Skip to main content

IT Administrator Quiz - Basic Level - Part 2

 

For better understanding through knowledge, providing a 12-question Multiple Choice Question (MCQ) quiz designed for an IT administrator, focusing on basic scenarios that reflect common tasks and challenges in IT administration. Each question includes a simple scenario to provide context, and the questions cover fundamental topics like network management, user account security, backups, and system maintenance.

This quiz tests foundational IT administration skills through practical scenarios. Each question has four options, with one correct answer to assess or reinforce  knowledge of common IT admin tasks. The correct answers, along with explanations for why other options are incorrect, are provided after the quiz.

Question 1

Scenario: You’re an IT admin at a retail company. Employees report that their email client isn’t receiving new messages. You suspect an issue with the email server’s connection settings.

Which protocol should you check to ensure incoming email is working correctly?
a) SMTP
b) HTTP
c) POP3
d) FTP


Question 2

Scenario: A user complains that their computer is running slowly. You check and notice high CPU usage from an unknown process.

What’s the first step to investigate the issue?
a) Reboot the computer immediately.
b) Uninstall all software on the computer.
c) Replace the computer’s hard drive.
d) Use Task Manager or Resource Monitor to identify the process.


Question 3

Scenario: Your company is implementing a new antivirus solution to protect workstations. You need to ensure all computers are scanned regularly without user intervention.

What’s the best way to configure the antivirus software?
a) Ask users to run manual scans weekly.
b) Disable the antivirus during work hours to improve performance.
c) Schedule automatic full system scans during off-hours.
d) Install the antivirus only on servers, not workstations.


Question 4

Scenario: You’re setting up a new printer on the company network. Employees need to print from their computers, but you want to control who can use the printer.

How should you manage printer access?
a) Allow everyone to access the printer without restrictions.
b) Physically lock the printer in a restricted room.
c) Disable network printing and use USB connections only.
d) Assign printer permissions to a specific security group.


Question 5

Scenario: A server in your data center is overheating, causing random shutdowns. You need to address the issue quickly to prevent downtime.

What’s the first action you should take?
a) Check the server’s cooling fans and ventilation.
b) Replace the server with a new one.
c) Increase the server’s workload to test its limits.
d) Move the server to a colder room without checking.


Question 6

Scenario: Your company’s website, hosted on an internal server, is inaccessible from outside the network. You suspect a network configuration issue.

Which setting should you check to ensure external access to the website?
a) The server’s antivirus settings.
b) The website’s font settings.
c) The router’s port forwarding configuration.
d) The server’s keyboard layout.


Question 7

Scenario: You’re tasked with training employees to recognize phishing emails to reduce security risks. A user asks how to spot a suspicious email.

What’s the best advice to give?
a) Check the sender’s email address and look for misspellings or unusual domains.
b) Open all email attachments to check their content.
c) Reply to every email to verify the sender’s identity.
d) Ignore all emails from unknown senders without reviewing them.


Question 8

Scenario: A critical application on a company server fails after a recent update. You need to restore functionality quickly to minimize downtime.

What’s the best approach to resolve the issue?
a) Reinstall the server’s operating system.
b) Ignore the issue and wait for the next update.
c) Replace the application with a different one.
d) Roll back the update using a system restore point or backup.


Question 9

Scenario: Your company uses a ticketing system to track IT support requests. You notice that many tickets are for password resets, taking up your time.

What can you do to reduce password reset requests?
a) Disable password requirements for all users.
b) Enable self-service password reset tools for users.
c) Require passwords to be changed daily.
d) Handle all reset requests manually to ensure security.


Question 10

Scenario: You’re configuring a new file server to store company documents. You need to ensure data is protected against unauthorized access.

What’s the best way to secure the file server?
a) Allow all users full access to simplify management.
b) Store all files in plain text for easy access.
c) Use NTFS permissions and encrypt sensitive files.
d) Disable the server’s firewall to improve performance.


Question 11

Scenario: Your company’s internet connection is unreliable, causing disruptions. You suspect an issue with the Domain Name System (DNS) configuration.

What should you do to troubleshoot the DNS issue?
a) Test DNS resolution using a tool like nslookup or ping.
b) Change the company’s email provider.
c) Upgrade the office’s internet plan.
d) Disable all network devices temporarily.


Question 12

Scenario: You’re applying security patches to company computers to protect against vulnerabilities. Some patches require a system reboot, which could disrupt users.

How should you manage the patch deployment?
a) Apply patches during work hours without notifying users.
b) Skip patches that require reboots to avoid disruptions.
c) Remove user access to computers until patching is complete.
d) Schedule patch installation and reboots during off-hours with user notifications.


Correct Answers and Explanations

Correct Answers

  1. c
  2. d
  3. c
  4. d
  5. a
  6. c
  7. a
  8. d
  9. b
  10. c
  11. a
  12. d

Explanations

Question 1: Correct Answer: c) POP3

  • Why c? POP3 (Post Office Protocol 3) is used for receiving emails in email clients, making it the protocol to check for incoming email issues.
  • Why not a? SMTP is for sending emails, not receiving.
  • Why not b? HTTP is for web browsing, unrelated to email.
  • Why not d? FTP is for file transfers, not email.

Question 2: Correct Answer: d) Use Task Manager or Resource Monitor to identify the process.

  • Why d? These tools identify the process causing high CPU usage, enabling targeted troubleshooting (e.g., stopping malware or a stuck app).
  • Why not a? Rebooting may temporarily resolve the issue but doesn’t diagnose the cause.
  • Why not b? Uninstalling all software is excessive and risks removing critical applications.
  • Why not c? Replacing the hard drive is irrelevant to CPU usage issues.

Question 3: Correct Answer: c) Schedule automatic full system scans during off-hours.

  • Why c? Automatic scans ensure consistent protection, and off-hours scheduling minimizes performance impact on workstations.
  • Why not a? Manual scans rely on user action, which is unreliable.
  • Why not b? Disabling antivirus during work hours leaves systems vulnerable.
  • Why not d? Servers need antivirus, but workstations require their own protection.

Question 4: Correct Answer: d) Assign printer permissions to a specific security group.

  • Why d? Security groups allow controlled, scalable access, ensuring only authorized users can print.
  • Why not a? Unrestricted access risks misuse or unauthorized printing.
  • Why not b? Physically locking the printer is impractical for network printing.
  • Why not c? USB-only printing is inefficient for a shared network printer.

Question 5: Correct Answer: a) Check the server’s cooling fans and ventilation.

  • Why a? Overheating is often due to faulty fans or poor ventilation, and checking these is the fastest way to diagnose and fix the issue.
  • Why not b? Replacing the server is costly and unnecessary without diagnosis.
  • Why not c? Increasing workload exacerbates overheating and risks damage.
  • Why not d? Moving the server without checking doesn’t address the root cause.

Question 6: Correct Answer: c) The router’s port forwarding configuration.

  • Why c? Port forwarding allows external traffic (e.g., HTTP port 80) to reach the web server, enabling outside access.
  • Why not a? Antivirus settings don’t control network access.
  • Why not b? Font settings are unrelated to connectivity.
  • Why not d? Keyboard layout doesn’t affect server access.

Question 7: Correct Answer: a) Check the sender’s email address and look for misspellings or unusual domains.

  • Why a? Phishing emails often use fake or misspelled sender addresses (e.g., “support@go0gle.com”), making this a safe way to spot them.
  • Why not b? Opening attachments can install malware, increasing risk.
  • Why not c? Replying to phishing emails confirms your address to attackers.
  • Why not d? Ignoring all unknown emails may miss legitimate messages.

Question 8: Correct Answer: d) Roll back the update using a system restore point or backup.

  • Why d? Rolling back reverses the problematic update, restoring functionality quickly with minimal disruption.
  • Why not a? Reinstalling the OS is time-consuming and may not recover application data.
  • Why not b? Waiting for another update delays resolution and risks further issues.
  • Why not c? Replacing the application is unnecessary if the issue can be fixed.

Question 9: Correct Answer: b) Enable self-service password reset tools for users.

  • Why b? Self-service tools allow secure password resets, reducing IT workload while maintaining security.
  • Why not a? Disabling password requirements compromises security.
  • Why not c? Daily password changes are impractical and frustrate users.
  • Why not d? Manual resets are time-consuming and inefficient.

Question 10: Correct Answer: c) Use NTFS permissions and encrypt sensitive files.

  • Why c? NTFS permissions control access, and encryption protects data from unauthorized access, ensuring robust security.
  • Why not a? Full access for all users risks data breaches.
  • Why not b? Plain text files are vulnerable to exposure.
  • Why not d? Disabling the firewall weakens server protection, not file security.

Question 11: Correct Answer: a) Test DNS resolution using a tool like nslookup or ping.

  • Why a? These tools check if domain names resolve to correct IP addresses, diagnosing DNS issues effectively.
  • Why not b? Changing email providers is unrelated to DNS.
  • Why not c? Upgrading the internet plan doesn’t fix DNS configuration issues.
  • Why not d? Disabling network devices disrupts connectivity without diagnosing the problem.

Question 12: Correct Answer: d) Schedule patch installation and reboots during off-hours with user notifications.

  • Why d? Scheduling patches and reboots minimizes disruption, and notifications keep users informed, ensuring security updates are applied.
  • Why not a? Patching during work hours disrupts users and risks data loss.
  • Why not b? Skipping patches leaves systems vulnerable.
  • Why not c? Removing access is overly restrictive and unnecessary.

Comments

Popular posts from this blog

J10 - An insight of the Chinese 4.5 Gen Fighter Aircraft (with a Dash of Snark :-) !!!)

  Hold onto your flight helmets, folks, because we’re zooming into the Chengdu J-10, China’s sleek, pointy-nosed fighter jet that’s been turning heads and raising eyebrows—especially in the 2025 India-Pakistan crisis. Nicknamed the “Vigorous Dragon,” this single-engine, multirole beast is packed with electronics and electronic warfare (EW) systems that make it a formidable player in modern warfare. Built by the Chengdu Aircraft Corporation (CAC), the J-10 (especially the J-10CE variant) is Pakistan’s shiny new toy, and it’s been flexing its muscles against heavyweights like Rafale. Let’s unpack why its electronics and EW are the talk of the town, with a side of humor to keep things spicy. Avionics That Could Outsmart a Supercomputer : The J-10 boasts the KLJ-7A Active Electronically Scanned Array (AESA) radar, which is like having a hawk’s eyes on steroids including low probability of intercept (LPI). It tracks multiple targets at long ranges (up to 200+ km, per some sources), la...

An Analysis of Pakistan’s Choice of J-35 Over J-20

  Pakistan’s decision to acquire the Shenyang J-35A (also referred to as FC-31 or J-31 in earlier iterations) over the Chengdu J-20 from China is a complex choice driven by economic, strategic, operational, and technical factors. This analysis provides a comprehensive examination, including a detailed technical comparison and the reasons behind Pakistan’s preference, based on available information up to May 24, 2025. Technical Analysis of J-35A vs. J-20 To understand Pakistan’s choice, a technical comparison of the two aircraft is essential. Both are fifth-generation fighters, but their design philosophies and capabilities differ significantly. Shenyang J-35A Type and Role : The J-35A is a fifth-generation, multirole stealth fighter, designed for both air superiority and ground attack missions. Its versatility makes it suitable for a range of operational needs. Dimensions : It has a length of approximately 16.9 meters and a wingspan of about 11.5 meters, making it smaller an...

A Bird's eye view of Evolution and Technical Prowess of Fifth-Generation Fighter Aircraft

  The Evolution and Technical Prowess of Fifth-Generation Fighter Aircraft Fifth-generation fighter aircraft represent the pinnacle of modern aerospace engineering, integrating cutting-edge technologies to dominate the battlespace through stealth, advanced electronics, and unmatched versatility. Designed to operate in highly contested environments, these aircraft combine low-observable characteristics, sensor fusion, network-centric warfare capabilities, and advanced propulsion to outmatch adversaries. Picture this: a 5th generation fighter is like that sleek, mysterious stranger at a party who sneaks in unnoticed, knows everyone’s secrets, and leaves before the bill arrives. Meanwhile, 4.5 generation fighters are the life of the party, loud, versatile, and ready to dance with anyone, but they’re not quite invisible. The 5th generation stealthy superstars are—F-22 Raptor, F-35 Lightning II, J20 Mighty Dragon, J-35 Gyrfalcon, and Su-57 Felon—which can hold on their own against the ...