS patches, hardware inspections - think of it as giving your PC a spa day. Staying proactive means fewer surprise crashes and happier hardware. Maintenance Labs
  16. Ciscopress Preventive Maintenance Guide
  17. Learn Command-Line Utilities - Become a command-line ninja by mastering tools like ping, ipconfig, and diskpart - fast and precise ways to manage files, diagnose networks, and tweak settings. Once you get the hang of it, the CLI will become your secret weapon. CLI Tools Guide
  18. Ciscopress Command-Line Labs
  19. Stay Updated on IT Trends and Technologies - Follow blogs, podcasts, and training portals to catch the latest breakthroughs in cloud, AI, and cybersecurity. Think of this as leveling up your skill set so you always stay ahead in the tech game. IT Exam Prep
  20. Enterprise Training IT Exam Preparation
Powered by: Quiz Maker