linkedin-skill-assessments-quizzes

IT Operations

Q1. You are configuring a Wi-Fi base station using DHCP. Which items should you set or change?

Q2. Can you connect a DisplayPort monitor to a USB-C port on your computer?

Q3. What is the I/O panel?

Q4. The computer consistently boots into Safe Mode. How would you address this issue?

Q5. Which choice is not a typical adjustment found on a monitor?

Q6. Assuming that the gateway, modem, and switch are separate units, in what order should a small office or home office LAN be restarted?

  1. Modem
  2. Gateway
  3. Switch
  1. Modem
  2. Switch
  3. Gateway
  1. Gateway
  2. Switch

Q7. A client needs to secure their cafe’s wireless network, which is used only by employees. What is the best approach for a finite list of devices?

Q8. Which hardware port would not be found on a typical gateway?

Q9. The recent Windows update introduced some quirks in the system. How can you enter the Windows Recovery Environment to recover from the update?

Q10. Which components are typically found on the motherboard?

Q11. What does the acronym RAID refer to?

Q12. To which internal component does the illustrated (P1) connector attach?

Q12

Q13. Your computer boots at very low resolution that cannot be increased through display settings. What is the most likely solution?

Q14. To which choice can the wget program be considered similar?

Q15. Does an incognito window prevent websites from tracking your activity on the web?

Q16. What must you confirm before performing a processor upgrade?

Q17. Which type of storage has the fastest data access speeds?

Q18. Which peripheral is most likely to require entering a Bluetooth pairing passcode?

Explanation: Many Bluetooth keyboards (especially older or “legacy” models) require entering a pairing/passcode during initial pairing. Mice and headsets can require pairing too, but keyboards historically + most commonly use a numeric pairing code. This question is somewhat hardware-dependent — see PR discussion for edge-cases and references.


Q19. Walt’s computer is several years old and he wants to ensure that the system works until he gets a replacement. What should he do first?


Q20. Which statement best describes a drive?

Explanation: A drive is a physical device that performs read/write operations; removable-media drives (CD/DVD, removable disk) accept media, while non-removable drives (SSD/HDD) provide storage without separate media.


Q21. Mass storage inside a desktop computer case is usually found where?


Q31. Which device is used to connect computers on a local network (LAN) at Layer 2?

Explanation: A network switch operates at Layer 2 and forwards frames between devices on the same LAN. Servers provide services but do not serve the traffic-forwarding role of a switch.


Q43. If you move a user’s data and installed programs from one system to another, this process is called:

Explanation: A migration moves data and installed applications/settings from one environment to another; a “profile transfer” generally refers only to user profile data.


Q51. To access extra keys or alternate key functions on some laptop keyboards (compact layouts), which key is typically used?

Explanation: The Fn (Function) key is commonly used to access alternate functions on laptop/compact keyboards (media keys, secondary key legends). Alt/Option performs different roles and is not the usual way to access alternate hardware keysets.


Q52. If a PC repeatedly boots into Safe Mode, what is the most appropriate next step?

Explanation: Persistent boots into Safe Mode indicate underlying problems (driver, hardware, or config). Investigate logs, recent changes and safe-mode diagnostics before opting to reinstall or only restart. (A quick restart can be used as a test, but repeated Safe Mode boots should be diagnosed.)

Q53. Which security tool can be doubled up to offer additional protection without being redundant?

Q54. The mouse pointer is behaving erratically. What should you do first?

Q55. How many wire pairs are in a CAT-5 cable?

Q56. What is the difference between a USB hub and a powered USB hub?

Q57. Which of the following users has the smartest approach to online security?

Q58. Which is an example of a phishing attack?

Q59. You receive a malware warning regarding a specific file. Which approach should you take to ensure that you do not have false positive?

Q60. What are the best tools to use for cleaning a computer?

Q61. A computer power supply is measured in _.

Q62. If you had a 255.255.255.0 subnet mask, how many usable IP addresses would you have for hosts?

Q63. Tania was told to change a setting in the UEFI. How is it accessed?

Q64. What is the technical reason why you must properly eject media?

Q65. Which part of the network assigns an IP address?

Q66. Expansion cards follow which current interface standard?

Q67. Which action triggers a UAC warning?

Q68. Which choice is not a current mass storage type?

Q69. Which statement most accurately describes the north-bridge or host-bridge?

Q70. Which characters are not allowed in a filename?

Q71. What is the most direct way to change the desktop background in Windows OS?

Q72. Which I/O components are typically found in a chipset on the motherboard?

Q73. What does the acronym RAID refer to?

Q74. What is an example of a top-level domain (TLD)?

Q75. Jan is setting up a coffee shop’s wireless network. Given the number of Wi-Fi networks within range, which are the best choices for a 2.4GHz Wi-Fi channel?

Q76. When elevated access is required, what steps must a user take?

Q77. What is a duplex printer?

Q78. Which choice is not an internal computer upgrade?

Q79. In a hybrid cloud architecture, what is the main challenge of maintaining consistent configuration states across on-premises and cloud environments?

Q80. In enterprise IT monitoring, what problem does “cardinality explosion” refer to?

Q81. In a CI/CD pipeline, why is using immutable infrastructure considered best practice?

Q82. What issue arises when using synchronous microservice calls in a globally distributed production system?

Q83. In container orchestration systems like Kubernetes, what does the control plane primarily manage?

Q84. In distributed systems observability, what is the primary purpose of implementing distributed tracing with context propagation?

Q85. Why might an SRE team prefer a Service Level Objective (SLO) expressed as an error budget over a 100% uptime target?

Q86. What operational issue is most likely if a message broker in an event-driven system begins showing a consistent lag in queue depth?

Q87. In large-scale infrastructure management, what’s a key operational advantage of GitOps over traditional configuration management approaches?

Q88. When autoscaling a stateful application, why can horizontal scaling lead to inconsistency issues?