A+1102 3.0 Software Troubleshooting Flashcards

1
Q

A software engineer is troubleshooting a team laptop and discovers that several case management tools are out-of-date. What action should the engineer take to get the applications to the latest version?

A

YOU WERE SURE AND CORRECT

Update the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee’s use. What is this called?

A

YOU WERE SURE AND CORRECT

Reimage the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer?

A

YOU WERE SURE AND CORRECT

Blue screen of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A cyber technician is troubleshooting a company computer that exhibits performance issues. What steps should the technician take in their troubleshooting strategy? (Select all that apply.)

A

Check for misconfigurations.
Verify the problem.
Check for overheating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cyber intern needs to create a living record of tech complaints presented by the organization’s employees. The issue with the highest number of complaints is application crashes. What is unique to application crashes?

A

YOU WERE SURE AND CORRECT

It occurs when a program stops unexpectedly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee?

A

YOU WERE SURE AND CORRECT

Rebuild a Windows profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task?

A

THE CORRECT ANSWER

Roll back an update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?

A

YOU WERE UNSURE AND CORRECT

Restart services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer?

A

THE CORRECT ANSWER

USB controller resource warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician receives a request from an employee via a help ticket. The employee wants to return their computer to a former installation setting. What is the employee requesting the technician to complete?

A

YOU WERE SURE AND CORRECT

Restore the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance?

A

YOU WERE SURE AND CORRECT

No OS found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organizational employee is having computing issues while attempting to run several applications simultaneously. What is the employee experiencing in this instance?

A

YOU WERE SURE AND CORRECT

Low memory warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A cyber architect troubleshoots a computer with the message that reflects “OS not found.” What recovery mode command prompts repair of the master boot record (MBR)?

A

YOU WERE SURE AND CORRECT

bootrec/fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome?

A

YOU WERE SURE AND CORRECT

Add resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A software engineer troubleshoots an “OS not found” issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?

A

YOU WERE SURE AND CORRECT

bootrec/fixboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?

A

THE CORRECT ANSWER

SFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A software engineer is experiencing issues with a work computer and identifies that the computer does not have the memory or video graphics necessary to operate the program. What should the engineering review to ensure the program works correctly?

A

THE CORRECT ANSWER

Verify requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?

A

Restart services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log?

A

THE CORRECT ANSWER

Time drift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician is troubleshooting an organizational computer that is continually restarting without any action from the user. What is the computer doing?

A

YOU WERE SURE AND CORRECT

Rebooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A maintenance engineer is troubleshooting a computer that is out of sync. What is the cause for the computer’s inability to sync?

A

THE CORRECT ANSWER

Time drift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A software engineer is reviewing the various concerns associated with certificate warnings. What are common issues tied to certificate warnings? (Select all that apply.)

A

It has expired or is listed as revoked.

It is self-signed or issued by a CA that is not trusted.

The FQDN requested by the browser is different from the subject name listed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An employee works on their company computer and receives a push notification to download and install software to remain compliant. Upon clicking the link in the notification window, malware inserts into the device. What message did the employee receive?

A

THE CORRECT ANSWER

Desktop alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A cyber architect reviews desktop symptoms and wants to learn more about file system errors and anomalous behaviors. Which are NOT considered symptoms of security issues in the file system? (Select all that apply.)

A

Certificate warnings

Desktop alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An employee is working on their company computer and begins getting pop-up notifications. Which notifications would be considered desktop alerts? (Select all that apply.)

A

Immediate download
Push notification
Software install and upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A cyber associate reviews the company policy on troubleshooting desktop symptoms of malware infection. What is a key indicator that malware infection has occurred in security-related applications?

A

THE CORRECT ANSWER

OS update failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An employee viewed websites to shop for company equipment and traversed to an unknown site. The employee recognizes that the site does not have a little padlock next to the web address and attempts to recall what that means. What is the premise of a certificate warning?

A

YOU WERE SURE AND CORRECT

It is a notification that a website may be untrustworthy and may pose an increased risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A technician reviews the CompTIA A+ manual regarding malware symptoms associated with performance issues. What is considered a performance symptom?

A

YOU WERE SURE AND CORRECT

The host cannot access the network or the network is slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?

A

THE CORRECT ANSWER

The device is unable to access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?

A

THE CORRECT ANSWER

The file names of saved work changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An employee is receiving training on best practices associated with surfing the internet. What is common with frequent pop-ups?

A

THE CORRECT ANSWER

It occurs when advertisements or notifications appear on the display that were not wanted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A cyber analyst is drafting a memorandum discussing the various messages a user can receive on their device. What type of message appears on the display of a device without the approval or desire from the user?

A

YOU WERE SURE AND CORRECT

Unwanted notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An engineer is reviewing the various symptoms associated with malware infections. What is NOT a symptom associated with security system errors?

A

THE CORRECT ANSWER

The host cannot access the network or network performance is slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An employee goes to several websites to purchase needed office equipment and new laptop computers. The employee selects a website that hosts laptop computers, but the page displays a site with inappropriate content. What has occurred in this situation?

A

YOU WERE SURE AND CORRECT

The user attempts to open one web page but is directed to another one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?

A

THE CORRECT ANSWER

The device is unable to access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A new employee attempts to set up their new computer and activates some desktop alerts to assist in their day-to-day operations. Which is NOT a desktop alert?

A

YOU WERE SURE AND CORRECT

An advertisement offering items that were recently viewed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An employee becomes frustrated by the number of unsolicited instances the employee receives a notification. What is an unwanted operating system (OS) notification?

A

THE CORRECT ANSWER

It is a notification that appears on the display that was not prompted by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An employee contacts the help ticket hotline complaining about frequent windows populating on their screen and the distraction it is taking from their work. What risks are associated with random pop-up windows?

A

YOU WERE SURE AND CORRECT

It can pose a risk of inadvertently adding malware to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A technician is reviewing open-source literature on redirection. What type of malware exploits a target page to capture authentication details?

A

YOU WERE SURE AND CORRECT

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A cyber technician explores the various types of notifications that they can observe on the organization’s computers. What is unique to desktop alerts?

A

THE CORRECT ANSWER

It is a notification advising immediate action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?

A

YOU WERE SURE AND CORRECT

The file names of saved work changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A cyber consultant is reviewing the company’s policy on security issues. What are symptoms associated with security issues within file systems? (Select all that apply.)

A

The devices files have been renamed.

The device has altered system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An employee is working on a company computer and begins receiving several unusual antivirus warnings. What is important to know about false antivirus warnings?

A

YOU WERE SURE AND CORRECT

It is a notification that attempts to ruse the user into downloading nefarious content under false premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A cyber consultant troubleshoots a computer with anomalous errors and believes the issues originated from malware infection. What is a symptom of security issues associated with malware?

A

THE CORRECT ANSWER

The device has altered system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A technician uses the internet to purchase new computer components and is shopping for the best price. After reviewing several sites, the technician began receiving advertisements for related and unrelated products for the items they were looking for. What is the technician receiving?

A

YOU WERE SURE AND CORRECT

Frequent pop-ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A cyber technician is drafting a memorandum to advise employees of current risks associated with using the internet. One of the topics in this memorandum focuses on site redirection. What type of malware has a blunt means of driving traffic through a site?

A

YOU WERE SURE AND CORRECT

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A helpdesk ticket specialist uses CompTIA’s malware removal procedure while working on a company system. The specialist successfully runs scans and updates and begins preparing a document to educate end-point users. What step did the specialist omit from CompTIA’s best practice procedure?

A

THE CORRECT ANSWER

Sixth step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A software engineer is preparing a presentation regarding malware discovered on six company computers. Ensuring that the presentation was succinct but informative, the engineer used the best practice procedure for malware removal by CompTIA. What is the final step in CompTIA’s procedure?

A

THE CORRECT ANSWER

Educate the end-users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?

A

THE CORRECT ANSWER

Fourth step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A consultant is troubleshooting a system reported as being infected by malware. The office’s protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system? (Select all that apply.)

A

Disconnect the network link.

Scan attached removable media devices for malware.

Move the infected system to a sandbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps?

A

THE CORRECT ANSWER

Third step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A help desk consultant removes malware from an employee’s computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step?

A

THE CORRECT ANSWER

Disable system restore in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?

A

THE CORRECT ANSWER

Update the anti-malware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician?

A

THE CORRECT ANSWER

Quarantine the infected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)

A

Re-enable software firewalls.

Create a fresh restore point or system image.

Verify DNS configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems? (Select all that apply.)

A

THE CORRECT ANSWER
Update anti-malware software.

Use of scanning and removal techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A software consultant is tasked with malware removal for a company asset and reviews the best practices procedure from CompTIA. What step in the process uses scanning and removal techniques?

A

THE CORRECT ANSWER

Fourth step, part B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?

A

THE CORRECT ANSWER

Schedule scans and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A cyber consultant has disabled the system restore feature in Windows. According to the CompTIA best practice procedure for malware removal, what is the next step for malware removal?

A

THE CORRECT ANSWER

Remediate infected systems.

60
Q

A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?

A

THE CORRECT ANSWER

Update the anti-malware software.

61
Q

A technician is trying to troubleshoot a system impacted by malware. According to the CompTIA best practice procedure, what should also be done as a safety precaution when disabling system restore points?

A

THE CORRECT ANSWER

Delete old system restore points and backup copies.

62
Q

A cyber architect is looking to remove malware from an employee’s computer, successfully quarantined the infected system, and disabled system restore. While following the CompTIA procedure for malware removal, what should the architect do as part of the remediation of infected systems?

A

THE CORRECT ANSWER

Conduct scanning and removal techniques.

63
Q

A consultant is troubleshooting a system reported as being infected by malware. The office’s protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system? (Select all that apply.)

A

Move the infected system to a sandbox.

Disconnect the network link.

Scan attached removable media devices for malware.

64
Q

A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first?

A

THE CORRECT ANSWER

Disconnect the network link.

65
Q

While using the CompTIA best practice for malware removal, a consultant transitions from remediating infected systems to re-enabling system restore points in Windows. What step did the consultant skip?

A

THE CORRECT ANSWER

Fifth step

66
Q

A cyber architect is working on removing malware from a corporate computer and elects to review the CompTIA seven-step best practice procedure for malware removal to develop a standard operating procedure for the cyber office. What is the first step of the best practice procedure?

A

THE CORRECT ANSWER

Investigate and verify malware symptoms.

67
Q

A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)

A

Verify DNS configuration.

Re-enable software firewalls.

Create a fresh restore point or system image.

68
Q

A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician?

A

THE CORRECT ANSWER

Quarantine the infected systems.

69
Q

A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?

A

THE CORRECT ANSWER

Fourth step

70
Q

A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps?

A

THE CORRECT ANSWER

Third step

71
Q

Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?

A

THE CORRECT ANSWER

Schedule scans and updates.

72
Q

A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)

A

Create a fresh restore point or system image.

Verify DNS configuration.

Re-enable software firewalls.

73
Q

A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first?

A

THE CORRECT ANSWER

Disconnect the network link.

74
Q

A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company’s infected systems. What tools are synonymous in remediating infected systems? (Select all that apply.)

A

Antivirus software

Anti-malware software

75
Q

A help desk consultant removes malware from an employee’s computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step?

A

THE CORRECT ANSWER

Disable system restore in Windows.

76
Q

A cyber consultant has disabled the system restore feature in Windows. According to the CompTIA best practice procedure for malware removal, what is the next step for malware removal?

A

THE CORRECT ANSWER

Remediate infected systems.

77
Q

A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems? (Select all that apply.)

A

Update anti-malware software.

Use of scanning and removal techniques

78
Q

A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company’s infected systems. What tools are synonymous in remediating infected systems? (Select all that apply.)

A

Anti-malware software

Antivirus software

79
Q

A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)

A
80
Q

A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?

A

THE CORRECT ANSWER

Update the anti-malware software.

81
Q

A helpdesk technician reviews the CompTIA best practice guide regarding malware removal as they are putting together a presentation for the businesses’ cyber department. What is associated with remediating infected systems?

A

THE CORRECT ANSWER

Use of scanning and removal techniques.

82
Q

A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)

A

Create a fresh restore point or system image.

Verify DNS configuration.

Re-enable software firewalls.

83
Q

A technician is working on removing malware from a company system. While following the steps presented in CompTIA’s best practice procedure for malware removal, the technician moves from investigating and verifying malware symptoms to disabling system restore points in Windows. What step did the technician skip in this scenario?

A

THE CORRECT ANSWER

Second step

84
Q

A cyber architect is removing malware per CompTIA’s best practice procedure. Upon re-enabling system restore points in Windows, the architect closes the ticket and considers the task complete. What did the architect fail to complete?

A

THE CORRECT ANSWER

Seventh step

85
Q

A software technician is reviewing CompTIA’s best practice procedure for malware removal. What step investigates and verifies malware symptoms?

A

THE CORRECT ANSWER

First step

86
Q

A helpdesk technician is troubleshooting a device failing to update the operating system (OS). Which is NOT a step that the technician could use to update the OS?

A

THE CORRECT ANSWER

Check to ensure the Bluetooth is enabled for a communication link.

87
Q

An employee is trying to purchase a USB device from the help ticket center and is getting frustrated as they have issues with the NFC feature on the phone. What should the employee consider as a means to troubleshoot the NFC issue? (Select all that apply.)

A

The device is unlocked and NFC is enabled

The NFC sensor is supported and enabled in the wallet app.

The device is not in airplane mode.

88
Q

A help ticket consultant completes the troubleshooting methods prescribed by CompTIA for a device that the user is saying will not auto-rotate from vertical to horizontal viewing. The consultant has completed steps one and two and is moving to the final step. What is the final step in CompTIA’s troubleshooting for devices that fail to auto-rotate?

A

THE CORRECT ANSWER

Consider that some apps can only be used in a single orientation.

89
Q

A cyber consultant is troubleshooting a mobile device that is having application issues. The consultant opens an application and cannot get it to stop. What is the consultant observing?

A

THE CORRECT ANSWER

Fails to close.

90
Q

A technician is troubleshooting an employee’s company mobile device where the employee is complaining that several of the applications are failing to close. What causes a failure to close?

A

THE CORRECT ANSWER

It occurs when the application fails to stop after being prompted.

91
Q

A cyber intern is troubleshooting connectivity issues associated with a mobile device’s inability to connect to the Wi-Fi. What can cause this type of issue?

A

THE CORRECT ANSWER

It occurs when the device is outside the range of the router.

92
Q

A cyber consultant is troubleshooting a mobile device that is having application issues. The consultant identifies an outdated patch, but the consultant cannot get it installed. What is the consultant observing?

A

THE CORRECT ANSWER

Fails to update.

93
Q

A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response?

A

THE CORRECT ANSWER

Battery issues

94
Q

A cyber consultant is troubleshooting a mobile device that is having application issues. The technician opens an application and notices that it takes 25 seconds to load. What is the consultant observing?

A

THE CORRECT ANSWER

Slow to respond.

95
Q

A technician is troubleshooting a mobile device where the employee complains that the device will not auto-rotate from vertical to horizontal viewing. From a CompTIA perspective, what is the first step to consider in remedying this situation?

A

Use the notification drawer or Control Center to check that rotation lock is not enabled.

96
Q

A technician is troubleshooting connectivity issues on a mobile device regarding Bluetooth connections. What best describes Bluetooth connectivity?

A

THE CORRECT ANSWER

It occurs when paired devices are not in range.

97
Q

A help ticket consultant completes the troubleshooting methods prescribed by CompTIA for a device that the user is saying will not auto-rotate from vertical to horizontal viewing. The consultant has completed steps one and two and is moving to the final step. What is the final step in CompTIA’s troubleshooting for devices that fail to auto-rotate?

A

THE CORRECT ANSWER

Consider that some apps can only be used in a single orientation.

98
Q

A cyber consultant troubleshoots a mobile device that has application issues. The consultant is pressing on an icon for execution, but nothing is happening. What is the consultant observing?

A

THE CORRECT ANSWER

Fails to launch.

99
Q

A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response?

A

THE CORRECT ANSWER

Battery issues

100
Q

A consultant is troubleshooting an employee’s mobile device where the employee is complaining that several of the applications are failing to update. What causes a failure in updates?

A

THE CORRECT ANSWER

It occurs when the application fails to stop after being prompted.

101
Q

A cyber consultant is troubleshooting a mobile device that is having application issues. The technician opens an application and notices that it takes 25 seconds to load. What is the consultant observing?

A

THE CORRECT ANSWER

Slow to respond.

102
Q

A consultant is troubleshooting an employee’s mobile device where the employee is complaining that several of the applications are failing to update. What causes a failure in updates?

A

THE CORRECT ANSWER

It occurs when the system does not accept the latest version/patch.

103
Q

A helpdesk technician receives a computer in their triage department where the customer is complaining that their device is constantly rebooting at random times. What could be causing the random reboots? (Select all that apply.)

A

The device has a low battery charge.
The device has a faulty battery or other hardware.
The device is overheating.

104
Q

A cyber engineer is troubleshooting a device failing to update the OS. What steps can the engineer consider while troubleshooting the device? (Select all that apply.)

A

Restart the device and then try the update again.

Check that there is sufficient free space on the device.

Use the vendor site to verify that the update is compatible with the device model.

105
Q

A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response?

A

THE CORRECT ANSWER

Battery issues

106
Q

A software engineer troubleshoots an employee’s mobile device, complaining that the screen will not auto-rotate. The engineer has completed the first step prescribed by CompTIA to correct the issue and is moving to the next step. What is the second step in CompTIA’s recommendations for troubleshooting auto-rotate issues?

A

Check that the user is not touching any part of the screen as this will prevent rotation.

107
Q

A software custodian is troubleshooting an employee’s mobile device. What type of issue occurs when a file transfer between iOS and macOS devices is not permitted because the recipient is not on the contact list?

A

THE CORRECT ANSWER

AirDrop

108
Q

A helpdesk technician is troubleshooting a device failing to update the operating system (OS). Which is NOT a step that the technician could use to update the OS?

A

THE CORRECT ANSWER

Check to ensure the Bluetooth is enabled for a communication link.

109
Q

A technician is troubleshooting connectivity issues on a mobile device where the employee is complaining that they can not complete near-field communication (NFC). How can an NFC issue be described?

A

THE CORRECT ANSWER

It occurs when a device cannot make payments through a contactless card reader.

110
Q

A technician is troubleshooting a mobile device where the employee complains that the device will not auto-rotate from vertical to horizontal viewing. From a CompTIA perspective, what is the first step to consider in remedying this situation?

A

Use the notification drawer or Control Center to check that rotation lock is not enabled.

111
Q

An employee wants to install an external program/application on their company computer that will support their current project. The employee uses a third-party website and believes that the install location is legitimate. Shortly after installing the software, the employee’s computer begins demonstrating symptoms associated with malware. What is the cause of the malware’s introduction to the company device?

A

THE CORRECT ANSWER

Spoof

112
Q

A cyber consultant reviews the company’s policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available?

A

THE CORRECT ANSWER

Developer mode

113
Q

A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing?

A

THE CORRECT ANSWER

It typically masquerades as a legitimate application.

114
Q

A helpdesk consultant is reviewing the impacts of malware on mobile and computer assets. What can signify that malware is causing excessive power drain and high resource utilization and cause other apps to perform slowly?

A

THE CORRECT ANSWER

Data-usage limit notifications

115
Q

An employee is working from their desk, and the computer display becomes filled with advertisements. What risk can be associated with a large numbers of ads?

A

THE CORRECT ANSWER

It can be part of an attempt to gain revenue but can pose increased risks to malware and other viruses.

116
Q

A software technician is preparing a presentation on the “jailbreaking” of company assets. What does “jailbreaking” allow on a device?

A

THE CORRECT ANSWER

It enables users to obtain root privileges, sideload applications, and customize interfaces.

117
Q

A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.)

A

Websites should be set for immediate notification.

Two-step verification should be monitored.

Linked devices to the data should be quarantined.

118
Q

An employee visits the cyber help ticket office requesting the technician obtain root privileges, sideload apps, and customize the device’s interface. What term is associated with this type of action?

A

THE CORRECT ANSWER

Jailbreak

119
Q

A helpdesk consultant is reviewing the impacts of malware on mobile and computer assets. What can signify that malware is causing excessive power drain and high resource utilization and cause other apps to perform slowly?

A

THE CORRECT ANSWER

Data-usage limit notifications

120
Q

A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.)

A

Websites should be set for immediate notification.

Two-step verification should be monitored.

Linked devices to the data should be quarantined.

121
Q

A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing?

A

THE CORRECT ANSWER

It typically masquerades as a legitimate application.

122
Q

An employee downloads and installs an application from an untrusted third-party developer using the .apk format. What is this called?

A

THE CORRECT ANSWER

Android package source

123
Q

A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.)

A

Fake security warnings
Sluggish response time
High number of ads

124
Q

A software technician is troubleshooting a mobile device that is exhibiting security concerns. What symptom presents risks associated with corruption to the domain name system and degraded communications between devices and sites?

A

THE CORRECT ANSWER

Limited internet connectivity

125
Q

A company employee is working on their business computer and receives a message on their display advising that if they do not immediately install the application provided in the security message, their computer will shut down and lose all data. Out of concern, the employee downloads the software and is later a victim of the malware. What did the employee receive?

A

THE CORRECT ANSWER

Fake security warnings

126
Q

An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer’s capabilities. What is the employee experiencing when attempting to run these programs?

A

THE CORRECT ANSWER

Sluggish response time

127
Q

A software technician is preparing a presentation on the “jailbreaking” of company assets. What does “jailbreaking” allow on a device?

A

THE CORRECT ANSWER

It enables users to obtain root privileges, sideload applications, and customize interfaces.

128
Q

A company employee is working on their business computer and receives a message on their display advising that if they do not immediately install the application provided in the security message, their computer will shut down and lose all data. Out of concern, the employee downloads the software and is later a victim of the malware. What did the employee receive?

A

THE CORRECT ANSWER

Fake security warnings

129
Q

After an employee goes to the help desk and requests to “jailbreak” their company phone, the help desk sends out information to all employees discussing the risks of “jailbreaking” devices. What are the tenets of “jailbreaking”? (Select all that apply.)

A

It involves subverting the security controls built into the OS to gain unrestricted system-level access.

It can no longer be assumed to run a trusted OS.

It has the side effect of leaving many security measures permanently disabled.

130
Q

A software engineer is working on a computer where the employee states that the application works correctly but continually displays a message prompt asking the user to grant access to the computer’s camera for program operations. The employee does not understand why they are receiving the messages as the program does not require a camera. What type of activity is the employee describing?

A

THE CORRECT ANSWER

Unexpected application behavior

131
Q

A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.)

A

Websites should be set for immediate notification.

Linked devices to the data should be quarantined.

Two-step verification should be monitored.

132
Q

A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing?

A

THE CORRECT ANSWER

It typically masquerades as a legitimate application.

133
Q

A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.)

A

High number of ads

Sluggish response time
Fake security warnings

134
Q

An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer’s capabilities. What is the employee experiencing when attempting to run these programs?

A

THE CORRECT ANSWER

Sluggish response time

135
Q

A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.)

A

High number of ads

Fake security warnings
Sluggish response time

136
Q

A software engineer is working on a computer where the employee states that the application works correctly but continually displays a message prompt asking the user to grant access to the computer’s camera for program operations. The employee does not understand why they are receiving the messages as the program does not require a camera. What type of activity is the employee describing?

A

THE CORRECT ANSWER

Unexpected application behavior

137
Q

An employee wants to download and install applications using an android package source. What does this type of sourcing allow?

A

THE CORRECT ANSWER

It allows applications to be downloaded and installed from untrusted external third-party sources.

138
Q

A cyber specialist troubleshoots a mobile device showing limited internet connectivity to websites. What can cause this decrease in connectivity?

A

THE CORRECT ANSWER

Malware may be corrupting the domain name system.

139
Q

A technician conducts a mobile security analysis on a set of work phones and identifies that one of them shows symptoms of malware. What results from malware disrupting connection with legitimate sites causing no traffic to exchange?

A

THE CORRECT ANSWER

No internet connectivity

140
Q

An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer’s capabilities. What is the employee experiencing when attempting to run these programs?

A

THE CORRECT ANSWER

Sluggish response time

141
Q

A cyber consultant reviews the company’s policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available?

A

THE CORRECT ANSWER

Developer mode

142
Q

An employee is working from their desk, and the computer display becomes filled with advertisements. What risk can be associated with a large numbers of ads?

A

THE CORRECT ANSWER

It can be part of an attempt to gain revenue but can pose increased risks to malware and other viruses.

143
Q

An employee downloads and installs an application from an untrusted third-party developer using the .apk format. What is this called?

A

THE CORRECT ANSWER

Android package source

144
Q

A cyber architect is writing a paper on root activity security concerns and the use of developer mode. What are the characteristics of placing a device into developer mode? (Select all that apply.)

A

It should be used only for application development.

It can be purposely misused to install bootleg applications.

It makes advanced configuration settings and log data available.

145
Q

A cyber consultant reviews the company’s policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available?

A

YOU WERE SURE AND CORRECT

Developer mode

146
Q

A software technician is conducting an after-action report on an issue where someone leaked company information outside of the organization. What data can the technician pull to possibly identify the employee who sent the documentation outside the company?

A

THE CORRECT ANSWER

High network traffic