Technical Knowledge Assessment

Technical Knowledge Assessment

9 – 52 Questions 8 min
This quiz targets the day-to-day technical judgment behind effective IT support: networking fundamentals, OS behavior, and disciplined troubleshooting in realistic scenarios. Expect questions that require interpreting logs, configs, and documentation cues while respecting constraints like security controls, change windows, and minimizing user impact.
Choose quiz length
1Which default TCP port is used by SSH?
2A service account needs to read application logs in C:\App\Logs but must not change anything. What is the best permission approach?
3A differential backup contains only changes since the last incremental backup.

True / False

4What is the primary purpose of a default gateway on a host?
5Arrange the standard troubleshooting workflow from first to last.

Put in order

1Identify the problem
2Establish a plan of action
3Test the theory
4Form a theory of probable cause
5Verify full functionality and document
6A VM is slow and monitoring shows very high disk queue length while CPU is low. Which bottleneck is most likely?
7You are setting up DNS so that external senders can deliver email to user@example.com. Select all that apply.

Select all that apply

8Users can reach an internal web app by IP address, but the hostname fails. Select all that apply for the most direct DNS-focused checks.

Select all that apply

9Arrange a typical DNS resolution sequence (with a recursive resolver) from first to last.

Put in order

1Resolver queries the authoritative DNS server
2Resolver queries a root DNS server
3Resolver queries the relevant TLD DNS server
4Resolver returns the answer to the client
5Client connects using the returned IP
6Client sends query to recursive resolver
10You identified a low-risk configuration fix for a production service, but it will change live traffic. What is the best next step before applying it?
11Users can reach other devices on their local subnet, but no one on that subnet can reach the Internet. Other subnets are fine. Which cause is most likely?
12For the host 192.168.10.73/27, what are the network address and broadcast address?
13DNS commonly uses port 53 over both UDP and TCP.

True / False

14How many usable host IP addresses are in an IPv4 /27 subnet?
15192.168.1.10 is a private IPv4 address.

True / False

High-Impact Pitfalls in Scenario-Based IT Troubleshooting

Strong technical candidates still miss points when they treat scenario questions like flashcards instead of mini-incidents. The errors below are common because they feel “reasonable” under time pressure, but they conflict with how systems fail in layers.

Answering the first recognizable symptom

“Users can’t reach the app” is not a diagnosis. Avoid choosing an application-side fix before you’ve checked DNS resolution, IP reachability, routing, firewall policy, and service health in that order. Look for scope clues: one host, one subnet, one site, or all users.

Ignoring constraints buried in the scenario

Questions often include quiet requirements like a change freeze, least-privilege, or “no downtime.” If an option requires rebooting a critical node, opening broad firewall rules, or disabling security tooling, it’s usually wrong even if it would “work.”

Mixing up network facts that drive decisions

Common slips include confusing TCP vs UDP behavior, treating a CNAME like an A record, assuming “ping works” means the service port is open, or forgetting that DNS caching and TTL can delay changes.

Skipping evidence and jumping to configuration changes

Changing settings before collecting timestamps, error text, recent-change history, and baseline metrics makes it impossible to prove root cause. Prefer answers that validate with logs (auth, system, application) and targeted tests (specific port checks, name resolution, traceroute/path tests).

Over-engineering the fix

Complex solutions (new load balancers, re-architecting networks, deploying new tooling) are rarely the best “next step.” The quiz frequently rewards the smallest safe action that restores service and reduces recurrence (correct ACL, fix DNS record, renew cert, adjust permission, restart the right service).

Forgetting operational hygiene

Look for answers that include rollback planning, documenting changes, and verifying success criteria (not just “service started”). In production scenarios, “works on my machine” is not a completion condition.

Core IT Troubleshooting + Networking Reference (Printable)

Printable note: This section is designed to print cleanly or save as a PDF for quick review before attempting the assessment.

Structured troubleshooting flow (fast but defensible)

  1. Define impact: who/what is affected, what changed, when it started, and whether it’s intermittent.
  2. Reproduce or validate: confirm the symptom with one direct test (exact URL, exact host, exact command).
  3. Check the lowest layer first: power/VM status → interface/link → IP config → routing → DNS → firewall → service → application dependencies.
  4. Collect evidence: error codes, timestamps, relevant logs, and current config state.
  5. Apply the smallest safe change: prefer reversible steps; record what you changed.
  6. Verify against success criteria: user path works, monitoring clears, and no new errors appear.

Networking essentials you’re expected to recall

  • Private IPv4 ranges: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16.
  • CIDR quick cues: /24 ≈ 256 addresses; /25 splits a /24 in half; /26 quarters; /27 eighths. Know network address vs usable host range vs broadcast.
  • “Ping works” caveat: ICMP reachability does not prove TCP/UDP service availability.
  • DNS record roles: A/AAAA (host address), CNAME (alias), MX (mail routing), PTR (reverse lookup). Respect caching and TTL delays.

Common ports (memorize the purpose, not just the number)

  • HTTP/HTTPS: 80/443
  • SSH: 22
  • RDP: 3389
  • DNS: 53 (UDP/TCP)
  • SMTP: 25
  • SMB: 445

OS + service triage (typical expectations)

  • Linux service checks: confirm process/service state, read recent logs, confirm listening ports, validate permissions/ownership.
  • Windows service checks: verify service status, review relevant Event Logs, confirm name resolution and firewall profile rules.
  • Certificates: verify expiry, hostname match (SAN/CN), and that clients trust the issuing chain; mismatches often look like “random” connectivity issues.

Security + change control signals (often baked into “best answer”)

  • Least privilege: grant the minimum rights needed, scoped by user/group, resource, and time.
  • Auditability: prefer changes that are logged and can be reviewed later.
  • Rollback plan: snapshot/backup before risky changes; document the pre-change state.

Job-Task Map: What the Assessment Measures in Real IT Work

This assessment aligns closely with tasks where technicians must translate symptoms into evidence, then into a safe next action. Use the map below to connect quiz performance to on-the-job capability.

Service Desk / Desktop Support

  • Triage user reports: distinguish account/permissions issues from device, network, or application outages.
  • Gather actionable details: capture error text, timestamps, impacted scope, and recent changes without “leading” the user.
  • First-line isolation: validate DNS, connectivity, and authentication basics before escalating.

Systems Administration (Windows/Linux)

  • Service reliability: identify failed services, dependency issues, misconfigurations, and permission problems.
  • Log interpretation: correlate system/application logs with change history and monitoring signals.
  • Risk-managed remediation: apply minimal changes, plan rollbacks, and verify recovery end-to-end.

Network Operations / Field Network Technician

  • Layered diagnosis: separate link, IP addressing, routing, DNS, and firewall causes of “can’t connect.”
  • Port-level reasoning: infer likely blocks or service failures from protocol/port context.
  • Change hygiene: choose fixes that preserve segmentation and avoid overly permissive rules.

Cloud / DevOps Support

  • Documentation-driven work: follow runbooks, interpret configuration intent, and spot drift from expected state.
  • Operational safety: respect maintenance windows, staged rollouts, and rollback expectations.
  • Root-cause thinking: avoid treating autoscaling/restarts as “solutions” when underlying misconfig persists.

Security-Aware Operations (Any Role)

  • Secure defaults: preserve least privilege, logging, and segmentation while restoring service.
  • Evidence preservation: avoid actions that destroy forensic context when suspicious activity is possible.

Technical Knowledge Assessment FAQs: Scenarios, Tools, and Scoring Signals

What kinds of evidence should I prioritize in scenario questions?

Prioritize evidence that narrows scope and layers: exact error messages, timestamps, what changed, and whether the issue is isolated to a host/subnet/site. Then pick the option that validates fundamentals (name resolution, routing, firewall, service status) before proposing invasive changes.

How should I choose between two answers that both “fix” the issue?

Prefer the option that meets constraints: least privilege, minimal downtime, auditable change, and lower operational overhead. If one option disables controls (broad firewall allow, turning off validation, running as admin/root) and the other is a scoped correction, the scoped correction is typically the intended best practice.

What’s the quickest way to avoid DNS-related traps?

Always separate resolution from reachability. Confirm what record type is involved (A/AAAA vs CNAME), consider caching/TTL effects, and remember that reverse lookups (PTR) don’t control forward resolution. If the scenario mentions “recent DNS change,” expect propagation or cache behavior to matter.

Which quiz mode should I use for an interview prep window?

Use quick (9 questions) to identify weak areas fast, standard (15 questions) to practice staying consistent across topics, and full (52 questions) to simulate endurance and context switching across networks, OS, and security constraints.

What if I’m strong technically but lose points on “best next step” questions?

That usually indicates a process gap, not a knowledge gap. Reframe each scenario as an incident ticket: define impact, confirm the symptom, collect minimum evidence, then take the smallest reversible action that proves or eliminates a hypothesis. If stakeholder communication is your weak spot during incidents, the Customer Service Soft Skills Quiz pairs well with this assessment.

Do I need memorized commands, or is conceptual understanding enough?

Command memorization isn’t required, but you should recognize what a command or tool is for (connectivity checks, name resolution, service status, log review) and understand what conclusions are valid from its output. Conceptual clarity—layers, scope, and constraints—beats recalling obscure syntax.