3.1 3.2 3.3 3.4 3.5 Flashcards

1
Q

An IT support technician needs to know how to recognize that a system is infected.

A

Step 1: Identifying and Researching Malware Symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

are small windows or dialog boxes that suddenly appear on top of a website’s content when you visit a web page. These windows typically contain advertisements, promotions, or other marketing messages.used by advertisers to capture the user’s attention and promote their products or services

A

Pop-up ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Browser redirection occurs when you are redirected from the webpage you intended to visit to a different webpage

A

Browser Redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When the user tries to run Windows Defender (anti-malware software embedded in Windows 10), it refuses to run. She opens the Action Center to find that Defender has been disabled because other antivirus software she did not install is running.

A

Rogue antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Generally, the system works much slower than before. Programs take
longer than normal to load. Strange or bizarre error messages appear. Programs that once worked now
give errors. Task Manager shows unfamiliar processes running. The computer’s operating system___

A

Lock up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These types of problems seem to plague the system with no reasonable explanation that is specific to the network, application, or Windows update.

A

Internet connectivity issues, application crashes, and OS update failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Administrative Events logs in Event Viewer report system and application errors, system crashes, application crashes, and failed OS updates.

A

System and application log errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File names now have weird characters or their file sizes seem excessively large. Executable files have changed size or file extensions change without reason. Files mysteriously disappear or appear. Windows system files are renamed. Files constantly become corrupted. Files you could once access now give access-denied messages, and file permissions change.

A

Problems with files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You receive email messages from other users saying you have sent someone spam or an infected message, or you receive automated replies indicating you sent email you didn’t know about. This type of attack indicates that your email address or email client software on your computer has been ___. Extra spam you’re not accustomed to seeing shows up.

A

hijacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Even though you can browse to other websites, you cannot access anti-malware software sites such as symantec.com or mcafee.com, and you cannot update
your anti-malware software.
Invalid digital certificates. An

A

Problems updating your anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An OS is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by __

A

Certificate
Authorities (CAs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft’s trusted ____, which is downloaded to the computer. The download happens seamlessly without the user’s knowledge unless there’s a problem. If Windows cannot obtain the ____ to validate the email or website, it displays an error

A

root certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You can use the ___to view and delete root certificates

A

Certificate Manager (certmgr.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an infected computer is connected to a wired or wireless network, immediately disconnect
the network cable or turn off the wireless adapter. You don’t want to spread a virus or worm
to other computers on your network.

A

Step 2: Quarantining an Infected System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ is not allowed to use the regular
network that other computers use. If you need to use the Internet to download anti-malware
software or its updates, take some precautions first. Consider your options. Can you disconnect other
computers from the network while the infected computer is connected? Can you isolate the computer from
your local network and connect it directly to the ISP or a special quarantined network? If neither option is
possible, try downloading the anti-malware software updates while the computer is booted into Safe Mode
with Networking or after a clean boot. (Safe Mode doesn’t always allow downloads.) Malware might still
be running in Safe Mode or after a clean boot, but it’s less likely to do so than when the system is started
normally.
Always keep in mind that data on the hard drive might not be backed up. Before you begin cleaning up
the system, back up data to another media.

A

quarantined computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In Windows, some malware hides its program files in restore points stored in the System Volume Information folder that’s maintained by System Protection. If System Protection is on, anti-malware software can’t clean this protected folder. To get rid of the malware,____System Protection so that anti-malware software can clean the System Volume Information folder

A

turn off / Step 3: Disabling System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Before selecting anti-malware software, read reviews and check out reliable web sites that rate anti-malware software
When An Infected Computer Will Not Boot:
- The boot manager, boot loader, or kernel mode drivers might be infected or damaged
-Launch the computer into Windows Recovery Environment (Windows RE)
- Use the Startup Repair process to repair the system
-Update and Run Anti-Malware Software Already Installed
-Update software and perform a full scan
-Run Anti-Malware Software from a Networked Computer
-Install and Run Anti-Malware Software on the Infected Computer
-Install and Run Anti-Malware Software in Safe Mode
-Run An Anti-Malware Scan Before Windows Boot
-Run More Than One Scan of Anti-Malware Software

A

Step 4: Remediating the Infected System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

-Clean Up What’s Left Over
Respond to any startup errors
Research malware types and program files
Delete files
Clean the registry
Clean up your browsers and uninstall unwanted programs

A

Step 4: Remediating the Infected System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Once your system is clean, you want to keep it clean

Three best practices to protect a system against malware:
-Use anti-malware software
-Always use a software firewall
-Keep Windows updates current

A

Step 5: Protecting the System With Scheduled Scans and Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Once the system is clean:
-Turn System Protection back on if necessary
-Create a restore point

A

Step 6: Enabling System Protection and Creating a Restore Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Go over with the user some tips presented earlier in this chapter to keep the system free from malware
Even with all your security measures in place:
A user can still download and execute a Trojan, which can install more malware in the system

A

Step 7: Educating the End User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

-Startup and shutdown _________
* Bad hardware, bad drivers, bad application

  • Use Last Known Good, System Restore, or Rollback Driver

if you think your problem is related to recent change to the system
* Try Safe mode

  • Re-seat or remove the hardware
  • If possible
    hardware maybe lose connection.
    For example,
    Memory sticks and Hard drives
  • Run hardware diagnostics
  • Provided by the manufacturer
  • BIOS may have hardware diagnostics
A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Proprietary crash screens such as the Windows STOP error ___ can be caused by operating system, application, or
hardware errors.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If Windows is configured to reboot when a STOP error occurs, the system will continuously reboot until the error is resolved. To leave a STOP error message onscreen until you decide to restart the system, clear the Automatically Restart check box in the System Failure setting in the Startup and Recovery section of Advanced System Properties. This is accessed via Control Panel > System > Advanced System settings.
Under Startup and Recovery, select Settings.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Regardless of when a _____ error occurs, your system is halted by default. If the computer does not restart on its own, you must turn off
the system and turn it back on. Before you do that, however, record the error message text and other information so that you can research the
problem if it reoccurs.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The symptom of ___ Incompatible or defective hardware or software:

Solution :
Start the system in Safe Mode and uninstall the last hardware or software installed. Acquire updates before you reinstall the hardware or software. Exchange or test memory. Run SFC/scannow to check for problems

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The symptom of ___ Registry problems:

Solution :

System Restore can also be used to revert the system and registry to an earlier state.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The symptom of ___Viruses:
Solution :
Scan for viruses and remove any that are discovered.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The symptom of ___ Miscellaneous causes:

Solution :
Check the Windows Event Viewer and also check the system log. Research the BSOD with the Microsoft Support website.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Researching ___Causes and Solutions To determine the exact cause of a STOP error, note the number or name of the error (for example, “STOP 0x0000007B, HAL INITIALIZATION FAILED”) and look it up at the Microsoft support website: https://support.microsoft.com. When you search for the error, be sure to specify the version of Windows in use.

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

System is not configured for maximum performance

solution
To solve this problem, set the Power setting to High Performance using the Power options icon in the notification area or the Power options in the Control Panel. This option is not available on tablets.

A

Sluggish Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Drive containing paging file and temporary files is nearly full or badly fragmented

Solution:
Use Disk Cleanup in the drive properties to remove unwanted files, check the drive for errors, and defragment the drive. If you have more available space on a different drive, use the Advanced tab in the system properties to change the location of the paging file and temp files.

A

Sluggish Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

System is overheating and CPU is running at reduced speed

Solution: Remove dust and dirt on the CPU and system fans. Check for adequate airflow through the system. Change back to the Balanced power setting.

A

Sluggish Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Memory is running low

Solution: Add RAM; this fixes many performance problems. For better performance, exceed the minimums recommended for the version of Windows in use.

A

Sluggish Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Sudden performance drop occurs

Solution: Check for viruses and malware; this is especially important if performance has suddenly plunged.

A

Sluggish Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Registry error messages appear
Solution:
The program CCleaner is widely used for this task.

A

Sluggish Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

____ such as failure to boot can be caused by several issues, including incorrect boot order configuration in the BIOS/UEFI, corrupt or missing boot files, missing driver files, or even a failing CMOS battery.

A

Boot problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The symptom of ___ bootmgr is missing

Solution:

1) Boot to the System Recovery options and select the Startup Repair option. This should automatically repair the system and require you to
reboot. To access the options in Windows 10, locate the Advanced Startup Settings menu.

2)Boot to the System Recovery options and select the Command Prompt option. Type the bootrec /fixboot command

A

Boot problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This command repairs or replaces the Master Boot Record (MBR) of the system partition. The MBR is a critical component of the boot process and contains information about how the operating system is loaded.

A

bootrec /fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This command writes a new boot sector to the system partition. The boot sector contains code that helps the computer locate the operating system.

A

bootrec /fixboot

41
Q

: This command scans the system for installations of Windows and displays them. It’s useful for identifying Windows installations that may not be properly recognized in the boot configuration.

A

bootrec /scanos

42
Q

: This command rebuilds the Boot Configuration Data (BCD) store. The BCD contains information about how the operating system is configured to boot. When you run this command, it will prompt you to add any Windows installations found during the /scanos step to the BCD store.

A

bootrec /rebuildbcd

43
Q

Continuous reboots can be caused by problems with the power supply or by a Windows or other operating system configuration setting:

When the Power Good line to the motherboard carries a voltage that is too high or too low, the processor resets, shutting down the system and
rebooting it. Test the power supply voltage levels; replace the power supply if Power Good tests out of specifications.

Intermittent failures of other USB external devices or of internal devices can be caused by damaged data cables, power supplies or connectors, or
ports.

A

Frequent Shutdowns

44
Q

To troubleshoot ___these problems, follow these steps:
Step 1. Shut down the device (and the computer, if the device is internal) and replace the data cable with a known-working replacement. If a USB device is plugged into a front-mounted USB port or a USB port on a card bracket, check the USB header cable connections to the motherboard.

Step 2. Turn on the device or computer.

Step 3. Test the device over time. If the device works correctly, the problem is solved.

Step 4. If steps 1–3 did not resolve the problem, use the original data cable and try plugging it into a different internal or external port. Repeat steps 2–3.

Step 5. Try steps 1–4 again, but this time use a replacement power connector or AC adapter. Step 6. When you find the defective component, the problem will stop. If the problem is not resolved with different data cables, connectors, or power supplies/AC adapters, the device itself needs to be replaced.

A

Frequent Shutdowns

45
Q

Remember that services are the numerous background applications running in Windows that perform the minor tasks that keep Windows 10 running. Dozens of services run in Windows 10, including even more extended services that support the Windows services. From time to time, one of these services might fail to load when booting. One common reason is that so many services are running that a non-Windows service interrupts a Windows service during the boot process. To view the available services, go to the Run command box (Windows+R) and type services.msc.

A

Services Not Starting

46
Q

Applications can misbehave or crash for a variety of reasons. Applications are written to work with operating system software, and well-written applications rarely have problems in that environment. Keep in mind, however, that OS software is constantly being updated for security and other reasons, and usually a lag occurs between the OS and application revisions. During that update lag, many possibilities can go wrong.

A

Application Crashes

47
Q

“Your computer is low on memory,” the likely cause is that not enough memory resources exist for all the tasks the computer is trying to perform.

Troubleshooting

The first step in addressing this warning is to visit the Task Manager and see where the resources are being allotted. If unused or unnecessary applications are open and are demanding memory space and CPU time, shut them down so that you can free up resources. As applications are closed, more memory becomes available. If an unrecognized app is using memory, research the app or service to see if it is necessary. If no information is available, scanning for a virus or malware is a good idea.

A

Low Memory Warnings

48
Q

In Windows, the term used for virtual memory is often

A

page file

49
Q

The warning “Not Enough ____” indicates that too many USB devices (or, more likely hubs) are trying to access a limited number of endpoints in the USB controller. This is more common with USB 3.0 devices than USB 2.0 devices because, in greatly simplified terms, USB 3.0 can demand more resources.

Solution :

Disconnect unnecessary hubs or devices from the computer to free up endpoints in the controller.

If possible, move some devices or external hubs from USB 3.0 to USB 2.0 ports (or simply use a USB 2.0 cable from the computer to a USB
hub). This should free up some access to the controller.

Add a USB host controller in a PCIe slot.

Reinstall the Universal Serial Bus Host Controllers.

A

USB Controller Resources

50
Q

To troubleshoot __problems, follow these steps:

Step 1. Shut down the device (and the computer, if the device is internal) and replace the data cable with a known-working replacement. If a USB device is plugged into a front-mounted USB port or a USB port on a card bracket, check the USB header cable connections to the motherboard.

Step 2. Turn on the device or computer.
Step 3. Test the device over time. If the device works correctly, the problem is solved.

Step 4. If steps 1–3 did not resolve the problem, use the original data cable and try plugging it into a different internal or external port. Repeat steps 2–3.

Step 5. Try steps 1–4 again, but this time use a replacement power connector or AC adapter.

Step 6. When you find the defective component, the problem will stop. If the problem is not resolved with different data cables, connectors, or power supplies/AC adapters, the device itself needs to be replaced.

A

USB

51
Q

is a broad term that refers to the condition where a computer system, including its hardware and software components, is experiencing problems that result in erratic or unpredictable behavior. It often manifests as crashes, freezes, error messages, and overall poor performance

A

System Instability

51
Q

Symptoms of _____

Hardware Issues:
Faulty or failing hardware components, such as a malfunctioning RAM module, a failing hard drive, overheating CPU or GPU, or a defective power supply, can lead to system instability.

Software Problems:
Incompatible or outdated device drivers, operating system updates, or software applications can cause instability. Bugs, glitches, and conflicts in software can result in crashes or erratic behavior.

Malware and Viruses:
Malicious software can compromise system stability by causing damage to system files, stealing resources, or engaging in other disruptive activities. Regularly updating and using antivirus software is essential to protect against malware.

Overheating:
When a computer’s components, such as the CPU or GPU, become too hot, it can lead to system instability. Overheating can be caused by poor ventilation, dust buildup, or a malfunctioning cooling system.

Insufficient Resources:
Running resource-intensive applications on a system with limited RAM or processing power can result in system instability. In such cases, the system may become slow or unresponsive.

Corrupted System Files:
Corrupted or missing system files critical to the operating system’s functioning can lead to instability. These files may become damaged due to software errors, hardware issues, or malware.

Driver Problems:
Incompatible, outdated, or corrupt device drivers for components like graphics cards, network adapters, or audio devices can cause system crashes and instability.

Software Conflicts:
When two or more software applications or drivers conflict with each other, it can result in system instability. This can happen when different software components try to access the same resources simultaneously.

A

System Instability

52
Q

If an operating system cannot be located, boot into the BIOS/UEFI and check that the computer is looking in the correct place for the OS. The drive hosting the OS should be in the first option to boot. Loose cables are another common problem that can cause a boot to fail. If the boot option settings are correct in the BIOS/UEFI, check the cables; sometimes cables look connected but are not seated properly.

Resetting the BIOS/UEFI is also an option. The BIOS?UEFI menu has options for restoring defaults.

A

No OS found

53
Q

-Can’t find operating system
* OS missing
-Boot loader replaced or changed
* Multiple OSes installed (dual boot)

A

No OS found

54
Q
  • Roaming user profile
  • Your desktop follows you to any computer
  • Changes are synchronized

(It stores all of your local configuration and synchronize them on centralized server. That means no matter where you log in, you get your desktop on the screen )

This is requires that during the login process,all your profile information is downloaded onto the local computer.

-Network latency to the domain controller
* Slows login script transfers
(slow down signing in to the desktop)
* Slow to apply computer and user policies
* May require many hundreds (or thousands) of LDAP queries
-Client workstation picks a remote domain controller
instead of local DC
* Problems with local infrastructure

A

Slow Profile load

55
Q

A user profile contains personalized settings for devices such as the mouse and keyboard, Windows-based applications, and desktop files and settings.
Sometimes a user notices that one profile loads much more slowly than other profiles.

One reason for a ____is that many large files and folders Slow Profile loadare stored on the desktop and need to be loaded as part of the profile.
Storing these large files in My Computer or another drive reduces the load
time.

A

Slow Profile load

56
Q

To check the size of a user profile, use the Run dialog box or the search tool
and enter __. This brings up the System Properties menu

A

sysdm.cpl

57
Q

occurs when the clock for one computer or server does not agree with the clocks of other computers it interacts with. This can cause several
issues that can be hard to detect.

For example, event logs used to troubleshoot can have the wrong time stamps, and other computers or
servers, both local or on the Web, can experience secure transaction issues or authentication issues.

The easy fix here is to set a computer’s time to align with the time used by the National Institute of Standards and Technology (NIST), found at www.time.gov. This site even provides a calculation of the difference between the device’s clock and the NIST time. Use this clock to reset the time on the computer.

A computer network should have all its devices running on the same time. This can be done by establishing a clock server in a network and running NTP (the Network Time Protocol) on all devices.

Time settings, as well as the option to manually synchronize the clock, are found under Settings > System > Date & Time, as Figure 8-6 shows. Note
that, in the example, the source for the time setting is the server located at http://time.windows.com.

A

Time drift

58
Q

Rebooting is always a good first step, especially if the device has been running for an extended time.

A

Reboot

59
Q

: From the Run menu, type either servces.msc or services in the search bar and then open the Services app. Select the
application and stop or restart as needed.

A

Restart services

60
Q

Add resources: Always remember, few actions can improve a PC’s performance more substantially than adding more RAM.

A

Add resources:

61
Q

New versions of software and upgrades to hardware can make current specifications obsolete. RAM, storage, and
power supply issues can creep into an upgraded system.

A

Verify requirements:

62
Q

Select Windows+X/PowerShell (Admin). Type sfc /scannow (include the space after sfc).

A

Perform a system file check:

63
Q

Go to the Microsoft Store app, select Account, and then select App Updates. The store can update apps automatically.

A

Uninstall/reinstall/update applications:

64
Q

Rebooting while pressing F11 (on most machines) brings up Windows 10 Advanced Starting Options. Select
Troubleshoot > Advanced Options > Startup Repair.

A

Repair Windows:

65
Q

Click Start > Settings > Update & Security > Recovery. Under Advanced Startup, click Restart
Now.

A

Run Windows Recovery (WinRE):

66
Q

Reboot+F11 (on most machines) brings up Windows 10 Advanced Starting Options. Select Troubleshoot > Advanced Options > Uninstall Updates.

A

Roll back updates:

67
Q

.
Pressing Reboot+F11 (on most machines) brings up Windows 10 Advanced Starting Options. Select Troubleshoot > Advanced Options > System Image Recovery.

A

Reimage:

68
Q

Perform a System Restore: Pressing Reboot+F11 (on most machines) brings up Windows 10 Advanced Starting Options. Select
Troubleshoot > Advanced Options > System Restore

A

Perform a System Restore:

69
Q

User profiles contain desktop backgrounds and files, icons, and other personal data that can bloat a profile and cause it to load slowly when booting. If other profiles load quickly, too much data might be the problem. Manage the profile data by reducing data in the profile or removing it.

A

Rebuild Windows Profiles

70
Q

Internet connectivity problems that do not affect all computers and devices on the network could be caused by malware. Run troubleshooters to repair the problem. If the problem continues to occur, scan the systems.

A

Unable to access to Network

71
Q

The Notifications and Quick Actions center is easily accessed on the taskbar next to the time and date. Notifications can be edited by going to Settings > System > Notifications and Actions. Options include connectivity, VPN, network, and settings notifications, as well as notifications from apps. OS updates also can be sent here. A regular check of the Notifications and Quick Actions center can help keep small problems from turning into big ones.

A

Desktop
alerts

72
Q

Security alerts from Windows Defender or from your OS might indicate malware infection or other problems. Sometimes alerts that pop up without any notification in Defender or the Action Center are attempts to infect your system by tricking you into clicking a phishing link in the pop-up. Scan the system. Rogue antivirus programs look like legitimate antivirus programs but actually are designed to infect your system or phish users for personal information. Uninstall any such program and scan the computer.

A

False alerts regarding antivirus protection

73
Q

Malware infections might rename system files (such as msconfig, regedit, and taskmgr) that can help block malware.

Files can go missing or be renamed on your storage devices if they are corrupted, infected with malware, unknowingly hidden, or automatically moved by a program without user acknowledgement. Files that have actually disappeared and have not been moved or artificially hidden can often be recovered with undeletion software that scans the hard drive for files that are no longer recorded in the file allocation table, the storage device data that tracks where files start and end. Undeleted malware-infected files can reinfect a system if they are not properly cleaned before use.

A

Altered system or personal files

74
Q

Notifications can be easily managed in Windows 10 by going to Settings > System > Notifications & Actions. From this page, you can customize notifications and alerts from Windows and from individual apps that are installed.

A

Unwanted notifications within the OS

75
Q

A common reason OS updates fail is lack of disk space. Make sure ample free disk space is available; some updates can be quite large.
Also make sure that automatic updates are not blocked by antivirus protection settings.

A

OS update failures

76
Q

If the browser has pop-up blocking enabled but pop-ups are still showing up, the system might be infected with malware. If many pop-ups are displayed onscreen rapidly and they keep showing up even as they are closed, the system is almost certainly infected and needs to be scanned immediately.

A

Random or frequent pop-ups

77
Q

Operating systems and browsers use digital certificates to determine the valid sources of apps and drivers. Certificates that have been obtained fraudulently from a certificate authority can be used to launch malware attacks.

A

Certificate warnings

78
Q

, takes place when the home page setting for your browser is changed without your permission. Some free apps offer to change your browser home page during installation, but you can opt in or opt out of the change. If an app changes your browser home page without notifying you, it could be malware. Scan the system.

A

Browser redirection / browser hijacking

79
Q

Delete the app and reinstall it.

A

App fails to launch

80
Q

Delete the app and reinstall it.

Force-stop the app (methods vary by phone or device).

Clear the app’s cache and data (Settings menu).

A

App fails to close or crashes

81
Q

If the app pauses during the update, a file might have been corrupted in transit. Delete the app and repeat the download and install procedures.

A

App fails to update

82
Q

If rebooting does not fix this problem, check the available storage and delete old or unused data. When a phone nears storage capacity, it can lag.

A

App is slow to respond

83
Q

This is likely a storage issue. Check for space, and make enough room for the update to download and launch.

A

OS fails to update

84
Q

Many features that run in the background can limit the battery life of a phone or device.

A

Battery life issues arise

85
Q

For example:
-Make use of battery optimizing information and settings such as Low Power Mode.
-Reduce the brightness of the screen.
-Identify apps that use more power, and manage them.
-Turn off alert sounds and vibrations.
-Charge the phone or device before it runs out of power. One strategy is to occasionally run the battery down to 10–15 percent capacity and then charge it fully.

A

Battery life issues arise

86
Q

Close any apps not in use. Determine whether an installed app is the problem by restarting in Safe Mode, removing the most recent app, and then restarting. If problem persists, repeat for other recent apps.

A

Phone or device randomly reboots

87
Q

Access the control center (with an iPhone, swipe down from the upper-right corner; on an Android device, swipe down from the top). Tap the rotation lock icon to toggle the setting.

Also check the Display settings and make sure the display is Standard and not Zoomed; the zoom can prevent the screen from rotating.

A

Screen does not autorotate

88
Q

For both iPhone and Android, the most common solution is to “forget” the device that is failing to pair from the cache.

A

Bluetooth

89
Q

Check that signal strength is good. Sometimes walking away from a strong signal activates cellular data and drops the Wi-Fi connection.

Verify the networks and authentication.

Be aware that crowds at large events can overwhelm

Wi-Fi (and cell) data systems.

A

Wi-Fi

90
Q

Make sure NFC is enabled in the Control Center (for iPhone models up to 11—in subsequent models, NFC is always on and no setting is available). NFC is good for only a few inches. To connect, be sure that the reader and the phone are nearly touching.

A

Near-field communication (NFC)

91
Q

For iPhone/iPad:

Make sure the receiving device is both compatible and discoverable.

AirDrop works only when the receiving device is turned on and its screen is awake.

AirDrop uses Bluetooth and Wi-Fi; make sure they are enabled.

Check that Airplane mode is off.

A

AirDrop

92
Q

As with any software for a device, a key security practice is to check the reliability of the source for a file before downloading. ____ files can be corrupted by hackers and distributed. Unwary users can unwittingly download APK files loaded with malware or Trojan horses that are ready to install in their Android system.

A

Android Package (APK) Source

93
Q

____ is available in Windows 10 and on the Android mobile OS. The purpose of ____ is to allow someone developing applications to test the applications. ____ in Windows is found in Settings > Update & Security > For Developers. On Android devices, it varies by release, but ____ is intentionally complicated to keep users from accidentally going into the environment on the phone. Exploring ____ is not necessarily dangerous, but the user experience is different in that environment and caution is necessary.

A

Developer mode

94
Q

an iPhone OS means acquiring access to the root files for the purpose of customizing the iOS, adding portability between cell providers, and possibly bypassing paywalls for apps. Jailbreaking is mostly done by hacking hobbyists who like to customize phones.

Although ____ is not illegal, it can provide access to illegal behavior. Still, ____ involves serious risks. Bypassing the manufacturer’s secure design adds inherent risks for malware. Additionally, changing code and installing other software will likely cause iOS instability and often voids the manufacturer’s warranty.

A

Jailbreaking

95
Q

Android devices are relatively easy to root (that is, to gain ____ to) so that users can install different operating systems and continue to use their cellular and data connections. On the other hand, gaining the same sort of access to an iOS device requires jailbreaking it, which means that the device might henceforth be blocked from getting future updates.

Unauthorized ____ can be dangerous, and it is a risk incurred when users download apps that do not come from Google Play. These apps do not properly follow the permissions rules and might elevate permissions without the user’s knowledge or consent. Running a device in Developer mode (used for software and service development and testing) disables most safeguards. On current versions of Android, several steps are required to enable Developer mode, so this is difficult to do accidentally.

A

root access

96
Q

____ occurs when a malicious application imitates a legitimate application and tricks users into revealing passwords or other sensitive information as they interact with the false app. This process is similar to a phishing attack. ____ can be sophisticated and requires that users be ever aware of how they are sharing sensitive information. Spoofing can also be used to generate extra ads and overrun a user’s experience with pop-ups.

A

Application spoofing

97
Q
A