A+1102 3.0 Software Troubleshooting Flashcards
A software engineer is troubleshooting a team laptop and discovers that several case management tools are out-of-date. What action should the engineer take to get the applications to the latest version?
YOU WERE SURE AND CORRECT
Update the application.
A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee’s use. What is this called?
YOU WERE SURE AND CORRECT
Reimage the device.
A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer?
YOU WERE SURE AND CORRECT
Blue screen of death
A cyber technician is troubleshooting a company computer that exhibits performance issues. What steps should the technician take in their troubleshooting strategy? (Select all that apply.)
Check for misconfigurations.
Verify the problem.
Check for overheating.
A cyber intern needs to create a living record of tech complaints presented by the organization’s employees. The issue with the highest number of complaints is application crashes. What is unique to application crashes?
YOU WERE SURE AND CORRECT
It occurs when a program stops unexpectedly.
A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee?
YOU WERE SURE AND CORRECT
Rebuild a Windows profile.
A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task?
THE CORRECT ANSWER
Roll back an update.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
YOU WERE UNSURE AND CORRECT
Restart services.
An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer?
THE CORRECT ANSWER
USB controller resource warning
A technician receives a request from an employee via a help ticket. The employee wants to return their computer to a former installation setting. What is the employee requesting the technician to complete?
YOU WERE SURE AND CORRECT
Restore the computer.
A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance?
YOU WERE SURE AND CORRECT
No OS found
An organizational employee is having computing issues while attempting to run several applications simultaneously. What is the employee experiencing in this instance?
YOU WERE SURE AND CORRECT
Low memory warning
A cyber architect troubleshoots a computer with the message that reflects “OS not found.” What recovery mode command prompts repair of the master boot record (MBR)?
YOU WERE SURE AND CORRECT
bootrec/fixmbr
A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome?
YOU WERE SURE AND CORRECT
Add resources.
A software engineer troubleshoots an “OS not found” issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?
YOU WERE SURE AND CORRECT
bootrec/fixboot
A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?
THE CORRECT ANSWER
SFC
A software engineer is experiencing issues with a work computer and identifies that the computer does not have the memory or video graphics necessary to operate the program. What should the engineering review to ensure the program works correctly?
THE CORRECT ANSWER
Verify requirements.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
Restart services.
A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log?
THE CORRECT ANSWER
Time drift
A technician is troubleshooting an organizational computer that is continually restarting without any action from the user. What is the computer doing?
YOU WERE SURE AND CORRECT
Rebooting
A maintenance engineer is troubleshooting a computer that is out of sync. What is the cause for the computer’s inability to sync?
THE CORRECT ANSWER
Time drift
A software engineer is reviewing the various concerns associated with certificate warnings. What are common issues tied to certificate warnings? (Select all that apply.)
It has expired or is listed as revoked.
It is self-signed or issued by a CA that is not trusted.
The FQDN requested by the browser is different from the subject name listed.
An employee works on their company computer and receives a push notification to download and install software to remain compliant. Upon clicking the link in the notification window, malware inserts into the device. What message did the employee receive?
THE CORRECT ANSWER
Desktop alert
A cyber architect reviews desktop symptoms and wants to learn more about file system errors and anomalous behaviors. Which are NOT considered symptoms of security issues in the file system? (Select all that apply.)
Certificate warnings
Desktop alerts
An employee is working on their company computer and begins getting pop-up notifications. Which notifications would be considered desktop alerts? (Select all that apply.)
Immediate download
Push notification
Software install and upgrade
A cyber associate reviews the company policy on troubleshooting desktop symptoms of malware infection. What is a key indicator that malware infection has occurred in security-related applications?
THE CORRECT ANSWER
OS update failure
An employee viewed websites to shop for company equipment and traversed to an unknown site. The employee recognizes that the site does not have a little padlock next to the web address and attempts to recall what that means. What is the premise of a certificate warning?
YOU WERE SURE AND CORRECT
It is a notification that a website may be untrustworthy and may pose an increased risk.
A technician reviews the CompTIA A+ manual regarding malware symptoms associated with performance issues. What is considered a performance symptom?
YOU WERE SURE AND CORRECT
The host cannot access the network or the network is slow.
A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?
THE CORRECT ANSWER
The device is unable to access the network.
A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?
THE CORRECT ANSWER
The file names of saved work changed.
An employee is receiving training on best practices associated with surfing the internet. What is common with frequent pop-ups?
THE CORRECT ANSWER
It occurs when advertisements or notifications appear on the display that were not wanted.
A cyber analyst is drafting a memorandum discussing the various messages a user can receive on their device. What type of message appears on the display of a device without the approval or desire from the user?
YOU WERE SURE AND CORRECT
Unwanted notifications
An engineer is reviewing the various symptoms associated with malware infections. What is NOT a symptom associated with security system errors?
THE CORRECT ANSWER
The host cannot access the network or network performance is slow.
An employee goes to several websites to purchase needed office equipment and new laptop computers. The employee selects a website that hosts laptop computers, but the page displays a site with inappropriate content. What has occurred in this situation?
YOU WERE SURE AND CORRECT
The user attempts to open one web page but is directed to another one.
A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?
THE CORRECT ANSWER
The device is unable to access the network.
A new employee attempts to set up their new computer and activates some desktop alerts to assist in their day-to-day operations. Which is NOT a desktop alert?
YOU WERE SURE AND CORRECT
An advertisement offering items that were recently viewed by the user.
An employee becomes frustrated by the number of unsolicited instances the employee receives a notification. What is an unwanted operating system (OS) notification?
THE CORRECT ANSWER
It is a notification that appears on the display that was not prompted by the user.
An employee contacts the help ticket hotline complaining about frequent windows populating on their screen and the distraction it is taking from their work. What risks are associated with random pop-up windows?
YOU WERE SURE AND CORRECT
It can pose a risk of inadvertently adding malware to the device.
A technician is reviewing open-source literature on redirection. What type of malware exploits a target page to capture authentication details?
YOU WERE SURE AND CORRECT
Spyware
A cyber technician explores the various types of notifications that they can observe on the organization’s computers. What is unique to desktop alerts?
THE CORRECT ANSWER
It is a notification advising immediate action.
A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?
YOU WERE SURE AND CORRECT
The file names of saved work changed.
A cyber consultant is reviewing the company’s policy on security issues. What are symptoms associated with security issues within file systems? (Select all that apply.)
The devices files have been renamed.
The device has altered system files.
An employee is working on a company computer and begins receiving several unusual antivirus warnings. What is important to know about false antivirus warnings?
YOU WERE SURE AND CORRECT
It is a notification that attempts to ruse the user into downloading nefarious content under false premises.
A cyber consultant troubleshoots a computer with anomalous errors and believes the issues originated from malware infection. What is a symptom of security issues associated with malware?
THE CORRECT ANSWER
The device has altered system files.
A technician uses the internet to purchase new computer components and is shopping for the best price. After reviewing several sites, the technician began receiving advertisements for related and unrelated products for the items they were looking for. What is the technician receiving?
YOU WERE SURE AND CORRECT
Frequent pop-ups
A cyber technician is drafting a memorandum to advise employees of current risks associated with using the internet. One of the topics in this memorandum focuses on site redirection. What type of malware has a blunt means of driving traffic through a site?
YOU WERE SURE AND CORRECT
Adware
A helpdesk ticket specialist uses CompTIA’s malware removal procedure while working on a company system. The specialist successfully runs scans and updates and begins preparing a document to educate end-point users. What step did the specialist omit from CompTIA’s best practice procedure?
THE CORRECT ANSWER
Sixth step
A software engineer is preparing a presentation regarding malware discovered on six company computers. Ensuring that the presentation was succinct but informative, the engineer used the best practice procedure for malware removal by CompTIA. What is the final step in CompTIA’s procedure?
THE CORRECT ANSWER
Educate the end-users.
A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?
THE CORRECT ANSWER
Fourth step
A consultant is troubleshooting a system reported as being infected by malware. The office’s protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system? (Select all that apply.)
Disconnect the network link.
Scan attached removable media devices for malware.
Move the infected system to a sandbox.
A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps?
THE CORRECT ANSWER
Third step
A help desk consultant removes malware from an employee’s computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step?
THE CORRECT ANSWER
Disable system restore in Windows.
A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?
THE CORRECT ANSWER
Update the anti-malware software.
A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician?
THE CORRECT ANSWER
Quarantine the infected systems.
A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)
Re-enable software firewalls.
Create a fresh restore point or system image.
Verify DNS configuration.
A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems? (Select all that apply.)
THE CORRECT ANSWER
Update anti-malware software.
Use of scanning and removal techniques
A software consultant is tasked with malware removal for a company asset and reviews the best practices procedure from CompTIA. What step in the process uses scanning and removal techniques?
THE CORRECT ANSWER
Fourth step, part B
Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?
THE CORRECT ANSWER
Schedule scans and updates.