100 Essential Information Technology Questions You Must Know (with Answers & Examples)

Information Technology (IT) is the backbone of the modern world, covering everything from managing data and network infrastructure to ensuring cybersecurity. Whether you’re an IT student, a help desk professional, or preparing for an infrastructure role, mastering these core concepts is essential.

This guide provides 100 of the most common and crucial IT questions across key domains like Hardware, Networking, Security, Troubleshooting, and Cloud Computing.

Section 1: Hardware and Infrastructure Fundamentals (Questions 1-25)

These questions cover the physical components and foundational computing concepts.

  1. What is the CPU?
    • Answer: The Central Processing Unit (CPU) is the “brain” of the computer, executing instructions from programs.
    • Example: Intel Core i7 or AMD Ryzen 7 chips.
  2. What is the difference between RAM and ROM?
    • Answer: RAM (Random Access Memory) is volatile memory used for short-term data storage while the computer is running. ROM (Read-Only Memory) is non-volatile and stores permanent instructions, like the boot firmware.
    • Example: A program running uses RAM; the computer’s BIOS is stored in ROM.
  3. What is an Operating System (OS)?
    • Answer: Software that manages all computer hardware and software resources and provides common services for computer programs.
    • Example: Windows, macOS, Linux, Android.
  4. What is Virtualization?
    • Answer: The creation of a virtual (rather than actual) version of a resource, such as an OS, a server, a storage device, or network resources.
    • Example: Running a Windows OS as a Virtual Machine (VM) on a Linux host computer using software like VMware or VirtualBox.
  5. Explain the difference between 32-bit and 64-bit architecture.
    • Answer: A 64-bit system can process larger amounts of data and utilize far more RAM (up to 18 Exabytes) than a 32-bit system (limited to about 4 GB).
    • Example: Most modern processors and operating systems are 64-bit for performance.
  6. What is an SSD and why is it better than an HDD?
    • Answer: An SSD (Solid State Drive) stores data on flash memory chips with no moving parts. It is faster, more durable, and consumes less power than an HDD (Hard Disk Drive), which uses spinning magnetic platters.
    • Example: A PC with an SSD can boot up in seconds, whereas an HDD may take over a minute.
  7. What is the purpose of a Motherboard?
    • Answer: The main printed circuit board in a general-purpose computer that connects all the other components and peripherals.
    • Example: It houses the CPU socket, RAM slots, and expansion slots (like PCIe).
  8. What is BIOS/UEFI?
    • Answer: BIOS (Basic Input/Output System) and its modern replacement, UEFI (Unified Extensible Firmware Interface), are the firmware interfaces that initialize and test system hardware components and load the OS.
    • Example: The first screen you see after pressing the power button is controlled by the BIOS/UEFI.
  9. What is a Device Driver?
    • Answer: A special type of software program that controls a particular type of device that is attached to a computer.
    • Example: The software allowing your OS to communicate with your graphics card or printer.
  10. Explain RAID (Redundant Array of Independent Disks).
    • Answer: A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for data redundancy and performance improvement.
    • Example: RAID 1 (Mirroring) duplicates data across two disks; RAID 5 stripes data and parity across three or more disks.
  11. What is a Logical Drive or Partition?
    • Answer: A logical division of a physical storage drive, allowing the OS to treat each section as a separate disk.
    • Example: A single SSD divided into a C: drive (OS) and a D: drive (Data).
  12. What is an interrupt?
    • Answer: A signal from hardware or software to the CPU indicating that an event has occurred that requires immediate attention.
    • Example: When you press a key, the keyboard sends an interrupt to the CPU.
  13. What is power cycling?
    • Answer: The process of completely shutting down a device and then turning it back on. It is often the first step in troubleshooting many IT issues.
    • Example: Unplugging a router, waiting 10 seconds, and plugging it back in.
  14. What is the difference between a client and a server?
    • Answer: A Client is a machine or process that requests a service. A Server is a machine or process that provides a service.
    • Example: Your web browser is a client requesting a webpage from a web server.
  15. What is SAN vs. NAS storage?
    • Answer: SAN (Storage Area Network) is a dedicated high-speed network for block-level storage (like local disk). NAS (Network Attached Storage) is a file-level storage device connected to a network.
    • Example: SAN is used for high-performance virtual machine storage; NAS is used for shared office document storage.
  16. What is the cloud?
    • Answer: A network of remote servers hosted on the Internet and used to store, manage, and process data, rather than a local server or personal computer.
    • Example: Google Cloud Platform (GCP), Amazon Web Services (AWS), Microsoft Azure.
  17. What is IaaS, PaaS, and SaaS?
    • Answer: Three main cloud service models:
      • IaaS (Infrastructure as a Service): Provides raw compute resources (VMs, storage).
      • PaaS (Platform as a Service): Provides a runtime environment for developing and deploying apps.
      • SaaS (Software as a Service): Provides ready-to-use software applications over the internet.
    • Example: IaaS: AWS EC2; PaaS: Heroku; SaaS: Gmail, Salesforce.
  18. What is virtualization hypervisor?
    • Answer: A layer of software or firmware that creates and runs virtual machines.
    • Example: Type 1 (Bare-Metal): VMware ESXi; Type 2 (Hosted): VirtualBox.
  19. What is containerization?
    • Answer: A lightweight form of virtualization that packages an application with all its dependencies into a self-contained unit (container) for consistent execution.
    • Example: Using Docker to ensure an application runs the same way on a developer’s laptop and a production server.
  20. What is a patch or hotfix?
    • Answer: A small piece of software designed to fix a bug or security vulnerability, usually released quickly outside of a standard update cycle.
    • Example: An emergency patch released to close a zero-day security vulnerability in an OS.
  21. What is a repository (in IT)?
    • Answer: A central location for storing software packages, files, or versions of code.
    • Example: A Git repository for source code, or a Debian repository for software packages.
  22. What is firmware?
    • Answer: A permanent software program embedded into a hardware device to provide low-level control over the device’s specific hardware.
    • Example: The code running on your printer, router, or smartphone’s modem.
  23. What is redundancy?
    • Answer: The duplication of critical components or functions of a system to increase reliability and availability, so that if one fails, the other can take over.
    • Example: Using two power supplies in a server (one is redundant backup).
  24. What is a UPS?
    • Answer: A Uninterruptible Power Supply provides backup power when the regular power source fails, allowing a computer to safely shut down or continue operating for a short period.
    • Example: A battery backup unit that keeps servers running during a brief power outage.
  25. What is the difference between an update and an upgrade?
    • Answer: An Update (or patch) provides minor bug fixes, security enhancements, or small feature additions to existing software. An Upgrade involves moving to a completely new version of the software, often requiring a new license.
    • Example: Moving from Windows 10 to Windows 10.1 is an update; moving from Windows 10 to Windows 11 is an upgrade.

Section 2: Networking and Communication (Questions 26-55)

Networking questions are universally common, covering connectivity, protocols, and addressing.

  1. What is an IP address?
    • Answer: A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
    • Example: IPv4: 192.168.1.1; IPv6: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
  2. What is the difference between a Private IP and a Public IP?
    • Answer: Private IPs are addresses used within a local network (not routable on the internet). Public IPs are globally unique addresses used for devices communicating over the internet.
    • Example: 192.168.x.x is a Private IP; the IP address your ISP assigns to your router is the Public IP.
  3. What is the purpose of a Router?
    • Answer: A device that forwards data packets between computer networks, connecting disparate networks together (e.g., your home network to the internet).
    • Example: A Cisco device directing traffic between a corporate LAN and the WAN.
  4. What is a Switch (Networking)?
    • Answer: A network device that connects devices in a network (LAN). It uses MAC addresses to intelligently forward data only to the intended recipient.
    • Example: An 8-port Ethernet switch connecting computers in an office cubicle.
  5. What is the OSI Model?
    • Answer: The Open Systems Interconnection model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
    • Example: The Application Layer (Layer 7) is where protocols like HTTP operate.
  6. What are the 7 Layers of the OSI Model?
    • Answer: 7. Application, 6. Presentation, 5. Session, 4. Transport, 3. Network, 2. Data Link, 1. Physical.
    • Mnemonic: Please Do Not Touch Steve’s Pet Alligator.
  7. What are the two main protocols in the Transport Layer (Layer 4)?
    • Answer: TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  8. Difference between TCP and UDP?
    • Answer: TCP is connection-oriented and reliable (guarantees delivery). UDP is connectionless and unreliable (faster, but may drop packets).
    • Example: TCP for web browsing (HTTP); UDP for video streaming or online gaming.
  9. What is DNS (Domain Name System)?
    • Answer: A hierarchical and decentralized naming system that translates human-readable domain names into numerical IP addresses.
    • Example: Translating www.google.com into an IP address.
  10. What is DHCP (Dynamic Host Configuration Protocol)?
    • Answer: A network protocol used to automatically assign IP addresses and other network parameters (like the subnet mask and default gateway) to devices on a network.
    • Example: When your laptop joins a coffee shop’s WiFi, DHCP automatically gives it a temporary IP address.
  11. What is NAT (Network Address Translation)?
    • Answer: A method of remapping an IP address space into another, allowing multiple devices on a private network to share a single public IP address.
    • Example: Your home router uses NAT so all your devices can access the internet using one public IP.
  12. What is a Subnet Mask?
    • Answer: A 32-bit number that divides an IP address into network and host portions, determining which part of the address is used for routing and which for local addressing.
    • Example: 255.255.255.0 is a common subnet mask.
  13. What is the Default Gateway?
    • Answer: The node (usually the router) on a network that serves as an access point to other networks, most commonly the internet.
    • Example: The IP address of your router, typically 192.168.1.1.
  14. What is a MAC address?
    • Answer: A Media Access Control address is a unique, physical identifier assigned to a network interface controller (NIC), operating at the Data Link layer (Layer 2).
    • Example: 00:1A:2B:3C:4D:5E.
  15. What is a Firewall?
    • Answer: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
    • Example: Blocking all incoming traffic on port 22 (SSH) except from specific admin IPs.
  16. What is latency?
    • Answer: The time delay required for a data packet to travel from one point to another in a network. Often measured in milliseconds (ms).
    • Example: High latency (e.g., 200ms) causes noticeable lag in video calls or online games.
  17. What is bandwidth?
    • Answer: The maximum rate of data transfer across a given path, usually measured in bits per second (bps) or megabits per second (Mbps).
    • Example: Your internet plan might offer 100 Mbps of bandwidth.
  18. What is a VPN?
    • Answer: A Virtual Private Network creates a secure, encrypted connection (tunnel) over a public network (like the internet), allowing remote users to access a private network.
    • Example: Employees using a VPN to securely access company files from home.
  19. What is PoE?
    • Answer: Power over Ethernet is a technology that passes electrical power along with data on Ethernet cabling.
    • Example: Using a single Ethernet cable to power an office VoIP phone or a security camera.
  20. What are the standard ports for HTTP, HTTPS, and SSH?
    • Answer: HTTP uses port 80; HTTPS uses port 443; SSH uses port 22.
  21. What is the difference between a collision domain and a broadcast domain?
    • Answer: A Collision Domain is a network segment where only one device can transmit at a time without colliding (common in old hubs). A Broadcast Domain is a set of devices that receive all broadcast packets (separated by routers, not switches).
    • Example: A switch segments a collision domain; a router segments a broadcast domain.
  22. What is VLAN?
    • Answer: A Virtual Local Area Network is a logical grouping of network devices that are physically connected to different switches, allowing them to communicate as if they were on the same network.
    • Example: Separating the Marketing department’s traffic from the Finance department’s traffic on the same physical switch infrastructure.
  23. What is QoS?
    • Answer: Quality of Service refers to technologies that manage network traffic to ensure that certain applications or services get the bandwidth and low latency they need.
    • Example: Prioritizing VoIP (voice calls) traffic over file transfer traffic.
  24. What is Port Forwarding?
    • Answer: A network application that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway.
    • Example: Configuring a router to send all traffic arriving on port 80 to a specific local web server.
  25. What is the command to check your network configuration in Windows and Linux/macOS?
    • Answer: Windows: ipconfig; Linux/macOS: ifconfig or ip a.
  26. What is ARP (Address Resolution Protocol)?
    • Answer: A protocol used by the Internet Protocol (IP) to map IP network addresses to the hardware (MAC) addresses.
    • Example: Finding the MAC address of a device on the local network when only its IP is known.
  27. What is DHCP lease time?
    • Answer: The amount of time that a client device is allowed to keep the IP address assigned by the DHCP server. After the lease expires, the client must request a renewal.
    • Example: A short lease time (e.g., 1 hour) is often used in public hotspots; a longer lease time (e.g., 8 days) is common in stable office networks.
  28. How do you troubleshoot a “No Internet Access” issue?
    • Answer: Start by checking the physical connection, confirming the IP/subnet/gateway via ipconfig, testing connectivity with ping to the gateway, and then testing external DNS resolution with nslookup.
    • Example: Pinging the gateway (192.168.1.1) to check local network connectivity.
  29. What is the difference between a cable modem and a DSL modem?
    • Answer: A Cable Modem uses the coaxial cable infrastructure (like cable TV). A DSL Modem uses standard copper telephone lines.
    • Example: Spectrum (cable) vs. AT&T U-verse (DSL).
  30. What is PoE+ (802.3at)?
    • Answer: An evolution of PoE that provides higher power (up to 25.5W to the device), allowing it to power devices like pan-tilt-zoom (PTZ) security cameras and thin clients.
    • Example: Powering a powerful wireless access point in a large venue.

Section 3: Security and Data Management (Questions 56-80)

Security is an escalating priority in IT. These questions cover key concepts in protecting data and infrastructure.

  1. What is encryption?
    • Answer: The process of converting information or data into a code (ciphertext) to prevent unauthorized access.
    • Example: Using AES-256 to secure files on a laptop.
  2. Difference between Symmetric and Asymmetric Encryption?
    • Answer: Symmetric: Uses a single, secret key for both encryption and decryption (faster). Asymmetric (Public Key): Uses a public key for encryption and a private key for decryption (more secure for initial exchange).
    • Example: Symmetric: AES; Asymmetric: RSA, used in HTTPS.
  3. What is a hash function (hashing)?
    • Answer: A mathematical algorithm that converts an input (or key) into a fixed size output (hash value). It’s a one-way process, primarily used for verifying integrity and storing passwords.
    • Example: Running a file through SHA-256 to ensure the download wasn’t corrupted or tampered with.
  4. What is MFA (Multi-Factor Authentication)?
    • Answer: A security process where a user is only granted access after successfully presenting two or more pieces of evidence (factors) to an authentication mechanism.
    • Factors: Something you know (password), something you have (phone/token), something you are (fingerprint).
  5. What is Phishing?
    • Answer: A social engineering attack where a malicious actor masquerades as a legitimate entity to trick a victim into giving up sensitive information, often via email.
    • Example: An email appearing to be from your bank asking you to click a link to “verify your account details.”
  6. What is a DDoS attack?
    • Answer: A Distributed Denial of Service attack where multiple compromised computer systems attack a single target, causing a Denial of Service (DoS) for users of the targeted system.
    • Example: A coordinated flood of simultaneous requests overwhelming a retail website during a sale.
  7. What is a Worm vs. a Virus?
    • Answer: A Virus requires a host program or human action to spread (e.g., running an infected executable). A Worm is a standalone, self-replicating malicious program that spreads automatically over a network.
    • Example: A virus attaches itself to an application; a worm scans the network for vulnerable machines to infect.
  8. What is a digital certificate?
    • Answer: An electronic document used to prove the ownership of a public key. It is used in HTTPS to verify the identity of a website to a client.
    • Example: The padlock icon in your browser confirms the site’s SSL/TLS certificate is valid.
  9. What is a SIEM system?
    • Answer: Security Information and Event Management is software that aggregates and analyzes log data and event information from various network devices to detect and analyze security threats in real-time.
    • Example: Using Splunk or Microsoft Sentinel to correlate failed login attempts across multiple servers.
  10. What is a Zero-Day Vulnerability?
    • Answer: A security flaw that is unknown to the vendor (the “zero-day” of knowledge) and for which no patch or fix exists, leaving the system highly vulnerable.
    • Example: A newly discovered flaw in a browser that hackers are already exploiting.
  11. What is Least Privilege?
    • Answer: A core security principle that dictates that a user or process should only have the bare minimum permissions necessary to perform its job or function, nothing more.
    • Example: A standard office user should not have administrator rights to install new software.
  12. What is SQL Injection?
    • Answer: A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
    • Example: Entering ' OR '1'='1 into a login field to bypass authentication.
  13. What is a Backup?
    • Answer: A copy of data that can be used to restore the original data after a data loss event.
    • Example: Using Veeam or Windows Backup to save critical server data nightly.
  14. What is the 3-2-1 Backup Rule?
    • Answer: A data backup strategy recommending 3 copies of your data, on 2 different media types, with 1 copy off-site.
    • Example: Original data on server + copy on external HDD + copy on the cloud.
  15. What is a disaster recovery plan (DRP)?
    • Answer: A document that outlines the procedures an organization will follow to respond to a major incident (natural disaster, cyberattack, etc.) and restore business-critical IT systems.
    • Example: The steps to failover production servers to a geographically distant secondary data center.
  16. What is a DLP solution?
    • Answer: Data Loss Prevention is a set of tools and processes designed to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
    • Example: Blocking an employee from emailing a file containing credit card numbers outside the company.
  17. What is a Security Audit?
    • Answer: A systematic evaluation of a company’s information systems by measuring how well they conform to a set of established criteria (e.g., security policies, industry best practices).
    • Example: A third-party firm testing a website for compliance with the PCI DSS standard.
  18. What is vulnerability scanning?
    • Answer: The process of inspecting the software, network, and systems for known weaknesses and misconfigurations that could be exploited by an attacker.
    • Example: Running a Nessus scanner against all network servers monthly.
  19. What is a sandbox (security)?
    • Answer: A security mechanism for separating running programs, usually to execute untested or untrusted code from a malicious source.
    • Example: Opening an unknown email attachment in a restricted virtual environment to see if it contains malware.
  20. What is shoulder surfing?
    • Answer: A type of social engineering where a person gains private information by looking over the victim’s shoulder.
    • Example: Someone watching you type your password at an ATM or airport counter.
  21. What is the principle of Least Privilege?
    • Answer: A security concept requiring that users be granted only the minimum access rights necessary to perform their work.
    • Example: A standard user should only be able to read and write files in their own home directory, not critical system folders.
  22. What is two-factor authentication (2FA)?
    • Answer: A specific type of MFA that requires two different methods of verification from two different categories.
    • Example: Entering a password (knowledge) and a code sent to your phone (possession).
  23. What is a honeypot?
    • Answer: A network-attached system set up as a decoy to attract cyberattacks and computer criminals, thereby diverting them from a legitimate network and allowing monitoring of their activities.
    • Example: Setting up a server with tempting file names and weak passwords to study attacker behavior.
  24. What is key management?
    • Answer: The set of practices and technologies for generating, storing, protecting, rotating, and revoking cryptographic keys.
    • Example: Using AWS KMS (Key Management Service) to handle and protect encryption keys used for database security.
  25. What is the goal of Patch Management?
    • Answer: A process of managing a network of computers by regularly checking for and applying software updates, to fix known security vulnerabilities and bugs.
    • Example: Using Microsoft WSUS or a similar tool to push OS updates to all company workstations overnight.

Section 4: Troubleshooting and Processes (Questions 81-100)

These questions focus on the day-to-day skills needed to maintain and manage IT systems.

  1. What is a ticketing system (Help Desk)?
    • Answer: Software used to manage and track customer/employee requests, technical issues, and IT incidents from submission to resolution.
    • Example: Zendesk, ServiceNow, or Jira Service Management.
  2. What is the first step in the troubleshooting process?
    • Answer: Identify the problem—gathering information from the user, determining symptoms, and asking relevant questions to replicate the issue.
    • Example: Asking, “What were you doing when the computer crashed?”
  3. What is a Root Cause Analysis (RCA)?
    • Answer: A structured process for identifying the underlying causes of a problem or incident, rather than just treating the symptoms.
    • Example: Determining that a server crash wasn’t just a hardware failure, but a failure due to an unpatched OS vulnerability exploited by malware.
  4. What is the command to check network connectivity?
    • Answer: The ping command, which sends an Internet Control Message Protocol (ICMP) echo request to a host and waits for a response.
    • Example: ping 8.8.8.8 (to check connectivity to Google’s DNS server).
  5. What is the command to view DNS cache or force a refresh?
    • Answer: ipconfig /displaydns (view) and ipconfig /flushdns (refresh) in Windows.
    • Example: Running /flushdns after changing the IP address of a local server.
  6. What is the function of tracert or traceroute?
    • Answer: A command-line utility that tracks the path (hops) that a packet takes from a source computer to a destination host, helping identify where latency or failure occurs.
    • Example: Running tracert google.com to see which router is causing a delay.
  7. What is a hot-swappable component?
    • Answer: A device or component that can be added or removed from a system while the system is running and without causing an interruption of service.
    • Example: Server hard drives or redundant power supplies.
  8. What is a rollback?
    • Answer: The process of restoring a system or application to a previous stable state after a failed update, upgrade, or deployment.
    • Example: Reverting to the previous version of a database or application code after a bug is discovered in the new release.
  9. What is a knowledge base (KB)?
    • Answer: A centralized repository for storing information, documentation, and troubleshooting steps that IT staff and users can access.
    • Example: A collection of articles on “How to set up VPN access” or “Fix common printer errors.”
  10. What is the difference between an Incident and a Problem (ITIL)?
    • Answer: An Incident is an unplanned interruption to an IT service or a reduction in the quality of an IT service (e.g., “The server is down”). A Problem is the unknown root cause of one or more incidents (e.g., “The buggy application code is causing the server to crash every Friday”).
  11. What is the purpose of a change control process?
    • Answer: A formal process used to ensure that changes to IT systems are controlled, documented, tested, and implemented in a standard, predictable manner to minimize disruption.
    • Example: Requiring approval and a rollback plan before applying a major OS update to a production server.
  12. What is escalation (Help Desk)?
    • Answer: The process of transferring an incident to a higher level of support (Tier 2, Tier 3, or specialized team) when the current support level cannot resolve it.
    • Example: A Tier 1 technician escalating a complex network configuration issue to a network engineer.
  13. What are event logs?
    • Answer: Files that record significant events on a system, such as hardware failures, application errors, security incidents, and routine system operations.
    • Example: Checking the Windows Event Viewer or Linux /var/log directory after an application crash.
  14. How do you check a server’s resource utilization (CPU/Memory)?
    • Answer: Windows: Task Manager or Performance Monitor; Linux/macOS: top or htop command-line utilities.
  15. What is port scanning?
    • Answer: An application designed to probe a server or host for open ports, often used by network administrators to verify security policies and by attackers to find vulnerabilities.
    • Example: Using Nmap to check which TCP ports are accessible from the internet.
  16. What is a digital footprint?
    • Answer: The trail of data that a user leaves behind while interacting with digital systems.
    • Example: Your social media posts, search history, and recorded location data.
  17. What is the command to create a directory in Linux/macOS?
    • Answer: The mkdir (make directory) command.
    • Example: mkdir documents/new_folder.
  18. What is a system image?
    • Answer: A snapshot or identical copy of the entire state of a computer system, including the OS, installed software, and user data, usually for backup or deployment purposes.
    • Example: Using a system image to quickly deploy a standardized set of software to 50 new employee laptops.
  19. What is a S.M.A.R.T. status check?
    • Answer: Self-Monitoring, Analysis and Reporting Technology is a monitoring system included in computer hard drives (HDDs and SSDs) that detects and reports on various indicators of drive reliability, aiming to anticipate hardware failures.
    • Example: A “Caution” SMART status can warn an admin to back up data before a drive fails completely.
  20. What is the ITIL framework? * Answer: Information Technology Infrastructure Library is a set of best practices for IT Service Management (ITSM), focusing on aligning IT services with the needs of the business. * Example: Using ITIL’s guidelines for managing Incidents, Problems, and Changes in an organization.

Leave a Reply

Your email address will not be published. Required fields are marked *